Podcast: Managing third-party compliance
Your security is only as good as your weakest link -- certainly when it comes to outsourcing it for compliance. What good is it to tightly secure your organization, if you trust your network applications and data to a third party who doesn't apply the same rigorous standards? Listen to this podcast as Richard Mackey reveals how to ensure third party compliance.
Richard E. Mackey Jr.
ISACA/CISM, Vice President of Consulting, SystemsExperts
Richard E. "Dick" Mackey is a leading authority on enterprise security architecture and compliance. He has helped many organizations, from online retailers and application service providers to major manufactures assess and improve their security and compliance programs. He has advised leading Wall Street firms on governance and policy, security architecture, identity management, and intrusion detection and analysis.
Prior to joining the consultancy SystemExperts, Mackey was the director of collaborative development for The Open Group (the merger of the Open Software Foundation and X/Open). Prior to the merger, he was the Technical Lead of the OSF Distributed Computing Environment (DCE) project. Mackey has been a frequent speaker at conferences and a regular contributor to major publications on topics such as PCI, HIPAA, and GLB compliance, security standards, identity management, and service-oriented architecture security.
- 29 Jul 2009
- Jul 28, 2009