sponsored by Tripwire, Inc.
Posted:  31 Jul 2009
Published:  08 Dec 2008
Format:  PDF
Length:  12  Page(s)
Type:  White Paper
Language:  English

There is nearly universal agreement that information security controls must be integrated into daily IT operations, and be 'baked in' from conception, not addressed later as an afterthought. But, if new security controls must be implemented, where do we start, and in what order? And how do we do this in a way that creates value rather than the perception of information security creating bureaucratic barriers to getting real work done?

This paper describes typical information security risks that practitioners will face with NERC compliance, presents seven practical steps to secure the production environment, and the business value of implementing them.

Business Intelligence | Business IT Alignment | Change Management | Compliance (Systems Operations) | Data Security | Information Security | Operational Support Systems | Risk Management

View All Resources sponsored by Tripwire, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement