Practical Steps to Achieve and Maintain NERC Compliance

Practical Steps to Achieve and Maintain NERC Compliance


There is nearly universal agreement that information security controls must be integrated into daily IT operations, and be 'baked in' from conception, not addressed later as an afterthought. But, if new security controls must be implemented, where do we start, and in what order? And how do we do this in a way that creates value rather than the perception of information security creating bureaucratic barriers to getting real work done?

This paper describes typical information security risks that practitioners will face with NERC compliance, presents seven practical steps to secure the production environment, and the business value of implementing them.

Tripwire, Inc.
31 Jul 2009
08 Dec 2008
12 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor