Information Security Research Library

Powered by


As in most other aspects of information security, users typically are the weakest link in any compliance program. Therefore, it is vital that they be involved right from the beginning and have some stake in the outcome. Whether you're dealing with HIPAA, Sarbanes-Oxley, FFIEC or all of the above, the key to a strong compliance program is serving the needs of your organization while being attuned to the risks they entail. This "fact or fiction" podcast will give listeners the tools needed to educate end users about the importance of compliance, what they can do to help and how compliance is part of an overall organizational approach to mitigating risk.


Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.