Welcome!

Agile Computing Authors: Mano Marks, Pat Romanski, Liz McMillan, Elizabeth White, Mehdi Daoudi

Related Topics: Cloud Security

News Feed Item

Cyber Security Industry Alliance Issues Findings from Summit on Sarbanes-Oxley and IT Security

Most Stakeholders Not Looking for More Official Guidance on IT Security

ARLINGTON, Va., Aug. 15 /PRNewswire/ -- Cyber Security Industry Alliance (CSIA), the only public policy and advocacy group dedicated exclusively to cyber security, today released a report that summarizes key findings and conclusions from a conference held to discuss the adequacy of guidance given on IT security in Sarbanes-Oxley. Today's announcement follows a Sarbanes- Oxley compliance initiative that began in 2004 with a CSIA report outlining the implications of Section 404 for information security.

Attendees at IT Security and Sarbanes-Oxley Compliance: A Roundtable Dialogue of Lessons Learned, addressed whether the statutory and administrative materials governing Section 404 provide enough guidance on IT security to enable management and auditors to carry out their compliance obligations.

"The conference proceedings and subsequent announcements from the Securities and Exchange Commission (SEC) indicate that additional detailed guidance on information technology and security controls under Section 404 is neither desired by corporate management nor likely to be forthcoming from regulators, who have expressed a preference for relying on management's discretion and judgment in establishing IT controls rather than providing specific audit control lists," said Paul Kurtz, executive director of CSIA. "Against this backdrop, many auditors, legal counsel and management plan to rely on generally agreed upon frameworks for IT security, such as COBIT and ISO 17799. Regardless of how management decides to specifically address information security, the one thing that remains clear is that it must be considered an important part of overall compliance."

Sponsored by CSIA, George Mason University School of Law's Critical Infrastructure Protection Program (GMU), The Institute of Internal Auditors (IIA), the Information Systems Audit and Control Association (ISACA) and the Information Systems Security Association (ISSA), the conference brought together experts representing each of the key stakeholder communities involved in Section 404 compliance. Corporate management, audit and accounting, legal counsel and IT security officers and professionals made up four panels that discussed experiences and lessons learned in addressing IT security issues relating to Section 404 and whether or not more official guidance is needed.

The report highlights five lessons learned from the first round of compliance efforts that include:

* Steep learning curve inevitable regardless of adequacy of IT guidelines The heated political climate that led to the passage of Sarbanes-Oxley, combined with the bright spotlight directed at corporate leaders with each new revelation of scandal, mismanagement or fraud, virtually assured that the first round of compliance was going to entail a steep learning curve, regardless of the level of guidance provided. * IT security is not a CEO priority The relationship between IT and compliance under Section 404 has not been well understood by senior management and therefore, not given personal priority attention. This is because Congress has been silent on the issue of IT and CEOs listen and act on what Congress says. Also, the relationship between the concept of "internal controls," an accounting concept, and the role of IT security is not well recognized by corporate leaders. * Deference to auditors by management and legal counsel Section 404 under Sarbanes-Oxley is designed to hold management and auditors separately accountable; however, both management and legal counsel tend to defer to auditors in terms of interpreting and implementing Section 404. * Augmentation of COSO framework required Section 404 states that a company's internal controls must be based on "a suitable, recognized control framework established by a body of experts that followed due-process procedures," and specifies the COSO framework, published by the Treadway Commission's Committee of Sponsoring Organizations, as suitable. However, the COSO framework alone provides insufficient guidance, and some say it is too broad and not sufficiently focused on financial controls. Some auditors and IT professionals refer to the standard set forth in the Control Objectives for Information and related Technology (COBIT), developed by ISACA's IT Governance Institute. * Existing control processes and procedures affect Sarbanes-Oxley compliance activities Companies with already established and implemented internal controls throughout their organization have an easier time meeting Section 404 compliance obligations. Those without solid internal controls are confronted with a more complicated compliance process.

The report concludes that management and legal counsel representatives generally opposed additional IT governance and security guidance from the Public Company Accounting Oversight Board (PCAOB), as it was seen as unnecessary, unhelpful and unwanted. However, representatives from public accounting firms were in favor of additional PCAOB guidance and many panelists were in favor of formal recognition by the PCAOB of COBIT.

Representatives were unanimous in the view that stakeholder communities do not communicate with one another effectively on IT governance and security, as they all speak in terms and language unique to their profession. They also agreed that a common lexicon and framework is needed to ensure all stakeholders share a common understanding of each other's roles and responsibilities in the Section 404 compliance process.

To obtain a copy of today's CSIA report, "IT Security and Sarbanes-Oxley Compliance: Conference Summary of Findings and Conclusions," please visit http://www.csialliance.org/.

About the Cyber Security Industry Alliance

CSIA is the only advocacy group dedicated exclusively to enhancing global cyber security through public policy, education, awareness and technology. The organization is led by CEOs from the world's top security providers, who offer the technical expertise, depth and focus to encourage a better understanding of cyber security issues. It is the belief of the CSIA that a comprehensive approach to ensuring the security, integrity and availability of global information systems is fundamental to national and economic stability. To learn more about the CSIA, please visit our Web site at http://www.csialliance.org/ or call +1-703-894-2742.

Members of the CSIA include BindView Corp. ; Check Point Software Technologies Ltd. ; Citadel Security Software Inc. ; Citrix Systems, Inc. ; Computer Associates International, Inc. ; Entrust, Inc. ; Internet Security Systems Inc. ; iPass Inc. ; Juniper Networks, Inc. ; McAfee, Inc. ; PGP Corporation; Qualys, Inc.; RSA Security Inc. ; Secure Computing Corporation , Surety, Inc.; Symantec Corporation and TechGuard Security, LLC.

Cyber Security Industry Alliance

CONTACT: Stacy Simpson of the Merritt Group, +1-703-390-1528, or
[email protected], for the Cyber Security Industry Alliance

Web site: http://www.csialliance.org/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
"LinearHub provides smart video conferencing, which is the Roundee service, and we archive all the video conferences and we also provide the transcript," stated Sunghyuk Kim, CEO of LinearHub, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Things are changing so quickly in IoT that it would take a wizard to predict which ecosystem will gain the most traction. In order for IoT to reach its potential, smart devices must be able to work together. Today, there are a slew of interoperability standards being promoted by big names to make this happen: HomeKit, Brillo and Alljoyn. In his session at @ThingsExpo, Adam Justice, vice president and general manager of Grid Connect, will review what happens when smart devices don’t work togethe...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Discover top technologies and tools all under one roof at April 24–28, 2017, at the Westin San Diego in San Diego, CA. Explore the Mobile Dev + Test and IoT Dev + Test Expo and enjoy all of these unique opportunities: The latest solutions, technologies, and tools in mobile or IoT software development and testing. Meet one-on-one with representatives from some of today's most innovative organizations
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E...
SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.