Welcome!

Web 2.0 Authors: Carmen Gonzalez, Liz McMillan, Elizabeth White, Jim Kaskade, Trevor Parsons

Related Topics: Security

News Feed Item

Cyber Security Industry Alliance Issues Findings from Summit on Sarbanes-Oxley and IT Security

Most Stakeholders Not Looking for More Official Guidance on IT Security

ARLINGTON, Va., Aug. 15 /PRNewswire/ -- Cyber Security Industry Alliance (CSIA), the only public policy and advocacy group dedicated exclusively to cyber security, today released a report that summarizes key findings and conclusions from a conference held to discuss the adequacy of guidance given on IT security in Sarbanes-Oxley. Today's announcement follows a Sarbanes- Oxley compliance initiative that began in 2004 with a CSIA report outlining the implications of Section 404 for information security.

Attendees at IT Security and Sarbanes-Oxley Compliance: A Roundtable Dialogue of Lessons Learned, addressed whether the statutory and administrative materials governing Section 404 provide enough guidance on IT security to enable management and auditors to carry out their compliance obligations.

"The conference proceedings and subsequent announcements from the Securities and Exchange Commission (SEC) indicate that additional detailed guidance on information technology and security controls under Section 404 is neither desired by corporate management nor likely to be forthcoming from regulators, who have expressed a preference for relying on management's discretion and judgment in establishing IT controls rather than providing specific audit control lists," said Paul Kurtz, executive director of CSIA. "Against this backdrop, many auditors, legal counsel and management plan to rely on generally agreed upon frameworks for IT security, such as COBIT and ISO 17799. Regardless of how management decides to specifically address information security, the one thing that remains clear is that it must be considered an important part of overall compliance."

Sponsored by CSIA, George Mason University School of Law's Critical Infrastructure Protection Program (GMU), The Institute of Internal Auditors (IIA), the Information Systems Audit and Control Association (ISACA) and the Information Systems Security Association (ISSA), the conference brought together experts representing each of the key stakeholder communities involved in Section 404 compliance. Corporate management, audit and accounting, legal counsel and IT security officers and professionals made up four panels that discussed experiences and lessons learned in addressing IT security issues relating to Section 404 and whether or not more official guidance is needed.

The report highlights five lessons learned from the first round of compliance efforts that include:

* Steep learning curve inevitable regardless of adequacy of IT guidelines The heated political climate that led to the passage of Sarbanes-Oxley, combined with the bright spotlight directed at corporate leaders with each new revelation of scandal, mismanagement or fraud, virtually assured that the first round of compliance was going to entail a steep learning curve, regardless of the level of guidance provided. * IT security is not a CEO priority The relationship between IT and compliance under Section 404 has not been well understood by senior management and therefore, not given personal priority attention. This is because Congress has been silent on the issue of IT and CEOs listen and act on what Congress says. Also, the relationship between the concept of "internal controls," an accounting concept, and the role of IT security is not well recognized by corporate leaders. * Deference to auditors by management and legal counsel Section 404 under Sarbanes-Oxley is designed to hold management and auditors separately accountable; however, both management and legal counsel tend to defer to auditors in terms of interpreting and implementing Section 404. * Augmentation of COSO framework required Section 404 states that a company's internal controls must be based on "a suitable, recognized control framework established by a body of experts that followed due-process procedures," and specifies the COSO framework, published by the Treadway Commission's Committee of Sponsoring Organizations, as suitable. However, the COSO framework alone provides insufficient guidance, and some say it is too broad and not sufficiently focused on financial controls. Some auditors and IT professionals refer to the standard set forth in the Control Objectives for Information and related Technology (COBIT), developed by ISACA's IT Governance Institute. * Existing control processes and procedures affect Sarbanes-Oxley compliance activities Companies with already established and implemented internal controls throughout their organization have an easier time meeting Section 404 compliance obligations. Those without solid internal controls are confronted with a more complicated compliance process.

The report concludes that management and legal counsel representatives generally opposed additional IT governance and security guidance from the Public Company Accounting Oversight Board (PCAOB), as it was seen as unnecessary, unhelpful and unwanted. However, representatives from public accounting firms were in favor of additional PCAOB guidance and many panelists were in favor of formal recognition by the PCAOB of COBIT.

Representatives were unanimous in the view that stakeholder communities do not communicate with one another effectively on IT governance and security, as they all speak in terms and language unique to their profession. They also agreed that a common lexicon and framework is needed to ensure all stakeholders share a common understanding of each other's roles and responsibilities in the Section 404 compliance process.

To obtain a copy of today's CSIA report, "IT Security and Sarbanes-Oxley Compliance: Conference Summary of Findings and Conclusions," please visit http://www.csialliance.org/.

About the Cyber Security Industry Alliance

CSIA is the only advocacy group dedicated exclusively to enhancing global cyber security through public policy, education, awareness and technology. The organization is led by CEOs from the world's top security providers, who offer the technical expertise, depth and focus to encourage a better understanding of cyber security issues. It is the belief of the CSIA that a comprehensive approach to ensuring the security, integrity and availability of global information systems is fundamental to national and economic stability. To learn more about the CSIA, please visit our Web site at http://www.csialliance.org/ or call +1-703-894-2742.

Members of the CSIA include BindView Corp. ; Check Point Software Technologies Ltd. ; Citadel Security Software Inc. ; Citrix Systems, Inc. ; Computer Associates International, Inc. ; Entrust, Inc. ; Internet Security Systems Inc. ; iPass Inc. ; Juniper Networks, Inc. ; McAfee, Inc. ; PGP Corporation; Qualys, Inc.; RSA Security Inc. ; Secure Computing Corporation , Surety, Inc.; Symantec Corporation and TechGuard Security, LLC.

Cyber Security Industry Alliance

CONTACT: Stacy Simpson of the Merritt Group, +1-703-390-1528, or
[email protected], for the Cyber Security Industry Alliance

Web site: http://www.csialliance.org/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
The Internet of Things (IoT) is going to require a new way of thinking and of developing software for speed, security and innovation. This requires IT leaders to balance business as usual while anticipating for the next market and technology trends. Cloud provides the right IT asset portfolio to help today’s IT leaders manage the old and prepare for the new. Today the cloud conversation is evolving from private and public to hybrid. This session will provide use cases and insights to reinforce the value of the network in helping organizations to maximize their company’s cloud experience.
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize supplier management. Learn about enterprise architecture strategies for designing connected systems tha...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
IoT is still a vague buzzword for many people. In his session at Internet of @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, will discuss the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. The presentation will also discuss how IoT is perceived by investors and how venture capitalist access this space. Other topics to discuss are barriers to success, what is new, what is old, and what the future may hold.
Whether you're a startup or a 100 year old enterprise, the Internet of Things offers a variety of new capabilities for your business. IoT style solutions can help you get closer your customers, launch new product lines and take over an industry. Some companies are dipping their toes in, but many have already taken the plunge, all while dramatic new capabilities continue to emerge. In his session at Internet of @ThingsExpo, Reid Carlberg, Senior Director, Developer Evangelism at salesforce.com, to discuss real-world use cases, patterns and opportunities you can harness today.
All major researchers estimate there will be tens of billions devices – computers, smartphones, tablets, and sensors – connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be!
Noted IoT expert and researcher Joseph di Paolantonio (pictured below) has joined the @ThingsExpo faculty. Joseph, who describes himself as an “Independent Thinker” from DataArchon, will speak on the topic of “Smart Grids & Managing Big Utilities.” Over his career, Joseph di Paolantonio has worked in the energy, renewables, aerospace, telecommunications, and information technology industries. His expertise is in data analysis, system engineering, Bayesian statistics, data warehouses, business intelligence, data mining, predictive methods, and very large databases (VLDB). Prior to DataArcho...
Software AG helps organizations transform into Digital Enterprises, so they can differentiate from competitors and better engage customers, partners and employees. Using the Software AG Suite, companies can close the gap between business and IT to create digital systems of differentiation that drive front-line agility. We offer four on-ramps to the Digital Enterprise: alignment through collaborative process analysis; transformation through portfolio management; agility through process automation and integration; and visibility through intelligent business operations and big data.
There will be 50 billion Internet connected devices by 2020. Today, every manufacturer has a propriety protocol and an app. How do we securely integrate these "things" into our lives and businesses in a way that we can easily control and manage? Even better, how do we integrate these "things" so that they control and manage each other so our lives become more convenient or our businesses become more profitable and/or safe? We have heard that the best interface is no interface. In his session at Internet of @ThingsExpo, Chris Matthieu, Co-Founder & CTO at Octoblu, Inc., will discuss how thes...
Last week, while in San Francisco, I used the Uber app and service four times. All four experiences were great, although one of the drivers stopped for 30 seconds and then left as I was walking up to the car. He must have realized I was a blogger. None the less, the next car was just a minute away and I suffered no pain. In this article, my colleague, Ved Sen, Global Head, Advisory Services Social, Mobile and Sensors at Cognizant shares his experiences and insights.
We are reaching the end of the beginning with WebRTC and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) ir...
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of WebRTC adoption today, but the potential is limitless when powered by IoT. Attendees will learn rea...
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at Internet of @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, will share some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder ...
The Internet of Things (IoT) promises to create new business models as significant as those that were inspired by the Internet and the smartphone 20 and 10 years ago. What business, social and practical implications will this phenomenon bring? That's the subject of "Monetizing the Internet of Things: Perspectives from the Front Lines," an e-book released today and available free of charge from Aria Systems, the leading innovator in recurring revenue management.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges.
There’s Big Data, then there’s really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at 6th Big Data Expo®, Hannah Smalltree, Director at Treasure Data, to discuss how IoT, Big Data and deployments are processing massive data volumes from wearables, utilities and other mach...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at Internet of @ThingsExpo, Erik Lagerway, Co-founder of Hookflash, will walk through the shifting landscape of traditional telephone and voice s...
While great strides have been made relative to the video aspects of remote collaboration, audio technology has basically stagnated. Typically all audio is mixed to a single monaural stream and emanates from a single point, such as a speakerphone or a speaker associated with a video monitor. This leads to confusion and lack of understanding among participants especially regarding who is actually speaking. Spatial teleconferencing introduces the concept of acoustic spatial separation between conference participants in three dimensional space. This has been shown to significantly improve comprehe...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, will discuss single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example...
SYS-CON Events announced today that Gridstore™, the leader in software-defined storage (SDS) purpose-built for Windows Servers and Hyper-V, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Gridstore™ is the leader in software-defined storage purpose built for virtualization that is designed to accelerate applications in virtualized environments. Using its patented Server-Side Virtual Controller™ Technology (SVCT) to eliminate the I/O blender effect and accelerate applications Gridsto...