Pillar Three: Security Compliance and Governance [Six Pillars of Security]

Published: April 18, 2017, 8:13 p.m.

In this episode about security compliance and governance, Cherie and Matt discuss:

  • How easy it is to be compliant without being secure.
  • Why a comprehensive strategy is the only way to achieve successful security program governance.
  • The paradox of measurement and how to avoid chasing red herrings so you can focus on critical data.
  • The importance of continuous education.

It’s time to stop relying on compliance checklists and work toward establishing repeatable, measurable security programs that focus on what’s mission-critical to the business.

Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, senior principal consultant, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape.

Listen to the podcast series to explore all six pillars of security.

The Six Pillars of Security: Pillar Two, Threat & Vulnerability Management – Knowing how cyber criminals think can give you a brand new perspective on your threat and vulnerability management.

How to Start an IT Security Conversation in the Boardroom an IT Security Conversation in the Boardroom – Making security a board-level priority is critical in the effort to safeguard data, contain breaches and minimize damage in an atmosphere of escalating cyber attacks.

Forsythe Technology - For more than 40 years, Forsythe has helped companies succeed by working to optimize, modernize, and innovate enterprise IT. We develop solutions that make practical business sense from idea to implementation. We help champion innovation and deliver bottom-line results. We serve as the bridge, moving you from traditional to new IT. Whatever your business needs, we make it happen.