Jim Reavis on cloud computing security and regulatory compliance

Jim Reavis on cloud computing security and regulatory compliance

Jim Reavis on cloud computing security and regulatory compliance

Date: Feb 10, 2010
Jim Reavis of the Cloud Security Alliance talks about ways to secure the cloud, including some advice for compliance officers. Reavis spoke to SearchCompliance.com's Alexander B. Howard at the Open Group's conference in Seattle, Washington.

More on Managing governance and compliance

  • canderson

    Key enterprise mobile management software and technologies

    VIDEO - In the final part of this webcast series, enterprise mobility consultant Bryan Barringer lays out the most important mobility management software and techniques.
  • canderson

    Don't let BYOD legal issues sink your BYOD initiative

    VIDEO - Companies best be aware of the legal issues that accompany their BYOD initiatives, mobility consultant Bryan Barringer explains in part one of this webcast series.
  • canderson

    BYOD best practices call for mobility governance team

    VIDEO - In part two of this webcast series, enterprise mobility expert Bryan Barringer discusses BYOD best practices to confront the challenges that accompany mobility.
  • compliance

    Definition - Compliance is the act of being in alignment with guidelines, regulations and/or legislation. Organizations must ensure that they are in compliance with software licensing terms set by vendors, for example, as well as regulatory mandates.
  • Will new net neutrality regulations spur investment and innovation?

    News - The FCC gave new net neutrality regulations the go-ahead, but the battle for an open Internet is hardly over. In this #GRCChat recap, find out whether the new regulations mean good news for innovation and consumer privacy.

    ( Mar 17, 2015 )

  • Emerging cyberthreats exploit battle between compliance and security

    News - While regulatory compliance is valuable and necessary for enterprises, cyberthreat experts say a compliance-centric security strategy may leave organizations with few resources to ward off emerging cyberthreats.

    ( Mar 05, 2015 )

  • COBIT 5 (Control Objectives for Information and Related Technology 5)

    Definition - COBIT 5 is the fifth iteration of a popular framework that's used for managing and governing information technology (IT).
  • audit program

    Definition - An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate that an organization is in conformance with compliance regulations. 

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: