Data Sheets
We have written several articles, research papers, and data sheets over the years about Information Technology Governance, Information Security, IT Compliance, and the Information Security Industry. Meanwhile, we’ve collected a lot of links to our favorite articles. In addition, our certifications bring us to do a lot of reading and “keeping up” with technology. Below are links to various documents you might be interested in. For other various articles you might want to check out our blog.
Articles, White Papers and Data Sheets
Customer Awareness
Event Log Management
Favorites from Dan’s New Leaf!
- It’s About Time
- Sometimes Say Never: An Aging Manifesto!
- The Magnificent Seven: Seven 2012 Trends in Bank Technology that will Affect 2013
Forensic Investigation
Incident Response
Risk Management
Network Monitoring
Regulations / Standards / Guidelines
- Code of Ethics (ISACA)
- GLBA – Subchapter I (FTC)
- GLBA – Subchapter II (FTC)
- HIPAA: Security Standards
- IS Standards, Guidelines and Procedures (ISACA)
Security Standards
- Excellent ISACA Articles:
- Cloudy Daze (ISACA Journal)
- Risk Landscape of Cloud Computing (ISACA Journal)
Social Engineering
Social Media
- Regulatory Notice 10-06
- Social Media: Business Benefits and Security, Governance and Assurance Perspectives (ISACA)
- Social Media Development Standards
- Social Media Audit Checklist
- Social Media Policy Kit
User Awareness Articles
- Archive of User Awareness Articles
- Vigilize
- Auto-Reply Basics
- Awareness Training
- It’s About Time
- Password Controls
- The Lowest Hanging Fruit
- The One Control
User Awareness Posters
- Awareness Posters
- Example Posters:
- Are you the weakest link? (Use Strong Passwords)
- Information Security takes team work. (Work Together to Keep Information Secure)
- Passwords are like old barns… (“Build” Strong Passwords)
- We are our customers’ security blanket. (Properly Authenticate Before Giving Out Information)
- What’s in your trash can? (Remember to Shred Nonpublic Information)
- When the mice are away… (Remember to Lock Your Computer)
- Sometimes we should just pick up the phone.
Vendor Management
- Vendor Management Article Archive
- 3-2-1 Action!
- Breeding Ground for Risk (and Vendor Due Diligence)
Web Application Security Review
- Web Application Security Review Data Sheet
- OWASP Application Security Verification Standard
- OWASP Top 10 – 2010
Engagement Documents
- New Client Information Request (Audit Services)
- New Client Information Request (MSSP Services)
Contact us for assistance with your information security and information technology risk management needs!