Compliance efforts as they relate to security are often thought to end once Segregation of Duties has been achieved. In reality, that is just the beginning. Achieving compliance in system security includes managing access to confidential or critical information, ensuring only appropriate access is in place for all users, confirming that changes are authorized and so much more. Join us as we take a look at some of the next steps to take as well as options for how to get your arms around the supporting information needed for SOX, JSOX and GDPR Compliance.
Compare these compliance rulings
Discuss the types of information that should be monitored
Review best practices on when and how to monitor