SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
1/29/2014

Walking the tightrope: The compliance and security balancing act

SearchCompliance.com
Walking the tightrope: The compliance and security balancing act
Nothing illustrates the difference between compliance and security better than the recent holiday retail fiascos,
when millions of credit card numbers were stolen from large retailers, including Target, that were assumed to be
compliant with industry standards and regulations.
The things [regulators] are requiring organizations to do are things they should be doing as good
security practice anyway.
Mike Chapple, senior director for IT service delivery, University of Notre Dame
After the stories broke regarding the breached retailers, it became clear that compliance gaps are almost
guaranteed to lead to security problems. According to experts, compliance and security aren't mutually exclusive,
and both need to be attended to regularly.
One of the mistakes that organizations tend to make is applying a set of compliance standards and assuming that
will be enough to also remain secure, said Hans Guilbeaux, director of information security and compliance at
Farmington Hills, Mich.-based consultancy Assure360.
"Unfortunately, a lot of companies think compliance is one-size-fits-all or that, conversely, they can go to a thirdparty vendor and buy compliance in a box," Guilbeaux said. "What I frequently hear … is that compliance is one
checkmark away from being hacked."
It's important to remember that malfeasants know what they're doing and where the vulnerabilities are.
Regulators aren't necessarily security experts, either -- even those examiners who visit organizations to ensure
compliance, according to Matt Wilhelm, CEO of Cleveland, Ohio-based IT consultancy EnCompass Group
LLC.
"Oftentimes, they're not IT folks at all," he said, and these examiners are often just looking at the checklist: patch
management, regular firewall logs and other items on the compliance list that don't necessarily equal security.
"They themselves can't keep the hackers out," Wilhelm added.
But compliance -- full compliance -- remains critical, and not just to protect customer information. "In our
business, we're constantly saying, 'How do you put a dollar value on that?' … One data breach could destroy
brand value and brand equity," he said.
For example, even though Target offered a 10%across-the-board discount after its recent data breach, it still had
a less-lucrative holiday season because people stayed away, Wilhelm added.

Embrace common security, compliance goals
When you boil it down, security and compliance end up being two sides of the same coin, according to Mike
Chapple, senior director for IT service delivery at the University of Notre Dame in Indiana. "Compliance is going
to be what you need to satisfy obligations to external parties [like] regulators," he said. Security, on the other
http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print

1/3
1/29/2014

Walking the tightrope: The compliance and security balancing act

hand, is making sure that the application controls are in place and that the organization is taking sufficient steps to
protect information, he added.
Using compliance as a starting point isn't a bad thing, according to Chapple. "When you're looking at the
different regulations out there, for the most part, the things [regulators] are requiring organizations to do are things
they should be doing as good security practice anyway," he said.
The first step for organizations that want to strike a balance between compliance and security is to conduct a risk
assessment, Chapple said. While these are typically required on an annual basis for compliance purposes, it's
important for organizations to approach risk assessments as more than an exercise and as an essential, thorough
piece of security to determine vulnerabilities, he said.
"It's important to have compliance plans, and that goes back to not creating a program that just studies for the
test every year … but instead having a documented plan that looks at what are each of the requirements facing
the organization and what is our response? How are we implementing those?" Chapple said.
More on security and compliance
Tips to align company-wide compliance and security processes
The compliance benefits of continuous data monitoring
For example, compliance with Payment Card Industry standards requires submission of quarterly vulnerability
scans to the organization's bank. Those scans would go into the compliance plan and be assigned to a team
member, who would then submit the results and save the records of the scans in a designated place.
"Then, whenever you want to review your compliance status, you should be able to look at those plans and see
that there is a control in place to meet each one of the requirements of a particular regulation and that somebody
has validated compliance with it recently," Chapple said.
Finally, communication between IT and legal is critical to making security and compliance work, according to
Chapple. Many organizations do this by forming compliance bodies within the organization, such as committees
made up of representatives from different departments. These committees may either cover just IT or all of the
organization's compliance obligations. Often, those committees consider broader risk categories for the
organization as well, he said.
Ultimately, organizations should choose to use compliance guidelines as the foundation for a security program.
The business can then communicate these guidelines across the organization to ensure all departments have the
opportunity to raise concerns. The organizations that take this approach to balancing compliance and security are
better poised to stay on the right side of regulators and avoid breaches.
About the author:
Christine Parizo is a freelance writer specializing in business and technology. She focuses on feature
articles for a variety of technology- and business-focused publications, as well as case studies and white
papers for business-to-business technology companies. Prior to launching her freelance career, Parizo
was an assistant news editor for SearchCRM.
http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print

2/3
1/29/2014

Walking the tightrope: The compliance and security balancing act

Let us know what you think about the story; email Ben Cole, site editor. For more regulatory compliance
news and updates throughout the week, follow us on Twitter @ITCompliance.
28 Jan 2014
All Rights Reserved, Copyright 2009 - 2014 , TechTarget | Read our Privacy Statement

http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print

3/3

Weitere ähnliche Inhalte

Mehr von assure360

NDeX Data Centers: A Vault in the Cloud
NDeX Data Centers: A Vault in the CloudNDeX Data Centers: A Vault in the Cloud
NDeX Data Centers: A Vault in the Cloudassure360
 
Legal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
Legal League 100 Servicer Summit, Dallas TX on April 18th: AgendaLegal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
Legal League 100 Servicer Summit, Dallas TX on April 18th: Agendaassure360
 
By Scott Goldstein: The AG Settlement Settles In
By Scott Goldstein: The AG Settlement Settles InBy Scott Goldstein: The AG Settlement Settles In
By Scott Goldstein: The AG Settlement Settles Inassure360
 
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New RegulationsBy Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulationsassure360
 
In the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOIn the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOassure360
 
In the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOIn the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOassure360
 
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New TerritoryBy Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territoryassure360
 

Mehr von assure360 (7)

NDeX Data Centers: A Vault in the Cloud
NDeX Data Centers: A Vault in the CloudNDeX Data Centers: A Vault in the Cloud
NDeX Data Centers: A Vault in the Cloud
 
Legal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
Legal League 100 Servicer Summit, Dallas TX on April 18th: AgendaLegal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
Legal League 100 Servicer Summit, Dallas TX on April 18th: Agenda
 
By Scott Goldstein: The AG Settlement Settles In
By Scott Goldstein: The AG Settlement Settles InBy Scott Goldstein: The AG Settlement Settles In
By Scott Goldstein: The AG Settlement Settles In
 
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New RegulationsBy Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
By Ron Redmer: Out with the Old (Binders), Adapting to New Regulations
 
In the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOIn the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIO
 
In the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIOIn the News! Ronald Redmer new CIO
In the News! Ronald Redmer new CIO
 
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New TerritoryBy Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
By Scott Goldstein: Legal League Quarterly Fall 2011 - Exploring New Territory
 

Kürzlich hochgeladen

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Quotes & Commentary from Hans Guilbeaux, Director of InfoSec & Compliance | Walking the tightrope: The compliance and security balancing act

  • 1. 1/29/2014 Walking the tightrope: The compliance and security balancing act SearchCompliance.com Walking the tightrope: The compliance and security balancing act Nothing illustrates the difference between compliance and security better than the recent holiday retail fiascos, when millions of credit card numbers were stolen from large retailers, including Target, that were assumed to be compliant with industry standards and regulations. The things [regulators] are requiring organizations to do are things they should be doing as good security practice anyway. Mike Chapple, senior director for IT service delivery, University of Notre Dame After the stories broke regarding the breached retailers, it became clear that compliance gaps are almost guaranteed to lead to security problems. According to experts, compliance and security aren't mutually exclusive, and both need to be attended to regularly. One of the mistakes that organizations tend to make is applying a set of compliance standards and assuming that will be enough to also remain secure, said Hans Guilbeaux, director of information security and compliance at Farmington Hills, Mich.-based consultancy Assure360. "Unfortunately, a lot of companies think compliance is one-size-fits-all or that, conversely, they can go to a thirdparty vendor and buy compliance in a box," Guilbeaux said. "What I frequently hear … is that compliance is one checkmark away from being hacked." It's important to remember that malfeasants know what they're doing and where the vulnerabilities are. Regulators aren't necessarily security experts, either -- even those examiners who visit organizations to ensure compliance, according to Matt Wilhelm, CEO of Cleveland, Ohio-based IT consultancy EnCompass Group LLC. "Oftentimes, they're not IT folks at all," he said, and these examiners are often just looking at the checklist: patch management, regular firewall logs and other items on the compliance list that don't necessarily equal security. "They themselves can't keep the hackers out," Wilhelm added. But compliance -- full compliance -- remains critical, and not just to protect customer information. "In our business, we're constantly saying, 'How do you put a dollar value on that?' … One data breach could destroy brand value and brand equity," he said. For example, even though Target offered a 10%across-the-board discount after its recent data breach, it still had a less-lucrative holiday season because people stayed away, Wilhelm added. Embrace common security, compliance goals When you boil it down, security and compliance end up being two sides of the same coin, according to Mike Chapple, senior director for IT service delivery at the University of Notre Dame in Indiana. "Compliance is going to be what you need to satisfy obligations to external parties [like] regulators," he said. Security, on the other http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print 1/3
  • 2. 1/29/2014 Walking the tightrope: The compliance and security balancing act hand, is making sure that the application controls are in place and that the organization is taking sufficient steps to protect information, he added. Using compliance as a starting point isn't a bad thing, according to Chapple. "When you're looking at the different regulations out there, for the most part, the things [regulators] are requiring organizations to do are things they should be doing as good security practice anyway," he said. The first step for organizations that want to strike a balance between compliance and security is to conduct a risk assessment, Chapple said. While these are typically required on an annual basis for compliance purposes, it's important for organizations to approach risk assessments as more than an exercise and as an essential, thorough piece of security to determine vulnerabilities, he said. "It's important to have compliance plans, and that goes back to not creating a program that just studies for the test every year … but instead having a documented plan that looks at what are each of the requirements facing the organization and what is our response? How are we implementing those?" Chapple said. More on security and compliance Tips to align company-wide compliance and security processes The compliance benefits of continuous data monitoring For example, compliance with Payment Card Industry standards requires submission of quarterly vulnerability scans to the organization's bank. Those scans would go into the compliance plan and be assigned to a team member, who would then submit the results and save the records of the scans in a designated place. "Then, whenever you want to review your compliance status, you should be able to look at those plans and see that there is a control in place to meet each one of the requirements of a particular regulation and that somebody has validated compliance with it recently," Chapple said. Finally, communication between IT and legal is critical to making security and compliance work, according to Chapple. Many organizations do this by forming compliance bodies within the organization, such as committees made up of representatives from different departments. These committees may either cover just IT or all of the organization's compliance obligations. Often, those committees consider broader risk categories for the organization as well, he said. Ultimately, organizations should choose to use compliance guidelines as the foundation for a security program. The business can then communicate these guidelines across the organization to ensure all departments have the opportunity to raise concerns. The organizations that take this approach to balancing compliance and security are better poised to stay on the right side of regulators and avoid breaches. About the author: Christine Parizo is a freelance writer specializing in business and technology. She focuses on feature articles for a variety of technology- and business-focused publications, as well as case studies and white papers for business-to-business technology companies. Prior to launching her freelance career, Parizo was an assistant news editor for SearchCRM. http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print 2/3
  • 3. 1/29/2014 Walking the tightrope: The compliance and security balancing act Let us know what you think about the story; email Ben Cole, site editor. For more regulatory compliance news and updates throughout the week, follow us on Twitter @ITCompliance. 28 Jan 2014 All Rights Reserved, Copyright 2009 - 2014 , TechTarget | Read our Privacy Statement http://searchcompliance.techtarget.com/tip/Walking-the-tightrope-The-compliance-and-security-balancing-act?vgnextfmt=print 3/3