Out of the LoopBy Larry Dignan | Posted 2004-05-28 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
You may have to vouch for your information security in the not-too-distant future as regulators get restless over cyber-attacks.?"> OUT OF THE LOOP?
If executives don't get involved soon, they could find themselves adhering to standards set by Beltway regulators who operated without input from the technology executives and project managers who are responsible for and implement information security procedures, according to Herrod.
"What's scary about this is the people driving don't have business user input," she says. "I don't think it's thoroughly thought outnot that Putnam isn't right."
The lack of user input is not terribly surprising given the reaction from technology executives contacted by [itals]Baseline. Most executives had never heard of Putnam or his subsequent working group. However, executives don't doubt that cybersecurity regulation is on the way.
David Womeldorf, chief technology officer of beverage equipment parts distributor Bevcore Solutions in Osseo, Minn., says he is comfortable with having security practices verified by a third party. Womeldorf doesn't want to disclose his security setup, but would be comfortable with an independent agent offering the public a "fairness statement,'' as in the accounting world, affirming that proper practices are in place.
While it's still early, security experts like John, now a principal at Blackwell Consulting, are convinced companies are going to face more information security regulation from legislators like Putnam: "This is a train going someplace, and it's understandable that someone wants to lead it."