Global Compliance , Governance & Risk Management , Insider Threat

A Holistic Approach to Developing a Combined Security and Compliance Program

Proofpoint's Michael McGrath and Brian Reed on How to Plan, Prioritize and Build the Program

Cybersecurity compliance is not the same as security. Recognizing this fact can lead many organizations to prioritize one over the other, thereby increasing critical risks. But by taking a planned approach to integrating the two, you can achieve a holistic solution that delivers both.

In this video interview with Information Security Media Group, Proofpoint's Michael McGrath, EMEA compliance and risk management, and Brian Reed, senior director, cybersecurity strategy, discuss:

  • The key milestones necessary to plan, prioritize and build a combined program with the organizational agility required to balance compliance and security concerns;
  • How to handle introducing new technologies;
  • How to deal with new regulatory developments.

To learn more, visit the Proofpoint Compliance Hub.

McGrath works with senior leaders and organizations who are implementing transformational change and experiencing difficulties to help them identify the root causes of the challenges and then unlock them.

Reed is a research director responsible for data loss prevention, data security, cloud security, employee monitoring, insider threat, endpoint and mobile security.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.