English

Information Security Management

Security Management Planning as a Governance and Compliance Instrument

Introduction Security management planning is a critical organizational process that enables the structured creation, implementation, and enforcement of an information security policy. While often treated as a technical or operational concern, security management planning performs a broader governance function by establishing how organizations protect information assets, physical facilities, personnel, and

By Julio Huerta

Information Security Management

The Security Function: Building Measurable, Effective, and Strategic Protection

In today’s interconnected business environment, information security is no longer a peripheral concern—it is a strategic function essential to protecting assets, maintaining trust, and enabling growth. A mature security program aligns with business objectives through strong governance, measurable outcomes, and ongoing improvement (ISACA, 2018). The Role of Security

By Julio Huerta
Safeguarding Consumer Information under the Gramm–Leach–Bliley Act (the Safeguards Rule’s Core Objectives)

Regulatory Compliance

Safeguarding Consumer Information under the Gramm–Leach–Bliley Act (the Safeguards Rule’s Core Objectives)

Introduction The Gramm–Leach–Bliley Act (GLBA) of 1999 introduced a comprehensive legal framework to regulate how financial institutions manage consumer information. A key component, the Federal Trade Commission’s (FTC) Safeguards Rule, sets forth explicit objectives designed to protect the security, confidentiality, and integrity of customer data. Information privacy

By Julio Huerta