Compliance

Image

Title-TBD

Abstract-TBD

Abstract-TBD

Abstract-TBD

Image

Title-TBD

Abstract-TBD

Abstract-TBD

Abstract-TBD


Academic Oriented

Image

Title-TBD

Abstract-TBD

Abstract-TBD

Abstract-TBD

TJX Case Analysis

This paper is an evaluation of the TJX Companies, Inc. breach as publicly notified on February 21, 2007. The evaluation will include an analysis of the failure points in leadership, management, and user adoption. The analysis will encompass issues related to managing, governing, and funding cybersecurity, including policy development and access control. Part of the breach was a breakdown in processes, including compliance and audit practices, as well as failures in the deployment of technology.

Keywords: information security, hacking, breach, poor governance, mismanagement of technology, audit practices, compliance practices, user community, cybersecurity budgeting

Note: This is not a peer-reviewed research paper. Do not use as a primary or secondary source within a thesis, dissertation, or research paper. If a reasonable perspective for research is found and a viable research perspective is being considered, please reach out to the author: jjfisher@jamesjfisher.org.Updated: July 3, 2025




As a working cybersecurity professional, every attempt is made to separate professional and personal endeavors in a manner consistent with reducing conflicts of interest and maintaining ethics. Statements contained within this site are the explicit and implicit goals, objectives, endorsements, and educated opinion of the author of this site and not those of current or former employers.


Image
© 2025 James J. Fisher, All Rights Reserved. Contact Me


This site only uses session cookies for maintaining the state of each page. Users are not tracked, and information is not stored, processed, or analyzed for any other purpose. However, third parties linked to this site may use tracking cookies and techniques outside of the realm of control for this site.