In a paper of four pages, the writer looks at how IT security has evolved. The implications of Sarbanes-Oxley on that evolution is explored. Paper uses five sources.