A key component of any breach response preparation effort is to make certain that all staff members are trained in who to contact within the organization about a security incident "even if they are not sure whether it's a breach," says Dawn Morgenstern, privacy official at the Walgreens national drugstore chain.
These new sites now make Information Security Media Group the largest global network of information security-focused media sites, reaching the most diverse audience of decision-makers in each of ISMG's key markets.
Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.
"We will provide critical infrastructure owners and operators the timely access to actionable cybersecurity information necessary to protect their own networks and facilities," says one of bill's chief sponsors, Rep. Dan Lungren.
A federal appeals court has ruled in favor of victims of the 2007 Hannaford data breach. Attorney Ronald Raether explains the ruling and what it potentially means to future breached entities and their customers.
As legal issues surrounding data breaches become increasingly complex, more organizations are turning to attorneys for post-breach response, says Lisa Sotto, a managing partner for New York-based law firm Hunton & Williams.
The delay in the release of final versions of HIPAA modifications and the HIPAA breach notification rule makes it difficult for healthcare organizations to set information security investment priorities, says hospital privacy officer Kari Myrold.
The plan identifies opportunities to engage the private sector in activities for transitioning promising R&D into practice. It prioritizes the development of a "science of security" to derive first principles and the fundamental building blocks of security and trustworthiness.