This white paper describes the three major areas of value delivered by FICO Insurance Fraud Manager: prepayment savings from avoiding unnecessary and excessive payments, systemic savings from identifying and correcting policy weaknesses, and postpayment savings from identification of suspicious providers.
FICO...
Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
Information Security as a profession is amidst an evolution.
From a traditional, technology-oriented role safeguarding critical information assets, the career is progressing toward integration with the strategic thinking of organizations. Led by President Obama, the U.S. has embraced cybersecurity as a national...
What's ahead for information security professionals in 2010?
Barbara Massa, VP of Global Talent Acquisition at McAfee, Inc. speaks to the results of the new Information Security Today Career Trends Survey, discussing:
How the results speak to the maturity of the information security profession;
The survey's...
Interview with Wade Baker and Alex Hutton of Verizon Business
Earlier this year, Verizon Business unveiled its much-heralded 2009 Data Breach Investigations Report.
Now, the company has just released its 2009 Supplemental Data Breach Report, which reveals the 15 most common attacks against organizations.
In...
VirtualBank, Money Magazine's "Best Online Bank", recently implemented out-of-band authentication to protect its customers from the myriad attacks targeting online banking today. By enabling phone-based authentication, VirtualBank can offer their customers both unparalleled protection and a superior user experience.
...
Government agencies at all levels (federal, state and local) face unprecedented IT security threats from an increasingly organized and well-funded community of cybercriminals. Add stringent regulatory requirements to this and government agencies are faced with a daunting task of managing risk and adhering to...
Which will be the most coveted information security jobs in 2010?
How will professionals grow their skills?
What are the minimum academic and professional requirements for information security professionals and leaders today?
These are among the key questions posed by the first annual Information Security...
Cisco Security Intelligence Operations announces the Cisco 2009 Annual Security Report. The updated report includes information about 2009 global threats and trends, as well as security recommendations for 2010.
Managing and securing today's distributed and agile network is increasingly challenging, with cloud...
No question, the information security professional's role has evolved in recent years. How, then, has the need for ongoing professional education also changed? And what role must risk management play in today's security organization?
In an exclusive interview, Mark Lobel of PricewaterhouseCoopers and ISACA,...
Northrop Grumman Corporation has invited three of the nation's leading research institutions to join a Cybersecurity Research Consortium to advance research in this field.
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...
Cybersecurity, forensics, risk management -- what will be the core security skills needed in organizations in 2010?
In an exclusive interview, Kent Anderson, founder and managing director of Encurve LLC, as well as a member of ISACA's Security Management Committee, discusses:
The core security skills now needed...
2009 was a tough year in many ways -- economic recession, massive layoffs, high unemployment rate, scores of bank failures.
But there is good news for information security professionals looking for jobs within the public and private sectors in 2010. There are jobs aplenty, thought leaders say, for information...
In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Audit trends;
Where organizations are most vulnerable;
How audit...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.