Interview with Prof. Sree Sreenivasan of the Columbia Graduate School of Journalism
Social media aren't just coming - they're here. And senior leaders need to understand how to maximize Facebook, LinkedIn, Twitter and other popular sites, as well as how to protect their organizations from very real security...
Shifting from desktop PCs to thin clients can provide a more secure way for clinicians to access electronic health records, says Dee Cantrell, R.N., chief information officer at Emory Healthcare in Atlanta.
In an interview, the CIO of the integrated delivery system, which is affiliated with Emory University and...
Interview with Gartner's Roberta Witty
Organizations have made strides in business continuity/disaster recovery (BC/DR) planning. But BC/DR professionals need to sharpen their business skills to truly protect their organizations.
This is the stance taken by Roberta Witty, research VP at Gartner. In an exclusive...
Interview with H. Peet Rapp of ISACA's Cloud Work Group
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing:...
Getting senior executives involved early and making sure they understand the organization's security vulnerabilities are two vital steps in any risk management initiative, says Mark Ford of Deloitte.
In an interview, Ford offers advice on how to:
Win the support of senior executives as well as boards of directors...
Interview with Tom Smedinghoff of Wildman Harrold
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses:
Interview with Adrian Davis of the Information Security Forum
In terms of payments, privacy and third-party relationships, U.S. security leaders have much to learn from - and share with - their peers in the U.K. and elsewhere in the world.
This is the perspective of Adrian Davis, a senior research consultant...
The final version of regulations to carry out the HITECH Act must include far more details on privacy and security to ensure widespread adoption of electronic health records, says William R. Braithwaite, M.D., Ph.D.
In an interview, Braithwaite, widely known as "Dr. HIPAA" for his work in drafting the HIPAA...
Organized crime has targeted healthcare organizations for insurance fraud scams. What are the risks? What are the solutions?
Dr. Andrea Allmon, senior director with FICO, discusses:
Insurance fraud trends;
How organizations are most vulnerable;
What to do now to reduce fraud today.
Allmon is responsible for...
Interview with Dawn Cappelli of Carnegie Mellon University's Software Engineering Institute
Insider crimes are among the biggest threats to public and private sector organizations. And yet too many groups continue to struggle to prevent or even detect these crimes.
In an exclusive interview, Dawn Cappelli of...
Widespread implementation of encryption is a top priority at Stanford Hospital and Clinics, thanks, in large part, to the "safe harbor" in the HITECH breach notification rule, says Michael Mucha, information security officer.
He notes that organizations that use the proper form of encryption don't have to report...
A risk analysis should not be an annual event, but rather an ongoing process that's revisited whenever a healthcare organization adds or changes any application. That's the advice of Kenneth Bradberry, vice president and chief technology officer at ACS, a consulting firm recently acquired by Xerox.
In an interview...
C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Axelrod is currently executive advisor for the Financial...
UAB Health System in Birmingham, Ala., is tackling a long list of information security projects, including updating intrusion detection and prevention systems.
In an interview, Terrell Herzig, HIPAA security officer, outlines priority projects, including:
Expanding the use of encryption;
What are the key banking/security topics on the minds of leaders of the nation's largest banks?
At the RSA Conference 2010, Paul Smocer of BITS and the Financial Services Roundtable discusses:
The Roundtable's information security priorities;
How regulatory reform may impact security organizations;