What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the IAPP;...
It's time for information security professionals to give back to their communities - to reach out and educate businesses, schools and citizens about cybersecurity and other relevant issues.
This is the message from John Rossi, professor of systems management/information assurance at National Defense...
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
When Anne Marie Staley first became a business continuity/disaster recovery (BC/DR) professional, many organizations minimized the role.
Times clearly have changed. In this post-9/11 world, BC/DR functions have emerged to play critical roles in protecting organizations from natural, man-made and pandemic...
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Enterprise Risk Management (ERM) is a topic of interest throughout an organization - and increasingly at the board of director level.
But how does a security leader engage the board on ERM - and keep it engaged?
Tough times require "softer" leaders.
This is the perspective of careers coach Heidi Kraft, who says that today's senior leaders need to focus more on emotional intelligence and other "soft" qualities to be able to better recruit and retain quality employees.
In an exclusive interview, Kraft discusses:
Which...
Governance, risk and compliance - GRC - are priorities for information security leaders of all organizations. And these priorities have only been underscored by the economic recession and elevated scrutiny of businesses and government agencies.
The fall flu season has begun in the U.S., and the news each day is filled with stories about H1N1 (swine flu) outbreaks at schools and businesses. But how bad is the outbreak? Is it on a par with a typical flu season? Far better or far worse?
For the fourth time in a year, the Federal Trade Commission (FTC) has extended the enforcement deadline for state-chartered credit unions and non-banking entities covered by the Identity Theft Red Flags Rule.
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
Malware, Consumer Technology, Social Networks Head the List of Vulnerabilities
Know what scares security expert John Pescatore the most? The image of a remote employee sitting at a home office or public setting, plugging into an unsecured network, accessing critical business data via a personal laptop or...
Increased demand during a severe pandemic could exceed the capacities of Internet providers' access networks for residential users and interfere with teleworkers in the securities market and other sectors, the Government Accountability Office says.
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.