In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Audit trends;
Where organizations are most vulnerable;
How audit...
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the...
It's time for information security professionals to give back to their communities - to reach out and educate businesses, schools and citizens about cybersecurity and other relevant issues.
This is the message from John Rossi, professor of systems management/information assurance at National Defense...
No question, the information security professional's role has evolved in recent years. How, then, has the need for ongoing professional education also changed? And what role must risk management play in today's security organization?
In an exclusive interview, Mark Lobel of PricewaterhouseCoopers and ISACA,...
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
Interview with Kent Anderson of Encurve LLC
Cybersecurity, forensics, risk management -- what will be the core security skills needed in organizations in 2010?
In an exclusive interview, Kent Anderson, founder and managing director of Encurve LLC, as well as a member of ISACA's Security Management Committee,...
We've experienced two waves of the H1N1 pandemic. What lessons have we learned?
Sue Kerr, President of Continuity First, a business continuity/disaster recovery consultancy, talks about how organizations have handled H1N1. She also discusses:
the state of BC/DR;
Challenges facing organizations today;
2010...
The Department of Homeland Security launches a aimed to furnish stakeholders and the public with easy accessible information in securing the nation's critical infrastructures and key resources.
FaceBook, Twitter, LinkedIn -- Social-networking sites are now used both as recruitment tools for new talent and as screening sites for potential employees. As such, information security professionals should be careful to cultivate the right image on these and other popular sites.
Tough times require "softer" leaders.
This is the perspective of careers coach Heidi Kraft, who says that today's senior leaders need to focus more on emotional intelligence and other "soft" qualities to be able to better recruit and retain quality employees.
In an exclusive interview, Kraft discusses:
Which...
A new online Master of Science in Information Security degree program has been developed by Georgia Tech to address the growing demand for qualified information security professionals both within the government and the private sector.
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the IAPP;...
It's time for information security professionals to give back to their communities - to reach out and educate businesses, schools and citizens about cybersecurity and other relevant issues.
This is the message from John Rossi, professor of systems management/information assurance at National Defense...
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
When Anne Marie Staley first became a business continuity/disaster recovery (BC/DR) professional, many organizations minimized the role.
Times clearly have changed. In this post-9/11 world, BC/DR functions have emerged to play critical roles in protecting organizations from natural, man-made and pandemic...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.