"Our ability to provide immediate response to vulnerabilities and threats ... is quickly establishing VA as a model of excellence for the rest of the federal government."
VA CIO Roger Baker says in testimony before a House panel.
A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.
Globally, countries and organizations now recognize the need for a unified approach for managing IT infrastructure services, says Marlin Pohlman of the Cloud Security Alliance. The trick is developing this new set of global standards.
"No one up here wants to stop Apple or Google from doing the incredible things that you do," Sen. Al Franken says. "What today is about is trying to find a balance between all of those wonderful benefits and the public's right to privacy."
The bill would establish a framework that allows consumers not to have their online activities tracked and, with limited exceptions, prohibits online providers from doing so if that's what individuals choose.
The Unisys Security Index shows growing public anxiety about Internet security. Unisys CISO Patricia Titus wonders how restless the public would be if the poll was conducted after revelations of breaches at RSA, Epsilon and Sony.
Personalized medicine research, which relies on genetic information paired with electronic health records, could pave the way for many treatment breakthroughs. But because of the sensitive nature of the information involved, pioneers in this field must take extra privacy and security precautions.
Among the many subjects the Privacy and Security Tiger Team will tackle in the weeks ahead is determining whether more guidelines are needed on the issues of accommodating corrections to electronic health records and ensuring data integrity.