Insider crimes are among the biggest threats to public and private sector organizations. And yet too many groups continue to struggle to prevent or even detect these crimes.
In an exclusive interview, Dawn Cappelli of Carnegie Mellon University's Software Engineering Institute, discusses:
Insider threat...
Interview with Gartner's Roberta Witty
Organizations have made strides in business continuity/disaster recovery (BC/DR) planning. But BC/DR professionals need to sharpen their business skills to truly protect their organizations.
This is the stance taken by Roberta Witty, research VP at Gartner. In an exclusive...
Interview with H. Peet Rapp of ISACA's Cloud Work Group
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing:...
With Howard Schmidt's appointment as national cybersecurity coordinator, his role as president of the Information Systems Security Association (ISSA) has been filled by Kevin Richards, a risk management advisor with Crowe Horwath.
Should health insurers follow Medicare's lead and give physicians incentives to adopt secure electronic health records? Some are saying that the healthcare reform measure signed into law March 23 should have required all insurers to provide EHR incentives. Do you think commercial insurers should follow in Medicare's...
Following President Obama's signing of healthcare reform legislation March 23, tens of millions of uninsured Americans could gain coverage in the next few years. That will create new responsibility to keep their insurance information, as well as their patient records, private and secure. Think of the millions of new...
Two federal agencies will host a conference in Washington May 11-12 focusing on health information security topics ranging from risk assessments to compliance issues.
Interview with Dawn Cappelli of Carnegie Mellon University's Software Engineering Institute
Insider crimes are among the biggest threats to public and private sector organizations. And yet too many groups continue to struggle to prevent or even detect these crimes.
In an exclusive interview, Dawn Cappelli of...
By transitioning from information security into law, Patrick Mueller took advantage of an opportunity many information security professionals now see: The chance to leverage practical experience in a growing legal field.
With the highest unemployment in more than 20 years and competition dense for open positions, the pressure is on for job seekers to have flawless interview skills - especially within information security.
Although there's plenty of talk about cybersecurity threats involving devious international hackers, the real threat to the security of healthcare information, I believe, is staff members who aren't paying enough attention to the little details. The Gartner Group's John Pescatore said it well in a recent interview:...
Education and training are two of the key priorities of information security professionals and organizations in 2010. And professional certifications are at the heart of that training.
The federal government's new list of major healthcare breaches is far too difficult to find. While the U.S. Department of Health and Human Services is living up to the letter of the law in posting the list deep within its Office for Civil Rights' Web site, it's sure making it difficult to reach the list.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.