When it comes to enterprise security, an organization gets its tone from the top - even when the tone is set accidentally.
How do you set the right tone? That's the topic of the new book from former CISO Jennifer Bayuk: "Enterprise Security for the Executive: Setting the Tone from the Top."
In an interview about...
Information Security Media Group (ISMG) announces the launch of HealthcareInfoSecurity.com, a multimedia site providing news, insights and education on information security, risk management and privacy in the healthcare industry.
Career Insights from Srinvivas Mukkamala of New Mexico Tech.
Education, skills, experience - what exactly does it take to make it in an information security career today?
Srinivas Mukkamala, an educator and practitioner, offers unique insight on:
The necessary mindset for an information security professional;...
Welcome to HealthcareInfoSecurity.com, a media site with news, insights and education on healthcare privacy, risk management and information security.
Information Security Media Group, which offers similar information security/risk management sites for banking, credit unions and government, brought me on board to...
I'm sorry, but weren't we just celebrating the holidays?
Unbelievable how fast the New Year has flown by already. It seems like we're all trying to get 12 months worth of work done in one.
Johns Hopkins University's-Whiting School of Engineering is now offering a new part-time graduate program in information security.
This MS degree program is an effort toward filling the surging demand for cyber engineers and scientists with technical expertise in information assurance (IA) within government and...
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
As part of its cybersecurity workforce development initiative, Lockheed Martin implements a cyber university to offer training and certification to its employees.
With Howard Schmidt's appointment as national cybersecurity coordinator, his role as president of the Information Systems Security Association (ISSA) has been filled by Kevin Richards, a risk management advisor with Crowe Horwath.
In an exclusive interview, Richards discusses:
Top agenda items for ISSA in...
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
You've heard of Stephen Covey's "The Seven Habits of Highly Effective People?"
Well, information security leaders also must cultivate healthy habits to proactively manage their careers. Following are the 8 essential habits identified by successful security leaders:
Interview with Lydia Parnes, Former Director of the FTC's Bureau of Consumer Protection
Privacy, data security and consumer protection - three of the top concerns to organizations everywhere. And they are three of the topics nearest and dearest to Lydia Parnes, former director of the Federal Trade Commission's...
Information security is the hot career option for professionals in 2010 and beyond.
This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses:
the security careers "bubble" and how it began;
the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.