Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Because of the economic conditions, risks to organizations - from the inside and out - are at a critical high. Risk managers at public and private organizations are forced to make careful decisions on how to invest scarce resources.
In an exclusive interview, Joe Restoule, President of the Risk and Insurance...
Interview with Jody Westby, Adjunct Distinguished Fellow at CyLab and CEO at Global Cyber Risk
At a time when risks are high and consumer confidence is low, corporate boards of directors aren't paying nearly enough attention to information security and cyber threats.
This is the key takeaway from a new Carnegie...
Internal auditing has always been a key function within financial systems, and it becomes even more so when it comes to IT and information security.
In this exclusive interview, David Richards, President of the Institute of Internal Auditors (IIA), discusses:
The key differences between internal and IT...
Interview with David Richards, President of the Institute of Internal Auditors
Internal auditing has always been a key function within financial systems, and it becomes even more so when it comes to IT and information security.
In this exclusive interview, David Richards, President of the Institute of Internal...
Organizations often face the task of trying to recover data from water-soaked hard disks or servers that have been flooded by hurricanes, bad weather, or even the sprinklers going off in the branch or building.
Rule one -- don't assume that data isn't recoverable, no matter what it has been through, says Jim...
Governance is a term increasingly used in financial institutions, as banking/security leaders try to introduce new processes and disciplines to their organizations.
In this exclusive interview, Jennifer Bayuk, an information security specialist and former CISO at Bear Stearns & Co., discusses:
What governance...
Interview with Kim Matlon, Business Continuity/Crisis Management Expert
Workplace violence - it's one of the most common but least understood risks to all businesses.
From robberies gone awry to bullies in the workplace to domestic anger spilling over from home, the workplace is rife for violent situations. In...
What are the most overlooked areas for physical security?
Ken Stasiak, president of Secure State, an Ohio-based information security firm that performs penetration testing, says physical security as a whole is overlooked.
"A handful of our clients say they don't need to test it because they know that their...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.