"Satisfying a court order is heavy lifting," says Greg Thompson of Scotia Bank. "The cost and risks of outsourcing this service with regards to the number of litigations we are dealing with has skyrocketed."
Veterans Affairs may have been biased when it awarded last year a high-bid, $133 million IT security services contract to the incumbent provider, the consultancy Booz Allen Hamilton, a VA inspector general audit contends.
The federal "wall of shame" tally of major healthcare information breaches now lists 380 incidents affecting more than 18 million individuals. Meanwhile, yet another class action lawsuit has been filed in the wake of a breach.
The information security job market is evolving into highly specialized areas, says Eugene Spafford, noted professor at Purdue University. So, how must students now prepare themselves for these new career paths?
A key component of any breach response preparation effort is to make certain that all staff members are trained in who to contact within the organization about a security incident "even if they are not sure whether it's a breach," says Dawn Morgenstern, privacy official at the Walgreens national drugstore chain.
These new sites now make Information Security Media Group the largest global network of information security-focused media sites, reaching the most diverse audience of decision-makers in each of ISMG's key markets.
"We will provide critical infrastructure owners and operators the timely access to actionable cybersecurity information necessary to protect their own networks and facilities," says one of bill's chief sponsors, Rep. Dan Lungren.
As legal issues surrounding data breaches become increasingly complex, more organizations are turning to attorneys for post-breach response, says Lisa Sotto, a managing partner for New York-based law firm Hunton & Williams.
The delay in the release of final versions of HIPAA modifications and the HIPAA breach notification rule makes it difficult for healthcare organizations to set information security investment priorities, says hospital privacy officer Kari Myrold.
The plan identifies opportunities to engage the private sector in activities for transitioning promising R&D into practice. It prioritizes the development of a "science of security" to derive first principles and the fundamental building blocks of security and trustworthiness.