Some organizations proudly tout their privacy protection policies. Others, such as The Everett Clinic in Washington state, actually enforce their policies with bold action.
NIST's Ron Ross will be quite busy at RSA Conference 2012, not only promoting revised guidance on security and privacy controls to be unveiled at the securing conclave, but also participating in a panel on one of his favorite topics: continuous monitoring.
People, as much as anything else, are a critical aspect of information risk management, and businesses and government agencies must monitor employees - and educate them, as well - to thwart a potential threat from within.
As organizations move to the continuous monitoring of their IT systems to assure they're secure, they rely much more on automated processes. But don't forget the role people play.
Here's why it's important to carefully consider offering free credit monitoring, as well as breach prevention details, to the victims of major information breaches.
New guidance from the National Institute of Standards and Technology defines an information security continuous monitoring strategy and shows how organizations can create an information security continuous monitoring program.
Maimonides Medical Center uses new technology to help it monitor electronic access to patient information to guard against snooping and comply with HIPAA.
The bill, sponsored by House Cybersecurity Caucus Co-Chair James Langevin, would create a White House office of cyberspace and replace paper-based FISMA compliance with automated, continuous monitoring of IT systems.
Computer scientists at the National Institute of Standards and Technology have released five draft documents on various aspects of information security, and NIST is seeking comments on those drafts.
Given the threat and compliance environments, Internal Segmentation (also known as internal firewalling) is a growing trend that requires organizations to improve their internal monitoring of data. These solutions control data within the corporate network and actively enforce data access policies for internal staff...
"I believe that I can help VA leap frog to the front of innovation by anticipating next generation security requirements and acquiring the proper solutions," Jerry Davis says.
The Obama Administration has a heavy emphasis on information security, and already we're seeing greater attention paid to cybersecurity and FISMA reform. Now is the time for government agencies to benchmark and strengthen their information security programs.
Learn from security veteran Patrick Howard, CISO of the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.