Attorney Adam Greene and security specialist Mac McMillan review lessons learned from major healthcare information breaches and provide insights on breach prevention.
A consortium of eight major information technology companies is continuing development of a free framework designed to make it easier to exchange information about security vulnerabilities.
No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.
Today's cyber-culture causes financial institutions to rely heavily on the use of electronic information, which can be a gold mine for hackers. Malicious individuals are constantly searching for security vulnerabilities and weaknesses to gain access to electronic information. Are you taking the proper steps to protect...
"This is a unique program that fits the specific needs for upcoming and current IT security leaders and adds high enrichment to peer support and the learning experience," says Dena Haritos Tsamitis.
Winning CEOs' support for information security investments requires clearly explaining the business impact of inadequate security, says consultant Eric Mueller.
A CEO's experience dealing with the aftermath of an information breach caused by the theft of an unencrypted laptop offers valuable lessons. Read about his real-world advice.
Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
Healthcare information security thought-leaders offer eight insights on how to prevent breaches, based, in part, on lessons learned from the major incidents reported so far.
Establishing an effective breach incident response program is a key component of an information risk management strategy. And NIST has issued draft guidelines to help organizations and leaders implement such a program.
How can companies and IT security leaders keep a security breach from becoming a long-term problem and stop it from negatively affecting their customer base?
What are the critical steps that IT security professionals should take in the aftermath of a breach? CEO Micky Tripathi of The Massachusetts eHealth Collaborative offers eight practical lessons based on his breach resolution experience.
Securing senior management buy-in from the top of the organization is significant for executives managing the myriad of privacy laws in different regions of the world, says attorney Miriam Wugmeister.
"You need a CISO today to manage not only the IT risks, but understand and influence the business risks that are imposed on the company by the decisions and strategies it takes," says John South, CISO at Heartland Payment Systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.