
Info Risk Today Podcast
3,490 episodes — Page 62 of 70
For Clinics, Privacy Training Is Key
Physician group practices, many of which are adopting their first electronic health record system, need to make staff training on <a href='/privacy-c-151'><b>privacy</b></a> and security issues a top priority, says Susan Turney, M.D., the new CEO at the Medical Group Management Association.
Toolkit Helps With Risk Assessments
A new, free <a href="http://scap.nist.gov/hipaa/" target="_blank"><b>HIPAA Security Rule Toolkit</b></a> is designed to help healthcare organizations conduct a thorough risk assessment, says Kevin Stine, who helped guide the project for the National Institute of Standards and Technology.
Breach Response: Reputational Risk
Data breaches are all about reputational risk, says attorney Lisa Sotto. And as legal requirements grow, attorneys must play increasingly integral roles in helping clients respond to incidents.
The State of Security Education
Information security <a href='/articles.php?art_id=4216'><b>threats</b></a> - especially to critical infrastructures and from nation-states - are evolving. But security education curricula are struggling to keep pace, according to <a href='https://www.bankinfosecurity.com/interviews/super-user-organizations-biggest-internal-threat-i-566'><b>Eugene Spafford</b></a>, renowned information security professor at Purdue University.
Breach Legislation: The Next Generation
It's a new wave of cybercriminal behind the latest major data breaches, says breach expert Lucy Thomson. And these incidents are resulting in a new generation of <a href='https://www.govinfosecurity.com/house-gop-unveils-cybersecurity-agenda-a-4126'><b>breach notification laws</b></a> globally.
IP Protection Bills Threaten Internet
The Brooking Institute's Allan Friedman says bills before Congress aimed at protecting intellectual property threaten cybersecurity.
Breach Notification Priority for 2012
BITS president Paul Smocer says banks can expect an uptick in cybersecurity-focused legislation in 2012. What impact will changes from Capitol Hill have on requirements for data breach notification, information sharing and critical infrastructure?
Influencing Policy, If Not the Law
Jacob Olcott says Congress' failure to enact comprehensive cybersecurity legislation over the past half decade doesn't mean lawmakers haven't influenced IT security policy.
Fraud Victim: FFIEC Guidance Lacking
ACH fraud victim Mark Patterson says small businesses like his welcome improved online security measures from banking institutions. But is the new FFIEC Authentication Guidance sufficient? Patterson says no.
Risk Management's Challenges
When bankers contemplate risk, says Edward DeMarco Jr. of the Risk Management Association, what dominates headlines in the financial press should be of paramount concern.
Firewalls: The Next Generation
Too many of today's firewalls are out of date and exposing organizations to unacceptable business risks, says Chris King of Palo Alto Networks.
Identifying Infosec Jobs, Skills, Tasks
NICE's Ernest McDuffie says a proposed cybersecurity workforce framework represents a consensus of government thought on how best to define the jobs, skills and tasks needed to secure information technology.
BYOD and Corporate Policy
Unfortunately, says Ken Vander Wal, most organizations have done little to address security in their policies and procedures regarding BYOD, which is changing the ways companies address user behavior and risk.
How Training Helps Prevent Breaches
A lack of ongoing <a href='/hipaa-hitech-c-283'><b>HIPAA</b></a> compliance training increases the risk of internal breaches, says Terrell Herzig, information security officer at UAB Medicine.
Making the Business Case for Security
Winning senior executive support for information security spending requires "a solid business case of justifications," says Christopher Paidhrin, security compliance officer at PeaceHealth Southwest Medical Center.
HIPAA Compliance: A New Attitude
Ramped up HIPAA enforcement is a big reason behind the No. 1 information security priority for the coming year: improving regulatory compliance, says attorney Adam Greene.
BofA on Mobile Risk and Security
Bank of America's Keith Gordon says securing the mobile channel is much like securing any other banking channel: Controlling risks requires layers of security and controls. But educating customers plays a key security function, too.
Tablet: A 'Game Changer' for Mobile Banking
Javelin's Mary Monahan says the mobile tablet will revolutionize banking and payments.
Community Service: How to Give Back
Giving back to the community. It's a civic responsibility, says Dan Waddell of Tantus Technologies. But it's also a necessity to help raise cyber awareness. Waddell explains how security pros can give back.
Breach Resolution: A Success Strategy
One reason why so many healthcare organizations are not well-prepared to counter security threats is that "key leadership has not bought into the whole process," says Bob Krenek of <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"><b>Experian&Acirc;&reg; Data Breach Resolution.</b></a>
Winning Funding for Info Security
Penetration tests that demonstrate how an unauthorized user could gain access to patient information can be effective in winning support for a bigger information security budget, says David Kennedy of <a href="http://www.diebold.com/" target="_blank"><b>Diebold, Incorporated.</b></a>
Emerging Payments Redefine Value
In the near future, financial institutions will have new opportunities for service in emerging payments. How they define their roles, however, will depend greatly on steps they take now to put a stake in the ground.
Cyber Intel Employs Risk Approach
Harry Raduege sees the nascent field of cyber intelligence as a way for governments and businesses to be proactive, and not reactive, to today's sophisticated digital threats.
Social Networks Revolutionize Payments
"It is clear that Internet technology represents the moment of a change equivalent to the change brought on by the printing press and the steam machine," says Kosta Peric of SWIFT.
Digital, Physical Security Synergized
Honolulu CIO Gordon Bruce, bolstered by an international conference, is working energetically to expand digital and physical security.
ID Theft: How to Help Consumers
ID theft expert Joanna Crane wonders whether banks, government agencies and healthcare providers do enough to assist consumers with ID theft recovery, saying consumer expectations are often loftier than what's being done to meet the demand.
Fighting Fraud: Banks, Merchants Must Align
The only way to improve card security is for banks and merchants to align their strategies, says Gray Taylor of NACS. "This is something that hurts both of our industries. Fraud hurts us all."
EMV: It's About Reducing Fraud
Pradeep Moudgal of California-based SVB says the bank's decision in June to migrate commercial credit cards over to EMV was easy. "The biggest advantage of the chip card, at the end of the day, is to reduce fraud," he says.
Mobile Device Management
Roger Baker, CIO at the VA, says desktop computers will eventually phase out, as mobile devices become predominant channels for communication and work. That evolution has made plans for ongoing mobile security a priority for organizations that cross every business sector.
Authentication: One Solution Won't Fit All
How much crossover should banking institutions rely upon as they evaluate authentication standards for retail vs. commercial accounts? Online security expert Christopher Beier offers insights.
Steps to Stop Skimming
Gray Taylor of NACS says retailers spend billions every year to fix a broken payments system. And the primary culprit is the lingering mag-stripe.
VA's Plan for Mobile Device Security
Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
How Audits Can Increase Infosec Budgets
Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.
BlackBerry Episode Strikes at IT Security Tenet
Winn Schwartau says the BlackBerry disruption this past week (see <a href='http://blogs.govinfosecurity.com/posts.php?postID=1088'><b><i>BlackBerry Disruptions: Where to Start?</i></b></a>) hit at the heart of one of the fundamentals of IT security: availability.
The App Sec Pro and the Shark
When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.
Barriers Stunting Cloud Adoption
Alastair MacWillson says the lack of harmonization among state, national and international security laws and regulations has proved challenging for global organizations that want to work in the cloud.
Cloud Computing: Compliance Challenges
Too many organizations overlook regulatory compliance issues when working with cloud computing vendors, says security expert Alastair MacWillson.
The Changing Threat Landscape
The threat landscape has evolved, and India's banking institutions must grow their information security strategies, says Anand Naik of Symantec, which just released a report that offers a new security agenda to institutions.
Interview: The New HIPAA Enforcer
<a href="/hhs-selects-new-civil-rights-chief-a-4053"><b>Leon Rodriguez,</b></a> the new director of the Department of Health and Human Services' Office for Civil Rights, describes his <a href='/hipaa-hitech-c-283'><b>HIPAA</b></a> enforcement agenda.
Business Continuity: What We're Missing
From the <a href='/crisis-in-japan-global-impact-a-3432'><b>earthquake in Japan</b></a> to <a href='/disaster-averted-for-most-systems-a-4003'><b>Hurricane Irene</b></a> in the U.S., organizations worldwide have found their <a href='/business-continuity-disaster-recovery-c-76'><b>business continuity</b></a> and disaster plans tested. But what lessons must we draw from these incidents?
7 Steps to Secure Mobile Devices
Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.
Fraud, Security and Priorities for BITS
BITS, the technology policy division of The Financial Services Roundtable, has just named Paul Smocer its new president. What are his strategies for tackling fraud, security and FFIEC compliance?
PCI: Merchants Still Fall Short
Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
Taking Charge of Physical, IT Security
Merging government agencies responsible for physical and information security into a single operation makes sense, says Michigan's new chief security officer, Dan Lohrmann. After all, he says, the same technologies used to allow entry to a building also can be deployed to permit access to a sensitive database.
HIPAA Audit Prep: Five Key Steps
Healthcare organizations need to take five key steps to prepare for the upcoming HIPAA compliance audit program, says compliance specialist Bob Chaput.
Mobile: Are Security Risks Overblown?
Mobile apps and smartphone security are increasing global concerns. But Dr. Giles Hogben of ENISA says mobile malware mania is a bit overhyped, since mobile is actually more secure than most other platforms currently on the market.
Dodd-Frank: What to Expect in 2012
It's been well over a year since the passage of the Dodd-Frank Wall Street Reform and Consumer Protection Act. How should banking institutions prepare for the hundreds of new regulations expected to come as a result of this landmark legislation?
AML: Passing the Audit
Ensuring compliance with BSA and AML mandates is always a priority for federal examiners, and that makes it a priority for banks, says Nancy O'Donnell of Thomaston Savings Bank.
Connecting HIEs: Is It Feasible?
Ensuring adequate security will prove vital to efforts to link statewide health information exchanges to each other, says IT consultant Patti Dodgen.
UBS and Risk Management
Risk management expert Frances McLeod says investment banks such as UBS struggle with balance between risk management and making money. "There is a bit of a conflict in the culture," she says.