"Today's risk management professionals really need to take a strategic view of managing risk to be relevant in achieving the organization's expected outcome," says Philip Alexander of Wells Fargo Bank.
Some 300,000 clients of the Cord Blood Registry, a stem cell bank, have been notified of a personal information breach involving stolen unencrypted backup tapes.
Sheryl Rose, the first chief information security officer at Catholic Health Initiatives, is leading efforts to implement a comprehensive security strategy as the organization rolls out electronic health records.
"It's interesting to see regulators putting the onus on the financial companies for fraud that occurs after the theft has already happened," says David Navetta, co-chairman of the American Bar Association's Information Security Committee.
The co-chair of the Commission on Cybersecurity for the 44th President praises the Obama administration's commitment to IT security, but says the administration has much more work to do to develop a comprehensive strategy to combat cyber threats.
As criteria are developed for the next stages of the HITECH Act electronic health record incentive program, it's essential that privacy and security issues are adequately addressed, one consumer advocacy group stresses.
Homeland Security Secretary Janet Napolitano asks Senate appropriators to increase funds for fiscal year 2012 so the department can identify and reduce vulnerabilities in the nation's key cyber networks.
The U.S. Supreme Court will hear arguments April 26 in a healthcare privacy case involving whether Vermont can ban the use of certain prescription drug data in the marketing of pharmaceuticals.
Describing it as the capstone publication of a partnership with the defense and intelligence communities, NIST publishes new guidance on managing security risk associated with the operation and use of IT systems.
This piece summarizes the key elements of the three major releases by the FFIEC related to online authentication: The original 2005 authentication guidance, 2006 FAQs and the 2010 draft supplement.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.