The U.S. government wants to move many services online, but the inability to authenticate customers and develop Trusted Identities has kept agencies from making the transition. This is a problem that could soon be resolved, says Mike Ozburn, principal of Booz Allen Hamilton.
"These are projects that were already...
Former banking regulator William Henley has simple advice for banking institutions wondering how to comply with the new FFIEC authentication guidance update: "Start immediately, develop a plan, and document your progress."
A comprehensive electronic health records system enabled St. John's Regional Medical Center to continue aiding patients in the wake of a tornado that tore through the hospital, providing an important lesson in business continuity.
Beth Israel Deaconess Medical Center in Boston is notifying more than 2,000 of its patients about an unusual potential health information breach incident involving a computer virus that transmitted data to an unknown location.
Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
A Georgia hospital has informed 7,500 patients that they may have been affected by a breach incident involving the theft of personal information that could have been used to commit federal income tax fraud.
The Department of Veterans Affairs is offering a $50,000 prize to a developer who successfully demonstrates the expansion of the use of the "Blue Button" application to enable veterans to download their patient information from providers outside the VA.
"If not properly implemented, telework may introduce new information security vulnerabilities into agency systems and networks," Office and Management and Budget Director Jacob Lew warns in a White House memo.
Since becoming Vermont's first CISO three years ago, Kris Rowley's been on a quest to create an IT security culture in state government. Rowley's latest initiative, bringing risk assessment in-house, is helping build that culture.
An important component of preparing for a potential HIPAA compliance audit is to complete a "walk through" to make sure privacy and security policies and procedures are practical and effective, former HIPAA enforcer Adam Greene advises.