"Raising the security awareness of your workforce is your best defense against having a breach incident," says David Holtzman, who's on the federal team that enforces the HITECH Act breach notification rule.
Plan would nationalize breach notification law, set penalties for cybercrimes and protect businesses from lawsuits that share cybersecurity information with DHS as well as promote the use of cloud computing.
Five leading healthcare organizations are collaborating to demonstrate the secure national exchange of health information, hoping to pave the way for others, says James Walker, M.D. of Geisinger Health System.
U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.
BITS and the ABA are interested in managing future domains affiliated with bank brands and financial interests. If approved, their domain oversight would allow them to control certain domain names registrations.
"Our ability to provide immediate response to vulnerabilities and threats ... is quickly establishing VA as a model of excellence for the rest of the federal government."
VA CIO Roger Baker says in testimony before a House panel.
A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.
When it comes to hot topics, they don't get hotter than authentication, cloud computing and IT governance - all of which I've discussed at length in recent interviews with industry thought-leaders. Let's review some highlights from these conversations.
"No one up here wants to stop Apple or Google from doing the incredible things that you do," Sen. Al Franken says. "What today is about is trying to find a balance between all of those wonderful benefits and the public's right to privacy."