I’ve been using Twitter for a couple of months now. I never saw the value of using Twitter before this time, and in fact had a completely different view of what it was “all about” until I actually started using it. I’m so glad I did! I’ve found it to be a very valuable communications tool, and I’ve made some wonderful new contacts and friends, from all over the world, through using it.
Archive for the ‘Information Security’ Category
Pointers to interesting & useful information security, privacy & compliance info
Monday, April 13th, 2009You aren’t in Kansas anymore, ToTo…you’re in virtual Kansas!
Thursday, April 9th, 2009Oh; and, by the way, what the heck are virtual worlds? Aren’t they something that only kids use?
Measuring The Effectiveness of Information Security & Privacy Awareness & Training
Wednesday, April 8th, 2009I’m a longtime advocate of creating a wide range of metrics to determine the effectiveness of the various components of information security, privacy and compliance programs.
Privacy Breach Lesson: Encrypt Mobile Digital PII!
Monday, April 6th, 2009Once more, here is an example of how carelessness and/or a mistake leads to a privacy breach…
What Corporate Business Leaders Need To Know About Data Protection
Friday, April 3rd, 2009The first chapter of my new ebook, “Understanding Data Protection from Four Critical Perspectives” has been published!
The first chapter is “What Corporate Business Leaders Need To Know About Data Protection” and is written to an audience of CEOs and other executive business leaders who may not have an IT or information security background. I wrote this chapter for information security and privacy practitioners and officers to be able to give to their executive business leaders to help them understand data protection and compliance better, in addition to helping to get them to sponsor data protection efforts.
Here’s the introduction to the chapter, which also provides an overview of the book:
Don’t let differing authority levels damage info sec, privacy & compliance collaboration
Thursday, March 26th, 2009I first realized the need for information security and legal compliance areas to closely collaborate on converging issues in the mid-1990’s while establishing the information security and privacy requirements for one of the first online banks. Over the past 5+ years I’ve been actively evangelizing through my 2-day classes, conference and meeting speeches, and many articles and other publications about the need for information security, privacy and legal compliance areas to collaborate, and pointing out the areas where these responsibilities converge.
Carnegie Mellon’s CyLab Is A Great Resource
Wednesday, March 25th, 2009Many Motivators For Identity Theft
Tuesday, March 24th, 2009I’ve heard far too many business leaders in lesser-regulated industries, of organizations of all sizes, say something to the effect of, “Oh, we don’t have any information that hackers would find of any value.”
There Are 47 US State & Territory Breach Notice Laws: 1-Page Listing
Monday, March 23rd, 2009Over the weekend I did some research to make sure I am up to date with all the current U.S. state and U.S. territories breach notice laws…
Avoid Information Overload In Your Information Security & Privacy Training!
Sunday, March 22nd, 2009I’ve been reviewing some “canned” information security and privacy training offerings in the past few months, and I’m seeing that many of them are trying to dump TOO MUCH information on those taking them; learners can only absorb so much information within a short period of time and retain it for any significant amount of time!