My May issue of “IT Compliance in Realtime” is now available!
The first article I have within this issue is, “Addressing the Insider Threat.”
Here is the unformatted text of the article; download the PDF to get the much nicer, prettier, formatted version…
Archive for the ‘Information Security’ Category
Addressing the Insider Threat
Tuesday, May 13th, 2008At the Secure 360 Conference
Monday, May 12th, 2008Tomorrow and Wednesday I’m doing some sessions at the Secure 360 conference in St. Paul, Minnesota. I’m really looking forward to also seeing the other sessions while here (yes, I’ve arrived and getting some work done in my room)!
Revisiting Two Viewpoints Of Outsourcing Vendor Security
Tuesday, May 6th, 2008While at CSI SX last week, we covered the need to ensure business partners, to whom we outsource information processing and handling, have good security and privacy programs in place within the class I provide with Chris Grillo, “Executive Summit: Security and Privacy Collaboration.”
Corporate Communications Officers Tying The Hands Of Information Security and Privacy Pros
Tuesday, April 29th, 2008I’ve been here at the CSI SX conference for the past few days, and I’ve had the great opportunity and pleasure of speaking with a large number of folks while here. I was finally able to meet Ron Woerner in person (nice to meet you Ron!) after communicating with him in the Security Catalyst Community over the past 1+ year.
I love coming to these conferences and just talking with the participants. There is always at least one topic for which I receive enlightenment that I had not considered before. During the past few days I’ve spoken with 4 to 5 people who are responsible for information security, all from highly regulated industries, who all say despite their adequate to even generous information security and privacy budgets, some of their most important information security and privacy efforts are being quashed by their corporate communications offices; those responsible for the messages that are sent to personnel throughout the enterprise.
Do We REALLY Need Doctors To Do Consultations Via Email?
Friday, April 25th, 2008A few months ago I had some lively back-and-forth blog postings with a doctor who used email and instant messaging (IM) a lot in his practice; here, here and here.
Today my good friend Alec forwarded me another interesting news article (thanks Alec!) about the use of email by doctors; “It’s no LOL: Few US doctors answer e-mails from patients.”
Smart Business Leaders Support Effective Log Management Practices and Necessary Resources
Thursday, April 24th, 2008The second article in this month’s IT Compliance in Realtime Journal is, “Smart Business Leaders Support Log Management.”
I wrote this with an audience of information security and privacy personnel, along with IT managers, in mind.
Download the formatted PDF version to get the full content, not to mention a nicer looking document.
Here is the unformatted version…
My Information Security and Privacy Convergence Webcast Now Available
Wednesday, April 23rd, 2008Yesterday the ISSA posted on their website a free webcast I did, “Information Security and Privacy Convergence”
Here is the synopsis…
Improve Program Change Controls To Reduce Incidents
Monday, April 21st, 2008Recently in my Norwich MSIA class we were discussing the importance of program change controls, and I wanted to continue the discussion here because as important as it is, it typically does not get the attention it deserves in most organizations.
Improve Program Change Controls To Reduce Incidents
Monday, April 21st, 2008Recently in my Norwich MSIA class we were discussing the importance of program change controls, and I wanted to continue the discussion here because as important as it is, it typically does not get the attention it deserves in most organizations.
Addressing Application Vulnerabilities With PCI DSS Log Management Compliance
Wednesday, April 16th, 2008The third and final paper in my PCI DSS log management compliance series is now available!
I encourage you to download the much nicer-looking formatted PDF version. 🙂
However, the following is the unformatted version of “Addressing Application Vulnerabilities with PCI Log Management Compliance“…