Archive for the ‘Information Security’ Category

Info Sec & Privacy Days/Weeks/Months

Monday, June 15th, 2009

As I’ve mentioned a few times before, I’m in the final lap of finishing the 2nd edition of my book, “Managing an Information Security and Privacy Awareness and Training Program.” Woo hoo!
Over the weekend I updated “Appendix N – Designated Security and Privacy-Related Days.” Here are the days, weeks and months I’ve found are devoted to raising awareness about various info sec and privacy issues (this is in a much nicer-looking table format in my book)…

(more…)

Healthcare Worker Gets 1 Year In Prison For Posting HIV Victim’s Medical Records On Internet

Wednesday, June 10th, 2009

Today a report discussed how a healthcare worker obtained medical information about a patient with HIV that was then posted on the Internet…

(more…)

Privacy Enhancing Technologies (PETs) & Privacy Threatening Technologies

Tuesday, June 9th, 2009

I’m doing research while working on the 2nd edition of my book, “Managing an Information Security and Privacy Awareness and Training Program“…

(more…)

Audits Show Things At a Moment in Time; Silly To Sue For Breaches That Happen 1 Year After Audit Conclusion?

Monday, June 8th, 2009

There has been much written in the past week about Merrick Bank suing the audit firm, Savvis, because a breach occurred at CardSystems in 2005 even though Savvis had given passing marks for the CardSystems audit that Merrick Bank hired them to perform in 2004 to ensure they were following Visa’s Cardholder Information Security Program (CISP); basically a forerunner of the current PCI DSS program. Savvis found that CardSystems was following the CISP requirements. Within a year after the audit, CardSystems experienced a major breach that basically put them out of business.
I have had the great privilege to work as an IT auditor early in my career, for a while as an internal auditor at a large multi-national financial and insurance company, and then doing periodic audits since in various organizations in a wide range of industries since. All wonderful learning experiences!
There are a couple of important points that the judge in this situation should consider, and the lawyers in this case should understand:

(more…)

Great InfoSec and Privacy Info and Resources This Week On Twitter

Friday, June 5th, 2009

I got my week’s issue of Time magazine in the mail today, and lo-and-behold the cover and feature story was about Twitter!

(more…)

The World’s Largest (and BEST!) Cyber Defense Competition for Teens…In Ames Iowa!

Wednesday, May 20th, 2009

Last month Iowa State University, in Ames, held a unique type of IT Olympics for teens…

(more…)

Effectively Explaining the Purpose of Information Classification to Employees

Tuesday, May 19th, 2009

The topic for my Q2 2009 issue of Protecting Information was helping employees to understand why different types of information need different levels of security. Yes, this is information classification, but I describe it in a way that employees of all levels and responsibilities throughout an organization can understand, here’s how…

(more…)

HITECH Act does *NOT* make HIPAA, or HIPAA advice, “obsolete”!

Monday, May 18th, 2009

A couple of weeks ago I was surprised and concerned by a statement made in one of my many listservs by a lawyer commenting on HIPAA books and past advice given for HIPAA compliance…

(more…)

Podcast: HITECH Act adds new compliance requirements, penalties

Wednesday, May 6th, 2009

Last week I had the pleasure of speaking with Alexander B. Howard at SearchCompliance.com for a 26 minute podcast…

(more…)

Understanding Data Protection from 4 Critical Perspectives

Tuesday, May 5th, 2009

Today I gave a webcast (27 minutes) about “Understanding Data Protection from 4 Critical Perspectives” and it is now available online through this link

(more…)