Happy New Year! I hope your year is starting out great. Have you made it to day 3 without breaking any of your resolutions? How about adding one more… (more…)
Archive for the ‘Training & awareness’ Category
Make Privacy One of Your 2012 Resolutions
Tuesday, January 3rd, 2012Don’t Let School Break Be A Privacy Break-In!
Friday, June 3rd, 2011A couple of days ago I published my monthly Privacy Professor Tips message, “Summer Break-in.” I provide these tips free to anyone who wants to sign up for it on my web site and fills out one of the boxes that says, (more…)
Legal Requirements for Information Security and Privacy Awareness and Training
Wednesday, March 30th, 2011Earlier today following my online seminar, “Effective Training and Awareness: The Key to Information Security Success” (http://gocsi.com/Training2011/OD/Awareness), I received the following question:
Where might I locate a summary breakdown of training regulations by industry? i.e. Pharma
HIPAA Compliance Investigations And The Insider Threat
Wednesday, February 2nd, 2011I’ve been getting a lot more questions about HIPAA and HITECH lately from folks I’ve never met, but who have concerns about the security and privacy of their health information (“protected health information” or “PHI” as referenced within HIPAA/HITECH), businesses that are trying to understand how to protect PHI according to the regulatory requirements, and a growing number who express frustration with the unsecure ways in which clients, customers, patients and business partners are sharing information with them. There just are not enough hours in the day to answer them all, but I decided I’d start sharing some of the questions, and my corresponding answers, that seem to be topics that a wide range of readers may be interested in.
I was recently contacted by someone who had a question about a recent HIPAA complaint against Rowan Regional Medical Center (more…)
Reining In Mobile Computing Risks
Sunday, October 3rd, 2010As demonstrated over and over again over the past several years, mobile computing devices and storage media present a huge risk to business and personal information. Because of the portability of these devices, organizations are basically entrusting the security of the information stored upon them into the hands of the people using them. It is vital that an effective mobile computing device and storage media security and privacy management program is in place.
A mobile computing device and storage media security and privacy management program should be able to answer the questions: (more…)
Security and Privacy: Trends, Tools and Techniques
Wednesday, August 12th, 2009I’m in Houston this week giving my class “Security and Privacy: Trends, Tools and Techniques.”
Movies and TV Shows to Use for Infosec and Privacy Training and Awareness
Tuesday, June 23rd, 2009After many long hours, I’ve finally submitted the draft manuscript for the 2nd edition of my “Managing an Information Security and Privacy Awareness and Training Program” book. However, I will still have one more chance to make changes. One of the 23 appendices within my book provides lists of resources; books, web sites, activities, games and so on. One of my lists is for movies and television shows that can be used in training or for awareness activities…
Info Sec & Privacy Days/Weeks/Months
Monday, June 15th, 2009As I’ve mentioned a few times before, I’m in the final lap of finishing the 2nd edition of my book, “Managing an Information Security and Privacy Awareness and Training Program.” Woo hoo!
Over the weekend I updated “Appendix N – Designated Security and Privacy-Related Days.” Here are the days, weeks and months I’ve found are devoted to raising awareness about various info sec and privacy issues (this is in a much nicer-looking table format in my book)…