Rebecca Herold’s 2008 speaking dates

February 5th, 2008

January 18: The Importance of Verifying Third Party Security Programs
Learning event at the Grand Rapids, Michigan ISSA chapter meeting
Web Site:
http://www.gr-issa.org/

February 21: Anatomy of a Privacy Breach
Learning event at the University of California, Berkeley
Web Site: http://www.truststc.org/seminar.htm

March 18: Anatomy of a Privacy Breach
Learning event at the Iowa ISACA chapter meeting
Web Site: Click Here

April 27: The 30 Second Security Pitch
Learning event at the CSI SX conference
Web Site: http://www.csisx.com/conference/view-by-day.php

April 30 & May 1: Executive Summit: Security and Privacy Collaboration
2-day learning workshop at the CSI SX conference
Web Site: http://www.csisx.com/conference/workshops.php

July 23 & 24: Executive Summit: Security and Privacy Collaboration
2-day learning workshop hosted by the Charlotte, North Carolina ISACA chapter.
(NO WEBSITE)

Encryption So Easy Even A Terrorist Can Use It

February 5th, 2008

It seems all business leaders would understand by now, after literally thousands of privacy incidents in recent years, that they need to encrypt personally identifiable information (PII) stored on mobile computers and mobile storage devices, and when sending PII through networks.
Even the bad guys understand this.

Read the rest of this entry »

FBI Plans to Catalog Everyone’s Physical Characteristics, and Bush Does Away With Privacy Oversight Board

February 4th, 2008

Here’s something scary…
I just saw a new CNN report that made me go, “Huh?!”
FBI wants palm prints, eye scans, tattoo mapping

Read the rest of this entry »

What Companies Do You Trust With Your Privacy?

February 4th, 2008

For the past few years the Ponemon Institute has done surveys to determine the U.S. companies most trusted to protect privacy.

Read the rest of this entry »

Don’t Let Your Folks Fall For This Scary Spam

February 1st, 2008

Today I got a death threat email message. This particular type of spam is not really new, but because they will be very scary for most people to get, many recipients will fall for them.
The address header and text of the message reads:

Read the rest of this entry »

A New Privacy/Security Breach Notice Law Soon In The Land Down Under?

February 1st, 2008

Another country appears to be on the verge of passing a privacy breach notice law…

Read the rest of this entry »

Blog Changes…More Papers, Less Daily Opinions

January 31st, 2008

When I started blogging a couple of years ago (actually in January 2006…just realized I passed my anniversary!), I would not only post daily to my blog, but I would also publish 3 – 4 research papers or white papers to this site each month. Last year I stopped doing that and spent more time providing more analysis and opinions within my daily blog postings.

Read the rest of this entry »

Were You Taken Offline?

January 31st, 2008

Today, “Internet failure hits two continents
Were you impacted? If you were, then you probably aren’t reading this right now… 🙂

Read the rest of this entry »

Were You Taken Offline?

January 31st, 2008

Today, “Internet failure hits two continents
Were you impacted? If you were, then you probably aren’t reading this right now… 🙂

Read the rest of this entry »

A Stolen Health Insurer’s Laptop With PII Is Not Necessarily A HIPAA Violation

January 30th, 2008

While scanning the news blurb summaries today, the statement, “This is a violation of HIPAA.” caught my eye. Hmm…let’s see what this is about…
This statement was actually within the reader comments to the story, “Blue Cross reports theft of computer.”

Read the rest of this entry »