Posts Tagged ‘risk management’

Finding a Five Leaf Clover!

Tuesday, October 16th, 2007

Something very cool…my son Noah found a five-leaf clover today while waiting to be picked up at school. We are going to laminate it, then I’ll take a photo and post it on my site.

(more…)

Iowa Universities Provide Examples of Good and Bad Information Security and Privacy

Wednesday, October 10th, 2007

In the past week the two largest universities in Iowa provided examples of both great and poor security practices. Let’s see…how about the bad example first?

(more…)

New Nevada Law Explicitly Requires Organizations to Encrypt PII Sent Through Networks

Tuesday, October 9th, 2007

To date there have been several laws that direct organizations in certain industries to consider using encryption as one way to protect data based upon the organization’s considered risks, and laws that make encryption a factor in decisions regarding breach notifications, but until now no laws that I’m aware of explicitly required personally identifiable information (PII) to be encrypted. The state of Nevada has now changed that!

(more…)

Increase Business Productivity AND Reduce Carbon Dioxide Emissions

Monday, October 8th, 2007

While participating in a discussion in the Security Catalyst community I posted a message about how much more productive time I have now that I work from my home office as opposed to commuting in to an office building each day. After I finished posting I started thinking about how much more productive most businesses could be if they would establish significant portions of their workforce to work from home.

(more…)

Something You Should Know: FTC Is Aggressively Going After Companies With Poor Security

Sunday, October 7th, 2007

Of all the U.S. government regulatory oversight agencies, the Federal Trade Commission (FTC) is the most active and aggressive in looking for and applying penalties to organizations that not only are in noncompliance with laws and regulations, but also those who are not in compliance with their own information security and privacy promises; in other words, those that are practicing “unfair and deceptive trade practices.”

(more…)

Who Would Want to Be a CISO or CPO for a Social Networking Site?

Friday, October 5th, 2007

This morning I spoke with a reporter from billingworld.com about social networking sites, innovation and partnering established businesses with new sites such as this and the risks involved. After the call I continued to think about this and jotted down a few notes…

(more…)

Why Would You Trust Microsoft To Store Your Sensitive Health Information?

Thursday, October 4th, 2007

Today Microsoft launched their new web portal, HealthVault to store, for free, “medical histories, immunization and other records from doctors’ offices and hospital visits, including data from devices like heart monitors. It is also tied to a health information search engine the software maker launched last month.”

(more…)

Know How To Motivate Your Personnel To Protect Information

Wednesday, October 3rd, 2007

Not everyone has the same motivation to secure the information they handle or access while they are working. This is something very important for information security and privacy practitioners to understand, but unfortunately too many do not think about motivation factors when creating and managing their information security, privacy and compliance programs.

(more…)

4 Drivers For PCI DSS Compliance

Friday, September 28th, 2007

September 30 (why’d they pick a Sunday?) marks the compliance date for Level 1 organizations to be in compliance with PCI DSS.
Last week I had a nice conversation with Joe Lindstrom from Symantec about the deadline that will fall over this weekend.

(more…)

DHS Exploding Generator Shows Dire Need For Better Computer Security

Thursday, September 27th, 2007

Scanning the news this morning, this CNN headline caught my eye, “Mouse click could plunge city into darkness, experts say
The first sentence is compelling:

(more…)