No, I didn’t misspell in the title… 🙂
My youngest son recently celebrated his birthday. Both my sons are the greatest kids I could ever have dreamed of. They both always do their chores and homework with very little prodding, are healthy, smart, considerate, loveable…well, I could go on and on. I am very thankful for them.
Posts Tagged ‘risk management’
Wii Need To Be Creative With Information Security and Privacy Awareness
Monday, August 6th, 2007Privacy in the 21st Century is Captured Well in This Year’s GSW Logo Competition Winner
Sunday, August 5th, 2007Global Security Week (GSW) is September 3 – 7 this year, and the topic is Privacy in the 21st Century.
All the GSW logo entries were nice, but I think the winner of the GSW logo competition, Emily Hoelscher, captures the essence of privacy quite well. I really like how Emily incorporated both physical and data issues into her design.
The Many Languages of Security and Privacy
Friday, August 3rd, 2007I’ve done a lot of information security and privacy awareness and training work since 1990. I continue to do a lot; not only because of the *REAL* importance it has to the success of security and privacy efforts, but also because it is something I love doing.
Privacy Poll Closing *SUNDAY*…Please Click a Button!
Thursday, August 2nd, 2007Thanks to those of you who have taken the privacy poll on the right-hand side of this page! If you haven’t yet…please, pretty please, do! I had planned for this to close on Friday, but now it will close on Sunday. I’ll post a new poll weekly to run from Monday through Sunday, and each week afterwards.
Insider Threat: Contractor Sabotages Space Shuttle Endeavour
Wednesday, August 1st, 2007It feels like I’ve been writing a lot about the insider threat lately, but then again, it seems I read about a new incident caused by insiders almost daily. So much time, effort and money is spent on keeping the outsiders from getting to systems and data, but a comparatively little amount is spent on addressing, and trying to prevent, insiders from doing bad things. Folks who are trusted and have authorized access can do so much harm. The technologies focusing on the outsiders are not going to do much to protect your information from insiders.
Insider Threat and Cowboys: The Wall Street Journal Tells Your Personnel How To Get Around Your Security
Tuesday, July 31st, 2007Oh, boy, reading this Wall Street Journal story, “Ten Things Your IT Department Won’t Tell You” brought back some memories of personnel who went to great lengths to get around security requirements!
Do You Think Privacy Is Really Dead?
Saturday, July 28th, 2007I occasionally post to the Cutter Consortium blog, and the recent topics there have involved privacy.
Confusing Folks: PHR, PHI, PII, NPPI, and Dozens of Other Acronyms…It’s Still All Personal Information
Wednesday, July 25th, 2007I really enjoy reading survey results. I can’t help myself. Whether the surveys are well-done, sloppy, long, short, statistically accurate or obviously statistically invalid, I still find them interesting. Especially when they cover what the general public and non-IT/non-infosec person thinks or knows about information security and privacy, or some industry-specific issue.
An Exemplary Privacy Practice at a University
Tuesday, July 17th, 2007There are many…*MANY*…reports of privacy breaches and security incidents virtually every day. However, I think it is important to point out when organizations do something right with regard to privacy practices, particularly when they are uncommon compared to what other businesses do; perhaps other organizations will see their positive example and follow their lead.