Sinopsis
Exclusive, insightful audio interviews by our staff with healthcare/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
FTC's Google Fine: The Privacy Message
10/08/2012Google's $22.5 million settlement with the Federal Trade Commission is the largest fine ever imposed by the FTC. But the case sends a bigger message about privacy, says attorney Francoise Gilbert.
-
Thinking Smartly About Cloud Computing
09/08/2012CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
-
Insights Into New Anti-Fraud Effort
08/08/2012How will a coalition of 21 private insurers, government agencies and others work together to thwart healthcare insurance fraud? Lee Arian of WellPoint provides some insights.
-
Social Media: Pros & Cons
06/08/2012The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.
-
Power Grid Too Reliable for Own Good?
06/08/2012The United States - and other advanced societies - shouldn't let the reliability of their electric grids lull them into being unprepared for possible massive power outages caused by cyberattacks, cybersecurity expert Harry Raduege says.
-
The Privacy Pro's Challenge
06/08/2012There have never been so many job opportunities for privacy professionals. Nor have there ever been so many challenges. Trevor Hughes of the IAPP discusses what it takes to grow a privacy career.
-
Symantec's CISO on Security Leadership
03/08/2012Her first nine months on the job included a data breach and a CEO shakeup. Hear how Symantec CISO Patricia Titus has adapted to business change and re-focused the company's security team.
-
Cybersecurity Act Fails; What Next?
03/08/2012Now that Congress has failed to enact significant cybersecurity legislation, President Obama needs to find new ways to secure key government and business IT systems, says Melissa Hathaway, a former top White House cybersecurity adviser.
-
Why Maine HIE Uses Centralized Model
01/08/2012Maine's health information exchange uses a centralized data architecture that offers security advantages over other models, contends Devore Culver, CEO.
-
Privacy: 'Do Not Track' Debate
31/07/2012Microsoft says its next version of the Internet Explorer web browser will feature "do not track" as a default user setting. What are the online privacy implications? Trevor Hughes of the IAPP weighs in.
-
Keeping Telehealth Data Secure
30/07/2012As more consumers take advantage of mobile devices for telemedicine, they need to be educated on steps to take to help ensure that their medical information remains secure, says telehealth expert Chuck Parker.
-
Eddie Schwartz on His Year as RSA's CISO
23/07/2012The truth about preventing a breach, like the advanced-persistent-threat attack RSA experienced in 2011, is that an organization can't defend critical systems alone, says RSA CISO Eddie Schwartz.
-
Massachusetts HIE's Security Strategy
23/07/2012The New England Healthcare Exchange Network, one of the nation's oldest health information exchanges, is continuing to use a federated data architecture model to help protect patient data as it broadens the transactions it accommodates, says Sira Cormier, program director.
-
Phishing Update: 'No Brand is Safe'
23/07/2012The number of phishing sites is at an all-time high. And so are the targeted brands. The message, says Peter Cassidy of the Anti-Phishing Working Group: "No brand is safe."
-
COBIT 5 for Security: What You Need to Know
23/07/2012ISACA just issued COBIT 5 for Information Security, a business-centric approach to governance and IT management. ISACA's Robert Stroud explains what COBIT 5 means to your organization.
-
When Breach Planning Fails
20/07/2012When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.
-
CISO Success Requires Collaboration
19/07/2012RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.
-
Breached Organizations Are Tight-Lipped
17/07/2012Too many organizations that experience a data breach fail to reveal information on the cause of the incident so that consumers can take appropriate action, one consumer advocacy group contends.
-
Managing All That Security
16/07/2012Acquiring information security wares gets more complicated every day - some 1,000 vendors offer 150 categories of products - so it's unreasonable to expect even the most informed chief information security officers to know everything about them.
-
Halamka Reveals Compliance Priorities
13/07/2012John Halamka, M.D., one of the nation's leading healthcare CIOs, says a top compliance project for this summer is improving mobile device security at Beth Israel Deaconess Medical Center in Boston.