To make sure their information technology strategies adequately address the needs of physicians, many hospitals have designated a doctor to serve as chief medical informatics officer. These physicians are working closely with CIOs, CSOs and others to help select and implement I.T., including technologies to keep...
Completing security risk assessments for a long list of applications and providing data security training to its entire staff are two of the top priorities for 2010 at Johns Hopkins Medicine, one of the nation's largest academic medical centers.
In an interview, Stephanie Reel, vice president for information...
GovInfoSecurity.com places the spotlight on the the 10 individuals who will have the most influence in shaping federal government cybersecurity policy in the coming 12 months.
Einstein is an intrusion detection - and soon an intrusion prevention - system the government is deploying to safeguard government IT systems. Some cybersecurity experts contend Einstein has the potential to intrude on the privacy of individual Americans, a concern Philip Reitinger dismisses.
Reitinger, deputy...
Mischel Kwon, Former DirectorU.S. Computer Emergency Readiness Team
The growing role of the Department of Homeland Security in governing federal cybersecurity has its limits, says Mischel Kwon, who until this summer served as director United States Computer Emergency Readiness Team, the DHS agency that analyzes...
What's ahead for information security professionals in 2010?
Barbara Massa, VP of Global Talent Acquisition at McAfee, Inc. speaks to the results of the new Information Security Today Career Trends Survey, discussing:
How the results speak to the maturity of the information security profession;
The survey's...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
As the federal government rolls out to its agencies the second iteration of the Einstein intrusion-detection system and readies a more advanced intrusion-prevention Einstein 2, it is partnering with Michigan in deploying the original version of Einstein. Michigan becomes the first state to employ Einstein.
John Gilligan, the former Air Force and Energy Departments chief information officer and leader in the recent Consensus Audit Guidelines initiatives, is the new board chairman of the not-for-profit Center for Internet Security.
"It's a mistake to think that without a coordinator we're not making progress," says Chris Painter, White House acting senior director for cybersecurity.
Information Security as a profession is amidst an evolution.
From a traditional, technology-oriented role safeguarding critical information assets, the career is progressing toward integration with the strategic thinking of organizations. Led by President Obama, the U.S. has embraced cybersecurity as a national...
No question, the information security professional's role has evolved in recent years. How, then, has the need for ongoing professional education also changed? And what role must risk management play in today's security organization?
In an exclusive interview, Mark Lobel of PricewaterhouseCoopers and ISACA,...
Cyber threats moving at Internet speed is making it difficult for the government and the private sector to protect key digital assets, says the official who conducted President Obama's 60-day cybersecurity review.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.