This edited extract is from How to Use Customer Data by Sachiko Scheuing ©2024 and reproduced with permission from Kogan Page Ltd. I have an extremely confidential piece of information on a particular ...
Today’s chief information security officers (CISOs) have a much different role to play than their predecessors. Modern CISOs—no longer just gatekeepers of firewalls and threat feeds—are expected to ...
The University at Buffalo Information Technology Office (UBIT)’s Information Security Program addresses the full range of information security issues that affect the university, and establishes a ...
Aligning an organization’s appetite for risk with cybersecurity strategies is a critical challenge CISOs face, one that requires balancing technical controls and business needs. Achieving that balance ...
For global enterprise businesses, it has become clear over time that the needs of staff and employees deployed around the world extend beyond physical and cybersecurity. In his nearly four decades as ...
Once the risk team has been assembled, the crucial process of identifying risks must commence. The output of the risk ...
Many businesses assume that vendors manage their own security. That’s not always the case, and it can leave them vulnerable to attacks. In fact, “98% of organizations have a relationship with a third ...
The healthcare sector is the most vulnerable to data breaches compared to other industries, where protected health information (PHI) breaches cost millions and disrupt critical clinical operations. In ...
The current HIPAA Security rule defines Risk Analysis as: “Conducting an accurate and thorough assessment of the potential risk and vulnerabilities to the confidentiality, integrity and availability ...