Data Breach Today Podcast

  • Author: Vários
  • Narrator: Vários
  • Publisher: Podcast
  • More information

Informações:

Synopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodes

  • Tips for Encrypting Mobile Devices

    11/01/2012

    To help prevent breaches, mobile devices should be encrypted even if storage of sensitive information on them is prohibited, says security expert Melodi Mosley Gates.

  • Holistic Planning for Breach Response

    11/01/2012

    A breach is a disaster, says business continuity specialist Ken Schroeder. So organizing an effective breach-response team does not require a reinvention of the wheel. What it does require is a holistic approach.

  • Privacy Laws: 'Find the Commonalities'

    10/01/2012

    Global organizations easily can be confused by the myriad privacy laws in different regions of the world. But U.S. privacy attorney Miriam Wugmeister has advice to help navigate these tricky waters.

  • HIPAA Audit Prep and Breach Prevention

    06/01/2012

    One good way to prepare for a HIPAA compliance audit is to read a recent government report that identified vulnerabilities that could lead to breaches, says attorney Timothy McCrystal.

  • HIPAA Audits: A Guidance Source

    06/01/2012

    One good way to prepare for a HIPAA compliance audit is to read a recent government report that identified vulnerabilities discovered in seven audits, says attorney Timothy McCrystal.

  • Automation with a Dash of Humanity

    03/01/2012

    As organizations move to the continuous monitoring of their IT systems to assure they're secure, they rely much more on automated processes. But don't forget the role people play.

  • BYOD: Manage the Risks

    29/12/2011

    It's not a question of if employees will bring their own mobile devices to work and connect to your systems. It's a matter of when. But the benefits of BYOD outweigh the risks, says Malcolm Harkins, CISO of Intel.

  • Complexity Is Major Info Risk Challenge

    29/12/2011

    Complexity is among the most significant information risk management challenges organizations face at the dawn of the new year.

  • 2012 Fraud-Fighting Agenda

    20/12/2011

    Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.

  • Hannaford Breach Ruling: What it Means

    16/12/2011

    A federal appeals court has ruled in favor of victims of the 2007 Hannaford data breach. Attorney Ronald Raether explains the ruling and what it potentially means to future breached entities and their customers.

  • Risk Awareness: What Do CEOs Need to Know?

    15/12/2011

    If management awareness of information security issues increases, will an organization's commitment to securing practices and policies also increase? This is the question answered by an eye-opening new study.

  • AHIMA CEO Tackles Privacy Challenges

    14/12/2011

    The lack of uniformity in federal and state privacy and security requirements is creating major challenges for health information managers attempting to comply, says Lynne Thomas Gordon, the new CEO of the American Health Information Management Association.

  • Privacy Advocate Frustrated By Inertia

    09/12/2011

    Deven McGraw, co-chair of the Privacy and Security Tiger Team that's advising federal healthcare regulators, explains why she's frustrated by delays in rolling out new regulations to protect electronic health records and safeguard the exchange of patient information.

  • Breach Notification Planning Tips

    08/12/2011

    Healthcare organizations should carefully document all necessary breach investigation and notification actions and responsibilities to avoid chaos when an incident occurs, says Dawn Morgenstern, privacy official at the Walgreens national drugstore chain.

  • Making Web Applications Secure

    08/12/2011

    Vulnerabilities in applications developed for the Commonwealth of Pennsylvania contributed to a major security breach a few years back, one that state CISO Erik Avakian does not want repeated.

  • Fighting Fraud: Deputize the Consumer

    06/12/2011

    Customers want to be involved with their banking security, but few institutions allow them to play active roles in fraud prevention. What has to change?

  • Organizing a Breach Notification Team

    05/12/2011

    It's one thing to have a data breach response team. It's quite another to ensure that team is made up of savvy personnel, says Brian Dean, a former privacy executive for KeyBank.

  • For Clinics, Privacy Training Is Key

    02/12/2011

    Physician group practices, many of which are adopting their first electronic health record system, need to make staff training on privacy and security issues a top priority, says Susan Turney, M.D., the new CEO at the Medical Group Management Association.

  • Breach Response: Reputational Risk

    30/11/2011

    Data breaches are all about reputational risk, says attorney Lisa Sotto. And as legal requirements grow, attorneys must play increasingly integral roles in helping clients respond to incidents.

  • HIPAA Rules Delay Creates Challenges

    28/11/2011

    The ongoing delay in the release of final versions of HIPAA modifications and the HIPAA breach notification rule makes it more difficult for healthcare organizations to set information security investment priorities, says hospital privacy officer Kari Myrold.

page 139 from 144