Every organization today needs a multi-layer security strategy to protect its enterprise from the multitude of cyber security threats that exist today; While one cannot underestimate the importance of an email security gateway, web filtering solution, or endpoint protection system, there is no question as to the prominence of an enterprise firewall.
The 2019 EXPO.health conference is focused on 5 main topic areas which are of interest to health IT professionals at hospitals, health systems, and ambulatory organizations
Four Chicago-area cybersecurity experts shared their thoughts with Crain’s on the ever-changing landscape, including what organizations can do to keep their workplaces, employees and customers safe with reasonable security strategies. Read the discussion.
NIST Cyber Security Risk Management Conference – Reasonable Risk. Our partner, Chris Cronin will be speaking with Phyllis Lee of the CIS (Center for Internet Security).
CAMPIT: Enterprise Risk / Security Management Conference Join us at this one day conference where attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.
Who is Responsible for a Data Breach or a Reasonable Security Strategy? “While accountability starts with the CEO and corporate board, cybersecurity is a shared responsibility across every function and level of an organization.”
Healthcare and Data Breaches. Click to view full image.
VULNERABILITY N+1. AUTHOR: Terry Kurzynski, CISSP, CISA, PCI QSA, ISO 27001 AUDITOR As Americans, we love lists. That fact is self-evident when browsing our favorite blog sites, as many blogs start out with catchy headlines like, “The Top 5 ______ (fill in the blank).” The love of lists is rooted deeply in our culture. We loved the […]
HALOCK is deep in the regulatory compliance and security field, so we sometimes take for granted that words common to us, like “HIPAA,” are still not clearly understood. So let’s take a moment to lay out the basics of HIPAA. For deeper coverage into the HIPAA Security Rule, take the “master class” here.