At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand.
"We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate...
Organizations allocating security budgets often place their efforts into areas that have no impact on business processes. That's one takeaway CTO Dwayne Melancon sees when evaluating the state of risk management today.
Increasingly, security and risk issues have the attention of boards of directors. What are the keys to discussing these topics with the board? John South, CSO of Heartland Payment Systems, shares tips.
"Clearly, the market has not developed ... on its own the cybersecurity requirements," John Brennan says. "Of course, if it did, then we wouldn't have these intrusions and the billions of dollars of losses that companies are now writing off."
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
Google will pay $22.5 million to settle FTC charges that it misrepresented its privacy promises to Apple Safari users. The fine is the largest penalty the FTC has ever obtained for violation of one of its orders.