Joy Pritts of the Office of the National Coordinator for Health IT says the office intends to develop standards that would give patients the ability to exclude clinicians from accessing certain portions of their electronic health records.
In the initial wake of Japan's devastating earthquake and subsequent tsunami, business continuity plans have been tested, and organizations now are dealing with severe aftershocks and a growing national crisis, says Alan Berman, executive director of DRI International.
RSA Conference 2011 was held recently, and Information Security Media Group was on hand to participate in the event in several unique ways. Check out our exclusive video interviews with industry thought-leaders, as well as our "Faces of Fraud" briefing.
The Defense Department hopes to prevent future WikiLeaks-style breaches by employing public key infrastructure-based controlled access cards, but that solution won't be fully in place until mid-2013, DoD CIO Teresa Takai says.
Deven McGraw, co-chair of the Privacy and Security Tiger Team that's advising federal regulators, offers insights on how the team's recommendations might be implemented and what topics it will tackle next.
Banking/security leaders aren't crazy about banking regulators telling them they could have done a better job detecting ACH fraud, and they're eager for more specific guidance on what to do going forward.
The overall goal of the guidance is to achieve appropriate security assurance for multiple applications by efficiently verifying the claimed identity of individuals seeking physical access to federally controlled government facilities and electronic access to government information systems.
The United States Naval Academy is revising its core curriculum and will require midshipmen, beginning with the incoming freshman class entering Annapolis this summer, to take at least two cybersecurity courses during their four years at the school.