Journal Online. Impact of Security Awareness Training Components on Perceived Security Effectiveness. Do you have something to say about this article?

Size: px
Start display at page:

Download "Journal Online. Impact of Security Awareness Training Components on Perceived Security Effectiveness. Do you have something to say about this article?"

Transcription

1 Journal Online Impact of Security Awareness Training Components on Perceived Security Effectiveness Karen Quagliata, Ph.D., PMP, has worked in the IT field for more than 10 years in diverse capacities. Quagliata currently works within the financial services industry as an information security analyst, specializing in risk management. In addition, she is a published author in various industry publications. Do you have something to say about this article? Visit the Journal pages of the ISACA web site ( find the article, and choose the Comments tab to share your thoughts. Weakest link and unpredictable : To an information security practitioner, these descriptions almost certainly identify the human component of a layered security approach because humans are unpredictable animals who are susceptible to temptation, emotions and complacency. After all, the strongest firewall and the most sophisticated intrusion detection/prevention software will not prevent an individual from disclosing sensitive data via social engineering. In fact, the recent data breach at RSA, the security division of EMC Corp., is proof. In this breach, the attackers were able to gather information about the company s SecurID two-factor authentication products through a phishing attack. The attackers sent a Microsoft Excel file via to employees, and at least one employee opened the file, thus opening the door to the attack. Therefore, the breach was not a technology problem, but a human problem. 1 It is no wonder that, for many years, information security professionals have been touting the importance of providing security awareness training within an organization. However, no research has been conducted to determine the most effective components of a security awareness training program. Professionals say to do it, but they do not say how to do it. To address this lack of research in the area of security awareness components, research was conducted for the doctoral program at the University of Fairfax (Vienna, Virginia, USA) to examine the relationship of user awareness training components and perceived security effectiveness. The research extended the work of Kenneth Knapp, who, in 2005, addressed the questions of the relationship of top management support on perceived security effectiveness and the constructs that mediate that relationship. Knapp examined four mediating variables: user training, security culture, policy relevance and policy enforcement. 2 Based on the findings of his research, it was concluded that, of the four mediating variables that he identified, user training had the strongest relationship between the independent variable of top management support and the dependent variable of security effectiveness. The purpose of this research, then, was to focus on the relationship between user training and security effectiveness. PROJECT OBJECTIVES The purpose of this study is to help organizations increase their chances of implementing effective security awareness training by identifying the best possible set of user awareness training variables. Using a survey, IT professionals perceptions of security effectiveness within their organizations were measured based on their attitudes toward: 1. Frequency of user awareness training 2. Method of user awareness training 3. User awareness training compliance monitoring RESEARCH APPROACH AND METHODOLOGY An anonymous survey was used as the data collection tool. The survey used a five-point Likert scale to measure the participants attitudes toward components of their organizations security awareness trainings and the security effectiveness within their organizations. The research was driven by three questions: 1. What is the relationship between training frequency and perceived security effectiveness as measured by the survey? 2. What is the relationship between training delivery method and perceived security effectiveness as measured by the survey? 3. What is the relationship between training compliance monitoring and perceived security effectiveness as measured by the survey? Validity of the survey was addressed by using a panel-of-experts approach. A peer review/ ISACA JOURNAL VOLUME 4,

2 Read Creating a Culture of Security. field trial was conducted during the period of 31 July 2009 and 8 September 2009, using a 10-person expert panel that consisted of ISACA members from the St. Louis (Missouri, USA) and Illinois (USA) chapters. Surveys were sent to the expert panel via with a cover letter that explained the proposed research project and that asked the following questions: 3 Is the content of the questionnaire appropriate for the audience? Are the survey items clear, and do they make sense? Are any of the survey items intrusive, invasive, potentially embarrassing or of a sensitive nature? Feedback was received via and incorporated into the survey as deemed appropriate; for the most part, changes were minor. Reliability of the survey was measured using a test-retest sequence administered to a pilot study panel of nine ISACA members who did not participate in the expert panel. The pilot study occurred during the period of 24 November 2009 and 12 January The survey was loaded into an online survey web site, and members of the pilot study were randomly assigned a number from one to nine. The panel was then sent an that instructed the participants to complete the survey on the online survey web site. The first phase of the test-retest sequence occurred between 24 November 2009 and 3 December The content and wording of the questions were not altered for the retest phase, but the questions were randomly reordered. On 21 December 2009, another was sent to the panel, instructing participants to complete the survey again. The final phase of the pilot study was completed on 12 January The results were downloaded into Statistical Package for the Social Sciences (SPSS) software for analysis. The expected outcome of the test-retest sequence was that there would be little or no significant difference between the results of test and retest data. One question did show significant difference and was, therefore, removed from the final survey. Upon completion of the pilot study, the final version of the survey was created for the online survey web site. The link to the survey was sent via to all ISACA chapter presidents for distribution and to the ISACA headquarters for posting on its web site. The link was also posted on ISACA social and professional networking sites. The survey remained accessible on the survey web site between 1 March 2010 and 31 March The data were then analyzed. ISACA was chosen as the research site because the international professional association is comprised of a balanced mix of various levels of IT professionals working in multiple industries and in various capacities. IT professionals, rather than regular employees, were chosen for the research because they are A debate exists within the IT community regarding the measurement of perceived security effectiveness. more aware of IT security issues and are a more homogeneous group. Presenting the survey to the random public would have likely resulted in more inconclusive findings because of the heterogeneity of such a large group. By the same token, limiting the survey to one industry or organization would have limited the scope of the research. As Knapp points out in his research, a debate exists within the IT community regarding the measurement of perceived security effectiveness. The elusive nature of the term effectiveness, coupled with the sensitive nature of asking an organization to measure its security, poses a challenge to developing a common industry definition. 4 Richard A. Caralli elaborates on the challenging aspect of defining security effectiveness by pointing out that security is contextual and not an isolated discipline; it depends on the organization and its operations. Furthermore, effective security must take into account the dynamically changing risk environment within which most organizations are expected to survive and thrive. 5 As such, Knapp did not attempt to establish a definition for security effectiveness for his research. Instead, the perceived effectiveness variable in his study was based on the subjective judgment of security professionals. 6 As this research extended Knapp s, it also based security effectiveness on the subjective judgment of security professionals. 2 ISACA JOURNAL VOLUME 4, 2011

3 RESPONDENTS A total of 133 ISACA members, representing multiple industries, participated in the survey. The largest percentage (26 percent) of the respondents worked in the finance, banking and insurance industry. Government and professional services were the two second most popular industries. Nonprofit and industrial technology had the least representation at 1 percent each. The participants represented multiple countries, albeit the majority of participants were from the United States (73 percent). Other countries represented included: India (17 percent), Costa Rica (5 percent), Australia (2 percent), Belgium (2 percent) and China (1 percent). The majority of participants (60 percent) reported that information security is a secondary responsibility of their jobs. This is understandable considering that the majority of the participants (43 percent) identified themselves as audit professionals. Information security professional ranked third at 12 percent. The majority of respondents (89 percent) held at least one professional certification. Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional (CISSP) were the most common. Other popular certifications included Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT), Certified Internal Auditor (CIA) and Certified Public Accountant (CPA). SURVEY RESULTS Six key findings came out of this research, which can be categorized as: 1. Overall security effectiveness 2. Training frequency 3. Training methodology 4. Training compliance monitoring 5. Training topics 6. Relationships Overall Security Effectiveness The first finding is related to security effectiveness as indicated by how participants ranked their agreement to the survey statement: My organization secures its data and information effectively. Overall, the majority of participants agree that their organizations secure their data and information effectively. However, the majority of those participants do not strongly agree. Only 22 percent strongly agreed that their organization secures its data and information effectively. Close behind are those respondents who were neutral on the subject (20 percent). However, the majority of respondents (42 percent) did agree that their organization secures its data and information effectively. While positive overall, these numbers also show that 36 percent of those surveyed believe that their organization is either not effectively securing its data or were neutral on the subject. Clearly, there is room for improvement. Training Frequency The majority of organizations (50 percent) represented in this research deliver user security awareness training once a year. However, only 24 percent of the organizations delivered training more than once a year, and 17 percent delivered the training during new employee orientation only. An even smaller portion of the organizations either delivered it on a voluntary basis only or never. When training frequency was cross-tabulated with perceived security effectiveness, the once a year category had the highest rate of participants who strongly agreed that their organization secures its data and information effectively. The more than once a year category follows closely. However, the other categories have little to no instances of participants strongly agreeing. It would appear that the fewer times employees are exposed to user security awareness training, the less likely they will be to view their organizations as effectively securing data. Training Methodology According to the survey, the majority of organizations (69 percent) use some combination of methods to deliver training, vs. the 4 percent of participants who reported that their organizations used all of the methods listed in the survey. Those organizations that depend solely on policies and procedures as user security awareness training made up the next highest majority (8 percent). Only a small portion of the respondents answered that their organizations used only one training method (other than policies and procedures) to deliver user security awareness training. When training method was cross-tabulated with perceived security effectiveness, the combination of methods category had the highest rate of participants who strongly agreed ISACA JOURNAL VOLUME 4,

4 that their organizations secure their data and information effectively. The computer-based training only category was ranked second. However, the other categories have little to no instances of participants strongly agreeing. It would appear that employees exposed to only one type of user security awareness training methodology were less likely to view their organizations as effectively securing their data. Training Compliance Monitoring The concept of training compliance monitoring is that organizations verify that their employees are satisfying the security training requirements, retaining that knowledge and implementing it in the workplace. The research data showed that training compliance monitoring was the second best predicator for perceived security effectiveness. This variable was analyzed from two perspectives: how and how often the compliance monitoring was conducted. The majority of respondents (38 percent) indicated that their organizations use electronic sign-off as the only means for training compliance monitoring. The next highest group of respondents (20 percent) stated that their organizations use a combination of methods for training compliance monitoring. Another 20 percent stated that their organizations use no training compliance monitoring methods. Those respondents whose organizations use only electronic sign-off for training compliance monitoring are the largest group to strongly agree that their organizations effectively secure their data. Those respondents whose organizations use a combination of methods for training compliance monitoring are the second largest group to strongly agree that their organizations effectively secure their data. Clearly, participants from organizations that use other methods (such as verbal tests or monitoring tools) or no methods at all are the least likely to strongly agree that their organizations effectively secure their data. The majority of respondents (34 percent) indicated that their organizations conduct training compliance monitoring once a year. The next highest group of respondents (22 percent) stated that their organizations conduct training compliance monitoring more than once a year. Another 22 percent stated that their organizations never conduct training compliance monitoring. It is interesting that 16 percent of the respondents stated that they did not know how often training compliance monitoring was conducted. This raises the question: Do the organizations conduct the monitoring in such a way that employees do not know about it, or is it that the respondents were confused by the question on the survey? Those respondents whose organizations conduct training compliance monitoring once a year are the largest group to strongly agree that their organizations effectively secure their data. Those respondents whose organizations conduct training compliance monitoring more than once a year are the second largest group to strongly agree that their organizations effectively secure their data. Clearly, participants from organizations that conduct training compliance monitoring only when new access is granted to a system, or that do not conduct training compliance monitoring at all, are the least likely to strongly agree that their organizations effectively secure their data. Training Topics The next area of findings concerns the material that organizations are teaching their employees regarding security awareness. As seen in figure 1, the most popular security awareness training topic pertains to . Passwords and Internet usage are close behind. However, topics such as social engineering and data encryption appear closer to the bottom of the list. Figure 1 User Awareness Training Topics Security Awareness Training Topics Count 86 Passwords 83 Internet use 80 Locking workstations 74 Privacy 72 Data handling/classification 68 Social engineering 66 All of the topics listed 53 Network security 47 Data encryption 35 No user awareness security training is conducted. 8 I do not know. 2 4 ISACA JOURNAL VOLUME 4, 2011

5 Security awareness training topics were cross-tabulated with perceived security effectiveness. Those respondents whose organizations covered all of the topics included in the survey are the largest group to strongly agree that their organizations effectively secure their data. The participants whose organizations included some combination of the topics listed in the survey are the second most likely to strongly agree that their organizations effectively secure their data. The respondents whose organizations covered only one topic in their training were the least likely to strongly agree that their organizations effectively secure their data. Relationships Finally, this research showed that there is a strong correlation between perceived security effectiveness and the components of training method and training compliance monitoring. However, the relationship between training frequency and perceived security effectiveness was inconclusive. Therefore, it can be concluded that training method and training compliance monitoring are the strongest predictors for security effectiveness. IMPLICATIONS Results of this research can provide practical guidance to information security practitioners and those setting the policies within organizations. Four main implications can be surmised based on this study. Provide Training at Least Once a Year Findings showed that those respondents whose organizations provided training once a year had the highest rate of strongly agreeing that their organizations secure their data effectively. Participants from organizations that provided training more than once a year did not greatly improve their numbers. Employ Multiple Training Methods In addition, based on the findings of this research, training method appears to have the biggest impact on perceived security effectiveness; furthermore, the use of multiple methods of training produced the highest correlations to perceived security effectiveness. As such, organizations should consider focusing resources on training methodology. They should strive to combine various tools, including: Computer-based training Policies and procedures Newsletters Leader-led training Video Posters Brochures Ensure Compliance This research also showed that training compliance monitoring had a strong relationship with perceived security effectiveness. It is not enough for organizations to merely implement a security awareness training program. Policy makers within organizations should strive to better monitor the training for compliance; equally important is that they ensure consequences are in place for noncompliance. As one survey respondent stated, Training sessions are performed annually, and attendance and understanding are monitored. However, no action is taken that I know if someone does not participate in the training. It is just reported to management. Respondents from a recent Enterprise Strategy Group survey stated that training users on confidential data security policies was the most important measure for protecting proprietary information. 7 Yet, only 36 percent of government workers are held accountable for knowing information security policies and procedures via their annual performance evaluation. In addition, only 48 percent were tested throughout the year on what they learned in awareness training. 8 Therefore, while it is important for leadership to monitor employees for adherence to policies, it should not be performed only once a year. Such monitoring should be an ongoing occurrence, especially considering that some public-sector studies have shown that more than 80 percent of breaches occur not because of malicious intent, but because employees claim not to know about a policy or because they simply ignored it. 9 Teach Relevant Topics This research revealed that topics such as social engineering and data encryption appeared at the bottom half of the list of the most popular training awareness topics within the organizations of the respondents. However, current data breach information is proving these to be critical areas. For example, social engineering attacks continue to grow. In fact, phishing, a social engineering technique, is included in the 2009 Verizon Business Supplemental Data Breach Report s ISACA JOURNAL VOLUME 4,

6 top 15 most common security attacks. 10 Furthermore, encryption is also playing a more critical role when one considers that lost/stolen laptops, smartphones and removable storage devices are contributing factors to data breaches. In fact, according to a 2009 Ponemon Institute study, 36 percent of all data breach cases examined involved lost or stolen laptop computers or other mobile devices. These types of data breaches tend to be more expensive than other incidents, costing approximately US $225 per victim. 11 As such, practitioners should develop security awareness training that places more emphasis on these relevant topics. CONCLUSION Security awareness training alone will not secure an organization, just as technical solutions alone will not secure an organization. Although individuals are taught the secure way to interact with data, they may not always follow that training. Clearly, information security must involve a layered approach that includes both technical and nontechnical solutions. Security awareness training is a vital nontechnical component to information security. As such, it is in the interest of the public and private sectors to continue to research this component that directly impacts security s weakest link: humans. ENDNOTES 1 Westervelt, Robert; RSA SecurID Breach Began With Spear Phishing Attack, SearchSecurity.com, 4 April 2011, com/news/article/0,289142,sid14_gci ,00. html?track=nl-102&ad=824622&asrc=em_ NLN_ &uid= Knapp, Kenneth Joseph; A Model of Managerial Effectiveness in Information Security: From Grounded Theory to Empirical Test, dissertation, Auburn University, USA, 2005, handle/10415/708/knapp_kenneth.pdf?sequence=3 3 Lease, D.R.; Factors Influencing the Adoption of Biometric Security Technologies by Decision Making Information Technology and Security Managers, dissertation, Capella University, USA, Op cit, Knapp 5 Caralli, Richard A.; Managing for Enterprise Security, Carnegie Mellon University, USA, 2004, reports/04tn046.pdf 6 Op cit, Knapp 7 Berrong, Stephanie; Creative Approaches to Security Awareness Training, Security Management, July SecureInfo Corp., Information Security Awareness Report: The Government Workers Perspective, USA, 2007, InfoSec-Report-Dec-2007.pdf 9 Government Security, Study Shows Fed Workers in Dark About Security, 31 May 2007, com/news/fed-workers-in-dark/ 10 Verizon Business, Verizon Business Issues 2009 Supplemental Data Breach Report Profiling 15 Most Common Attacks, PR Newswire, 9 December 2009, issues-2009-supplemental-data-breach-report-profiling-15- most-common-attacks html 11 Ponemon Institute, 2009 Annual Study: Cost of a Data Breach, PGP Corp., USA, January 2010 The ISACA Journal is published by ISACA. Membership in the association, a voluntary organization serving IT governance professionals, entitles one to receive an annual subscription to the ISACA Journal. Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance Institute and their committees, and from opinions endorsed by authors employers, or the editors of this Journal. ISACA Journal does not attest to the originality of authors content ISACA. All rights reserved. Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St., Salem, MA 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25 per page. Send payment to the CCC stating the ISSN ( ), date, volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without express permission of the association or the copyright owner is expressly prohibited. 6 ISACA JOURNAL VOLUME 4, 2011

Information security governance has become an essential

Information security governance has become an essential Copyright 2007 ISACA. All rights reserved. www.isaca.org. Developing for Effective John P. Pironti, CISA, CISM, CISSP, ISSAP, ISSMP Information security governance has become an essential element of overall

More information

Feature. Log Management: A Pragmatic Approach to PCI DSS

Feature. Log Management: A Pragmatic Approach to PCI DSS Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who

More information

IT Governance and Outsourcing

IT Governance and Outsourcing Copyright 2004 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. IT Governance and Outsourcing By Hugh Parkes, CISA, FCA is a subset of corporate governance. It refers

More information

While Microsoft Access database is not an enterprise

While Microsoft Access database is not an enterprise Copyright 2006 ISACA. All rights reserved. www.isaca.org. Important, But Often Dismissed: Internal Control in a Microsoft Access Database By John H. White, Ph.D., CISA, CPA While Microsoft Access database

More information

This article describes the history of the Payment Card

This article describes the history of the Payment Card Copyright 2007 ISACA. All rights reserved. www.isaca.org. Achieving Compliance With the PCI Data Security Standard By Alex Woda, CISA, QDSP, QPASP This article describes the history of the Payment Card

More information

With the dawn of the 21st century, a new era of

With the dawn of the 21st century, a new era of Copyright 2007 ISACA. All rights reserved. www.isaca.org. Auditing CMMI Maturity and Sarbanes-Oxley Compliance By Laurent Janssens, CISA, and Peter Leeson With the dawn of the 21st century, a new era of

More information

How To Become A Security Professional

How To Become A Security Professional Journal Online Jason Andress, Ph.D., CISM, CISSP, GPEN, ISSAP, is a seasoned security professional with experience in the academic and business worlds. In his present and previous roles, he has provided

More information

In recent years, information technology (IT) used by firms,

In recent years, information technology (IT) used by firms, Copyright 2003 Information Systems Audit and Control Association. All rights reserved. www.isaca.org. Impact of SAS No. 94 on Computer Audit Techniques By M. Virginia Cerullo, CPA, CIA, CFE, and Michael

More information

I ve been breached! Now what?

I ve been breached! Now what? I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have

More information

IT Security. Securing Your Business Investments

IT Security. Securing Your Business Investments Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1

Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS

More information

4 Steps to Better Security In The BYOD Era For Your Company.

4 Steps to Better Security In The BYOD Era For Your Company. 4 Steps to Better Security In The BYOD Era For Your Company. Research & Analysis by: Q Kensington Security Survey 2014 Our 2014 survey of more than 500 IT Managers found that: 44% of organizations suffered

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

Social Networking and its Implications on your Data Security

Social Networking and its Implications on your Data Security Social Networking and its Implications on your Data Security Canadian Chamber of Commerce of the Philippines June 8, 2011 Warren R Bituin Partner -SGV & Co. About the Speaker Warren R. Bituin SGV & Co./Ernst

More information

Security Transcends Technology

Security Transcends Technology INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP Paul.Wang@ch.pwc.com

More information

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor

Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor IT Audit/Security Certifications Kevin Savoy, CPA, CISA, CISSP Director of Information Technology Audits Brian Daniels, CISA, GCFA Senior IT Auditor Certs Anyone? There are many certifications out there

More information

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards

More information

About the Presenter About the Cloud Security Alliance Guidance 1.0 Getting Involved Call to Action

About the Presenter About the Cloud Security Alliance Guidance 1.0 Getting Involved Call to Action Governance, Risk Management, Compliance, & Audit An Overview of Cloud Security Alliance s Security Guidance for Critical Areas of Focus in Cloud Computing July 23, 2009 Agenda About the Presenter About

More information

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and

More information

Please feel free to call on our organizations if we can be of assistance in any way on further deliberations, task forces or committees.

Please feel free to call on our organizations if we can be of assistance in any way on further deliberations, task forces or committees. 17 May 2012 International Internal Audit Standards Board Via e-mail: Lily.Bi@theiia.org Re: Definition of Internal Auditing Ms. Lily Bi, CIA, CISA, CGEIT Director, Standards and Guidance The Institute

More information

Better secure IT equipment and systems

Better secure IT equipment and systems Chapter 5 Central Services Data Centre Security 1.0 MAIN POINTS The Ministry of Central Services, through its Information Technology Division (ITD), provides information technology (IT) services to government

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Data Breach Lessons Learned. June 11, 2015

Data Breach Lessons Learned. June 11, 2015 Data Breach Lessons Learned June 11, 2015 Introduction John Adams, CISM, CISA, CISSP Associate Director Security & Privacy 410.707.2829 john.adams@protiviti.com Powerful Insights. Proven Delivery. Kevin

More information

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer Risks and Rewards of the Internet of Things Findings From ISACA s 2013 IT Risk/Reward Barometer The world is increasingly being populated by connected devices that collect and share information over the

More information

University System of Maryland University of Maryland Biotechnology Institute

University System of Maryland University of Maryland Biotechnology Institute Audit Report University System of Maryland University of Maryland Biotechnology Institute August 2006 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

Veson Nautical Website Privacy Policy

Veson Nautical Website Privacy Policy Veson Nautical Website Privacy Policy Veson Nautical Corporation (including its affiliated companies, Veson, we, or us ) has created this Privacy Policy ("Policy") in order to provide you with information

More information

Training Employees to Recognise & Avoid Advanced Threats

Training Employees to Recognise & Avoid Advanced Threats Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session

More information

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against

More information

Feature. A Higher Level of Governance Monitoring IT Internal Controls. Controls tend to degrade over time and between audits.

Feature. A Higher Level of Governance Monitoring IT Internal Controls. Controls tend to degrade over time and between audits. Feature A Higher Level of Governance Monitoring IT Internal Controls Mike Garber, CGEIT, CIA, CITP, CPA, has many years experience as both director for IT governance and as IT audit director for Motorola

More information

Application for CISM Certification

Application for CISM Certification Application for CISM Certification 4/2015 Requirements to Become a Certified Information Security Manager become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Office Hours: By Appointment COURSE DESCRIPTION AND LEARNING GOALS

Office Hours: By Appointment COURSE DESCRIPTION AND LEARNING GOALS NYU Stern School of Business Summer 2012 ACCT- GB.6215 - IT Auditing Professor: Joel Lanz Tel: 516-933-3662 Office Hours: By Appointment email: TBD Course Website: Blackboard COURSE DESCRIPTION AND LEARNING

More information

State of the Phish 2015

State of the Phish 2015 Introduction The threat is real Phishing continues to pose a growing threat to the security of industries of every kind from financial organizations to government contractors to healthcare firms. Though

More information

Security Defense Strategy Basics

Security Defense Strategy Basics Security Defense Strategy Basics Joseph E. Cannon, PhD Professor of Computer and Information Sciences Harrisburg University of Science and Technology Only two things in the water after dark. Gators and

More information

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services Introduction Patient privacy has become a major topic of concern over the past several years. With the majority of

More information

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services Introduction Patient privacy continues to be a chief topic of concern as technology continues to evolve. Now that the majority

More information

Application for CISA Certification

Application for CISA Certification Application for CISA Certification 4/2015 Requirements to Become a Certified Information Systems Auditor become a Certified Information Systems Auditor (CISA), an applicant must: 1. Score a passing grade

More information

Western Australian Auditor General s Report. Information Systems Audit Report

Western Australian Auditor General s Report. Information Systems Audit Report Western Australian Auditor General s Report Information Systems Audit Report Report 10 June 2012 Auditor General s Overview The Information Systems Audit Report is tabled each year by my Office. It summarises

More information

13. Acceptable Use Policy

13. Acceptable Use Policy To view the complete Information and Security Policies and Procedures, log into the Intranet through the IRSC.edu website. Click on the Institutional Technology (IT) Department link, then the Information

More information

Government Worker Privacy Survey. Improper Exposure of Official Use, Sensitive, and Classified Materials

Government Worker Privacy Survey. Improper Exposure of Official Use, Sensitive, and Classified Materials Government Worker Privacy Survey Improper Exposure of Official Use, Sensitive, and Classified Materials 1 Introduction Data privacy is a growing concern for the US government as employees conduct business

More information

By using our website, you agree that we can place these types of cookies on your device.

By using our website, you agree that we can place these types of cookies on your device. COOKIE NOTICE: We may employ cookie technology, web beacons, transparent GIF images, and similar devices to facilitate website administration and navigation, to better understand and improve the effectiveness

More information

Cyber Exploits: Improving Defenses Against Penetration Attempts

Cyber Exploits: Improving Defenses Against Penetration Attempts Cyber Exploits: Improving Defenses Against Penetration Attempts Mark Burnette, CPA, CISA, CISSP, CISM, CGEIT, CRISC, QSA LBMC Security & Risk Services Today s Agenda Planning a Cyber Defense Strategy How

More information

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services Page 2 of 8 Introduction Patient privacy has become a major topic of concern over the past several years. With the majority

More information

Employees Speak Up About Their Mobile Devices in the Office

Employees Speak Up About Their Mobile Devices in the Office A COALFIRE PERSPECTIVE Employees Speak Up About Their Mobile Devices in the Office And what it means for BYOD security By Mike Weber and Christopher Lietz Coalfire July, 2012 DALLAS DENVER LOS ANGELES

More information

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

Information Security Skills: A Comparison Of What Is Used And What Is Taught

Information Security Skills: A Comparison Of What Is Used And What Is Taught 1 Information Security Skills: A Comparison Of What Is Used And What Is Taught Albert L. Fundaburk SH 239 Bloomsburg University Bloomsburg, PA 17815 Ph. (570) 389-9621 Fax (570) 389-3892 Email afundabr@bloomu.edu

More information

How One Smart Phone Picture Can Take Down Your Company

How One Smart Phone Picture Can Take Down Your Company SESSION ID: HUM-R04 How One Smart Phone Picture Can Take Down Your Company Dr. Larry Ponemon Chairman and Founder Ponemon Institute @Ponemon Have You Ever Felt Wandering Eyes Over Your Shoulder? Username:

More information

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Ed McMurray, CISA, CISSP, CTGA CoNetrix Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats

More information

Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision.

Experienced professionals may apply for the Certified Risk Management Professional (CRMP) certification under the grandfathering provision. Application for CRMP Certification (part 1) GRCSI is now offering the Certified Risk Management Professional (CRMP) certification to support and recognize professionals who have skills and experience in

More information

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

includes Governance-level Framework (COSO) informs drives influences IT Governance-level Framework (COBIT) Internal Controls informs influences

includes Governance-level Framework (COSO) informs drives influences IT Governance-level Framework (COBIT) Internal Controls informs influences Journal Online Robbie Sauerberg is a digital sales planner at Wired in New York (New York, USA). Previously, he was a strategic planning intern for Hewlett- Packard at its Cupertino campus in Silicon Valley

More information

Brainloop Cloud Security

Brainloop Cloud Security Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

2 0 1 4 F G F O A A N N U A L C O N F E R E N C E

2 0 1 4 F G F O A A N N U A L C O N F E R E N C E I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 raj.patel@plantemoran.com This presentation will discuss current threats faced by public institutions,

More information

HIPAA: Compliance Essentials

HIPAA: Compliance Essentials HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY

THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY THE RICE MARKETING BOARD FOR THE STATE OF NEW SOUTH WALES RESPONSIBLE COMPUTING POLICY Version Author Date Approved by Board 2009-1 Gillian Kirkup 24 March 2010 Page 1 of 8 THE RICE MARKETING BOARD FOR

More information

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1

HIPAA COMPLIANCE AND DATA PROTECTION. sales@eaglenetworks.it +39 030 201.08.25 Page 1 HIPAA COMPLIANCE AND DATA PROTECTION sales@eaglenetworks.it +39 030 201.08.25 Page 1 CONTENTS Introduction..... 3 The HIPAA Security Rule... 4 The HIPAA Omnibus Rule... 6 HIPAA Compliance and EagleHeaps

More information

Missouri Student Information System Data Governance

Missouri Student Information System Data Governance Nicole R. Galloway, CPA Missouri State Auditor ELEMENTARY AND SECONDARY EDUCATION Missouri Student Information System Data Governance October 2015 http://auditor.mo.gov Report No. 2015-093 Nicole R. Galloway,

More information

Certification Candidate Handbook

Certification Candidate Handbook Certification Candidate Handbook The Certification Candidate Management System (CCMS) User Guide details the process from beginning to end, program requirements, what to expect at the testing center, how

More information

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module. Information Security Awareness Training Course Outline Module 1 Information security risks 1. explain what information security means. 2. define the four aspects of information security. 3. understand

More information

Risk Management Frameworks

Risk Management Frameworks Effective Security Practices Series Driven by a wave of security legislation and regulations, many IT risk management frameworks have surfaced over the past few years. These frameworks attempt to help

More information

White Paper. From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards

White Paper. From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards Abstract HIPAA requires a number of administrative, technical, and physical safeguards to protect patient information

More information

2010 Data Breach Prevention and Response:

2010 Data Breach Prevention and Response: (DLP and SIEM) June 2010 Audience: Financial institutions, credit and debit card issuers, card networks, security vendors, DLP vendors, SIEM vendors, healthcare organizations, merchants. Author: Robert

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

Internet usage Policy

Internet usage Policy Internet usage Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is

More information

Montclair State University. HIPAA Security Policy

Montclair State University. HIPAA Security Policy Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that

More information

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201

Network Detective. HIPAA Compliance Module. 2015 RapidFire Tools, Inc. All rights reserved V20150201 Network Detective 2015 RapidFire Tools, Inc. All rights reserved V20150201 Contents Purpose of this Guide... 3 About Network Detective... 3 Overview... 4 Creating a Site... 5 Starting a HIPAA Assessment...

More information

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800

PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 PRAIRIE SPIRIT SCHOOL DIVISION NO. 206, BOX 809, 121 KLASSEN STREET EAST, WARMAN, SK S0K 4S0 -- PHONE: (306) 683-2800 ADMINISTRATIVE POLICY NO. 511 IMPLEMENTATION JANUARY 2014 EMPLOYEE ACCEPTABLE USE POLICY

More information

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com

7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com 7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information

More information

Enabling Information PREVIEW VERSION

Enabling Information PREVIEW VERSION Enabling Information These following pages provide a preview of the information contained in COBIT 5: Enabling Information. The main benefit of this publication is that it provides COBIT 5 users with a

More information

Computer Security Log Files as Evidence

Computer Security Log Files as Evidence Product Evaluation: ArcSight ESM www.kahnconsultinginc.com Computer Security Log Files as Evidence An Evaluation of ArcSight ESM I. Executive Summar y It is the opinion of Kahn Consulting, Inc., that ArcSight

More information

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss Commissioned Study SURVEY: Web Threats Expose Businesses to Data Loss Introduction Web-borne attacks are on the rise as cybercriminals and others who do harm to computer systems for profit or malice prey

More information

Brown Smith Wallace, LLC

Brown Smith Wallace, LLC Brown Smith Wallace, LLC Successful Software Selection Whitepaper Series How to Adhere to Payment Card Industry Data Security Standards By Ron Schmittling, CPA/CITP, QSA, CISA, CIA To learn more about

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Huseman Health Law Group 3733 University Blvd. West, Suite 305-A Jacksonville, Florida 32217 Telephone (904) 448-5552 Facsimile (904) 448-5653

Huseman Health Law Group 3733 University Blvd. West, Suite 305-A Jacksonville, Florida 32217 Telephone (904) 448-5552 Facsimile (904) 448-5653 Huseman Health Law Group 3733 University Blvd. West, Suite 305-A Jacksonville, Florida 32217 Telephone (904) 448-5552 Facsimile (904) 448-5653 rusty@husemanhealthlaw.com use e Health care law firm fighting

More information

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical

More information

Farmers Savings Bank & Trust Online Banking Agreement

Farmers Savings Bank & Trust Online Banking Agreement Farmers Savings Bank & Trust Online Banking Agreement Must be 18-years or older to participate in the Online Banking General Terms This agreement (the Agreement ) made between you and us for accessing

More information

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE IT RESOURCES POLICY Effective December 15, 2008 State of Illinois Department of Central Management Services Bureau

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing

More information

Protocol for Exchange and Shared Responsibility for Institutional Data

Protocol for Exchange and Shared Responsibility for Institutional Data Information Technology Protocol for Exchange and Shared Responsibility for Institutional Data Table of Contents Preface... 1 Intended Audience and Scope... 1 Background... 2 The Goal Make Data Available

More information

A Contrarian Risk Management Perspective. Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM

A Contrarian Risk Management Perspective. Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM A Contrarian Risk Management Perspective Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM Introduction Nicole is a Senior Vice President of SunTrust Bank where she has spent six years of

More information

Two-Factor Authentication

Two-Factor Authentication Chen Arbel Vice President, Strategic Development Authentication Unit & Software DRM Aladdin Knowledge Systems Two-Factor Authentication The key to compliance for secure online banking Legal Notice Copyright

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

The detailed process of becoming a FIRST member is described at http://first.org/membership/.

The detailed process of becoming a FIRST member is described at http://first.org/membership/. FIRST Site Visit Requirements and Assessment Document originally produced by CERT Program at the Software Engineering Institute at Carnegie Mellon University And Cisco Systems PSIRT Revision When Who What

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

SAP White Paper Enterprise Mobility

SAP White Paper Enterprise Mobility SAP White Paper Enterprise Mobility Mobile Content and Document Management Best Practices and Decision Checklist Enterprise-Grade Solutions Give IT Much-Needed Security and Control Over Company Content

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING

G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING IS AUDITING GUIDELINE G13 USE OF RISK ASSESSMENT IN AUDIT PLANNING The specialised nature of information systems (IS) auditing and the skills necessary to perform such audits require standards that apply

More information

NATIONAL CYBER SECURITY AWARENESS MONTH

NATIONAL CYBER SECURITY AWARENESS MONTH NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

More information

Cyber Security: Software Security and Hard Drive Encryption

Cyber Security: Software Security and Hard Drive Encryption Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright

More information

Continuing Professional Education Policy

Continuing Professional Education Policy S E R V I N G I T G O V E R N A N C E P R O F E S S I O N A L S Continuing Professional Education Policy Revised: 2008 January Table of Contents Overview..................................2 Certification

More information