HC tech

Tips, Tools and Recommendations for Improving Healthcare Security

June 9, 2017 | Cyber Risk, Data & Cybersecurity, Health Insurance Portability and Accountability Act (HIPAA), Public Policy

In this series, Shared Assessments Steering Committee member Ken Peterson talks about managing cyber risk in the healthcare space. Q&A Series – Part 2 For the healthcare industry, let’s talk about third party risk management, who are the third parties here and what types of risk are ....

Comments Invited on Federal Banking Agency Enhanced Cyber Risk Management Standards

October 19, 2016 | Cyber Risk, Data, Data Protection, Office of the Comptroller of the Currency (OCC), Third Party Risk, Third Party Risk Management

The three federal banking regulatory agencies, the Federal Reserve Board, the Federal Deposit Insurance Corporation, and the Office of the Comptroller of the Currency, announced an advance notice of proposed rulemaking (ANPR) regarding enhanced cyber risk management standards for large and interconn ....

APTs: The Newer, Smarter, and Actually Successful Wile E. CoyoteAPT tools and methodologies

January 15, 2016 | Cyber Crime, Cyber Risk, Cyberattacks, Cybersecurity, Data & Cybersecurity, Tools & Templates

Remember the old Looney Tunes cartoons where Wile E. Coyote nearly destroys himself in attempt after fruitless attempt to capture the Road Runner? The Road Runner seems to have a sixth sense when a trap is sprung across his path and always escapes unscathed. Well, when it comes to cyber attacks, ....

Do Certain Companies Need A Security Committee?

October 14, 2015 | Board of Directors, Corporate Culture, Cyber Risk, Cybersecurity

The Santa Fe Group, Chairman and CEO Catherine A. Allen, joins TK Kerstetter, host of “Inside America’s Boardrooms,” to discuss… Do Certain Companies Need A Security Committee? Episode Summary It makes sense that certain industries might get more attention with respect to the sensitivity ....

Know Your Enemy: The New Economics of Cyber-Crime

August 17, 2015 | Cyber Crime, Cyber Risk, Cybersecurity, Data & Cybersecurity

According to Paul Kocher, one of the leading U.S. cryptography experts, there has been a 10,000-fold increase in the number of new digital security threats in the last twelve years. ((Perlroth, Nicole. “Hackers vs. Hacked: Game On.” New York Times, December 2, 2014. bits.blogs.nytimes.com/2014/1 ....

Cyber Insecurity In Our New World of IoT

July 13, 2015 | Cyber Risk, Data & Cybersecurity, Internet of Things (IoT), Privacy, Security

I recently attended the Executive Women’s Forum Summit, in New York City, on Unintended Consequences: Internet of Things (IoT) and Big Data which enabled a strategic dialog for information security, risk and privacy professionals navigating today’s changing digital landscape. In this two part bl ....

« Previous PageNext Page »