- Home
- Compliance
Compliance
The Latest News
-
Interview
Health Data Breach Response Tips
McAfee's Kim Singletary on How to Improve Resolution By Tom FieldSecurity threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
-
Interview
More AML Penalties to Come?
Expert: Banks Should Brace for More Scrutiny in 2013 By Tracy KittenThe penalties paid out by HSBC and Standard Chartered Bank for violations to money-laundering regulations should serve as a wake-up call, says Kevin Sullivan. In fact, banking institutions should brace for more fines.
-
Interview
What is 'Reasonable Security?'
Attorneys Offer Insight on Fraud Litigation Trends By Tom FieldAs the recent PATCO case shows, fraud litigation is moving away from just establishing damages. The key legal question now is: What is reasonable security? Attorneys discuss the 2013 fraud legal landscape.
-
Article
HSBC, SCB Agree to AML Penalties
Banks Settle with Feds over SARs Violations By Tracy KittenHSBC and SCB will pay millions in penalties for violating anti-money-laundering laws. Experts say the penalties are justified, but question the deterrent effect.
-
Article
The Evolving CISO Role
Challenges Arise When Security Meets Risk, Governance By Jeffrey RomanDavid Sherry, CISO of Brown University, sees the security leadership role transitioning completely to risk and governance over the next few years. What challenges will leaders face along the way?
White Papers
-
Meeting FFIEC Guidance and Cutting Costs with Automated Fraud Prevention
Unmistakably, the release of the FFIEC supplement was the result of an increasingly hostile online banking environment created by the introduction of advanced malware. To effectively comply with...
-
The New Phishing Threat: Deception & Social Engineering
The threat of email borne attacks is greater than ever with malware volumes increasing drastically. Specifically, the email threat comes in the form of phishing and spear-phishing...
-
Kill Your Data To Protect It From Cybercriminals
This whitepaper from Forrester Research, "Kill Your Data to Protect it From Cybercriminals," shares best practices about how you can make cybercriminals bypass your network and look for less robustly...
Webinars
-
Continuous Monitoring: How to Get Past the Complexity
Continuous monitoring fits into the six steps of the Risk Management Framework described in guidance issued by the National Institute of Standards and Technology, which defines its objective to...
-
Third-Party Service Providers (TSPs) - Breach Impact & Preparedness
In Sept. 2011, the U.S. Defense Department's TRICARE health program notified 4.9 million beneficiaries of a data breach caused when backup tapes were stolen from the car of an employee of Science...
In the northeastern U.S., millions of residents are still coping with the devastation caused by...
Latest Tweets and Mentions
In the northeastern U.S., millions of residents are still coping with the devastation caused by...
The ISMG Network
-
Webinar
Risk Assessment for EHR Meaningful Use: Methodologies and Processes
-
Article
IRS Agents Sued in Health Records Case
Suit Alleges 10 Million Patients' Info Improperly Seized
-
Article
Vulnerability Floors Vulnerability Site
NIST Needed a Week to Bring Website Back Online
-
Article
GAO Sees Vulnerabilities in IRS Systems
Auditor: Parts of IRS Infosec Program Haven't Function as Intended
-
Article
Incident Response: Next-Gen Skills
Evolving Threats Call for Evolving Proficiencies
-
Blog
HIPAA Omnibus: Vendor Contracts
Pay Attention to Those Business Associate Agreements
-
Article
Celebrity Breach Leads Roundup
Information Posted on Public Website
-
Interview
Comparing Medical Devices on Security
New Tool Will Help With Assessments
-
Interview
Evolving Security Challenges for CIOs
The Need for a Long-Term View
-
Interview
Making the Right Encryption Decisions
Expert Describes a Four-Step Process