ISACA has launched a Connecting Women Leaders in Technology program to provide support tools to advance women’s careers and deliver educational opportunities to develop skills and enhance women’s leadership within the global technology workforce.
No matter lessons learned from previous incidents, healthcare facilities continue to embarrassingly report laptops and flash drives containing patient information misplaced, lost and stolen, even in the face of increased regulatory procedures demanding more and better security through the Health Insurance Portability and Accountability Act of 1996 and the more recent Health Information Technology for Economic and Clinical Health Act.
Security officers are generally regarded as the face of security. Officers present a professional appearance at company entrances, patrol and tour facilities and grounds. But without tools, how effective is that officer? What value is a security officer’s presence bringing to the organization? And when cutbacks hit an organization’s security department, how can security directors maintain the same physical presence with fewer faces?
Facial recognition and video based biometrics continue to be a hot topic with security professionals. While shows like CSI, Law & Order and 24 make it seem that technologies exist that can pick a terrorist out of a crowd in Times Square or spot a criminal the moment he steps foot on the street, the reality is that we're not quite there...yet.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!