Information Security

Five Steps to Cybersecurity

This document provides a five step process to secure the enterprise from cyber attacks. Written for senior executives it can serve as a guide to address cybersecurity risks at your organization. CIOs can apprise themselves of industry standards, best practices, and an effective process used for cybersecurity.

e-Book – A Guide to Cybersecurity Threats

This e-book takes an indepth look at cyber crime – what is it? what challenges does it present? how to respond to it? Excellent discussion for the CIO to follow in order to create an effective response. (350+ pages)

e-Book – Guide to Information Security

This is a comprehensive guide to information security. It covers key topics in securing the enterprise from strategy to implementation. An excellent resource for the CIO who wants to understand information security and how to implement it in the enterprise. (150 pages)

Security Policies Example

This document presents an example of security policicies implemented at the enterprise level. Excellent template for a CIO to craft policies to secure their own organization. 

Healthcare Industry Security Survey (2010)

This annual survey tracks the state of security in healthcare organizations to learn what is coming down the security pike, how are others planning for it, how best to plan for it. An excellent resource for CIOs across industry to create a robust security capability.

Healthcare Industry Security Survey (2011)

This annual survey tracks the state of security in healthcare organizations to learn what is coming down the security pike, how are others planning for it, how best to plan for it. An excellent resource for CIOs across industry to create a robust security capability.

Healthcare Industry Security Survey (2012)

This annual survey tracks the state of security in healthcare organizations to learn what is coming down the security pike, how are others planning for it, how best to plan for it. An excellent resource for CIOs across industry to create a robust security capability.

Do NOT follow this link or you will be banned from the site!
il NG e fy sEZx Tv YJQgSiq