Chapter

Information Security Hub – Page 9

How Does Visa Secure its Payment System?

This presentation paints a picture of the emerging threats to the worldwide payment processing systems and discusses how a major payment processor – Visa – works to keep its payment network secure from increasingly sophisticated attacks.

Incident Response Program

This presentation discusses the imperatives for and the framework and process needed to setup an incident response program.

ITIL Security Management

This presentation discusses security management within the context of ITIL. The author’s basic premise is the ITIL is not used to implement security but its processes may lead to enhanced security controlled processes.<br />

IT Security Basics

An overview of information technology security – define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity levels. This presentation also presents case studies to illustrate theory being practiced.

Automating ISO 27002

This presentation discusses technologies for implementing ISO 27002 processes and controls – which technologies to use? where to start?

Creating a Security Baseline for Windows

Security baselines allow companies to stay in compliance with industry standards and maintain a reasonable level of security assurance. This presentation discusses the creation of a security baseline for a windows based environment.

Hacking 101

This presentation describes the key vulnerabilities in web applications and discusses how to protect against the next attack.

IAM Strategies in Healthcare IT

Identity Management in Health Information Technology

This analysis dives into the complexities of Identity and Access Management (IAM) in Health IT, highlighting the impact of fragmented identity practices on data privacy, security, and operational efficiency. It provides strategic solutions for CIOs, including leveraging frameworks like CMS Medicaid IT Architecture (MITA) and collaborating across federal and state levels. By adopting standards-based IAM systems, healthcare organizations can enhance interoperability, reduce costs, and ensure compliance with evolving regulations. Use this comprehensive guide to transform your healthcare identity management approach and secure your data ecosystem.

CIO Portal