Convergence of IT Security and Compliance Organizations
Gain insights into the convergence of IT security and compliance, understanding the role of governance and technology trends in shaping modern IT strategies.
Gain insights into the convergence of IT security and compliance, understanding the role of governance and technology trends in shaping modern IT strategies.
This presentation paints a picture of the emerging threats to the worldwide payment processing systems and discusses how a major payment processor – Visa – works to keep its payment network secure from increasingly sophisticated attacks.
This presentation discusses information security and compliance risk management – what is it? why do it? – and introduces a framework to implement it in the healthcare industry.
This presentation discusses the imperatives for and the framework and process needed to setup an incident response program.
This presentation discusses security management within the context of ITIL. The author’s basic premise is the ITIL is not used to implement security but its processes may lead to enhanced security controlled processes.<br />
An overview of information technology security – define information security, detail functional areas, discuss security standards and regulations, describe testing techniques for IT security audits, and information security organization maturity levels. This presentation also presents case studies to illustrate theory being practiced.
This presentation discusses technologies for implementing ISO 27002 processes and controls – which technologies to use? where to start?
Security baselines allow companies to stay in compliance with industry standards and maintain a reasonable level of security assurance. This presentation discusses the creation of a security baseline for a windows based environment.
This presentation describes the key vulnerabilities in web applications and discusses how to protect against the next attack.
This analysis dives into the complexities of Identity and Access Management (IAM) in Health IT, highlighting the impact of fragmented identity practices on data privacy, security, and operational efficiency. It provides strategic solutions for CIOs, including leveraging frameworks like CMS Medicaid IT Architecture (MITA) and collaborating across federal and state levels. By adopting standards-based IAM systems, healthcare organizations can enhance interoperability, reduce costs, and ensure compliance with evolving regulations. Use this comprehensive guide to transform your healthcare identity management approach and secure your data ecosystem.