Cybersecurity, forensics, risk management -- what will be the core security skills needed in organizations in 2010?
In an exclusive interview, Kent Anderson, founder and managing director of Encurve LLC, as well as a member of ISACA's Security Management Committee, discusses:
The core security skills now needed...
2009 was a tough year in many ways -- economic recession, massive layoffs, high unemployment rate, scores of bank failures.
But there is good news for information security professionals looking for jobs within the public and private sectors in 2010. There are jobs aplenty, thought leaders say, for information...
In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Where organizations are most vulnerable;
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the...
Twitter, Facebook and LinkedIn are among the top social media sites on the Internet - and they're all part of a new movement of immediate, instantaneous communication among an organization's employees and with its customers.
In the blink of an eye - or at the speed of a tweet -- people around the globe can send...
How much do you actually know about time and the critical role it plays in your organization?
In a preview of his new webinar, Time: The Hidden Risks -- How to Create Compliant Time Practices, Bill Sewall discusses:
Why time is such a critical business issue;
Risks and opportunities presented by time;
OK, it's Tuesday before Thanksgiving, and we're all starting to think ahead to a long holiday weekend and then the quick windup to the Christmas/New Year's break. Hate to say it, but 2010 is all but here.
FaceBook, Twitter, LinkedIn -- Social-networking sites are now used both as recruitment tools for new talent and as screening sites for potential employees. As such, information security professionals should be careful to cultivate the right image on these and other popular sites.
Organizations and security controls have changed, so senior management and regulators now demanding more of internal auditors.
Beyond financial and control issues, internal auditors now are being asked to assess the effectiveness of an organization's enterprise risk management program, says Warren W. Stippich, Jr....
Government and business must think creatively to help safeguard America's digital assets, says Melissa Hathaway, the former White House acting senior director for cybersecurity who led President Obama's 60-day cybersecurity policy review.
Hathaway, an interview with GovInfoSecurity.com, cited the innovative...