The Influencers is a continuing series of profiles of the people who shape information security, risk management and privacy.
ex-CISO, Citibank, JP Morgan, Merrill Lynch; currently a consultant and widely sought-after speaker
Provisions of the bill would help develop a skilled government infosec workforce, prioritize federal cybersecurity R&D, improve the transfer of cybersecurity technologies to business and promote cybersecurity education and awareness.
Risk management today - it's less about pure technology, more about business acumen and pure communication skills.
This is the position of Kenneth Newman, VP & Information Security Manager at Central Pacific Bank. In an interview about top risk management trends, Newman discusses:
Scope of the risk management...
The Payment Card Industry Data Security Standard (PCI) is one of the hottest topics in information security today. And PCI Quality Security Assessors (QSAs) are among the most sought-after of security professionals.
What, then, does it take to become a QSA?
Johns Hopkins University's-Whiting School of Engineering is now offering a new part-time graduate program in information security.
This MS degree program is an effort toward filling the surging demand for cyber engineers and scientists with technical expertise in information assurance (IA) within government and...
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
Privacy, data security and consumer protection - three of the top concerns to organizations everywhere. And they are three of the topics nearest and dearest to Lydia Parnes, former director of the Federal Trade Commission's (FTC) Bureau of Consumer Protection.
Now a partner in the Washington, D.C. office of Wilson...
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
You've heard of Stephen Covey's "The Seven Habits of Highly Effective People?"
Well, information security leaders also must cultivate healthy habits to proactively manage their careers. Following are the 8 essential habits identified by successful security leaders:
What are the new year's top trends in banking, payments and security?
Javelin Strategy & Research has just released its Top 10 Trends report for 2010. James VanDyke, president of Javelin, discusses:
Top headlines from the new report;
Biggest threats to banks, payments and security;
The "next big thing" in...
Information security is the hot career option for professionals in 2010 and beyond.
This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses:
the security careers "bubble" and how it began;
The New Year comes with fresh perspectives on priorities to be addressed by information security leaders.
To get a sense of what's top-of-mind, we went to three information security leaders:
Emil G. D'Angelo, International President of ISACA. He is also the senior Vice President overseeing the corporate data...
The University of Dayton (UD) and the Advanced Technical Intelligence Center (ATIC) have partnered to address the shortage of skilled information security professionals within government and businesses.
Starting now, students in the masters in business administration program (MBA) at UD will have the option of...