Skip to main content

Posts

Showing posts from 2017

Featured

Protecting Employee Data is an Organization’s Legal Obligation or Is It?

In today’s world, countless organizations fall victim to data breaches that involve employee data. In 2014, I was engaged to lead the remediation efforts of a data breach for a Pennsylvania-based client.  Hackers gained access to the company’s employee payroll information containing the salaries, social security numbers and other Personal Identifying Information (PII) through an insecure email system. It was crucial to develop and execute a corporate security strategy along with the tactical tasks of remediating the breach.

During 2013 and in 2014, infamous cyberattacks resulting in significant data breaches occurred against notable companies such as Target Corporation, Home Depot, JP Morgan Chase, along with many others.

The legal repercussions from those events set off an avalanche of employee and customer lawsuits. Many banks subsequently filed suits against the afflicted organizations citing negligence and other allegations. Organizations did not view protecting employee data was…

Will 2018 Be a Year Addressing the Skills Gap and Cloud Security?

Things to Consider When Calculating the Return on Security Investment

Security Awareness Tips for The Holidays

Filling the Cybersecurity Skills Gap With Freelance Security Professionals

Security Awareness Training Is a Team Effort

Don’t Let Organizational Politics Derail Security Initiatives

The CISO’s Guide to Minimizing Health Care Security Risks

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

The CISO’s Guide to Managing Insider Threats

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

Hire a Team of Hackers to Identify Vulnerabilities

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Succession Planning: The Importance of a Deputy CISO

Information Security in the Age of Disinformation

Is the CISO Job Market Overcrowded?

Building an Effective CISO-CIO Partnership

How The Next-Generation CISO Will Lead Security Strategy

CISO Complexity: A Role More Daunting Than Ever