QC Cybersecurity Alliance worked with the Quad Cities Chamber of Commerce and others in the Quad Cities to develop best practices and guidance for local businesses. Check it out!
http://quadcitieschamber.com/playbooks/cybersecurity
Posted in Community, Cybersecurity & Infosec
Steve Marino, CISO of Cisco, explains the need for security and business alignment. This is a basic concept we need to embrace, which is why I founded the infosec company Aligned Security: Align, measure, communicate.
Posted in Cybersecurity & Infosec
Iowa House Study Bill 526 would require organizations to report a breach within 45 days, add new categories to reporting requirements, and expand the definition of what is considered personal information. The bill would apply to personal data in any form and also cover medical records, effectively shortening HIPAA breach reporting requirements by 15 days. If organizations implement increased encryption methods, they can be exempt from the proposed state reporting requirements.
Posted in Data Breaches, Law and Regulations
The World Economic Forum has released its annual Global Risks Report, which prominently addresses cyber risk. They’ve also released a Cyber Resilience Report, which comes in two parts: “a reference architecture for public-private collaboration, and cyber policy models.” The playbook, intended to be adaptable to any nation’s values and interests, takes up fourteen policy topics and analyzes them in terms of their impact on five areas: security, privacy, economic value, accountability, and fairness.
Posted in Cybersecurity & Infosec, Risk Management
Please folks, don’t post passwords on PostIt Notes… especially when you are on TV.
Posted in Cybersecurity & Infosec
IAPP (morning newsletter) suggests companies may back off from bug bounties due to Uber leak – that just moves us in the WRONG direction. We can’t ignore vulns for a year and then blame the hacker. Companies need to do whatever works for them to uncover vulns and take a risk-based approach to close them.
Posted in Data Breaches, Exploits & Attacks