by John

QC Cybersecurity Alliance worked with the Quad Cities Chamber of Commerce and others in the Quad Cities to develop best practices and guidance for local businesses. Check it out!

http://quadcitieschamber.com/playbooks/cybersecurity

Posted in Community, Cybersecurity & Infosec

by John

Steve Marino, CISO of Cisco, explains the need for security and business alignment. This is a basic concept we need to embrace, which is why I founded the infosec company Aligned Security: Align, measure, communicate.

Posted in Cybersecurity & Infosec

by John

Iowa House Study Bill 526 would require organizations to report a breach within 45 days, add new categories to reporting requirements, and expand the definition of what is considered personal information. The bill would apply to personal data in any form and also cover medical records, effectively shortening HIPAA breach reporting requirements by 15 days. If organizations implement increased encryption methods, they can be exempt from the proposed state reporting requirements.

Posted in Data Breaches, Law and Regulations

by John

Posted in Cybersecurity & Infosec, Exploits & Attacks

by John

Posted in Cybersecurity & Infosec, Exploits & Attacks

by John

The World Economic Forum has released its annual Global Risks Report, which prominently addresses cyber risk. They’ve also released a Cyber Resilience Report, which comes in two parts: “a reference architecture for public-private collaboration, and cyber policy models.” The playbook, intended to be adaptable to any nation’s values and interests, takes up fourteen policy topics and analyzes them in terms of their impact on five areas: security, privacy, economic value, accountability, and fairness.

Posted in Cybersecurity & Infosec, Risk Management

by John

Please folks, don’t post passwords on PostIt Notes… especially when you are on TV.

Posted in Cybersecurity & Infosec

by John

IAPP (morning newsletter) suggests companies may back off from bug bounties due to Uber leak – that just moves us in the WRONG direction. We can’t ignore vulns for a year and then blame the hacker. Companies need to do whatever works for them to uncover vulns and take a risk-based approach to close them.

Posted in Data Breaches, Exploits & Attacks