The billions of dollars worth of HITECH Act incentives available to hospitals and physicians using electronic health records are serving as a powerful catalyst for information security as well.
January's top news and views: top 10 government IT security influencers for 2011, state battles data leakage, giving non-IT managers ownership of IT risk and surveying government IT security practitioners.
States struggle to staff their IT organizations, and a majority of state CIOs say the hardest position to fill and retain is that of the IT security practitioner.
Cybersecurity isn't a problem like air defense, where you would look to the government alone to provide the solution, Defense Deputy Secretary William Lynn III says. Cyberdefense must include nongovernment entities, too.
Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.
"Okay, we have bad guys that might be in the system, but at least we're watching them every minute and hopefully detecting them before they do anything too bad," RSA Chief Technology Officer Bret Hartman says.
Defense Deputy Secretary William Lynn III meets with NATO Secretary General Anders Fogh Rasmussen, but works most closely with Ambassador Gábor Iklódy of Hungary, the alliance's assistant secretary general for emerging security challenges
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.