Free Cyber Security Awareness and Training Courses Offered by DHS/FEMA Partnership with Texas A&M University.

Just recently, our staff was made aware of a program offering free cyber security related training and awareness courses.  These courses are funded by DHS/FEMA in cooperation with the Texas A&M Engineering Extension Service (TEEX). The objective of this DHS/FEMA partnering is to ensure that cyber space is supported by secure and resilient infrastructure(s) ---delivering open communications, information and prosperity while protecting privacy and confidentiality. These courses are offered at no cost and students can earn a TEEX certification of completion and Continuing Education … [Read more...]

Security vs. Privacy and the Insider Threat — Free Webinar Offering

Many of our readers are aware of recent stories about data breaches, IP theft, and fraud in the news.   In addition, they have become more aware of so many companies now realizing that background checks and interviews are not foolproof --- and even more importantly, they are realizing that there are times when the greatest threat to an organization is on the inside of that organization. Join Mike Tierney and security expert Alan Shimel on Thursday, September 12, 2013 at 2:00 PM EST, as they discuss the unique challenges associated with detecting and preventing insider threats. Because an … [Read more...]

Wireless Network Security Tested in a Unique Way

Wireless network security levels were tested recently in Edinburgh Scotland by a cyclist who “war-biked” around the capital trying to find unsecured wireless networks which could be exploited by hackers. Security expert James Lyne utilized a bike equipped with dynamos and solar panels to power a computer which scans for wireless networks which have no or poor security. As our readers well know, hackers can join wireless networks and then become totally capable of directly attacking those computers and other devices to steal money or information. They can also track which websites you … [Read more...]

Cyber Risk — How Well Are Board Members Managing?

Protecting a company’s digital assets continues to be a challenging component of a director’s and/or board member’s total fiduciary duties --- and--- with the growing number of regulations now imposing more specific privacy and cyber security related obligations on companies --- answering the question of whether or not those directors are managing cyber risks responsibly begs the need to find out how well those directors are really doing….. To that point, Carnegie Mellon University’s “CyLab” group recently released the results of a survey it conducted which examined data across geographical … [Read more...]

Online Privacy Rights Remain Under Attack and Unresolved Issues for Many in 2013

In a recent article, posted by PC World and written by Melissa Riofrio, the topic of online privacy for individuals was addressed in the light of growing threats to that privacy predicted for 2013. And, while a debate may exist about the meaning of privacy between different generations of individuals, the fact is that the data any individual generates on the internet is still a rich trove of information that says more about you than you may realize --- not to mention that it is also a tempting target for marketers and law enforcement officials alike. This year, your online privacy faces … [Read more...]

Social Media Risk Management Becomes Focus of New FFIEC Guidance Draft Document

The ever growing challenge of social media risk management remains a topic of concern and focus for not only financial institutions but also for many organizations now using social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback from the public and engaging with existing and potential customers --- for example, by receiving and responding to complaints. Very recently, the Federal Financial Institutions Examination Council (FFIEC) released proposed guidance on the applicability of consumer protection and … [Read more...]

BYOD – Attend Webinar to Build a Business Case of Support

The risks associated with employees now bringing their own smartphones, tablets and mobile storage devices to the job remain a topic on the minds of every information security professional in nearly all organizations. While much has been and will continue to be written on this topic, risk management strategies by many CISO’s are still too often trying to develop defenses that reject this trend rather than trying to find ways to embrace this trend as a means to cut costs and improve productivity. In an exclusive case study now being offered in a webinar format, Intel CISO Malcolm Harkins … [Read more...]

Data Breach Report Offers State by State Regulation Requirements

Unfortunately, for many U.S. companies facing the reality of data breach occurrences and data breach notifications – i.e. reaching an agreement on what they are and what are you required to do once they occur – remains a very complex topic yet still poses potentially large economic risk(s) when they occur.  Even more to the point, each state and its jurisdiction requirements within the U.S. differs in one way or another on how to legally handle data breach occurrences and the notification requirements that accompany them..  Just as important, even a local or regional business, dealing with … [Read more...]

National Cyber Security Awareness Month Designated for October 2012

  Reminder - President Obama designated this October 2012 as National Cyber Security Awareness Month (NCSAM). NCSAM is designed to engage and educate public and private sector partners through events and initiatives with the goal of raising awareness about cybersecurity and increasing the resiliency of the nation in the event of a cyber incident. October 2012 marks the ninth annual National Cyber Security Awareness Month sponsored by the Department of Homeland Security (DHS) in cooperation with the National Cyber Security Alliance (NCSA) and the Multi-State Information … [Read more...]