Blog Posts Tagged with "ISA"
June 07, 2012 Added by:Andrew Weidenhamer
The level of scrutiny the PCI DSS has been subject to the last couple of years has been bad enough to accentuate it with the advent of the ISA program. The false sense of confidence the ISA program gives individuals is insanely bad for the industry. Like any other certification, the test isn’t difficult..
March 07, 2012 Added by:Marjorie Morgan
The ISA and ANSI released a new report titled The Financial Impact of Breached Protected Health Information which explores the reputational, financial, legal, operational, and clinical repercussions of a protected health information breach on an organization...
March 02, 2012 Added by:Marjorie Morgan
Schmidt is slated to announce the third publication in the Internet Security Alliance's financial cyber risk management series, "The Financial Impact of Breached Protected Health Information: A Business Case for enhanced PHI Security"...
January 25, 2012 Added by:Marjorie Morgan
“Cyber attacks are becoming more serious and more sophisticated. Not only is our nation’s critical infrastructure, but virtually every private or government enterprise which relies on modern information technology is now being subjected to these increasingly advanced attacks..."
October 12, 2011 Added by:Marjorie Morgan
Everyone can track security legislation in Congress through the “Cybersecurity Legislation Tracker”. This is a valuable resource that provides notice and summaries of significant cybersecurity developments on Capitol Hill, including hearings, proposed bills, and task force activities...
October 07, 2011 Added by:Headlines
"The system they have recommended provides a pathway for a sustainable system to of cyber security that will result in securing our nations critical infrastructure while stimulating the IT engine that has provided most of the good news our economy has experienced over the last 20 years..."
August 17, 2011 Added by:Headlines
"This is a punitive model where we're trying to blame the victims of the attack. I don't think that the administration's proposal really does anything that I can see to enhance cybersecurity," said Larry Clinton, President of the Internet Security Alliance...
August 15, 2011 Added by:Headlines
Clinton’s election to the ITSCC is critical at this point in time, as some of the legislative efforts underway may serve to fundamentally alter the public-private partnership envisioned in the National Infrastructure Protection Plan and the Obama Administration’s Cyberspace Policy Review...
July 27, 2011 Added by:Marjorie Morgan
An effort is underway to compel thousands of companies to provide proprietary data under the Defense Production Act (DPA) or face fines and criminal prosecution. While use of the DPA has ample precedent, this seems to go well beyond its intended purposes...
July 20, 2011 Added by:Marjorie Morgan
Speaker of the House Boehner has appointed a task force comprised of Members from the major Committees of the House to develop a framework for cyber security legislation. The ISA was the very first organization that was asked to testify before the Task Force...
June 23, 2011 Added by:Headlines
ISA has articulated its pro-market approach to cyber security through the two editions of its “Cyber Security Social Contract.” When the Obama Administration released its own policy paper for cyber security, the Cyberspace Policy Review, the first document it quoted was the ISA Social Contract...
April 14, 2011 Added by:Marjorie Morgan
Economics are driving both industry and government to adopt increasingly sophisticated technologies which raise serious new security issues. It is simply dangerous to suggest that the problems can be managed with a set of government determined technical standards...
March 07, 2011 Added by:Marjorie Morgan
"When it comes to enhancing our nation’s cyber security we understand that the devil is in the details. That’s why we have worked over the past six months to hammer out very specific policy positions... in a way that protects our national security, our economy and our civil liberties..."
February 02, 2011 Added by:Marjorie Morgan
Larry Clinton will be featured on a Federal News Radio panel that will discuss Advanced Persistent Threats and the industrial strength hacking. The discussion will explore how the threat has evolved, the implications are for business, government officials, society, and the growing challenge...
January 10, 2011 Added by:Headlines
ISA will present on "How to Assess the Financial Impact of Cyber Risk" at the RSA conference. ISA’s mission is to integrate advanced technology with the realistic business needs of its members and enlightened public policy to create a sustained system of cyber security...
January 04, 2011 Added by:Headlines
ISA is a unique multi-sector trade association which provides thought leadership and strong public policy advocacy. ISA’s mission is to integrate advanced technology with the realistic business needs of its members and enlightened public policy to create a sustained system of cyber security...
Interoperability: A Much Needed Cloud Comput... ryan mccarthy on 04-18-2014
Is User Experience Part of Your Security Pla... Allan Pratt, MBA on 04-17-2014
Interoperability: A Much Needed Cloud Comput... ryan mccarthy on 04-17-2014