Mandatory Cybersecurity Risk Management Framework in Healthcare Sector

Andy Herman discusses the gap in the current healthcare cybersecurity approach – that there is no mandatory risk management framework for healthcare organizations. The author suggests introducing a mandatory implementation of a full cybersecurity framework with monitoring systems before receiving the incentives guaranteed by the meaningful use clause associated with electronic health records.

Read More

Food for Energy or Energy for Food: A Chemical Dependency

Jeffrey Seward explores the risks and the long-term impact of the Oil and Gas Sector on the Food and Agriculture Sector. Agriculture needs the Oil and Gas Sector in order to produce at current levels. If oil and gas were eliminated overnight, our very ability to produce food crops would be gone along with it. One of the most important risks to look at is need to eat versus need consume oil and gas.

Read More

New Age of Cybersecurity: Rethink Cybersecurity Strategies and Implementation

Cory Shyu discusses how the Internet of Things (IoT) has transformed the technology sector profoundly. While companies are rushing to reap benefits from increased productivity and automation by adopting more agile technology solutions, privacy and security issues have risen at an alarming rate. The author addresses the key areas in which companies should rethink cybersecurity strategies and develop appropriate roadmaps to achieve security objectives.

Read More

Hypervigilance and the Digital Age

Matthew Welden discusses the development of a hypervigilant culture within the U.S., with attention-grabbing low-frequency incidents overshadowing the far deadlier but less sensational everyday risks. While we now live in a modern world where people are living longer, freer, and richer than ever before, more of us have become captives of fear. The author defines the condition of hypervigilance, illustrates the condition with historical examples, and then offers some solutions to the condition and ethical arguments for their consideration.

Read More

Dam Operational Risk

Iisaaksiichaa Ross Braine examines the U.S. Dams Sector, and identifies potential control failures and identifies the best path for mitigation, specifically in terms of energy. The author uses internal audits of the Homeland Security system, combined with best practices pulled from both the “Dams Sector-Specific Plan” and “Operational Risk Management” written by Philippa X. Girling. Iisaaksiichaa discusses potential solutions and illustrates the steps the Dams Sector could take in order to shore up cyber defenses.

Read More

Ashley Madison and Managing a Risky Business

Kevin Rawls discusses some of the heightened levels of internal and external risks faced by a business that operates in a legally sound but morally compromised space.The website AshleyMadison.com is a now notorious website built around enabling married people to have extramarital affairs, that in 2015 experienced a very severe data breach of its customers’ data.

Read More