Category: Information Security
-
5 Steps to Creating a HIPAA-Compliant Cyber Attack Contingency Plan
5 Steps to Creating a HIPAA-Compliant Cyber Attack Contingency Plan via 5 Steps to Creating a HIPAA-Compliant Cyber Attack Contingency Plan – Campus Safety
-
OCR Considering HIPAA Privacy Rule, Enforcement Changes
OCR Considering HIPAA Privacy Rule, Enforcement Changes via OCR Considering HIPAA Privacy Rule, Enforcement Changes
-
Report to Congress on Cyber security
Report to Congress on Cybersecurity via Report to Congress on Cybersecurity – USNI News
-
What chief data officers can learn from Facebook about building better big data security practices
What chief data officers can learn from Facebook about building better big data security practices via What chief data officers can learn from Facebook about building better big data security practices – TechRepublic
