Blogs

  • What Does Smart Grid Security Mean to You?

    by Gib Sorebo on October 15, 2009

    As someone who has been knee-deep in Smart Grid security research, collaboration, assessments, and integration projects for the past year, it is sometimes easy to forget that most of the information security community hasn’t had much exposure to this area. Given that we received several submissions for sessions related to Smart Grid security, and it has been getting a fair amount of media…

  • What Is Taum Sauk?

    by Gib Sorebo on October 7, 2009

    Sometimes the significance of critical infrastructure doesn’t hit home for people until they’re faced with the consequences of its failure. In 2005, the people in the Missouri Ozarks learned firsthand the value of information integrity and what can happen when efforts are not made to ensure the accuracy of data. Taum Sauk is a pumped-storage hydroelectric plant run by the AmerenUE electric…

  • Welcome to the Critical Infrastructure Blog

    by Gib Sorebo on October 2, 2009

    Welcome to the inaugural posting for the Critical Infrastructure blog. I hope this will help to broaden the scope of information security coverage provided by RSA ® Conference 365. As part of the recognition of this increasingly important area, the RSA Conference will feature a track entitled Physical Security and Critical Infrastructure, which had previously been covered under the Physical…

  • Alaska Data Protection Law

    by Stephen Wu on August 26, 2009

    This is another in our series of articles about data protection laws around the country. The focus for this post is on Alaska. On June 19, 2008, Alaska became the 44 th state with a breach notification law when then-Governor Sarah Palin signed HB 65, the Alaska Personal Information Protection Act (“Alaska Act”). Most of the Alaska Act became effective on July 1, 2009. The Alaska Act contains a…

  • Connecticut Data Protection Law

    by Stephen Wu on July 22, 2009

    As part of our ongoing efforts to keep you up-to-date concerning information security legislation around the country, this post covers a fairly recent Connecticut law of interest to information security professionals, executives, risk managers, and attorneys. Connecticut enacted a new data protection law that became effective October 31, 2008. It includes both protection of Social Security…

  • New California Electronic Discovery Act

    by Stephen Wu on July 3, 2009

    On June 29, 2009, Governor Arnold Schwarzenegger signed into law Assembly Bill 5, which enacts California's new Electronic Discovery Act. The new legislation's provisions are similar to the ediscovery rules in the Federal Rules of Civil Procedure, but are not identical to the Federal Rules. Some of the highlights are as follows. The rules allow the discovery of electronically stored information…

  • California Health Care Data Protection Law Addresses Worker Snooping

    by Stephen Wu on April 12, 2009

    Last year, Governor Arnold Schwarzenegger signed into law new data protection laws to prevent health care workers from peeking at celebrities’ medical records, although the legislation strikes at lax data protection practices generally. The scope of the security breaches at the UCLA Medical Center is impressive in terms of the number of people involved, the number of records viewed, and the long…

  • Why the CSO/CISO Should Care About eDiscovery Part -8-

    by Stephen Wu on March 10, 2009

    Part -8- Why the CIO/CISO Should Care About eDiscovery (and Digital Evidence) From the perspective of information security and within the context of the Information Life Cycle, the new risks created by the emergence of ESI as a key component of discovery represents another organizational risk category that must be added to the existing data life-cycle management risk-set. Litigation risk must be…

  • Why the CSO/CISO Should Care About eDiscovery Part -7-

    by Stephen Wu on January 21, 2009

    Part -7- The Federal Rules of Evidence The Federal Rules of Evidence (FRE) provide a Court with rules about whether and upon what circumstances evidence may be considered admissible at trial. These rules were written in the era of the non-electronic, paper-and-ink, or physical evidence world, at a time when when paper records were the norm, and when such paper records constituted the most…

  • Why the CSO/CISO Should Care About eDiscovery Part -6-

    by Stephen Wu on January 1, 2009

    ESI Admissibility Strategy The previous section identified "presentation" as a critical phase in the discovery process. That section discussed how enterprise ESI is evaluated to determine its admissibility as evidence. Is there a fundamental strategy that can be taken? The answer depends upon whether the enterprise is the plaintiff or the defendant in a lawsuit. Accordingly, there are two…

This document was retrieved from http://www.rsaconference.com/blogs on Tue, 30 Sep 2014 06:10:19 -0400.
© 2014 EMC Corporation. All rights reserved.