“Virginia South Hospital Data Breach Response Policy” At Virginia South Hospital, we make it a top priority to respond promptly and thoroughly to any cybersecurity incident that could impact employees’ information, patient records, or our system. This policy explains who is responsible for each step, how we stay compliant with healthcare rules, and how we…
Protecting Availability
Knowing that availability means information is accessible and modified by authorized individuals within an appropriate timeframe. This would further encourage me, as a Chief Information Security Officer, that the company’s main priority is to maintain revenue; therefore, to ensure the availability of systems, I would ensure that critical systems have backups in place. So, if…
“The Need for Technology” Journal #4
According to Maslow’s Hierarchy of Needs, all humans have needs that exist on a hierarchical structure, and it is these needs that determine our behavior. Maslow’s Hierarchy of Needs gives us a clear understanding of how technology is connected to human motivation. Some people may engage with technology for basic comfort. However, I would say…
“Duties of an Authorizing Official Designated Representative”
While the Authorizing Official Designated Representative plays a crucial role within the organization, I personally prefer a position that emphasizes technical responsibilities. According to NIST 800-12, there are various cybersecurity roles, including the Authorizing Official Designated Representative, who is responsible for managing and conducting daily tasks related to system authorization and risk management. Duty of…
“A Strong Foundation for a Successful Business”
A business is often successful when its central components are aligned and collaborative, ensuring functional success and strategic growth. I have a better understanding of how various business components function. I have learned that most successful businesses collaborate within each department (customer service, human resources, information technology, marketing, product development, and compliance) to contribute to…
NIST Framework
After reading the ‘Framework for Improving Critical Infrastructure Cybersecurity,’ I believe organizations can gain several benefits from using this framework. We live in a world where nearly everything is controlled by technology. Therefore, you could never be too secure. Organizations can utilize this framework to identify opportunities for new security programs, revise the company’s standards…
Data Breaches Journal #3
After reviewing information about data breaches on Privacyrights.org, I think researchers could utilize this information in many ways. For example, researchers could use the data to identify trends or recurring incidents (vulnerabilities, threats). Researchers can also use this information to determine which industries, such as education, healthcare, or banking, are most vulnerable. To understand which…
The Principle of Empiricism Journal #2
Empiricism refers to things that we can perceive through our senses, allowing us to learn through experience. I believe the principle of empiricism would enhance the effectiveness of cybersecurity by allowing professionals to make decisions based on data (objective evidence). When you think about it, most organizations train their teams on how to prepare for…
NICE Workforce Framework Journal #1
After reading the National Initiative for Cybersecurity Careers and Studies, I have identified a few areas that I would like to focus my career on, including Implementation and Operations, and Protection and Defense. In my current role as a Behavior Technician, I collect a large amount of data throughout the day and review it with…