Advisor

Combatting Malicious Software, Part 2

Posted March 17, 2004 | Leadership |


In the first Bulletin in this two-part series (" Best Practices for Combatting Malicious Software, Part 1," 4 March 2004), I began an examination of the components that must be considered when developing an information security program. In this article, I conclude that discussion.

About The Author
Lee Imrey
Lee Imrey is Chief Information Security Officer (CISO) for a company that processes healthcare information for leading healthcare and insurance providers. He oversees a program that protects a vast repository of protected health information (PHI) and supports security compliance requirements across a constantly evolving set of US federal and state laws and regulations. The programs he supports are delivered in a highly competitive environment… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.