Advisor

Combatting Malicious Software, Part 1

Posted March 3, 2004 | Leadership |


Mitigating the risks posed by malicious code requires the proactive implementation of industry best practices. In today's world, combatting malicious software begins at the CxO level with the recognition that there is a critical business need for an information security program and the appropriate high-level staffing for that program [1]. The components of the information security program will vary according to business needs. In this two-part Bulletin, I will examine those components that must be considered.

About The Author
Lee Imrey
Lee Imrey is Chief Information Security Officer (CISO) for a company that processes healthcare information for leading healthcare and insurance providers. He oversees a program that protects a vast repository of protected health information (PHI) and supports security compliance requirements across a constantly evolving set of US federal and state laws and regulations. The programs he supports are delivered in a highly competitive environment… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.