In 2016, consumers in the United States lost almost $9 billion due to payment card fraud. Despite continued news of payment card breaches impacting millions …
There are two job openings for every candidate or an estimated one million open cybersecurity jobs, along with zero percent unemployment in the field. In …
Two new networks are the subject of intense research: terahertz networking and nanoscale molecular networking. Both are at the nano-scale and have enormous security implications, …
Mobile devices such as smartphones have replaced Personal Computers (PCs) to become the primary computing devices for many users due to the rapid advance of …
Security awareness training is a proven method used by many companies to help employees gain a better understanding of the information security risks affecting their …
The proliferation of cybersecurity issues over the past decade is challenging the norms of corporate governance. This specific study focuses on three critical areas the …
Information security is rightfully considered a risk management function today as organization’s must align deployed protections to their information security risks and maintain an appropriate …
The European Union’s (EU) General Data Protection Regulation (GDPR) becomes fully enforceable on May 25, 2018. Many small and medium-sized enterprises (SMEs) in the United …
Large organizations with multiple product teams that are geographically spread over many time zones need to ensure that product secrecy and confidentiality is maintained while …
This Critical Challenge Project (CCP) addresses the lack of understanding inherent between private industry and the DoD and argues that not just a whole of …
Cybersecurity incidents are a key enterprise risk for any organization that owns or maintains confidential information and these incidents have the potential to create significant …
As Cybersecurity concerns grow across our interconnected world, companies are required to consider how to best manage Cyber risk and insure business continuity. Given the …
The questionnaire-based assessments of vendors’ cybersecurity posture have proven to be inefficient and ineffective. This single-point-in-time assessment does not capture fully and continuously the cybersecurity …
Vulnerabilities in software are commonplace. They are routinely exploited by bad actors to cause harm and for financial gain. As software is increasingly embedded in …
Small and medium businesses (SMB) comprise approximately 99% of the economy in most developed countries. Because they represent the lion’s share of the economy, their …
In recent years global agriculture has faced adversity; with trials including climate change, water scarcity, loss of arable land, and even workforce shortages. Amidst this …
The total hedge fund industry capital globally in 2Q18 was a record $3.235 trillion, spread among 8,335 funds. Despite this global hedge fund footprint, the …
B2B SaaS startups struggle to comply with regulatory requirements. There are many evolving standards that require documentation and controls. These requirements overwhelm startups, to the …
This critical challenge project is intended to address the workforce shortage by evaluating the transformation that needs to occur including the evaluations of barriers to …
The origins of the privacy profession as primarily a legal and compliance discipline has clearly changed, and while the arm of privacy professionals who are …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
By partnering directly with critical infrastructure providers, the National Guard Bureau can help build a stronger cybersecurity posture that enables quicker cyber incident detection and …
This paper presents the findings of unprecedented field research in social engineering and information security awareness training. A cross section of private companies and government …
The recent proliferation of technology (i.e., internet usage, mobile devices, or IOT devices) has resulted in an unprecedented accumulation of data. Complete, timely, secure, and …
This paper examines at common machine learning applications in the physical security environment which collect data and what that means in light of GDPR by …
Risk management functions have grown considerably in the past decade from small units focused on financial risk and regulatory compliance to large armies covering diverse …
This document provides a quick perspective about the security and privacy provided through the use, and connectivity, of the Internet of Things (IoT) which may …
Organizations are having difficulties finding cyber talent. They also need to change the perception that cyber security is just an IT problem. By creatively making …
The U.S. military continues to struggle with a system to properly integrate cyber planning into military operations, effectively communicate cyber capabilities to commanders, and cross …
The Chief Executive Officer (CEO) is the central role that drives the corporate mission, vision and values, and connects the strategy to operational execution. As …
As tens of thousands of companies in the United States monetize the collection, analysis and sale of personal data in the United States, the existing …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
My challenge outlines the lack of governance and review observed in the healthcare provider environment with the use of "market " or "consumer" clinical and …
Individuals are largely unaware of the legal extent to which the TOS agreement permit internet companies to monetize their personal data profiles. This paper reveasl …
The aim of this paper is to identify any inadequacies in cybersecurity training, specifically regarding the training of executive leadership. To accomplish this, this paper …
Data has changed how we do business. To keep pace, Privacy Offices are quickly turning to technological solutions to modernize and automate their existing operations. …
The purpose of this CCP is to define and publish a set of implementation guidelines for exchanging and securing healthcare information within mobile applications used …
By implementing an ED, nurse-driven assessment protocol focused on the functional and social determinants of geriatric health that impact recovery from an acute episode, hospitals …
The purpose of this CCP is to analyze the financial viability of Coastal Medical's population health management investments over a five-year period for Coastal365, a …
Do Massachusetts communities and taxpayers receive their fair share of required nonprofit Hospital Community benefits programs established by state guidelines and federal statutory requirements? Has …
Caron Renaissance is part of the Richard J. Caron Foundation and is a 124-bed, dual-diagnosis, treatment facility composed of a multi-disciplinary team of experts. Caron …
Bellevue Hospital Center (BHC) faces process inefficiencies that result in Length of Stay (LOS) 25% longer than the NYC Average. Patients with Circulatory System Diseases …
Developing an Onboarding program for new physicians, in order to disseminate the culture and reinforce the mission , vision and values of Summit Medical Group …
My Critical Challenge Project is to publish a manuscript in a peer-reviewed journal that assesses barriers and potential solutions to wider implementation of condition-specific bundled …
Cybersecurity involves an “all-hands on deck” approach from multiple stakeholders at every institution. In order to successfully implement this approach, organizations must adjust their cultures …
Cybersecurity data is robust and prevalent. However, that data rarely correlates with vulnerabilities, security controls, and threats for a target environment. As cyber-related threats continue …
The rapid adoption of the cloud is resulting in an increasing insider threat attack surface, as cloud service providers and the supply chain must now …
Technology brought incredible convenience to nearly every aspect of our lives. Means of communication, transportation, entertainment, and even exercise is very different. Innovation came with, …
Phishing emails are the single most significant attack vector facing consumers and businesses today. Companies routinely report on metrics that do not adequately define their …
Physicians in the United States are under the dual regulatory pressure of HIPAA compliance as well as economic pressure associated with free market choice that …
The human factor is a crucial element for cybersecurity. One of the ways the cyber attackers are successfully exploiting our systems is by manipulating innocent …
This paper explores the questions about whether we can trust security ratings and how we should use them. My approaches are, (1) describing traditional and …
The purpose of this research paper is to explore the impact of Artificial Intelligence on cybersecurity, specifically the defensive aspects of cybersecurity. This paper is …
Cybersecurity planning remains the purview of a few high-cost experts, but urgently needs to be available to the many non-expert managers of small-to-medium businesses (SMBs) …
To remain both competitive and compliant, organizations need consistent approaches for how to understand and consume data, what to collect, and how to manage it. …
This guide aims to be a valuable place for in-house counsel to go to help them understand and address cybersecurity concerns. In-house counsel does not …
This paper explores several use cases where human microchipping is enabling humans and businesses to interact with their digital surroundings faster and more efficiently in …
With the influx of online services offered at various levels of state government, citizen personal information is increasingly stored in various identity repositories associated with …
Each of the states are working towards improving their cyber incident responses but are not collaborating as much as needed. There are many efforts that …
The paper is an examination of policy and technical solutions for the problem of maintaining the security of consumer devices and applications while providing mechanisms …
The paper provides design and security considerations for Software-Defined Wide Area Network (SD-WAN) transformation from a traditional Multi-Protocol Label Switching (MPLS) WAN architecture. The rapid …
This paper seeks to explore the challenges and the impact of a fragmented vendor risk assessment process across the financial industry. This is an important …
As the information security discipline continues to mature, we can draw on some of the lessons learned by the software development community. The dawn of …
It's time to think seriously about creating legal definitions that would classify certain types of code as digital weapons. Our current regulation is weak and …
The Mozambique National Cybersecurity Strategy does not elaborate a governance framework, thus, this paper looks at two essential questions: (1) what governance model should the …
Traditionally, paper ballots have been used in elections in the United States. This project explores the security challenges associated with the deployment and use of …