Author Archives: dutcherstiles

Invincible

New York Magazine article “The Young Invincibles: A Generation Uninsured” discusses the way uninsured 20-30 year olds in New York deal with health risks (link and commentary from Concurring Opinions.) The article is interesting study of people who do not … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

One Man’s Trash

The righteous fury of Texas Attorney Abbott was last month stymied by an elite cadre of county clerk ninjas who conjured a shambling legislative behemoth to crush his valiant effort to protect the privacy of Texans.Abbott screwed his courage to … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Auditing Privacy Part 2 – Risk Assessment of Data Loss

The easy way to assess privacy risks is to focus on the impact of data theft to the organization by including the private data as a corporate asset. There are well documented methods to identify the vulnerabilities in means of … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Impacted Molars II

OcclusalPanopticonistas Cyveillance say ID theft is so bad, we are all going to die. Seems like shutting down copyright scofflaws got a little too Web 1.0 for them, so they’ve unleashed their vicious crawling spiders on a search for contraband … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Insider Threat Assessment

Step one: Play a crappy new-agey cover of “All Along the Watchtower.”

Posted in Uncategorized | Tagged , | Leave a comment

Panopticon Enabled Desktops Increase Productivity!

From Dark Reading, the joys of workforce monitoring software with Ascentive!: “We call it ‘workforce activity management,’” says Schran. “Our latest edition provides all the insight necessary to eliminate time-wasting, increase productivity, and protect private company data.” Or, in the … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Auditing Privacy Part 1 – Ethics and the Canon

It would comfort many compliance auditors to discover the ultimate checklist and tear after their organization’s privacy program, collecting tick marks and developing the dreaded deficiency finding. I say to them, “Google is your friend.” For the more enlightened internal … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

I Am Not A Cop

A couple posts on the role of internal audit in the information security controls of a company got me thinking. First, Anton describes an auditor as “policing agent” model: InfoSec develops controls. Operations operationalizes them. Audit goes around with a … Continue reading

Posted in Uncategorized | Leave a comment

More Questions than answers

This evening has been spent practicing for my SXSW day show: a brief discussion about privacy for which some auditors will be getting CPE. As a result, I have also spent the evening listening to my voice slowly decay into … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Repost Redux: Special SXSW Edition

Having read a few additional commentaries, I began to think some more on two issues I posted about earlier. Greg Abbott vs. The County ClerksMordaxus at Emergent Chaos says we need to chill, which made me wonder if there was … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment