Michelle Bentley's Global Privacy

Decent Essays
Michelle Bentley's background includes: building and managing Information Security Department of 12 individual contributors, 15+ years of Information Security experience, 7+ years in Compliance, 8+ years of Project Management, Internal Audit, creating Security Programs, developing policies and risk mitigation plans, and promoting Security Management Practices. Currently, Bentley is building a Global Privacy and is also a Certified Information Security Manager

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In Alexandra Alter’s expository editorial the subject of privacy, and especially its relation to data collection is a controversial topic that has the power to polarize people. This article highlights how a previously solitary act of reading is evolving into something that can be tracked and analysed. The author’s thesis focuses on reading, when done electronically, has become an invasion of privacy. This article also presents the idea that reader-user data and it’s analysis is very profitable for publishers and e-book companies.…

    • 94 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Telichia Johnson HIMS 417 March 07, 2015 Summary: Redefining HIM Privacy and Security Role In the article “Redefining Health Information Management Privacy and Security Role,” the authors report on the historical role of the Health Information Management (HIM) professional in privacy and security, several evolutionary changes, and the need to extend access to patient information beyond normal patient care. In a period of constantly changing regulations and continual evolutions in technology, the Health Information Management profession’s roles and responsibilities will have to be extended to meet industry demand, and more reliance on Health Information Technology (HIT) to process and manage data and information. A more increased role…

    • 371 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Developing data analytics to monitor and screen cybersecurity threats and react to threat attacker episodes and review log activities (Bergquist, 2016). Technical recommendations to boost security without significantly increasing personnel management can be achieved by incorporating security frameworks reviews, examining any area(s) of weakness or vulnerabilities and implementing security controls. Business partners of ABC Healthcare such as banks, vendors, and collection agencies will continue to thrive with the integration of proper security measures without introducing significant overhead and complexity. Integrating data sharing polices can protect the information and ultimately reduce the level of access to individuals information. To tackle information security infringements, ABC healthcare business partners must concentration on the collaboration of security control with ABC Healthcare to enforce security regulations such as data encryption, data sharing and disposal policies, and educate personnel by…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Julie Zhuo’s essay, Where Anonymity Breeds Contempt, does not effectively reach content providers because of Zhuo’s lack of consideration to the provider’s own experiences on the topic of trolling. Throughout her essay she argues that content providers need to take control over trolling by not allowing anonymous commenters, watching over comments, and asking users to report trolls. By following these steps, Zhuo believes that trolling will decrease. Trolling is when someone makes hateful or rude comments online- usually anonymously. Zhuo’s essay was published in November of 2010 during a time when Facebook and Twitter were the most popular social media sites.…

    • 1240 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    “College Kids Have Too Much Privacy” an article by Michele Willins is about the amount of privacy college kids has. The authors point of view is college kids has too much privacy and I agree with this. In the beginning of the article a mother of a student is called by her daughter's roommate who informs her that her daughter never graduated college. The mother is shocked and the roommate also tells her how her daughter skipped classes the last two years. The reason this mother never knew her daughter didn’t graduate college is because of something called FERPA (Family Educational Rights and Privacy Act).…

    • 238 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Jane Jacob starts off chapter 3 talking about judgment and the profound misunderstanding of cities. She compares testimonial banquet to the social life of city sidewalks since they are both public and bring people together. The city sidewalks are used for various reasons from meeting someone, socializing and even public contact. Trust is also very important for sidewalks so that they can be safe places to contact. A matter of city privacy is talked about throughout the entire chapter.…

    • 652 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Information Security at Pfizer Darren Welch, Director of Information Security at Pfizer Pharmaceuticals where he drives a worldwide data security program and leads site data assurance programs at more than 200 offices. In his 18 years at Pfizer, he served the organization at various designations which includes the Threat Intelligence and Incident Response group, Computer Forensic operations, managing data assurance methods and technology, conveying counter-undercover work and general data security planning, formulating security strategies, and performing data security audits. Before his corporate experience, Darren was in Law Enforcement and the US Army Reserves. Pfizer gathers individual data interacting with them.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    Assignment Submitted By Yours Name here Submitted To Yours Instructor Name here To Meet the Needs of the Course Nov., 2015. For this rhetorical analysis task, I have selected the article which is titles as Why Privacy Matters Even if You Have Nothing to Hide, written by Daniel J. Solove.…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Information security is defined as protection of confidentiality, integrity as well as information access (Chen, Ramamurthy & Wen, 2012)). There is evidence which suggests that, regardless of technical controls numbers in place, institutions of higher learning such as Central Michigan University will still have to deal with security breaches. Information security does not only refer to technical problems, but is also known as ‘people’ problem. This is because most breaches occur when the people in an organization do not comply with information security policies pertaining to that particular organization. Information security compliance may be defined as information security standards as well as policies implementation for protection of information…

    • 857 Words
    • 4 Pages
    Improved Essays