Four step Cybersecurity process and more

Amitabh Ghosh:

” We want that education by which character is formed, strength of mind is increased, the intellect is expanded and by which one can stand on one’s own feet.” – Swami Vivekananda

Originally posted on From the Desk of Amitabh B Ghosh:

When  organizations were implementing systems, security was an afterthought… now after couple of decades we are talking of implementing the cybersecurity framework in which privacy and civil liberties is kind of after thought as it shows up in an appendix by itself. It could also be that it is so important, that we do not want another  BAH contractor breach a.k.a NSA  .. which could have been avoided if the  cybersecurity Framework were in place.

Four step  Cybersecurity process

Step 1.  Cyber Hygiene  a.k.a awareness – Train and educate your intangible assets – PEOPLE

Step 2. Cyber Process a.k.a Business –   Know and document details of your Business – PROCESSES

Step 3  Cyber Policies a.k.a Regulation ( compliance) – Is you Business in compliance – POLICIES

Step 4  Cyber Products a.k.a Technologies – Using technology to solve business issues – PRODUCTS

At every step, identify the risk and a…

View original 791 more words

Comments Off

Filed under Soft Skills

Four step Cybersecurity process and more

When  organizations were implementing systems, security was an afterthought… now after couple of decades we are talking of implementing the cybersecurity framework in which privacy and civil liberties is kind of after thought as it shows up in an appendix by itself. It could also be that it is so important, that we do not want another  BAH contractor breach a.k.a NSA  .. which could have been avoided if the  cybersecurity Framework were in place.

Four step  Cybersecurity process

Step 1.  Cyber Hygiene  a.k.a awareness – Train and educate your intangible assets – PEOPLE

Step 2. Cyber Process a.k.a Business –   Know and document details of your Business – PROCESSES

Step 3  Cyber Policies a.k.a Regulation ( compliance) – Is you Business in compliance – POLICIES

Step 4  Cyber Products a.k.a Technologies – Using technology to solve business issues – PRODUCTS

At every step, identify the risk and a risk mitigation strategy ….

Today marked the first day of the 5 Cybersecurity Framework  Webcast:

North Carolina State University will host a live webcast of the morning sessions. The webcast will be made available for playback after the event.

Day 1:http://mediasite.online.ncsu.edu/online/Play/ede7317303514ad592950de979bdeba21d

Day 2:http://mediasite.online.ncsu.edu/online/Play/619e8dc7786845fcb12e264b6be046ab1d

Agenda:

Draft Agenda (Nov. 8, 2013)

Related Project(s):

Cybersecurity Framework website:
http://www.nist.gov/itl/cyberframework.cfm

News 10 new results for cyber security
Cybersecurity and Counter-Terrorism Expert Richard Clarke MarketWatch

Richard Clarke – former Cybersecurity Czar and National Coordinator for Security,  and governments on cybersecurity and counterterrorism, Clarke will present 
See all stories on this topic »
Cyber security roundtableThe Advocate

The MHCC cyber security division hosted a roundtable discussion on emergency management on Tuesday as part of its “Cyber Security Speaker Series.”.
See all stories on this topic »
Lockheed Martin—Cybersecurity Is A Cool Career For Girls (STEM)SatNews Publishers

[SatNews] University of Maryland College Park will welcome more than 350 middle school students at the Cool Careers in Cybersecurity for Girls Workshop 
See all stories on this topic »
Cyber security expert Melissa Hathaway warns governments invest ABC Online

A former cyber security advisor to President Barack Obama and George W Bush is warning computer hackers are becoming more sophisticated and pose an 
See all stories on this topic »
Hanover handles UK cybersecurity for MicrosoftPRWeek

LONDON: Hanover is putting together a policy roundtable on cybersecurity for Microsoft after securing all of its UK public affairs business earlier this year.
See all stories on this topic »
Chertoff Says US Disengaging Won’t Ease Cybersecurity RisksBusinessweek

Michael Chertoff, who was Homeland Security secretary under President George W. Bush, provides his outlook for the cybersecurity industry in the Nov. 18 issue 
See all stories on this topic »
Websense Security Labs Reveals Eight Cybersecurity Predictions Broadway World

SAN DIEGO, Nov. 14, 2013 /PRNewswire/ This year, cybersecurity took center stage with nation-state attacks, numerous high-profile data breaches and 
See all stories on this topic »
Cyber security laws hailedPeninsula On-line

SINGAPORE: Experts said Singapore’s cyber security laws are robust, especially after amendments to the Computer Misuse Act in 2013. Still, they caution that 
See all stories on this topic »
Tenable Network Security Named a Deloitte 2013 Technology Fast Fort Mills Times

COLUMBIA, Md. — Tenable Network Security today announced it was named a Deloitte Technology Fast 500™ Award Winner for 2013, and was included on a 
See all stories on this topic »
Experts propose better cybersecurity information-sharing modelsTechTarget

BOSTON — Better cybersecurity information sharing has long been a priority for the security industry, but significant hurdles have always halted the progress of 
See all stories on this topic »
Blogs 9 new results for cyber security
Cybersecurity Legislation Gets Renewed Push From Financial Firms Ryan Tracy

Top financial-industry lobbyists pressed senators to move forward with cybersecurity legislation, part of an effort to re-energize a campaign that has lost steam 
Washington Wire
Bridging the Cyber Security Skills Gap | IBM Curiosity ShopIBM Curiosity Shop

With cyber security threats growing in number, complexity, and scale each year, future IT security and business leaders need a broader range of skills than ever 
IBM Curiosity Shop
Purdue Cybersecurity Experts Assist In Cyber Attack Drill | News Network Indiana

A nationwide cyber attack drill is underway, testing how the power grid could be compromised and Purdue Cyber Forensics members are involved.
WFIU Local News Podcast
Authorities investigating cybersecurity incidents targeting Dissent

U.S. authorities are investigating a series of cybersecurity incidents targeting the HealthCare.gov website at the center of President Obama’s healthcare law, 
PHIprivacy.net
Steve Daines Questions Cybersecurity Official About Risks in Jon King

Today, November 13, Montana Congressman Steve Daines questioned Roberta Stempfley, the Assistant Secretary of the Department of.
News Talk KGVO Radio
Uncertainty over UR cybersecurity | Campus TimesMatt Shinseki

Student life, from loans and job applications to Facebook posts and Amazon purchases, has increasingly moved online. But with the rise of the Internet, a new 
Campus Times
Summary of Cyber Security Awareness Seminar, Lahore University DRF_Admin

The second Cyber Security Awareness Seminar was held at LUMS in collaboration with the Cyber Security Task Force and the Pakistan Information Security 
Digital Rights Foundation
Webinar series on cyber-security for journalists offered© 2011 SpyGhana.com, All rights reserved.

The webinar series, offered by the National Press Foundation, consists of three courses: “Protecting Information,” “Protecting Whistleblowers and Other Sources” 
spyghana.com
We All Need This: Invincea Launches Small Business Offering To FedCyberTeam

Lack of access to advanced security technology common to larger enterprises makes  In addition, organized cyber-crime now targets small business financial 
FedCyber.com For the Federal Cyber Security and Cyber Operations Practitioners

1 Comment

Filed under Soft Skills

5th Cybersecurity Framework Workshop

5th Cybersecurity Framework Workshop

Purpose:

Executive Order 13636, Improving Critical Infrastructure Cybersecurity, has directed NIST to work with stakeholders to develop a voluntary framework for reducing cyber risks to critical infrastructure. This cybersecurity framework is being developed in an open manner with input from stakeholders in industry, academia, and government, including a public review and comment process, workshops, and other means of engagement.

The fifth Cybersecurity Framework workshop will be hosted November 14-15, 2013 in Raleigh, NC by the North Carolina State University. At this workshop, NIST will continue discussions on the implementation and future governance of the Cybersecurity Framework.

Target Audience: Critical Infrastructure Owners and Operators and cybersecurity staff. Specifically those who have operational, managerial and policy experience and responsibilities for cybersecurity, technology and/or standards development for Critical Infrastructure companies.

Agenda:

Draft Agenda (Nov. 8, 2013)

Related Project(s):

Cybersecurity Framework website:
http://www.nist.gov/itl/cyberframework.cfm

Details:

Start Date: Thursday, November 14, 2013
End Date: Friday, November 15, 2013
Location: North Carolina State University, Hunt Library, Centennial Campus, 1070 Partners Way, Raleigh, NC 27606
Audience: Industry, Government, Academia
Format: Workshop

Registration:

N.C. State University - Directional & Parking Map

Please follow signs for Special Event Parking and DO NOTget a parking pass

n-line registration is now CLOSED.

If you missed the registration deadline, send email toAngela Ellis (NIST Conference Office) for details. Please arrive early for onsite registration which will begin at 7:30am. Please refer to the website for updates prior to the start of the meeting……

Registration Contact:

Accommodations:

Conference rates will be available until October 31, 2013.

Hilton North Raleigh – (Hotel Info.)

Holiday Inn Express Hotel & Suites - (Hotel Info.)

Sheraton Raleigh Hotel – (Hotel Info.)

Note: Transportation from the hotels to NCSU will NOT be provided. There is ample parking available on the campus. Information on parking will be posted to this website within the next week.

Technical Contact:

Comments Off

Filed under Soft Skills

Cybersecurity headline NEWS

News 10 new results for cyber security
Decision makers to explore cyber securityYour Houston News
Learn to combat the latest cyber security threats at the next presentation of University of Houston-Clear Lake’s Cyber Security Institute. “Cyber Security For 
See all stories on this topic »
 
Destroyers like the Zumwalt at BIW present cybersecurity challengesPress Herald
PORTLAND – Combining mechanical and combat systems into an integrated network aboard U.S. warships presents cybersecurity challenges, but there’s no 
See all stories on this topic »
 
Hackers expose weak cyber-defense in AsiaMyBroadband
A rash of website hackings in the Asia-Pacific has exposed weak cyberdefences which must be improved to help the region deal with more sophisticated and 
See all stories on this topic »
Growing cyber attacks pose threat to cloud storage: ExpertsTimes of India
With more businesses storing their crucial data on virtual spaces, security experts have reportedly warned that with lack of security measures, the cloud data is 
See all stories on this topic »
 
The 80-20 rule of cyber securityFutureGov Magazine
80 per cent of cyber attacks are opportunistic threats which can be tackled by cyber hygiene and best practices, according to Arnold Shimo, Chief Technologist, 
See all stories on this topic »
 
Hackers expose Asia’s weak cyber defencesNew Straits Times
Southeast Asia and the wider Asia Pacific region “are growing in significance in terms of cybersecurity issues” as Internet usage becomes more pervasive, said 
See all stories on this topic »
House committee concerned over Obamacare cyber security Examiner.com
13, 2013, in order to thoroughly examine the cyber security deficiencies of President Barack Obama’s healthcare web site, the committee’s chairman, Michael 
See all stories on this topic »
 
Hackers expose Asia’s weak cyber defencesGMA News
Southeast Asia and the wider Asia Pacific region “are growing in significance in terms of cybersecurity issues” as Internet usage becomes more pervasive, said 
See all stories on this topic »
RedSeal Platform DatasheetInformationWeek
Overview: The RedSeal Platform is a cyber-security intelligence system that is based on proactive end-to-end complex network modeling and analysis.
See all stories on this topic »
 
Can’t think of national security without securing cyber space:Business Standard
Addressing the Indian Academy of Science’s (IASc) annual meeting on the issue of Science andSecurity here today, Menon said there has been intimate 
See all stories on this topic »
 
Blogs 1 new result for cyber security
Microsoft’s Releases New Report Of Cyber Security Risks Of Caroline Vutagwa
viruses. Microsoft released its Security Intelligence Report volume 15, which analyzes threat intelligence from over a billion systems worldwide to provide 
TechMoran
 

Comments Off

Filed under Soft Skills

Latest chatter on Cybersecurity

World cybersecurity leaders call for cooperationCBS News

Governments and businesses spend $1 trillion a year for global cybersecurity, but unlike wartime casualties or oil spills, there’s no clear idea what the total 
See all stories on this topic »
Cybersecurity Competition’s Sixth Season Kicks Off To A Larger SatNews Publishers

“CyberPatriot is the nation’s largest and fastest growing youth cybersecurity challenge,” said Bernie Skoch, CyberPatriot Commissioner. “Its unique structure 
See all stories on this topic »
Cyber security company Barracuda’s shares soar in debutReuters

N), a data storage and security company, rose as much as 31 percent in their trading debut, valuing the company at about $1.18 billion. The company raised 
See all stories on this topic »
UPDATE 1-Cyber security company Barracuda’s shares soar in debutReuters

Shares of cybersecurity firms are in high demand because of the scarcity of listed companies in that market and a spike in internet hacking attacks and other 
See all stories on this topic »
The Top Three Cybersecurity Threats You Should be Considering Forbes

Now that National Cybersecurity Awareness Month is officially over I think it’s pertinent to discuss the issues facing IT security and the initiatives needed to 
See all stories on this topic »
National High School Cybersecurity Competition Draws More Than The Herald | HeraldOnline.com

ARLINGTON, Va., Nov. 6, 2013 — /PRNewswire-USNewswire/ — The Air Force Association announced today that CyberPatriot, the National Youth Cyber 
See all stories on this topic »
Cyber security breachHimalayan Times

BRUSSELS: Belgian authorities have opened an investigation into two possible hacking incidents at the office of Prime Minister Elio Di Rupo. The federal 
See all stories on this topic »
Cybersecurity framework and Google beats Northrop!FederalNewsRadio.com

In his latest report:”Cybersecurity Framework Leaves Issues Unresolved: BGOV Insight”, he’ll address what’s lacking and discuss whether the government 
See all stories on this topic »
New Preliminary Cybersecurity Framework Champions Risk The National Law Review

Last week, the National Institute of Standards and Technology officially released an initial draft of thecybersecurity framework and announced a 45-day open 
See all stories on this topic »
Lockheed Martin To Share Cyber Expertise At American Petroleum Wall Street Journal

The Lockheed Martin Commercial Cyber Security team will share their expertise at the eighth annual American Petroleum Institute Cyber Security conference.
See all stories on this topic »
Blogs 10 new results for cyber security
Is the Audit Committee Really the Secret Sauce for Cyber Security Elizabeth Ireland

A recent Federal Computer Week article suggests that in the private sector audit findings are effective at driving action, and that reports from Inspector generals 
The State of Security
CSET 2013 : Workshop on Cybersecurity Experimentation and Test

Overview CSET invites submissions on the science of cyber security evaluation, as well as experimentation, measurement, metrics, data, and simulations as 
WikiCFP
Lockheed Martin Helps Oil Firms Mitigate Cyber Security Risks Offshore Energy Today

Lockheed Martin Helps Oil Firms to Mitigate Cyber Security Risks. Years of experience protecting some of the world’s most sensitive information has led 
Offshore Energy Today
The EU Cybersecurity Directive Will Follow the US Framework | TMT James Stenger

The NIS Directive includes a layer that does not exist in the US Cybersecurity Framework because the EU consists of numerous Member States, each of which 
TMT Perspectives
World cybersecurity leaders call for cooperation | neurope.euacarling

MARTHA MENDOZA, AP National Writer and New Europe STANFORD, California (AP) — Governments and businesses spend $1 trillion a year for global 
Articles
Now’s your chance to influence smart grid cybersecurity standards

Smart Grid – The National Institute of Standards and Technology (NIST) has opened the first revisions of its cybersecurity guidelines for public comment.
SmartGridNews.com
Greatest threat to SG cyber security is FTs working here | The Real therealsingapore

I was a former IT security technician in Singapore. I am aware the purported Anonymous threat, which surfaced last week through a YouTube video. Most people 
The Real Singapore
Vulnerability Management for the Cloud the Focus of Veris Group Rachel Strain

SearchCloudProvider, an online news site for the cybersecurity industry, recently published Veris Group Principal Dave Svec’s and Associate Kyle Snavely’s 
Compliance Services | Cybersecurity Consulting | Veris Group
Invensys CISP Cyber SecurityCyber Security: 11 sure signs you’ve Doug Clifton

CISP Cyber SecurityCyber Security: 11 sure signs you’ve been hackedCISP Cyber Security.
CISP Cyber Security
Report: Chinese Cyber Espionage Operations Expanding | The Anthony M Freed

A draft of a congressional report produced by the U.S.-China Economic and Security Review Commission reveals China has been stepping up their clandestine 
The State of Security
Web 1 new result for cyber security
Cybersecurity framework and Google beats Northrop 

On this week’s Capital Impact show, Bloomberg Government analysts will examine NIST’s preliminarycybersecurity framework, and Google’s lobbying efforts.
www.federalnewsradio.com/…/Cybersecurity-framework-and-…

Comments Off

Filed under Soft Skills

Cybersecurity awareness month

Cybersecurity Bills Pass House Homeland Security CommitteeMultichannel News
The House Homeland Security Committee amended and approved two cybersecurity bills Tuesday(Oct. 29) aimed at 1) boosting government cybersecurity 
See all stories on this topic »
 
Obama Presses Cybersecurity Standards With Corporate ExecutivesBusinessweek
Staff members work at the National Cybersecurity and Communications Integration Center facility in Arlington, Virginia. Photographer: Win McNamee/Getty 
See all stories on this topic »
New cybersecurity report from Microsoft details risks of running MarketWatch
REDMOND, Wash., Oct. 29, 2013 /PRNewswire via COMTEX/ – On Tuesday, Microsoft Corp. released its Security Intelligence Report volume 15, which 
See all stories on this topic »
 
Federal Cybersecurity Falls Short on User-FriendlinessE-Commerce Times
“More security rules, more security tasks, and more security delays have done little to drive more user buy-in for cybersecurity,” said Tom Ruff, vice president for 
See all stories on this topic »
 
Cyber Security Market By (Technology & Solutions) Worth $1201 IT Business Net
According to a new market research report Cyber-Security Market (Identity & Access Management (IAM), Risk & Compliance Management, Data Encryption, 
See all stories on this topic »
 
Obama Presses Cybersecurity Standards With Company ChiefsBloomberg
Amid reports of widespread hacking of computer systems that traced to China, Obama in February ordered development of voluntary cybersecurity standards for 
See all stories on this topic »
 
Cyber security in the era of controlsDefense Systems
Traditional approaches focus on deploying network and endpoint securitysolutions in conjunction with the Defense Information System Agency’s configuration 
See all stories on this topic »
Review your computer security during Nation Cyber Security Seattle Post Intelligencer (blog)
As part of National Cyber Security Awareness Month, the Better Business Bureau serving Alaska, Oregon, and Western Washington and the Washington State 
See all stories on this topic »
 
New Cyber Security Solution that Enhances Protection of Building Broadway World
LEE’S SUMMIT, Mo., Oct. 29, 2013 /PRNewswire-iReach/ In response to the increasing rise of cyberthreats, network compromises and vulnerabilities directed at 
See all stories on this topic »
 
Cyber security month as a marketing conceptFierceFinanceIT
Cyber Security Awareness Month has been around a lot longer than some people realize. It was started 10 years ago by the Department of Homeland Security 
See all stories on this topic »
 
Blogs 6 new results for cyber security
Thales launches £2m cyber security ‘battle lab’ in the UK cwukfeedback@idg.co.uk (Anh Nguyen)
Defence company Thales has announced a new Cyber Integration & Innovation Centre that aims to help improve the security of the UK’s critical national 
Computerworld UK’s News
 
Cyber security firm Cyphort raises USD15.5m – NOAH Conference
Cyber security business Cyphort has raised USD15.5m in a round led by Trinity Ventures with participation from Foundation Capital and Matrix Capital.
NOAH Conference
 
Open Government, Open Data & Cybersecurity | An Interview with Josh Davis
Today, Garrett Dunwoody brings us insight into open data and security at the local level for NationalCybersecurity Awareness Month.
Technically Speaking
 
The Federal Government is Under Attack and Losing | The State of Tripwire Guest Authors
No longer do solitary networks and remote data centers alone require cyber security. Now the interconnectivity of agency networks requires enterprise and 
The State of Security
 
OSFI releases Cyber Security Self-Assessment Guidance | The Colin Henderson
I recently noted the efforts spearheaded by the Bank of England to create a more integrated (across Banks) cyber security strategy. The Canadian Bank regulator 
The Bankwatch
 
Invincea Announces Major Revenue and Deployments Milestones FedCyberTeam
Forrester Research’s Rick Holland recently recommended that organizations; “Don’t just rely uponnetwork security based controls that detect delivery of 
FedCyber.com For the Federal Cyber Security and Cyber Operations Practitioners
 
Web 2 new results for cyber security
Cybersecurity expert after finding an easy way to hack HealthCare 
And it was very clear to me in the hearing that they do not have an overarching solid cyber securityplan to prevent the loss of private information. I’m even more 
hotair.com/…/cybersecurity-expert-after-finding-an-easy-way-…
 
Cyber security awareness – TODAY’S TMJ4
We lock our doors, shred documents, and take other security measures. But, when was the last time that you took action to be sure that your computer, mobile 
www.jrn.com/tmj4/…/Cyber-security-awareness-229730311.ht…

Comments Off

Filed under Soft Skills

Latest Cybersecuirty topics

News 10 new results for cyber security
Market for cybersecurity workers remains competitive as demand Washington Post
The demand for cybersecurity talent continues to grow in the Washington area, pushing many contracting companies to employ offbeat tactics to recruit and 
See all stories on this topic »
 
Cybersecurity tax credit part of Montgomery County’s effort to Washington Post
Cybersecurity companies in Montgomery County will be eligible for tax credits starting next year as part of the county’s mission to become a national hub for 
See all stories on this topic »
 
Cyber security: it’s big and it’s scaryThe Lawyer
This week’s issue is devoted to cyber security, a topic simultaneously fascinating and terrifying. Along with our lead feature, we also have an interview with the 
See all stories on this topic »
 
INL cyber security scientists explore what could happen in a national The Idaho Statesman
Cybersecurity is a top priority for the electric power industry,” said Stephanie McCurdy, an Idaho Power spokeswoman, also via email. “The industry never stops 
See all stories on this topic »
 
Cyber security: Lawyers are the weakest linkThe Lawyer
Law firms are in the front line of cyber security threats, with hackers increasingly targeting the legal profession for the goldmine of sensitive and confidential client 
See all stories on this topic »
 
Cybersecurity Still an Issue with Healthcare.GovPJ Media
It was very clear to me in the hearing that (the websites) do not have an overarching solid cyber security plan to prevent the loss of private information,” the 
See all stories on this topic »
Cyber security: An immune system for informationThe Lawyer
Simply put, Darktrace is a cyber security technology firm that delivers an intelligence-led approach in an effort to protect companies from advanced cyber threats, 
See all stories on this topic »
 
Cyber security Q&A: Investment by digital guardiansThe Lawyer
The number of deals is still relatively low, especially in the context of the broader technology space, and demand for cyber security products will keep growing.
See all stories on this topic »
 
Raytheon, other contractors look to create cybersecurity talent pipelineWashington Post
Multiple reports showed the demand for cybersecurity and other technology jobs was set to grow far faster than the pool of people qualified to do that work.
See all stories on this topic »
 
Cyber security: IBM ramps up its analytics armouryThe Lawyer
One of the most talked-about transactions in the cyber security industry in recent weeks has been IBM’s acquisition of Trusteer, an Israeli provider of endpoint 
See all stories on this topic »
 
Blogs 1 new result for cyber security
Cold justice, bad optics, junk science, cyber-security, and cocaine Gritsforbreakfast
Cold justice, bad optics, junk science, cyber-security, and cocaine on your cash. Here are a few odds and ends that caught Grits attention last week but failed to 
Grits for Breakfast

Comments Off

Filed under Soft Skills

Latest on Health Care

Obama: Health Care Reform Not About WebsiteVoice of America
U.S. President Barack Obama says the glitches of the Healthcare.gov website are “frustrating,” but people are working around the clock to to fix the problems.
See all stories on this topic »
Group marches for health care for allBaltimore Sun
The group, Healthcare is a Human Right-Maryland, led a rally Saturday in Baltimore to push for single-payer coverage similar to that in countries such as 
See all stories on this topic »
Rogers: Healthcare.gov isn’t secureCNN (blog)
Today on CNN’s State of the Union with Candy Crowley, Rep. Mike Rogers (R-MI), chair of the House Intelligence Committee, spoke EXCLUSIVELY to CNN 
See all stories on this topic »
Health insurance fair draws thousands to downtown DallasDallas Morning News
Alexander Brena jumped rope with Erica Caraway, a representative from one of more than 30 community and health care groups at Be Covered Texas.
See all stories on this topic »
Insurance uncertainty, • Two Bend-based plans don’t know if they’ll Bend Bulletin
Sunset Plumbing in Bend provides employee health insurance through a Bend Chamber of Commerce-sponsored health plan. Co-owner Julie Childress, left, 
See all stories on this topic »
 
Health care call centers: ‘Controlled chaos’TheNewsTribune.com
WASHINGTON — An elderly man calls to ask if the land he owns will count as income to qualify forhealth coverage through Medicaid. A legal immigrant asks if 
See all stories on this topic »
 
For Obama, health care woes may have staying powerThe Tennessean
But some Republicans see the disastrous rollout of Obama’s health carelaw as a  website for uninsured Americans to get health care coverage are tangible for 
See all stories on this topic »
Healthcare website ‘an absolute disaster’ says Congressman MesserShelbynews
From it’s Oct. 1 launch, the HealthCare.gov website, where people can go to enroll in the program and shop for plans, has been fraught with technical problems.
See all stories on this topic »
 
Administration: Info provided during health-care sign-up not used for Washington Post
WASHINGTON — The Obama administration is stressing that information submitted while signing up for coverage under the new health care law will not be 
See all stories on this topic »
Health care concernsBend Bulletin
Julie Childress just wants a little certainty when it comes to health insurance for  the new federalhealth care program, the Affordable Care Act, debuts on Jan.
See all stories on this topic »
 
Blogs 10 new results for Health Care
How Big Data is destroying the US healthcare system – BetaNewsRobert X. Cringely
One thing I find ironic in the current controversy over problems with the healthcare.gov insurance sign-up web site is that the people complaining don’t really 
BetaNews
 
Jindal: Maybe Admin Will Bring in Al Gore to Fix Healthcare.gov Washington Free Beacon Staff
In a Fox News Sunday interview, Louisiana Governor Bobby Jindal joked the Obama administration will eventually get the healthcare.gov website fixed, perhaps 
Washington Free Beacon
 
Big Bear Valley Community Healthcare District’s Pink Glove Dance cassiegaskinktla
Since 1994, the Soroptimists of Big Bear Valley have raised funds to provide screening mammograms for the uninsured and under insured women of Big Bear.
KTLA 5
 
Why the Obamacare website Healthcare.gov had zero chance of Derrick Wlodarz
If you wanted to build a case study in the perfect recipe for IT project disaster, you wouldn’t have to look any further than the new official Obamacare website, 
BetaNews
 
Healthcare.gov glitches at center of weekly addresses – Fox 59 Newssabrinaadamsfox59
(CNN) — The chairman of the committee that heard hours of testimony this week over glitches in thehealthcare.gov website put Obamacare on the chopping block in the 
Fox 59 News - fox59.com
 
‘Left, Right & Center’: Health Care, the Snowden Files, JPMorgan’s editor@truthdig.com
Truthdig Editor-in-Chief Robert Scheer and the other “Left, Right & Center” panelists discuss the congressional hearing about Healthcare.gov. Also, another 
Truthdig: Drilling Beneath the Headlines
 
Healthcare.fail Undermines Obama’s Vow On Government…Says William Teach
Healthcare.fail Undermines Obama’s Vow On Government…Says NY Times. Written By : William Teach October 27, 2013. Boy howdy, this is a new line of 
Right Wing News
 
SNL’s ‘Sebelius’ on Healthcare.gov site difficulties: ‘Have you tried Scott Kaufman
Last night, Saturday Night Live presented a “special announcement” from the Secretary of Health and Human Services, Kathleen Sebelius (Kate McKinnon).
The Raw Story
 
Lack of information on health care law fuels more residents to Michael Finch II | mfinch@al.com
Residents looking for basic knowledge about the Affordable Care Act may have found some Saturdayat a seminar at All Saints Episcopal Church. The event 
Real-Time News from Mobile
 
Obama: Healthcare website to be improved by end of November ashleyedwardswpix
In Saturday’s weekly address, President Obama promised that the Affordable Care website will be up and running properly in just weeks.
PIX 11
 
Web 10 new results for Health Care
U.S. hires contractor to fix healthcare website – latimes.com
The Obama administration hires a contractor to repair the troubled health insurance website, vowing it will be fixed in November.
www.latimes.com/…/la-na-healthcare-website-20131026,0,476…
 
Health Care Website Will Take Month To Fix, Obama Administration 
WASHINGTON — WASHINGTON (AP) — It should be working well by the end of November. That’s the Obama administration’s rough timetable for completing a 
www.huffingtonpost.com/…/health-care-website_n_4165868….
 
Obama: HealthCare.gov problems are “frustrating” – CBS News
President vows fixes to troubled health-care website while key GOP congressman again calls for individual-mandate delay.
www.cbsnews.com/8301-250_162-57609449/
 
Administration: Personal info for health care only – Yahoo News
From Yahoo News: WASHINGTON (AP) — The Obama administration is stressing that information provided while signing up for coverage under the new health 
news.yahoo.com/administration-personal-health-care-only-19…
 
Michelle Obama’s Princeton classmate is executive at company that 
 Princeton Alumni. Read more. This article was posted: Saturday, October 26, 2013 at 12:45 pm. Tags: domestic news, government corruption, healthcare 
www.infowars.com/michelle-obamas-princeton-classmate-is-e…
 
Obama Administration Aims To Put Health Care, Personal 
WASHINGTON — WASHINGTON (AP) — The Obama administration is stressing that information provided while signing up for coverage under the new health 
www.huffingtonpost.com/…/obama-administration-health-care…
 
Jeffrey Zients Appointed To Fix Healthcare.gov – Slashdot
An anonymous reader writes with news that the Obama administration has appointed Jeffrey Zients to lead the effort to revamp Healthcare.gov after its trouble 
slashdot.org/…/jeffrey-zients-appointed-to-fix-healthcaregov
 
U.S. Healthcare Is Not Manageable by Federal Gov’t
Republicans predicted that the federal government was too incompetent to run the health-caresector — and this tends to prove they were right all along, and 
www.realclearpolitics.com/…/us_healthcare_is_not_manageabl…
 
A Rare Victory Against Health Care-Strangling Red Tape – Reason 
With Obamacare coming into effect, things are going to get worse before they get better.
reason.com/archives/2013/…/how-red-tape-strangles-health-ca…
 
3 Horrendous Health-Care Stocks This Week (HWAY, PACB, RPRX 
Which health-care stocks struck out the worst this week? Healthways, Repros Therapeutics, and Ziopharm — along with Pacific Biosciences — swung and missed 
www.fool.com/…/3-horrendous-health-care-stocks-this-week.a…

Comments Off

Filed under Soft Skills

<a href="

” title=”Vision and Mission Statements”>Vision and Mission Statements

What defines a company, organization or countries, it all starts with people

 

Comments Off

October 27, 2013 · 6:37 pm

” We want that …

” We want that education by which character is formed, strength of mind is increased, the intellect is expanded and by which one can stand on one’s own feet.” Swami Vivekananda

Comments Off

July 24, 2013 · 6:44 pm