This article is part of an Essential Guide, our editor-selected collection of our best articles, videos and other content on this topic. Explore more in this guide:
5. - Your questions answered: Read more in this section
- Mike Chapple, Enterprise Compliance
- Joseph Granneman, Security Management
Explore other sections in this guide:
Joseph Granneman is SearchSecurity.com's resident expert on information security management (click the tab "Ask a question" tab above to submit your question for Joe). He has more than 20 years of technology experience, primarily focused in health care information technology.
He is an active independent author and presenter in the health care information technology and information security fields. He is frequently consulted by the media and interviewed on various health care information technology and security topics. He has been focused on compliance and information security in cloud environments for the past decade with many different implementations in the medical and financial services industries.
Granneman has been active in many standards groups, including the developing the early frameworks for Health Information Exchange as part of the Health Information Security and Privacy Security Working Group for Illinois. He was also a volunteer for Certification Commission for Health Information Technology (CCHIT) Security Working Group, which developed the information security standards for ARRA certification of electronic medical records. He is currently a member of the Metropolitan Chicago Healthcare Council HIE Planning & Technology committee. He also continues to be involved in InfaGard and the Chicago Electronic Crimes Task Force. Granneman has a BS in Music Business from Millikin University and an MBA from Northern Illinois University.
Do you have a question for our experts?
Contributions from Joseph Granneman, Security Management
- The Target data breach proves to be a game-changer
- No reinforcements: Surviving an InfoSec staff shortage
- Learning from Target: Third-party security controls
- The value of open source intelligence to enterprises
- Does HCISPP certification have value for infosec pros?
- Must-have business skills for information security pros
- How to explain information security concepts to executives
- The right way to monitor employees on social media
- How to block Dropbox and avoid a user revolt
- Security staffing strategies for midsize companies
- Which skills can earn CISOs more money?
- How the Affordable Care Act impacts information security
- Three ways CISOs can make security a priority for the C-suite
- How to avoid being a statistic in the 2014 Verizon DBIR
- Can the RACI matrix assess human-related risk?
- Introduction to the MEHARI risk management framework
- What to take from Department of Defense mobile device guidelines
- FEMA's National Mitigation Framework and disaster preparedness
- Do the NSA leaks change how corporate data is defended?
- To successfully fill the CISO role, focus on winning influence