Information security and risk management
1. Find an article online that discusses a breach or violation of a regulation, such as HIPAA, or of a standard such as PCI-DSS, GLBA, or FERPA. 2. Summarize the article in your own words and address the controls that the organization should have had in place, but didn’t, that …