Government Information Security Podcast

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • How to Win a Cyberwar: Use a Combined Intelligence Strategy

    06/02/2024

    In times of conflict, such as the Israel-Hamas war, intelligence becomes even more important than it is in peacetime. Red Curry, chief marketing officer at Tautuk, and his brother, Sam Curry, CISO at Zscaler, discuss the need for a combined intelligence strategy and better resilience in wartime.

  • Pushing the Healthcare Sector to Improve Cybersecurity

    31/01/2024

    Getting the health sector to vastly improve the state of its cybersecurity will take much more than the recent issuance of federal guidance outlining cyber performance goals for entities. It will also require new government incentives and mandates, said Steve Cagle, CEO of consultancy Clearwater.

  • Resilience: The New Priority for Your Security Model

    25/01/2024

    Security leaders focus on protection and detection, but the new priority is resilience. A resilience strategy should "get the real 'ground truth' of what has happened" in the attack, said Brian Dye, CEO of Corelight, in this episode of "Cybersecurity Insights."

  • How a Novel Legal Maneuver Got a Hospital's Stolen Data Back

    17/01/2024

    The ubiquity and anonymity of cryptocurrencies are fueling economic, legal and ethical challenges that put healthcare entities in the crosshairs of cybercriminals, said David Hoffman, general counsel of Claxton-Hepburn Medical Center, which recently filed a lawsuit against ransomware gang LockBit.

  • XDR and the Benefits of Managed Services

    16/01/2024

    Extended Detection and Response (XDR) has evolved significantly over the past few years, becoming more critical than ever for organizations in need of enhanced capabilities. But so, too, have the accompanying managed services evolved. Port53 Technologies President Omar Zarabi explains.

  • How the Merck Case Shapes the Future of Cyber Insurance

    11/01/2024

    Merck & Co.'s proposed settlement with insurers over a $1.4 billion claim related to the NotPetya attack will change the language the insurance industry uses to exclude acts of war in its policies, and organizations need to consider how those changes affect risk, said attorney Peter Halprin.

  • Large Language Models: Moving Past the Early Stage

    03/01/2024

    AI, machine learning and large language models are not new, but they are coming to fruition with the mass adoption of generative AI. For cybersecurity professionals, these are "exciting times we live in," said Dan Grosu, CTO and CISO at Information Security Media Group.

  • Top Considerations for Complying With My Health My Data Act

    01/01/2024

    It's time for companies dealing with non-HIPAA-regulated health information to plan their compliance with Washington state's My Health My Data Act, which goes into effect in the new year and affects organizations that are based in other states, said attorney James Hennessy of law firm Reed Smith.

  • How One University Is Beefing Up Cyber Defenses, Programs

    29/12/2023

    Educational institutions are prime targets for ransomware and other cyberattacks due to their open nature and troves of sensitive data, requiring continuous investment in cyber defenses and strong security practices, said Steve Zuromski, CIO at Bridgewater State University in Massachusetts.

  • Fighting AI-Fueled Attacks With AI-Based Cyber Tools

    26/12/2023

    Healthcare CISOs must recognize the real and imminent threat of AI-fueled cyberattacks and take proactive steps, including the deployment of AI-based security tools, to protect patient data and critical healthcare services, said Troy Hawes, managing director at consulting firm Moss Adams.

  • The Critical Need for Human Oversight in Healthcare AI

    26/12/2023

    AI holds great promise for automating and improving many healthcare processes and tasks - including clinical decision support - but if some users become overly dependent on these systems, that could be potentially detrimental to patients, says attorney Lee Kim of HIMSS.

  • Domain Name Security Challenges

    25/12/2023

    Protecting domain name systems finally has the attention of cybersecurity professionals -because every recent large data breach has involved a DNS vulnerability. But there is much work to be done. According to Ihab Shraim, chief technical officer at Corporation Services Company, just 1 in 100 security companies knows who their registrar is and where their domain name resides.

  • Buckling Down on Vendor Security Risk in Healthcare

    22/12/2023

    With the surge in major cyber incidents involving third-party suppliers, it's critical for healthcare sector entities to raise their security expectations and tighten their requirements for vendors handling sensitive data, said Renee Broadbent, CIO of Southern New England Healthcare.

  • How a CEO Runs a Company in Wartime

    08/12/2023

    Yossi Appleboum, CEO of Sepio Systems in Israel, discusses the international support for Israel in the Israel-Hamas war and what his employees are doing to support the war effort, how the war is affecting Sepio Systems' performance and how generative AI can be "not a tool but a member of your team."

  • Israel-Hamas War: 'We All Know Someone That Lost Someone'

    07/12/2023

    After the latest Israel-Hamas war began, Kollender found herself trying to return to her homeland, but "no airline was flying to or from Israel," she said. In this episode of CyberEd.io's podcast series "Cybersecurity Insights," she discussed her personal views about the Israel-Hamas war.

  • Supporting CISA - The 'Focal Point of Our Defensive Efforts'

    06/12/2023

    On Nov. 8, Tenable Chairman and CEO Amit Yoran wrote a letter to Congress in support of CISA. In this episode of "Cybersecurity Insights," Yoran calls the agency the "primary focal point of our defensive efforts" and discusses why the country needs to stay unified on defeating cyberthreats.

  • Mapping the Unseen Vulnerabilities of Zombie APIs

    05/12/2023

    Zombie APIs are becoming more common, just because of the sheer number APIs and third-party vendors that organizations rely on. Joshua Scott, head of information security and IT at API platform Postman, says businesses need to identify "what is critical to the business and map backward."

  • Good Governance: 'It's All Hygiene'

    30/11/2023

    In the constant struggle to manage the other five pillars - identify, protect, detect, respond and recover - security leaders often do not have governance at top of mind, said Netography CEO Martin Roesch, but he added, "Good governance is the root of having good security."

  • Stopping Cloud Workload Attacks

    29/11/2023

    In this episode of "Cybersecurity Insights," Eyal Fisher discussed Sweet Security's Cloud Runtime Security Suite, which helps CISOS and security teams defend against all stages of a cyberattack by gathering data, generating insights, baselining the normal environment and looking for deviations.

  • Mapping Access - and Attack - Paths in Active Directory

    28/11/2023

    A directory service should be a "source of truth," said Justin Kohler, vice president of products at Spector Ops. But when users are overprivileged or misconfigurations occur, that creates attack hubs. Kohler discusses BloodHound, a solution he says is like Google Maps for Active Directory.

página 2 de 157