Government Information Security Podcast

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Lessons of Sept. 11

    07/09/2011

    As we approach the 10-year anniversary of the 9/11 attacks on the U.S., Kevin Sullivan, a former investigator with the New York State Police, reflects on lessons learned and steps industries still need to take to ensure a tragedy like 9/11 is never repeated.

  • Social Media: Why Training Is Key

    02/09/2011

    Frequent face-to-face training on social media policies is a vital component of any risk management effort, says consultant Erika Del Giudice.

  • The Power of the Next Generation Firewall

    01/09/2011

    Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.

  • Why IT Security Careers Remain Hot

    30/08/2011

    Careers in IT security remain hot, says David Foote, noted researcher and analyst of IT workforce trends. But there's a disconnect between current job opportunities and the talent pool looking to fill them.

  • Facial Biometrics Pose Privacy Woes

    29/08/2011

    Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the biometric technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the biometric data, cautions a privacy rights leader.

  • Offering a Helping Hand to Agencies

    26/08/2011

    In many states, the top information security officer champions IT security rather than dictates it, as the decisions of specific steps to take to safeguard digital assets are left to departments, agencies and commissions.

  • Fraud: 'A Serious Problem'

    26/08/2011

    Fraud is a global concern, and an area regulators and financial institutions the world-over are watching closely, says Bill Isaac. Whether a cyberthreat or mortgage fraud, investments in fraud prevention will continue, despite the state of the international economy.

  • Infosec in a Decentralized Environment

    23/08/2011

    Give a man a fish, you feed him for today, the proverb says. Teach a man to fish; and you feed him for a lifetime. That adage can be applied to information security, as well.

  • PCI: New Tokenization Guidance Issued

    12/08/2011

    Bob Russo says the long-awaited PCI guidance on tokenization should provide merchants with a baseline for standardization and best practices, and serve as a roadmap for how tokenization can complement compliance with the PCI-DSS.

  • New Ideas for Securing the Web

    12/08/2011

    As far as Dr. Giles Hogben of ENISA is concerned, now might be the golden opportunity for information security experts to influence the security and privacy measures that may help define Internet safety for the next decade or beyond.

  • Creating Ag Extension Agent for Cyber

    10/08/2011

    Eugene Spafford thinks America needs the cybersecurity equivalent of an agriculture extension service to help educate citizens on IT security.

  • Creating a Culture of Security

    08/08/2011

    Yahoo's Justin Somaini believes his fellow CISOs in business and government do a good job keeping their bosses informed of proper information security practices, but could do better in educating the rank and file about them.

  • Securing the Cloud

    05/08/2011

    ISACA's Marc Vael says differences in cloud computing environments and cloud providers can pose security risks. But well thought-out contracts and risk-management plans can fill potential security gaps and ensure business continuity during outages and disasters.

  • Inside a Fraud Investigation

    03/08/2011

    No two fraud incidents may be exactly alike, but a fraud investigator's approach can still be very consistent and precise, says Jean-Francois Legault, a fraud investigations specialist with Deloitte and Touche.

  • Cloud Computing: Critical Issues

    02/08/2011

    Before entering a contract with a cloud computing company, organizations should consider three critical issues, says Feisal Nanji, executive director at the security consulting firm Techumen.

  • The Value of Penetration Testing

    01/08/2011

    Scott Laliberte, managing director of Protiviti, wrote the book on penetration testing, and he has strong feelings about what organizations are doing right and wrong when assessing their information security risks today.

  • Easing Burden to Comply with IRS Rules

    28/07/2011

    Oregon Chief Information Security Officer Theresa Masse finds herself at the center of a state initiative to simplify compliance by agencies with Internal Revenue Service rules to safeguard taxpayer data.

  • The ROI of Trustable Identities

    27/07/2011

    There are significant hard and soft benefits for government agencies to gain by investing now in solutions built around Trustable Identities, says Mike Ozburn, principal of Booz Allen Hamilton.

  • New Normal: Under Attack

    26/07/2011

    It's the new conventional wisdom: all computer networks will be attacked. For Phyllis Schneck, that means organizations must be resilient, keeping computers functioning even when they're under assault.

  • Forensics in the Cloud

    26/07/2011

    Performing digital forensics in the cloud isn't necessarily a new discipline, says Rob Lee of SANS Institute. But the task definitely requires a whole new mindset and some new skills from investigators.

página 134 de 158