Government Information Security Podcast

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • RSA's CSO Tells Why He Took the Job

    12/07/2011

    Eddie Schwartz didn't shy away from the offer to become RSA's first chief security officer after the security firm experienced a sophisticated advanced-persistent-threat breach. Instead, Schwartz embraced the hack as the reason to take the job. (See RSA to Get Its First Chief Security Officer.)

  • New Roles in Risk Management

    11/07/2011

    Recent high-profile data breaches and heightened threats add up to one thing: a bright future for information security professionals who want to start or re-start a career in risk management.

  • Shutdown Takes Toll on Infosec Pros

    08/07/2011

    Minnesota has seen an increase in malicious traffic since the state government shut down a week ago, but state CISO Chris Buse says sophisticated intrusion-detection systems and an alert skeleton staff have prevented any harm from being done, at least to the part of state government IT controlled by the Office of Enterprise Technology.

  • Biometrics Seen as SecurID Alternative

    07/07/2011

    RSA customers who feel victimized by last March's breach of the security vendor's computers have viable options that include continued use of the SecurID authentication tokens, those offered by competitors, or something entirely different: biometrics.

  • Fraud Fighters Wanted

    05/07/2011

    Today's top fraud threats recognize no global boundaries, says James Ratley, head of the Association of Certified Fraud Examiners. And they require a stronger global workforce than ever before.

  • RSA's Post-Breach Security

    01/07/2011

    Eddie Schwartz, the new - and first - chief security officer of RSA, says the IT security provider hit by a sophisticated advanced-persistent-threat attack in March is focusing internal security on efforts to reduce the time an intruder can go undetected.

  • Business Associates: Minimizing Risk

    29/06/2011

    A key factor in minimizing the risk of a breach when working with business associates is to provide these partners with the minimum amount of information they need to perform their services, says security expert Brian Lapidus.

  • Gov't Shutdown Poses Unseen Challenges

    28/06/2011

    Minnesota faces a government shutdown Friday, and state CISO Chris Buse confronts unexpected barriers in preparing for it. No one yet knows what services the IT security organization must support once the midnight deadline passes.

  • Privacy by Redesign: A New Concept

    28/06/2011

    Organizations' biggest obstacles to privacy protection are the organizations themselves - specifically, their silos - says Dr. Ann Cavoukian, proponent of the new concept, Privacy by Redesign.

  • Executive Decision: What to Encrypt

    27/06/2011

    SafeNet CEO Chris Fedde says top executives, not chief information or chief information security officers, should have final say on what data to encrypt.

  • Cybersecurity: BITS Supports Obama Bill

    27/06/2011

    Leigh Williams says preventing online data breaches requires cooperation within the online ecosystem from domestic and international organizations. Spearheading and maintaining that cooperation requires federal oversight, he contends.

  • Compelling Compliance Via Regulations

    22/06/2011

    Sen. Robert Menendez says regulators should have the power to compel banks to toughen IT security and offer timely customer notification of a breach. But if they don't, the Banking Committee member says in an interview, they should come to Congress to get that authority.

  • 4 R&D Initiatives Focus on Infosec

    21/06/2011

    Northrop Grumman Cybersecurity Research Consortium's Robert Brammer says IT security researchers should think like Wayne Gretzky, the National Hockey League hall of famer: Skate to where the puck will be.

  • VA Addresses Medical Device Security

    21/06/2011

    The latest component of the U.S. Department of Veterans Affairs' ongoing effort to protect medical devices from malware is the creation of a centralized patch management system, says Randy Ledsome, the VA's acting director of field security operations.

  • FDIC on Disaster Recovery

    14/06/2011

    FDIC examiner Donald Saxinger says cloud computing can pose challenges when it comes to business continuity during disasters. Proactive vendor management, he says, is the best way to address potential hiccups before they become big problems.

  • RSA Breach: Token Replacement is 'Smart'

    08/06/2011

    IT security expert Marcus Ranum says RSA's offer to replace its SecurID tokens is a deal worth taking.

  • Mobile Devices - Risks & Rewards

    03/06/2011

    What's the top threat on the minds of global IT leaders? Employee-owned mobile devices - or BYOD (bring your own device), as the trend is known. The struggle: Do mobile device benefits outweigh the organizational risks?

  • New Index Measures Cyberspace Safety

    02/06/2011

    Quantifying the safety or danger of cyberspace is tough. But a highly respected IT security practitioner and an experienced risk management consultant have teamed to develop an index they contend reflects the relative security of cyberspace by aggregating the views of information security industry professionals.

  • Author Describes Disclosures Rule

    01/06/2011

    Adam Greene, the primary author of the proposed accounting of disclosures rule mandated under the HITECH Act, describes its major provisions and offers advice on how to prepare.

  • Public Health Serves as Cybersec Model

    31/05/2011

    The same approach governments and businesses employ to protect individuals from the dangers of secondhand smoke could be applied to safeguard cyberspace, says Scott Charney, Microsoft's vice president of trustworthy computing, engineering excellence and environmental sustainability.

página 135 de 158