Government Information Security Podcast
- Autor: Vários
- Narrador: Vários
- Editor: Podcast
- Mas informaciones
Informações:
Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Inside New PCI Guidance
21/03/2011PCI Council's Jeremy King says guidance tackles data collected via phone communications.
-
Special Report: The RSA Breach and its Impact
18/03/2011The announcement by RSA that it had been a victim of an advanced persistent threat shook the global information security industry. Stephen Northcutt of SANS Institute and David Navetta of the Information Law Group offer insight on what happened, what it means and how to respond.
-
GovInfoSecurity.com
Week In Review
for Friday, March 18, 201118/03/2011Hackers target RSA's SecurID products, leading federal IT policymakers question America's preparedness for cyberattacks, new House bill would reform federal IT security governance and why Ohio state government decided to standardize on NIST IT security framework.
-
RSA Breach: 'Not a Game-Changer'
18/03/2011It's serious news that RSA's SecurID solution has been the target of an advanced persistent threat. But "It's not a game-changer," says Stephen Northcutt, CEO of SANS Institute. "Anybody who says it is [a game-changer] is an alarmist."
-
Lessons From Japan's Disaster
18/03/2011ChicagoFIRST's Brian Tishuk says local lessons can be learned from Japan, especially within the financial, government and healthcare sectors.
-
Legal View of RSA Breach
18/03/2011"Persistent" is the operative word about the advanced persistent threat that has struck RSA and its SecurID products. "If the bad guys out there want to get to someone ... they can," says David Navetta of the Information Law Group.
-
ISMG Week in Review for Fri., March 18, 2011
18/03/2011A roundup of this week's top news: Hackers target RSA's SecurID products. Also, Japan's nuclear crisis: What do you need to know? Plus: New Health Net breach may be biggest ever.
-
Japan's Crisis: What You Need to Know
16/03/2011Disaster recovery expert Regina Phelps says Japan's nuclear emergency puts local citizens at risk, but organizations globally can learn from the crisis. "I hope that all of us look at this and ask, 'What can I do to be better prepared?'"
-
How Ohio Decided on NIST Framework
16/03/2011Cobit, ITIL, ISO, NIST, an alphabet soup of standards governments often rely on to assure the safety of their IT systems. Ohio government IT leaders saw standardizing on one framework to be a more efficient way to help safeguard IT.
-
Multifactor Authentication Needs Focus
16/03/2011Current solutions are good at authenticating users, but not the integrity of the transactions, says Rik Ferguson of Trend Micro. "We're not authenticating the right things."
-
Australia: Cyber Crime Fight
16/03/2011Australia's government agencies can learn a lot from the nation's banks, when it comes to risk management and protecting privacy, says Graham Ingram, General Manager of the Australian Computer Emergency Response Team. "There are too many people in government organisations who are in denial [of risks]," he says.
-
Fighting Cross-Channel Fraud
15/03/2011Zayd Sukhun says global political unrest has upped regulators' expectations for banks to streamline fraud-detection tools and techniques.
-
OCR's McAndrew on Enforcing HIPAA
14/03/2011Susan McAndrew of the HHS Office for Civil Rights discusses recent high-profile HIPAA cases, upcoming state attorneys general training and the pending HIPAA audit program.
-
How Gov't Will Fix WikiLeaks Problem
12/03/2011This week's report focuses on one story: Senate WikiLeaks hearing, in which administration officials explained how the WikiLeaks episode occurred and what's being done to prevent such a breach from occurring again.
-
Japan Disaster: Business Continuity
11/03/2011In the initial wake of Japan's devastating earthquake and subsequent tsunami, business continuity plans have been tested, and organizations now are dealing with severe aftershocks and a growing national crisis, says Alan Berman, executive director of DRI International.
-
State Infosec Unit Shifts Focus to Risk
10/03/2011Iowa CISO Jeff Franklin explains how collecting real-time information helps the state information security office transition its focus from technology to risk management.
-
The 3 Pillars of Trust
09/03/2011The Internet is inherently insecure, and the only way to ensure today's evolving information systems is to build them upon three pillars of trust.
-
Breach Notification and National Security
08/03/2011Today's technology is not adequately used, says attorney Lucy Thomson.
-
3 Infosec Challenges States Face
07/03/2011For former New York State CISO Will Pelgrin, mobile devices, insiders and old infrastructure represent the major challenges local and state governments face in 2011 in securing information technology.
-
Roadmap to EMV
07/03/2011The Smart Card Alliance's Vanderhoof says U.S. card issuers will likely rely on contactless mag-stripe technology to bridge a payments migration to EMV.