Government Information Security Podcast

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Inside New PCI Guidance

    21/03/2011

    PCI Council's Jeremy King says guidance tackles data collected via phone communications.

  • Special Report: The RSA Breach and its Impact

    18/03/2011

    The announcement by RSA that it had been a victim of an advanced persistent threat shook the global information security industry. Stephen Northcutt of SANS Institute and David Navetta of the Information Law Group offer insight on what happened, what it means and how to respond.

  • GovInfoSecurity.com
    Week In Review
    for Friday, March 18, 2011

    18/03/2011

    Hackers target RSA's SecurID products, leading federal IT policymakers question America's preparedness for cyberattacks, new House bill would reform federal IT security governance and why Ohio state government decided to standardize on NIST IT security framework.

  • RSA Breach: 'Not a Game-Changer'

    18/03/2011

    It's serious news that RSA's SecurID solution has been the target of an advanced persistent threat. But "It's not a game-changer," says Stephen Northcutt, CEO of SANS Institute. "Anybody who says it is [a game-changer] is an alarmist."

  • Lessons From Japan's Disaster

    18/03/2011

    ChicagoFIRST's Brian Tishuk says local lessons can be learned from Japan, especially within the financial, government and healthcare sectors.

  • Legal View of RSA Breach

    18/03/2011

    "Persistent" is the operative word about the advanced persistent threat that has struck RSA and its SecurID products. "If the bad guys out there want to get to someone ... they can," says David Navetta of the Information Law Group.

  • ISMG Week in Review for Fri., March 18, 2011

    18/03/2011

    A roundup of this week's top news: Hackers target RSA's SecurID products. Also, Japan's nuclear crisis: What do you need to know? Plus: New Health Net breach may be biggest ever.

  • Japan's Crisis: What You Need to Know

    16/03/2011

    Disaster recovery expert Regina Phelps says Japan's nuclear emergency puts local citizens at risk, but organizations globally can learn from the crisis. "I hope that all of us look at this and ask, 'What can I do to be better prepared?'"

  • How Ohio Decided on NIST Framework

    16/03/2011

    Cobit, ITIL, ISO, NIST, an alphabet soup of standards governments often rely on to assure the safety of their IT systems. Ohio government IT leaders saw standardizing on one framework to be a more efficient way to help safeguard IT.

  • Multifactor Authentication Needs Focus

    16/03/2011

    Current solutions are good at authenticating users, but not the integrity of the transactions, says Rik Ferguson of Trend Micro. "We're not authenticating the right things."

  • Australia: Cyber Crime Fight

    16/03/2011

    Australia's government agencies can learn a lot from the nation's banks, when it comes to risk management and protecting privacy, says Graham Ingram, General Manager of the Australian Computer Emergency Response Team. "There are too many people in government organisations who are in denial [of risks]," he says.

  • Fighting Cross-Channel Fraud

    15/03/2011

    Zayd Sukhun says global political unrest has upped regulators' expectations for banks to streamline fraud-detection tools and techniques.

  • OCR's McAndrew on Enforcing HIPAA

    14/03/2011

    Susan McAndrew of the HHS Office for Civil Rights discusses recent high-profile HIPAA cases, upcoming state attorneys general training and the pending HIPAA audit program.

  • How Gov't Will Fix WikiLeaks Problem

    12/03/2011

    This week's report focuses on one story: Senate WikiLeaks hearing, in which administration officials explained how the WikiLeaks episode occurred and what's being done to prevent such a breach from occurring again.

  • Japan Disaster: Business Continuity

    11/03/2011

    In the initial wake of Japan's devastating earthquake and subsequent tsunami, business continuity plans have been tested, and organizations now are dealing with severe aftershocks and a growing national crisis, says Alan Berman, executive director of DRI International.

  • State Infosec Unit Shifts Focus to Risk

    10/03/2011

    Iowa CISO Jeff Franklin explains how collecting real-time information helps the state information security office transition its focus from technology to risk management.

  • The 3 Pillars of Trust

    09/03/2011

    The Internet is inherently insecure, and the only way to ensure today's evolving information systems is to build them upon three pillars of trust.

  • Breach Notification and National Security

    08/03/2011

    Today's technology is not adequately used, says attorney Lucy Thomson.

  • 3 Infosec Challenges States Face

    07/03/2011

    For former New York State CISO Will Pelgrin, mobile devices, insiders and old infrastructure represent the major challenges local and state governments face in 2011 in securing information technology.

  • Roadmap to EMV

    07/03/2011

    The Smart Card Alliance's Vanderhoof says U.S. card issuers will likely rely on contactless mag-stripe technology to bridge a payments migration to EMV.

página 138 de 158