Government Information Security Podcast
- Autor: Vários
- Narrador: Vários
- Editor: Podcast
- Mas informaciones
Informações:
Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
PCI Compliance: Improvements Needed
12/01/2011Most industries say PCI is improving payment card security, but driving consumer and employee awareness about vulnerabilities remains a challenge.
-
The History of EMV
11/01/2011Philip Andreae was there when EMV was born, and he plans to see the EMV evolution through, until it becomes a global standard embraced throughout the world.
-
Giving Non-IT Execs Onus for IT Risk
11/01/2011Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
-
Top Security & Privacy Topics of 2011
10/01/2011When it comes to sizing up the privacy agenda for 2011, the tone at the top of organizations is all about improving data security, says privacy expert and lawyer Lisa Sotto.
-
GovInfoSecurity.com Week In Review for Friday, Jan. 7, 2011
07/01/2011This week's top news and views: Conscripting cybersecurity experts to protect IT, State battles data leakage and President Obama signs bill to reorganize the National Institute of Standards and Technology.
-
The Social Media Challenge
06/01/2011To Brian Lapidus, COO of Kroll's Fraud Solutions group, the main threat to data security can be summed up in two words: social networking.
-
R&D Focuses on Finding Data in Cloud
03/01/2011Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
-
GovInfoSecurity.com
Editor's Choice for December 201031/12/2010This month's most compelling news and views: top 10 government IT security stories of 2010, four components on the insider threat, pragmatic optimist Howard Schmidt and failure to enact major cybersecurity bill foreseen. And don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow
-
8 IT Security Threats for 2011
28/12/2010Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
-
The Age of 'Involuntary Transparency'
27/12/2010"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
-
4 Components of the Insider Threat
22/12/2010Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.
-
Global Security Challenges for 2011
22/12/20102011 will be the year of more -- more sophisticated malware, more WikiLeaks-style breaches and more regulatory compliance headaches.
-
Firestorm of Privacy Activity
20/12/2010"Literally, in my entire time working in the privacy field, I've never seen such profound and aggressive activity by the government in the privacy space," privacy expert Thomas Oscherwitz says.
-
GovInfoSecurity.com
Week In Review
for Friday, Dec. 17, 201017/12/2010This week's top news and views: Cyber reforms vanish, State Department creates cyber issues post, why risk management is hot and less stress during social media blackout. Don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow
-
Managing Risk: Why It's a Hot Topic
14/12/2010NIST's Ron Ross Tackles the Risk Management Framework
-
Marcus Ranum on 2011 Security Outlook
14/12/2010If Marcus Ranum were your CISO, this would be his 2011 resolution: To launch a "War Games" style exercise.
-
Infosec's Role in Feds' 25-Pt. IT Plan
13/12/2010A new White House plan to reform how the feds manage IT should not only drive efficiencies but help secure digital assets, says Tim Young, former Office of Management and Budget deputy administrator for e-government and IT.
-
GovInfoSecurity.com
Week In Review for
Friday, Dec. 10, 201010/12/2010Cybersecurity reform stopped in the Senate, White House unveils new way to manage federal IT that emphasizes cloud computing and data consolidation and tips on preventing a WikiLeaks-style breach.
-
WikiLeaks Backlash: 'We Are Going to Take You Down'
10/12/2010Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
-
Warrior Battles Military's PII Misuse
08/12/2010"We use the Social Security number in every aspect, both mundane and sensitive," says Conti, coauthor of a report on the military's use of personal identifiable information. "It's everywhere, so we're courting disaster in how we us it."