Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Misusing Privileges: The Gray Areas
21/07/2015Misusing data access privileges can pose a threat to the integrity of an organization's IT systems and the privacy of individuals. But gray areas exist, and it's not always clear cut when "unofficially" accessing protected data means users are abusing their privileges.
-
Buyer's Guide to DDoS Mitigation
21/07/2015By now, organizations are well acquainted with DDoS. But do they understand the attacks' key components and how to mitigate them? Akamai's Matt Mosher shares the questions to ask when purchasing DDoS mitigation.
-
Analyzing 'Cures' Bill's Privacy Impact
20/07/2015Privacy attorney Kirk Nahra says largely overlooked provisions tucked away in the "21st Century Cures" bill recently passed by the U.S. House of Representatives could have a significant impact on patient privacy.
-
Security Challenges in SDN
20/07/2015As more enterprises adopt software-defined networking, hackers are finding the emerging technology to be a new route to penetrate organizations. Anthony Lim of (ISC)² recommends ways to secure SDNs against attacks.
-
OPM Breach: Get Your Priorities Straight
14/07/2015After the OPM breach, the U.S. and China recently agreed to hammer out a cyber "code of conduct." But John Pescatore, a director at the SANS Institute, argues that governments would be better served by first jointly combating cybercrime.
-
Lessons from the OPM Breach
14/07/2015The OPM breach is not just the biggest in U.S. government history. It's also likely a classic case of third-party risk management, says Jacob Olcott of BitSight Technologies. What are the key lessons to be learned?
-
Fed's Faster Payments Security Priorities
14/07/2015Gordon Werkema, who is leading the Federal Reserve's initiative to revamp the U.S. payments infrastructure, describes his security priorities as the move to faster payments progresses.
-
OPM Breach: One Victim's Experience
13/07/2015Hord Tipton, a retired federal executive who spent more than five years as chief information officer of the Department of the Interior, says it was "chilling" to learn he is one of the more than 22 million victims of the Office of Personnel Management breaches.
-
Making a Case for a National Patient ID
09/07/2015Healthcare CIOs are lobbying for the creation of a unique national patient identifier to facilitate secure national health information exchange. Leslie Krigstein of the College of Healthcare Information Management Executives explains the initiative.
-
Vendor Risk Management: The Shortfalls
08/07/2015The healthcare sector lags behind the financial sector when it comes to the maturity of vendor risk management programs, a new study confirms. Risk management experts Rocco Grillo and Gary Roboff analyze the work yet to be done.
-
The 'Internet of Things' as a Security Risk
07/07/2015OpenDNS's Andrew Hay sees danger confronting many enterprises in the era of the "Internet of Things" as Internet-ready consumer devices, not architected for security, find their way onto corporate networks, often unbeknown to administrators.
-
Improving Management of Privileged Access
06/07/2015The increasingly sophisticated cyberthreats facing healthcare are making privileged access management more critical, says Sudhakar Gummadi, CISO at Molina Healthcare, a managed care company.
-
FFIEC Issues Cyber Assessment Tool
02/07/2015The FFIEC has released its much-anticipated Cybersecurity Assessment Tool. Hear why banking regulator Tim Segerson believes the tool is expected to be rolled into regulatory examinations by summer of 2016.
-
'Swarming' Talent on InfoSec Challenges
02/07/2015The new chief executive of the Center for Internet Security, which operates the Multistate Information Sharing and Analysis Center, sees mutual cooperation among enterprises as a way for organizations with limited staff to address critical IT security problems.
-
PCI Encryption Standard Updated
01/07/2015The PCI Security Standards Council has just released version 2 of its point-to-point encryption standard. Jeremy King of the PCI SSC explains how this optional standard can complement PCI-DSS compliance.
-
Using Apple Watch for EHR Access
01/07/2015As healthcare entities embrace consumer wearable health devices, it's critical to carefully weigh patient benefits with the security and privacy risks. Michael Ash, M.D. of Nebraska Medicine, shares advice.
-
Classifying Data: Seeking Automation
30/06/2015Organizations that want to protect sensitive data first need to know where it is. But outside of military and government realms, few employees know how to manually classify data, or have an incentive to do so, says TITUS CTO Stephane Charbonneau.
-
Watch for 'Visual Hacking'
30/06/2015With the rise in awareness of visual security threats and the advent in open plan office environments, protecting data inside the organization is a growing concern, says Ben Rooney, a marketing executive at 3M.
-
How '.bank' Improves Email Authentication
26/06/2015Adoption of the financial services top-level domain ".bank" will provide enhanced email authentication capabilities, three experts explain in part two of a panel discussion on the new TLD.
-
Federal CIO Backs OPM Leaders
26/06/2015In this audio report on a Senate hearing, the federal CIO justifies his backing of Office of Personnel Management Director Katherine Archuleta as she defends retaining a contractor whose stolen credentials may have led to the breach.