Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
How IBM Will Grow Its Security Business
17/11/2014Brendan Hannigan became IBM's top security systems executive in 2011, when Big Blue acquired the company he ran, Q1 Labs. Hannigan says acquisitions will remain a key component in the growth of IBM's security business.
-
The Multidisciplinary IT Security Team
13/11/2014A top-flight IT security team requires individuals with know-how in a wide range of non-technology disciplines, in addition to those with technical expertise, cybersecurity leaders say.
-
Fighting Medical Fraud: Where to Begin?
13/11/2014To protect against medical ID theft and fraud, healthcare organizations need to build comprehensive security programs that go beyond just putting their "finger in the dike," says security expert Mark Ford of Deloitte.
-
FireEye CEO: The Evolution of Security
12/11/2014The threats, the solutions and certainly the actors all have changed dramatically since David DeWalt first entered the information security industry. Which should be the top concern for enterprises?
-
David DeWalt: The Business of Security
12/11/2014Advanced threats, targeted attacks and enterprise mobility have re-shaped how we approach security, and they've also influenced the growth of FireEye. CEO David DeWalt discusses the highs and lows of his tenure.
-
The Business of Fighting Fraud
12/11/2014The cost of cyberfraud is expected to hit $8 billion by 2018, and that increase opens new doors for solutions provided by niche cybersecurity firms, says Easy Solutions CEO Ricardo Villadiego.
-
Fiberlink President on Future of BYOD
12/11/2014BYOD is evolving into the "BYO-everything" trend, says Chris Clark, president of IBM's Fiberlink. He discusses Apple and IBM's enterprise mobility deal, as well as how mobility continues to reshape computing.
-
One on One with FireEye's Dave DeWalt
12/11/2014"It's a tough conversation, telling [clients] they've spent a lot of money on defense-in-depth that isn't working," says FireEye CEO David DeWalt. "If they don't change, they're risking their company."
-
Breach Aftermath: Messaging Matters
11/11/2014Poor post-breach communication can cause as much damage to a company's reputation as the cyber-incident itself, says Al Pascual, a senior analyst at Javelin Strategy & Research, who will speak at ISMG's Fraud Summit Dallas.
-
Why PCI Will Issue Log Monitoring Guidance
10/11/2014Troy Leach of the PCI Security Standards Council says log monitoring is an effective data breach detection tool that, unfortunately, not enough merchants put to use. He explains how upcoming PCI guidance could help with implementation.
-
New ONC Privacy Chief's Rallying Cry
10/11/2014The secure national exchange of patients' health information for use in treatment will make progress once "we simplify what we say when we're explaining privacy to people," says Lucia Savage, new chief privacy officer of ONC.
-
NIST's Ron Ross on How a Career Evolves
06/11/2014After 20 years in the Army and nearly that long as an information risk management leader at the National Institute of Standards and Technology, Ron Ross says his career is still evolving. Find out what he plans to do next.
-
FFIEC: Boards Need Cyber Training
05/11/2014Amy McHugh, a former FDIC IT examination analyst, says banking regulators will soon scrutinize C-level executives and boards of directors to gauge their cybersecurity awareness in the wake of the FFIEC's pilot cyber-risk assessment program.
-
Wearable Health Tech: New Privacy Risks
03/11/2014Emerging Web-enabled health technologies, ranging from the upcoming Apple Watch to a Google "pill" that could potentially detect cancer in patients' bodies, pose troubling new privacy risks, says privacy advocate Deborah Peel, M.D.
-
White House Hack: A Lesson Learned
30/10/2014An important lesson from the breach of a White House unclassified network is that organizations should invest in intrusion detection tools, not just perimeter defenses, SANS's Johannes Ullrich says.
-
Online Voting: Security Vs. Expediency
27/10/2014Most citizens rightly don't trust the Internet as a voting booth. But the Atlantic Council's Jason Healey says that could change, not because of better security, but because the digital generation might demand it as they age.
-
EMV Rollout: Are PINs Essential?
24/10/2014Many issuers of chip-based credit cards will likely allow U.S. consumers to complete transactions with a signature, not a PIN, which will limit the fraud protections offered by EMV cards, says Citizen Financial Group's Tim Webb.
-
Fixing Two-Factor Failures
23/10/2014As numerous attacks have demonstrated, two-factor authentication systems are not foolproof, says Ryan Lackey, a principal in the security practice at CloudFlare, who offers insights on how today's authentication systems must evolve.
-
Insights on Visa's EMV Efforts
22/10/2014Visa is working closely with U.S. banking institutions and retailers to enhance payments security and push the migration toward EMV, says the card brand's Eduardo Perez, a featured presenter at ISMG's Fraud Summit New York.
-
How Tom Carper Sees FISMA Bill Passing
21/10/2014In a wide-ranging interview, Senate Homeland Security and Governmental Affairs Committee Chairman Tom Carper discusses bipartisan efforts to enact FISMA reform, the impact of payment card breaches and his personal approach to IT security.