Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • An EMV Pioneer Offers Lessons Learned

    17/02/2014

    Merrill Halpern of the United Nations Federal Credit Union, a pioneer in the use of chip cards, says high-profile retail breaches reinforce the long-term value of EMV for various forms of payment within the U.S.

  • LabMD CEO Describes His Beefs With FTC

    14/02/2014

    Michael Daugherty, CEO of LabMD, offers his perspective on a longstanding dispute with the Federal Trade Commission over two data security incidents. He has even written a book on the subject.

  • Baking Privacy Into Health IT

    12/02/2014

    Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014. Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."

  • Target Breach: The Cost to Banks

    12/02/2014

    Expenses linked to the data breach at Target Corp. have already cost the 58 member institutions of the Consumer Bankers Association more than $170 million - a price they should not have to pay, says the association's David Pommerehn.

  • Building a 'One-Shot' Memory Device

    12/02/2014

    Employing quantum physics, Yi-Kai Liu, a computer scientist at the National Institute of Standards and Technology, is attempting to devise a way to create a one-shot memory device that could help secure transactions or administrative passwords.

  • 5 Ways to Improve PCI Compliance

    11/02/2014

    Organizations in all sectors can improve their compliance with the PCI Data Security Standard by taking five critical steps, says Rodolphe Simonetti of Verizon Enterprise Solutions, which just issued a new PCI compliance report.

  • Card Breaches Pose Greatest Fraud Risk

    07/02/2014

    A new identity fraud study shows that consumers who are victims of a payment card breach are at greater risk of fraud than victims of other types of breaches, says Al Pascual of Javelin.

  • Compensating Banks for Breaches

    06/02/2014

    When breaches result from retailers' lax security practices, merchants should be obligated to help banking institutions cover fraud losses and other post-breach expenses, says Viveca Ware of the Independent Community Bankers of America.

  • RSA 2014: A Preview

    04/02/2014

    Expanded with more educational tracks and sessions on emerging hot topics, the 2014 edition of the RSA Conference will be the largest ever, says Hugh Thompson, program committee chair.

  • PCI Council Responds to Critics

    03/02/2014

    The PCI Security Standards Council has no plans to modify its standards for payment card data security in response to high-profile payment card breaches at Target and Neiman Marcus, says Bob Russo, the council's general manager.

  • Agency Security Audits: A Better Way?

    30/01/2014

    Karen Evans, formerly the federal government's top IT executive, prescribes a way to get inspectors general and federal agencies on the same page in regards to annual IT security audits.

  • DHS Report Researcher: Retailers at Risk

    29/01/2014

    Retail data breaches are growing. ISight Partners' Tiffany Jones, a researcher who helped the Department of Homeland Security prepare its report about malware attacks, offers new insight into the latest cyber-attacks.

  • Records Exposed Hit New High in 2013

    24/01/2014

    Cybercriminals exploiting weaknesses in how users employ passwords is a significant factor behind an increase in records exposed in breaches during 2013, says Craig Spiezle of the Online Trust Alliance.

  • DDoS: The Next-Generation Solution

    23/01/2014

    In 2013, attackers proved that sophisticated DDoS attacks could be launched as effective disruptions and distractions. What are the evolving solutions that now help organizations mitigate these strikes?

  • iPhone App Offers Breach Law Guide

    22/01/2014

    A new, free iPhone app is designed to help organizations navigate 46 state data breach notification laws as well as federal statutes, such as HIPAA, attorney Scott Vernick says.

  • Minimizing Social Media Risks

    22/01/2014

    To avoid the risk of staff using social media to communicate about patients, healthcare organizations need to offer more secure alternatives, says security and privacy expert Andrew Hicks.

  • Ethics & Technology: The Disconnect

    20/01/2014

    Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."

  • Target Malware: Exploring the Origins

    20/01/2014

    Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks to a 17-year-old hacker in Russia, offers an exclusive, in-depth explanation of his company's findings.

  • Exclusive: Inside Cisco Security Report

    17/01/2014

    From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.

  • Network Security: Enhancing Visibility Through Integration

    17/01/2014

    From access controls to intrusion detection, mobility to privacy, many organizations face similar network security challenges. Isabelle Dumont of Palo Alto networks offers a new, unique approach for healthcare organizations, and the key concepts of this approach can be applied to any security environment.

página 126 de 174