Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • NIST Unveils Security, Privacy Controls

    30/04/2013

    NIST's Ron Ross, a big NASCAR fan, likens new security controls guidance to the tools race-car builders use to prevent drivers from breaking their necks when crashing into a brick wall at 200 miles an hour.

  • Mandiant on Nation-State Threats

    30/04/2013

    Security firm Mandiant recently released a widely publicized report detailing cyber-espionage activity originating in China. Mandiant Director Charles Carmakal discusses the latest nation-state threats.

  • Spamhaus DDoS Attack Called Preventable

    30/04/2013

    The massive distributed-denial-of-service attack in Europe that targeted Spamhaus could easily have been prevented if information service providers followed a 13-year-old industry best practice, ENISA's Thomas Haeberlen says.

  • Growing the Global Security Community

    29/04/2013

    When Richard Nealon first sat for his CISSP exam, he was struck by how U.S.-centric the questions were. Since then, he has strived to promote greater awareness of global information security concerns.

  • 240 Ideas to Secure Critical IT

    29/04/2013

    NIST's Donna Dodson is leading a federal government effort to take hundreds of suggestions from the private sector to create an IT security best practices framework that critical infrastructure operators could voluntarily adopt.

  • Utah Breach: The Potential Costs

    29/04/2013

    Although there have not yet been any confirmed reports of financial fraud associated with a major data breach at the Utah Department of Health last year, the potential for costly fraud is huge, contends Al Pascual of Javelin Strategy and Research.

  • Truth About 2-Factor Authentication

    26/04/2013

    In light of evolving fraud threats, financial institutions increasingly are turning to two-factor authentication solutions. Alex Doll, CEO of OneID, offers advice to help institutions make the right choices. In an interview about the myths and realities of two-factor authentication, Doll discusses: The current threat landscape; How organizations are successfully deploying two-factor solutions; How to keep customer experience top-of-mind in a two-factor rollout.

  • Cyber-Attacks: The New Maturity

    25/04/2013

    It isn't just the quantity of cyber-attacks that's staggering; it's the quality. The average hacker now has access to nation-state-level attack capabilities, says James Lyne of Sophos. How can organizations defend?

  • Addressing the Skills Crisis

    25/04/2013

    It isn't a staffing shortage that we face, but rather a skills crisis, says Allan Boardman, international vice president of ISACA. How can organizations build the security skills they need to mitigate evolving risks?

  • The New Era of Third-Party Risks

    25/04/2013

    Organizations face new cyber-risks from their third-party service providers. But standard contracts fail to cover these risks. Trend Micro's Tom Kellermann discusses the risk management essentials.

  • Privacy Across Borders

    24/04/2013

    As data protection regulations continue to be refined, organizations throughout Europe are more sensitive to privacy restrictions in individual countries, says Dwayne Melancon, CTO of Tripwire.

  • Why DDoS Attacks Are 'No Big Deal'

    24/04/2013

    Distributed-denial-of-service attacks are increasing against European banking institutions. But UK consultant Mark Child says if banks are worried about DDoS, then they have bigger security problems.

  • Professionalizing the IT Security Field

    23/04/2013

    Should IT security practitioners be deemed professionals like those in medicine and law? That's not an easy question to answer, says Ronald Sanders, former human capital officer at the U.S. Office of the Director of National Intelligence.

  • Verizon Report: DDoS a Broad Threat

    23/04/2013

    Distributed-denial-of-service attacks jumped significantly in 2012. And it's not just banking institutions that are victims, Verizon finds in its just-released Data Breach Investigations Report.

  • ENISA Aims for Longer, Stronger Role

    22/04/2013

    The European parliament recently voted to extend and strengthen the European Network and Information Security Agency. What does this news mean for Europe's top cybersecurity agency and for the state of emerging threats across Europe?

  • Boston Lockdown: Business Continuity

    19/04/2013

    The hunt for a Boston Marathon bombing suspect that locked down the city caused massive disruption to business operations, but enterprises that had business continuity plans in place hardly missed a beat.

  • Post-Breach Credit Monitoring Strategies

    17/04/2013

    To retain their customers after a breach of sensitive information, organizations should take the extra step of calling those affected to offer free credit protection services, says security expert Brian Dean.

  • Will New Hires Impede Future Security?

    16/04/2013

    The rush to find qualified IT security professionals to meet current cyberthreats could jeopardize IT systems' security in the not-too-distant future, say two leading IT security experts, Eugene Spafford and Ron Ross.

  • Medical Device Security: A New Focus

    15/04/2013

    As part of their mobile security strategies, healthcare organizations must remember not to neglect issues involved with medical devices used for patient care, says privacy expert Peter Swire, a former presidential adviser.

  • Security Careers: Breaking Barriers

    09/04/2013

    Lisa Xu, CEO of NopSec, says pursuing leadership roles in information security - a male-dominated field - can be challenging for women. What advice does she offer for women to grow in their careers?

página 134 de 174