Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • Arguing Against Voluntary Standards

    21/01/2013

    The idea of the U.S. federal government and industry jointly developing IT security best practices will do little to help critical infrastructure operators defend against cyber-risk, says Business Roundtable Vice President Liz Gasster.

  • Maturing of Biometrics on Smart Phones

    16/01/2013

    Smart phones that give many IT security managers headaches in developing security policies are being used in increasing numbers to help safeguard systems and applications, thanks to more muscular biometric features, says Steve Vinsik of Unisys.

  • The Evolution of Incident Response

    14/01/2013

    It isn't so much the changing threat landscape that causes security leaders to re-assess their approach to incident response. Mobility and the expanding perimeter are the real factors driving change.

  • VanRoekel on Infosec and Sequestration

    14/01/2013

    With Congress facing $1.2 trillion in budget cuts, Federal Chief Information Officer Steven VanRoekel says funding for cybersecurity initiatives will likely be affected. But with smart planning, government information technology should not be placed at risk.

  • Top 10 Screening Trends for 2013

    11/01/2013

    How will new guidance on criminal background checks change the way organizations approach employment screening? This is one of the key trends to watch in 2013, says screening expert Les Rosen.

  • ID Theft: 2013 Top Trends

    10/01/2013

    ID theft is a growing global problem. Eva Velasquez, head of the ITRC, outlines how public and private organizations in 2013 can update approaches to ID theft prevention.

  • FS-ISAC on DDoS, Account Takeover

    09/01/2013

    Which fraud trends need the most attention from U.S. banking institutions in 2013? Distributed-denial-of-service attacks and account takeover, says FS-ISAC's Bill Nelson, who offers fraud-fighting tips.

  • Educational Value of Competition

    09/01/2013

    Does cyber defense competition help prepare college students for real-world jobs in information security and risk management? Dan Likarish and Rick Cisneros of Regis University say yes. Here's why.

  • Tackling the Authentication Challenge

    08/01/2013

    The evolution of threats and rise of mobility are leading organizations to improve user authentication. What are the new strategies and solutions security leaders in all sectors will employ this year?

  • Tom Ridge on DHS's IT Security Role

    08/01/2013

    Tom Ridge, the first Homeland Security secretary, questions the wisdom of granting the Department of Homeland Security greater authority to influence IT security within the federal government and the nation's critical IT infrastructure.

  • Chicago Initiates a Cloud Strategy

    04/01/2013

    Arlan McMillan, the chief security officer for Chicago's government, says the city employed processes established by the federal government to assure its new cloud computing initiative is secure.

  • Hanging Tough with Int'l Privacy Regs

    04/01/2013

    With different nations establishing different privacy standards, organizations face adopting the most stringent regulations in order to be compliant everywhere they operate, says Marc Groman, a director of the International Association of Privacy Professionals.

  • Legislation to Watch in 2013

    03/01/2013

    Cloud computing and mobility are areas likely to see new regulatory attention in the year ahead. But what are the other hot topics that leading attorneys believe will be addressed in new legislation worldwide?

  • Account Takeover: The 2013 Outlook

    03/01/2013

    What are the top account takeover threats to banking institutions in 2013? Ken Baylor of NSS Labs discusses Zeus variants, mobile malware and how institutions can protect themselves from fraudsters.

  • How to Say 'Yes' to BYOD

    01/01/2013

    When it comes to mobility, how do leaders balance security needs with employees' BYOD desires? The easy answer: Just say no. But that's also the wrong answer. What security tips do these leaders offer?

  • Assessing Prospects for New InfoSec Law

    30/12/2012

    Members of the U.S. Congress may be more sensitive to cyberthreats than they were in the past, but that doesn't mean they truly all appreciate the risk key government and private-sector IT systems face, says House Cybersecurity Caucus Co-Chair Jim Langevin.

  • 2012's Top Breaches & Lessons Learned

    27/12/2012

    From Global Payments to LinkedIn and Zappos, 2012 was filled with notable data breaches. What were the most significant breaches, and how should they influence organizations' breach responses in 2013?

  • Does Security Stall Technology Adoption?

    26/12/2012

    IBM's Dan Hauenstein, in analyzing Big Blue's 2012 Tech Trends Report, says security concerns often inhibit the adoption of four technologies: mobile, cloud, social business media and business analytics.

  • How to Address Security's Weakest Link

    24/12/2012

    Heading into 2013, security leaders across industry feel confident about their processes and technology. People, though, continue to create the greatest risks. Can "awareness in depth" make a difference?

  • Why Organizations Fail to Encrypt

    22/12/2012

    Karen Scarfone, who coauthored NIST's encryption guidance, sort of figured out why many organizations don't encrypt sensitive data when they should. The reason: they do not believe they are required to do so.

página 139 de 174