Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • New Perspective on Regulation

    11/09/2012

    William Henley of the FDIC has just returned to banking regulation after a two-year stint working in the private sector. How did his business experience influence his approach to enforcing compliance?

  • New Nation-State Attacks Target Banks

    10/09/2012

    Gauss is the latest malware variant likely connected to nation-states. But Roel Schouwenberg of Kaspersky Lab says Gauss' aim at banking credentials is unique. How should organizations respond?

  • Tackling the Big Data Challenge

    05/09/2012

    To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?

  • Insider Fraud: The 'Low, Slow' Approach

    04/09/2012

    Which employees are most apt to commit cyberfraud, and how can organizations detect and prevent their crimes? Researcher Randy Trzeciak shares insights and tips from a new insider threat study.

  • Hurricane Season: Are We Prepared?

    29/08/2012

    As Tropical Storm Isaac strikes, many organizations still sting from the impact of Hurricane Irene and 2011's other natural disasters. What lessons were learned, and how can they be applied now?

  • Rethinking Security Best Practices

    28/08/2012

    Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.

  • Apple-Samsung Case: Lessons for CISOs

    28/08/2012

    One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.

  • Mitigating Messaging Risks

    27/08/2012

    E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.

  • How Cloud Can Facilitate Risk Management

    24/08/2012

    Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.

  • Citadel Malware: The Growing Threat

    24/08/2012

    RSA's Etay Maor says Citadel malware and ransomware attacks highlight a growing threat banking institutions and consumers must be prepared to fight. What can institutions do to mitigate risk?

  • 3 Lines of Cyberdefense

    22/08/2012

    By combining responsible management, risk management and compliance functions and internal audits, organizations will go far in securing their data and systems, says PricewaterhouseCoopers Partner Carolyn Holcomb.

  • Wisconsin HIE Favors Hybrid Data Model

    20/08/2012

    The Wisconsin Health Information Exchange uses a hybrid data model approach that lets members retain control over information, but makes security less complicated, says CEO Kim Pemble.

  • Global Hackers Take Aim at U.S. Banks

    16/08/2012

    Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it's not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk?

  • PCI: New Approach to Merchant Security

    15/08/2012

    In the wake of recent merchant breaches, a new PCI training program aims to enhance point-of-sale security. Which payment card risks does this program address? PCI Council chair Bob Russo explains.

  • Managing Security in a Merger

    15/08/2012

    When two organizations merge, their top security/privacy challenge doesn't necessarily involve technology. Sometimes it's culture, says Christopher Paidhrin of PeaceHealth Southwest Medical Center.

  • Information Assurance Job Market Soars

    15/08/2012

    People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand. "We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate about what they do and that are willing to put in the extra hours to keep the citizens of the nation and the state secure," Dan Likarish, assistant professor and program chair of the IT department at CO-based Regis, says. In an exclusive interview about information assurance and why the job market for information assurance professionals has seen astounding growth, Likarish discusses: Opportunities for information assurance professionals; Trends impacting information assurance education; Best options for someone to get into the information assurance profession.

  • How to Talk Security to the Board of Directors

    13/08/2012

    Increasingly, security and risk issues have the attention of boards of directors. What are the keys to discussing these topics with the board? John South, CSO of Heartland Payment Systems, shares tips.

  • FTC's Google Fine: The Privacy Message

    10/08/2012

    Google's $22.5 million settlement with the Federal Trade Commission is the largest fine ever imposed by the FTC. But the case sends a bigger message about privacy, says attorney Francoise Gilbert.

  • Thinking Smartly About Cloud Computing

    09/08/2012

    CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.

  • Social Media: Pros & Cons

    06/08/2012

    The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.

página 143 de 174