Info Risk Today Podcast

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • Making Web Applications Secure

    08/12/2011

    Vulnerabilities in applications developed for the Commonwealth of Pennsylvania contributed to a major security breach a few years back, one that state CISO Erik Avakian does not want repeated.

  • Pace Charters New Cyber Institute

    07/12/2011

    New York's Pace University has just announced its new Seidenberg Cyber Security Institute. What is the school's mission, and why is now the ideal time to open its doors to career-minded students?

  • Fighting Fraud: Deputize the Consumer

    06/12/2011

    Customers want to be involved with their banking security, but few institutions allow them to play active roles in fraud prevention. What has to change?

  • Organizing a Breach Notification Team

    05/12/2011

    It's one thing to have a data breach response team. It's quite another to ensure that team is made up of savvy personnel, says Brian Dean, a former privacy executive for KeyBank.

  • The Changing Threat Landscape

    05/12/2011

    The threat landscape has evolved, and India's banking institutions must grow their information security strategies, says Anand Naik of Symantec, which just released a report that offers a new security agenda to institutions.

  • For Clinics, Privacy Training Is Key

    02/12/2011

    Physician group practices, many of which are adopting their first electronic health record system, need to make staff training on privacy and security issues a top priority, says Susan Turney, M.D., the new CEO at the Medical Group Management Association.

  • Toolkit Helps With Risk Assessments

    02/12/2011

    A new, free HIPAA Security Rule Toolkit is designed to help healthcare organizations conduct a thorough risk assessment, says Kevin Stine, who helped guide the project for the National Institute of Standards and Technology.

  • Breach Response: Reputational Risk

    30/11/2011

    Data breaches are all about reputational risk, says attorney Lisa Sotto. And as legal requirements grow, attorneys must play increasingly integral roles in helping clients respond to incidents.

  • The State of Security Education

    29/11/2011

    Information security threats - especially to critical infrastructures and from nation-states - are evolving. But security education curricula are struggling to keep pace, according to Eugene Spafford, renowned information security professor at Purdue University.

  • Breach Legislation: The Next Generation

    28/11/2011

    It's a new wave of cybercriminal behind the latest major data breaches, says breach expert Lucy Thomson. And these incidents are resulting in a new generation of breach notification laws globally.

  • IP Protection Bills Threaten Internet

    28/11/2011

    The Brooking Institute's Allan Friedman says bills before Congress aimed at protecting intellectual property threaten cybersecurity.

  • Breach Notification Priority for 2012

    28/11/2011

    BITS president Paul Smocer says banks can expect an uptick in cybersecurity-focused legislation in 2012. What impact will changes from Capitol Hill have on requirements for data breach notification, information sharing and critical infrastructure?

  • Influencing Policy, If Not the Law

    23/11/2011

    Jacob Olcott says Congress' failure to enact comprehensive cybersecurity legislation over the past half decade doesn't mean lawmakers haven't influenced IT security policy.

  • Fraud Victim: FFIEC Guidance Lacking

    21/11/2011

    ACH fraud victim Mark Patterson says small businesses like his welcome improved online security measures from banking institutions. But is the new FFIEC Authentication Guidance sufficient? Patterson says no.

  • Risk Management's Challenges

    17/11/2011

    When bankers contemplate risk, says Edward DeMarco Jr. of the Risk Management Association, what dominates headlines in the financial press should be of paramount concern.

  • Firewalls: The Next Generation

    17/11/2011

    Too many of today's firewalls are out of date and exposing organizations to unacceptable business risks, says Chris King of Palo Alto Networks.

  • Identifying Infosec Jobs, Skills, Tasks

    15/11/2011

    NICE's Ernest McDuffie says a proposed cybersecurity workforce framework represents a consensus of government thought on how best to define the jobs, skills and tasks needed to secure information technology.

  • BYOD and Corporate Policy

    15/11/2011

    Unfortunately, says Ken Vander Wal, most organizations have done little to address security in their policies and procedures regarding BYOD, which is changing the ways companies address user behavior and risk.

  • How Training Helps Prevent Breaches

    14/11/2011

    A lack of ongoing HIPAA compliance training increases the risk of internal breaches, says Terrell Herzig, information security officer at UAB Medicine.

  • Making the Business Case for Security

    11/11/2011

    Winning senior executive support for information security spending requires "a solid business case of justifications," says Christopher Paidhrin, security compliance officer at PeaceHealth Southwest Medical Center.

página 147 de 169