Info Risk Today Podcast

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • Why IT Security Careers Remain Hot

    30/08/2011

    Careers in IT security remain hot, says David Foote, noted researcher and analyst of IT workforce trends. But there's a disconnect between current job opportunities and the talent pool looking to fill them.

  • The Future of Payments

    29/08/2011

    The future worth of payments will not rely so much on tangible currency, but more on digital value and data. And that means a stronger need for security and data management.

  • Facial Biometrics Pose Privacy Woes

    29/08/2011

    Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the biometric technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the biometric data, cautions a privacy rights leader.

  • Offering a Helping Hand to Agencies

    26/08/2011

    In many states, the top information security officer champions IT security rather than dictates it, as the decisions of specific steps to take to safeguard digital assets are left to departments, agencies and commissions.

  • Fraud: 'A Serious Problem'

    26/08/2011

    Fraud is a global concern, and an area regulators and financial institutions the world-over are watching closely, says Bill Isaac. Whether a cyberthreat or mortgage fraud, investments in fraud prevention will continue, despite the state of the international economy.

  • Social Media and Reputational Risks

    24/08/2011

    ICBA's Chris Lorence says all financial institutions, especially community banks, should appreciate the positive and negative effects posts on social-networking sites can have on their reputations.

  • HIPAA Audits: Documentation Is Key

    24/08/2011

    Having complete documentation of every aspect of your privacy and security strategy is the best way to prepare for a HIPAA audit, says consultant Cliff Baker.

  • The Failure of Regulatory Reform

    23/08/2011

    Former FDIC head Bill Isaac says U.S. banks have strengthened their financial footing since the market collapse of 2008, but the U.S. economy remains on the verge of a "double-dip" recession. The reason: poorly planned regulatory reforms.

  • Infosec in a Decentralized Environment

    23/08/2011

    Give a man a fish, you feed him for today, the proverb says. Teach a man to fish; and you feed him for a lifetime. That adage can be applied to information security, as well.

  • FFIEC Authentication: The Need for Out-of-Band

    22/08/2011

    As banks and credit unions assess online risk, in light of the updated guidance from the FFIEC, financial fraud analyst Tom Wills says they should consider mobile as a viable layer for out-of-band authentication.

  • FFIEC Authentication and the Link to Debit

    18/08/2011

    Regulation and legislation are working in banking institutions' favor, helping them enhance fraud prevention and detection investments for debit and online banking.

  • Cloud Computing: Insurance Issues

    17/08/2011

    Healthcare organizations entering cloud computing contracts should carefully consider whether they need additional liability insurance coverage to address the risks involved, says IT consultant Gerard Nussbaum.

  • Chips and Dynamic Authentication

    16/08/2011

    Eduardo Perez says, simply, the "time was right" for Visa's introduction of chip-based payments incentives for U.S. merchants. Visa's new mobile-to-EMV program offers PCI-audit-compliance waivers to qualified merchants who implement dual-interface contact and contactless acceptance.

  • Questions to Ask Cloud Vendors

    15/08/2011

    Before negotiating a contract with a cloud computing vendor, organizations should ask plenty of questions about privacy and security, says consultant Chris Witt.

  • PCI: New Tokenization Guidance Issued

    12/08/2011

    Bob Russo says the long-awaited PCI guidance on tokenization should provide merchants with a baseline for standardization and best practices, and serve as a roadmap for how tokenization can complement compliance with the PCI-DSS.

  • Creating Ag Extension Agent for Cyber

    10/08/2011

    Eugene Spafford thinks America needs the cybersecurity equivalent of an agriculture extension service to help educate citizens on IT security.

  • Social Media Risks and Controls

    09/08/2011

    When it comes to social media, organizations have to be vigilant and consistent with risk assessments that closely monitor and evaluate emerging threats, says Andrew Kennedy of BITS.

  • Creating a Culture of Security

    08/08/2011

    Yahoo's Justin Somaini believes his fellow CISOs in business and government do a good job keeping their bosses informed of proper information security practices, but could do better in educating the rank and file about them.

  • FFIEC Authentication Guidance: Enhancing Controls

    08/08/2011

    Ian Harper of Pentagon Federal Credit Union says financial institutions should continually review their risk management processes, a recommendation reinforced by the new FFIEC Authentication Guidance.

  • Access Reports: Is Revamp Inevitable?

    08/08/2011

    Federal officials should consider a major revamp of a proposal that would require healthcare organizations to provide patients with a report listing everyone who has electronically accessed their records, a former government official who helped draft the proposal says.

página 150 de 168