Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Tablets Seen Mitigating Security Risks
10/01/2012Chief Information Officer Chad Eckes is overseeing the slow phase in of iPads and iPhones at the Cancer Treatment Centers of America, which has relied heavily on laptop computers, in an effort to mitigate security risks.
-
Cancer Hospitals Try iPads, iPhones
10/01/2012A national network of regional cancer hospitals that has relied heavily on laptop computers is slowly phasing in iPads and iPhones, taking steps to mitigate the security risks involved.
-
Why Insource Forensics?
09/01/2012When it's time to stand up in court and discuss forensic evidence in a legal matter, you need someone who knows your business best, says Greg Thompson, VP enterprise security services at Scotiabank Group.
-
BYOD: Manage the Risks
05/01/2012Malcolm Harkins, CISO of Intel was quick to embrace BYOD as a means to cut costs and improve employee productivity. His advice to leaders struggling with the trend: "Don't shy away from the risk issues."
-
Complexity: Key Task for Security Pros
05/01/2012Complexity is among the most significant information risk challenges IT security practitioners face. Mobile and cloud computing, new technologies, outsourcing and growing threats from malware and people make managing risk more complex.
-
Automation with a Dash of Humanity
03/01/2012As organizations move to the continuous monitoring of their IT systems to assure they're secure, they rely much more on automated processes. But don't forget the role people play.
-
2012 Government Strategy Guide to Defending Against Cyber-Attacks
02/01/2012How can government agencies protect against new and trending cyber attacks? What are today's top application security trends and threats? Robert Haas of HP has expert insight and tips.
-
Top Tech Trends for 2012
30/12/2011Big data. Consumerization. Mobile growth. ISACA picks these as the top technology trends for IT and information security leaders to tackle in 2012. Robert Stroud offers tips to help manage the risks.
-
BYOD: Manage the Risks
29/12/2011It's not a question of if employees will bring their own mobile devices to work and connect to your systems. It's a matter of when. But the benefits of BYOD outweigh the risks, says Malcolm Harkins, CISO of Intel.
-
Complexity Is Major Info Risk Challenge
29/12/2011Complexity is among the most significant information risk management challenges organizations face at the dawn of the new year.
-
Why Compliance Can't Create Security
27/12/2011Regulators push tougher cybersecurity measures. But the challenge for smaller organizations isn't compliance - it's budgets. Wendy Nather of 451 Research defines the 'Security Poverty Line' and what to do about it.
-
Top 10 Cybersecurity Trends for Banks
22/12/2011A new survey identifies the Top 10 Cybersecurity Trends for financial service organizations. Malware and mobility head the list of risks to watch. What are the other key concerns?
-
2012 Fraud-Fighting Agenda
20/12/2011Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.
-
IT Security Vs. Info Risk Management
19/12/2011Information risk management, at its core, is about tradeoffs, says NIST Senior Scientist Ron Ross.
-
Hannaford Breach Ruling: What it Means
16/12/2011A federal appeals court has ruled in favor of victims of the 2007 Hannaford data breach. Attorney Ronald Raether explains the ruling and what it potentially means to future breached entities and their customers.
-
Risk Awareness: What Do CEOs Need to Know?
15/12/2011If management awareness of information security issues increases, will an organization's commitment to securing practices and policies also increase? This is the question answered by an eye-opening new study.
-
Disaster Recovery: Supply Chain at Risk
14/12/2011Every organization likes its business continuity/disaster recovery plan before a disaster, says Al Berman of DRI International. But in the aftermath? Different story - and one that must be addressed in 2012.
-
AHIMA CEO Tackles Privacy Challenges
14/12/2011The lack of uniformity in federal and state privacy and security requirements is creating major challenges for health information managers attempting to comply, says Lynne Thomas Gordon, the new CEO of the American Health Information Management Association.
-
FFIEC Compliance: A Case Study
13/12/2011Donna Flynn says Liberty Bank discovered three key gaps when it tackled FFIEC authentication guidance compliance. Two were easy to fill. The third required an out-of-the-box solution.
-
BITS Takes Aim at Fraud
12/12/2011BITS, the technology policy division of The Financial Services Roundtable, has just named a new VP of cybersecurity and fraud prevention. What's John Carlson's mission, and what's it mean to banks?