Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • Questions to Ask Cloud Vendors

    15/08/2011

    Before negotiating a contract with a cloud computing vendor, organizations should ask plenty of questions about privacy and security, says consultant Chris Witt.

  • PCI: New Tokenization Guidance Issued

    12/08/2011

    Bob Russo says the long-awaited PCI guidance on tokenization should provide merchants with a baseline for standardization and best practices, and serve as a roadmap for how tokenization can complement compliance with the PCI-DSS.

  • Creating Ag Extension Agent for Cyber

    10/08/2011

    Eugene Spafford thinks America needs the cybersecurity equivalent of an agriculture extension service to help educate citizens on IT security.

  • Social Media Risks and Controls

    09/08/2011

    When it comes to social media, organizations have to be vigilant and consistent with risk assessments that closely monitor and evaluate emerging threats, says Andrew Kennedy of BITS.

  • Creating a Culture of Security

    08/08/2011

    Yahoo's Justin Somaini believes his fellow CISOs in business and government do a good job keeping their bosses informed of proper information security practices, but could do better in educating the rank and file about them.

  • FFIEC Authentication Guidance: Enhancing Controls

    08/08/2011

    Ian Harper of Pentagon Federal Credit Union says financial institutions should continually review their risk management processes, a recommendation reinforced by the new FFIEC Authentication Guidance.

  • Access Reports: Is Revamp Inevitable?

    08/08/2011

    Federal officials should consider a major revamp of a proposal that would require healthcare organizations to provide patients with a report listing everyone who has electronically accessed their records, a former government official who helped draft the proposal says.

  • Securing the Cloud

    05/08/2011

    ISACA's Marc Vael says differences in cloud computing environments and cloud providers can pose security risks. But well thought-out contracts and risk-management plans can fill potential security gaps and ensure business continuity during outages and disasters.

  • Inside a Fraud Investigation

    03/08/2011

    No two fraud incidents may be exactly alike, but a fraud investigator's approach can still be very consistent and precise, says Jean-Francois Legault, a fraud investigations specialist with Deloitte and Touche.

  • Battling Debit Fraud and Skimming

    02/08/2011

    Chris Olson of Fremont Bank says card skimming and the acceleration of ID theft prompted the bank to initiate a move from the mag-stripe to the chip.

  • Cloud Computing: Critical Issues

    02/08/2011

    Before entering a contract with a cloud computing company, organizations should consider three critical issues, says Feisal Nanji, executive director at the security consulting firm Techumen.

  • FFIEC Authentication Guidance: A Bank's Steps to Comply

    02/08/2011

    "We're continually testing our controls and the effectiveness of our controls. We do a lot of emerging-threats monitoring ... so we can react," says First Niagara's Joe Rogalski.

  • The Value of Penetration Testing

    01/08/2011

    Scott Laliberte, managing director of Protiviti, wrote the book on penetration testing, and he has strong feelings about what organizations are doing right and wrong when assessing their information security risks today.

  • Critiquing the EHR Access Report Plan

    29/07/2011

    Dan Rode of the American Health Information Management Association describes why the group wants to see major revisions in a proposed federal rule requiring hospitals, clinics and others to give patients access reports listing everyone who's viewed their records.

  • Easing Burden to Comply with IRS Rules

    28/07/2011

    Oregon Chief Information Security Officer Theresa Masse finds herself at the center of a state initiative to simplify compliance by agencies with Internal Revenue Service rules to safeguard taxpayer data.

  • The ROI of Trustable Identities

    27/07/2011

    There are significant hard and soft benefits for government agencies to gain by investing now in solutions built around Trustable Identities, says Mike Ozburn, principal of Booz Allen Hamilton.

  • New Normal: Under Attack

    26/07/2011

    It's the new conventional wisdom: all computer networks will be attacked. For Phyllis Schneck, that means organizations must be resilient, keeping computers functioning even when they're under assault.

  • Forensics in the Cloud

    26/07/2011

    Performing digital forensics in the cloud isn't necessarily a new discipline, says Rob Lee of SANS Institute. But the task definitely requires a whole new mindset and some new skills from investigators.

  • The Ethics of Information Security

    25/07/2011

    It is no longer enough for information security professionals to secure critical information. They also need to be asking about the legitimacy of where this information comes from, says John Colley, managing director of (ISC)2 in EMEA.

  • Cybersecurity: The New Frontier

    25/07/2011

    Dickie George of the National Security Agency has one word to describe the state of information security education today: "Spotty." And this state must improve if we hope to fill all the growing demand for security pros.

página 156 de 174