Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • U.S. Initiates Cybersecurity Diplomacy

    20/05/2011

    Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.

  • How to Refine Privacy, Security Training

    18/05/2011

    Alexander Eremia, chief privacy officer at MedStar Health, says role-based staff training on privacy and security issues is essential.

  • New Threats, New Data Security Strategies

    18/05/2011

    The threat landscape has evolved dramatically over the past several years, and now it's time for healthcare security leaders to step up and meet the new challenges involved with securing critical data.

  • Breach Notification: Be Prepared

    16/05/2011

    Regulatory compliance expert Harry Rhodes says it's essential to have a formal process in place for objectively assessing whether a security incident needs to be reported as a breach.

  • Health Information Exchange Success Strategies

    16/05/2011

    Timathie Leslie and Kristine Martin Anderson of Booz Allen Hamilton share insights on how to ensure the success of health information exchanges.

  • Congressman Sees Obama Plan as a Start

    13/05/2011

    Rep. James Langevin sees some shortcomings in the president's cybersecurity initiatives unveiled Thursday.

  • Device ID & Log Analysis: Complementary Forces

    13/05/2011

    ThreatMetrix's Taussig says strong authentication should be part of every financial institution's layered security approach. And according to expected changes to the Federal Financial Institutions Examination Council's 2005 online authentication guidance, that means proven measures to enhance device identification.

  • Disaster Recovery: Cross-Training Key

    12/05/2011

    UAB's Terrell Herzig emphasizes training to handle multiple roles.

  • Survey Analysis: Securing the Cloud

    12/05/2011

    U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.

  • Disaster Recovery: Cross-Training Key

    11/05/2011

    A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.

  • Fight Fraud with Device ID

    10/05/2011

    ThreatMetrix's Taussig says device identification must be part of layered security measures. Banking regulators want financial institutions to deploy multiple layers of online security. But what does that expectation mean when it comes to investments in fraud detection?

  • Cloud Computing for Image Transfers

    10/05/2011

    Cloud computing helps ease the exchange of diagnostic images while maintaining adequate security, says Amy Radonich of University of California San Diego Health System.

  • Social Media: Minimizing Risks

    09/05/2011

    Ethicist Roy Snell warns of a common misperception about social media.

  • Social Media: Minimizing Risks

    09/05/2011

    All employers need to overcome the common misperception that "you can say anything you want on social media and not have any consequences," says compliance specialist Roy Snell.

  • Protecting E-Government Initiatives

    09/05/2011

    Domain name systems are among the least known - but most important - security vulnerabilities for organizations in all sectors. But government agencies in particular need to be concerned about DNS security to protect their e-government initiatives.

  • Public Jitters Over IT Security on Rise

    06/05/2011

    The Unisys Security Index shows growing public anxiety about Internet security. Unisys CISO Patricia Titus wonders how restless the public would be if the poll was conducted after revelations of breaches at RSA, Epsilon and Sony.

  • Limited Government: Path to NSTIC

    04/05/2011

    Big brother isn't the relation the government sees itself portraying in developing the National Strategy for Trusted Identities in Cyberspace. Uncle Sam has a more avuncular role in mind, giving advice and serving as a role model.

  • Bin Laden Impact on Money Laundering

    04/05/2011

    Kevin Sullivan spent months at Ground Zero after the 9/11 attacks on the World Trade Center. Now, post-Bin Laden, Sullivan says the 9/11 experience changed him both personally and professionally, and impacted how banking institutions view money laundering and BSA violations.

  • The Case for Cloud Security Standards

    03/05/2011

    "On a global basis, countries are recognizing that they need a uniform commercial code, if you will, for data - a unified approach for managing IT infrastructure services," says Marlin Pohlman of the Cloud Security Alliance.

  • Why CISOs Must Care About Sony Breach

    02/05/2011

    Intel CISO Malcolm Harkins says the Sony PlayStation breach reminds CISOs in all sectors that such incidents can't be avoided, but their risks can be managed.

página 160 de 174