Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
U.S. Initiates Cybersecurity Diplomacy
20/05/2011Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.
-
How to Refine Privacy, Security Training
18/05/2011Alexander Eremia, chief privacy officer at MedStar Health, says role-based staff training on privacy and security issues is essential.
-
New Threats, New Data Security Strategies
18/05/2011The threat landscape has evolved dramatically over the past several years, and now it's time for healthcare security leaders to step up and meet the new challenges involved with securing critical data.
-
Breach Notification: Be Prepared
16/05/2011Regulatory compliance expert Harry Rhodes says it's essential to have a formal process in place for objectively assessing whether a security incident needs to be reported as a breach.
-
Health Information Exchange Success Strategies
16/05/2011Timathie Leslie and Kristine Martin Anderson of Booz Allen Hamilton share insights on how to ensure the success of health information exchanges.
-
Congressman Sees Obama Plan as a Start
13/05/2011Rep. James Langevin sees some shortcomings in the president's cybersecurity initiatives unveiled Thursday.
-
Device ID & Log Analysis: Complementary Forces
13/05/2011ThreatMetrix's Taussig says strong authentication should be part of every financial institution's layered security approach. And according to expected changes to the Federal Financial Institutions Examination Council's 2005 online authentication guidance, that means proven measures to enhance device identification.
-
Disaster Recovery: Cross-Training Key
12/05/2011UAB's Terrell Herzig emphasizes training to handle multiple roles.
-
Survey Analysis: Securing the Cloud
12/05/2011U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.
-
Disaster Recovery: Cross-Training Key
11/05/2011A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.
-
Fight Fraud with Device ID
10/05/2011ThreatMetrix's Taussig says device identification must be part of layered security measures. Banking regulators want financial institutions to deploy multiple layers of online security. But what does that expectation mean when it comes to investments in fraud detection?
-
Cloud Computing for Image Transfers
10/05/2011Cloud computing helps ease the exchange of diagnostic images while maintaining adequate security, says Amy Radonich of University of California San Diego Health System.
-
Social Media: Minimizing Risks
09/05/2011Ethicist Roy Snell warns of a common misperception about social media.
-
Social Media: Minimizing Risks
09/05/2011All employers need to overcome the common misperception that "you can say anything you want on social media and not have any consequences," says compliance specialist Roy Snell.
-
Protecting E-Government Initiatives
09/05/2011Domain name systems are among the least known - but most important - security vulnerabilities for organizations in all sectors. But government agencies in particular need to be concerned about DNS security to protect their e-government initiatives.
-
Public Jitters Over IT Security on Rise
06/05/2011The Unisys Security Index shows growing public anxiety about Internet security. Unisys CISO Patricia Titus wonders how restless the public would be if the poll was conducted after revelations of breaches at RSA, Epsilon and Sony.
-
Limited Government: Path to NSTIC
04/05/2011Big brother isn't the relation the government sees itself portraying in developing the National Strategy for Trusted Identities in Cyberspace. Uncle Sam has a more avuncular role in mind, giving advice and serving as a role model.
-
Bin Laden Impact on Money Laundering
04/05/2011Kevin Sullivan spent months at Ground Zero after the 9/11 attacks on the World Trade Center. Now, post-Bin Laden, Sullivan says the 9/11 experience changed him both personally and professionally, and impacted how banking institutions view money laundering and BSA violations.
-
The Case for Cloud Security Standards
03/05/2011"On a global basis, countries are recognizing that they need a uniform commercial code, if you will, for data - a unified approach for managing IT infrastructure services," says Marlin Pohlman of the Cloud Security Alliance.
-
Why CISOs Must Care About Sony Breach
02/05/2011Intel CISO Malcolm Harkins says the Sony PlayStation breach reminds CISOs in all sectors that such incidents can't be avoided, but their risks can be managed.