Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
McDonald's New CISO Shares Insights on Talking to the Board
19/09/2017What advice does the new CISO of fast-food giant McDonald's, who has served as CISO at two other major corporations, have for how to communicate with the board of directors? Tim Youngblood offers insights in this exclusive interview.
-
Do CISOs Need IT or InfoSec Academic Credentials?
19/09/2017In the latest edition of the ISMG Security Report: a look at the former Equifax chief information security officer and whether her lack of academic credentials in IT or IT security is relevant to the massive breach at the credit reporting agency.
-
A New Approach to Authentication for a Cashless Economy
18/09/2017In the move to a cashless economy in India and elsewhere, improving user authentication is critical, but users are demanding ease of use, says Singapore-based Tom Wills, director at Ontrack Advisory. He describes the roles that biometrics and artificial intelligence will play.
-
Gauging Equifax's Future in Wake of Massive Breach
15/09/2017Top IT security and information risk experts, including former RSA Executive Chairman Art Coviello, analyze the struggles Equifax faces in the wake of a massive data breach in the latest edition of the ISMG Security Report.
-
Healthcare Cybersecurity: Simplify Compliance & Avoid Breaches
13/09/2017An ongoing series of Healthcare Security Readiness workshops reveals some key gaps in how healthcare organizations defend against cybercrime hacking. How should entities assess and mitigate these gaps? David Houlding of Intel shares insights.
-
Former Anthem Cybersecurity Exec on Protecting Credentials
13/09/2017A former cybersecurity analytics specialist at health insurer Anthem, which experienced a massive data breach, offers insights on key steps organizations should take to avoid becoming the next breach victim in the headlines.
-
Taking a Deep Dive Into the Equifax Breach
12/09/2017A detailed analysis of the Equifax breach highlights the latest edition of the ISMG Security Report. Also, an update on Russia exploiting social media to influence the 2016 presidential vote.
-
Real-Time Transactions, Real-Time Security
11/09/2017In the age of ubiquitous mobility, customers' expectations have evolved - and so must an organization's approach to authentication and transaction security, says Will LaSala of VASCO Data Security.
-
Analysis: Why Equifax Breach Is So Significant
08/09/2017The Equifax breach revealed on Thursday is more significant that other mega-breaches because of the nature of the data that was potentially exposed, says cybersecurity attorney Imran Ahmad. He'll be a featured speaker at ISMG's Toronto Fraud & Breach Prevention Summit on Tuesday.
-
Is US Global Cybersecurity Leadership in Jeopardy?
08/09/2017Leading the latest edition of the ISMG Security Report: Observations about America's standing as a global cybersecurity leader from Christopher Painter, who until earlier this summer served as the United States' top cyber diplomat. Also, threats posed by IoT devices.
-
Ransomware Protection: Facts About Secure Backup
08/09/2017When it comes to ransomware defense, "backup, backup, backup" is the go-to strategy. But are organizations backing up the right data at the right time to enable the best ransomware recovery? Ali Mahmoud of SolarWinds MSP shares new insight on secure backup.
-
A Cybersecurity Leader on Filling Jobs Now
06/09/2017Cory Mazzola, a cybersecurity leader at Las Vegas Sands Corp., says recruiting security pros amid a talent shortage requires putting aside expectations about degrees and backgrounds. Instead, he says companies need to be willing to develop new skills in their new hires.
-
Cybersecurity and Medical Devices: 'Ducking Bullets'
05/09/2017"We've been ducking bullets" when it comes to cybersecurity incidents impacting patient safety, says consultant Brian Selfridge, a former healthcare CISO, who discusses today's emerging risks.
-
Thought Leaders Speak Out on Pressing Cybersecurity Issues
05/09/2017This special edition of the ISMG Security Report features the observations of top cybersecurity experts featured at Information Security Media Group's recent Fraud and Breach Prevention Summit in New York.
-
Authentication Tools to Secure a Cashless Economy
01/09/2017A report on advances in authentication to secure a cashless economy leads the latest edition of the ISMG Security Report. Also, we analyze the record-shattering Anthem data breach settlement.
-
Getting the Bad Guys to Fund US Cyber Command's Growth
29/08/2017The ISMG Security Report leads with views on a novel way to fund the growth of the United States military's Cyber Command by seizing assets such as digital currencies from hackers and other criminals. Also, we offer tips on how to recruit scarce IT security pros.
-
Maximizing Malware Analysis
28/08/2017Yes, malware commonly targets the Windows operating system. But if you limit malware analysis to Windows OS, you're leaving gaping vulnerabilities, says Christopher Kruegel of Lastline Inc. Here's how to maximize your analysis.
-
After 7 Months in Office, How's Trump Doing on Cybersecurity?
25/08/2017Analyzing Donald Trump's cybersecurity policy seven months into his administration highlights the latest edition of the ISMG Security Report. Also, Cybersecurity Coordinator Rob Joyce disses Kaspersky Lab on network TV.
-
Analysis: The Merits of Medical Device Security Legislation
23/08/2017Could proposed legislation force manufacturers and healthcare entities to put more effort into bolstering the cybersecurity of medical devices? In an interview, cybersecurity expert Joshua Corman provides in-depth analysis on the movement to improve the state of medical device security.
-
Changes Coming to NIST's Catalog of Security Controls
22/08/2017The latest ISMG Security Report leads with information security guru Ron Ross discussing changes coming to the National Institute of Standards and Technology's catalog of IT security and privacy controls. Also, challenges facing an upgraded U.S. Cyber Command.