Banking Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Cloud-Native Data Management

    16/04/2021

    Traditionally, data management has not received the attention it deserves. But with the advent of Kubernetes and cloud-native technologies, this conversation becomes a game-changer. Michael Cade of Kasten by Veeam explains why, how and where to take advantage.

  • Does FBI Exchange Remediation Action Set a Precedent?

    16/04/2021

    The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.

  • A Holistic Approach to Cybersecurity and Compliance

    16/04/2021

    In a joint interview, Mike Ferris and Mike Brooks of Abacode, a managed cybersecurity and compliance provider, discuss how the MCCP model helps businesses implement a holistic, framework-based cybersecurity program that provides continuous security and compliance.

  • State of the Marketplace: A Conversation With Dave DeWalt

    14/04/2021

    Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.

  • Crisis Communications: How to Handle Breach Response

    09/04/2021

    The latest edition of the ISMG Security Report features an analysis of why transparent communication in the aftermath of a data breach pays off. Also featured: Mastercard on digital identity issues; building a more diverse and inclusive cybersecurity workforce.

  • Implementing Cybersecurity Best Practices

    09/04/2021

    Andy Purdy, the chief security officer for Huawei Technologies USA who formerly worked on the White House staff and in the Department of Homeland Security, discusses cybersecurity best practices.

  • Analysis: Fat Face's Awkward Breach Notification

    02/04/2021

    The latest edition of the ISMG Security Report features an analysis of retailer Fat Face’s awkward "strictly private and confidential" data breach notification. Also featured: Discussions on the ethics of buying leaked data and the rise of central bank digital currencies.

  • The Looming Threat of Broken Cryptography

    29/03/2021

    Quantum computing eventually could break existing cryptographic methods with brute force attacks, so organizations need to prepare now, says Evangelos Rekleitis of ENISA.

  • Is Your Security Stack Ready for the Modern Cloud?

    26/03/2021

    Digital transformation makes the headlines. But behind the scenes, many enterprises are struggling with the effects of cloud migration and the “shift left” movement. Knox Anderson of Sysdig shares tips for approaching the modern cloud.

  • Analysis: Takeaways From Ransomware Gang Interviews

    26/03/2021

    The latest edition of the ISMG Security Report features an analysis of recent “tell-all” interviews with members of ransomware gangs. Also featured: insights on securing IoT devices and mitigating insider threat risks.

  • Unemployment Fraud Targets Executive Suite

    24/03/2021

    Unemployment fraud incidents have spiked in the past year, and high-salaried senior executives are often the fraudsters’ victims. Dr. Christopher Pierson of BlackCloak describes how these scams are pulled off, what impact they have and how the CISO can bolster defenses.

  • Analysis: Microsoft Exchange Server Hacks

    19/03/2021

    This edition of the ISMG Security Report features an analysis of the Microsoft Exchange on-premises server hacks – from who might have leaked the vulnerability exploits to how ransomware gangs are taking advantage of the flaws. Also featured: Tackling the cybercrime business model; assessing "zero trust."

  • Analysis: Lessons Learned From Emotet Takedown

    12/03/2021

    The latest edition of the ISMG Security Report features cybercrime deterrence lessons learned from the disruption of the Emotet botnet operation. Also featured: An update on attacks tied to Microsoft Exchange flaw exploits; a discussion of the need to update business continuity plans.

  • Digital Documentation: Authenticity and Integrity

    12/03/2021

    With the explosion of remote business, we are now digitizing many of our documents and processes. Entrust’s Jay Schiavo explains what new mindset this shift requires, what’s needed to ensure document authenticity and integrity.

  • SOC Management: Automation Best Practices

    11/03/2021

    What are best practices for applying automation to make SOCs more efficient? Cory Mazzola, executive fellow at the Tuck School of Business at Dartmouth College, offers insights.

  • Accellion Appliance Zero-Day Attack Breaches: Key Takeaways

    05/03/2021

    This edition of the ISMG Security Report features an analysis of key takeaways from the breaches tied to flaws in the Accellion File Transfer appliance. Also featured: Equifax CISO Jamil Farshchi on transforming supply chain security, plus an analysis of how "work from anywhere" is affecting cybersecurity.

  • Stopping Stock Manipulation Fraud

    02/03/2021

    The recent manipulation of GameStop stock points to the need for public companies to carefully monitor mentions of their firm on social media channels to look for signs of emerging fraudulent practices, says Chase Cunningham, chief strategy officer at Ericom Software.

  • Analysis: Feds Crack Down on Cryptocurrency Scams

    26/02/2021

    The latest edition of the ISMG Security Report features an analysis of a federal crackdown on ICO cryptocurrency scams. Also featured: An update on the SonicWall hack investigation and the use of digital IDs to verify COVID-19 testing.

  • Analysis: Russia's Sandworm Hacking Campaign

    19/02/2021

    This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.

  • Becoming a CISO: Many Paths to Success

    17/02/2021

    Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.

página 23 de 173