Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • 3 Health InfoSec Lessons from Sony Hack

    17/12/2014

    The healthcare sector can learn three important lessons from the recent hack attack on Sony Pictures Entertainment, which compromised employee health data, says breach resolution expert Michael Bruemmer of Experian.

  • ForeScout CEO on Internet of Things

    17/12/2014

    As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.

  • Proofpoint's CEO: Hackers Are Winning

    15/12/2014

    Gary Steele has seen attack methods rapidly evolve over the last five years. But what the CEO of Proofpoint hasn't seen is a comparable evolution in how the security industry responds to attacks.

  • AirWatch Chairman on Mobile Security

    12/12/2014

    Financial transactions on smart phones require layered security that helps outsmart cyberthieves, says Alan Dabbiere, chairman of AirWatch, who describes today's mobile challenges.

  • New (ISC)² Head Tackles Staffing Crisis

    11/12/2014

    As David Shearer steps in as the new executive director of (ISC)², he inherits a huge challenge: How does the consortium respond appropriately to the global information security staffing shortage?

  • The True Cost of a Data Breach

    08/12/2014

    When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.

  • Christy Wyatt on Mobile Security

    04/12/2014

    Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.

  • 'Wiper' Malware: What You Need to Know

    03/12/2014

    Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.

  • A Boost for Cybersecurity Policy Analysis

    26/11/2014

    Hewlett Foundation President Larry Kramer explains why the group is funding academic efforts to lay the cornerstone for sustainable public policy to deal with the growing cyberthreats faced by governments, businesses and individuals.

  • Security Staffing: The Real Crisis

    26/11/2014

    Yes, there is a global security staffing shortage. But what is the cause, and what can be done to address the crisis? Hord Tipton of (ISC)² offers his take on key issues facing the profession.

  • Embracing the Adversary Mindset

    20/11/2014

    Cybersecurity specialists need to learn to think like an adversary in order to develop sound defense strategies, says Greg Shannon, chief scientist at the CERT Division of Carnegie Mellon University's Software Engineering Institute.

  • How IBM Will Grow Its Security Business

    17/11/2014

    Brendan Hannigan became IBM's top security systems executive in 2011, when Big Blue acquired the company he ran, Q1 Labs. Hannigan says acquisitions will remain a key component in the growth of IBM's security business.

  • The Multidisciplinary IT Security Team

    13/11/2014

    A top-flight IT security team requires individuals with know-how in a wide range of non-technology disciplines, in addition to those with technical expertise, cybersecurity leaders say.

  • FireEye CEO: The Evolution of Security

    12/11/2014

    The threats, the solutions and certainly the actors all have changed dramatically since David DeWalt first entered the information security industry. Which should be the top concern for enterprises?

  • David DeWalt: The Business of Security

    12/11/2014

    Advanced threats, targeted attacks and enterprise mobility have re-shaped how we approach security, and they've also influenced the growth of FireEye. CEO David DeWalt discusses the highs and lows of his tenure.

  • The Business of Fighting Fraud

    12/11/2014

    The cost of cyberfraud is expected to hit $8 billion by 2018, and that increase opens new doors for solutions provided by niche cybersecurity firms, says Easy Solutions CEO Ricardo Villadiego.

  • Fiberlink President on Future of BYOD

    12/11/2014

    BYOD is evolving into the "BYO-everything" trend, says Chris Clark, president of IBM's Fiberlink. He discusses Apple and IBM's enterprise mobility deal, as well as how mobility continues to reshape computing.

  • One on One with FireEye's Dave DeWalt

    12/11/2014

    "It's a tough conversation, telling [clients] they've spent a lot of money on defense-in-depth that isn't working," says FireEye CEO David DeWalt. "If they don't change, they're risking their company."

  • Breach Aftermath: Messaging Matters

    11/11/2014

    Poor post-breach communication can cause as much damage to a company's reputation as the cyber-incident itself, says Al Pascual, a senior analyst at Javelin Strategy & Research, who will speak at ISMG's Fraud Summit Dallas.

  • New ONC Privacy Chief's Rallying Cry

    10/11/2014

    The secure national exchange of patients' health information for use in treatment will make progress once "we simplify what we say when we're explaining privacy to people," says Lucia Savage, new chief privacy officer of ONC.

página 104 de 143