Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Electronic Banking: Transaction Security

    07/11/2014

    From PCs to tablets to smartphones, customers enter institutions from all electronic angles. And these new banking habits put new strains on traditional IT infrastructure. How can banks ensure security?

  • NIST's Ron Ross on How a Career Evolves

    06/11/2014

    After 20 years in the Army and nearly that long as an information risk management leader at the National Institute of Standards and Technology, Ron Ross says his career is still evolving. Find out what he plans to do next.

  • FFIEC: Boards Need Cyber Training

    05/11/2014

    Amy McHugh, a former FDIC IT examination analyst, says banking regulators will soon scrutinize C-level executives and boards of directors to gauge their cybersecurity awareness in the wake of the FFIEC's pilot cyber-risk assessment program.

  • White House Hack: A Lesson Learned

    30/10/2014

    An important lesson from the breach of a White House unclassified network is that organizations should invest in intrusion detection tools, not just perimeter defenses, SANS's Johannes Ullrich says.

  • Fixing Two-Factor Failures

    23/10/2014

    As numerous attacks have demonstrated, two-factor authentication systems are not foolproof, says Ryan Lackey, a principal in the security practice at CloudFlare, who offers insights on how today's authentication systems must evolve.

  • APT Defense: Executing the Right Standards

    20/10/2014

    In addition to adopting the right IT security standards to mitigate advance persistent threats, organizations need to pick the right people to carry out those standards, says Jon Long, a featured speaker at ISMG's Global APT Defense Summit on Oct. 22.

  • NIST Framework: Healthcare Hurdles

    20/10/2014

    More healthcare entities might consider implementing NIST's cybersecurity framework if healthcare-specific guidance on putting the framework to use was available, says Lee Kim of the Healthcare Information and Management Systems Society.

  • Fighting the Globalization of Cybercrime

    17/10/2014

    "Cybercrime as a service" and the globalization of attacks are two of the trends noted by cyber-intelligence firm Group-IB in its third annual High-Tech Crime Report. Group-IB's Alexander Tushkanov explains the lessons that can be learned.

  • What Would the Original CISO Do?

    16/10/2014

    What advice does the first CISO have for today's security leaders? Steve Katz speaks up on top security threats, how to defend against them and what it takes to lead an effective security team.

  • Using Analytics to Improve Fraud Detection

    16/10/2014

    Data analytics is reshaping the way financial institutions detect fraud by helping them track customer behavior in real time, says FICO's Anant Nambiar, who'll be a featured presenter at ISMG's Fraud Summit New York on Oct. 21.

  • Manipulating Hackers as a Cyberdefense

    15/10/2014

    Knowing how to manipulate a hacker's cultural values could help thwart - or at least slow down - cyber-attacks, says Garet Moravec, a cybersecurity expert who'll speak at ISMG's Global APT Defense Summit on Oct. 22.

  • Are You Prepared for a Breach?

    13/10/2014

    In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.

  • Why Shellshock Battle Is Only Beginning

    08/10/2014

    Nearly two weeks since news of Shellshock broke, attacks that are taking advantage of the Bash vulnerabilities are grabbing headlines. But Michael Smith of Akamai warns that the battle against hackers capitalizing on Shellshock could go on for years.

  • The Slow Path to Password Replacement

    06/10/2014

    The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.

  • Shellshock: The Patching Dilemma

    02/10/2014

    As researchers scramble to learn more about Shellshock and the risks it poses to operating systems, servers and devices, Michael Smith of Akamai explains why not all patches are actually fixing the problem.

  • Shellshock Bug: How to Respond

    26/09/2014

    To mitigate the newly discovered Bash bug - AKA Shellshock - which may make millions of systems vulnerable to remote takeover, organizations must take several key steps, says security expert Alan Woodward.

  • Effective CPOs Must Justify Their Roles

    18/09/2014

    Harriet Pearson, one of the first chief privacy officers at a major enterprise, discusses what makes an effective CPO and privacy lawyer in a fast-evolving field.

  • Security: Maximize Business Benefits

    16/09/2014

    When it comes to the evolution of machine data, security organizations now can improve protection and the top line. How can they maximize the business benefits? Jean-Francois Roy of Tibco shares tips.

  • The Biggest Challenge to EMV Migration

    16/09/2014

    What's the toughest challenge the U.S. faces when it comes to EMV? Randy Vanderhoof of the EMV Migration Forum points to getting POS software and terminals certified for EMV transactions. Find out what other hurdles he identifies.

  • PCI Council's New GM on Security

    11/09/2014

    During his first media interview as new general manager of the PCI Security Standards Council, Stephen Orfei says retailers and banks today are better equipped than ever to fight cybercrime.

página 105 de 143