Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Cybersecurity, Trade on Collision Course

    10/10/2013

    Nations' policies for mitigating cyberthreats can conflict with efforts to promote cyber-enabled global trade, cautions Allan Friedman, research director of the Brookings Institution's Center for Technology Innovation.

  • Purdue's Spafford on Educating Executives

    09/10/2013

    To mark his induction into the National Cyber Security Hall of Fame, Purdue University Computer Science Professor Eugene Spafford offers insights on key challenges, including overcoming senior executives' misperceptions about key issues.

  • Tracking the Fraud Lifecycle

    02/10/2013

    What are the distinct phases of the fraud lifecycle, and how can banking institutions intervene at each stage to prevent losses? Daniel Ingevaldson of Easy Solutions offers fraud-fighting tips.

  • PCI Updates Address Retail Breaches

    30/09/2013

    Mitigating card risks associated with retail malware attacks and POS vulnerabilities is a focus of updates to the PCI Data Security Standard, say Bob Russo and Troy Leach of the PCI Security Standards Council.

  • CEOs as Privacy Leaders

    25/09/2013

    Top executives at healthcare organizations must take the lead in overcoming a culture that portrays privacy and security as barriers, says Joy Pritts, chief privacy officer at the Office of the National Coordinator for Health IT.

  • Pitfalls of Professionalizing InfoSec

    24/09/2013

    Professionalizing occupations within the cybersecurity field won't necessarily help fill vacant IT security jobs in government and industry, says Diana Burley, an IT security workforce expert.

  • SMU's New Cybersecurity Mission

    17/09/2013

    In response to today's cybersecurity challenges, Southern Methodist University has selected Frederick Chang to head a new program that will address top issues - including how to fill the skills gap.

  • Expanding Continuous Diagnostic Effort

    10/09/2013

    John Streufert, the DHS director overseeing the rollout of a federal continuous diagnostic initiative to mitigate IT systems vulnerabilities, expects that many state and local governments will participate in the program.

  • Implementing Continuous Monitoring Plan

    05/09/2013

    The massive initiative to deploy continuous monitoring at U.S. federal government agencies will be done in phases, with the initial rollout occurring over three years, the Department of Homeland Security's John Streufert says.

  • Continuous Monitoring: Federal Game Plan

    03/09/2013

    As the federal government ramps up deployment of continuous monitoring, agencies should significantly reduce the time to certify and accredit IT systems and detect vulnerabilities, says the Defense Department's Robert Carey.

  • Managing Cloud Vendors

    03/09/2013

    Bank regulatory guidelines for cloud providers highlight due diligence, and organizations that don't adequately screen vendors face trouble. Troy Wunderlich of Washington Trust Bank offers tips for vendor managers across industries.

  • Impact of Big Data on Privacy Policy

    22/08/2013

    Because big data brings significant benefits - and risks - CEOs and boards of directors must take charge of developing privacy protection policies, ISACA International Vice President Jeff Spivey says.

  • Facing the Advanced Threat

    20/08/2013

    Today's advanced threats are no secret. Focusing the correct resources on them is the true challenge, says Will Irace of General Dynamics Fidelis Cybersecurity Solutions. He offers tips for harnessing the right skills and technology.

  • PCI 3.0 Draft Guidelines Released

    19/08/2013

    Version 3.0 of the PCI Data Security Standard is coming, and draft guidelines reflect the impact of recent retail breaches. PCI GM Bob Russo explains big changes to ensuring payment card security.

  • Can DHS Be Trusted to Protect Gov't IT?

    16/08/2013

    Bruce McConnell, who just stepped down as one of the federal government's top cybersecurity policymakers, says he understands why some lawmakers don't trust DHS with significant authority to safeguard government IT.

  • Information Sharing: What's Missing?

    12/08/2013

    Organizations won't effectively share cyberthreat intelligence until they have more efficient ways of gathering and prioritizing data, says EMC's Kathleen Moriarty, author of a new report about information sharing weaknesses.

  • Exit Interview: DHS's Bruce McConnell

    12/08/2013

    Though others deemed Bruce McConnell as one of the government's most innovative security thought-leaders, he says his vision of how best to secure IT evolved during his just-ended 4-year tenure at DHS as a senior cybersecurity policymaker.

  • 'Is My Security Program Protecting My Business?'

    09/08/2013

    It's an increasingly common question from CEOs. "How is our security program protecting the business?" Pamela Gupta of OutSecure shares insight on what CISOs should demonstrate when they answer that question.

  • Diplomat: Security, Openness Can Co-Exist

    06/08/2013

    The best ideas to secure the Internet do not come from the top-down government approach imposed by some foreign governments, but from the openness derived by a multi-stakeholder process, says Christopher Painter, America's top cyber diplomat.

  • Hotline's New Use: Avert Cyber Disaster

    02/08/2013

    The hotline, the communications link established between Washington and Moscow during the Cold War to avert a nuclear war, is being used to warn of potential cyber and environmental crises, the State Department's Christopher Painter says.

página 116 de 143