Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Anti-Money Laundering Reform Needed

    30/08/2012

    Charles Intriago isn't shy about sharing his opinions. As he reflects on the sanctions against Standard Chartered Bank, he says banks won't reform until regulators send violators to prison.

  • Hurricane Season: Are We Prepared?

    29/08/2012

    As Tropical Storm Isaac strikes, many organizations still sting from the impact of Hurricane Irene and 2011's other natural disasters. What lessons were learned, and how can they be applied now?

  • Apple-Samsung Case: Lessons for CISOs

    28/08/2012

    One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.

  • Mitigating Messaging Risks

    27/08/2012

    E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.

  • 3 Lines of Cyberdefense

    22/08/2012

    By combining responsible management, risk management and compliance functions and internal audits, organizations will go far in securing their data and systems, says PricewaterhouseCoopers Partner Carolyn Holcomb.

  • Managing Security in a Merger

    15/08/2012

    When two organizations merge, their top security/privacy challenge doesn't necessarily involve technology. Sometimes it's culture, says Christopher Paidhrin of PeaceHealth Southwest Medical Center.

  • Information Assurance Job Market Soars

    15/08/2012

    People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand. "We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate about what they do and that are willing to put in the extra hours to keep the citizens of the nation and the state secure," Dan Likarish, assistant professor and program chair of the IT department at CO-based Regis, says. In an exclusive interview about information assurance and why the job market for information assurance professionals has seen astounding growth, Likarish discusses: Opportunities for information assurance professionals; Trends impacting information assurance education; Best options for someone to get into the information assurance profession.

  • How to Talk Security to the Board of Directors

    13/08/2012

    Increasingly, security and risk issues have the attention of boards of directors. What are the keys to discussing these topics with the board? John South, CSO of Heartland Payment Systems, shares tips.

  • FTC's Google Fine: The Privacy Message

    10/08/2012

    Google's $22.5 million settlement with the Federal Trade Commission is the largest fine ever imposed by the FTC. But the case sends a bigger message about privacy, says attorney Francoise Gilbert.

  • Thinking Smartly About Cloud Computing

    09/08/2012

    CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.

  • Social Media: Pros & Cons

    06/08/2012

    The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.

  • The Privacy Pro's Challenge

    06/08/2012

    There have never been so many job opportunities for privacy professionals. Nor have there ever been so many challenges. Trevor Hughes of the IAPP discusses what it takes to grow a privacy career.

  • Fraud: Businesses Hold Banks Accountable

    06/08/2012

    Guardian Analytics is out with its third annual Business Banking Trust Study. What are the latest fraud threats, and how do businesses expect their banking institutions to respond to these threats?

  • Symantec's CISO on Security Leadership

    03/08/2012

    Her first nine months on the job included a data breach and a CEO shakeup. Hear how Symantec CISO Patricia Titus has adapted to business change and re-focused the company's security team.

  • Privacy: 'Do Not Track' Debate

    31/07/2012

    Microsoft says its next version of the Internet Explorer web browser will feature "do not track" as a default user setting. What are the online privacy implications? Trevor Hughes of the IAPP weighs in.

  • COBIT 5 for Security: What You Need to Know

    23/07/2012

    ISACA just issued COBIT 5 for Information Security, a business-centric approach to governance and IT management. ISACA's Robert Stroud explains what COBIT 5 means to your organization.

  • When Breach Planning Fails

    20/07/2012

    When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.

  • CISO Success Requires Collaboration

    19/07/2012

    RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.

  • A Scientific Approach to Security

    19/07/2012

    The UK's GCHQ has named eight Centers of Excellence for Cybersecurity Research, and University College London is one of the designees. Researcher Angela Sasse discusses the significance of this honor.

  • Hot Jobs - And How to Land Them

    19/07/2012

    From application security to the network, information security career options are exploding. What are the top jobs, and how must infosec pros distinguish themselves to prospective employers?

página 126 de 143