Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
The CISO Challenge
18/02/2012Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
-
NIST to Unveil Controls Guidance at RSA
15/02/2012NIST's Ron Ross will be quite busy at RSA Conference 2012, not only promoting revised guidance on security and privacy controls to be unveiled at the securing conclave, but also participating in a panel on one of his favorite topics: continuous monitoring.
-
Fraud: The Latest Threats
15/02/2012What are the top emerging fraud threats to banking institutions via mobile banking, and how must security leaders respond? Julie McNelley of the Aite Group offers tips for fighting the newest threats.
-
7 Steps to Building a Security Program
10/02/2012To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
-
Privacy Officer in the Hot Seat
08/02/2012When Google amended its policy, suddenly everyone was talking about privacy. How do privacy officers turn these discussions to their advantage? Kirk Herath of Nationwide Insurance has some ideas.
-
Cybersecurity and Patents: What You Need to Know
06/02/2012What does a U.S. patent protect, and why should security leaders care? Attorney James Denaro details the risks and the questions you need to ask about the cybersecurity technologies you use.
-
Breach Resolution: 8 Lessons Learned
27/01/2012What are the critical steps that IT security professionals should take in the aftermath of a breach? CEO Micky Tripathi of The Massachusetts eHealth Collaborative offers eight practical lessons based on his breach resolution experience.
-
Elements of a Social Media Policy
23/01/2012You know your company's social media policy is a good one when it starts sounding less like a checklist and more like common sense, says Sherrie Madia, social media expert and author.
-
How to Identify the Insider Threat
17/01/2012Identifying the insider who could pose a threat to your organization's IT assets must be a team effort among non-technology, IT and information security managers, Carnegie Mellon University's Dawn Cappelli and Mike Hanley say.
-
Top 10 Screening Trends
16/01/2012Criminal background checks for prospective employees - smart move, or discriminatory practice? Attorney Lester Rosen answers this question and details 2012's top 10 trends in background checks.
-
Managing Privacy Globally
11/01/2012Securing senior management buy-in from the top of the organization is significant for executives managing the myriad of privacy laws in different regions of the world, says attorney Miriam Wugmeister.
-
Why Insource Forensics?
09/01/2012When it's time to stand up in court and discuss forensic evidence in a legal matter, you need someone who knows your business best, says Greg Thompson, VP enterprise security services at Scotiabank Group.
-
BYOD: Manage the Risks
05/01/2012Malcolm Harkins, CISO of Intel was quick to embrace BYOD as a means to cut costs and improve employee productivity. His advice to leaders struggling with the trend: "Don't shy away from the risk issues."
-
Complexity: Key Task for Security Pros
05/01/2012Complexity is among the most significant information risk challenges IT security practitioners face. Mobile and cloud computing, new technologies, outsourcing and growing threats from malware and people make managing risk more complex.
-
Top Trends for Leaders in 2012
05/01/2012Security leaders will need to tackle the top technology trends of big data, consumerization and mobile growth in 2012. Robert Stroud from ISACA offers tips to help manage the risks presented by these trends.
-
2012 Government Strategy Guide to Defending Against Cyber-Attacks
02/01/2012How can government agencies protect against new and trending cyber attacks? What are today's top application security trends and threats? Robert Haas of HP has expert insight and tips.
-
2012 Fraud-Fighting Agenda
20/12/2011Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.
-
IT Security Vs. Info Risk Management
19/12/2011Information risk management, at its core, is about tradeoffs, says NIST Senior Scientist Ron Ross.
-
Risk Awareness: What Do CEOs Need to Know?
15/12/2011If management awareness of information security issues increases, will an organization's commitment to securing practices and policies also increase? This is the question answered by an eye-opening new study.
-
Disaster Recovery: Supply Chain at Risk
14/12/2011Every organization likes its business continuity/disaster recovery plan before a disaster, says Al Berman of DRI International. But in the aftermath? Different story - and one that must be addressed in 2012.