Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • The CISO Challenge

    18/02/2012

    Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.

  • NIST to Unveil Controls Guidance at RSA

    15/02/2012

    NIST's Ron Ross will be quite busy at RSA Conference 2012, not only promoting revised guidance on security and privacy controls to be unveiled at the securing conclave, but also participating in a panel on one of his favorite topics: continuous monitoring.

  • Fraud: The Latest Threats

    15/02/2012

    What are the top emerging fraud threats to banking institutions via mobile banking, and how must security leaders respond? Julie McNelley of the Aite Group offers tips for fighting the newest threats.

  • 7 Steps to Building a Security Program

    10/02/2012

    To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.

  • Privacy Officer in the Hot Seat

    08/02/2012

    When Google amended its policy, suddenly everyone was talking about privacy. How do privacy officers turn these discussions to their advantage? Kirk Herath of Nationwide Insurance has some ideas.

  • Cybersecurity and Patents: What You Need to Know

    06/02/2012

    What does a U.S. patent protect, and why should security leaders care? Attorney James Denaro details the risks and the questions you need to ask about the cybersecurity technologies you use.

  • Breach Resolution: 8 Lessons Learned

    27/01/2012

    What are the critical steps that IT security professionals should take in the aftermath of a breach? CEO Micky Tripathi of The Massachusetts eHealth Collaborative offers eight practical lessons based on his breach resolution experience.

  • Elements of a Social Media Policy

    23/01/2012

    You know your company's social media policy is a good one when it starts sounding less like a checklist and more like common sense, says Sherrie Madia, social media expert and author.

  • How to Identify the Insider Threat

    17/01/2012

    Identifying the insider who could pose a threat to your organization's IT assets must be a team effort among non-technology, IT and information security managers, Carnegie Mellon University's Dawn Cappelli and Mike Hanley say.

  • Top 10 Screening Trends

    16/01/2012

    Criminal background checks for prospective employees - smart move, or discriminatory practice? Attorney Lester Rosen answers this question and details 2012's top 10 trends in background checks.

  • Managing Privacy Globally

    11/01/2012

    Securing senior management buy-in from the top of the organization is significant for executives managing the myriad of privacy laws in different regions of the world, says attorney Miriam Wugmeister.

  • Why Insource Forensics?

    09/01/2012

    When it's time to stand up in court and discuss forensic evidence in a legal matter, you need someone who knows your business best, says Greg Thompson, VP enterprise security services at Scotiabank Group.

  • BYOD: Manage the Risks

    05/01/2012

    Malcolm Harkins, CISO of Intel was quick to embrace BYOD as a means to cut costs and improve employee productivity. His advice to leaders struggling with the trend: "Don't shy away from the risk issues."

  • Complexity: Key Task for Security Pros

    05/01/2012

    Complexity is among the most significant information risk challenges IT security practitioners face. Mobile and cloud computing, new technologies, outsourcing and growing threats from malware and people make managing risk more complex.

  • Top Trends for Leaders in 2012

    05/01/2012

    Security leaders will need to tackle the top technology trends of big data, consumerization and mobile growth in 2012. Robert Stroud from ISACA offers tips to help manage the risks presented by these trends.

  • 2012 Government Strategy Guide to Defending Against Cyber-Attacks

    02/01/2012

    How can government agencies protect against new and trending cyber attacks? What are today's top application security trends and threats? Robert Haas of HP has expert insight and tips.

  • 2012 Fraud-Fighting Agenda

    20/12/2011

    Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.

  • IT Security Vs. Info Risk Management

    19/12/2011

    Information risk management, at its core, is about tradeoffs, says NIST Senior Scientist Ron Ross.

  • Risk Awareness: What Do CEOs Need to Know?

    15/12/2011

    If management awareness of information security issues increases, will an organization's commitment to securing practices and policies also increase? This is the question answered by an eye-opening new study.

  • Disaster Recovery: Supply Chain at Risk

    14/12/2011

    Every organization likes its business continuity/disaster recovery plan before a disaster, says Al Berman of DRI International. But in the aftermath? Different story - and one that must be addressed in 2012.

página 130 de 143