Sinopsis
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Pace Charters New Cyber Institute
07/12/2011New York's Pace University has just announced its new Seidenberg Cyber Security Institute. What is the school's mission, and why is now the ideal time to open its doors to career-minded students?
-
Organizing a Breach Notification Team
05/12/2011It's one thing to have a data breach response team. It's quite another to ensure that team is made up of savvy personnel, says Brian Dean, a former privacy executive for KeyBank.
-
Breach Response: Reputational Risk
30/11/2011Data breaches are all about reputational risk, says attorney Lisa Sotto. And as legal requirements grow, attorneys must play increasingly integral roles in helping clients respond to incidents.
-
The State of Security Education
29/11/2011Information security threats - especially to critical infrastructures and from nation-states - are evolving. But security education curricula are struggling to keep pace, according to Eugene Spafford, renowned information security professor at Purdue University.
-
Identifying Infosec Jobs, Skills, Tasks
15/11/2011NICE's Ernest McDuffie says a proposed cybersecurity workforce framework represents a consensus of government thought on how best to define the jobs, skills and tasks needed to secure information technology.
-
BYOD and Corporate Policy
15/11/2011Unfortunately, says Ken Vander Wal, most organizations have done little to address security in their policies and procedures regarding BYOD, which is changing the ways companies address user behavior and risk.
-
How Training Helps Prevent Breaches
14/11/2011A lack of ongoing HIPAA compliance training increases the risk of internal breaches, says Terrell Herzig, information security officer at UAB Medicine.
-
BofA on Mobile Risk and Security
10/11/2011Bank of America's Keith Gordon says securing the mobile channel is much like securing any other banking channel: Controlling risks requires layers of security and controls. But educating customers plays a key security function, too.
-
Breach Resolution: A Success Strategy
07/11/2011One reason why so many healthcare organizations are not well-prepared to counter security threats is that "key leadership has not bought into the whole process," says Bob Krenek of Experian® Data Breach Resolution.
-
Winning Funding for Info Security
07/11/2011Penetration tests that demonstrate how an unauthorized user could gain access to patient information can be effective in winning support for a bigger information security budget, says David Kennedy of Diebold, Incorporated.
-
Web Apps: The Top Vulnerabilities
03/11/2011ISACA has just released a new study about the top vulnerabilities of Web applications. And, according to Sarb Sembhi, the results of this survey just might surprise you.
-
How Audits Can Increase Infosec Budgets
19/10/2011Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.
-
The App Sec Pro and the Shark
13/10/2011When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.
-
PCI: Merchants Still Fall Short
28/09/2011Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
-
9/11: The Global Perspective
09/09/2011The Sept. 11 terrorist attacks struck the U.S., but the impact and lessons affected the world and the entire information security profession, says Rolf von Roessing, past international vice president of ISACA.
-
Social Media: Why Training Is Key
02/09/2011Frequent face-to-face training on social media policies is a vital component of any risk management effort, says consultant Erika Del Giudice.
-
Why IT Security Careers Remain Hot
30/08/2011Careers in IT security remain hot, says David Foote, noted researcher and analyst of IT workforce trends. But there's a disconnect between current job opportunities and the talent pool looking to fill them.
-
Facial Biometrics Pose Privacy Woes
29/08/2011Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the biometric technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the biometric data, cautions a privacy rights leader.
-
Social Media and Reputational Risks
24/08/2011ICBA's Chris Lorence says all financial institutions, especially community banks, should appreciate the positive and negative effects posts on social-networking sites can have on their reputations.
-
Infosec in a Decentralized Environment
23/08/2011Give a man a fish, you feed him for today, the proverb says. Teach a man to fish; and you feed him for a lifetime. That adage can be applied to information security, as well.