Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Social Media Risks and Controls

    09/08/2011

    When it comes to social media, organizations have to be vigilant and consistent with risk assessments that closely monitor and evaluate emerging threats, says Andrew Kennedy of BITS.

  • Creating a Culture of Security

    08/08/2011

    Yahoo's Justin Somaini believes his fellow CISOs in business and government do a good job keeping their bosses informed of proper information security practices, but could do better in educating the rank and file about them.

  • Securing the Cloud

    05/08/2011

    ISACA's Marc Vael says differences in cloud computing environments and cloud providers can pose security risks. But well thought-out contracts and risk-management plans can fill potential security gaps and ensure business continuity during outages and disasters.

  • Forensics in the Cloud

    26/07/2011

    Performing digital forensics in the cloud isn't necessarily a new discipline, says Rob Lee of SANS Institute. But the task definitely requires a whole new mindset and some new skills from investigators.

  • The Ethics of Information Security

    25/07/2011

    It is no longer enough for information security professionals to secure critical information. They also need to be asking about the legitimacy of where this information comes from, says John Colley, managing director of (ISC)2 in EMEA.

  • Cybersecurity: The New Frontier

    25/07/2011

    Dickie George of the National Security Agency has one word to describe the state of information security education today: "Spotty." And this state must improve if we hope to fill all the growing demand for security pros.

  • Ron Ross on NIST's New Privacy Controls

    21/07/2011

    NIST's Ron Ross points out that its seminal security control guidance, Special Publication 800-53, contains only one privacy control, requiring agencies to conduct a privacy impact assessment. That will change by year's end.

  • Elements of a Social Media Policy

    19/07/2011

    You know your organization's social media policy is a good one when it starts sounding less like a checklist and more like common sense, says Sherrie Madia, social media expert and author.

  • RSA's CSO Tells Why He Took the Job

    12/07/2011

    Eddie Schwartz didn't shy away from the offer to become RSA's first chief security officer after the security firm experienced a sophisticated advanced-persistent-threat breach. Instead, Schwartz embraced the hack as the reason to take the job. (See RSA to Get Its First Chief Security Officer.)

  • New Roles in Risk Management

    11/07/2011

    Recent high-profile data breaches and heightened threats add up to one thing: a bright future for information security professionals who want to start or re-start a career in risk management.

  • Biometrics Seen as SecurID Alternative

    07/07/2011

    RSA customers who feel victimized by last March's breach of the security vendor's computers have viable options that include continued use of the SecurID authentication tokens, those offered by competitors, or something entirely different: biometrics.

  • Insider Threats: Great and Growing

    07/07/2011

    Insider fraud expert Shirley Inscoe says Citi is not the only financial institution that's doing a poor job of keeping up with employee misconduct. Few banking institutions grasp how damaging inside jobs actually are.

  • Fraud Fighters Wanted

    05/07/2011

    Today's top fraud threats recognize no global boundaries, says James Ratley, head of the Association of Certified Fraud Examiners. And they require a stronger global workforce than ever before.

  • Fraud Prevention and EMV

    01/07/2011

    The Fed's ruling on interchange cuts mandated by the Durbin Amendment will aid fraud prevention and could accelerate a move to chip-based payments, says Randy Vanderhoof, director of the Smart Card Alliance.

  • Privacy by Redesign: A New Concept

    28/06/2011

    Organizations' biggest obstacles to privacy protection are the organizations themselves - specifically, their silos - says Dr. Ann Cavoukian, proponent of the new concept, Privacy by Redesign.

  • FFIEC: Banks Need Layered Security

    28/06/2011

    Fraud expert Ori Eisen says banks spend too much time reacting to ACH fraud, rather than trying to stop it. Now that the FFIEC's new online authentication guidance is official, banks must focus on eliminating outdated solutions and moving toward automated solutions for device identification and log analysis.

  • Executive Decision: What to Encrypt

    27/06/2011

    SafeNet CEO Chris Fedde says top executives, not chief information or chief information security officers, should have final say on what data to encrypt.

  • 4 R&D Initiatives Focus on Infosec

    21/06/2011

    Northrop Grumman Cybersecurity Research Consortium's Robert Brammer says IT security researchers should think like Wayne Gretzky, the National Hockey League hall of famer: Skate to where the puck will be.

  • Insider Threat: 'Database Armageddon'

    20/06/2011

    AppSec's VanHorn says more segregation of employee duties is needed.

  • PCI Council Addresses Virtualization

    14/06/2011

    The PCI Security Standards Council's new guidance on virtualization in the payments space aims to provide best practices for securing the payments chain's virtual platforms and appliances.

página 132 de 143