Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Mobile Devices - Risks & Rewards

    03/06/2011

    What's the top threat on the minds of global IT leaders? Employee-owned mobile devices - or BYOD (bring your own device), as the trend is known. The struggle: Do mobile device benefits outweigh the organizational risks?

  • Public Health Serves as Cybersec Model

    31/05/2011

    The same approach governments and businesses employ to protect individuals from the dangers of secondhand smoke could be applied to safeguard cyberspace, says Scott Charney, Microsoft's vice president of trustworthy computing, engineering excellence and environmental sustainability.

  • Why We Need Ethical Hacking

    27/05/2011

    "Ethical hacking" - is the term an oxymoron, or is it one of today's necessities in the fight against cybercrime? Jay Bavisi, president and co-founder of the EC Council, feels strongly about why we need ethical hackers more today than ever before.

  • Pressure is on Privacy Pros

    26/05/2011

    From Epsilon to Sony, recent data breaches and legislative trends tell a dramatic story about the turbulent state of privacy worldwide, according to J. Trevor Hughes, head of the International Association of Privacy Professionals.

  • Privacy: "Mobile Technology Concerns Me"

    23/05/2011

    Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies, has been in privacy management for more than a decade, and he has two main concerns about today's enterprise: Mobile technology and cloud computing.

  • Privacy: "You Can't Prepare Enough"

    23/05/2011

    The recent data breaches at Epsilon and Sony should send a chilling message to privacy officers everywhere. "You can't prepare enough," says Kirk Herath, chief privacy officer of Nationwide Insurance Companies.

  • Business Continuity: Breaking the Silos

    20/05/2011

    One of the unexpected impacts of the global economic crisis is that many organizations have lost their business resiliency, says Lyndon Bird, director of The Business Continuity Institute, headquartered in the U.K.

  • U.S. Initiates Cybersecurity Diplomacy

    20/05/2011

    Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.

  • Device ID & Log Analysis: Complementary Forces

    13/05/2011

    ThreatMetrix's Taussig says strong authentication should be part of every financial institution's layered security approach. And according to expected changes to the Federal Financial Institutions Examination Council's 2005 online authentication guidance, that means proven measures to enhance device identification.

  • Fight Fraud with Device ID

    10/05/2011

    ThreatMetrix's Taussig says device identification must be part of layered security measures. Banking regulators want financial institutions to deploy multiple layers of online security. But what does that expectation mean when it comes to investments in fraud detection?

  • The Case for Cloud Security Standards

    03/05/2011

    "On a global basis, countries are recognizing that they need a uniform commercial code, if you will, for data - a unified approach for managing IT infrastructure services," says Marlin Pohlman of the Cloud Security Alliance.

  • Why CISOs Must Care About Sony Breach

    02/05/2011

    Intel CISO Malcolm Harkins says the Sony PlayStation breach reminds CISOs in all sectors that such incidents can't be avoided, but their risks can be managed.

  • Security Testing Comes of Age

    27/04/2011

    Four years ago, the Council of Registered Ethical Security Testers began as an organization to bring standardization to the penetration testing industry. Today, CREST's scope is expanding across industries and global regions, says president Ian Glover.

  • Governance: It's All About Risk

    21/04/2011

    From mobile devices to social media and cloud computing, IT governance is all about risk management. "You can't de-risk everything, but you can de-risk the majority of circumstances you will see in normal operations," says governance expert Robert Stroud.

  • Data Breaches: Inside the 2011 Verizon Report

    19/04/2011

    The latest Verizon Data Breach Investigations Report is out, and the good news is: The number of compromised records is down. The troubling news is: The number of breaches is up. Bryan Sartin, one of the report authors, explains why.

  • Cloud Computing: A Case Study

    15/04/2011

    Altra Federal Credit Union developed a calculated strategy before moving to the cloud -- advice all financial institutions should follow, says Brian Boettcher, VP of IT, who shares his lessons learned.

  • Phishing Season: How to Avoid Fraud

    12/04/2011

    ID security expert Tim Rohrbaugh on phishing trends in light of Epsilon breach.

  • Reitinger's Quest: Build a Safer Internet

    06/04/2011

    Philip Reitinger, the top cybersecurity official in the Department of Homeland Security, is on a mission to help create a new, secure computing ecosystem on the Internet.

  • Epsilon Breach: Risks and Lessons

    05/04/2011

    Privacy Attorney Lisa Sotto says the Epsilon e-mail breach is a warning about the state of data security employed by some third-party service providers. Strong contracts related to security practices must be the norm, not the exception.

  • Fraud: Emerging Global Threats

    01/04/2011

    EastNets' Paul Buelens says fraud-fighting is an international concern, as old schemes abound and new threats emerge. Fraud risks are some of the most challenging banks have ever faced.

página 133 de 143