Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • The Social Media Challenge

    06/01/2011

    To Brian Lapidus, COO of Kroll's Fraud Solutions group, the main threat to data security can be summed up in two words: social networking.

  • R&D Focuses on Finding Data in Cloud

    03/01/2011

    Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.

  • 8 IT Security Threats for 2011

    28/12/2010

    Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."

  • The Age of 'Involuntary Transparency'

    27/12/2010

    "The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.

  • 4 Components of the Insider Threat

    22/12/2010

    Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.

  • Global Security Challenges for 2011

    22/12/2010

    2011 will be the year of more -- more sophisticated malware, more WikiLeaks-style breaches and more regulatory compliance headaches.

  • Managing Risk: Why It's a Hot Topic

    14/12/2010

    NIST's Ron Ross Tackles the Risk Management Framework

  • Marcus Ranum on 2011 Security Outlook

    14/12/2010

    If Marcus Ranum were your CISO, this would be his 2011 resolution: To launch a "War Games" style exercise.

  • WikiLeaks Backlash: 'We Are Going to Take You Down'

    10/12/2010

    Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."

  • Internal Audit: The 2011 Agenda

    06/12/2010

    No one knows risk better than the internal auditor, and so no individual has a better opportunity to add risk management value to organizations, says Richard Chambers, president of the Institute of Internal Auditors.

  • Lessons Not Learned from WikiLeaks

    06/12/2010

    "Until they personally suffer pain, they don't think it is something that can happen to them," says Eric Cole, an insider threat expert and SANS Institute faculty fellow.

  • Who Will Rule Cyberspace in 2020?

    05/12/2010

    Will the U.S. be a leader or a follower in cyberspace in the year 2020?

  • WikiLeaks: "It's a Major Wake-up Call"

    01/12/2010

    The recent WikiLeaks release of thousands of sensitive government documents puts security leaders on notice: The breach threat is real, and no organization is immune.

  • 2011 Outlook: 'Complexity is the Biggest Problem'

    29/11/2010

    The complexity of global compliance may be the biggest task IT security organizations face of 2011, IBM's Kristin Lovejoy says.

  • Security Skills: Demand Has Never Been Greater

    26/11/2010

    The information security profession is seeing a transition, as organizations focus more on filling roles related to business and information risk management.

  • GRC Agenda for 2011

    23/11/2010

    SAP's Norman Marks: Governance, risk, compliance can improve business.

  • ISACA on Holiday Shopping Threats

    22/11/2010

    ISACA's Mark Lobel says risky online behavior is the holiday shopper's -- as well as the merchant's and financial institution's -- biggest threat.

  • Understanding New IT Security Metrics

    19/11/2010

    "The purpose and needs for these is to establish those same business tools for information security professionals to enable them to make better business decisions," Center for Internet Security Chief Security Officer Steven Piliero says.

  • Information Assurance Education 2011

    11/11/2010

    Could schools, businesses and government finally be coming together?

  • ID Theft Council to Focus on National Awareness

    08/11/2010

    Neal O'Farrell: The newly created ID Theft Council aims to provide local support for victims.

página 135 de 143