Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Rivals Avoid Taking Stand on Backdoor

    19/01/2016

    If presidential candidates don't have the technical know-how to take an educated stand on whether tech companies should provide the government with a backdoor to encryption, how can we judge if they'll make the right choice if they get elected?

  • Special Report: Identifying Malicious Insiders

    18/01/2016

    In this in-depth audio report, a panel of experts addresses the challenge of detecting insider threats and outlines the latest approaches, including "sentiment and linguistic" systems.

  • Where Will We Find Next Generation of Security Leaders?

    12/01/2016

    As Art Gilliland, CEO of Skyport Systems, assesses cybersecurity in 2016, he sees distinct strengths, weakness and opportunities for the next generation of leaders. The question is: Where will we find these leaders?

  • Mitigating the Accidental Insider Threat

    12/01/2016

    When it comes to threat detection, spotting malicious insiders is one thing. They often leave a trail. But how do you protect against the accidental insider threat? Mike Siegel, VP of Products at Forcepoint, shares strategy and solutions.

  • New Global Alliance Seeks Measurable InfoSec Solutions

    11/01/2016

    The primary mission of the new Global Cyber Alliance is to identify measurable ways to mitigate cyberthreats facing the public and private sectors, says Phil Reitlinger, a former DHS official and Sony CISO, who heads the new group.

  • Why Traditional Security Tools Can't Cut it

    08/01/2016

    Today's enterprise infrastructure is full of blind spots that can hide malicious threats, and traditional security tools struggle to scale up to meet increased demands. How must security leaders respond? Amrit Williams of CloudPassage shares insight.

  • Essential Traits of Successful CISOs

    06/01/2016

    What's it take to be a successful CISO? Mark Dill, former longtime information security director at the Cleveland Clinic, says it comes down to being patient, persistent and perceived as practical. He offers detailed career advice in this interview.

  • Gartner's Litan: FFIEC Assessment Tool Falls Short

    06/01/2016

    The FFIEC's Cybersecurity Assessment Tool is already being integrated into regulators' cybersecurity examinations, says Gartner analyst Avivah Litan. But the tool has so far led to more confusion than clarity, she says, and must be enhanced in 2016.

  • 2016 Breach Prevention: Time to Purge Data

    05/01/2016

    Expect rebooted European Union data privacy rules to drive organizations worldwide to begin minimizing the amount of information they collect and store on individuals in 2016, both to protect privacy as well as minimize the impact of data breaches.

  • Cybersecurity as a Competitive Advantage

    04/01/2016

    Boards of directors that figure out how to leverage cybersecurity as a strategic asset will give their organizations a strong competitive advantage, says Lance Hayden of Berkeley Research Group. "Security needs to be part of what the organization uses to competitively differentiate itself."

  • 2016: Year of Cyberthreat Info Sharing

    04/01/2016

    In the coming months, the Department of Homeland Security will implement a new cyberthreat information sharing law designed to help prevent breaches. But will the Cybersecurity Act of 2015 really make a difference?

  • Solve Old Security Problems First

    30/12/2015

    Improving breach detection and defenses involves much more than buying the latest technology, warns security expert Haroon Meer. "We keep moving on as we try to solve new, shiny problems, which we then half solve, but we still haven't completely solved problems that we knew about 20 years ago."

  • What's Next for Cybersecurity Framework?

    29/12/2015

    NIST is soliciting comments from stakeholders on whether its cybersecurity framework is helping organizations secure their information systems. Those observations could result in an update of the framework, NIST's Adam Sedgewick explains in this interview.

  • Mitigating Mobile Risks in Healthcare

    28/12/2015

    Security expert Chris Bowen explains why mitigating emerging threats to mobile devices and applications should be a top health data breach prevention priority for 2016.

  • The Practical Application of User Behavior Analytics

    24/12/2015

    Understanding the promise of user behavior analytics is one thing. Deploying them to detect and respond to threats is quite another. Bert Rankin of Fortscale offers tips on practical application of the latest UBA solutions.

  • The Evolution of User Behavior Analytics

    23/12/2015

    Too many recent high-profile breaches resulted from attackers using legitimate user credentials to infiltrate critical systems. Fortscale's Bert Rankin tells how user behavior analytics help organizations catch attackers after the breach.

  • Addressing the InfoSec Educator Shortage

    23/12/2015

    To help train more cybersecurity professionals, academia must work with business and government to find enough qualified trainers and educators, says George Washington University Professor Diana Burley.

  • 2016: The Year Hackers Exploit the Cloud?

    23/12/2015

    The rising profile and increasingly complex nature of cyberattacks was a major development in 2015. What are the key threats for security practitioners to be wary of in the year ahead? FireEye CTO APAC Bryce Boland shares insights.

  • Exploring the Ethics Behind DNC Breach

    22/12/2015

    Giving the fired Sanders aide the benefit of the doubt that he wasn't trying to steal Clinton campaign secrets to benefit the Vermont senator's quest for the White House, was Josh Uretsky justified in accessing the rival's data to conduct his own investigation?

  • 'Everyone is a Security Expert'

    21/12/2015

    What's it like to be a CIO or CISO at an enterprise where everyone is a security expert? What are some of the unique challenges and advantages? Blue Coat Systems CIO Chris Birrell shares his experiences in this role.

página 90 de 143