Data Breach Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • Creating Trust: The $9 Million Pilots

    24/09/2012

    Five pilot projects unveiled by the federal government, if successful, should build trust in online commerce, helping to boost the economy, says Jeremy Grant, head of the National Strategy for Trusted Identities in Cyberspace National Program office.

  • Mobile Payment Guidelines Issued

    18/09/2012

    The PCI Security Standards Council has issued new guidelines on mobile payment acceptance security. What are the key recommendations? The council's Bob Russo and Troy Leach discuss the new guidance.

  • Cyber Insurance: Getting Started

    18/09/2012

    Organizations mulling the purchase of cyber insurance should vet their brokers to see if they truly understand policies that provide breach protection, cyber liability lawyer Richard Bortnick says.

  • iPhone 5 and Next-Gen Mobile Security

    14/09/2012

    The iPhone 5 is coming, and so are a slew of new or upgraded smart phones and tablets. How should security leaders prepare for this new wave of mobility? Malcolm Harkins, CISO of Intel, offers advice.

  • Inside a HIPAA Breach Investigation

    12/09/2012

    Thor Ryan, chief security officer at the Alaska Department of Health and Social Services, offers lessons learned as a result of his organization's $1.7 million settlement following a HIPAA compliance investigation triggered by a small breach incident.

  • Visa's New End-to-End Encryption Service

    12/09/2012

    Visa's new end-to-end encryption service aims to eliminate payment card data at the merchant level. Eduardo Perez of Visa's Risk Group discusses the security value of this emerging solution.

  • 10 Tips for Evolved Defense

    12/09/2012

    The information security threat landscape has evolved considerably over the past six years, and it's time that organizations' defenses evolve to match them, says Tom Kellermann of Trend Micro.

  • New Nation-State Attacks Target Banks

    10/09/2012

    Gauss is the latest malware variant likely connected to nation-states. But Roel Schouwenberg of Kaspersky Lab says Gauss' aim at banking credentials is unique. How should organizations respond?

  • Tackling the Big Data Challenge

    05/09/2012

    To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?

  • Insider Fraud: The 'Low, Slow' Approach

    04/09/2012

    Which employees are most apt to commit cyberfraud, and how can organizations detect and prevent their crimes? Researcher Randy Trzeciak shares insights and tips from a new insider threat study.

  • Hurricane Season: Are We Prepared?

    29/08/2012

    As Tropical Storm Isaac strikes, many organizations still sting from the impact of Hurricane Irene and 2011's other natural disasters. What lessons were learned, and how can they be applied now?

  • Mitigating Messaging Risks

    27/08/2012

    E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.

  • Citadel Malware: The Growing Threat

    24/08/2012

    RSA's Etay Maor says Citadel malware and ransomware attacks highlight a growing threat banking institutions and consumers must be prepared to fight. What can institutions do to mitigate risk?

  • Global Hackers Take Aim at U.S. Banks

    16/08/2012

    Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it's not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk?

  • PCI: New Approach to Merchant Security

    15/08/2012

    In the wake of recent merchant breaches, a new PCI training program aims to enhance point-of-sale security. Which payment card risks does this program address? PCI Council chair Bob Russo explains.

  • Information Assurance Job Market Soars

    15/08/2012

    People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand. "We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate about what they do and that are willing to put in the extra hours to keep the citizens of the nation and the state secure," Dan Likarish, assistant professor and program chair of the IT department at CO-based Regis, says. In an exclusive interview about information assurance and why the job market for information assurance professionals has seen astounding growth, Likarish discusses: Opportunities for information assurance professionals; Trends impacting information assurance education; Best options for someone to get into the information assurance profession.

  • Thinking Smartly About Cloud Computing

    09/08/2012

    CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.

  • Power Grid Too Reliable for Own Good?

    06/08/2012

    The United States - and other advanced societies - shouldn't let the reliability of their electric grids lull them into being unprepared for possible massive power outages caused by cyberattacks, cybersecurity expert Harry Raduege says.

  • The Privacy Pro's Challenge

    06/08/2012

    There have never been so many job opportunities for privacy professionals. Nor have there ever been so many challenges. Trevor Hughes of the IAPP discusses what it takes to grow a privacy career.

  • Fraud: Businesses Hold Banks Accountable

    06/08/2012

    Guardian Analytics is out with its third annual Business Banking Trust Study. What are the latest fraud threats, and how do businesses expect their banking institutions to respond to these threats?

página 134 de 145