Data Breach Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodios

  • RSA's Post-Breach Security

    01/07/2011

    Eddie Schwartz, the new - and first - chief security officer of RSA, says the IT security provider hit by a sophisticated advanced-persistent-threat attack in March is focusing internal security on efforts to reduce the time an intruder can go undetected.

  • FFIEC: Banks Need Layered Security

    28/06/2011

    Fraud expert Ori Eisen says banks spend too much time reacting to ACH fraud, rather than trying to stop it. Now that the FFIEC's new online authentication guidance is official, banks must focus on eliminating outdated solutions and moving toward automated solutions for device identification and log analysis.

  • Executive Decision: What to Encrypt

    27/06/2011

    SafeNet CEO Chris Fedde says top executives, not chief information or chief information security officers, should have final say on what data to encrypt.

  • Business Associate Management Tips

    16/06/2011

    Working with business associates to prevent health information breaches requires far more than writing detailed contract terms on privacy and security, says regulatory expert Christopher Hourihan.

  • PCI Council Addresses Virtualization

    14/06/2011

    The PCI Security Standards Council's new guidance on virtualization in the payments space aims to provide best practices for securing the payments chain's virtual platforms and appliances.

  • RSA Breach: Token Replacement is 'Smart'

    08/06/2011

    IT security expert Marcus Ranum says RSA's offer to replace its SecurID tokens is a deal worth taking.

  • Mobile Devices - Risks & Rewards

    03/06/2011

    What's the top threat on the minds of global IT leaders? Employee-owned mobile devices - or BYOD (bring your own device), as the trend is known. The struggle: Do mobile device benefits outweigh the organizational risks?

  • Author Describes Disclosures Rule

    01/06/2011

    Adam Greene, the primary author of the proposed accounting of disclosures rule mandated under the HITECH Act, describes its major provisions and offers advice on how to prepare.

  • Privacy: "Mobile Technology Concerns Me"

    23/05/2011

    Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies, has been in privacy management for more than a decade, and he has two main concerns about today's enterprise: Mobile technology and cloud computing.

  • Privacy: "You Can't Prepare Enough"

    23/05/2011

    The recent data breaches at Epsilon and Sony should send a chilling message to privacy officers everywhere. "You can't prepare enough," says Kirk Herath, chief privacy officer of Nationwide Insurance Companies.

  • Breach Notification: Be Prepared

    16/05/2011

    Regulatory compliance expert Harry Rhodes says it's essential to have a formal process in place for objectively assessing whether a security incident needs to be reported as a breach.

  • Device ID & Log Analysis: Complementary Forces

    13/05/2011

    ThreatMetrix's Taussig says strong authentication should be part of every financial institution's layered security approach. And according to expected changes to the Federal Financial Institutions Examination Council's 2005 online authentication guidance, that means proven measures to enhance device identification.

  • Fight Fraud with Device ID

    10/05/2011

    ThreatMetrix's Taussig says device identification must be part of layered security measures. Banking regulators want financial institutions to deploy multiple layers of online security. But what does that expectation mean when it comes to investments in fraud detection?

  • Why CISOs Must Care About Sony Breach

    02/05/2011

    Intel CISO Malcolm Harkins says the Sony PlayStation breach reminds CISOs in all sectors that such incidents can't be avoided, but their risks can be managed.

  • Breach Notification Planning Tips

    29/04/2011

    "Breach notification planning is just a fundamental, basic part of risk management in the new millennium," says security expert Bob Chaput.

  • Security Testing Comes of Age

    27/04/2011

    Four years ago, the Council of Registered Ethical Security Testers began as an organization to bring standardization to the penetration testing industry. Today, CREST's scope is expanding across industries and global regions, says president Ian Glover.

  • Physical Security: Timely Tips

    25/04/2011

    Security expert Andrew Weidenhamer offers insights on physical security measures that can help prevent breaches.

  • Hidden Files on iPhone Pose Risk

    23/04/2011

    IT security and privacy lawyer David Navetta says revelations that mobile devices such as the iPhone, iPad and Android maintain hidden files tracking users locations could pose a threat to organizations, regardless of whether the devices are owned by individual employees, the company or government agency for which they work.

  • Governance: It's All About Risk

    21/04/2011

    From mobile devices to social media and cloud computing, IT governance is all about risk management. "You can't de-risk everything, but you can de-risk the majority of circumstances you will see in normal operations," says governance expert Robert Stroud.

  • Data Breaches: Inside the 2011 Verizon Report

    19/04/2011

    The latest Verizon Data Breach Investigations Report is out, and the good news is: The number of compromised records is down. The troubling news is: The number of breaches is up. Bryan Sartin, one of the report authors, explains why.

página 142 de 145