Sinopsis
Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders
Episodios
-
Cyberattacks Pose Threat to Presidential Election
04/11/2016The latest ISMG Security Report features a special report on potential cyber threats that could damage the integrity of the U.S. presidential election. Also, an analysis of the harm caused by Australia's largest breach of personal information.
-
Healthcare Cybersecurity: The New Strategy
03/11/2016From ransomware to targeted social engineering attacks, the threats to healthcare entities have changed enormously. Isn't it time for healthcare's cybersecurity strategy to change, too? That's the premise of Optum's Aaron Rinehart.
-
Inside the Cerber Ransomware-as-a-Service Operation
03/11/2016The ransomware-as-a-service operation known as Cerber is earning at least $200,000 per month via ransoms paid by victims, says Check Point Software Technologies' Gadi Naveh. In an audio interview, he explains that bitcoins and high levels of automation are key to the operation's success.
-
Echo from the Past: Security Lessons for IT Modernization
01/11/2016The latest ISMG Security Report kicks off with a bit of history: Comparing the similarities between remediating the year 2000 data problem, known as Y2K, that enterprises faced at the end of the 20th century with today's initiatives to drive IT security by modernizing information systems.
-
Breach Response: Taking a 'Disaster Recovery' Approach
31/10/2016Healthcare organizations should take a disaster recovery approach to creating their breach response plans, says Joey Johnson, CISO of Premise Health, in this audio interview.
-
Automotive CyberSec Guidance Assessed; IBM's DDoS Apology
28/10/2016An evaluation of new U.S. government guidance to prevent the hacking of automotive computers and electronics leads the latest ISMG Security Report. Also, IBM takes responsibility for the impact of a DDoS attack and a preview of the ISMG Healthcare Security Summit.
-
Why Is Healthcare Sector So Vulnerable to Cyberattacks?
27/10/2016What critical factors make the healthcare sector vulnerable to cyberattacks? In this audio interview, CISO Dave Summitt of the H. Lee Moffitt Cancer Center and Research Institute offers insights.
-
New HHS CIO on Emerging Threats, Top Priorities
27/10/2016In an in-depth audio interview, Beth Anne Killoran, the new CIO at the Department of Health and Human Services, outlines top cybersecurity priorities, describes how the agency is recruiting new security talent and outlines efforts to bolster the security of Obamacare's HealthCare.gov website and systems.
-
Healthcare Sector Among Most at Risk from Social Engineering
27/10/2016SecurityScorecard is out with its 2016 Healthcare Industry Cybersecurity Report, and it paints a grim picture about how vulnerable healthcare entities are to socially engineered schemes. CEO Aleksandr Yampolskiy shares insight from the study.
-
At the Eye of the DefenseStorm
26/10/2016Sean Feeney, CEO of DefenseStorm, got his education at West Point. How did his military training prepare him for leadership in technology and cybersecurity organizations? Feeney shares leadership insights in this Executive Sessions interview.
-
Cybersecurity: Redefining Visibility and Transparency
26/10/2016For more than a decade, Christy Wyatt was immersed in mobile security - most recently as CEO of Good Technology. Now she has re-emerged as CEO of Dtex Systems. What new challenges does this role pose to the veteran security and technology leader?
-
Thwarting Massive DDoS Attacks: What the Future Holds
25/10/2016Evaluating ways to thwart massive distributed denial-of-service attacks leads the latest edition of the ISMG Security Report. Also, explaining how "conspiracy theories" tied to an historic breach of Yahoo will have an impact on the internet company's future.
-
FFIEC Sheds Light on Use of Cybersecurity Assessment Tool
21/10/2016In an interview, experts from one of the FFIEC's five regulatory agencies explain why the council released a "frequently asked questions" guide to its Cybersecurity Assessment Tool and how they hope banking institutions will put the FAQ to use.
-
Hacking the US Presidential Election: Evaluating the Threats
21/10/2016Experts evaluating the likelihood of a hack to alter votes in this year's American presidential election highlights the latest edition of the ISMG Security Report. Also, U.S. federal regulators propose new cybersecurity rules for big banks.
-
Insider Threat: How to Spot Risky Behavior
21/10/2016Despite high-profile leaks and the attention given to the insider threat, many organizations still fail to even see that they have an insider threat problem. Ajit Sancheti, CEO of Preempt, discusses what's needed to improve insider threat detection.
-
The Route to Trusted IDs
20/10/2016When it comes to describing the top fraud threats to UK financial institutions, it's all about compromised identities and credentials, says John Marsden of Equifax. How can organisations prove their customers are who they say they are?
-
Critics Assail NY Bank Regs; NH-ISAC Tackles Info Sharing
18/10/2016The latest ISMG Security Report analyzes new state bank cybersecurity regulation and getting small healthcare practitioners engaged in cyber threat information sharing. Also, why one nation claims it never experienced a cyberattack.
-
IoT: How Standards Would Help Security
17/10/2016A "bottom-up" approach to IoT security is essential, starting with the hardware as the "root of trust" and then addressing the operating systems and applications, says Wind River's Thilak Ramanna, who calls for the development of standards to ensure security is baked into devices.
-
Obama Assesses Impact of AI on Cybersecurity
14/10/2016Although experts see widespread, practical applications of artificial intelligence as at least a decade off, it's something that's on the mind of President Obama. The commander in chief shares his thoughts on the intersection of artificial intelligence, medical viruses and cybersecurity.
-
Engaging Smaller Healthcare Entities in Threat Info Sharing
13/10/2016The National Health Information Sharing and Analysis Center aims to better engage smaller healthcare organizations in cyber threat information sharing, leveraging funds from two recent federal grants. Denise Anderson, president of NH-ISAC, describes the plans in this in-depth interview.