Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Ron Ross on New Risk Assessment Guide
27/09/2012NIST's Ron Ross, one of the world's top information risk thought leaders, says new guidance he co-wrote doesn't dictate how organizations must approach risk assessment, but gives enterprises options on how to conduct risk appraisals.
-
Creating Trust: The $9 Million Pilots
24/09/2012Five pilot projects unveiled by the federal government, if successful, should build trust in online commerce, helping to boost the economy, says Jeremy Grant, head of the National Strategy for Trusted Identities in Cyberspace National Program office.
-
Infosec's Cheerleader-In-Chief: Governor
20/09/2012When it comes to cybersecurity in Delaware, Gov. Jack Markell sees his job as being the state's head cheerleader. In an interview, Markell discusses his role and the state's cybersecurity accomplishments.
-
Mobile Payment Guidelines Issued
18/09/2012The PCI Security Standards Council has issued new guidelines on mobile payment acceptance security. What are the key recommendations? The council's Bob Russo and Troy Leach discuss the new guidance.
-
Cyber Insurance: Getting Started
18/09/2012Organizations mulling the purchase of cyber insurance should vet their brokers to see if they truly understand policies that provide breach protection, cyber liability lawyer Richard Bortnick says.
-
iPhone 5 and Next-Gen Mobile Security
14/09/2012The iPhone 5 is coming, and so are a slew of new or upgraded smart phones and tablets. How should security leaders prepare for this new wave of mobility? Malcolm Harkins, CISO of Intel, offers advice.
-
Mobile Policy: One Size Doesn't Fit All
14/09/2012In creating its mobile-device policy, the city of Honolulu allows its agency heads to tailor policy to meet their individual needs, Honolulu Chief Information Officer Gordon Bruce says.
-
A State CSO Reflects on a Breach
13/09/2012Thor Ryan, chief security officer at the Alaska Department of Health and Social Services, offers lessons learned as a result of his organization's $1.7 million settlement following a HIPAA compliance investigation triggered by a small breach incident.
-
Visa's New End-to-End Encryption Service
12/09/2012Visa's new end-to-end encryption service aims to eliminate payment card data at the merchant level. Eduardo Perez of Visa's Risk Group discusses the security value of this emerging solution.
-
10 Tips for Evolved Defense
12/09/2012The information security threat landscape has evolved considerably over the past six years, and it's time that organizations' defenses evolve to match them, says Tom Kellermann of Trend Micro.
-
New Perspective on Regulation
11/09/2012William Henley of the FDIC has just returned to banking regulation after a two-year stint working in the private sector. How did his business experience influence his approach to enforcing compliance?
-
New Nation-State Attacks Target Banks
10/09/2012Gauss is the latest malware variant likely connected to nation-states. But Roel Schouwenberg of Kaspersky Lab says Gauss' aim at banking credentials is unique. How should organizations respond?
-
Continuous Monitoring: Overcome the Challenges
10/09/2012Too many organizations misunderstand exactly what continuous monitoring is, says Centrify's Matt Hur, who offers insights on how to deploy continuous monitoring solutions for the best results.
-
Tackling the Big Data Challenge
05/09/2012To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
-
Insider Fraud: The 'Low, Slow' Approach
04/09/2012Which employees are most apt to commit cyberfraud, and how can organizations detect and prevent their crimes? Researcher Randy Trzeciak shares insights and tips from a new insider threat study.
-
Hurricane Season: Are We Prepared?
29/08/2012As Tropical Storm Isaac strikes, many organizations still sting from the impact of Hurricane Irene and 2011's other natural disasters. What lessons were learned, and how can they be applied now?
-
Rethinking Security Best Practices
28/08/2012Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.
-
Apple-Samsung Case: Lessons for CISOs
28/08/2012One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.
-
Mitigating Messaging Risks
27/08/2012E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.
-
How Cloud Can Facilitate Risk Management
24/08/2012Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.