Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
3 Lines of Cyberdefense
22/08/2012By combining responsible management, risk management and compliance functions and internal audits, organizations will go far in securing their data and systems, says PricewaterhouseCoopers Partner Carolyn Holcomb.
-
Wisconsin HIE Favors Hybrid Data Model
20/08/2012The Wisconsin Health Information Exchange uses a hybrid data model approach that lets members retain control over information, but makes security less complicated, says CEO Kim Pemble.
-
ONC Plans Mobile Security Guidance
17/08/2012The Office of the National Coordinator for Health IT is studying use of mobile devices in small healthcare environments. The goal: new mobile security guidance that will be released in 2013.
-
Global Hackers Take Aim at U.S. Banks
16/08/2012Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it's not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk?
-
PCI: New Approach to Merchant Security
15/08/2012In the wake of recent merchant breaches, a new PCI training program aims to enhance point-of-sale security. Which payment card risks does this program address? PCI Council chair Bob Russo explains.
-
Information Assurance Job Market Soars
15/08/2012People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand. "We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate about what they do and that are willing to put in the extra hours to keep the citizens of the nation and the state secure," Dan Likarish, assistant professor and program chair of the IT department at CO-based Regis, says. In an exclusive interview about information assurance and why the job market for information assurance professionals has seen astounding growth, Likarish discusses: Opportunities for information assurance professionals; Trends impacting information assurance education; Best options for someone to get into the information assurance profession.
-
How to Talk Security to the Board of Directors
14/08/2012Increasingly, security and risk issues have the attention of boards of directors. What are the keys to discussing these topics with the board? John South, CSO of Heartland Payment Systems, shares tips.
-
FTC's Google Fine: The Privacy Message
10/08/2012Google's $22.5 million settlement with the Federal Trade Commission is the largest fine ever imposed by the FTC. But the case sends a bigger message about privacy, says attorney Francoise Gilbert.
-
One U.S. Attorney's War on Cyberfraud
10/08/2012Jenny Durkan, the U.S. Attorney for the Western District of Washington, is taking a lead role in combatting cyberfraud. Under her leadership, federal prosecutors have upped their efforts to combat ever-increasing threats posed by digital crimes, including card fraud.
-
Thinking Smartly About Cloud Computing
09/08/2012CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
-
Social Media: Pros & Cons
06/08/2012The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.
-
Power Grid Too Reliable for Own Good?
06/08/2012The United States - and other advanced societies - shouldn't let the reliability of their electric grids lull them into being unprepared for possible massive power outages caused by cyberattacks, cybersecurity expert Harry Raduege says.
-
Symantec's CISO on Security Leadership
03/08/2012Her first nine months on the job included a data breach and a CEO shakeup. Hear how Symantec CISO Patricia Titus has adapted to business change and re-focused the company's security team.
-
Cybersecurity Act Fails; What Next?
03/08/2012Now that Congress has failed to enact significant cybersecurity legislation, President Obama needs to find new ways to secure key government and business IT systems, says Melissa Hathaway, a former top White House cybersecurity adviser.
-
Privacy: 'Do Not Track' Debate
31/07/2012Microsoft says its next version of the Internet Explorer web browser will feature "do not track" as a default user setting. What are the online privacy implications? Trevor Hughes of the IAPP weighs in.
-
Eddie Schwartz on His Year as RSA's CISO
23/07/2012The truth about preventing a breach, like the advanced-persistent-threat attack RSA experienced in 2011, is that an organization can't defend critical systems alone, says RSA CISO Eddie Schwartz.
-
Phishing Update: 'No Brand is Safe'
23/07/2012The number of phishing sites is at an all-time high. And so are the targeted brands. The message, says Peter Cassidy of the Anti-Phishing Working Group: "No brand is safe."
-
COBIT 5 for Security: What You Need to Know
23/07/2012ISACA just issued COBIT 5 for Information Security, a business-centric approach to governance and IT management. ISACA's Robert Stroud explains what COBIT 5 means to your organization.
-
When Breach Planning Fails
20/07/2012When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.
-
CISO Success Requires Collaboration
19/07/2012RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.