Government Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • Inside a Fraud Investigation

    03/08/2011

    No two fraud incidents may be exactly alike, but a fraud investigator's approach can still be very consistent and precise, says Jean-Francois Legault, a fraud investigations specialist with Deloitte and Touche.

  • Cloud Computing: Critical Issues

    02/08/2011

    Before entering a contract with a cloud computing company, organizations should consider three critical issues, says Feisal Nanji, executive director at the security consulting firm Techumen.

  • The Value of Penetration Testing

    01/08/2011

    Scott Laliberte, managing director of Protiviti, wrote the book on penetration testing, and he has strong feelings about what organizations are doing right and wrong when assessing their information security risks today.

  • Easing Burden to Comply with IRS Rules

    28/07/2011

    Oregon Chief Information Security Officer Theresa Masse finds herself at the center of a state initiative to simplify compliance by agencies with Internal Revenue Service rules to safeguard taxpayer data.

  • The ROI of Trustable Identities

    27/07/2011

    There are significant hard and soft benefits for government agencies to gain by investing now in solutions built around Trustable Identities, says Mike Ozburn, principal of Booz Allen Hamilton.

  • New Normal: Under Attack

    26/07/2011

    It's the new conventional wisdom: all computer networks will be attacked. For Phyllis Schneck, that means organizations must be resilient, keeping computers functioning even when they're under assault.

  • Forensics in the Cloud

    26/07/2011

    Performing digital forensics in the cloud isn't necessarily a new discipline, says Rob Lee of SANS Institute. But the task definitely requires a whole new mindset and some new skills from investigators.

  • The Ethics of Information Security

    25/07/2011

    It is no longer enough for information security professionals to secure critical information. They also need to be asking about the legitimacy of where this information comes from, says John Colley, managing director of (ISC)2 in EMEA.

  • Cybersecurity: The New Frontier

    25/07/2011

    Dickie George of the National Security Agency has one word to describe the state of information security education today: "Spotty." And this state must improve if we hope to fill all the growing demand for security pros.

  • Ron Ross on NIST's New Privacy Controls

    21/07/2011

    NIST's Ron Ross points out that its seminal security control guidance, Special Publication 800-53, contains only one privacy control, requiring agencies to conduct a privacy impact assessment. That will change by year's end.

  • Elements of a Social Media Policy

    19/07/2011

    You know your organization's social media policy is a good one when it starts sounding less like a checklist and more like common sense, says Sherrie Madia, social media expert and author.

  • Bringing Risk Assessment In-House

    18/07/2011

    Since becoming Vermont's first CISO three years ago, Kris Rowley's been on a quest to create an IT security culture in state government. Rowley's latest initiative, bringing risk assessment in-house, is helping build that culture.

  • RSA's CSO Tells Why He Took the Job

    12/07/2011

    Eddie Schwartz didn't shy away from the offer to become RSA's first chief security officer after the security firm experienced a sophisticated advanced-persistent-threat breach. Instead, Schwartz embraced the hack as the reason to take the job. (See RSA to Get Its First Chief Security Officer.)

  • New Roles in Risk Management

    11/07/2011

    Recent high-profile data breaches and heightened threats add up to one thing: a bright future for information security professionals who want to start or re-start a career in risk management.

  • Shutdown Takes Toll on Infosec Pros

    08/07/2011

    Minnesota has seen an increase in malicious traffic since the state government shut down a week ago, but state CISO Chris Buse says sophisticated intrusion-detection systems and an alert skeleton staff have prevented any harm from being done, at least to the part of state government IT controlled by the Office of Enterprise Technology.

  • Biometrics Seen as SecurID Alternative

    07/07/2011

    RSA customers who feel victimized by last March's breach of the security vendor's computers have viable options that include continued use of the SecurID authentication tokens, those offered by competitors, or something entirely different: biometrics.

  • Fraud Fighters Wanted

    05/07/2011

    Today's top fraud threats recognize no global boundaries, says James Ratley, head of the Association of Certified Fraud Examiners. And they require a stronger global workforce than ever before.

  • RSA's Post-Breach Security

    01/07/2011

    Eddie Schwartz, the new - and first - chief security officer of RSA, says the IT security provider hit by a sophisticated advanced-persistent-threat attack in March is focusing internal security on efforts to reduce the time an intruder can go undetected.

  • Business Associates: Minimizing Risk

    29/06/2011

    A key factor in minimizing the risk of a breach when working with business associates is to provide these partners with the minimum amount of information they need to perform their services, says security expert Brian Lapidus.

  • Gov't Shutdown Poses Unseen Challenges

    28/06/2011

    Minnesota faces a government shutdown Friday, and state CISO Chris Buse confronts unexpected barriers in preparing for it. No one yet knows what services the IT security organization must support once the midnight deadline passes.

página 140 de 163