Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
Privacy by Redesign: A New Concept
28/06/2011Organizations' biggest obstacles to privacy protection are the organizations themselves - specifically, their silos - says Dr. Ann Cavoukian, proponent of the new concept, Privacy by Redesign.
-
Executive Decision: What to Encrypt
27/06/2011SafeNet CEO Chris Fedde says top executives, not chief information or chief information security officers, should have final say on what data to encrypt.
-
Cybersecurity: BITS Supports Obama Bill
27/06/2011Leigh Williams says preventing online data breaches requires cooperation within the online ecosystem from domestic and international organizations. Spearheading and maintaining that cooperation requires federal oversight, he contends.
-
Compelling Compliance Via Regulations
22/06/2011Sen. Robert Menendez says regulators should have the power to compel banks to toughen IT security and offer timely customer notification of a breach. But if they don't, the Banking Committee member says in an interview, they should come to Congress to get that authority.
-
4 R&D Initiatives Focus on Infosec
21/06/2011Northrop Grumman Cybersecurity Research Consortium's Robert Brammer says IT security researchers should think like Wayne Gretzky, the National Hockey League hall of famer: Skate to where the puck will be.
-
VA Addresses Medical Device Security
21/06/2011The latest component of the U.S. Department of Veterans Affairs' ongoing effort to protect medical devices from malware is the creation of a centralized patch management system, says Randy Ledsome, the VA's acting director of field security operations.
-
FDIC on Disaster Recovery
14/06/2011FDIC examiner Donald Saxinger says cloud computing can pose challenges when it comes to business continuity during disasters. Proactive vendor management, he says, is the best way to address potential hiccups before they become big problems.
-
RSA Breach: Token Replacement is 'Smart'
08/06/2011IT security expert Marcus Ranum says RSA's offer to replace its SecurID tokens is a deal worth taking.
-
Mobile Devices - Risks & Rewards
03/06/2011What's the top threat on the minds of global IT leaders? Employee-owned mobile devices - or BYOD (bring your own device), as the trend is known. The struggle: Do mobile device benefits outweigh the organizational risks?
-
New Index Measures Cyberspace Safety
02/06/2011Quantifying the safety or danger of cyberspace is tough. But a highly respected IT security practitioner and an experienced risk management consultant have teamed to develop an index they contend reflects the relative security of cyberspace by aggregating the views of information security industry professionals.
-
Author Describes Disclosures Rule
01/06/2011Adam Greene, the primary author of the proposed accounting of disclosures rule mandated under the HITECH Act, describes its major provisions and offers advice on how to prepare.
-
Public Health Serves as Cybersec Model
31/05/2011The same approach governments and businesses employ to protect individuals from the dangers of secondhand smoke could be applied to safeguard cyberspace, says Scott Charney, Microsoft's vice president of trustworthy computing, engineering excellence and environmental sustainability.
-
Securing the Software: An Industry Perspective
31/05/2011With the 2011 National Defense Authorization Act (NDAA), the DOD is taking a leadership position by defining policy that emphasizes the need to protect and defend the software layer.
-
Why We Need Ethical Hacking
27/05/2011"Ethical hacking" - is the term an oxymoron, or is it one of today's necessities in the fight against cybercrime? Jay Bavisi, president and co-founder of the EC Council, feels strongly about why we need ethical hackers more today than ever before.
-
Pressure is on Privacy Pros
26/05/2011From Epsilon to Sony, recent data breaches and legislative trends tell a dramatic story about the turbulent state of privacy worldwide, according to J. Trevor Hughes, head of the International Association of Privacy Professionals.
-
Privacy: "Mobile Technology Concerns Me"
23/05/2011Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies, has been in privacy management for more than a decade, and he has two main concerns about today's enterprise: Mobile technology and cloud computing.
-
Privacy: "You Can't Prepare Enough"
23/05/2011The recent data breaches at Epsilon and Sony should send a chilling message to privacy officers everywhere. "You can't prepare enough," says Kirk Herath, chief privacy officer of Nationwide Insurance Companies.
-
Business Continuity: Breaking the Silos
20/05/2011One of the unexpected impacts of the global economic crisis is that many organizations have lost their business resiliency, says Lyndon Bird, director of The Business Continuity Institute, headquartered in the U.K.
-
U.S. Initiates Cybersecurity Diplomacy
20/05/2011Chris Painter knows that the United States must determine what are the standard behavioral practices on the Internet before achieving substantial international agreements on cybersecurity.
-
Health Information Exchange Success Strategies
16/05/2011Timathie Leslie and Kristine Martin Anderson of Booz Allen Hamilton share insights on how to ensure the success of health information exchanges.