Sinopsis
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
How Ohio Decided on NIST Framework
16/03/2011Cobit, ITIL, ISO, NIST, an alphabet soup of standards governments often rely on to assure the safety of their IT systems. Ohio government IT leaders saw standardizing on one framework to be a more efficient way to help safeguard IT.
-
Multifactor Authentication Needs Focus
16/03/2011Current solutions are good at authenticating users, but not the integrity of the transactions, says Rik Ferguson of Trend Micro. "We're not authenticating the right things."
-
Australia: Cyber Crime Fight
16/03/2011Australia's government agencies can learn a lot from the nation's banks, when it comes to risk management and protecting privacy, says Graham Ingram, General Manager of the Australian Computer Emergency Response Team. "There are too many people in government organisations who are in denial [of risks]," he says.
-
Fighting Cross-Channel Fraud
15/03/2011Zayd Sukhun says global political unrest has upped regulators' expectations for banks to streamline fraud-detection tools and techniques.
-
OCR's McAndrew on Enforcing HIPAA
14/03/2011Susan McAndrew of the HHS Office for Civil Rights discusses recent high-profile HIPAA cases, upcoming state attorneys general training and the pending HIPAA audit program.
-
How Gov't Will Fix WikiLeaks Problem
12/03/2011This week's report focuses on one story: Senate WikiLeaks hearing, in which administration officials explained how the WikiLeaks episode occurred and what's being done to prevent such a breach from occurring again.
-
Japan Disaster: Business Continuity
11/03/2011In the initial wake of Japan's devastating earthquake and subsequent tsunami, business continuity plans have been tested, and organizations now are dealing with severe aftershocks and a growing national crisis, says Alan Berman, executive director of DRI International.
-
State Infosec Unit Shifts Focus to Risk
10/03/2011Iowa CISO Jeff Franklin explains how collecting real-time information helps the state information security office transition its focus from technology to risk management.
-
The 3 Pillars of Trust
09/03/2011The Internet is inherently insecure, and the only way to ensure today's evolving information systems is to build them upon three pillars of trust.
-
Breach Notification and National Security
08/03/2011Today's technology is not adequately used, says attorney Lucy Thomson.
-
3 Infosec Challenges States Face
07/03/2011For former New York State CISO Will Pelgrin, mobile devices, insiders and old infrastructure represent the major challenges local and state governments face in 2011 in securing information technology.
-
Roadmap to EMV
07/03/2011The Smart Card Alliance's Vanderhoof says U.S. card issuers will likely rely on contactless mag-stripe technology to bridge a payments migration to EMV.
-
Will Pelgrin: The CISO-Plus
06/03/2011The CISO's CISO still sways government infosec from the outside
-
Patrick Bedwell
05/03/2011Patrick discusses how to consolidate network traffic monitoring into a single appliance and management console, along with web application security and PCI compliance.
-
GovInfoSecurity.com
Week In Review
for Friday, March 4, 201104/03/2011This week's top news and views: New NIST guidance focuses on risk management; DHS seeks hundreds of millions of dollars for cybersecurity projects; and former New York State CISO Will Pelgrin on federal-state-local IT collaboration.
-
GovInfoSecurity.com
Month in Review
for February 201125/02/2011Government IT security practitioners address the cloud challenge.
-
Diversity of Devices, Not the Number of Them, Presents Infosec Challenges
24/02/2011Cisco's Don Proctor longs for days of Microsoft patches.
-
NIST Scientists on Firewalls Circa 2011
22/02/2011Functionality hasn't changed much in two decades, but capabilities have expanded immensely.
-
Preventing Online Fraud
21/02/2011Tom Oscherwitz says consumers put themselves at risk by giving out too much personal information that is often used for online banking log-in credentials.
-
GovInfoSecurity.com
Week In Review
for Feb. 18, 201118/02/2011This week's top news and views: Government infosec pros question the federal government's security resolve, according to our new survey; Steve Jobs is Apple of Pentagon's eye; and a Department of Cyber -- a fleeting idea?