Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
Authentication: One Solution Won't Fit All
25/10/2011How much crossover should banking institutions rely upon as they evaluate authentication standards for retail vs. commercial accounts? Online security expert Christopher Beier offers insights.
-
Steps to Stop Skimming
24/10/2011Gray Taylor of NACS says retailers spend billions every year to fix a broken payments system. And the primary culprit is the lingering mag-stripe.
-
VA's Plan for Mobile Device Security
20/10/2011Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
-
How Audits Can Increase Infosec Budgets
19/10/2011Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.
-
BlackBerry Episode Strikes at IT Security Tenet
13/10/2011Winn Schwartau says the BlackBerry disruption this past week (see BlackBerry Disruptions: Where to Start?) hit at the heart of one of the fundamentals of IT security: availability.
-
The App Sec Pro and the Shark
13/10/2011When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.
-
Barriers Stunting Cloud Adoption
07/10/2011Alastair MacWillson says the lack of harmonization among state, national and international security laws and regulations has proved challenging for global organizations that want to work in the cloud.
-
Cloud Computing: Compliance Challenges
05/10/2011Too many organizations overlook regulatory compliance issues when working with cloud computing vendors, says security expert Alastair MacWillson.
-
Interview: The New HIPAA Enforcer
03/10/2011Leon Rodriguez, the new director of the Department of Health and Human Services' Office for Civil Rights, describes his HIPAA enforcement agenda.
-
The Changing Threat Landscape
03/10/2011The threat landscape has evolved, and India's banking institutions must grow their information security strategies, says Anand Naik of Symantec, which just released a report that offers a new security agenda to institutions.
-
Business Continuity: What We're Missing
03/10/2011From the earthquake in Japan to Hurricane Irene in the U.S., organizations worldwide have found their business continuity and disaster plans tested. But what lessons must we draw from these incidents?
-
7 Steps to Secure Mobile Devices
30/09/2011Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.
-
Fraud, Security and Priorities for BITS
29/09/2011BITS, the technology policy division of The Financial Services Roundtable, has just named Paul Smocer its new president. What are his strategies for tackling fraud, security and FFIEC compliance?
-
PCI: Merchants Still Fall Short
28/09/2011Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
-
Taking Charge of Physical, IT Security
26/09/2011Merging government agencies responsible for physical and information security into a single operation makes sense, says Michigan's new chief security officer, Dan Lohrmann. After all, he says, the same technologies used to allow entry to a building also can be deployed to permit access to a sensitive database.
-
HIPAA Audit Prep: Five Key Steps
23/09/2011Healthcare organizations need to take five key steps to prepare for the upcoming HIPAA compliance audit program, says compliance specialist Bob Chaput.
-
Mobile: Are Security Risks Overblown?
23/09/2011Mobile apps and smartphone security are increasing global concerns. But Dr. Giles Hogben of ENISA says mobile malware mania is a bit overhyped, since mobile is actually more secure than most other platforms currently on the market.
-
Dodd-Frank: What to Expect in 2012
22/09/2011It's been well over a year since the passage of the Dodd-Frank Wall Street Reform and Consumer Protection Act. How should banking institutions prepare for the hundreds of new regulations expected to come as a result of this landmark legislation?
-
AML: Passing the Audit
21/09/2011Ensuring compliance with BSA and AML mandates is always a priority for federal examiners, and that makes it a priority for banks, says Nancy O'Donnell of Thomaston Savings Bank.
-
Connecting HIEs: Is It Feasible?
16/09/2011Ensuring adequate security will prove vital to efforts to link statewide health information exchanges to each other, says IT consultant Patti Dodgen.