Info Risk Today Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Episodios

  • Medical Devices: Negotiating Cybersecurity Contract Terms

    18/04/2022

    New guidance provides healthcare entities and medical device makers a jump-start for negotiating critical cybersecurity issues pertaining to procurement contracts, says Jim Jacobson of device manufacturer Siemens Healthineers, co-chair of an industry group that developed the contract template.

  • Why New Incident Reporting Mandates Are 'Groundbreaking'

    15/04/2022

    New legislation mandating cyber incident reporting for critical infrastructure providers within 72 hours, and the reporting of ransom payments within 24 hours, is "groundbreaking," says former National Security Agency deputy commander Tim Kosiba, CEO of security firm bracket f.

  • Russia-Ukraine Crisis: What's the Threat to Energy Sector?

    14/04/2022

    The latest edition of the ISMG Security Report analyzes the latest cyberthreats to the energy sector as Russia's invasion of Ukraine continues. It also examines best practices for Customer Identity and Access Management and how healthcare institutions can sharpen their defense strategies.

  • Lessons Learned From REvil's Attack on Kaseya

    07/04/2022

    This edition discusses the latest episode of "The Ransomware Files," which covers the REvil ransomware gang's 2021 attack on Kaseya. It also examines how healthcare entities can prepare for potential spillover attacks from the hybrid Russia-Ukraine war and highlights from ISMG's Chicago Summit.

  • The Ransomware Files, Episode 6: Kaseya and REvil

    04/04/2022

    The REvil ransomware gang's attack against the U.S. software company Kaseya in July 2021 is one of the largest and most intriguing ransomware attacks of all time. Here's the inside story of how the attack went down and how organizations recovered.

  • Tapping Public Health Research Tools to Fight Cybercrime

    01/04/2022

    Tools and methodologies that have been helpful for global public health research might also provide better understanding of the root causes of cybercrime and the motivation of cybercriminals, especially as such crime has surged during the COVID-19 pandemic, says Stanley Mierzwa of Kean University.

  • Takeaways From Viasat Outage

    31/03/2022

    This edition analyzes how hackers exploited a misconfigured VPN device, gained access to Viasat's satellite network and caused a massive outage in Europe as Russia's invasion of Ukraine began. It also examines the invasion's impact on financial services and how to modernize security operations.

  • How H-ISAC Is Tracking Russia-Ukraine Cyberthreats

    25/03/2022

    The Health Information Sharing and Analysis Center is closely assessing the Russia-Ukraine war to assist its members, as well as other healthcare sector entities, to prepare for the potential known and yet-unknown cybersecurity threats that could affect them, says H-ISAC President Denise Anderson.

  • Russia's Cyberthreat: White House Issues 'Call to Action'

    24/03/2022

    The latest edition of the ISMG Security Report reviews the latest cyber resilience "call to action" from the White House and also explores authentication provider Okta's failure to inform hundreds of customers in a timely manner that their data could have been stolen by the Lapsus$ group.

  • Medical Devices: Tackling 3rd-Party Component, Software Risk

    22/03/2022

    The integration of third-party components and software is an increasingly critical area of security risk that needs more attention from medical device manufacturers, says Anura Fernando, global head of medical device security at safety certification firm UL.

  • Sanctions Against Russia and Belarus Affect Bug Hunters

    17/03/2022

    This report analyzes how sanctions levied against Russia and Belarus for the invasion of Ukraine are affecting security researchers in those countries who participate in bug bounty programs. It also examines lessons to be learned from data breaches and developments in passwordless authentication.

  • XDR: Four Key Business Benefits

    15/03/2022

    XDR: Because it's new to the market, it comes with a trail of hype. Stephen Davis of Rapid7 cuts through the buzz and discusses four tangible business benefits that are likely from XDR adoption - including high-fidelity detections and accelerated incident response.

  • ISO 27002:2022: Unpacking the InfoSec Management Standard

    11/03/2022

    Gary Hibberd, known as "The Professor of Communicating Cyber" at cybersecurity services provider Cyberfort Group, discusses the biggest changes made since 2013 to the ISO 27001 international standard for an information security management system, which helps organizations secure their data assets.

  • Why Application Security Needs More Attention in Healthcare

    10/03/2022

    Healthcare entities and other organizations frequently skimp on application security, which is a critical area, and this often results in data breaches, security incidents and other mishaps, says former Blue Cross of Idaho CISO Sandy Dunn, who is now CIO and CISO of security firm BreachQuest.

  • Analysis: President Biden's Tech Package Seeks Ukraine Aid

    10/03/2022

    The ISMG Security Report features an analysis of the U.S. government's request for billions of dollars in tech aid to curb the global impact of the Kremlin's campaign in Ukraine. It also examines Biden's cryptocurrency executive order and why breached organizations often don't share full details.

  • Making Sense of Putin's Cyber Restraint

    03/03/2022

    This ISMG Security Report analyzes why Russia has not yet launched full-scale cyberattacks in Ukraine and the West and what we might expect to come. It also describes how organizations can bolster cyber defenses in times of crisis and outlines mistakes organizations make following a cyber incident.

  • Cloud Security: With Challenges Come Solutions

    02/03/2022

    With security tools, it’s essential to provide full coverage and full security visibility for the environment. Avi Shua discusses Orca Security's solution to those challenges and how it identifies risk-sensitive data and speeds up the process.

  • Health Data Privacy and Security Regulations: What's Next?

    28/02/2022

    Gaps in federal regulations concerning the security and privacy of health data falling outside HIPAA's umbrella are getting filled to some extent by various state laws. But that's creating additional challenges, says privacy attorney Kirk Nahra of the law firm WilmerHale.

  • Ukraine Crisis: How the Rules of Cyber Warfare Are Changing

    24/02/2022

    The ISMG Security Report analyzes the latest updates on the Ukraine-Russia crisis and offers cyber resiliency tips for organizations. It also describes how the Conti ransomware group has hired TrickBot malware developers and revisits one of the largest ransomware attacks ever in the U.S.

  • Impact of 'Weaponization of Data' Attacks on Healthcare

    23/02/2022

    The "weaponization of data" in cyberattacks - where cybercriminals not only deploy ransomware but threaten to release stolen data on the internet - has quickly become one of the biggest threats facing many healthcare sector entities, says Adam Meyers of CrowdStrike.

página 19 de 174