Sinopsis
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
Episodios
-
New Areas Ripe for Exploitation in 2018
09/01/2018Dave DeWalt, former CEO of McAfee and FireEye, identifies the next generation of cybersecurity threats in the latest edition of the ISMG Security Report. Also featured: an analysis of the recent news of the Meltdown and Spectre microprocessor flaws and the POS malware attack on retailer Forever 21.
-
A Conversation With Dave DeWalt: Part 1
09/01/2018It's been nearly one year since Dave DeWalt walked away from FireEye, where he served as CEO. The veteran security leader has a new role and some candid insights on the state of enterprise cybersecurity defenses.
-
Ransomware Attacks Will Be More Devastating and Widespread
05/01/2018An analysis of how unprepared businesses are to fight back against the continued problem of ransomware is featured in the latest edition of the ISMG Security Report. Also featured: outlooks for health data breaches and other cybersecurity trends in 2018.
-
Risk Management: Taking a 'Surgical' Approach
04/01/2018CISOs need to precisely tailor their risk management strategies to protect the specific high-value assets of their organization; a broad-brushed approach will never work, says UK-based Kelly Bissell, managing director and global lead, Accenture Security.
-
Ransomware: The Problem That Won't Go Away
03/01/2018Ransomware has ascended, by some estimates, to a $1 billion industry. Although the FBI advises against paying ransoms, some organizations see it as the quickest way to recovery. Michael Viscuso of Carbon Black says that the larger problem is a failure to defend networks.
-
How Cyberattacks Can Impact Patient Safety
03/01/2018ECRI Institute researcher Juuso Leinonen discusses why ransomware and other cyberattacks can have a big impact on care delivery and patient safety.
-
Ed Amoroso on CISOs' Challenges in 2018
02/01/2018From worsening ransomware attacks to deepened concerns about external digital risk, former AT&T CISO Ed Amoroso says 2018 will be a challenging year, and security teams need to be building out their resiliency plans to prepare for what's ahead.
-
Healthcare: Getting Security Right This Time
02/01/2018As the healthcare sector implements a variety of new applications and increasingly moves to the cloud, it has a fresh opportunity to address security, says Daniel Bowden, CISO at Sentara Healthcare, who discusses best practices.
-
Recalling 9 Years of Cybersecurity News and Analysis
02/01/2018This episode of the ISMG Security Report is devoted to producer/host Eric Chabrow's recollection of the evolution of cybersecurity news and analysis during his nine years at Information Security Media Group. Chabrow is retiring after 45 years in journalism.
-
Integrity of Data: Medical Device Cybersecurity Concerns
29/12/2017Ensuring the integrity of data generated and emitted by medical devices is a growing concern as cyber threats advance, says cybersecurity expert Kevin Fu, who also discusses concerns about consumer-wearable health devices.
-
5 Trends Cybersecurity Practitioners Must Address in 2018
29/12/2017A look ahead at five trends that should have a significant impact on cybersecurity in 2018 is featured in the final ISMG Security Report for 2017. Cybersecurity and privacy thought leader Christopher Pierson forecasts the likely occurrences.
-
Forecast 2018: Nation-States Test Offensive Waters
28/12/2017Following the success of Russian offensive cyber operations, other countries will likely be testing their capabilities, says FireEye's Bryce Boland, who predicts nation-state attacks will become more common in 2018.
-
Why Healthcare Cybersecurity Spending Is Rising
28/12/2017Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.
-
Troy Hunt Discusses His Data Breach Message to Congress
27/12/2017Since the massive data breach of credit bureau Equifax, the U.S. Congress has become more interested in the causes of data breaches. Australian security expert Troy Hunt, who recently traveled to Washington to share his insights with a House committee, discusses what he told lawmakers in this in-depth interview.
-
A CIO Discusses Top 2018 Security Challenges in Healthcare
26/12/2017Curt Kwak, CIO of Proliance Surgeons, a large Washington state surgery practice, discusses top security challenges and priorities for the new year in this in-depth interview.
-
Using Better Information to Secure SWIFT International Transfers
26/12/2017The international payments system is largely based on the three-decades old SWIFT messaging system. But cyberattackers have exploited weak controls employed by banks to make fraudulent transfers. Nick Armstrong of Identitii discusses a path forward for securing payments made with legacy systems.
-
The Man Behind the Cybersecurity 'Moonshot'
26/12/2017Exploring Samuel Visner's vision - patterned after the Manhattan Project and moonshot - for collaborating to create innovative ways to improve cybersecurity leads the latest edition of the ISMG Security Report. Also featured: a report on legislation designed to improve the security of U.S. elections.
-
Former US CISO on Why Awareness Training Is Priority Number 1
22/12/2017In an information technology environment where personnel are taking on increasingly complex responsibilities, the key to ensuring security is still awareness training, says former U.S. CISO Gregory Touhill, who says he'd put his last dollar on it.
-
Is North Korea the True Culprit Behind WannaCry?
22/12/2017An assessment on whether North Korea is behind the WannaCry ransomware attacks leads the latest edition of the ISMG Security Report. Also, the co-author of NIST's revised Trustworthy Email special publication discusses changes in the guidance.
-
Exploring Cyber's Role in the New National Security Strategy
19/12/2017An analysis of the cyber component of the Trump administration's just-published National Security Strategy leads the latest edition of the ISMG Security. Also, DHS and industry establish a cyber coordinating council to help secure the U.S. electoral system.