PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 24 of 70

'Time for US Cyber Command to Take the Gloves Off'

In the wake of news that 12 additional Russians have been indicted for conspiring to interfere with the 2016 presidential election, a key question emerges: What will President Trump say when he meets Monday with Russian President Vladimir Putin? Carbon Black's Tom Kellermann offers analysis.

Jul 13, 2018

Analysis: California's Groundbreaking Privacy Law

The latest edition of the ISMG Security Report features a discussion of California's groundbreaking new privacy law as well as an update on the potential impact of the hacker group responsible for the Ticketmaster breach.

Jul 13, 2018

Bringing Vendor Risk Management to the Midmarket

A new initiative by the Cyber Readiness Institute aims to promote best cybersecurity and vendor risk management practices to smaller enterprises. RiskRecon founder and CEO Kelly White offers his perspective on converting standards to practices.

Jul 9, 2018

Why California's New Privacy Law Is a 'Whole New Ballgame'

While California already had some of the strictest and most varied privacy laws in the country, the new California Consumer Privacy Act of 2018 "is a whole new ballgame," says privacy attorney Kirk Nahra, who explains why.

Jul 9, 2018

Cryptocurrency's Skyrocketing Money Laundering Problem

Leading the latest edition of the ISMG Security Report: CipherTrace CEO Dave Jevans discusses recent research on cryptocurrency money laundering and whether regulation is possible. Plus, California passes a new privacy law.

Jul 6, 2018

Cryptocurrency Laundering's Explosive Growth

Cryptocurrency money laundering is increasing dramatically, being already three times greater than in 2017. And we're only half way through the year, observes Dave Jevans, Founder and CEO of CipherTrace, and chairman of the Anti-Phishing Working Group.

Jul 3, 2018

Big Data: Understanding the Privacy, Security Risks

What are the biggest privacy and security concerns in healthcare when it comes to the use of big data and data analytics tools? Attorneys Elizabeth Mann and Brad Peterson explain what organizations need to know before they dig in.

Jun 29, 2018

Should Healthcare Companies Ever be Data Brokers?

Leading the latest edition of the ISMG Security Report: ISMG's Managing Editor, Security and Technology, Jeremy Kirk, details Australia's HealthEngine caught in a data-sharing fiasco.

Jun 29, 2018

Case Study: Protecting Electronic Medical Records

Virtualization and microsegmentation are helping to better protect electronic medical records and other critical systems at Nebraska Medicine, says the health system's CIO, Brian Lancaster.

Jun 27, 2018

A CIO on Carrying the Burden of Medical Device Cybersecurity

A lack of standards spelling out to manufacturers their responsibilities for addressing the cybersecurity of their medical devices - especially legacy products - has left a big burden on the healthcare entities that use these devices, says Cletis Earle, CIO at Kaleida Health.

Jun 26, 2018

Behavioral Analytics and the Insider Threat

Behavioral analytics have taken the fast lane from emerging tech to mature practice. And Mark McGovern of CA Technologies says the technology is being deployed in innovative ways to help detect insider threats.

Jun 26, 2018

Identity Protection: Overcoming Hurdles

Consumers are more concerned than ever about their identities being compromised, yet they're failing to connect the dots between fear and preventive measures, according to recent research conducted by IDology. John Dancu, the company's CEO, explains the implications for businesses.

Jun 26, 2018

Threat Hunting: How to Evolve Your Incident Response

<p>Tom Field and Ben Smith of RSA Security reflect on key findings from their recent Executive Roundtable on threat hunting,</p>

Jun 25, 2018

Preview: ISMG's Fraud and Breach Prevention Summit in Chicago

Leading the latest edition of the ISMG Security Report: A preview of next week's Fraud and Breach Summit in Chicago, which will feature keynoter Brett Johnson, a former cybercriminal who now advises organizations on fighting crime.

Jun 22, 2018

AI for Security: One Airline's Experience

The South African airline ComAir is using artificial intelligence to help mitigate the threat of cyberattacks, says Ramon Lipparoni, the company's IT integration manager.

Jun 21, 2018

Providing Strongly Authenticated Device Identity

Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Ted Shorter of CSS says security leaders must prepare now to take full advantage of next-gen PKI solutions.

Jun 21, 2018

Is Regulating Cryptocurrency Necessary and Feasible?

Government regulation is key to minimizing the misuse of cryptocurrencies for cybercrime, says Brett Johnson, a former cybercriminal who now consults on crime prevention. But regulating cryptocurrencies is no easy task, he acknowledges. Johnson will keynote ISMG's Fraud and Breach Prevention Summit in Chicago.

Jun 20, 2018

Cybersecurity Insurance: How Underwriting Is Changing

Cybersecurity insurers, faced with growing demand, are looking for new ways to better measure their risks, says Aleksandr Yampolskiy, CEO of SecurityScorecard. So some are moving toward more carefully scrutinizing the cybersecurity postures of their potential clients.

Jun 18, 2018

Analysis: Distraction Tactics Used in Banco de Chile Hack

Leading the latest edition of the ISMG Security Report: An analysis of how distraction tactics were used during a $10 million SWIFT-related hack at Banco de Chile. Also, a wrapup of Infosecurity Europe.

Jun 15, 2018

The People Factor: Fight back Against Phishing

Phishing remains the top attack vector, and an organization's people of course remain the top target. But how can these same people be leveraged as a key component in your anti-phishing defense? Kurt Wescoe of Wombat shares insight.

Jun 14, 2018

Chip and No Signature: What's Behind the Move?

Although all the major credit card brands have dropped the requirement for obtaining signatures to verify point-of-sale transactions made with EMV payment cards, they're not pushing strongly for using PINs instead, leaving that authentication decision to card issuers, says Linda Kirkpatrick of Mastercard.

Jun 11, 2018

Analysis: Swiping Cryptocurrencies Through a Back Door

Leading the latest edition of the ISMG Security Report: Our exclusive report on an Australian criminal investigation into a company that apparently swiped cryptocurrency using a software backdoor. Also, cutting through the hype on artificial intelligence and machine learning.

Jun 8, 2018

NIST Framework as a Foundation

Since its inception the NIST Cybersecurity Framework has been embraced across geographies and sectors. Trend Micro's Ed Cabrera talks about how to maximize the framework as a baseline for improving cybersecurity posture.

Jun 7, 2018

Artificial Intelligence and Machine Learning: Beyond the Hype

Companies offering cybersecurity products are using the terms "artificial intelligence" and "machine learning" in many different ways. But the real meanings of the terms are far more nuanced than marketing hyperbole would lead us to believe, says Grant Wernick of Insight Engines.

Jun 7, 2018

Leveraging Machine Learning to Battle Emerging Threats

Machine learning is supporting new ways of battling evolving cyber threats, such as by analyzing behaviors, says Darshan Appayanna, CISO at Happiest Minds, an IT services firm, who will be a featured speaker at ISMG's upcoming Fraud and Breach Prevention Summit in Bengaluru.

Jun 5, 2018

Analysis: Data Breach Litigation Trends

Lawsuits filed in the wake of data breaches are evolving, says attorney John Yanchunis, who represents plaintiffs in many of these class action cases.

Jun 5, 2018

Not GDPR Compliant Yet? Don't Panic

Leading the latest edition of the ISMG Security Report: Cybersecurity expert Brian Honan provides insights on why organizations that are not yet compliant with GDPR need to focus on several key steps. Also: An assessment of the progress women are making in building careers in information security.

Jun 1, 2018

Women in Security: Assessing the Progress

Cybersecurity challenges and solutions have evolved greatly since 2002. And so has the Executive Women's Forum, which was founded that year to advance female leaders in the profession. Founder Joyce Brocaglia reflects on the forum's accomplishments and challenges.

May 30, 2018

GDPR Enforcement Deadline: If You Blew It, What's Next?

What happens if organizations that must comply with GDPR have yet to achieve compliance, despite having had two years to do so before enforcement began? Don't panic, says cybersecurity expert Brian Honan, but do be pursuing a data privacy transparency and accountability action plan.

May 29, 2018

Do US Banks Lack the Appetite to Become Identity Custodians?

Could U.S. banks emerge as identity platform providers? Ron Shevlin of Cornerstone Advisors explains in an interview why he believes that's highly unlikely.

May 25, 2018

A New Look at Email Security

File-less malware is a huge security challenge for organizations today, and traditional email security controls aren't sufficient to meet the challenge. Burke Long of Lastline offers insight on a new way to approach email security.

May 25, 2018

Medical Device Cybersecurity: A Progress Report

How much progress has the healthcare sector made in the last 10 years addressing medical device cybersecurity issues? And what action is still needed? Ben Ransford, a principal researcher in a groundbreaking 2008 report about cardiac device cyber risks, offers his assessment.

May 25, 2018

GDPR Enforcement Begins: Impact on Healthcare, Banking

Leading the latest edition of the ISMG Security Report: Reports on the impact enforcement of the EU's General Data Protection Regulation, which began Friday, will have on the healthcare and banking sectors. Plus an assessment of GDPR compliance issues in Australia, which offer lessons to others worldwide.

May 25, 2018

Leveraging SaaS to Fill the Skills Gap

Security leaders have been addressing the global skills gap for better than a decade now, with little to show for it. But Joe Cosmano of iboss recommends a new approach, leveraging software-as-a-service to make up for the staffing shortfall.

May 25, 2018

The Future of Digital Identity

The whole way we look at identity across the extended enterprise is in the midst of change, says Naresh Persaud of CA Technologies. What is dynamic authentication, and how does it herald the future of digital identity?

May 24, 2018

Florida's Approach to Training Cybersecurity Specialists

Universities throughout Florida are adding more cybersecurity courses in an effort to better train the next generation of practitioners, says Ernie Ferraresso of the Florida Center for Cybersecurity, which recently provided a second round of funding for the effort.

May 23, 2018

GDPR: Is Australia Ready?

With enforcement of the EU's GDPR set to begin on May 25, Australian organizations vary in readiness. Steve Ingram of PwC says it's not too late for companies to prepare for GDPR, but it will be too late to ask regulators for forgiveness if something goes wrong.

May 22, 2018

GDPR Compliance for US Healthcare: What You Need to Know

Strict HIPAA compliance is a great preparation for compliance with the European Union's General Data Protection Regulation, which will be enforced starting May 25, according to attorneys Robert Stankey and Adam Greene, who provide compliance insights in an in-depth interview.

May 21, 2018

GDPR: The Looming Impact on US Banks

The EU's General Data Protection Regulation, which will be enforced beginning May 25, has significant implications for how financial institutions worldwide handle customer data, says Brett King, CEO of Moven, an all-digital bank, who sizes up the challenges.

May 21, 2018

Nonstop Breaches Fuel Spike in Synthetic Identity Fraud

Leading the latest edition of the ISMG Security Report: Years of massive data breaches have fueled an increase in synthetic identity fraud, in which fraudsters combine real and bogus details to create more effective fake identities. Plus, has "The Dark Overlord" hacking group finally met its match?

May 18, 2018

The Role of Deception Technology in M&A

A security breach is always a sensitive topic - but especially so during a merger or acquisition. Ofer Israeli, CEO of Illusive Networks, discusses how deception technology can help prevent disruption by a cyberattack during M&A activity.

May 18, 2018

As Payments Speed Up, How Can Fraud Be Minimized?

Knowing as many details as possible about the customer, the payment and the recipient is a critical component of stopping fraud as payments become faster, says anti-fraud specialist David Barnhardt.

May 17, 2018

The Hidden Power of Threat Intelligence

Organizations today have access to countless sources of threat intelligence. And yet many still struggle to operationalize this intel effectively. Russ Spitler of AlienVault discusses how to improve detection and response with dynamic security incidents.

May 17, 2018

Sizing Up the Impact of Synthetic Identity Fraud

Credit card losses due to synthetic identity fraud exceeded $800 million in the U.S. last year, says Julie Conroy of Aite Group, who analyzes the evolving threat and offers mitigation insights.

May 14, 2018

'All of Us' Research Project: The Privacy Risks

Although the National Institutes of Health is implementing strong privacy measures as it begins its effort to enroll 1 million volunteers to contribute data to its "All of Us" precision medicine research project, there are still risks involved, says privacy attorney Kirk Nahra.

May 11, 2018

Real-Time Payment Networks Face Off Against Fraudsters

With the rise of P2P payment networks and the U.S. working toward a real-time national payments network, the push is on to battle fraudsters. Also, attackers are hacking legitimate websites to more stealthily distribute "Gandcrab" crypto-locking ransomware.

May 11, 2018

A New Way to Handle Cyber Claims

Eduard Goodman, global privacy officer of CyberScout, doesn't like the disorganized way most cyber incidents are handled now. Instead, he would like to see a more project management approach. Here are the benefits he foresees.

May 11, 2018

Securing OT Systems

If operational technology systems need to get connected to IT systems, it's essential to have tight controls on the network, says Lam Kwok Yan, professor of computer science and engineering at Nanyang Technological University in Singapore.

May 10, 2018

Texas Hospital CEOs: Cybersecurity Is No. 1 Worry

At a recent meeting of hospital CEOs in Texas, the leaders said the issue that keeps them awake at night is cybersecurity, says Fernando Martinez of the Texas Hospital Association, who explains why.

May 7, 2018

What GDPR Means for Cybersecurity

We all know about May 25 and the enforcement deadline for Europe's General Data Protection Regulation. But what impact will GDPR have on cybersecurity programs? Danny Rogers of Terbium Labs weighs in on the topic.

May 4, 2018