PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 41 of 70

Why Banks Need to Prepare for More Chase-Like Breaches

Banks need to prepare for many more massive cyberattacks along the lines of the sophisticated campaign that hit JPMorgan Chase and other financial services organizations, says Javelin Strategy & Research's Al Pascual, who offers risk management insights.

Nov 11, 2015

PHI Breaches: Not Just Healthcare Sector's Problem

An upcoming Verizon report on health data breaches illustrates that the data is at risk at organizations outside of the healthcare sector, and not just at hospitals, clinics, insurers and their business associates, says security expert Suzanne Widup of Verizon Enterprise Solutions.

Nov 11, 2015

Analyzing CISA's Healthcare Sector Provisions

The Cybersecurity Information Sharing Act of 2015, which the Senate recently passed, contains detailed provisions designed to help the healthcare sector fight cyberattacks, explains Samantha Burch of HIMSS, who offers an analysis.

Nov 5, 2015

How to Succeed at Information Security

Developing a successful information security career requires excellent technical acumen as well as the ability to understand the impact that security policies have on people, says Gurdeep Kaur, a chief security architect at AIG.

Nov 4, 2015

Why Tinba Trojan Is Now a Global Concern

Tinba, which has been linked to attacks in the U.S., Canada and Europe, is now targeting bank accounts in Russia, according to a new report from Dell SecureWorks. Researcher Brett Stone-Gross tells why Tinba is unusual and can be tough to detect.

Nov 4, 2015

ONC's Top Privacy Priorities for 2016

Now that it has issued a 10-year roadmap for secure, interoperable health information exchange, the Office of the National Coordinator for Health IT has a number of privacy-related projects planned for 2016, says Lucia Savage, ONC's chief privacy officer. She spells those out in this in-depth interview.

Nov 2, 2015

Art Coviello's New Cybersecurity Agenda

A quiet life in retirement? Not for Art Coviello, former executive chairman of RSA. He's just joined the boards of two new security ventures, Bugcrowd and Cylance, and he's got big ideas for how to influence the 2016 cybersecurity agenda.

Oct 30, 2015

Cybersecurity: The CEO's Responsibilities

Many CEOs and boards of directors are failing their companies by not truly understanding their cybersecurity risks, says Steve Durbin of the Information Security Forum. He stresses that senior leaders must ensure their organizations provide adequate funding to manage risks.

Oct 29, 2015

How HIPAA Myths Block Data Exchange

Overcoming misperceptions about the HIPAA Privacy Rule will prove vital to achieving nationwide, secure health data exchange, says attorney Jodi Daniel, who until recently helped develop federal policy.

Oct 28, 2015

Mergers Create Challenges for CISOs

Mergers and acquisitions create challenges for CISOs, including allocating resources to meet the information security needs of newly united companies, says Joey Johnson, CISO of Premise Health.

Oct 28, 2015

CISO's Guide to Spear Phishing Defense

Everyone's talking about business email compromise, but what they aren't talking enough about is what's at the root of these attacks - spear phishing. Joseph Opacki of PhishLabs discusses how security leaders must respond to the threat.

Oct 26, 2015

TalkTalk Attack Highlights Worldwide Breach Concerns

The recent data breach at U.K.-based telecom company TalkTalk illustrates that breach risk mitigation is a critical issue worldwide. PCI's Jeremy King, who will be a featured speaker at ISMG's Fraud Summit London on Oct. 27, explains why European data security is getting more scrutiny.

Oct 26, 2015

Genomic Data Exchange: The Security Challenges

Devin Jopp, CEO of the Workgroup for Electronic Data Interchange, describes a new effort to develop recommendations for how to protect genomic data as it's exchanged, as is called for under President Obama's Precision Medicine Initiative.

Oct 23, 2015

How EHR Vendors Hope to Measure Interoperability

A recent agreement among 12 electronic health record vendors to support an effort to create a voluntary set of metrics assessing the interoperability of their products could potentially be a step toward easing secure health information exchange, says Kent Gale of the research firm KLAS.

Oct 22, 2015

Secure Health Data Exchange: Hurdles to Overcome

A number of short-term and long-term hurdles, including technology and policy issues, stand in the way of achieving secure, interoperable, nationwide health information exchange, says David Kibbe, M.D., of DirectTrust, which maintains a secure email framework.

Oct 20, 2015

Solving Secure Email Platform Challenge

Building a strong platform to secure enterprise email systems is like piecing together a puzzle by joining existing technologies from various sources. NIST is readying a guide to do just that.

Oct 19, 2015

Machine Learning: Sizing Up Its Role in InfoSec

By identifying abnormal data access behavior, machine learning systems could improve breach prevention and fraud detection in the healthcare arena and other sectors, contends artificial intelligence expert Robert Leithiser.

Oct 15, 2015

Payment Security: What Factors Are Essential?

The future of payments security hinges on a combination of factors, including widespread use of the EMV chip, tokenization and encryption, as well as near real-time payments, says Liz Garner, vice president of the Merchant Advisory Group, a featured speaker at ISMG's Fraud Summit New York on Oct. 20.

Oct 13, 2015

Medical Device Cybersecurity: 3 Vital Steps

Healthcare organizations should take three important steps to help improve the cybersecurity of medical devices used in their environments, says security expert Kevin Fu. Hear his advice in this interview.

Oct 12, 2015

Simplifying and Unifying Authentication

Has authentication become too complex for banking institutions? That's a legitimate concern, says Peter Tapling of Early Warning. He offers strategies to simplify and unify authentication strategies.

Oct 9, 2015

Is EMV Bad News to Small Businesses?

NACS attorney Doug Kantor says small businesses are getting a raw deal from the card brands when it comes to expectations for EMV migration. The expense is too high, and the fraud-reduction benefits too low to make EMV worthwhile, he argues.

Oct 9, 2015

The Shift to File-Centric Security

Security leaders do well securing stored data and data in transit. But what about the integrity of data after it reaches the intended recipient? This is a huge gap to be bridged, says Chris Kniffin of Seclore.

Oct 8, 2015

Cloud Security: Job Opportunities

With organizations increasingly moving to the cloud, more security professionals are needed to help secure those environments as well as manage incident response. Cloud forensics expert Neha Thethi outlines must-have skills, qualifications and certifications.

Oct 8, 2015

Why Ex-NSA Chief Now Argues Against Encryption Backdoor

In this audio blog report, hear why former NSA Director Mike McConnell changed his view on the value of the government getting device manufacturers to create a backdoor to allow law enforcement to bypass encryption.

Oct 7, 2015

Should Medicare Move to Chip ID Cards?

Proposed federal legislation calls for testing the use of smart cards, similar to the chip cards being rolled out by the U.S. credit card brands, for Medicare patient identification to help reduce fraud. Kelli Emerick, leader of the Secure ID Coalition, explains the proposal.

Oct 6, 2015

Inside BitSight's Benchmark Report

BitSight Technologies is out with its annual Industry Benchmark Report, and cybersecurity ratings are low for the energy and utilities industry. BitSight's Mike Woodward shares insights for all sectors.

Oct 6, 2015

Identity-Centric Security

Recent breaches indicate that stronger controls are needed to protect key corporate assets - especially identities. CA's Steve Firestone discusses how to protect identities, while at the same time improving the user experience.

Oct 5, 2015

Why U.S. EMV Migration Will Spur Global Fraud Shift

In the wake of the Oct. 1 EMV fraud liability shift date, U.S. merchants can expect to pay for counterfeit fraud losses previously absorbed by European issuers, says Jeremy King of the PCI Council. Longer-term, he expects European banks will experience more fraud as U.S. POS and card security leapfrogs other markets.

Oct 5, 2015

Experian Breach: Lessons Learned

As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.

Oct 5, 2015

Precision Medicine: 'Big Data' Security, Privacy Concerns

The Precision Medicine Initiative announced earlier this year by the Obama administration is the ultimate healthcare "big data" project and faces many security and privacy challenges, says attorney Kirk Nahra.

Oct 1, 2015

Banking Trojans Retooled for Data Mining

Cybercrimnals are now using the Dyre and Dridex banking Trojans to gather massive amounts of data about individuals and companies that could enable them to track patterns of behavior, which might later help them evade intrusion detection, says Fox-IT's Eward Driehuis.

Sep 30, 2015

Targeted Attacks Becoming the Norm

The commoditization of attack infrastructure and services in the cyber-criminal underground, and the low cost and ease of launching targeted attacks, are growing concerns that require new defense strategies, says Trend Micro's Raimund Genes.

Sep 30, 2015

Why InfoSec Professionals Must Understand Privacy Issues

In addition to having a dedicated individual or team responsible for privacy matters, organizations must ensure their information security and IT staffs are knowledgeable about data privacy issues, says Trevor Hughes, CEO of the International Association of Privacy Professionals.

Sep 30, 2015

PCI's Orfei on How EMV Will Spur Mobile Payments

PCI Council General Manager Stephen Orfei says the migration to EMV in the United States will facilitate faster adoption of contactless mobile payments. That's why mobile will be a hot topic at the PCI Council's annual North America Community Meeting this week.

Sep 29, 2015

Rise of Security Intelligence Centers

The traditional Security Operations Center is out, and the new Security Intelligence Center is in. Greg Boison of Lockheed Martin tells how security leaders are winning business support for this evolution.

Sep 28, 2015

Scrutinizing Security When Procuring Medical Devices

To improve patient safety, healthcare organizations should more closely scrutinize the cybersecurity of medical devices during the procurement process, says security expert Beau Woods.

Sep 25, 2015

What It Takes to Be an IT Security Auditor

Gregory Wilshusen discusses the path he followed to his job as the government's lead information security auditor and the skills needed to be an InfoSec auditor.

Sep 23, 2015

Kevin Mandia on the State of Cybersecurity

The attacks have evolved, breaches have multiplied, and serious security gaps have been exposed. But what most concerns FireEye President Kevin Mandia? The rise of nation-states as leading threat actors.

Sep 23, 2015

The Road to True Data Protection

Many organizations spin their wheels when it comes to cybersecurity, says IBM's Andy Land. They invest in tools that do everything except what security leaders are fundamentally tasked with doing: Protect the data.

Sep 22, 2015

Forensics - How Not to Spoil the Data

Organizations create more data than ever, and they face more requirements to collect and present it for investigations and legal cases. How do they avoid spoiling this data? Zapproved's Sarah Thompson offers tips.

Sep 22, 2015

How Banks Can Leverage the Bitcoin Infrastructure

The use of Bitcoin poses big cybersecurity and money-laundering concerns for banks. But the transaction infrastructure used by cryptocurrencies offers many features that banks should put to use, says former FBI Special Agent Vince D'Agostino.

Sep 21, 2015

A CIO Outlines Top Cybersecurity Priorities

In light of the uptick in hacker attacks on the healthcare sector, Everett Clinic in Washington is making a number of additional moves to bolster its cybersecurity, says CIO Becky Hood. Find out about the top priorities.

Sep 18, 2015

California's Proactive Approach to Cyberthreats

The creation of the California Cybersecurity Integration Center demonstrates that the state is taking a proactive approach to securing its digital assets, says Mark Weatherford, a former California state CISO and onetime DHS deputy undersecretary for cybersecurity.

Sep 18, 2015

Insider Threat: The Risk of Inaction

The insider threat is one that organizations often want to overlook. But it's hard to ignore when they are losing critical assets. Lockheed Martin's Douglas Thomas tells how to sell an insider threat program.

Sep 18, 2015

Will Mobile Payments Overshadow EMV Card Migration?

The U.S. migration to EMV chip payment cards, which is progressing slowly, will be overshadowed by EMV-compliant mobile payments, says Gray Taylor of Conexxus, a convenience store and petroleum industry technology association.

Sep 18, 2015

Safeguarding PHI: Overlooked Steps

While covered entities and business associates are becoming more aware of the need to encrypt patient data at rest, they often overlook securing data as it's shared and received, says security expert Joe Meyer of Coalfire.

Sep 17, 2015

U.S. Cyber Challenge Seeks to Boost Number of Security Pros

The 6-year-old U.S. Cyber Challenge, designed to build interest in cybersecurity careers, is going strong, as participation in its online competition and cyber boot camps continues to grow, says Karen Evans, the organization's national director.

Sep 16, 2015

Obama Threatens Sanctions Against China If Hacks Continue

President Obama characterizes hacks of American businesses by Chinese hackers as an "act of aggression" against the United States and promises his administration will take action against the Chinese if they don't stop.

Sep 16, 2015

Business Associates: The Next HIPAA Enforcement Target

As federal HIPAA enforcers increasingly scrutinize business associate compliance, BAs need to be paying close attention to the details of settlements that federal regulators are signing with covered entities for HIPAA non-compliance cases and data breaches, says privacy attorney Adam Greene.

Sep 16, 2015

How to Align Security to Business Performance

Increasingly, as enterprise leaders plan security investments, they think not just about threats and technology, but also how to tie their decisions to business performance. Gartner's Sid Deshpande explains the shift.

Sep 16, 2015