PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 47 of 70

Addressing Health Data Sharing Risks

As healthcare organizations step up their efforts this year to exchange more patient data with others to improve care, it's urgent that they address the "significant risks" involved, says Erik Devine, chief security officer at an Illinois hospital.

Jan 6, 2015

Fraud: Underground Markets Evolving

Over the last 12 months, hackers have enhanced the marketing of high-value stolen data, according to Dell SecureWorks' David Shear, who explains how the underground economy works.

Jan 5, 2015

Fighting 'Cybercrime as a Service'

"Cybercrime as a Service" is the latest threat evolution, and traditional defenses continue to fall short. Derek Manky of Fortinet discusses the merits of information sharing and the new Cyber Threat Alliance.

Dec 31, 2014

Arbor Networks' President on DDoS

Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.

Dec 29, 2014

Web Based Attack Trends and How to Leverage Information Sharing

Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.

Dec 26, 2014

Staffing Crisis: What India Can Do

Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)².

Dec 26, 2014

Sony Hack Breaks 'Nation-State' Mold

While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.

Dec 23, 2014

ZixCorp CEO on E-mail Security Evolution

Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?

Dec 22, 2014

ForeScout CEO on Internet of Things

As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.

Dec 17, 2014

Proofpoint's CEO: Hackers Are Winning

Gary Steele has seen attack methods rapidly evolve over the last five years. But what the CEO of Proofpoint hasn't seen is a comparable evolution in how the security industry responds to attacks.

Dec 15, 2014

AirWatch Chairman on Mobile Security

Financial transactions on smart phones require layered security that helps outsmart cyberthieves, says Alan Dabbiere, chairman of AirWatch, who describes today's mobile challenges.

Dec 12, 2014

New (ISC)² Head Tackles Staffing Crisis

As David Shearer steps in as the new executive director of (ISC)², he inherits a huge challenge: How does the consortium respond appropriately to the global information security staffing shortage?

Dec 11, 2014

The True Cost of a Data Breach

When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.

Dec 8, 2014

Christy Wyatt on Mobile Security

Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.

Dec 4, 2014

'Wiper' Malware: What You Need to Know

Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.

Dec 3, 2014

Why Merchants Embrace Tokenization

Retailers say tokenization and encryption are critical to ensuring payment card data security. Aite's Natalie Reinelt describes how merchants will use layers of security to protect data at the point of capture.

Dec 1, 2014

2015 Trend: Big Data for Threat Analysis

The use of big data for real-time threat analysis will become more commonplace among banks and credit unions in 2015, says Bill Stewart of Booz Allen Hamilton, who describes cybersecurity trends for the year ahead.

Nov 26, 2014

A Boost for Cybersecurity Policy Analysis

Hewlett Foundation President Larry Kramer explains why the group is funding academic efforts to lay the cornerstone for sustainable public policy to deal with the growing cyberthreats faced by governments, businesses and individuals.

Nov 26, 2014

Security Staffing: The Real Crisis

Yes, there is a global security staffing shortage. But what is the cause, and what can be done to address the crisis? Hord Tipton of (ISC)² offers his take on key issues facing the profession.

Nov 26, 2014

Embracing the Adversary Mindset

Cybersecurity specialists need to learn to think like an adversary in order to develop sound defense strategies, says Greg Shannon, chief scientist at the CERT Division of Carnegie Mellon University's Software Engineering Institute.

Nov 20, 2014

How IBM Will Grow Its Security Business

Brendan Hannigan became IBM's top security systems executive in 2011, when Big Blue acquired the company he ran, Q1 Labs. Hannigan says acquisitions will remain a key component in the growth of IBM's security business.

Nov 17, 2014

The Multidisciplinary IT Security Team

A top-flight IT security team requires individuals with know-how in a wide range of non-technology disciplines, in addition to those with technical expertise, cybersecurity leaders say.

Nov 13, 2014

Fighting Medical Fraud: Where to Begin?

To protect against medical ID theft and fraud, healthcare organizations need to build comprehensive security programs that go beyond just putting their "finger in the dike," says security expert Mark Ford of Deloitte.

Nov 13, 2014

FireEye CEO: The Evolution of Security

The threats, the solutions and certainly the actors all have changed dramatically since David DeWalt first entered the information security industry. Which should be the top concern for enterprises?

Nov 12, 2014

David DeWalt: The Business of Security

Advanced threats, targeted attacks and enterprise mobility have re-shaped how we approach security, and they've also influenced the growth of FireEye. CEO David DeWalt discusses the highs and lows of his tenure.

Nov 12, 2014

One on One with FireEye's Dave DeWalt

"It's a tough conversation, telling [clients] they've spent a lot of money on defense-in-depth that isn't working," says FireEye CEO David DeWalt. "If they don't change, they're risking their company."

Nov 12, 2014

Fiberlink President on Future of BYOD

BYOD is evolving into the "BYO-everything" trend, says Chris Clark, president of IBM's Fiberlink. He discusses Apple and IBM's enterprise mobility deal, as well as how mobility continues to reshape computing.

Nov 12, 2014

The Business of Fighting Fraud

The cost of cyberfraud is expected to hit $8 billion by 2018, and that increase opens new doors for solutions provided by niche cybersecurity firms, says Easy Solutions CEO Ricardo Villadiego.

Nov 12, 2014

Breach Aftermath: Messaging Matters

Poor post-breach communication can cause as much damage to a company's reputation as the cyber-incident itself, says Al Pascual, a senior analyst at Javelin Strategy & Research, who will speak at ISMG's Fraud Summit Dallas.

Nov 11, 2014

Why PCI Will Issue Log Monitoring Guidance

Troy Leach of the PCI Security Standards Council says log monitoring is an effective data breach detection tool that, unfortunately, not enough merchants put to use. He explains how upcoming PCI guidance could help with implementation.

Nov 10, 2014

New ONC Privacy Chief's Rallying Cry

The secure national exchange of patients' health information for use in treatment will make progress once "we simplify what we say when we're explaining privacy to people," says Lucia Savage, new chief privacy officer of ONC.

Nov 10, 2014

NIST's Ron Ross on How a Career Evolves

After 20 years in the Army and nearly that long as an information risk management leader at the National Institute of Standards and Technology, Ron Ross says his career is still evolving. Find out what he plans to do next.

Nov 6, 2014

FFIEC: Boards Need Cyber Training

Amy McHugh, a former FDIC IT examination analyst, says banking regulators will soon scrutinize C-level executives and boards of directors to gauge their cybersecurity awareness in the wake of the FFIEC's pilot cyber-risk assessment program.

Nov 5, 2014

Wearable Health Tech: New Privacy Risks

Emerging Web-enabled health technologies, ranging from the upcoming Apple Watch to a Google "pill" that could potentially detect cancer in patients' bodies, pose troubling new privacy risks, says privacy advocate Deborah Peel, M.D.

Nov 3, 2014

White House Hack: A Lesson Learned

An important lesson from the breach of a White House unclassified network is that organizations should invest in intrusion detection tools, not just perimeter defenses, SANS's Johannes Ullrich says.

Oct 30, 2014

Online Voting: Security Vs. Expediency

Most citizens rightly don't trust the Internet as a voting booth. But the Atlantic Council's Jason Healey says that could change, not because of better security, but because the digital generation might demand it as they age.

Oct 27, 2014

EMV Rollout: Are PINs Essential?

Many issuers of chip-based credit cards will likely allow U.S. consumers to complete transactions with a signature, not a PIN, which will limit the fraud protections offered by EMV cards, says Citizen Financial Group's Tim Webb.

Oct 24, 2014

Fixing Two-Factor Failures

As numerous attacks have demonstrated, two-factor authentication systems are not foolproof, says Ryan Lackey, a principal in the security practice at CloudFlare, who offers insights on how today's authentication systems must evolve.

Oct 23, 2014

Insights on Visa's EMV Efforts

Visa is working closely with U.S. banking institutions and retailers to enhance payments security and push the migration toward EMV, says the card brand's Eduardo Perez, a featured presenter at ISMG's Fraud Summit New York.

Oct 22, 2014

How Tom Carper Sees FISMA Bill Passing

In a wide-ranging interview, Senate Homeland Security and Governmental Affairs Committee Chairman Tom Carper discusses bipartisan efforts to enact FISMA reform, the impact of payment card breaches and his personal approach to IT security.

Oct 21, 2014

APT Defense: Executing the Right Standards

In addition to adopting the right IT security standards to mitigate advance persistent threats, organizations need to pick the right people to carry out those standards, says Jon Long, a featured speaker at ISMG's Global APT Defense Summit on Oct. 22.

Oct 20, 2014

NIST Framework: Healthcare Hurdles

More healthcare entities might consider implementing NIST's cybersecurity framework if healthcare-specific guidance on putting the framework to use was available, says Lee Kim of the Healthcare Information and Management Systems Society.

Oct 20, 2014

Fighting the Globalization of Cybercrime

"Cybercrime as a service" and the globalization of attacks are two of the trends noted by cyber-intelligence firm Group-IB in its third annual High-Tech Crime Report. Group-IB's Alexander Tushkanov explains the lessons that can be learned.

Oct 17, 2014

What Would the Original CISO Do?

What advice does the first CISO have for today's security leaders? Steve Katz speaks up on top security threats, how to defend against them and what it takes to lead an effective security team.

Oct 16, 2014

Using Analytics to Improve Fraud Detection

Data analytics is reshaping the way financial institutions detect fraud by helping them track customer behavior in real time, says FICO's Anant Nambiar, who'll be a featured presenter at ISMG's Fraud Summit New York on Oct. 21.

Oct 16, 2014

Manipulating Hackers as a Cyberdefense

Knowing how to manipulate a hacker's cultural values could help thwart - or at least slow down - cyber-attacks, says Garet Moravec, a cybersecurity expert who'll speak at ISMG's Global APT Defense Summit on Oct. 22.

Oct 15, 2014

Are You Prepared for a Breach?

In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.

Oct 13, 2014

Authentication: Changes Coming In a Year

The U.S. government could be a year away from allowing citizens to use the same authentication credentials to get services from multiple departments and agencies, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.

Oct 13, 2014

Why Shellshock Battle Is Only Beginning

Nearly two weeks since news of Shellshock broke, attacks that are taking advantage of the Bash vulnerabilities are grabbing headlines. But Michael Smith of Akamai warns that the battle against hackers capitalizing on Shellshock could go on for years.

Oct 8, 2014

Top Threat to Financial Institutions: Advanced Malware

Heartbleed, Shellshock, targeted attacks - the security threats to banking institutions are legion. And there are new banks can get better at detecting these evolving threats, says Solutionary's Jeremy Nichols.

Oct 7, 2014