PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 58 of 70

Financial Fraud: Manage the Risks

Worldwide, banking institutions face evolving fraud threats. What are some of the new strategies and solutions they employ to fight back? ACI Worldwide's Patrick Higgins and Andy Morris share insights.

Oct 1, 2012

Banks Under Attack: PR Missteps

Banks struck by the wave of DDoS attacks are communicating badly and missing a great opportunity to educate their customers about cybersecurity, says Gregory Nowak of the Information Security Forum.

Sep 28, 2012

On the Job Training for ISOs

Delaware Chief Security Officer Elayne Starkey leads, but does not supervise, hundreds of information security officers, many of whom have technical expertise in areas other than security.

Sep 28, 2012

Cyberthreats: What's Next?

Earlier this year, Bill Wansley of Booz Allen Hamilton warned of nation-state attacks against U.S. banks. Are his predictions now coming true? What should institutions expect in weeks ahead?

Sep 28, 2012

Ron Ross on New Risk Assessment Guide

NIST's Ron Ross, one of the world's top information risk thought leaders, says new guidance he co-wrote doesn't dictate how organizations must approach risk assessment, but gives enterprises options on how to conduct risk appraisals.

Sep 27, 2012

Creating Trust: The $9 Million Pilots

Five pilot projects unveiled by the federal government, if successful, should build trust in online commerce, helping to boost the economy, says Jeremy Grant, head of the National Strategy for Trusted Identities in Cyberspace National Program office.

Sep 24, 2012

Infosec's Cheerleader-In-Chief: Governor

When it comes to cybersecurity in Delaware, Gov. Jack Markell sees his job as being the state's head cheerleader. In an interview, Markell discusses his role and the state's cybersecurity accomplishments.

Sep 20, 2012

Mobile Payment Guidelines Issued

The PCI Security Standards Council has issued new guidelines on mobile payment acceptance security. What are the key recommendations? The council's Bob Russo and Troy Leach discuss the new guidance.

Sep 18, 2012

Cyber Insurance: Getting Started

Organizations mulling the purchase of cyber insurance should vet their brokers to see if they truly understand policies that provide breach protection, cyber liability lawyer Richard Bortnick says.

Sep 18, 2012

iPhone 5 and Next-Gen Mobile Security

The iPhone 5 is coming, and so are a slew of new or upgraded smart phones and tablets. How should security leaders prepare for this new wave of mobility? Malcolm Harkins, CISO of Intel, offers advice.

Sep 14, 2012

A State CSO Reflects on a Breach

Thor Ryan, chief security officer at the Alaska Department of Health and Social Services, offers lessons learned as a result of his organization's $1.7 million settlement following a HIPAA compliance investigation triggered by a small breach incident.

Sep 13, 2012

Visa's New End-to-End Encryption Service

Visa's new end-to-end encryption service aims to eliminate payment card data at the merchant level. Eduardo Perez of Visa's Risk Group discusses the security value of this emerging solution.

Sep 12, 2012

10 Tips for Evolved Defense

The information security threat landscape has evolved considerably over the past six years, and it's time that organizations' defenses evolve to match them, says Tom Kellermann of Trend Micro.

Sep 12, 2012

New Perspective on Regulation

William Henley of the FDIC has just returned to banking regulation after a two-year stint working in the private sector. How did his business experience influence his approach to enforcing compliance?

Sep 11, 2012

New Nation-State Attacks Target Banks

Gauss is the latest malware variant likely connected to nation-states. But Roel Schouwenberg of Kaspersky Lab says Gauss' aim at banking credentials is unique. How should organizations respond?

Sep 10, 2012

Tackling the Big Data Challenge

To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?

Sep 5, 2012

Insider Fraud: The 'Low, Slow' Approach

Which employees are most apt to commit cyberfraud, and how can organizations detect and prevent their crimes? Researcher Randy Trzeciak shares insights and tips from a new insider threat study.

Sep 4, 2012

Hurricane Season: Are We Prepared?

As Tropical Storm Isaac strikes, many organizations still sting from the impact of Hurricane Irene and 2011's other natural disasters. What lessons were learned, and how can they be applied now?

Aug 29, 2012

Rethinking Security Best Practices

Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.

Aug 28, 2012

Apple-Samsung Case: Lessons for CISOs

One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.

Aug 28, 2012

Mitigating Messaging Risks

E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.

Aug 27, 2012

How Cloud Can Facilitate Risk Management

Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.

Aug 24, 2012

Citadel Malware: The Growing Threat

RSA's Etay Maor says Citadel malware and ransomware attacks highlight a growing threat banking institutions and consumers must be prepared to fight. What can institutions do to mitigate risk?

Aug 24, 2012

3 Lines of Cyberdefense

By combining responsible management, risk management and compliance functions and internal audits, organizations will go far in securing their data and systems, says PricewaterhouseCoopers Partner Carolyn Holcomb.

Aug 22, 2012

Wisconsin HIE Favors Hybrid Data Model

The Wisconsin Health Information Exchange uses a hybrid data model approach that lets members retain control over information, but makes security less complicated, says CEO Kim Pemble.

Aug 20, 2012

Global Hackers Take Aim at U.S. Banks

Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it's not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk?

Aug 16, 2012

PCI: New Approach to Merchant Security

In the wake of recent merchant breaches, a new PCI training program aims to enhance point-of-sale security. Which payment card risks does this program address? PCI Council chair Bob Russo explains.

Aug 15, 2012

Managing Security in a Merger

When two organizations merge, their top security/privacy challenge doesn't necessarily involve technology. Sometimes it's culture, says Christopher Paidhrin of PeaceHealth Southwest Medical Center.

Aug 15, 2012

Information Assurance Job Market Soars

People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand. <p> "We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate about what they do and that are willing to put in the extra hours to keep the citizens of the nation and the state secure," Dan Likarish, assistant professor and program chair of the IT department at CO-based Regis, says. <p> In an exclusive interview about information assurance and why the job market for information assurance professionals has seen astounding growth, Likarish discusses: <p> <ul> <li>Opportunities for information assurance professionals;</li> <li>Trends impacting information assurance education;</li> <li>Best options for someone to get into the information assurance profession.</li> </ul>

Aug 15, 2012

How to Talk Security to the Board of Directors

Increasingly, security and <a href='https://www.inforisktoday.com/'><b>risk</b></a> issues have the attention of boards of directors. What are the keys to discussing these topics with the board? John South, CSO of Heartland Payment Systems, shares tips.

Aug 13, 2012

FTC's Google Fine: The Privacy Message

Google's <a href='https://www.inforisktoday.com/google-to-pay-225-million-ftc-fine-a-5031'><b>$22.5 million settlement</b></a> with the Federal Trade Commission is the largest fine ever imposed by the FTC. But the case sends a bigger message about <a href='https://www.inforisktoday.com/privacy-c-151'><b>privacy</b></a>, says attorney Francoise Gilbert.

Aug 10, 2012

Thinking Smartly About Cloud Computing

CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.

Aug 9, 2012

Social Media: Pros & Cons

The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.

Aug 6, 2012

Power Grid Too Reliable for Own Good?

The United States - and other advanced societies - shouldn't let the reliability of their electric grids lull them into being unprepared for possible massive power outages caused by cyberattacks, cybersecurity expert Harry Raduege says.

Aug 6, 2012

Fraud: Businesses Hold Banks Accountable

Guardian Analytics is out with its third annual Business Banking Trust Study. What are the latest fraud threats, and how do businesses expect their banking institutions to respond to these threats?

Aug 6, 2012

Symantec's CISO on Security Leadership

Her first nine months on the job included a data breach and a CEO shakeup. Hear how Symantec CISO Patricia Titus has adapted to business change and re-focused the company's security team.

Aug 3, 2012

Cybersecurity Act Fails; What Next?

Now that Congress has failed to enact significant cybersecurity legislation, President Obama needs to find new ways to secure key government and business IT systems, says Melissa Hathaway, a former top White House cybersecurity adviser.

Aug 3, 2012

Privacy: 'Do Not Track' Debate

Microsoft says its next version of the Internet Explorer web browser will feature "do not track" as a default user setting. What are the online privacy implications? Trevor Hughes of the IAPP weighs in.

Jul 31, 2012

Keeping Telehealth Data Secure

As more consumers take advantage of <a href="https://www.healthcareinfosecurity.com/mobility-c-212"><b>mobile devices</b></a> for telemedicine, they need to be educated on steps to take to help ensure that their medical information remains secure, says telehealth expert Chuck Parker.

Jul 30, 2012

Eddie Schwartz on His Year as RSA's CISO

The truth about preventing a breach, like the advanced-persistent-threat attack RSA experienced in 2011, is that an organization can't defend critical systems alone, says RSA CISO Eddie Schwartz.

Jul 23, 2012

Phishing Update: 'No Brand is Safe'

The number of phishing sites is at an all-time high. And so are the targeted brands. The message, says Peter Cassidy of the Anti-Phishing Working Group: "No brand is safe."

Jul 23, 2012

COBIT 5 for Security: What You Need to Know

ISACA just issued COBIT 5 for Information Security, a business-centric approach to <a href='https://www.inforisktoday.com/governance-c-93'><b>governance</b></a> and IT management. ISACA's Robert Stroud explains what COBIT 5 means to your organization.

Jul 23, 2012

When Breach Planning Fails

When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.

Jul 20, 2012

CISO Success Requires Collaboration

RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.

Jul 19, 2012

Smart Grid's Unique Security Challenge

The smart grid is unlike any other type of critical information infrastructure, and its complexity creates a heightened challenge to secure it, says ENISA's Konstantinos Moulinos.

Jul 18, 2012

Breached Organizations Are Tight-Lipped

Too many organizations that experience a <a href="https://www.databreachtoday.com/breaches-c-318"><b>data breach</b></a> fail to reveal information on the cause of the incident so that consumers can take appropriate action, one consumer advocacy group contends.

Jul 17, 2012

High Roller: How to Protect Accounts

The so-called High Roller cyberattack uses automation to drain high-value bank accounts. What can institutions do to protect customers? Chris Silveira of Guardian Analytics offers advice.

Jul 17, 2012

Managing All That Security

Acquiring information security wares gets more complicated every day - some 1,000 vendors offer 150 categories of products - so it's unreasonable to expect even the most informed chief information security officers to know everything about them.

Jul 16, 2012

Putting Big Data to Work

Financial institutions store lots of data. But most don't exploit or even know how to manage it. How can institutions get a handle on big data and use it to deter fraud? Zions Bank offers tips.

Jul 12, 2012

How the PATCO Ruling Could Benefit Banks

Don't be too quick to write off the PATCO court ruling as a victory for banking customers in the debate over ACH/wire fraud liability. The reversal could actually be a win for banks.

Jul 10, 2012