PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 59 of 70

Evolving Role of ID, Access Management

The role of identity and access management is as critical as ever. But the demands of the role? They are radically different, says Sam Curry, CTO of RSA, who discusses the new skills needed.

Jul 9, 2012

Zeus: How to Fight Back

The Zeus Trojan is frightening because of its agility, evolution and success at stealing banking credentials. How can institutions fight back? Malware expert Andreas Baumhof offers new ideas.

Jul 6, 2012

Bargain Hunting Raises Infosec Awareness

Local and state governments improving their cyberthreat awareness could be the main benefit from a new program designed to help them save money in acquiring IT security products and services, says Center for Internet Security Chief Executive William Pelgrin.

Jun 28, 2012

Need Exists to Refocus Infosec Skills

Gartner's Tom Scholtz doesn't see a shortage of technically skilled IT security practitioners. But he perceives a dearth of infosec pros who truly understand how security links to an enterprise's business goals.

Jun 26, 2012

Infosec Wares Need to ID Unknown Threats

Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.

Jun 19, 2012

Using Risk to Fund Infosec Projects

Relating risk to information security initiatives can help IT security managers persuade their bosses to fund these projects, sponsors of a new survey contend.

Jun 13, 2012

Wireless Monitoring: Risks, Benefits

Federal action to set aside broadband spectrum for <a href="https://www.healthcareinfosecurity.com/mobility-c-212"><b>wireless</b></a> patient monitoring systems has the potential to improve treatment without increasing risks, says medical device expert Dale Nordenberg, M.D.

Jun 13, 2012

A Rise in Encryption?

A dramatic reduction in processing requirements for encryption may mean increased utilization of the technology, says Todd Thiemann of Vormetric.

Jun 13, 2012

The Move to Data-Centric Security

The attack space is changing, with more enterprise users accessing data from their mobile device, leading to a new focus on data-centric security, says Jeremy Stieglitz of Voltage Security.

Jun 13, 2012

Mitigating Advanced Cyber-Attacks

Cyber-attacks are becoming increasingly difficult for organizations to defend against, says Ashar Aziz of FireEye.

Jun 13, 2012

Addressing Cloud in Government

What's top of mind for the federal government when it comes to cloud security? David Berman of Centrify explains.

Jun 13, 2012

Using Mobile to Authenticate

Organizations looking to leverage multi-factor authentication should consider mobile devices for their unique capabilities, says Sarah Fender of PhoneFactor.

Jun 13, 2012

Top Risk Concerns

What are the top GRC concerns within organizations? John Ambra of Modulo explains.

Jun 13, 2012

Improving Identity and Access Management

What are the top concerns around identity and access management within organizations? Avatier Chief Innovation Officer Ryan Ward says compliance, governance and audit issues are top-of-mind.

Jun 13, 2012

Mitigating Mobile Risks

As BYOD continues to become more commonplace, mobile application risk management aids in identifying the risks on those devices and implementing policy to protect enterprise data, says Domingo Guerra, president and founder of Appthority.

Jun 13, 2012

Getting BYOD Advice

What are the top bring-your-own-device concerns enterprises are facing today? Russell Rice of Cisco explains.

Jun 13, 2012

How to Address BYOD

The bring-your-own-device trend is a huge issue for organizations today, says Rob Ayoub of Fortinet, who offers recommendations to address the security challenges involved.

Jun 13, 2012

Using Business-Driven IAM to Improve Security

What is business-driven identity and access management and how can it help organizations improve their security? Jason Garbis of Aveksa explains.

Jun 13, 2012

The BYOD Challenge

What are the top challenges with the bring-your-own-device trend? Stephen Midgley, vice president of global marketing at Absolute Software, says the top issue is organizations not knowing where their data is located.

Jun 13, 2012

Big Data: It's Not About Size

Big data isn't about size, says Gartner's Neil MacDonald. It's much bigger: Big data is about volume, velocity, variety and complexity, and requires new approaches on how information is used to secure digital assets.

Jun 12, 2012

Lessons from LinkedIn Breach

In the wake of the LinkedIn breach, what steps should organizations take to enhance online password protection? Araxid's Brent Williams offers advice.

Jun 12, 2012

Creating a Malware Intel Sharing System

Georgia Tech Research Institute is beta testing a malware intelligence system that research scientist Chris Smoak contends will help corporate and government security officials share information about the attacks they confront.

Jun 12, 2012

Mobile Banking: Predicting the Risks

Mobile security threats can be managed through testing and strategic risk-mitigation strategies, says Keith Gordon, who oversees authentication and security strategies for Bank of America's consumer online and <a href="https://www.bankinfosecurity.com/mobile-banking-c-106"><b>mobile banking</b></a> units.

Jun 4, 2012

Employing Cybersecurity Index as a Metric

IT security practitioners realize much value from the monthly cybersecurity index created a year ago by Mukul Pareek and Dan Geer. Why? They benefit from knowing how others see the evolving threat environment.

Jun 4, 2012

Five Application Security Tips

Many organizations aren't devoting enough resources to ensure that applications for <a href=" https://www.healthcareinfosecurity.com/mobility-c-212"><b>mobile devices</b></a> are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile <a href=" https://www.healthcareinfosecurity.com/application-security-c-205"><b>application security</b></a>.

May 30, 2012

Understanding Electronically Stored Info

For years, David Matthews, Deputy CISO of the City of Seattle, has been immersed in securing electronically stored information. Now he's written the book on the topic. What are the key themes addressed?

May 29, 2012

Why Boards of Directors Don't Get It

IT risk management, cyber insurance, privacy - these are hot topics for security leaders, but not for their boards of directors. Why do senior executives still fail to see IT risks as business risks?

May 24, 2012

How to Respond to Hacktivism

Hacktivist attacks will increase, and researcher Gregory Nowak says organizations can take proactive steps to reduce exposure and protect brand reputation. Why, then, are many organizations failing?

May 23, 2012

Intelligent Defense Against Intruders

Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.

May 23, 2012

4 Security Priorities for Banks

From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.

May 18, 2012

Matching Personalities to Jobs

Do you have the right personality type to flourish in an IT security role? Laurence Shatkin, author of "50 Best Jobs for Your Personality," offers tips for finding the job that truly fits your type.

May 18, 2012

Understanding 'Big Data'

Banks have a lot of data, but how well is it integrated? How much are institutions gleaning from the data they house? State Street Corp's chief scientist says financial services could be doing more.

May 16, 2012

Risks of False Credentials

How common are padded resumes like the one that led to the departure of Yahoo CEO Scott Thompson? Far too common, says attorney Les Rosen, who offers tips to help organizations manage such risks.

May 14, 2012

Improving Breach Investigations

When breaches occur, most organizations struggle to collect the right data and get investigations off the ground. How can breach response improve? Verizon's Chris Novak offers expert advice.

May 11, 2012

Risk of Insider Fraud

Many organizations realize they are at risk of insider attacks. But do they have evidence and capabilities to respond to these risks? That's the real challenge, says researcher Larry Ponemon.

May 10, 2012

How to Spot a Fraudster

Who is more likely to commit <a href='https://www.bankinfosecurity.com/fraud-c-148'><b>fraud</b></a> in your organization - the newly-hired youngster or the long-tenured veteran? The ACFE's new 2012 Global Fraud Study profiles the top fraudsters and their schemes.

May 9, 2012

Americans Less Jittery About Net Security

Americans express a bit less anxiety about their security than they felt a year ago, perhaps because they've become desensitized by extensive news reports about cyberattacks last spring, says Unisys' Steve Vinsik.

May 9, 2012

Mobile Banking: Mitigating Consumer Risks

Which security concerns should institutions be bracing for, as more consumers adopt <a href="https://www.bankinfosecurity.com/mobile-banking-c-106"><b>mobile banking</b></a>? BITS offers a collection of recommendations from some of the industry's top institutions.

May 7, 2012

The Hidden Costs of Fraud

Dollars lost of fraud are one measure of an incident's impact. But the "soft" costs - loss of reputation and productivity - are the ones that most get the attention of Terry Austin of Guardian Analytics.

May 7, 2012

Key Characteristics of Influential CISOs

A new IBM study identifies three distinct types of information security leaders: Influencers, Protectors and Responders. Which type are you? IBM's Marc van Zadelhoff offers tips for more effective leadership.

May 7, 2012

'It's a War for Talent'

The information security profession is a 'war for talent' today, says recruiter Kathy Lavinder. But to win the war requires specialized skill sets. Here are today's top requirements.

May 3, 2012

Social Engineering: The Next Generation

Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its <a href="http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf" target="_blank"><b>Internet Security Threat Report</b></a>, which reveals some surprising trends.

May 3, 2012

Teaming Up to Fight ACH Fraud

When it comes to curbing ACH fraud, banking regulators and law enforcement agencies have joined forces to keep institutions abreast of emerging best-practices. What are their top recommendations?

May 2, 2012

The Anti-Fraud Evolution

When Joseph Bognanno of Wolters Kluwer Financial Services examines 2012's financial fraud trends, all he sees is more - more of everything, from schemes to new guidance. How can banks stay ahead?

Apr 27, 2012

New BC Standard: 'An End to Uncertainty'

Lyndon Bird, technical director of the Business Continuity Institute, praises the ISO 22301 standard for <a href='https://www.careersinfosecurity.com/business-continuitydisaster-recovery-c-76'><b>business continuity</b></a>, calling it "An end to uncertainty." Learn about the emerging standard.

Apr 25, 2012

Identifying Undetected Breaches

Eighty-five percent of data breaches go undetected, but organizations have a new type of cop on the beat to ferret out these illicit activities - the data scientist, says Phil Neray, head of security intelligence strategy and marketing for Q1 Labs, an IBM company.

Apr 20, 2012

Fraud Fighting: How to Engage the Customer

When it comes to fighting financial fraud, Peter Tapling of Authentify says banking institutions are chronically underestimating and under-utilizing one key resource: Their own customers.

Apr 20, 2012

How to Prioritize FFIEC Fraud Investments

When it comes to the FFIEC Authentication Guidance, Aite analyst Shirley Inscoe fears too many banking institutions are investing only in achieving compliance - not ongoing security.

Apr 20, 2012

Cloud Costs for Government Could Rise

Cloud computing for governments in the United States, especially services tailored for the federal government, may not be as efficient or as cheap as many would hope, says Richard Falkenrath, a principal with the security consultancy The Chertoff Group.

Apr 17, 2012

Post-Breach PR: Lessons Learned

One of the biggest mistakes companies make after a major <a href='https://www.databreachtoday.com/category.php?catID=318'><b>data breach</b></a> is communicating with the news media, consumers and others before all the facts are clear, says attorney Ronald Raether.

Apr 17, 2012