PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 60 of 70

Phishing: New and Improved

<a href='https://www.bankinfosecurity.com/phishing-c-32'><b>Phishing</b></a> - it's the classic scheme that never goes away. In fact, it evolves. Amy Blackshaw of RSA offers insights on how to respond to this and other trends identified in the <a href='https://www.bankinfosecurity.com/surveys.php?surveyID=11'><b>2012 Faces of Fraud</b></a> survey.

Apr 17, 2012

Heartland CEO on Breach Response

What's the best strategy for communications after a data breach, like the one suffered by Global Payments Inc.? Bob Carr, CEO of <a href="https://www.bankinfosecurity.com/heartland-suit-dismissed-a-4659"><b>Heartland Payment Systems</b></a>, discusses what to say in the weeks following a breach.

Apr 16, 2012

6 Steps to Secure Big Data

Securing the massive amounts of data swamping organizations, a trend known as big data, can be addressed, in part, by organizations simply getting rid of data no longer needed, Grant Thornton's Danny Miller says.

Apr 13, 2012

Incident Response: The Gaps

To respond to a security incident, an organization must first be aware of it. But too many intrusions go undetected, says Rob Lee of SANS Institute. That's the first problem that needs to be addressed.

Apr 12, 2012

2012 Faces of Fraud: First Look

"Regulation drives spending," says George Tubin of GT Advisors. "You're in a situation where the regulators are telling you, 'You have to do something; you have to make improvements.' Therefore, the bank has to spend some money on technology."

Apr 12, 2012

Privacy: Changing a Corporate Culture

Creating a "culture of compliance" that emphasizes the importance of privacy requires far more than "management by committee," says change management specialist Jan Hillier.

Apr 11, 2012

Investigating a Payments Breach

What might the Global Payments breach investigation entail? Dave Ostertag of Verizon's Investigative Response unit describes a forensics investigation - how long it can take and what it might reveal.

Apr 10, 2012

Mobile Security: Preventing Breaches

Healthcare organizations need to make <a href='/mobility-c-212'><b>mobile device</b></a> security a top priority because so many recent data breaches can be tied to poor mobile device management, says consultant Jeff Brandt.

Apr 9, 2012

Security Education for Senior Execs

Where do time-strapped senior leaders go for education on cyber <a href='https://www.careersinfosecurity.com/forensics-c-315'><b>forensics</b></a> and <a href='https://www.careersinfosecurity.com/7-steps-to-improve-breach-incident-handling-a-4468'><b>incident response</b></a>? Carnegie Mellon University has a new option, and Dena Haritos Tsamitis explains its unique approach.

Apr 6, 2012

Using Big Data to Identify Anomalies

Current Analysis' Bernt Ostergaard describes using massive amounts of information, or big data, to help secure information systems.

Apr 5, 2012

Selecting a Breach Resolution Vendor

Companies should hire a breach resolution vendor before they experience a <a href='/id-theft-c-318'><b>data breach</b></a> to help ensure rapid, appropriate response, says security consultant Robert Peterson.

Apr 4, 2012

Gartner's Litan on Global Payments Breach

Gartner Analyst Avivah Litan, one of the first fraud experts to report the Global Payments Inc. data breach, says the latest revelations raise more questions than answers about the incident's impact.

Apr 3, 2012

Assuring the Security of IPv6

IPv6, known to some as the new Internet, is architected to be safer than IPv4, but that doesn't mean organizations shouldn't take steps to assure the security in Internet Protocol version 6, American Registry for Internet Numbers' John Curran says.

Apr 2, 2012

Global Payments Breach: What to Tell Customers

In the wake of the <a href='https://www.bankinfosecurity.com/banks-alerted-to-massive-card-breach-a-4638'><b>Global Payments Inc. card breach</b></a>, <a href='/id-theft-c-31'><b>ID theft</b></a> expert Neal O'Farrell says banks and credit unions must be proactive with outreach to customers. What should institutions' messages include?

Apr 2, 2012

Who Decides How to Allot Infosec Funds?

As enterprises spend frugally on IT security, cybercriminals aren't, and that presents big problems for organizations working feverishly to secure their digital assets, says Steve Durbin, global vice president of the Information Security Forum.

Mar 30, 2012

Heartland CEO on Breach Response

From 2010: When he first learned of the full magnitude of the Heartland Payment Systems data breach, Heartland CEO Bob Carr had one overriding thought: "Can we survive this?"

Mar 30, 2012

Mobile Device Management Tips

Mobile device management systems are relatively immature, so shoppers need to ask probing questions about the systems' functionality, advises security consultant J. David Kirby.

Mar 29, 2012

Designing Privacy into Online Products

Organizations and leaders seeking to assure the privacy of their customers should implement privacy by design in the development process, privacy lawyer Alan Friel says.

Mar 27, 2012

Inside Microsoft's Zeus Malware Raid

"Many financial institutions have watched for years as cybercrime has escalated, and now we are shutting it down," says Greg Garcia, describing Operation B71 and how it's helping combat ACH/wire and other forms of fraud.

Mar 27, 2012

The Cost of a Data Breach

The average per capita cost of a <a href='https://www.databreachtoday.com/data-breaches-c-318'><b>data breach</b></a> has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.

Mar 23, 2012

Verizon: Hacktivists #1 Breach Threat

Verizon's <a href="http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf?CMP=DMC-SMB_Z_ZZ_ZZ_Z_TV_N_Z037" target="_blank"><b>2012 Data Breach Investigations Report</b></a> shows dramatic increases in attacks linked to hacktivist groups like Anonymous and LulzSec. How should organizations respond to this evolving threat?

Mar 22, 2012

Redefining IT Security's Core Tenets

Protecting the availability, confidentiality and integrity of information are the core tenets of IT security. But an FBI <b><a href='/cybersecurity-c-223'>cybersecurity</a></b> leader, Steve Chabinsky, suggests the central theme of IT security needs to be broadened to include assurance and attribution.

Mar 16, 2012

Avoiding Pitfalls of the Cloud Contract

<b><a href='/cloud-computing-c-232 '>Cloud-computing</a></b> service provider contracts, for most businesses and government customers, are take-it-or-leave it propositions, so organizations must approach a services agreement cautiously, IT security lawyer Françoise Gilbert says.

Mar 15, 2012

Why Data Storage Is a Key HITECH Issue

One important way to prepare for Stage 2 of the <a href="/agency-releases/american-recovery-reinvestment-act-2009-r-1853"><b>HITECH Act</b></a> electronic health record incentive program is to take steps toward eliminating storage of patient records on mobile devices, says privacy expert Deborah Gascard Wolf.

Mar 12, 2012

How New iPad Can Be Blast from the Past

Apple's introduction of its third iteration of the iPad e-tablet, coupled with the growing popularity of <b><a href='/cloud-computing-c-232'>cloud computing</a></b>, could lead to new methods of enterprise computing and IT security, Delaware Chief Security Officer Elayne Starkey says.

Mar 12, 2012

Targeting Mobile Banking Risks

What emerging security challenges will new mobile devices and platforms pose for banks and credit unions? Brian Pearce and Amy Johnson shed light on Wells Fargo's approach to unique retail and commercial risks.

Mar 12, 2012

iPad3 4G Nudges BYOD

Apple's release of the new iPad will affect business. How should organizations incorporate new mobile concerns into their BYOD policies? Joe Rogalski of New York's First Niagara Bank weighs in.

Mar 9, 2012

Sizing Up the HITECH Stage 2 Rules

Consumer advocate Deven McGraw describes what she likes and doesn't like about the privacy and security provisions in the proposed rules for Stage 2 of the <a href="/agency-releases/american-recovery-reinvestment-act-2009-r-1853"><b>HITECH Act</b></a> electronic health record incentive program.

Mar 8, 2012

Dissecting a Hacktivist Attack

Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.

Mar 6, 2012

Deferring to Business on Cybersecurity

Commerce Undersecretary for Standards and Technology Patrick Gallagher sees the private sector, not government, taking the lead to develop tools, processes and standards to help safeguard IT systems and data in and out of government.

Mar 5, 2012

Breaches: The Top Trends

What are the top global breach trends and threats that organizations should be watching? Wade Baker of Verizon offers insights gleaned from a new study of his group's latest investigations.

Mar 2, 2012

Schmidt Hopeful on Bill's Passage

White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.

Mar 1, 2012

A Framework for Vulnerability Reports

A consortium of eight major information technology companies is continuing development of a free framework designed to make it easier to exchange information about security vulnerabilities.

Feb 29, 2012

Cyber Attacks: Not If or When, But Now

No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.

Feb 27, 2012

Scholarship for Service Program Grows

The need for qualified security pros is growing - but so is the <a href='https://www.govinfosecurity.com/cyber-scholarship-to-require-more-work-a-2160'><b>Scholarship for Service Program</b></a>, which helps students train for roles in government. <a href='https://www.bankinfosecurity.com/interviews/one-most-generous-scholarships-ive-ever-seen-victor-piotrowski-nsf-i-221'><b>Victor Piotrowski</b></a> of the National Science Foundation discusses the opportunities.

Feb 27, 2012

Privacy Bill of Rights: Not Be-All, End-All

The Obama administration's Consumer Privacy Bill of Rights should be seen as a vital document to help shape an expansive and globally accepted privacy framework in the United States, privacy and data security lawyer Lisa Sotto says.

Feb 24, 2012

What to Expect at RSA Conference

This is the first <a href='https://www.bankinfosecurity.com/pages.php?pageID=rsa2012'><b>RSA Conference</b></a> since 2011's high-profile <a href='https://www.inforisktoday.com/breaches-serve-as-wake-up-call-for-risk-mgt-a-4161'><b>security breaches</b></a>. How did those incidents influence this year's agenda? Hugh Thompson explains in an exclusive event preview.

Feb 23, 2012

Mobile Security: Enabling BYOD

Mobile security is a new discussion track at <a href='https://www.bankinfosecurity.com/pages.php?pageID=rsa2012'><b>RSA Conference</b></a>, but it's long been a hot topic for CISOs. Entrust's Dave Rockvam discusses <a href='https://www.bankinfosecurity.com/phishing-c-325'><b>BYOD </b></a>and how organizations are securing personally-owned devices.

Feb 22, 2012

Mobile Device Management and BYOD

A mobile device management system is critical to any effort to accommodate the use of personally owned <a href='/mobility-c-212'><b>mobile devices</b></a> for work purposes, says Bill Spooner, CIO at Sharp Healthcare.

Feb 21, 2012

The Book on Insider Threats

The <a href='https://www.bankinfosecurity.com/insider-fraud-c-247'><b>insider threat</b></a>: It's a top challenge for any organization, and it's a hot topic for <a href='https://www.bankinfosecurity.com/pages.php?pageID=rsa2012'><b>RSA Conference</b></a> attendees. Dawn Cappelli and Randy Trzeciak preview their new book, The CERT Guide to Insider Threats.

Feb 21, 2012

Putting to Rest RSA Key Security Worries

IT security practitioners who employ the RSA public-private key cryptography needn't lose sleep about its efficacy, despite new research that raises questions on how it creates large prime numbers to generate secret keys, IT security authority Gene Spafford says.

Feb 20, 2012

Lax Breach Laws Endanger Businesses

Data breaches are under-reported, and breached organizations aren't giving consumers the information they need about these compromises, says Karen Barney of the Identity Theft Resource Center.

Feb 20, 2012

The CISO Challenge

Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing <a href='https://www.bankinfosecurity.com/mobility-c-212'><b>mobile security</b></a> and other challenges.

Feb 18, 2012

Breach Response: Initiate Forensic Probe

Getting forensics help should be one of the first steps an organization takes after a breach occurs, says IT security and privacy lawyer Miriam Wugmeister.

Feb 17, 2012

Fraud: The Latest Threats

What are the top emerging fraud threats via mobile banking, and how must security leaders respond? In an RSA Conference preview, Julie McNelley of the Aite Group offers tips for fighting the newest threats.

Feb 15, 2012

NIST to Unveil Controls Guidance at RSA

NIST's Ron Ross will be quite busy at RSA Conference 2012, not only promoting revised guidance on security and privacy controls to be unveiled at the securing conclave, but also participating in a panel on one of his favorite topics: continuous monitoring.

Feb 15, 2012

Fraud: The Latest Threats

What are the top emerging fraud threats to banking institutions via mobile banking, and how must security leaders respond? Julie McNelley of the Aite Group offers tips for fighting the newest threats.

Feb 15, 2012

FDIC Explains Processing Guidance

Why must financial institutions pay more attention to risks posed by third-party payments processors? FDIC executive Michael Benardo explains the updated guidance in an exclusive interview.

Feb 14, 2012

Fraud Fight: How to Pick Your Battles

From mobile malware to the Anonymous hacktivist attacks, how can banking institutions tackle the changing threat landscape? Joe Rogalski of First Niagara Bank has some new ideas.

Feb 13, 2012

PCI: New Focus on Mobile

Mike Mitchell, new chair of the Payment Card Industry Security Standards Council, says mobility is among his top priorities for action in 2012. How will emerging technologies influence the standard?

Feb 10, 2012