PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 62 of 70

For Clinics, Privacy Training Is Key

Physician group practices, many of which are adopting their first electronic health record system, need to make staff training on <a href='/privacy-c-151'><b>privacy</b></a> and security issues a top priority, says Susan Turney, M.D., the new CEO at the Medical Group Management Association.

Dec 2, 2011

Toolkit Helps With Risk Assessments

A new, free <a href="http://scap.nist.gov/hipaa/" target="_blank"><b>HIPAA Security Rule Toolkit</b></a> is designed to help healthcare organizations conduct a thorough risk assessment, says Kevin Stine, who helped guide the project for the National Institute of Standards and Technology.

Dec 2, 2011

Breach Response: Reputational Risk

Data breaches are all about reputational risk, says attorney Lisa Sotto. And as legal requirements grow, attorneys must play increasingly integral roles in helping clients respond to incidents.

Nov 30, 2011

The State of Security Education

Information security <a href='/articles.php?art_id=4216'><b>threats</b></a> - especially to critical infrastructures and from nation-states - are evolving. But security education curricula are struggling to keep pace, according to <a href='https://www.bankinfosecurity.com/interviews/super-user-organizations-biggest-internal-threat-i-566'><b>Eugene Spafford</b></a>, renowned information security professor at Purdue University.

Nov 29, 2011

Breach Legislation: The Next Generation

It's a new wave of cybercriminal behind the latest major data breaches, says breach expert Lucy Thomson. And these incidents are resulting in a new generation of <a href='https://www.govinfosecurity.com/house-gop-unveils-cybersecurity-agenda-a-4126'><b>breach notification laws</b></a> globally.

Nov 28, 2011

IP Protection Bills Threaten Internet

The Brooking Institute's Allan Friedman says bills before Congress aimed at protecting intellectual property threaten cybersecurity.

Nov 28, 2011

Breach Notification Priority for 2012

BITS president Paul Smocer says banks can expect an uptick in cybersecurity-focused legislation in 2012. What impact will changes from Capitol Hill have on requirements for data breach notification, information sharing and critical infrastructure?

Nov 28, 2011

Influencing Policy, If Not the Law

Jacob Olcott says Congress' failure to enact comprehensive cybersecurity legislation over the past half decade doesn't mean lawmakers haven't influenced IT security policy.

Nov 23, 2011

Fraud Victim: FFIEC Guidance Lacking

ACH fraud victim Mark Patterson says small businesses like his welcome improved online security measures from banking institutions. But is the new FFIEC Authentication Guidance sufficient? Patterson says no.

Nov 21, 2011

Risk Management's Challenges

When bankers contemplate risk, says Edward DeMarco Jr. of the Risk Management Association, what dominates headlines in the financial press should be of paramount concern.

Nov 17, 2011

Firewalls: The Next Generation

Too many of today's firewalls are out of date and exposing organizations to unacceptable business risks, says Chris King of Palo Alto Networks.

Nov 17, 2011

Identifying Infosec Jobs, Skills, Tasks

NICE's Ernest McDuffie says a proposed cybersecurity workforce framework represents a consensus of government thought on how best to define the jobs, skills and tasks needed to secure information technology.

Nov 15, 2011

BYOD and Corporate Policy

Unfortunately, says Ken Vander Wal, most organizations have done little to address security in their policies and procedures regarding BYOD, which is changing the ways companies address user behavior and risk.

Nov 15, 2011

How Training Helps Prevent Breaches

A lack of ongoing <a href='/hipaa-hitech-c-283'><b>HIPAA</b></a> compliance training increases the risk of internal breaches, says Terrell Herzig, information security officer at UAB Medicine.

Nov 14, 2011

Making the Business Case for Security

Winning senior executive support for information security spending requires "a solid business case of justifications," says Christopher Paidhrin, security compliance officer at PeaceHealth Southwest Medical Center.

Nov 11, 2011

HIPAA Compliance: A New Attitude

Ramped up HIPAA enforcement is a big reason behind the No. 1 information security priority for the coming year: improving regulatory compliance, says attorney Adam Greene.

Nov 10, 2011

BofA on Mobile Risk and Security

Bank of America's Keith Gordon says securing the mobile channel is much like securing any other banking channel: Controlling risks requires layers of security and controls. But educating customers plays a key security function, too.

Nov 10, 2011

Tablet: A 'Game Changer' for Mobile Banking

Javelin's Mary Monahan says the mobile tablet will revolutionize banking and payments.

Nov 9, 2011

Community Service: How to Give Back

Giving back to the community. It's a civic responsibility, says Dan Waddell of Tantus Technologies. But it's also a necessity to help raise cyber awareness. Waddell explains how security pros can give back.

Nov 8, 2011

Breach Resolution: A Success Strategy

One reason why so many healthcare organizations are not well-prepared to counter security threats is that "key leadership has not bought into the whole process," says Bob Krenek of <a href="http://www.experian.com/data-breach/data-breach-resources.html" target="_blank"><b>Experian® Data Breach Resolution.</b></a>

Nov 7, 2011

Winning Funding for Info Security

Penetration tests that demonstrate how an unauthorized user could gain access to patient information can be effective in winning support for a bigger information security budget, says David Kennedy of <a href="http://www.diebold.com/" target="_blank"><b>Diebold, Incorporated.</b></a>

Nov 7, 2011

Emerging Payments Redefine Value

In the near future, financial institutions will have new opportunities for service in emerging payments. How they define their roles, however, will depend greatly on steps they take now to put a stake in the ground.

Nov 7, 2011

Cyber Intel Employs Risk Approach

Harry Raduege sees the nascent field of cyber intelligence as a way for governments and businesses to be proactive, and not reactive, to today's sophisticated digital threats.

Nov 1, 2011

Social Networks Revolutionize Payments

"It is clear that Internet technology represents the moment of a change equivalent to the change brought on by the printing press and the steam machine," says Kosta Peric of SWIFT.

Nov 1, 2011

Digital, Physical Security Synergized

Honolulu CIO Gordon Bruce, bolstered by an international conference, is working energetically to expand digital and physical security.

Oct 31, 2011

ID Theft: How to Help Consumers

ID theft expert Joanna Crane wonders whether banks, government agencies and healthcare providers do enough to assist consumers with ID theft recovery, saying consumer expectations are often loftier than what's being done to meet the demand.

Oct 31, 2011

Fighting Fraud: Banks, Merchants Must Align

The only way to improve card security is for banks and merchants to align their strategies, says Gray Taylor of NACS. "This is something that hurts both of our industries. Fraud hurts us all."

Oct 28, 2011

EMV: It's About Reducing Fraud

Pradeep Moudgal of California-based SVB says the bank's decision in June to migrate commercial credit cards over to EMV was easy. "The biggest advantage of the chip card, at the end of the day, is to reduce fraud," he says.

Oct 26, 2011

Mobile Device Management

Roger Baker, CIO at the VA, says desktop computers will eventually phase out, as mobile devices become predominant channels for communication and work. That evolution has made plans for ongoing mobile security a priority for organizations that cross every business sector.

Oct 25, 2011

Authentication: One Solution Won't Fit All

How much crossover should banking institutions rely upon as they evaluate authentication standards for retail vs. commercial accounts? Online security expert Christopher Beier offers insights.

Oct 25, 2011

Steps to Stop Skimming

Gray Taylor of NACS says retailers spend billions every year to fix a broken payments system. And the primary culprit is the lingering mag-stripe.

Oct 24, 2011

VA's Plan for Mobile Device Security

Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.

Oct 20, 2011

How Audits Can Increase Infosec Budgets

Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.

Oct 19, 2011

BlackBerry Episode Strikes at IT Security Tenet

Winn Schwartau says the BlackBerry disruption this past week (see <a href='http://blogs.govinfosecurity.com/posts.php?postID=1088'><b><i>BlackBerry Disruptions: Where to Start?</i></b></a>) hit at the heart of one of the fundamentals of IT security: availability.

Oct 13, 2011

The App Sec Pro and the Shark

When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.

Oct 13, 2011

Barriers Stunting Cloud Adoption

Alastair MacWillson says the lack of harmonization among state, national and international security laws and regulations has proved challenging for global organizations that want to work in the cloud.

Oct 7, 2011

Cloud Computing: Compliance Challenges

Too many organizations overlook regulatory compliance issues when working with cloud computing vendors, says security expert Alastair MacWillson.

Oct 5, 2011

The Changing Threat Landscape

The threat landscape has evolved, and India's banking institutions must grow their information security strategies, says Anand Naik of Symantec, which just released a report that offers a new security agenda to institutions.

Oct 3, 2011

Interview: The New HIPAA Enforcer

<a href="/hhs-selects-new-civil-rights-chief-a-4053"><b>Leon Rodriguez,</b></a> the new director of the Department of Health and Human Services' Office for Civil Rights, describes his <a href='/hipaa-hitech-c-283'><b>HIPAA</b></a> enforcement agenda.

Oct 3, 2011

Business Continuity: What We're Missing

From the <a href='/crisis-in-japan-global-impact-a-3432'><b>earthquake in Japan</b></a> to <a href='/disaster-averted-for-most-systems-a-4003'><b>Hurricane Irene</b></a> in the U.S., organizations worldwide have found their <a href='/business-continuity-disaster-recovery-c-76'><b>business continuity</b></a> and disaster plans tested. But what lessons must we draw from these incidents?

Oct 3, 2011

7 Steps to Secure Mobile Devices

Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.

Sep 30, 2011

Fraud, Security and Priorities for BITS

BITS, the technology policy division of The Financial Services Roundtable, has just named Paul Smocer its new president. What are his strategies for tackling fraud, security and FFIEC compliance?

Sep 29, 2011

PCI: Merchants Still Fall Short

Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.

Sep 28, 2011

Taking Charge of Physical, IT Security

Merging government agencies responsible for physical and information security into a single operation makes sense, says Michigan's new chief security officer, Dan Lohrmann. After all, he says, the same technologies used to allow entry to a building also can be deployed to permit access to a sensitive database.

Sep 26, 2011

HIPAA Audit Prep: Five Key Steps

Healthcare organizations need to take five key steps to prepare for the upcoming HIPAA compliance audit program, says compliance specialist Bob Chaput.

Sep 23, 2011

Mobile: Are Security Risks Overblown?

Mobile apps and smartphone security are increasing global concerns. But Dr. Giles Hogben of ENISA says mobile malware mania is a bit overhyped, since mobile is actually more secure than most other platforms currently on the market.

Sep 23, 2011

Dodd-Frank: What to Expect in 2012

It's been well over a year since the passage of the Dodd-Frank Wall Street Reform and Consumer Protection Act. How should banking institutions prepare for the hundreds of new regulations expected to come as a result of this landmark legislation?

Sep 22, 2011

AML: Passing the Audit

Ensuring compliance with BSA and AML mandates is always a priority for federal examiners, and that makes it a priority for banks, says Nancy O'Donnell of Thomaston Savings Bank.

Sep 21, 2011

Connecting HIEs: Is It Feasible?

Ensuring adequate security will prove vital to efforts to link statewide health information exchanges to each other, says IT consultant Patti Dodgen.

Sep 16, 2011

UBS and Risk Management

Risk management expert Frances McLeod says investment banks such as UBS struggle with balance between risk management and making money. "There is a bit of a conflict in the culture," she says.

Sep 16, 2011