PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 63 of 70

A New Approach to IT Security

Intelligence expert Terry Roberts says cyber intelligence, a new approach to IT security, could make significant gains in the coming year. "The good thing is, this isn't really rocket science," says the chair of the Intelligence and National Security Alliance's Cyber Council.

Sep 14, 2011

ABA on the Lure of Online Banking

Nessa Feddis of the ABA says acceptance of online banking among U.S. consumers is accelerating quickly because consumers trust online security.

Sep 13, 2011

Hurricane Irene Offers Lessons

Based on its experience with Hurricane Irene, an executive at Memorial Sloan Kettering Cancer Center in Manhattan advises hospitals to make sure they plan for worst-case scenarios.

Sep 12, 2011

Secure File Transfer: Challenges and Solutions

File transfer protocol remains a practice within banking institutions of all sizes. But how can banking/security leaders ensure secure FTP that will protect and track critical data? These thought leaders offer strategies.

Sep 12, 2011

9/11: The Global Perspective

The Sept. 11 terrorist attacks struck the U.S., but the impact and lessons affected the world and the entire information security profession, says Rolf von Roessing, past international vice president of ISACA.

Sep 9, 2011

Security in a Post-9/11 World

Although the 9/11 attacks 10 years ago were a strong catalyst for ramped up disaster recovery and business continuity planning, there's still plenty of work to do, says security specialist Mac McMillan.

Sep 9, 2011

Shifting Course on Infosec Post-9/11

On the morning of Sept. 11, 2001, federal IT leader Mark Forman was briefing government chief human resources directors on the president's e-government initiative at a forum at the University of Maryland, a 10-mile drive from his White House office, when word came of the first jet crashing into the north tower of the World Trade Center in New York.

Sep 8, 2011

Lessons of Sept. 11

As we approach the 10-year anniversary of the 9/11 attacks on the U.S., Kevin Sullivan, a former investigator with the New York State Police, reflects on lessons learned and steps industries still need to take to ensure a tragedy like 9/11 is never repeated.

Sep 7, 2011

Social Media: Why Training Is Key

Frequent face-to-face training on social media policies is a vital component of any risk management effort, says consultant Erika Del Giudice.

Sep 2, 2011

The Power of the Next Generation Firewall

Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.

Sep 1, 2011

ACH Fraud: Catching Incidents Sooner

Doug Johnson of the ABA and FS-ISAC says banks and commercial customers are improving efforts to catch and thwart incidents of corporate account takeover, a sign that the industry is moving in a positive payments direction.

Sep 1, 2011

Why IT Security Careers Remain Hot

Careers in IT security remain hot, says David Foote, noted researcher and analyst of <a href='https://www.bankinfosecurity.com/infosec-joblessness-remains-steady-at-0-a-3833'><b>IT workforce trends</b></a>. But there's a disconnect between current job opportunities and the talent pool looking to fill them.

Aug 30, 2011

The Future of Payments

The future worth of payments will not rely so much on tangible currency, but more on digital value and data. And that means a stronger need for security and data management.

Aug 29, 2011

Facial Biometrics Pose Privacy Woes

Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the <b><a href='https://www.govinfosecurity.com/biometrics-c-207'>biometric</a></b> technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the biometric data, cautions a privacy rights leader.

Aug 29, 2011

Offering a Helping Hand to Agencies

In many states, the top information security officer champions IT security rather than dictates it, as the decisions of specific steps to take to safeguard digital assets are left to departments, agencies and commissions.

Aug 26, 2011

Fraud: 'A Serious Problem'

Fraud is a global concern, and an area regulators and financial institutions the world-over are watching closely, says Bill Isaac. Whether a cyberthreat or mortgage fraud, investments in fraud prevention will continue, despite the state of the international economy.

Aug 26, 2011

Social Media and Reputational Risks

ICBA's Chris Lorence says all financial institutions, especially community banks, should appreciate the positive and negative effects posts on social-networking sites can have on their reputations.

Aug 24, 2011

HIPAA Audits: Documentation Is Key

Having complete documentation of every aspect of your privacy and security strategy is the best way to prepare for a HIPAA audit, says consultant Cliff Baker.

Aug 24, 2011

The Failure of Regulatory Reform

Former FDIC head Bill Isaac says U.S. banks have strengthened their financial footing since the market collapse of 2008, but the U.S. economy remains on the verge of a "double-dip" recession. The reason: poorly planned regulatory reforms.

Aug 23, 2011

Infosec in a Decentralized Environment

Give a man a fish, you feed him for today, the proverb says. Teach a man to fish; and you feed him for a lifetime. That adage can be applied to information security, as well.

Aug 23, 2011

FFIEC Authentication: The Need for Out-of-Band

As banks and credit unions assess online risk, in light of the updated guidance from the FFIEC, financial fraud analyst Tom Wills says they should consider mobile as a viable layer for out-of-band authentication.

Aug 22, 2011

FFIEC Authentication and the Link to Debit

Regulation and legislation are working in banking institutions' favor, helping them enhance fraud prevention and detection investments for debit and online banking.

Aug 18, 2011

Cloud Computing: Insurance Issues

Healthcare organizations entering cloud computing contracts should carefully consider whether they need additional liability insurance coverage to address the risks involved, says IT consultant Gerard Nussbaum.

Aug 17, 2011

Chips and Dynamic Authentication

Eduardo Perez says, simply, the "time was right" for Visa's introduction of chip-based payments incentives for U.S. merchants. Visa's new mobile-to-EMV program offers PCI-audit-compliance waivers to qualified merchants who implement dual-interface contact and contactless acceptance.

Aug 16, 2011

Questions to Ask Cloud Vendors

Before negotiating a contract with a <a href='/cloud-computing-c-232'><b>cloud computing</b></a> vendor, organizations should ask plenty of questions about privacy and security, says consultant Chris Witt.

Aug 15, 2011

PCI: New Tokenization Guidance Issued

Bob Russo says the long-awaited PCI guidance on tokenization should provide merchants with a baseline for standardization and best practices, and serve as a roadmap for how tokenization can complement compliance with the PCI-DSS.

Aug 12, 2011

Creating Ag Extension Agent for Cyber

Eugene Spafford thinks America needs the cybersecurity equivalent of an agriculture extension service to help educate citizens on IT security.

Aug 10, 2011

Social Media Risks and Controls

When it comes to social media, organizations have to be vigilant and consistent with risk assessments that closely monitor and evaluate emerging threats, says Andrew Kennedy of BITS.

Aug 9, 2011

Creating a Culture of Security

Yahoo's Justin Somaini believes his fellow CISOs in business and government do a good job keeping their bosses informed of proper information security practices, but could do better in <b><a href='/awareness-training-c-27'>educating</a></b> the rank and file about them.

Aug 8, 2011

FFIEC Authentication Guidance: Enhancing Controls

Ian Harper of Pentagon Federal Credit Union says financial institutions should continually review their risk management processes, a recommendation reinforced by the new FFIEC Authentication Guidance.

Aug 8, 2011

Access Reports: Is Revamp Inevitable?

Federal officials should consider a major revamp of a proposal that would require healthcare organizations to provide patients with a report listing everyone who has electronically accessed their records, a former government official who helped draft the proposal says.

Aug 8, 2011

Securing the Cloud

ISACA's Marc Vael says differences in cloud computing environments and cloud providers can pose security risks. But well thought-out contracts and risk-management plans can fill potential security gaps and ensure business continuity during outages and disasters.

Aug 5, 2011

Inside a Fraud Investigation

No two <a href='https://www.bankinfosecurity.com/fraud-c-148'><b>fraud </b></a>incidents may be exactly alike, but a fraud investigator's approach can still be very consistent and precise, says Jean-Francois Legault, a fraud investigations specialist with Deloitte and Touche.

Aug 3, 2011

Cloud Computing: Critical Issues

Before entering a contract with a cloud computing company, organizations should consider three critical issues, says Feisal Nanji, executive director at the security consulting firm Techumen.

Aug 2, 2011

FFIEC Authentication Guidance: A Bank's Steps to Comply

"We're continually testing our controls and the effectiveness of our controls. We do a lot of emerging-threats monitoring ... so we can react," says First Niagara's Joe Rogalski.

Aug 2, 2011

Battling Debit Fraud and Skimming

Chris Olson of Fremont Bank says card skimming and the acceleration of ID theft prompted the bank to initiate a move from the mag-stripe to the chip.

Aug 2, 2011

The Value of Penetration Testing

Scott Laliberte, managing director of Protiviti, wrote the book on penetration testing, and he has strong feelings about what organizations are doing right and wrong when <a href='https://www.bankinfosecurity.com/risk-assessment-c-44'><b>assessing their information security risks</b></a> today.

Aug 1, 2011

Critiquing the EHR Access Report Plan

Dan Rode of the American Health Information Management Association describes why the group wants to see major revisions in a proposed federal rule requiring hospitals, clinics and others to give patients access reports listing everyone who's viewed their records.

Jul 29, 2011

Easing Burden to Comply with IRS Rules

Oregon Chief Information Security Officer Theresa Masse finds herself at the center of a state initiative to simplify compliance by agencies with Internal Revenue Service rules to safeguard taxpayer data.

Jul 28, 2011

The ROI of Trustable Identities

There are significant hard and soft benefits for government agencies to gain by investing now in solutions built around Trustable Identities, says Mike Ozburn, principal of Booz Allen Hamilton.

Jul 27, 2011

New Normal: Under Attack

It's the new conventional wisdom: all computer networks will be attacked. For Phyllis Schneck, that means organizations must be resilient, keeping computers functioning even when they're under assault.

Jul 26, 2011

Forensics in the Cloud

Performing <a href='/security-pros-need-forensics-skills-a-2966'><b>digital forensics</b></a> in the <a href='/interviews/bankinfosecuritycom-interviews-markus-jakobsson-part-1-2-i-1121'><b>cloud</b></a> isn't necessarily a new discipline, says Rob Lee of SANS Institute. But the task definitely requires a whole new mindset and some new skills from investigators.

Jul 26, 2011

The Ethics of Information Security

It is no longer enough for information security professionals to secure critical information. They also need to be asking about the legitimacy of where this information comes from, says John Colley, managing director of <a href='https://www.bankinfosecurity.com/rsa2011video/tipton.html'><b>(ISC)2</b></a> in EMEA.

Jul 25, 2011

Cybersecurity: The New Frontier

Dickie George of the <a href='https://www.govinfosecurity.com/national-security-agency-c-183'><b>National Security Agency</b></a> has one word to describe the state of information security education today: "Spotty." And this state must improve if we hope to fill all the growing demand for security pros.

Jul 25, 2011

FFIEC Authentication Guidance: Anomaly Detection

Behavioral monitoring and transaction-anomaly detection are setting the baseline for online authentication, says Guardian Analytics' Terry Austin.

Jul 22, 2011

Ron Ross on NIST's New Privacy Controls

<b><a href='https://www.govinfosecurity.com/nist-c-15'>NIST</a></b>'s Ron Ross points out that its seminal security control guidance, <b><a href='https://www.govinfosecurity.com/agency-releases/nist-sp-800-53r3-recommended-security-controls-for-federal-r-1626'>Special Publication 800-53</a></b>, contains only one privacy control, requiring agencies to conduct a privacy impact assessment. That will change by year's end.

Jul 21, 2011

FFIEC Authentication Guidance: What Your Vendors Need to Know

It's not enough for banking institutions to conform to the <a href='https://ffiec.bankinfosecurity.com/'><b>FFIEC Authentication Guidance update</b></a>. They also must ensure that their key vendors meet the same standards, says Philip Alexander of Wells Fargo Bank.

Jul 21, 2011

How to Comply with FFIEC Authentication Guidance

Former banking regulator William Henley has simple advice for banking institutions wondering how to comply with the new <a href='https://ffiec.bankinfosecurity.com/'><b>FFIEC authentication guidance update</b></a>: "Start immediately, develop a plan, and document your progress."

Jul 20, 2011

Elements of a Social Media Policy

You know your organization's <a href='/how-to-write-social-media-policy-a-3191'><b>social media policy</b></a> is a good one when it starts sounding less like a checklist and more like common sense, says <a href='/interviews/surviving-social-media-i-743'><b>Sherrie Madia</b></a>, social media expert and author.

Jul 19, 2011

HIPAA Audits: Preparation Steps

An important component of preparing for a potential HIPAA compliance audit is to complete a "walk through" to make sure privacy and security policies and procedures are practical and effective, former HIPAA enforcer Adam Greene advises.

Jul 18, 2011