PLAY PODCASTS
Info Risk Today Podcast

Info Risk Today Podcast

3,490 episodes — Page 70 of 70

The Bridge to Chip and PIN

<b>Mobile technology will play a dominant role in future U.S. payments and could bridge the gap between magnetic-stripe cards and <a href="/us-ready-for-chip-pin-a-2593"><b>EMV</b></a> chip and PIN</b>.

Sep 24, 2010

Why the U.S. Must Adopt EMV

Richard Oliver is the first U.S. banking industry executive to publicly declare that a U.S. migration to the EMV payments standard is inevitable.

Sep 20, 2010

Huntington CIO's Risk Management Agenda

Insights on fraud, mobile banking, social networking and other top trends impacting banking/security leaders.

Sep 20, 2010

BankInfoSecurity.com Week In Review for Friday, Sept. 17, 2010

Week In Review: What Closed Chase Bank Site?; BofA Tests Mobile Payments

Sep 17, 2010

CUInfoSecurity.com Week In Review for Friday, Sept. 17, 2010

Week In Review: What Closed Chase Bank Site?; BofA Tests Mobile Payments

Sep 17, 2010

Bank of America Tests Mobile Payments

Bank of America is extending its mobile financial offer, giving contactless chip-based payments another shot in the U.S.

Sep 16, 2010

Mobile Banking: Guidance is Coming

William Henley, senior vice president of regulation for BITS, says banking institutions can expect new mobile banking regs and guidance in the near future.

Sep 13, 2010

CUInfoSecurity.com Week In Review for Friday, Sept. 10, 2010

Week In Review: Visa Suspends ePassporte Prepaid Cards, and Is Infosec Worker Need Underestimated?

Sep 10, 2010

BankInfoSecurity.com Week In Review for Friday, Sept. 10, 2010

Week In Review: Visa Suspends ePassporte Prepaid Cards, and Is Infosec Worker Need Underestimated?

Sep 10, 2010

CUInfoSecurity.com Week In Review for Friday, Sept. 3, 2010

Week In Review: Church Latest Victim of ACH Fraud; Heartland, Discover Settle for $5 million

Sep 3, 2010

BankInfoSecurity.com Week In Review for Friday, Sept. 3, 2010

Week In Review: Church Latest Victim of ACH Fraud; Heartland, Discover Settle for $5 million

Sep 3, 2010

Mobile Banking: The Pioneer's Perspective

<b>Bank of America is one of the leaders in mobile banking. Marc Warshawsky, SVP, discusses the bank's growth plans over the next year.</b>

Aug 31, 2010

CUInfoSecurity.com Week in Review: Aug. 27, 2010

A review of this with week's top stories by managing editor Tracy Kitten: California Eyes Stronger Privacy Law; Mobile Banking: It's Not About ROI.

Aug 27, 2010

Mobile Banking: It's Not About ROI

Tommy Sanderson, manager of electronic delivery for Miss.-based Renasant Bank, says when it comes to mobile banking, "We just want to keep on talking about it."

Aug 26, 2010

Secure Image Transport: 'Buy, Don't Build'

<b>Boeing Employees' Credit Union Ensures Monetary Exchanges Security</b>

Aug 20, 2010

CUInfoSecurity.com Week in Review: Aug. 13, 2010

PCI Updates Won't Include New Requirements, and 3 Security Concerns Credit Unions Should Consider Before Going Mobile

Aug 13, 2010

3 Security Challenges of Mobile Banking

<b>Interview with Anthony Vitale of Patelco Credit Union, regarding the primary security concerns financial institutions face when it comes to mobile banking.</b>

Aug 10, 2010

Case Study: Securing Mobile Devices

<b>Interview with Fred Cruz of American Hospice about virtual private network project.</b>

Aug 4, 2010

The Dangers of Consumerization

<b>Insights from Gartner's John Pescatore on Evolving Security Threats, Solutions.</b>

Jul 21, 2010

Mobile RDC: What About Security?

<b>Bob Meara of Celent says mobile remote deposit capture service won't pose heightened threat of fraud.</b>

Jul 9, 2010

Marcus Ranum on Today's Top Threats

<b>Information security thought-leader weighs in on the biggest risks to consumers and businesses - including social media and portable technology.</b>

Jul 7, 2010

It's Time to 'Take Security Out of the Closet'

<b>Jonathan Penn of Forrester Research on Cloud Computing, Mobility and Other Hot Emerging Technologies.</b>

Jul 2, 2010

Editor's Choice: April's Top Banking News, Views

Fraud - its forms and reforms - was the top news story in April. Listen to this audio overview of the month's top news items, including: <p><div id="blist">Hancock Breach Reveals New Trend; </div> <div id="blist">P2P Payments: Simple, Secure Transactions; </div> <div id="blist">How Do You Recover Your Reputation? </div>

Apr 29, 2010

P2P Payments: Simple, Secure Transactions

<b>Interview with Howie Wu, VP Virtual Banking, Boeing Employees Credit Union</b> <p>Increasingly, consumers long for a simple payment solution that allows them to send money to family and friends via email or text message. <p>Boeing Employees Credit Union (BECU), Washington's largest credit union, is at the forefront of the person-to-person (P2P) payments revolution. And in an exclusive interview, Howie Wu, VP of Virtual Banking, at BECU, discusses: <div id='blist'>How BECU's Popmoney initiative was deployed;</div> <div id='blist'>Security challenges that had to be addressed;</div> <div id='blist'>Tips for other institutions looking to offer P2P payments</div>. <p> Wu has over 10 years experience in the financial services and information technology industries and has been with BECU since 2003. In his role as the Vice President of Virtual Banking, he is responsible for leading BECU's strategy as it relates to all remote delivery channels. He has played a major role in defining and implementing changes that impact the member experience within the ATM, online, telephone and mobile channels. <p>He earned a B.A. in Accounting and a MBA in Information Systems from Washington State University. His professional interests include IT, finance and business leadership. He also participates as a panelist in various industry forums and is a member of several financial technology committees.

Apr 8, 2010

RSA 2010: Warren Axelrod on Information Security

C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including: <div id='blist'>Insider fraud; </div> <div id='blist'>Application security; </div> <div id='blist'>Cloud computing. </div> <p>Axelrod is currently executive advisor for the Financial Services Technology Consortium. Previously, he was a director of Pershing LLC, a BNY Securities Group Co., where he was responsible for global information security. He has been a senior information technology manager on Wall Street for more than 25 years, has contributed to numerous conferences and seminars, and has published extensively. He holds a Ph.D. in managerial economics from Cornell University, and a B.Sc. in electrical engineering and an M.A. in economics and statistics from Glasgow University. He is certified as a CISSP and CISM. <p><div style="float:right; padding:10px;"><a href="/rsa2010.php"><img src="images/rsacoverage.jpg" width="300" height="48" border="0" /></a></div>

Mar 5, 2010

What's Happening with the Trusted Internet Connection?

<b>Matt Coose<br> Director, Federal Network Security<br> National Cybersecurity Division<br> Department of Homeland Security</b> <p>As director of federal network security at the Department of Homeland Security's National Cybersecurity Division, Matt Coose is helping shepherd the Trusted Internet Connection initiative, which aims to reduce the number of connections linking executive branch IT networks to the Internet to 100 or fewer from thousands upon thousands. <p>The basic concept behind TIC, initiated in 2007 by the Bush administration, is that by drastically reducing the number of access points, the government could more easily monitor and identify potentially malicious traffic. <p>In the interview, Coose: <div id='blist'>Reveals the number of TIC and non-TIC connections that now exist.</div> <div id='blist'>Explains the shift in TIC strategy by the Obama administration.</div> <div id='blist'>Discusses the architecting of TIC 2.0 to include the Einstein 2 intrusion detection system.</div> <p>Coose, a West Point graduate and former Army captain, was interviewed by GovInfoSecurity.com's Eric Chabrow.

Mar 1, 2010

Do Consumers Want Mobile Banking? - SWACHA's Dennis Simmons on Electronic Payment Trends

How strongly do consumers embrace electronic bill payments, and do they really want mobile banking as much as industry analysts say they do? <p>These were the questions on Dennis Simmons' mind when his trade organization, SWACHA, the electronics payments resource, launched a recent survey on consumer usage of electronic payments. <p>In an exclusive interview, Simmons discusses: <div id='blist'>Survey results and their message to banking institutions;</div> <div id='blist'>Payment/security threats currently menacing the financial services industry;</div> <div id='blist'>Ways institutions can help vulnerable businesses fight fraud.</div> <p>Simmons has over 20 years experience as the senior operations officer of several Dallas area banks. A frequent speaker and recognized expert on payments system issues, he is currently a member of the Board of NACHA, the immediate Past Chair of NACHA's Electronic Check Council and immediate past Co-Chair of NACHA's Risk Management Advisory Group. He was recognized by Transaction World as one of its 2007 "Movers and Shakers" in the payments business and is the recipient of two public service awards from the Federal Bureau of Investigation (FBI). He is an Accredited ACH Professional (AAP). <p>SWACHA is an official source for the ACH Operating Rules and represents its members in national issues and the rule-making process. SWACHA's mission is to be the resource of choice for education, training, representation and knowledge regarding payments and payments system risk.

Jun 29, 2009

Mobile Banking Update: What's New from Bank of America?

Doug Brown Discusses Mobile Strategy, New Products, Biometric Security <p>Bank of America was one of the first institutions to move toward mobile banking in a big way. Two years into the initiative, Doug Brown, SVPO of Mobile Product Development, discusses: <p><div id="blist">Mobile trends at BoA;</div> <div id="blist">Security hurdles the institution has faced;</div> <div id="blist">Advice for other institutions now getting into mobile banking.</div> <p>Brown leads the eCommerce Product Development team at Bank of America, where he is responsible for strategy and new product development for online banking, mobile banking and ATM. Most recently, Brown led the successful launch of the Bank of America mobile banking and bill pay products. He has an extensive background in marketing and technology strategy in the financial services, software and telecommunications industries.

Jun 8, 2009

New Banking Services: Growth Among Community Banks - Insights from Christine Barry of Aite Group

According to the 2009 Banking Information Security Today survey, banking institutions - despite the economy - are investing in new banking services, i.e. mobile banking and remote capture. <p>To gain further insight into spending trends, we spoke with Christine Barry, research director with Aite Group, on: <p><div id="blist">Mobile banking trends;</div> <div id="blist">Other new banking services; </div> <div id="blist">Post-recession growth areas. </div> <p>Christine Barry serves as a Research Director at Aite Group LLC, focusing on the strategies and technology implementations of global banks of all sizes. Her recent research has addressed remote deposit capture, best-practices for credit unions, capturing the valuable small-business customer, global cash management trends, and core banking system replacement. She is an acknowledged banking industry expert with more than a decade of experience in financial services products and technologies. She has worked with a broad range of U.S. and international clients analyzing industry trends and identifying market opportunities, product gaps and potential partners to help them achieve their strategic IT goals.

May 21, 2009

BAI 2008 Retail Delivery Conference - Vendor Interviews

The annual BAI Retail Delivery Conference & Expo was held in Orlando, Fl in late November, focusing on innovative strategies and technologies. <p>Nick Burke, Director of Sales for Information Security Media Group (ISMG), publisher of BankInfoSecurity.com and CUinfoSecurity.com, attended the event, meeting with many of the banking/technology leaders sponsoring the conference. Among the key themes resonant in Burke's discussions with these leaders: <ul> <li>Risk Management <li>Fraud Prevention <li>Regulatory Compliance <li>Mobile Banking <li>ATM Security </ul> <p> See below for a selection of interviews performed at the conference. Click a company name to visit their website. <p><a href="http://www.bai.org/retaildelivery/" target="_blank">> Visit the conference website</a> <br> <br> <b>Vendors interviewed:</b> <ul> <li><a href="http://www.ncr.com" target="_blank"><strong>NCR</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-1-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=ncr.swf', 'ap3')">Streaming </a> <li><a href="http://www.microsoft.com" target="_blank"><strong>Microsoft</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-2-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=microsoft.swf', 'ap3')">Streaming </a> <li><a href="http://www.att.com" target="_blank"><strong>AT&T</strong> </a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-3-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=att.swf', 'ap3')">Streaming </a> <li><a href="http://www.digital-resolve.net/" target="_blank"><strong>Digital Resolve</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-4-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=digitalresolve.swf', 'ap3')">Streaming </a> <li><a href="http://www.profitstars.com/" target="_blank"><strong>ProfitStars</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-5-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=profitstars.swf', 'ap3')">Streaming </a> <li><a href="http://www.equifax.com/home/" target="_blank"><strong>Equifax</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-6-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=equifax.swf', 'ap3')">Streaming </a> <li><a href="http://www.levelfour.com/americas.htm" target="_blank"><strong>Level Four</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-7-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=levelfour.swf', 'ap3')">Streaming </a> <li><a href="http://www.vasco.com" target="_blank"><strong>Vasco</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-8-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=vasco.swf', 'ap3')">Streaming </a> <li><a href="http://www.harlandfinancialsolutions.com/" target="_blank"><strong>Harland Financial Solutions</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-9-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=harland.swf', 'ap3')">Streaming </a> <li><a href="http://www.metavante.com" target="_blank"><strong>Metavante</strong></a> | <a href="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/bai-2008-retail-delivery-conference-vendor-interviews-eresource-10-i-160.mp3"> MP3</a> | <a href="javascript:openAudioWindow3('showBAIPodcast.php?swfFile=metavante.swf', 'ap3')">Streaming </a> <l

Nov 26, 2008

How to Avoid Being a Victim of Multi-Channel Fraud

<b>The crime of deception is now even more deceptive.</b> <p>Multi-channel fraud - schemes that are launched simultaneously via telephone, Internet, in person and via mail - is a growing concern for financial institutions. And the linked crimes aren't always easy to spot. <p>In this exclusive interview, security expert Diana Kelley discusses: <p> <ul> <li>The types of multi-channel fraud now prevalent in the marketplace; </li> <li>How these attacks are launched; </li> <li>Ways institutions can spot and respond to the threat. </li> </ul> <p>Diana Kelley founded SecurityCurve in April of 2003. She has extensive experience creating secure network architectures and business solutions for large corporations and delivering strategic, competitive knowledge to security software vendors. <p>Prior to returning to SecurityCurve in January 2008, she was Vice President and Service Director for the Security and Risk Management Strategies (SRMS) service at Burton Group. Diana was the Executive Security Advisor for CA's eTrust Business Unit. At CA she was responsible for advising customers on strategic security solutions and helped guide CA's security business. <p>She served as the Vice President of Security Technology for Safe3W, Inc (acquired by iPass), a provider of strong, two factor authentication. Representing Safe3W she was actively involved in the Technical Group for NACHA's Project Action. And she was a security industry Analyst with Baroudi Bloor, a top-tier analyst firm where she delivered strategic advice to, among others, IBM and Psionic (acquired by Cisco.)

Oct 22, 2008

Banking Bailout: "It's All About Restoring Confidence"

<b>Insights on the Federal Rescue Plan - an Interview with Guillermo Kopp of TowerGroup</b> <p>Tuesday's news was mainly about Wall Street, with the U.S. government pledging to invest up to $125 billion in nine of the nation's largest banks. <p>But Main Street banking institutions and their customers will be the ultimate beneficiaries of this financial boost, says one industry analyst. <p>"It's all about restoring confidence in the banking system," says Guillermo Kopp, Executive Director and Global Research Fellow at TowerGroup, the Boston-based financial services research and advisory firm. "This is an interdependent system, and it's important to ensure that banks don't hurt, because they sustain the economy." <p>In an exclusive interview, Kopp discusses what this investment truly means to the banking industry, sharing insight on: <ul> <li>Ways financial services organizations of all sizes will benefit from government investment; <li>How banking institutions can step up and reinforce customer confidence; <li>Immediate business priorities for these institutions; <li>Outsourcing trends in the near term. </ul>

Oct 15, 2008

Application Security Over-Confidence: Facts & Myths Revealed

<b>Leading Technology Vendor Discusses the Need for Vulnerability Assessments & Remediation Processes for Applications Whether Developed In-House or By a Third-Party</b> <p>Application security is a key focus of regulatory agencies - ensuring that financial institutions pay as much attention to third-party applications as they do to those they develop and manage in-house. In a recent survey conducted by Information Security Media Group, respondents say they are more confident in their own applications vs. those developed by third-party service providers ... yet, they really don't demonstrate vulnerability assessment or remediation processes to justify any level of confidence. <p>In this exclusive interview, Roger Thornton, founder and CTO of Fortify Software, discusses the survey results and his own market perspective, discussing: <p> <ul> <li>How the survey results jibe with what he sees from customers;</li> <li>What's beneath the disconnect between confidence and processes?</li> <li>What are some of the proactive, cost-effective ways companies can tackle application security?</li> </ul>

Sep 22, 2008

Online Banking: 'Deputizing Our Customers' at Bank of America - Notes from RSA Conference Day 2

Bank of America is well known for its mobile banking services. Currently, the institution has 750,000 mobile banking customers receiving services on 400 different kinds of devices. <p>But did you realize that one of the ways BoA secures its electronic offerings is by providing its customers with abuse reporting capabilities? <p>Listen to this dispatch from editor Tom Field to hear more about BoA's online initiatives, as well as to hear insights from a Fifth Third Bank executive on forensics and e-discovery.

Apr 10, 2008

Exclusive Insights from Security Solutions Leaders: RSA Conference 2008

<b>Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives</b> <p>The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all. <p>So, the Information Security Media Group team did the job for you, visiting with more than 60 vendors of particular interest to banking and security leaders. <p><b>Click on the following links to listen to our exclusive interviews with these vendors.</b> <p> <script language='javascript'><!-- function changePodcastTabBox2(i) { var currentTab = 'tab' + i; for ( var j = 0; j < 3; j++) { var podcastTab = 'podcastTab' + j; var currentTab = 'tab' + j; if (j != i) { document.getElementById(podcastTab).className='tabBox2'; document.getElementById(currentTab).style.display='none'; } else { document.getElementById(podcastTab).className='tabBox2On'; document.getElementById(currentTab).style.display='block'; } } } --></script> <table border=0 cellpadding=0 cellspacing=0 width=350 style='border-left: 1px solid #AB924F;'> <tr> <td id='podcastTab0' class='tabBox2On' nowrap onClick="changePodcastTabBox2(0)" ><a href='javascript: void(0);'>A - F</a></td> <td id='podcastTab1' class='tabBox2' nowrap onClick="changePodcastTabBox2(1)" ><a href='javascript: void(0);'>G - Q</a></td> <td id='podcastTab2' class='tabBox2' nowrap onClick="changePodcastTabBox2(2)" ><a href='javascript: void(0);'>R - Z</a></td> <td width='100%' style='border-bottom: 1px solid #AB924F;'><img src='images/blank.gif' width=1 height=1 alt='' border=0></td> </tr> <tr> <td colspan=4 style='border-bottom: 1px solid #AB924F; border-right: 1px solid #AB924F; padding: 10px;'> <div id='tab0'><table border=0 cellpadding=4 cellspacing=1><tr><td><div class='lrgFont'><a href='http://www.8e6.com' target='_blank'>8e6 Technologies</a></div></td><td nowrap><a href='https://www.bankinfosecurity.com/podcasts/rsa2008-vendors/rsa2008-8e6-technologies.mp3'>Download MP3</a> | <a href="javascript:openAudioWindow3('showRSAPodcast.php?swfFile=rsa2008-8e6.swf', 'ap3')">Streaming</a></td></tr><tr bgcolor='#DDDDDD'><td><div class='lrgFont'><a href='http://www.actividentity.com' target='_blank'>ActivIdentity</a></div></td><td nowrap><a href='https://www.bankinfosecurity.com/podcasts/rsa2008-vendors/rsa2008-active-identity.mp3'>Download MP3</a> | <a href="javascript:openAudioWindow3('showRSAPodcast.php?swfFile=rsa2008-active-identity.swf', 'ap3')">Streaming</a></td></tr><tr><td><div class='lrgFont'><a href='http://www.adobe.com' target='_blank'>Adobe</a></div></td><td nowrap><a href='https://www.bankinfosecurity.com/podcasts/rsa2008-vendors/rsa2008-adobe.mp3'>Download MP3</a> | <a href="javascript:openAudioWindow3('showRSAPodcast.php?swfFile=rsa2008-adobe.swf', 'ap3')">Streaming</a></td></tr><tr bgcolor='#DDDDDD'><td><div class='lrgFont'><a href='http://www.airdefense.net' target='_blank'>AirDefense</a></div></td><td nowrap><a href='https://www.bankinfosecurity.com/podcasts/rsa2008-vendors/rsa2008-air-defense.mp3'>Download MP3</a> | <a href="javascript:openAudioWindow3('showRSAPodcast.php?swfFile=rsa2008-airdefense.swf', 'ap3')">Streaming</a></td></tr><tr><td><div class='lrgFont'><a href='http://www.algosec.com' target='_blank'>AlgoSec</a></div></td><td nowrap><a href='https://www.bankinfosecurity.com/podcasts/rsa2008-vendors/rsa2008-algosec.mp3'>Download MP3</a> | <a href="javascript:openAudioWindow3('showRSAPodcast.php?swfFile=rsa2008-algosec.swf', 'ap3')">Streaming</a></td></tr><tr bgcolor='#DDDDDD'><td><div class='lrgFont'><a href='http://www.appsecinc.com' target='_blank'>Application Security</a></div></td><td nowrap><a href='https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/interviews/exclusive-insights-from-security-solutions-leaders-rsa-conference-2008-eresource-1-i-110.mp3'>Download MP3</a> | <a href="javascript:openAudioWindow3('showRSAPodcast.php?swfFile=rsa2008-application-security.swf', 'ap3')">Streaming</a></td></tr><tr><td><div class='lrgFont'><a href='http://www.arcsight.com' target='_blank'>ArcSight</a></div></td><td nowrap><a href='https://www.bankinfosecurity.com/podcasts/rsa2008-vendors/rsa2008-arcsight.mp3'>Download MP3

Apr 9, 2008

Mark Lobel of Price Waterhouse Coopers: Update on Recent Information Security Trends

In this Information Security Media Group podcast Mark Lobel of PriceWaterhouseCoopers speaks to our audience and updates on recent trends in info security and the importance of effective benchmarking. <p>Mark Lobel is a nationally known expert in information security who leads the PriceWaterhouseCoopers annual survey of Information Security trends. This podcast summarizes his latest findings regarding changing threats, convergence of security functions, and why despite a decrease in certain attacks many organizations are unable to know what is happening on their networks. He also discusses the importance of benchmarking and the components of effective metrics and benchmarking programs. <p> The importance of actionable information and use of Security Information Management systems <p> Changes in information security convergence and its return to an IT focus <p> What factors predict fewer breaches and lower downtime <p> Why many firms admit they really don't know what is occurring on their networks

Sep 11, 2007

Take Ten Podcast with Rhonda MaClean

Listen to this latest podcast on CUInfoSecurity.com. You'll hear Rhonda MaClean, former CISO of Bank of America's take on the following: <p>· The TJX data breach - these kinds of problems are not going away <br>· What's important about getting back to basics of information security <br>· Customers' trust in the financial institutions and online banking <br>· Handling the expectations between regulatory bodies and financial institutions <br>· What hasn't reared its full and ugly head yet - botnets. <p> Rhonda has more than 25 years of IT industry experience, and travels the globe consulting for Fortune-ranked business enterprises, governments, industry associations and risk management solution companies. Rhonda serves as an Adjunct Distinguished Senior Fellow with Carnegie Mellon University's CyLab, helping CyLab to continue to pursue an aggressive research and development agenda that integrates technology, policy and management by bringing together security professionals, researchers and policymakers. <p>Prior to founding MacLean Risk Partners, she was leader of Bank of America's Corporate Global Information Security Group. For 10 years Rhonda was responsible for the Bank's security policies; information risk management; security and risk technology implementations; cyber investigations; computer forensics; and general information risk management awareness for the company's leadership, associate base, and outside suppliers. Immediately before joining Bank of America in 1996, she was responsible for information security at The Boeing Company, managing its proprietary and government programs. <p>Rhonda was appointed in 2002 by the U.S. Treasury Financial Services Sector Coordinator where she founded and served as the first chairperson of the Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security. In addition to serving as chairperson emeritus of the Council, she sits on the Global Council of CSOs-composed of computer security thought leaders from the public, private, and academic sectors. The Executive Women's Forum in 2003 named her one of five "Women of Vision" shaping the information security industry; she has twice been named one of the 50 most powerful people in computer networking by Network World.

Apr 9, 2007

The Case for Privileged ID Management

If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.

Jan 1, 1970

Fighting the Mobile Malware Hydra

Every organization is concerned about malware - how it evolves, slips past multilayered defenses and infects networks. John Nielsen, Product Manager for IBM Mobile Security, discusses the latest malware trends and steps organizations may take to fight back.

Jan 1, 1970

Brent Williams

Brent discusses deploying multi-factor authentication to mega-enterprises with millions of end-users, knowledge-based authentication user enrollment, and how educational institutions are utilizing multi-factor authentication solutions.

Jan 1, 1970