Data Breach Today Podcast

  • Author: Vários
  • Narrator: Vários
  • Publisher: Podcast
  • More information

Informações:

Synopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodes

  • Breach Legislation: The Next Generation

    28/11/2011

    It's a new wave of cybercriminal behind the latest major data breaches, says breach expert Lucy Thomson. And these incidents are resulting in a new generation of breach notification laws globally.

  • Influencing Policy, If Not the Law

    23/11/2011

    Jacob Olcott says Congress' failure to enact comprehensive cybersecurity legislation over the past half decade doesn't mean lawmakers haven't influenced IT security policy.

  • Fraud Victim: FFIEC Guidance Lacking

    21/11/2011

    ACH fraud victim Mark Patterson says small businesses like his welcome improved online security measures from banking institutions. But is the new FFIEC Authentication Guidance sufficient? Patterson says no.

  • How Training Helps Prevent Breaches

    14/11/2011

    A lack of ongoing HIPAA compliance training increases the risk of internal breaches, says Terrell Herzig, information security officer at UAB Medicine.

  • Making the Business Case for Security

    11/11/2011

    Winning senior executive support for information security spending requires "a solid business case of justifications," says Christopher Paidhrin, security compliance officer at PeaceHealth Southwest Medical Center.

  • HIPAA Compliance: A New Attitude

    10/11/2011

    Ramped up HIPAA enforcement is a big reason behind the No. 1 information security priority for the coming year: improving regulatory compliance, says attorney Adam Greene.

  • BofA on Mobile Risk and Security

    10/11/2011

    Bank of America's Keith Gordon says securing the mobile channel is much like securing any other banking channel: Controlling risks requires layers of security and controls. But educating customers plays a key security function, too.

  • Breach Resolution: A Success Strategy

    07/11/2011

    One reason why so many healthcare organizations are not well-prepared to counter security threats is that "key leadership has not bought into the whole process," says Bob Krenek of Experian® Data Breach Resolution.

  • Winning Funding for Info Security

    07/11/2011

    Penetration tests that demonstrate how an unauthorized user could gain access to patient information can be effective in winning support for a bigger information security budget, says David Kennedy of Diebold, Incorporated.

  • ID Theft: How to Help Consumers

    31/10/2011

    ID theft expert Joanna Crane wonders whether banks, government agencies and healthcare providers do enough to assist consumers with ID theft recovery, saying consumer expectations are often loftier than what's being done to meet the demand.

  • VA's Plan for Mobile Device Security

    20/10/2011

    Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.

  • BlackBerry Episode Strikes at IT Security Tenet

    13/10/2011

    Winn Schwartau says the BlackBerry disruption this past week (see BlackBerry Disruptions: Where to Start?) hit at the heart of one of the fundamentals of IT security: availability.

  • The App Sec Pro and the Shark

    13/10/2011

    When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.

  • Interview: The New HIPAA Enforcer

    03/10/2011

    Leon Rodriguez, the new director of the Department of Health and Human Services' Office for Civil Rights, describes his HIPAA enforcement agenda.

  • 7 Steps to Secure Mobile Devices

    30/09/2011

    Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.

  • PCI: Merchants Still Fall Short

    28/09/2011

    Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.

  • Social Media: Why Training Is Key

    02/09/2011

    Frequent face-to-face training on social media policies is a vital component of any risk management effort, says consultant Erika Del Giudice.

  • Facial Biometrics Pose Privacy Woes

    29/08/2011

    Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the biometric technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the biometric data, cautions a privacy rights leader.

  • Infosec in a Decentralized Environment

    23/08/2011

    Give a man a fish, you feed him for today, the proverb says. Teach a man to fish; and you feed him for a lifetime. That adage can be applied to information security, as well.

  • Creating a Culture of Security

    08/08/2011

    Yahoo's Justin Somaini believes his fellow CISOs in business and government do a good job keeping their bosses informed of proper information security practices, but could do better in educating the rank and file about them.

page 140 from 144