Data Breach Today Podcast

  • Author: Vários
  • Narrator: Vários
  • Publisher: Podcast
  • More information

Informações:

Synopsis

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Episodes

  • Breach Notification Planning Tips

    29/04/2011

    "Breach notification planning is just a fundamental, basic part of risk management in the new millennium," says security expert Bob Chaput.

  • Security Testing Comes of Age

    27/04/2011

    Four years ago, the Council of Registered Ethical Security Testers began as an organization to bring standardization to the penetration testing industry. Today, CREST's scope is expanding across industries and global regions, says president Ian Glover.

  • Physical Security: Timely Tips

    25/04/2011

    Security expert Andrew Weidenhamer offers insights on physical security measures that can help prevent breaches.

  • Hidden Files on iPhone Pose Risk

    23/04/2011

    IT security and privacy lawyer David Navetta says revelations that mobile devices such as the iPhone, iPad and Android maintain hidden files tracking users locations could pose a threat to organizations, regardless of whether the devices are owned by individual employees, the company or government agency for which they work.

  • Governance: It's All About Risk

    21/04/2011

    From mobile devices to social media and cloud computing, IT governance is all about risk management. "You can't de-risk everything, but you can de-risk the majority of circumstances you will see in normal operations," says governance expert Robert Stroud.

  • Data Breaches: Inside the 2011 Verizon Report

    19/04/2011

    The latest Verizon Data Breach Investigations Report is out, and the good news is: The number of compromised records is down. The troubling news is: The number of breaches is up. Bryan Sartin, one of the report authors, explains why.

  • Cloud Computing: A Case Study

    15/04/2011

    Altra Federal Credit Union developed a calculated strategy before moving to the cloud -- advice all financial institutions should follow, says Brian Boettcher, VP of IT, who shares his lessons learned.

  • Epsilon Breach: Time to 'Come Clean'

    06/04/2011

    When it comes to e-marketing and the reliance on third parties such as Epsilon, Nicolas Christin of Carnegie Mellon University says banks and merchants should "come clean" about the information they share with outside entities.

  • Epsilon Breach: Risks and Lessons

    05/04/2011

    Privacy Attorney Lisa Sotto says the Epsilon e-mail breach is a warning about the state of data security employed by some third-party service providers. Strong contracts related to security practices must be the norm, not the exception.

  • RSA Breach: A CISO's Action Items

    25/03/2011

    Terrell Herzig, CISO at UAB Medicine, speaks out on steps steps he's taking in the wake of the RSA SecurID attack.

  • RSA Breach: Customer's Perspective

    22/03/2011

    Marcus Ranum isn't just a well-regarded information security expert. He's also a customer of the RSA SecurID product, and he's got some strong feelings about the RSA breach and how the industry has responded to it.

  • Special Report: The RSA Breach and its Impact

    18/03/2011

    The announcement by RSA that it had been a victim of an advanced persistent threat shook the global information security industry. Stephen Northcutt of SANS Institute and David Navetta of the Information Law Group offer insight on what happened, what it means and how to respond.

  • RSA Breach: 'Not a Game-Changer'

    18/03/2011

    It's serious news that RSA's SecurID solution has been the target of an advanced persistent threat. But "It's not a game-changer," says Stephen Northcutt, CEO of SANS Institute. "Anybody who says it is [a game-changer] is an alarmist."

  • Legal View of RSA Breach

    18/03/2011

    "Persistent" is the operative word about the advanced persistent threat that has struck RSA and its SecurID products. "If the bad guys out there want to get to someone ... they can," says David Navetta of the Information Law Group.

  • 5 Tips for Securing SmartPhones

    18/03/2011

    Smartphones are ubiquitous in organizations today. But how secure are these devices -- and what are the security and liability vulnerabilities associated with their use?

  • Australia: Cyber Crime Fight

    16/03/2011

    Australia's government agencies can learn a lot from the nation's banks, when it comes to risk management and protecting privacy, says Graham Ingram, General Manager of the Australian Computer Emergency Response Team. "There are too many people in government organisations who are in denial [of risks]," he says.

  • Breach Notification and National Security

    08/03/2011

    Today's technology is not adequately used, says attorney Lucy Thomson.

  • Patrick Bedwell

    05/03/2011

    Patrick discusses how to consolidate network traffic monitoring into a single appliance and management console, along with web application security and PCI compliance.

  • Overlooked Breach Prevention Steps

    28/02/2011

    Terrell Herzig, information security officer at UAB Medicine, pinpoints frequently overlooked breach prevention steps.

  • Cybersecurity: Firewalls Are Easy to Pierce

    15/02/2011

    The 451 Group's Joshua Corman says merely complying with stagnant standards won't ensure security.

page 142 from 144