Cover image of Data Breach Today Podcast
(10)
Business

Data Breach Today Podcast

Updated 1 day ago

Business
Read more

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Read more

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

iTunes Ratings

10 Ratings
Average Ratings
6
2
0
1
1

Hey

By freechicken - Jun 21 2019
Read more
Hey

iTunes Ratings

10 Ratings
Average Ratings
6
2
0
1
1

Hey

By freechicken - Jun 21 2019
Read more
Hey

Listen to:

Cover image of Data Breach Today Podcast

Data Breach Today Podcast

Updated 1 day ago

Read more

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

PSD2: The Compliance and Enforcement Update

Podcast cover
Read more
The EU's second Payments Services Directive is alive and well. But where are financial institutions now re: compliance and enforcement? James Rendell of CA Technologies, a Broadcom company, offers insight on PSD2 and EMV 3DS compliance for 2020.

Dec 04 2019

Play

Life Under GDPR: Data Breach Cost Unknown

Podcast cover
Read more
GDPR has been in effect since May 2018, but organizations are still waiting to see what impact it will have on the costs organizations might face from breach cleanup, investigations, sanctions and class action lawsuits, says Ian Thornton-Trump of the financial services firm AMTrust International.

Jan 22 2019

Play

Spotlight on Zero Trust Network Access

Podcast cover
Read more
The promise of cloud and mobility is to provide access to key services quickly and from anywhere at any time from any device. Zscaler's Lisa Lorenzin opens up on zero trust network access technologies, which provide a secure alternative to legacy methods.

Jul 30 2019

Play

Complying With New York's SHIELD Act

Podcast cover
Read more
What should healthcare organizations know about complying with the breach notification and data security requirements of New York's SHIELD Act? And how does the new law compare with HIPAA? Jon Moore, chief risk officer at consulting firm Clearwater, explains.

Oct 10 2019

Play

Highlights of RSA Conference

Podcast cover
Read more
The latest edition of the ISMG Security Report features updates from RSA Conference 2019 on IoT and the cloud, GDPR compliance challenges and much more.

Mar 08 2019

Play

Using Machine Learning for Fraud Prevention

Podcast cover
Read more
Machine learning can play an important role in fraud prevention at financial institutions, says Marc Trepanier of ACI Worldwide, who addresses the challenges involved.

Mar 13 2019

Play

Executive Roundtable Recap: Securing the Digital Enterprise

Podcast cover
Read more
ISMG and Fortinet hosted a roundtable dinner in Nashville, TN on May 15 focused on "Securing the Digital Enterprise". Challenges in gaining internal buy in for security initiatives and the problems of M&A activity were discussed, and Sonia Arista, National Healthcare Lead of Fortinet provided her insight on the event in this exclusive interview.

May 24 2019

Play

WannaCry Still Causing Tears 2 Years On

Podcast cover
Read more
The latest edition of the ISMG Security Report assesses the legacy of WannaCry ransomware two years on. Also featured: the evolving role of healthcare CISOs; threat mitigation recommendations based on the 2019 Verizon Data Breach Investigations Report.

May 24 2019

Play

Ransomware: A Pervasive, Evolving Threat

Podcast cover
Read more
Leading the latest edition of the ISMG Security Report is an in-depth look at why ransomware remains a pervasive threat and how it's evolving. Also featured: updates on venture capital investments in cybersecurity and a study of vulnerabilities in industrial remotes.

Jan 18 2019

Play

Analysis: The Capital One Breach

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: breach remediation advice and compliance with New York's new third-party risk management requirements.

Aug 02 2019

Play

Darknet Markets: As Police Crack Down, Cybercriminals Adapt

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses the shutdown of DeepDotWeb. Plus, dealing with breach fatigue and the Pitney Bowes ransomware attack.

Oct 18 2019

Play

Stung by Takedowns, Criminals Tap Distributed Dark Markets

Podcast cover
Read more
Law enforcement success inevitably sparks criminals to become more innovative, including shifting from centralized markets - such as Hansa and Wall Street Market - to encrypted and distributed marketplaces, says the University of Surrey's Alan Woodward.

Oct 15 2019

Play

DeepDotWeb Goes Dark

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the FBI takedown of DeepDotWeb, a dark net portal. Also featured are discussions on healthcare app security and the repercussions of poor coding security.

May 10 2019

Play

How Has FTC Data Security Enforcement Changed?

Podcast cover
Read more
In the wake of a federal appeals court ruling last year vacating a Federal Trade Commission enforcement action against LabMD, the FTC's data security consent orders are becoming far more detailed and rigorous, says former FTC attorney Julie O'Neill.

Oct 15 2019

Play

Capturing ROI on Your Unified Endpoint Management Investment

Podcast cover
Read more
Unified endpoint management exists because devices have grown in number, variety and complexity of how they're being used in the workplace. So how should IT and security leaders approach UEM? John Harrington Jr. and Ryan Schwartz of IBM MaaS360 with Watson share insight.

May 14 2019

Play

Verizon DBIR: C-Level Executives in the Crosshairs

Podcast cover
Read more
C-level executives are 12 times more likely to be the target of social incidents and nine times more likely to be the target of social breaches. This is among the key findings of the latest Verizon's Data Breach Investigations Report. Author John Grim shares insight.

May 22 2019

Play

WhatsApp Exploit Reveals 'Legalized Hacking' at Work

Podcast cover
Read more
Attackers exploiting a buffer overflow in WhatsApp's signaling software to automatically infect devices with malware - without users even having to answer their phone - and then alter call logs to hide attack traces is "a bit of a nightmare scenario," says cybersecurity expert Alan Woodward.

May 14 2019

Play

How 'Zero Trust' Better Secures Applications and Access

Podcast cover
Read more
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.

Oct 17 2019

Play

Getting Smarter About Threat Intelligence

Podcast cover
Read more
Threat intelligence sharing is all about trust, speed and context. And yet many enterprise intel programs lack one or more of those qualities. Jon Clay of Trend Micro discusses what it takes to stand up a customized threat intelligence program.

Jan 21 2019

Play

Guarding Against Cybertheats Targeting End Users

Podcast cover
Read more
Guarding against threats targeting end users is among the top security priorities this year at a large group of surgical centers in Washington state - and artificial intelligence could play an important role, says CIO Curt Kwak of Proliance Surgeons.

Feb 28 2019

Play

How This CISO Handles Security in Multiple Business Sectors

Podcast cover
Read more
What challenges does a CISO face when dealing with issues facing several industries? Abid Adam of Axiata Group, a conglomerate based in Malaysia, describes his efforts to manage privacy and security in three diverse sectors.

Dec 12 2019

Play

Cyber Confidence: Why it Matters

Podcast cover
Read more
ISMG and Nominet recently hosted a NYC roundtable discussion on the topic of cyber confidence. Dave Polton of Nominet reflects on the key takeaways and why cyber confidence is now one of the sector's hottest topics.

Dec 12 2019

Play

Reflections on Cloud Strategies & Security

Podcast cover
Read more
How does one make cloud a prominent part of enterprise security strategy? Is the cloud inherently more secure than on-prem? These were among the discussion points of a recent Dallas executive roundtable. Alex Pitigoi of Nominet shares her takeaways from the event.

Dec 12 2019

Play

Quantum-Proof Cryptography: What Role Will It Play?

Podcast cover
Read more
CISOs need to begin investigating the use of quantum-proof cryptography to ensure security is maintained when extremely powerful quantum computers that can crack current encryption are implemented, says Professor Alexander Ling, principal investigator at the Center for Quantum Technologies in Singapore.

Dec 10 2019

Play

AI, Machine Learning and Robotics: Privacy, Security Issues

Podcast cover
Read more
The use of artificial intelligence, machine learning and robotics has enormous potential, but along with that promise come critical privacy and security challenges, says technology attorney Stephen Wu.

Dec 06 2019

Play

How the Adversarial Mindset Is Making Cybersecurity Better

Podcast cover
Read more
Applying offensive hacking expertise and a more adversarial mindset to better hone not just network defenses but also public policy is proving effective, says Jeff Moss, founder and creator of the Black Hat conference.

Dec 06 2019

Play

Analysis: Smart TV Risks

Podcast cover
Read more
The latest edition of the ISMG Security Report offers an analysis of the FBI's security and privacy warnings about smart TVs. Also featured: discussions on the security of connected medical devices and strategies for fighting synthetic identity fraud.

Dec 06 2019

Play

John Halamka on Privacy, Security of Mayo Clinic Platform

Podcast cover
Read more
In an in-depth interview, John Halamka, M.D., the former long-time CIO at Beth Israel Deaconess Medical Center in Boston, discusses his upcoming move to head Mayo Clinic's global digital health initiative in collaboration with Google - and why privacy and security are so critical to those efforts.

Dec 05 2019

Play

PSD2: The Compliance and Enforcement Update

Podcast cover
Read more
The EU's second Payments Services Directive is alive and well. But where are financial institutions now re: compliance and enforcement? James Rendell of CA Technologies, a Broadcom company, offers insight on PSD2 and EMV 3DS compliance for 2020.

Dec 04 2019

Play

Banking on Mobile Security

Podcast cover
Read more
What are the key mobile security threats to financial organizations, and how are these enterprises marshalling their mobile threat defense? These were the questions posed by ISMG and Wandera to security leaders in San Francisco. Wandera's Michael Covington discusses the response.

Dec 04 2019

Play

Digital Transformation: The Privileged Access Imperative

Podcast cover
Read more
As a security leaders, too often you are brought to the table after a digital transformation project has been initiated, so you are forced to take a reactive position. But Adam Bosnian of CyberArk sees an important, proactive role for security. And a good start is by ensuring privileged access management is a key component of transformation.

Dec 04 2019

Play

Analysis: Vendor Contract Changes Under CCPA

Podcast cover
Read more
Getting the proper vendor contracts completed is a top concern for organizations preparing to comply with the California Consumer Privacy Act, says Caitlin Fennessy, research director at the International Association of Privacy Professionals.

Dec 03 2019

Play

The Threat of Ransomware and Doxing

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses new combination ransomware and doxing attacks. Plus, Twitter drops phone numbers in 2FA, and why we need to consider quantum cryptography today.

Nov 29 2019

Play

Medical Device Cybersecurity: A Team Approach

Podcast cover
Read more
All healthcare industry stakeholders must take critical steps to address the cybersecurity of connected medical devices, says Jennifer Covich Bordenick, CEO of of the eHealth Initiative and Foundation, an advocacy group that has issued a new report on the subject.

Nov 27 2019

Play

Election Hacking: What You Need to Know

Podcast cover
Read more
Election hacking is not just a US issue; it's a hot topic for every global democracy. And Joseph Carson of Thycotic is concerned that too many people are focused on the wrong elements of this topic. He analyzes the specific hacking techniques that demand attention.

Nov 25 2019

Play

Analysis: The Latest Ransomware Trends

Podcast cover
Read more
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.

Nov 22 2019

Play

A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals

Podcast cover
Read more
Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ecosystem, says regulatory attorney Julie Kass of the law firm Baker Donelson.

Nov 21 2019

Play

Taking Advantage of EMV 3DS

Podcast cover
Read more
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure stand out? Matt Cooke and Paul Dulany of Broadcom weigh in on the implementation and benefits of EMV 3DS.

Nov 19 2019

Play

IoT Security: 20 Years Behind Enterprise Computing

Podcast cover
Read more
While IoT devices are entering enterprises at a rapid pace, the security practices around them are as much as 20 years behind those for enterprise computing, says Sean Peasley of Deloitte, who outlines steps organizations can take to ensure safe IoT computing.

Nov 19 2019

Play

The Security Impact of Digital Transformation

Podcast cover
Read more
Cloud solutions, the mobile workforce, the skills gap - these are among the security impacts that don't get enough attention when discussing digital transformation. David Ryder of Avast Business opens up on these topics.

Nov 19 2019

Play