Cover image of Data Breach Today Podcast
(10)
Business

Data Breach Today Podcast

Updated 9 days ago

Business
Read more

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Read more

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

iTunes Ratings

10 Ratings
Average Ratings
6
2
0
1
1

Hey

By freechicken - Jun 21 2019
Read more
Hey

iTunes Ratings

10 Ratings
Average Ratings
6
2
0
1
1

Hey

By freechicken - Jun 21 2019
Read more
Hey
Cover image of Data Breach Today Podcast

Data Breach Today Podcast

Latest release on Jan 24, 2020

Read more

Exclusive, insightful audio interviews by our staff with data breach/security leading practitioners and thought-leaders

Rank #1: Spotlight on Zero Trust Network Access

Podcast cover
Read more
The promise of cloud and mobility is to provide access to key services quickly and from anywhere at any time from any device. Zscaler's Lisa Lorenzin opens up on zero trust network access technologies, which provide a secure alternative to legacy methods.

Jul 30 2019

Play

Rank #2: Complying With New York's SHIELD Act

Podcast cover
Read more
What should healthcare organizations know about complying with the breach notification and data security requirements of New York's SHIELD Act? And how does the new law compare with HIPAA? Jon Moore, chief risk officer at consulting firm Clearwater, explains.

Oct 10 2019

Play

Rank #3: Highlights of RSA Conference

Podcast cover
Read more
The latest edition of the ISMG Security Report features updates from RSA Conference 2019 on IoT and the cloud, GDPR compliance challenges and much more.

Mar 08 2019

Play

Rank #4: Reality Check: How Vulnerable Is the Power Grid?

Podcast cover
Read more
Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. power grid? Bernie Cowens, most recently CISO at the nation's largest electric utility, says that's unlikely because the power grid is more cybersecure than you might think.

Jan 10 2020

Play

Rank #5: Using Machine Learning for Fraud Prevention

Podcast cover
Read more
Machine learning can play an important role in fraud prevention at financial institutions, says Marc Trepanier of ACI Worldwide, who addresses the challenges involved.

Mar 13 2019

Play

Rank #6: Executive Roundtable Recap: Securing the Digital Enterprise

Podcast cover
Read more
ISMG and Fortinet hosted a roundtable dinner in Nashville, TN on May 15 focused on "Securing the Digital Enterprise". Challenges in gaining internal buy in for security initiatives and the problems of M&A activity were discussed, and Sonia Arista, National Healthcare Lead of Fortinet provided her insight on the event in this exclusive interview.

May 24 2019

Play

Rank #7: Why Securing Medical Devices Is So Challenging

Podcast cover
Read more
Improving the security of diverse medical devices is a major challenge for a variety of reasons, according to security leaders at two device manufacturers, who spell out the key issues in this interview.

Dec 17 2019

Play

Rank #8: WannaCry Still Causing Tears 2 Years On

Podcast cover
Read more
The latest edition of the ISMG Security Report assesses the legacy of WannaCry ransomware two years on. Also featured: the evolving role of healthcare CISOs; threat mitigation recommendations based on the 2019 Verizon Data Breach Investigations Report.

May 24 2019

Play

Rank #9: Analysis: The Capital One Breach

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: breach remediation advice and compliance with New York's new third-party risk management requirements.

Aug 02 2019

Play

Rank #10: Darknet Markets: As Police Crack Down, Cybercriminals Adapt

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses the shutdown of DeepDotWeb. Plus, dealing with breach fatigue and the Pitney Bowes ransomware attack.

Oct 18 2019

Play

Rank #11: Stung by Takedowns, Criminals Tap Distributed Dark Markets

Podcast cover
Read more
Law enforcement success inevitably sparks criminals to become more innovative, including shifting from centralized markets - such as Hansa and Wall Street Market - to encrypted and distributed marketplaces, says the University of Surrey's Alan Woodward.

Oct 15 2019

Play

Rank #12: 5 Top Health Data Regulatory Issues to Watch in 2020

Podcast cover
Read more
What are some of the most important health data privacy and security regulatory developments to watch in 2020? Privacy attorney Kirk Nahra of the law firm WilmerHale discusses what he sees as the top five issues in the year ahead.

Dec 20 2019

Play

Rank #13: DeepDotWeb Goes Dark

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the FBI takedown of DeepDotWeb, a dark net portal. Also featured are discussions on healthcare app security and the repercussions of poor coding security.

May 10 2019

Play

Rank #14: How Has FTC Data Security Enforcement Changed?

Podcast cover
Read more
In the wake of a federal appeals court ruling last year vacating a Federal Trade Commission enforcement action against LabMD, the FTC's data security consent orders are becoming far more detailed and rigorous, says former FTC attorney Julie O'Neill.

Oct 15 2019

Play

Rank #15: Capturing ROI on Your Unified Endpoint Management Investment

Podcast cover
Read more
Unified endpoint management exists because devices have grown in number, variety and complexity of how they're being used in the workplace. So how should IT and security leaders approach UEM? John Harrington Jr. and Ryan Schwartz of IBM MaaS360 with Watson share insight.

May 14 2019

Play

Rank #16: Healthcare's Unique Digital Transformation

Podcast cover
Read more
The term "digital transformation" is not just marketing buzz; it's the here and now for many organizations. And the healthcare sector is uniquely impacted, says Stuart Reed of Nominet in the wake of a recent roundtable discussion.

May 24 2019

Play

Rank #17: Verizon DBIR: C-Level Executives in the Crosshairs

Podcast cover
Read more
C-level executives are 12 times more likely to be the target of social incidents and nine times more likely to be the target of social breaches. This is among the key findings of the latest Verizon's Data Breach Investigations Report. Author John Grim shares insight.

May 22 2019

Play

Rank #18: How 'Zero Trust' Better Secures Applications and Access

Podcast cover
Read more
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.

Oct 17 2019

Play

Rank #19: WhatsApp Exploit Reveals 'Legalized Hacking' at Work

Podcast cover
Read more
Attackers exploiting a buffer overflow in WhatsApp's signaling software to automatically infect devices with malware - without users even having to answer their phone - and then alter call logs to hide attack traces is "a bit of a nightmare scenario," says cybersecurity expert Alan Woodward.

May 14 2019

Play

Rank #20: Guarding Against Cybertheats Targeting End Users

Podcast cover
Read more
Guarding against threats targeting end users is among the top security priorities this year at a large group of surgical centers in Washington state - and artificial intelligence could play an important role, says CIO Curt Kwak of Proliance Surgeons.

Feb 28 2019

Play

Analysis: New Details on the Hacking of Jeff Bezos' iPhone

Podcast cover
Read more
The latest edition of the ISMG Security Report offers an analysis of fresh details on the hacking of Amazon CEO Jeff Bezos' iPhone. Also featured: an update on Microsoft's exposure of customer service records; a hacker's take on key areas of cyber hygiene.

Jan 24 2020

Play

Tips on Protecting Hospitals From Nation-State Attacks

Podcast cover
Read more
In light of rising tensions between the U.S. and Iran, the Association of Executives in Healthcare Information Security recently issued new data security guidance to help the healthcare sector prepare for potential nation-state attacks, says CISO Christopher Frenz, one of the document's authors.

Jan 22 2020

Play

The Role of Satellites in Quantum Key Distribution

Podcast cover
Read more
Could satellites play a role in distributing next-generation encryption keys? Robert Bedington, CTO and co-founder at Singapore-based SpeQtral, describes quantum communications via satellites in this in-depth interview.

Jan 20 2020

Play

Sizing Up Today's Deception Technology

Podcast cover
Read more
Deception technology is evolving as a powerful asset in the cybersecurity arsenal, providing significant advantages in being able to monitor an attacker's behavior, says Joseph Krull, senior analyst at Aite Group.

Jan 20 2020

Play

Analysis: Huawei 5G Dilemma

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.

Jan 17 2020

Play

Cloud Security: Overcoming Roadblocks

Podcast cover
Read more
While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration.

Jan 16 2020

Play

New Study: Cloud Confidence, Maturity on the Rise

Podcast cover
Read more
Cloud maturity and confidence are growing, but security leaders are still reluctant to host highly sensitive data in the cloud. These are findings of a new Barracuda Networks survey. Chris Hill and Gemma Allen of Barracuda explore the results and what they mean.

Jan 16 2020

Play

'Wartime' Security Mentality Revisited

Podcast cover
Read more
Five years ago, cybersecurity executive Dave Merkel called upon enterprises to shed their "peacetime" mindsets and adopt a "wartime" stance against persistent cybercriminals and nation-state actors. How have they risen to that challenge?

Jan 15 2020

Play

Critical Steps in Managing Vendor Security Risk

Podcast cover
Read more
In light of recent ransomware and other cyberattacks against vendors serving numerous healthcare organizations, it's critical to develop and deploy comprehensive vendor risk management programs, says John Farley of Arthur J. Gallagher & Co., a provider of cyber insurance.

Jan 14 2020

Play

Class Action Breach Lawsuits: The Impact of Data for Sale

Podcast cover
Read more
After a data breach, if individuals' stolen information is offered for sale on the dark web, that potentially bolsters class action lawsuits filed by plaintiffs against the breached organization, says technology attorney Steven Teppler of the law firm Mandelbaum Salsburg P.C.

Jan 13 2020

Play

Reality Check: How Vulnerable Is the Power Grid?

Podcast cover
Read more
Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. power grid? Bernie Cowens, most recently CISO at the nation's largest electric utility, says that's unlikely because the power grid is more cybersecure than you might think.

Jan 10 2020

Play

Analysis: 'Orwellian' Surveillance in 2020

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses "Orwellian" surveillance activity in 2020 via the ToTok app. Also featured: the controversy over enabling law enforcement to circumvent encryption; the cyberattack risks posed by IoT devices.

Jan 10 2020

Play

Quantum-Proof Cryptography: How It Would Work

Podcast cover
Read more
Researchers are attempting to develop new forms of cryptography that could not be cracked by powerful quantum computing devices that are in the works. Divesh Aggarwal, principal investigator at Singapore's Center for Quantum Technologies, describes the efforts.

Jan 10 2020

Play

Nation-State Attacks: Why Healthcare Must Prepare

Podcast cover
Read more
As tensions between the U.S. and Iran continue to rise, healthcare organizations need to exercise extra vigilance in shoring up their security to defend against potential Iranian cyberattacks on critical infrastructure sectors, says Errol Weiss of the Health Information Sharing and Analysis Center.

Jan 08 2020

Play

Moving from Vulnerability Management to Response

Podcast cover
Read more
Complex, manual processes and disparate, disconnected tools make it difficult for security and IT teams to mount a cohesive response. Bryce Schroeder of ServiceNow discusses a more effective approach to vulnerability response.

Jan 08 2020

Play

Preparing for Potential Iranian 'Wiper' Attacks

Podcast cover
Read more
In the wake of the killing of an Iranian general in a U.S. drone attack last week, organizations - especially healthcare entities and units of government that have been vulnerable to ransomware attacks - need to be on guard against destructive "wiper" attacks, says Caleb Barlow of CynergisTek.

Jan 07 2020

Play

Assessing The Maturity of Zero Trust Across Organizations

Podcast cover
Read more
Zero Trust has become a cybersecurity marketing buzzword. But Kelsey Nelson of Okta sheds light on the realities of the Zero Trust approach, with a specific focus on the identity and access management component of the strategy.

Jan 07 2020

Play

Cyber Insurance: Important Lessons for New Markets

Podcast cover
Read more
One of the major challenges for CISOs is deciding the indemnity limit for cyber insurance, says Bhishma Maheshwari, executive vice president at Marsh India.

Jan 06 2020

Play

Global Cyber Alliance President on Iranian Cyber Threat

Podcast cover
Read more
From past roles at the Department of Justice, Department of Homeland Security, Microsoft and Sony, Phil Reitinger has learned more than a thing or two about nation-states and cyber threats. In this exclusive interview, the head of the Global Cyber Alliance discusses how to respond to potential new threats from Iran.

Jan 06 2020

Play

Iran's Cyber Response: 'They're Going to Unleash the Hounds'

Podcast cover
Read more
Following the U.S. killing of Iran's Maj. Gen. Qasem Soleimani last week, security experts have warned of possible retaliatory cyber strikes. Tom Kellermann of VMware believes those attacks are imminent. "The period of mourning is over, and I think the holy war in American cyberspace is yet to begin."

Jan 06 2020

Play

iTunes Ratings

10 Ratings
Average Ratings
6
2
0
1
1

Hey

By freechicken - Jun 21 2019
Read more
Hey