Cover image of Info Risk Today Podcast
(3)
Business

Info Risk Today Podcast

Updated 3 days ago

Business
Read more

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Read more

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

iTunes Ratings

3 Ratings
Average Ratings
1
0
0
2
0

Great content but...

By [O]bfuscator - May 29 2019
Read more
The content is extremely timely and useful but the sound quality is terrible and sometimes one cannot understand what’s being said. Sound levels for the interviewer and interviewee are frequently not similar and the listener has to put up with the too loud/too quiet problem found in podcasts produced in basements and garages. Bring up the sound quality. You’re addressing technology issues and clearly are a security professional - your product should be much better.

iTunes Ratings

3 Ratings
Average Ratings
1
0
0
2
0

Great content but...

By [O]bfuscator - May 29 2019
Read more
The content is extremely timely and useful but the sound quality is terrible and sometimes one cannot understand what’s being said. Sound levels for the interviewer and interviewee are frequently not similar and the listener has to put up with the too loud/too quiet problem found in podcasts produced in basements and garages. Bring up the sound quality. You’re addressing technology issues and clearly are a security professional - your product should be much better.

Listen to:

Cover image of Info Risk Today Podcast

Info Risk Today Podcast

Updated 3 days ago

Read more

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Medical Device Cybersecurity: A Team Approach

Podcast cover
Read more
All healthcare industry stakeholders must take critical steps to address the cybersecurity of connected medical devices, says Jennifer Covich Bordenick, CEO of of the eHealth Initiative and Foundation, an advocacy group that has issued a new report on the subject.

Nov 27 2019

Play

Google's Push Into Health Sector: Emerging Privacy Issues

Podcast cover
Read more
With Google aggressively expanding its push into the healthcare sector, critical privacy-related issues are emerging, says regulatory attorney Alisa Chestler, who offers an overview of key issues.

Nov 13 2019

Play

Protecting Data in Sprawling Computing Environments

Podcast cover
Read more
Sprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA.

Nov 08 2019

Play

Why Is Third-Party Risk Management So Complex?

Podcast cover
Read more
Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner.

Nov 07 2019

Play

Responding to Ransomware Attacks: Critical Steps

Podcast cover
Read more
Organizations must take a number of critical steps to prepare a response to ransomware attacks before they hit, says Caleb Barlow, the new president and CEO of security consulting firm CynergisTek, who offers a guide.

Oct 07 2019

Play

Analysis: Fallout From the Snowden Memoir

Podcast cover
Read more
The latest edition of the ISMG Security Report features a discussion of the controversies surrounding the release of whistleblower Edward Snowden's memoir. Also featured: An update on Lumen PDF's breach disclosure; insights on financial services identity management issues.

Sep 20 2019

Play

Using Artificial Intelligence to Combat Card Fraud

Podcast cover
Read more
Artificial intelligence is playing an important role in the fight against payment card fraud, says Gord Jamieson, senior director of Canada risk services at Visa. He'll offer a keynote presentation on the latest fraud trends at Information Security Media Group's Cybersecurity Summit in Toronto Sept 24-25.

Sep 17 2019

Play

Analysis: The Impact of Business Email Compromise Attacks

Podcast cover
Read more
This week's ISMG Security Report analyzes the cost of business email compromise attacks and the recent arrest of dozens of suspects. Also featured: updates on the easy availability of low-cost hacking tools and the latest payment card fraud trends.

Sep 13 2019

Play

Tips on Countering Insider Threat Risks

Podcast cover
Read more
Insider threats are difficult to counter. What happens when an employee goes rogue, and how do you catch them? Charles Carmakal of Mandiant, who says his firm is dealing with more insider threat investigations, shares tips for better defenses.

Sep 13 2019

Play

A New Credential for Healthcare Security Leaders

Podcast cover
Read more
A new professional credential aims to help healthcare organizations bolster their security leadership bench strength, says William Brad Marsh, co-chair of a committee that developed the certification.

Aug 12 2019

Play

Spotlight on Zero Trust Network Access

Podcast cover
Read more
The promise of cloud and mobility is to provide access to key services quickly and from anywhere at any time from any device. Zscaler's Lisa Lorenzin opens up on zero trust network access technologies, which provide a secure alternative to legacy methods.

Jul 30 2019

Play

The Prolonged Cost of a Data Breach

Podcast cover
Read more
Data breach costs continue well after the initial year, according to the latest IBM/Ponemon Institute,"Cost of a Data Breach" report. Limor Kessem of IBM Security shares details of the study.

Jul 29 2019

Play

John Halamka: Mitigating Medical Device Security Risks

Podcast cover
Read more
Enumerating medical devices, identifying where the security risks lie and then implementing a multilayered defense plan to mitigate risks should be top priorities for healthcare organizations, says thought leader John Halamka, M.D., executive director for technology exploration at Beth Israel Lahey Health.

Jul 15 2019

Play

Battling Supply Chain Security Risks

Podcast cover
Read more
Incidents involving supply chain vendors pose increasingly significant risks to health data, says Rick McElroy of Carbon Black, who addresses "island hopping" and other emerging threats.

Jul 12 2019

Play

Identity as a Game-Changing Breach Defense

Podcast cover
Read more
Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical aspects are often more insidious, says Teju Shyamsundar of Okta. And Identity can be a powerful tool to bolster defenses.

Jun 25 2019

Play

Facebook's Cryptocurrency Plan Scrutinized

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the security and privacy implications of Facebook's new digital currency - Libra. Also featured: Discussions on the rise of machine learning and IT and OT collaboration on cybersecurity.

Jun 21 2019

Play

Healthcare's Unique Digital Transformation

Podcast cover
Read more
The term "digital transformation" is not just marketing buzz; it's the here and now for many organizations. And the healthcare sector is uniquely impacted, says Stuart Reed of Nominet in the wake of a recent roundtable discussion.

May 24 2019

Play

WannaCry Still Causing Tears 2 Years On

Podcast cover
Read more
The latest edition of the ISMG Security Report assesses the legacy of WannaCry ransomware two years on. Also featured: the evolving role of healthcare CISOs; threat mitigation recommendations based on the 2019 Verizon Data Breach Investigations Report.

May 24 2019

Play

Vendor Risk Management: A Better Approach

Podcast cover
Read more
The risks posed by third-party vendors are a top concern for Aaron Miri, CIO of University of Texas at Austin's Dell Medical School and its affiliated UT Health Austin group practice. He explains steps he's taking to help mitigate those risks.

Apr 26 2019

Play

Defending Against Authorized Push Payment Fraud

Podcast cover
Read more
The advent of faster payments has helped accelerate authorized push payment fraud schemes in which victims are defrauded under false pretenses. Banking regulators are responding to the trend, and Rob Tharle of NICE Actimize offers advice for multilayered defense.

Apr 16 2019

Play

Analysis: A Better Approach to Cyber Defense

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses why cyber defense teams need to think more like attackers. Plus, a case study on cross-border payment fraud, and an expert's take on security for the 2020 elections.

Dec 13 2019

Play

How This CISO Handles Security in Multiple Business Sectors

Podcast cover
Read more
What challenges does a CISO face when dealing with issues facing several industries? Abid Adam of Axiata Group, a conglomerate based in Malaysia, describes his efforts to manage privacy and security in three diverse sectors.

Dec 12 2019

Play

Reflections on Cloud Strategies & Security

Podcast cover
Read more
How does one make cloud a prominent part of enterprise security strategy? Is the cloud inherently more secure than on-prem? These were among the discussion points of a recent Dallas executive roundtable. Alex Pitigoi of Nominet shares her takeaways from the event.

Dec 12 2019

Play

Cyber Confidence: Why it Matters

Podcast cover
Read more
ISMG and Nominet recently hosted a NYC roundtable discussion on the topic of cyber confidence. Dave Polton of Nominet reflects on the key takeaways and why cyber confidence is now one of the sector's hottest topics.

Dec 12 2019

Play

Quantum-Proof Cryptography: What Role Will It Play?

Podcast cover
Read more
CISOs need to begin investigating the use of quantum-proof cryptography to ensure security is maintained when extremely powerful quantum computers that can crack current encryption are implemented, says Professor Alexander Ling, principal investigator at the Center for Quantum Technologies in Singapore.

Dec 10 2019

Play

AI, Machine Learning and Robotics: Privacy, Security Issues

Podcast cover
Read more
The use of artificial intelligence, machine learning and robotics has enormous potential, but along with that promise come critical privacy and security challenges, says technology attorney Stephen Wu.

Dec 06 2019

Play

How the Adversarial Mindset Is Making Cybersecurity Better

Podcast cover
Read more
Applying offensive hacking expertise and a more adversarial mindset to better hone not just network defenses but also public policy is proving effective, says Jeff Moss, founder and creator of the Black Hat conference.

Dec 06 2019

Play

Analysis: Smart TV Risks

Podcast cover
Read more
The latest edition of the ISMG Security Report offers an analysis of the FBI's security and privacy warnings about smart TVs. Also featured: discussions on the security of connected medical devices and strategies for fighting synthetic identity fraud.

Dec 06 2019

Play

John Halamka on Privacy, Security of Mayo Clinic Platform

Podcast cover
Read more
In an in-depth interview, John Halamka, M.D., the former long-time CIO at Beth Israel Deaconess Medical Center in Boston, discusses his upcoming move to head Mayo Clinic's global digital health initiative in collaboration with Google - and why privacy and security are so critical to those efforts.

Dec 05 2019

Play

PSD2: The Compliance and Enforcement Update

Podcast cover
Read more
The EU's second Payments Services Directive is alive and well. But where are financial institutions now re: compliance and enforcement? James Rendell of CA Technologies, a Broadcom company, offers insight on PSD2 and EMV 3DS compliance for 2020.

Dec 04 2019

Play

Digital Transformation: The Privileged Access Imperative

Podcast cover
Read more
As a security leaders, too often you are brought to the table after a digital transformation project has been initiated, so you are forced to take a reactive position. But Adam Bosnian of CyberArk sees an important, proactive role for security. And a good start is by ensuring privileged access management is a key component of transformation.

Dec 04 2019

Play

Banking on Mobile Security

Podcast cover
Read more
What are the key mobile security threats to financial organizations, and how are these enterprises marshalling their mobile threat defense? These were the questions posed by ISMG and Wandera to security leaders in San Francisco. Wandera's Michael Covington discusses the response.

Dec 04 2019

Play

Analysis: Vendor Contract Changes Under CCPA

Podcast cover
Read more
Getting the proper vendor contracts completed is a top concern for organizations preparing to comply with the California Consumer Privacy Act, says Caitlin Fennessy, research director at the International Association of Privacy Professionals.

Dec 03 2019

Play

The Threat of Ransomware and Doxing

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses new combination ransomware and doxing attacks. Plus, Twitter drops phone numbers in 2FA, and why we need to consider quantum cryptography today.

Nov 29 2019

Play

Medical Device Cybersecurity: A Team Approach

Podcast cover
Read more
All healthcare industry stakeholders must take critical steps to address the cybersecurity of connected medical devices, says Jennifer Covich Bordenick, CEO of of the eHealth Initiative and Foundation, an advocacy group that has issued a new report on the subject.

Nov 27 2019

Play

Election Hacking: What You Need to Know

Podcast cover
Read more
Election hacking is not just a US issue; it's a hot topic for every global democracy. And Joseph Carson of Thycotic is concerned that too many people are focused on the wrong elements of this topic. He analyzes the specific hacking techniques that demand attention.

Nov 25 2019

Play

Analysis: The Latest Ransomware Trends

Podcast cover
Read more
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.

Nov 22 2019

Play

A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals

Podcast cover
Read more
Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ecosystem, says regulatory attorney Julie Kass of the law firm Baker Donelson.

Nov 21 2019

Play

Taking Advantage of EMV 3DS

Podcast cover
Read more
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure stand out? Matt Cooke and Paul Dulany of Broadcom weigh in on the implementation and benefits of EMV 3DS.

Nov 19 2019

Play

IoT Security: 20 Years Behind Enterprise Computing

Podcast cover
Read more
While IoT devices are entering enterprises at a rapid pace, the security practices around them are as much as 20 years behind those for enterprise computing, says Sean Peasley of Deloitte, who outlines steps organizations can take to ensure safe IoT computing.

Nov 19 2019

Play