Cover image of Government Information Security Podcast
(9)
Government

Government Information Security Podcast

Updated 4 days ago

Government
Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

iTunes Ratings

9 Ratings
Average Ratings
6
1
0
0
2

Horrible info on corona virus, worse on cyber impacts

By Binging is good - Mar 04 2020
Read more
Listened to first episode today. It was a disaster. Guest put out questionable info on work from home (are the guest clients just incompetent managers???) and cyber impact (again, are the guests clients incompetent when arranging remote access and 24/7 best practices for protecting networks???). Worse is that there is no where to leave a comment about this but here. Unsubscribing now.

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.

iTunes Ratings

9 Ratings
Average Ratings
6
1
0
0
2

Horrible info on corona virus, worse on cyber impacts

By Binging is good - Mar 04 2020
Read more
Listened to first episode today. It was a disaster. Guest put out questionable info on work from home (are the guest clients just incompetent managers???) and cyber impact (again, are the guests clients incompetent when arranging remote access and 24/7 best practices for protecting networks???). Worse is that there is no where to leave a comment about this but here. Unsubscribing now.

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.
Cover image of Government Information Security Podcast

Government Information Security Podcast

Latest release on Jun 05, 2020

Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Rank #1: Zscaler's Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation

Podcast cover
Read more
In one of the recent stops in this roundtable dinner seriers, ISMG and Zscaler visited Boston to discuss the role of security as a catalyst for digital transformations. We saw in each of these conversations that change is difficult, but that everyone is asking the same questions, says Stan Lowe, Global CISO with Zscaler.

Jun 27 2019

Play

Rank #2: Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities

Podcast cover
Read more
Draft regulations to carry out the California Consumer Privacy Act do not go far enough to clarify ambiguities in the law, which goes into effect Jan. 1, 2020, says privacy attorney Sadia Mirza of the law firm Troutman Sanders, who encourages organizations to submit comments on the proposed regs.

Oct 22 2019

Play

Rank #3: Life Beyond Passwords: The Rise of Advanced Biometrics

Podcast cover
Read more
Biometrics may be in fashion, but it's in part because users are ready, willing and able to use it to prove their identity, thanks to Apple, Samsung, Google and other players providing trustable hardware for verifying people's fingerprints and faces, says IBM Security's Neil Warburton.

Jul 05 2019

Play

Rank #4: Taking Advantage of EMV 3DS

Podcast cover
Read more
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure stand out? Matt Cooke and Paul Dulany of Broadcom weigh in on the implementation and benefits of EMV 3DS.

Nov 19 2019

Play

Rank #5: Getting Ready for the NIST Privacy Framework

Podcast cover
Read more
By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights.

Nov 06 2019

Play

Rank #6: How 'Zero Trust' Better Secures Applications and Access

Podcast cover
Read more
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.

Oct 17 2019

Play

Rank #7: Preparing for Potential Iranian 'Wiper' Attacks

Podcast cover
Read more
In the wake of the killing of an Iranian general in a U.S. drone attack last week, organizations - especially healthcare entities and units of government that have been vulnerable to ransomware attacks - need to be on guard against destructive "wiper" attacks, says Caleb Barlow of CynergisTek.

Jan 07 2020

Play

Rank #8: Identity as a Game-Changing Breach Defense

Podcast cover
Read more
Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical aspects are often more insidious, says Teju Shyamsundar of Okta. And Identity can be a powerful tool to bolster defenses.

Jun 25 2019

Play

Rank #9: Reality Check: How Vulnerable Is the Power Grid?

Podcast cover
Read more
Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. power grid? Bernie Cowens, most recently CISO at the nation's largest electric utility, says that's unlikely because the power grid is more cybersecure than you might think.

Jan 10 2020

Play

Rank #10: Threat Intelligence: Why Sharing Is Difficult

Podcast cover
Read more
Cyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an automated way, says Shawn Henry of CrowdStrike Services. But that sharing has been hampered by a lack of understanding of why it's important and how organizations can benefit, he says.

Jul 09 2019

Play

Rank #11: CCPA Compliance: Identity Verification Challenges

Podcast cover
Read more
One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues.

Nov 12 2019

Play

Rank #12: Analysis: The Capital One Breach

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: breach remediation advice and compliance with New York's new third-party risk management requirements.

Aug 02 2019

Play

Rank #13: Mobile Devices: Protecting Critical Data

Podcast cover
Read more
Mobile devices are attractive targets for attackers because of messages, call logs, location data and more. State-sponsored groups are digging ever deeper into mobile hacking, says Brian Robison of BlackBerry Cylance.

Oct 31 2019

Play

Rank #14: Mastercard on the Evolution of Authentication

Podcast cover
Read more
Fraud schemes have migrated in recent years, exposing inherent vulnerabilities in how most organizations authenticate users. Diego Szteinhendler of Mastercard outlines new strategies and tools for evolving authentication practices beyond solely payments security.

Jun 28 2019

Play

Rank #15: Analysis: The Latest Ransomware Trends

Podcast cover
Read more
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.

Nov 22 2019

Play

Rank #16: Modified Draft CCPA Regulations: How They Impact Businesses

Podcast cover
Read more
In an in-depth interview, privacy expert Caitlin Fennessy sorts through modified draft regulations to carry out the California Consumer Privacy Act that are designed to help businesses take a more pragmatic approach to privacy.

Feb 26 2020

Play

Rank #17: IoT in Vehicles: The Trouble With Too Much Code

Podcast cover
Read more
The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which poses risks for the coming wave of autonomous vehicles, says Campbell Murray of BlackBerry. Large code bases, which likely have many hidden software bugs, are part of the problem, he says.

Oct 16 2019

Play

Rank #18: A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals

Podcast cover
Read more
Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ecosystem, says regulatory attorney Julie Kass of the law firm Baker Donelson.

Nov 21 2019

Play

Rank #19: Analysis: Indictments in Equifax Hack

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing NIST's new privacy framework; lessons learned in a breach disclosure.

Feb 14 2020

Play

Rank #20: Third-Party Risk Management: Asking the Right Questions

Podcast cover
Read more
An effective third-party risk management program starts with asking the right questions, says Brad Keller, chief strategy officer and senior vice president at the Santa Fe Group, a strategic advisory company, who spells out key issues to address.

Jun 28 2019

Play

Analysis: Why Identity Management Is Still a Challenge

Podcast cover
Read more
The latest edition of the ISMG Security Report sizes up progress made so far on identity management and the work yet to be done. Also featured: how security concerns are holding back IoT projects and the privacy issues raised by recording videoconferences.

Jun 05 2020

Play

Confidential Computing: The Use Cases

Podcast cover
Read more
It's not just the latest marketing buzz. Confidential computing is an actual initiative focused on helping to secure data in use. But what are the uses cases? In part two of a two-part podcast, Richard Curran of Intel leads an expert panel discussion on the practice of confidential computing.

Jun 03 2020

Play

Confidential Computing: Beyond the Hype

Podcast cover
Read more
Confidential computing is an emerging industry initiative focused on helping to secure data in use. But how does one separate hype from reality? In part one of a two-part podcast, Richard Curran of Intel leads an expert panel discussion on the concept of confidential computing.

Jun 03 2020

Play

A Fresh Look at API Security

Podcast cover
Read more
API attacks are on the rise, and Gartner predicts that APIs will be the top threat vector by 2022. Roey Eliyahu, CEO of Salt Security, discusses the trend and how to build a more effective API security strategy.

Jun 01 2020

Play

Analysis: Verizon's Latest Data Breach Investigation Report

Podcast cover
Read more
Verizon's Data Breach Investigations Report 2020 highlights the leading causes of breaches last year, including credential theft, phishing, ransomware as well as issues linked to cloud implementations and web applications. In an interview, Verizon's Ashish Thapar offers an in-depth analysis.

Jun 01 2020

Play

Identity Verification in Healthcare: Revamping a Framework

Podcast cover
Read more
A 15-year-old identity framework originally designed for narrow use by pharmaceutical companies is being revamped and updated for broader use in healthcare, says Kyle Neuman, managing director of SAFE Identity, an industry consortium and certification body that's coordinating the project.

May 29 2020

Play

Analysis: Surge in Attacks Against Banks

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes why cyberattacks against banks have surged in recent weeks. Plus: The increasingly ruthless tactics of ransomware gangs; cybersecurity strategies for small businesses.

May 29 2020

Play

Safeguarding COVID-19 Research, Other Intellectual Property

Podcast cover
Read more
As cyberthreats to medical research on COVID-19 - and other intellectual property - grow, organzations must take critical steps to prevent the theft of their "innovation capital," says Russell Koste, chief security officer of Alexion Pharmaceuticals.

May 28 2020

Play

AMA Outlines Privacy Principles for Health Data

Podcast cover
Read more
The American Medical Association has issued a set of privacy principles for health data that it hopes Congress and regulators will keep in mind as they prepare legislation and regulations. In an interview, AMA Board Chair Jesse Ehrenfeld, M.D., describes the recommendations.

May 26 2020

Play

How to Avoid Unnecessary Breach Reporting

Podcast cover
Read more
Healthcare organizations need to diligently assess whether a security incident involving patient information truly qualifies as a reportable breach under HIPAA to avoid needlessly reporting it to federal regulators, says regulatory attorney Helen Oscislawski.

May 26 2020

Play

Analysis: The Long-Term Implications of 'Work From Home'

Podcast cover
Read more
The latest edition of the ISMG Security Report features Retired General Keith Alexander, former NSA director, discussing the long-term security implications of the shift to working from home. Also: an update on ransomware gangs leaking data and an analysis of using open source code for app development.

May 22 2020

Play

Remote Workforce Security: The Role of 'Zero Trust'

Podcast cover
Read more
Kevin Schwarz of Zscaler discusses the security implications of the "new normal" of employees working from home, including the role of a "zero trust" strategy.

May 21 2020

Play

Remote Workforce Security - the Long Game

Podcast cover
Read more
"Risk acceptance" was the operative term as organizations quickly deployed remote workforces in response to the global crisis. But now, as this deployment becomes a long-term option, enterprises need to take a future-focused view toward identity, cloud, and the attack surface. Forcepoint's Homayun Yaqub offers tips.

May 21 2020

Play

Why Cyberthreats Tied to COVID-19 Could Hit Diverse Targets

Podcast cover
Read more
Besides hospitals and academic institutions, dozens of nonprofits, including nongovernmental organizations - or NGOs - around the world must protect their COVID-19 research and related activities from those seeking to steal data or disrupt their operations, says cyber risk management expert Stanley Mierzwa.

May 18 2020

Play

AST as the Key to DevSecOps Maturity

Podcast cover
Read more
DevSecOps is in its "awkward teenage years," says Matthew Rose of Checkmarx. But with new tooling and automation - particularly application security testing tools - he sees the practice maturing quickly and delivering improved outcomes.

May 15 2020

Play

Analysis: Securing RDP to Prevent Ransomware Attacks

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses securing RDP to prevent ransomware attacks. Also featured: A look at three likely scenarios for the COVID19 pandemic, and an analysis of why we're still using PINs for certain card payments.

May 15 2020

Play

Testing Medical Device Security During COVID-19 Crisis

Podcast cover
Read more
As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to help fill medical equipment shortages during the COVID-19 crisis, steps must be taken to ensure adequate security testing, says Fairuz Rafique of cybersecurity services firm EmberSec.

May 08 2020

Play

Analysis: The Contact-Tracing Conundrum

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing.

May 08 2020

Play

Analysis: Ransomware's Costly Impact

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the rising costs of ransomware attacks and the latest victims. Also featured: An assessment of Australia's new contact-tracing app designed to help battle the spread of COVID-19, and a discussion of applying the "zero trust" model to the remote workforce.

May 01 2020

Play

'Zero Trust' and the Remote Worker

Podcast cover
Read more
The shift to working at home during the COVID-19 pandemic is yet another reason to embrace the "zero trust" strategy, says Dave Lewis of Duo Security, who provides guidance.

Apr 28 2020

Play

iTunes Ratings

9 Ratings
Average Ratings
6
1
0
0
2

Horrible info on corona virus, worse on cyber impacts

By Binging is good - Mar 04 2020
Read more
Listened to first episode today. It was a disaster. Guest put out questionable info on work from home (are the guest clients just incompetent managers???) and cyber impact (again, are the guests clients incompetent when arranging remote access and 24/7 best practices for protecting networks???). Worse is that there is no where to leave a comment about this but here. Unsubscribing now.

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.