Cover image of Government Information Security Podcast
(9)
Government

Government Information Security Podcast

Updated 2 months ago

Government
Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

iTunes Ratings

9 Ratings
Average Ratings
6
1
0
0
2

Horrible info on corona virus, worse on cyber impacts

By Binging is good - Mar 04 2020
Read more
Listened to first episode today. It was a disaster. Guest put out questionable info on work from home (are the guest clients just incompetent managers???) and cyber impact (again, are the guests clients incompetent when arranging remote access and 24/7 best practices for protecting networks???). Worse is that there is no where to leave a comment about this but here. Unsubscribing now.

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.

iTunes Ratings

9 Ratings
Average Ratings
6
1
0
0
2

Horrible info on corona virus, worse on cyber impacts

By Binging is good - Mar 04 2020
Read more
Listened to first episode today. It was a disaster. Guest put out questionable info on work from home (are the guest clients just incompetent managers???) and cyber impact (again, are the guests clients incompetent when arranging remote access and 24/7 best practices for protecting networks???). Worse is that there is no where to leave a comment about this but here. Unsubscribing now.

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.
Cover image of Government Information Security Podcast

Government Information Security Podcast

Latest release on Aug 07, 2020

Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Rank #1: Zscaler's Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation

Podcast cover
Read more
In one of the recent stops in this roundtable dinner seriers, ISMG and Zscaler visited Boston to discuss the role of security as a catalyst for digital transformations. We saw in each of these conversations that change is difficult, but that everyone is asking the same questions, says Stan Lowe, Global CISO with Zscaler.

Jun 27 2019

Play

Rank #2: Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities

Podcast cover
Read more
Draft regulations to carry out the California Consumer Privacy Act do not go far enough to clarify ambiguities in the law, which goes into effect Jan. 1, 2020, says privacy attorney Sadia Mirza of the law firm Troutman Sanders, who encourages organizations to submit comments on the proposed regs.

Oct 22 2019

Play

Rank #3: Life Beyond Passwords: The Rise of Advanced Biometrics

Podcast cover
Read more
Biometrics may be in fashion, but it's in part because users are ready, willing and able to use it to prove their identity, thanks to Apple, Samsung, Google and other players providing trustable hardware for verifying people's fingerprints and faces, says IBM Security's Neil Warburton.

Jul 05 2019

Play

Rank #4: Taking Advantage of EMV 3DS

Podcast cover
Read more
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure stand out? Matt Cooke and Paul Dulany of Broadcom weigh in on the implementation and benefits of EMV 3DS.

Nov 19 2019

Play

Rank #5: Getting Ready for the NIST Privacy Framework

Podcast cover
Read more
By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights.

Nov 06 2019

Play

Rank #6: How 'Zero Trust' Better Secures Applications and Access

Podcast cover
Read more
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.

Oct 17 2019

Play

Rank #7: Preparing for Potential Iranian 'Wiper' Attacks

Podcast cover
Read more
In the wake of the killing of an Iranian general in a U.S. drone attack last week, organizations - especially healthcare entities and units of government that have been vulnerable to ransomware attacks - need to be on guard against destructive "wiper" attacks, says Caleb Barlow of CynergisTek.

Jan 07 2020

Play

Rank #8: Identity as a Game-Changing Breach Defense

Podcast cover
Read more
Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical aspects are often more insidious, says Teju Shyamsundar of Okta. And Identity can be a powerful tool to bolster defenses.

Jun 25 2019

Play

Rank #9: Reality Check: How Vulnerable Is the Power Grid?

Podcast cover
Read more
Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. power grid? Bernie Cowens, most recently CISO at the nation's largest electric utility, says that's unlikely because the power grid is more cybersecure than you might think.

Jan 10 2020

Play

Rank #10: Threat Intelligence: Why Sharing Is Difficult

Podcast cover
Read more
Cyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an automated way, says Shawn Henry of CrowdStrike Services. But that sharing has been hampered by a lack of understanding of why it's important and how organizations can benefit, he says.

Jul 09 2019

Play

Rank #11: CCPA Compliance: Identity Verification Challenges

Podcast cover
Read more
One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues.

Nov 12 2019

Play

Rank #12: Analysis: The Capital One Breach

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: breach remediation advice and compliance with New York's new third-party risk management requirements.

Aug 02 2019

Play

Rank #13: Mobile Devices: Protecting Critical Data

Podcast cover
Read more
Mobile devices are attractive targets for attackers because of messages, call logs, location data and more. State-sponsored groups are digging ever deeper into mobile hacking, says Brian Robison of BlackBerry Cylance.

Oct 31 2019

Play

Rank #14: Mastercard on the Evolution of Authentication

Podcast cover
Read more
Fraud schemes have migrated in recent years, exposing inherent vulnerabilities in how most organizations authenticate users. Diego Szteinhendler of Mastercard outlines new strategies and tools for evolving authentication practices beyond solely payments security.

Jun 28 2019

Play

Rank #15: Analysis: The Latest Ransomware Trends

Podcast cover
Read more
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.

Nov 22 2019

Play

Rank #16: Modified Draft CCPA Regulations: How They Impact Businesses

Podcast cover
Read more
In an in-depth interview, privacy expert Caitlin Fennessy sorts through modified draft regulations to carry out the California Consumer Privacy Act that are designed to help businesses take a more pragmatic approach to privacy.

Feb 26 2020

Play

Rank #17: IoT in Vehicles: The Trouble With Too Much Code

Podcast cover
Read more
The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which poses risks for the coming wave of autonomous vehicles, says Campbell Murray of BlackBerry. Large code bases, which likely have many hidden software bugs, are part of the problem, he says.

Oct 16 2019

Play

Rank #18: A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals

Podcast cover
Read more
Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ecosystem, says regulatory attorney Julie Kass of the law firm Baker Donelson.

Nov 21 2019

Play

Rank #19: Analysis: Indictments in Equifax Hack

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing NIST's new privacy framework; lessons learned in a breach disclosure.

Feb 14 2020

Play

Rank #20: Third-Party Risk Management: Asking the Right Questions

Podcast cover
Read more
An effective third-party risk management program starts with asking the right questions, says Brad Keller, chief strategy officer and senior vice president at the Santa Fe Group, a strategic advisory company, who spells out key issues to address.

Jun 28 2019

Play

Analysis: Hijacking of Twitter Hacker's Virtual Hearing

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the hijacking of a virtual court hearing in the Twitter hacking case. Also featured: Why network segmentation is more important than ever; update on Windows print spooler vulnerability.

Aug 07 2020

Play

Behavioral Biometrics: Avoiding Mistakes

Podcast cover
Read more
Too many companies that are implementing behavioral biometrics to combat fraud lack a complete understanding of how to make the most of the technology, says David Lacey, managing director at IDCARE, Australia and New Zealand's not-for-profit national identity and cyber support service.

Aug 05 2020

Play

Secret Service Agent Offers Cybercrime-Fighting Insights

Podcast cover
Read more
Christopher Leone, assistant special agent in charge, United States Secret Service, offers advice to organizations on forging relationships with law enforcement as part of their cybersecurity incident preparedness plans.

Aug 03 2020

Play

Analysis: The Hacking of Mobile Banking App Dave

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the hacking of Dave, a mobile banking app. Plus: Sizing up the impact of GDPR after two years of enforcement and an assessment of IIoT vulnerabilities.

Jul 31 2020

Play

Mitigating Brand Impersonation Fraud

Podcast cover
Read more
Social media analytics tools can play a key role in mitigating the risk of brand impersonation fraud, says Barika Pace, senior director analyst at Gartner.

Jul 28 2020

Play

Detecting Payroll Fraud With Data Analytics

Podcast cover
Read more
Data analytics can play a critical role in detecting payroll fraud, says Kelly Paxton, a fraud examiner and private investigator.

Jul 27 2020

Play

The Celebrity Twitter Hack: What Happened?

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the hacking of high-profile Twitter accounts. Also featured: Addressing security when offices reopen; the role of personal protective equipment, or PPE, in money laundering during the pandemic.

Jul 24 2020

Play

COVID-19 Contact-Tracing Apps: The Privacy Issues

Podcast cover
Read more
COVID-19 contract-tracing applications that help monitor individuals' possible exposure to those who have tested positive for the virus present a variety of privacy issues that must be addressed, says regulatory attorney Nancy Perkins.

Jul 17 2020

Play

Security Analysis: US Outmaneuvers UK on 'Huawei Question'

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the latest developments in banning Huawei technology from 5G networks. Also featured are discussions of how to respond better to cybercrime and whether we're on the cusp of a digital currency revolution.

Jul 17 2020

Play

Coordinating Disclosures of Medical Device Vulnerabilities

Podcast cover
Read more
As cyberthreats facing healthcare organizations soar, medical device maker Becton, Dickinson and Co. has ramped up its process for coordinated disclosure of vulnerabilities to help identify, assess and communicate issues to regulators and industry stakeholders, says BD's Dana-Megan Rossi.

Jul 10 2020

Play

Analysis: Monitoring the Risks Posed by Remote Workers

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the surge in the use of employee monitoring tools for the increasingly remote workforce. Also featured: Discussions about IoT security guidelines and CCPA compliance requirements.

Jul 10 2020

Play

Digital IDs: A Progress Report

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses global progress on adopting standard digital identifiers. Plus, a former cybercriminal discusses emerging fraud trends, and an update on the evolution of e-signatures.

Jul 03 2020

Play

The Fast Future of Encryption in Healthcare

Podcast cover
Read more
In mere weeks, the healthcare industry was able to leapfrog ahead years in its digital transformation. But at a price to data security, which now faces new kinds of exposure. Zettaset CEO Tim Reilly discusses these vulnerabilities and the future of encryption in the healthcare sector.

Jul 02 2020

Play

Guarding Against COVID-19 Fraud Schemes

Podcast cover
Read more
With the COVID-19 pandemic continuing to surge, organizations must remain vigilant in their defense against coronavirus-themed phishing, business email compromise and other fraud campaigns, says attorney Robert Egan, who offers risk mitigation insights.

Jul 01 2020

Play

Analysis: Keeping IoT Devices Secure

Podcast cover
Read more
This edition of the ISMG Security Report analyzes whether IoT devices will outlive their security updates. Also featured: Why security spending needs to shift further upstream; could banks be custodians of identity?

Jun 26 2020

Play

PCI Council's Efforts to Fight Fraud During COVID-19 Crisis

Podcast cover
Read more
Troy Leach of the PCI Security Standards Council discusses how the shift to card-not-present transactions during the COVID-19 pandemic has created new fraud-fighting challenges and offers an update on pending standards revisions.

Jun 26 2020

Play

Analysis: Mitigating Risks in Multicloud Environments

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses recent research on the cyberthreats in multicloud environments and how to mitigate them. Also featured: A ransomware risk management update; tips on disaster planning.

Jun 19 2020

Play

Ransom Demands: What Happens If Victims Pay or Don't Pay?

Podcast cover
Read more
If your organization gets hit by ransomware, what should happen next? Ideally, organizations will get help to identify the best response, says Kroll's Alan Brill. He notes that many organizations are now carrying cyber insurance coverage, in part, to gain rapid access to incident response tools and expertise.

Jun 17 2020

Play

COVID-19: Privacy, Security Concerns as Businesses Reopen

Podcast cover
Read more
As businesses reopen, they need to carefully consider the privacy, security and legal implications of collecting COVID-19 related information from customers, employees and other individuals, says privacy attorney Iliana Peters of the law firm Polsinelli.

Jun 12 2020

Play

Inside Europol's Latest Anti-Financial Crime Center

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses Europol's launch of the European Financial and Economic Crime Center, and also details the London Met's perspective on recent cybercrime trends, and to need to maintain a paper audit trail for mobile voting.

Jun 12 2020

Play

iTunes Ratings

9 Ratings
Average Ratings
6
1
0
0
2

Horrible info on corona virus, worse on cyber impacts

By Binging is good - Mar 04 2020
Read more
Listened to first episode today. It was a disaster. Guest put out questionable info on work from home (are the guest clients just incompetent managers???) and cyber impact (again, are the guests clients incompetent when arranging remote access and 24/7 best practices for protecting networks???). Worse is that there is no where to leave a comment about this but here. Unsubscribing now.

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.