Cover image of Government Information Security Podcast
(8)
Government

Government Information Security Podcast

Updated 8 days ago

Government
Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

iTunes Ratings

8 Ratings
Average Ratings
6
1
0
0
1

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.

iTunes Ratings

8 Ratings
Average Ratings
6
1
0
0
1

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.
Cover image of Government Information Security Podcast

Government Information Security Podcast

Latest release on Feb 26, 2020

Read more

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Rank #1: Zscaler's Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation

Podcast cover
Read more
In one of the recent stops in this roundtable dinner seriers, ISMG and Zscaler visited Boston to discuss the role of security as a catalyst for digital transformations. We saw in each of these conversations that change is difficult, but that everyone is asking the same questions, says Stan Lowe, Global CISO with Zscaler.

Jun 27 2019

Play

Rank #2: A New Credential for Healthcare Security Leaders

Podcast cover
Read more
A new professional credential aims to help healthcare organizations bolster their security leadership bench strength, says William Brad Marsh, co-chair of a committee that developed the certification.

Aug 12 2019

Play

Rank #3: Life Beyond Passwords: The Rise of Advanced Biometrics

Podcast cover
Read more
Biometrics may be in fashion, but it's in part because users are ready, willing and able to use it to prove their identity, thanks to Apple, Samsung, Google and other players providing trustable hardware for verifying people's fingerprints and faces, says IBM Security's Neil Warburton.

Jul 05 2019

Play

Rank #4: Taking Advantage of EMV 3DS

Podcast cover
Read more
Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure stand out? Matt Cooke and Paul Dulany of Broadcom weigh in on the implementation and benefits of EMV 3DS.

Nov 19 2019

Play

Rank #5: Mobile Devices: Protecting Critical Data

Podcast cover
Read more
Mobile devices are attractive targets for attackers because of messages, call logs, location data and more. State-sponsored groups are digging ever deeper into mobile hacking, says Brian Robison of BlackBerry Cylance.

Oct 31 2019

Play

Rank #6: Getting Ready for the NIST Privacy Framework

Podcast cover
Read more
By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights.

Nov 06 2019

Play

Rank #7: Identity as a Game-Changing Breach Defense

Podcast cover
Read more
Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical aspects are often more insidious, says Teju Shyamsundar of Okta. And Identity can be a powerful tool to bolster defenses.

Jun 25 2019

Play

Rank #8: Threat Intelligence: Why Sharing Is Difficult

Podcast cover
Read more
Cyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an automated way, says Shawn Henry of CrowdStrike Services. But that sharing has been hampered by a lack of understanding of why it's important and how organizations can benefit, he says.

Jul 09 2019

Play

Rank #9: CCPA Compliance: Identity Verification Challenges

Podcast cover
Read more
One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues.

Nov 12 2019

Play

Rank #10: Cybersecurity Leadership: The Next Generation

Podcast cover
Read more
IoT, the cloud, third-party risk - we hear a lot about how the cybersecurity risk surface and threat landscape have evolved. But what about the new business demands on cybersecurity leaders? Christopher Hetner, former global CISO at GE Capital, shares insights.

Aug 09 2019

Play

Rank #11: Using Standards to Bolster Medical Device Cybersecurity

Podcast cover
Read more
The use of new standards can help strengthen cybersecurity risk management of medical devices at the Department of Veterans Affairs as well as other healthcare organizations, says Anura Fernando of UL, which recently completed a study with the VA examining gaps in medical device cybersecurity approaches.

Oct 25 2019

Play

Rank #12: Analysis: The Capital One Breach

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: breach remediation advice and compliance with New York's new third-party risk management requirements.

Aug 02 2019

Play

Rank #13: Cloud Security: 'Big Data' Leak Prevention Essentials

Podcast cover
Read more
Big data analytics and search tools give organizations the ability to analyze information faster than ever before. But too many organizations deactivate security controls built into Elasticsearch, Amazon S3 buckets and MongoDB when they deploy, leaving their data exposed, says Elastic's James Spiteri.

Oct 28 2019

Play

Rank #14: Mastercard on the Evolution of Authentication

Podcast cover
Read more
Fraud schemes have migrated in recent years, exposing inherent vulnerabilities in how most organizations authenticate users. Diego Szteinhendler of Mastercard outlines new strategies and tools for evolving authentication practices beyond solely payments security.

Jun 28 2019

Play

Rank #15: How 'Zero Trust' Better Secures Applications and Access

Podcast cover
Read more
Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint.

Oct 17 2019

Play

Rank #16: Analysis: The Latest Ransomware Trends

Podcast cover
Read more
This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discussions of Microsoft's move to DNS over HTTPS and strategies for tackling IoT security challenges.

Nov 22 2019

Play

Rank #17: Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities

Podcast cover
Read more
Draft regulations to carry out the California Consumer Privacy Act do not go far enough to clarify ambiguities in the law, which goes into effect Jan. 1, 2020, says privacy attorney Sadia Mirza of the law firm Troutman Sanders, who encourages organizations to submit comments on the proposed regs.

Oct 22 2019

Play

Rank #18: A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals

Podcast cover
Read more
Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ecosystem, says regulatory attorney Julie Kass of the law firm Baker Donelson.

Nov 21 2019

Play

Rank #19: IoT in Vehicles: The Trouble With Too Much Code

Podcast cover
Read more
The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which poses risks for the coming wave of autonomous vehicles, says Campbell Murray of BlackBerry. Large code bases, which likely have many hidden software bugs, are part of the problem, he says.

Oct 16 2019

Play

Rank #20: Third-Party Risk Management: Asking the Right Questions

Podcast cover
Read more
An effective third-party risk management program starts with asking the right questions, says Brad Keller, chief strategy officer and senior vice president at the Santa Fe Group, a strategic advisory company, who spells out key issues to address.

Jun 28 2019

Play

Modified Draft CCPA Regulations: How They Impact Businesses

Podcast cover
Read more
In an in-depth interview, privacy expert Caitlin Fennessy sorts through modified draft regulations to carry out the California Consumer Privacy Act that are designed to help businesses take a more pragmatic approach to privacy.

Feb 26 2020

Play

'Privacy by Design' Implementation Tips

Podcast cover
Read more
Implementing the concept of "privacy design" requires a series of critical steps, says Heikki Tolvanen, chief legal engineer at PrivacyAnt, a Finland-based privacy consulting firm, who offers insights on mistakes to avoid.

Feb 24 2020

Play

What to Look for at RSA 2020 Conference

Podcast cover
Read more
This special edition of the ISMG Security Report offers a preview of top keynote presentations at the RSA 2020 conference, plus a look at important themes and health tips for attendees.

Feb 21 2020

Play

Coronavirus Update: Tips for Travel

Podcast cover
Read more
Globally, the coronavirus has infected more than 75,000 people and led to over 2,000 deaths. But business travelers should avoid panic, says pandemic expert Regina Phelps, who offers preventive health tips for those headed to international events, such as the RSA 2020 conference.

Feb 19 2020

Play

RSA Conference 2020 Preview

Podcast cover
Read more
"The Human Element" is the theme of the RSA Conference 2020, but there are plenty of technology-rich topics in store for attendees, including session tracks that focus on election security, open source tools, product security and anti-fraud. Britta Glade, a conference director, previews the event.

Feb 18 2020

Play

Analysis: Indictments in Equifax Hack

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection with the 2017 Equifax data breach. Also featured: Advice on implementing NIST's new privacy framework; lessons learned in a breach disclosure.

Feb 14 2020

Play

NIST Privacy Framework: The Implementation Challenges

Podcast cover
Read more
Although NIST's new privacy framework is agnostic toward any particular privacy law, "it gives organizations building blocks to help them meet any obligations under any particular law or jurisdiction" says Naomi Lefkovitz, a NIST senior privacy adviser.

Feb 11 2020

Play

Analysis: Iowa Election App Missteps

Podcast cover
Read more
The latest edition of the ISMG Security Report offers an analysis of the missteps that led to problems with the app used in this week's Democratic presidential caucuses in Iowa. Also featured: growing privacy concerns about facial recognition and business continuity tips for dealing with the coronavirus.

Feb 07 2020

Play

Coronavirus: How to Plan and Protect

Podcast cover
Read more
The coronavirus statistics are dizzying - as of Thursday, there were more than 28,000 infections and about 560 deaths. But the key stat to watch is the mortality rate, currently 2 percent, says pandemic expert Regina Phelps. How that number changes will dictate how business continuity leaders must respond.

Feb 06 2020

Play

Privacy Advocate Tackles Issue of Patient Consent Rights

Podcast cover
Read more
As health data privacy concerns heat up to a boiling point on multiple fronts, it's more essential than ever that patients get a clear opportunity to make a choice about whether their data is shared, says privacy advocate Twila Brase, who heads the Citizens' Council for Health Freedom.

Jan 31 2020

Play

Analysis: Government Policies on Huawei's 5G Role

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses the ramifications of the U.K's decision to allow limited use of Huawei's equipment in 5G networks. Plus: Updates on Wawa's stolen card data offered for sale and nascent security threats from social networks and drones.

Jan 31 2020

Play

Dave DeWalt on Securing Business-Critical Applications

Podcast cover
Read more
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of Onapsis, a vendor focused on securing business-critical applications. In this exclusive interview, DeWalt opens up on application vulnerabilities, the evolution of the nation-state threat and technologies to watch in 2020.

Jan 27 2020

Play

Analysis: New Details on the Hacking of Jeff Bezos' iPhone

Podcast cover
Read more
The latest edition of the ISMG Security Report offers an analysis of fresh details on the hacking of Amazon CEO Jeff Bezos' iPhone. Also featured: an update on Microsoft's exposure of customer service records; a hacker's take on key areas of cyber hygiene.

Jan 24 2020

Play

The Role of Satellites in Quantum Key Distribution

Podcast cover
Read more
Could satellites play a role in distributing next-generation encryption keys? Robert Bedington, CTO and co-founder at Singapore-based SpeQtral, describes quantum communications via satellites in this in-depth interview.

Jan 20 2020

Play

Sizing Up Today's Deception Technology

Podcast cover
Read more
Deception technology is evolving as a powerful asset in the cybersecurity arsenal, providing significant advantages in being able to monitor an attacker's behavior, says Joseph Krull, senior analyst at Aite Group.

Jan 20 2020

Play

Analysis: Huawei 5G Dilemma

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.

Jan 17 2020

Play

Cloud Security: Overcoming Roadblocks

Podcast cover
Read more
While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration.

Jan 16 2020

Play

'Wartime' Security Mentality Revisited

Podcast cover
Read more
Five years ago, cybersecurity executive Dave Merkel called upon enterprises to shed their "peacetime" mindsets and adopt a "wartime" stance against persistent cybercriminals and nation-state actors. How have they risen to that challenge?

Jan 15 2020

Play

Class Action Breach Lawsuits: The Impact of Data for Sale

Podcast cover
Read more
After a data breach, if individuals' stolen information is offered for sale on the dark web, that potentially bolsters class action lawsuits filed by plaintiffs against the breached organization, says technology attorney Steven Teppler of the law firm Mandelbaum Salsburg P.C.

Jan 13 2020

Play

Reality Check: How Vulnerable Is the Power Grid?

Podcast cover
Read more
Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. power grid? Bernie Cowens, most recently CISO at the nation's largest electric utility, says that's unlikely because the power grid is more cybersecure than you might think.

Jan 10 2020

Play

iTunes Ratings

8 Ratings
Average Ratings
6
1
0
0
1

Required Listening

By Pocono Charlie - Aug 25 2017
Read more
Required listening for any in gov't cybersecurity.