Cover image of Government Information Security Podcast

Government Information Security Podcast

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Ranked #1

Podcast cover

Zscaler's Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation

Zscaler's Global CISO Stan Lowe on Security as a Catalyst for Digital Transformation

In one of the recent stops in this roundtable dinner seriers, ISMG and Zscaler visited Boston to discuss the role of sec... Read more

27 Jun 2019

Ranked #2

Podcast cover

Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities

Analysis: Draft CCPA Regulations Fail to Clarify Ambiguities

Draft regulations to carry out the California Consumer Privacy Act do not go far enough to clarify ambiguities in the la... Read more

22 Oct 2019

Similar Podcasts

Ranked #3

Podcast cover

Life Beyond Passwords: The Rise of Advanced Biometrics

Life Beyond Passwords: The Rise of Advanced Biometrics

Biometrics may be in fashion, but it's in part because users are ready, willing and able to use it to prove their identi... Read more

5 Jul 2019

Ranked #4

Podcast cover

Taking Advantage of EMV 3DS

Taking Advantage of EMV 3DS

Numerous regulations and standards have been introduced globally to help curtail online fraud. What makes EMV 3D Secure ... Read more

19 Nov 2019

Most Popular Podcasts

Ranked #5

Podcast cover

Getting Ready for the NIST Privacy Framework

Getting Ready for the NIST Privacy Framework

By year's end, the National Institute of Standards and Technology should be ready to publish the first version of its pr... Read more

6 Nov 2019

Ranked #6

Podcast cover

How 'Zero Trust' Better Secures Applications and Access

How 'Zero Trust' Better Secures Applications and Access

Organizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero... Read more

17 Oct 2019

Ranked #7

Podcast cover

Preparing for Potential Iranian 'Wiper' Attacks

Preparing for Potential Iranian 'Wiper' Attacks

In the wake of the killing of an Iranian general in a U.S. drone attack last week, organizations - especially healthcare... Read more

7 Jan 2020

Ranked #8

Podcast cover

Identity as a Game-Changing Breach Defense

Identity as a Game-Changing Breach Defense

Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical as... Read more

25 Jun 2019

Ranked #9

Podcast cover

Reality Check: How Vulnerable Is the Power Grid?

Reality Check: How Vulnerable Is the Power Grid?

Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. po... Read more

10 Jan 2020

Ranked #10

Podcast cover

Threat Intelligence: Why Sharing Is Difficult

Threat Intelligence: Why Sharing Is Difficult

Cyber adversaries are resilient and move quickly, so it'st critical that organizations share threat intelligence in an a... Read more

9 Jul 2019

Ranked #11

Podcast cover

CCPA Compliance: Identity Verification Challenges

CCPA Compliance: Identity Verification Challenges

One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is det... Read more

12 Nov 2019

Ranked #12

Podcast cover

Analysis: The Capital One Breach

Analysis: The Capital One Breach

The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: b... Read more

2 Aug 2019

Ranked #13

Podcast cover

Mobile Devices: Protecting Critical Data

Mobile Devices: Protecting Critical Data

Mobile devices are attractive targets for attackers because of messages, call logs, location data and more. State-sponso... Read more

31 Oct 2019

Ranked #14

Podcast cover

Mastercard on the Evolution of Authentication

Mastercard on the Evolution of Authentication

Fraud schemes have migrated in recent years, exposing inherent vulnerabilities in how most organizations authenticate us... Read more

28 Jun 2019

Ranked #15

Podcast cover

Analysis: The Latest Ransomware Trends

Analysis: The Latest Ransomware Trends

This edition of the ISMG Security Report features an analysis of the very latest ransomware trends. Also featured: Discu... Read more

22 Nov 2019

Ranked #16

Podcast cover

Modified Draft CCPA Regulations: How They Impact Businesses

Modified Draft CCPA Regulations: How They Impact Businesses

In an in-depth interview, privacy expert Caitlin Fennessy sorts through modified draft regulations to carry out the Cali... Read more

26 Feb 2020

Ranked #17

Podcast cover

IoT in Vehicles: The Trouble With Too Much Code

IoT in Vehicles: The Trouble With Too Much Code

The threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which pos... Read more

16 Oct 2019

Ranked #18

Podcast cover

A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals

A Close Look at HHS' Cyber Donation 'Safe Harbor' Proposals

Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ec... Read more

21 Nov 2019

Ranked #19

Podcast cover

Analysis: Indictments in Equifax Hack

Analysis: Indictments in Equifax Hack

The latest edition of the ISMG Security Report analyzes the indictments of four Chinese military officers in connection ... Read more

14 Feb 2020

Ranked #20

Podcast cover

Third-Party Risk Management: Asking the Right Questions

Third-Party Risk Management: Asking the Right Questions

An effective third-party risk management program starts with asking the right questions, says Brad Keller, chief strateg... Read more

28 Jun 2019

“Podium: AI tools for podcasters. Generate show notes, transcripts, highlight clips, and more with AI. Try it today at https://podium.page”