Cover image of Banking Information Security Podcast
(8)
Business

Banking Information Security Podcast

Updated 5 days ago

Business
Read more

Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Read more

Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!

iTunes Ratings

8 Ratings
Average Ratings
4
2
1
0
1

Oh Algorithms

By morganfitzp - Mar 19 2016
Read more
There's either a recession coming or iTunes ratings system goes wonky on weekends.

Good content for me

By Spiel4 - Feb 13 2015
Read more
I find the content interesting great length, most are bite size and possible to digest. Production value is not top notch but guests and hosts are audible. I would rather they space out the content, one episode a day rather than releasing many at once.

iTunes Ratings

8 Ratings
Average Ratings
4
2
1
0
1

Oh Algorithms

By morganfitzp - Mar 19 2016
Read more
There's either a recession coming or iTunes ratings system goes wonky on weekends.

Good content for me

By Spiel4 - Feb 13 2015
Read more
I find the content interesting great length, most are bite size and possible to digest. Production value is not top notch but guests and hosts are audible. I would rather they space out the content, one episode a day rather than releasing many at once.
Cover image of Banking Information Security Podcast

Banking Information Security Podcast

Latest release on Jan 24, 2020

Read more

Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Rank #1: Zscaler's Bil Harmer on Digital Transformation

Podcast cover
Read more
Listen to the latest on security's role in digital transformation, as well as cultural and leadership challenges facing the security industry.

Feb 11 2019

Play

Rank #2: Cybersecurity Insurance: How Underwriting Is Changing

Podcast cover
Read more
Cybersecurity insurers, faced with growing demand, are looking for new ways to better measure their risks, says Aleksandr Yampolskiy, CEO of SecurityScorecard. So some are moving toward more carefully scrutinizing the cybersecurity postures of their potential clients.

Jun 18 2018

Play

Rank #3: Moving from Vulnerability Management to Response

Podcast cover
Read more
Complex, manual processes and disparate, disconnected tools make it difficult for security and IT teams to mount a cohesive response. Bryce Schroeder of ServiceNow discusses a more effective approach to vulnerability response.

Jan 08 2020

Play

Rank #4: New Playbooks for Cyber Defense

Podcast cover
Read more
Fortinet's FortiGuard Labs global threat research team is creating research playbooks that provide deep-dive analysis of not only threat trends, but also cybercriminal and adversary tools and techniques. Derek Manky and Tony Giandomenico discuss the playbook model and how it can help in the fight against cybercrime.

Aug 09 2019

Play

Rank #5: The Persistent Threat of Nation-State Cyberattacks

Podcast cover
Read more
The latest edition of the ISMG Security Report features an update on what U.S. intelligence chiefs told Congress this week about persistent nation-state cyberthreats, plus reports on evasion tactics used by cryptocurrency money launderers and what government CIOs have to say about security funding.

Feb 01 2019

Play

Rank #6: Providing Strongly Authenticated Device Identity

Podcast cover
Read more
Explosive growth in network scale and complexity demands a next generation Public Key Infrastructure (PKI) management platform. Ted Shorter of CSS says security leaders must prepare now to take full advantage of next-gen PKI solutions.

Jun 21 2018

Play

Rank #7: Defending Against Authorized Push Payment Fraud

Podcast cover
Read more
The advent of faster payments has helped accelerate authorized push payment fraud schemes in which victims are defrauded under false pretenses. Banking regulators are responding to the trend, and Rob Tharle of NICE Actimize offers advice for multilayered defense.

Apr 16 2019

Play

Rank #8: Network Security Strategies for 2019

Podcast cover
Read more
OT, IoT and systems targeted by cryptominers - those are among the main network security concerns of Greg Young, VP of cybersecurity at Trend Micro. Which technology trends should security leaders follow to improve network security? Young shares his insight.

Mar 22 2019

Play

Rank #9: Analysis: The Capital One Breach

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the root causes of the Capital One data breach. Also featured: breach remediation advice and compliance with New York's new third-party risk management requirements.

Aug 02 2019

Play

Rank #10: Class Action Breach Lawsuits: The Impact of Data for Sale

Podcast cover
Read more
After a data breach, if individuals' stolen information is offered for sale on the dark web, that potentially bolsters class action lawsuits filed by plaintiffs against the breached organization, says technology attorney Steven Teppler of the law firm Mandelbaum Salsburg P.C.

Jan 13 2020

Play

Rank #11: Assessing The Maturity of Zero Trust Across Organizations

Podcast cover
Read more
Zero Trust has become a cybersecurity marketing buzzword. But Kelsey Nelson of Okta sheds light on the realities of the Zero Trust approach, with a specific focus on the identity and access management component of the strategy.

Jan 07 2020

Play

Rank #12: Women in Cybersecurity: A Progress Report

Podcast cover
Read more
Nearly one-quarter of the global cybersecurity workforce is now made up of women. But women still face significant compensation and other career challenges, according to a new study. Mary-Jo de Leeuw of (ISC)2 shares analysis.

Apr 10 2019

Play

Rank #13: Verizon DBIR: C-Level Executives in the Crosshairs

Podcast cover
Read more
C-level executives are 12 times more likely to be the target of social incidents and nine times more likely to be the target of social breaches. This is among the key findings of the latest Verizon's Data Breach Investigations Report. Author John Grim shares insight.

May 22 2019

Play

Rank #14: How Integration, Orchestration Help in Battling Cyberthreats

Podcast cover
Read more
Improved integration, automation and orchestration are needed to better detect and respond to evolving cyberthreats, says John Maynard, vice president and global security specialist at Cisco Systems.

Jan 31 2019

Play

Rank #15: Not So 'Smart' - Child Tech Has Hackable Flaws

Podcast cover
Read more
A warning that a smartwatch marketed to parents for tracking and communicating with their children could be coopted by hackers leads the latest edition of the ISMG Security Report. It also reviews how a DNS hijacking campaign is hitting organizations and how "dark patterns" trick users.

Apr 19 2019

Play

Rank #16: Analysis: The Evolving Ransomware Threat

Podcast cover
Read more
The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's encryption-busting law.

Apr 05 2019

Play

Rank #17: Spear Phishing - Top 3 Threats

Podcast cover
Read more
Among the top new spear phishing threats to enterprises: Extortion. Asaf Cidon of Barracuda outlines the top three spear phishing threats and new strategies to defend against them.

Apr 19 2019

Play

Rank #18: A CISO on the Value of Endpoint Detection and Response

Podcast cover
Read more
Endpoint detection and response tools and other related security technologies are critical weapons for defending against cyberattacks, says Larry Whiteside, the new CISO at Greenway Health, an electronic health records company.

Jan 30 2019

Play

Rank #19: The Need for Real-Time Risk Management

Podcast cover
Read more
As companies go through a digital transformation, they need to move toward real-time risk management - and artificial intelligence can play a critical role, says David Walter, vice president of RSA Archer.

Oct 22 2018

Play

Rank #20: The Importance of Devaluing Payments Data

Podcast cover
Read more
An essential component of protecting payment information is devaluing the data that is transmitted so it's of no use to hackers, says Lance Johnson, executive director of the PCI Standards Security Council.

Mar 29 2019

Play

Analysis: New Details on the Hacking of Jeff Bezos' iPhone

Podcast cover
Read more
The latest edition of the ISMG Security Report offers an analysis of fresh details on the hacking of Amazon CEO Jeff Bezos' iPhone. Also featured: an update on Microsoft's exposure of customer service records; a hacker's take on key areas of cyber hygiene.

Jan 24 2020

Play

The Role of Satellites in Quantum Key Distribution

Podcast cover
Read more
Could satellites play a role in distributing next-generation encryption keys? Robert Bedington, CTO and co-founder at Singapore-based SpeQtral, describes quantum communications via satellites in this in-depth interview.

Jan 20 2020

Play

Sizing Up Today's Deception Technology

Podcast cover
Read more
Deception technology is evolving as a powerful asset in the cybersecurity arsenal, providing significant advantages in being able to monitor an attacker's behavior, says Joseph Krull, senior analyst at Aite Group.

Jan 20 2020

Play

Analysis: Huawei 5G Dilemma

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses why Britain is struggling to determine whether to use China's Huawei technology in developing its 5G networks. Plus: An update on a mobile app exposing infant photos and videos online and an analyst's take on the future of deception technology.

Jan 17 2020

Play

Cloud Security: Overcoming Roadblocks

Podcast cover
Read more
While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is especially critical since the liability does not rest with cloud services providers for secure configuration.

Jan 16 2020

Play

'Wartime' Security Mentality Revisited

Podcast cover
Read more
Five years ago, cybersecurity executive Dave Merkel called upon enterprises to shed their "peacetime" mindsets and adopt a "wartime" stance against persistent cybercriminals and nation-state actors. How have they risen to that challenge?

Jan 15 2020

Play

Class Action Breach Lawsuits: The Impact of Data for Sale

Podcast cover
Read more
After a data breach, if individuals' stolen information is offered for sale on the dark web, that potentially bolsters class action lawsuits filed by plaintiffs against the breached organization, says technology attorney Steven Teppler of the law firm Mandelbaum Salsburg P.C.

Jan 13 2020

Play

Reality Check: How Vulnerable Is the Power Grid?

Podcast cover
Read more
Is it possible that a nation-state actor such as Iran could create a cybersecurity incident that compromises the U.S. power grid? Bernie Cowens, most recently CISO at the nation's largest electric utility, says that's unlikely because the power grid is more cybersecure than you might think.

Jan 10 2020

Play

Analysis: 'Orwellian' Surveillance in 2020

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses "Orwellian" surveillance activity in 2020 via the ToTok app. Also featured: the controversy over enabling law enforcement to circumvent encryption; the cyberattack risks posed by IoT devices.

Jan 10 2020

Play

Quantum-Proof Cryptography: How It Would Work

Podcast cover
Read more
Researchers are attempting to develop new forms of cryptography that could not be cracked by powerful quantum computing devices that are in the works. Divesh Aggarwal, principal investigator at Singapore's Center for Quantum Technologies, describes the efforts.

Jan 10 2020

Play

Moving from Vulnerability Management to Response

Podcast cover
Read more
Complex, manual processes and disparate, disconnected tools make it difficult for security and IT teams to mount a cohesive response. Bryce Schroeder of ServiceNow discusses a more effective approach to vulnerability response.

Jan 08 2020

Play

Preparing for Potential Iranian 'Wiper' Attacks

Podcast cover
Read more
In the wake of the killing of an Iranian general in a U.S. drone attack last week, organizations - especially healthcare entities and units of government that have been vulnerable to ransomware attacks - need to be on guard against destructive "wiper" attacks, says Caleb Barlow of CynergisTek.

Jan 07 2020

Play

Assessing The Maturity of Zero Trust Across Organizations

Podcast cover
Read more
Zero Trust has become a cybersecurity marketing buzzword. But Kelsey Nelson of Okta sheds light on the realities of the Zero Trust approach, with a specific focus on the identity and access management component of the strategy.

Jan 07 2020

Play

Global Cyber Alliance President on Iranian Cyber Threat

Podcast cover
Read more
From past roles at the Department of Justice, Department of Homeland Security, Microsoft and Sony, Phil Reitinger has learned more than a thing or two about nation-states and cyber threats. In this exclusive interview, the head of the Global Cyber Alliance discusses how to respond to potential new threats from Iran.

Jan 06 2020

Play

Iran's Cyber Response: 'They're Going to Unleash the Hounds'

Podcast cover
Read more
Following the U.S. killing of Iran's Maj. Gen. Qasem Soleimani last week, security experts have warned of possible retaliatory cyber strikes. Tom Kellermann of VMware believes those attacks are imminent. "The period of mourning is over, and I think the holy war in American cyberspace is yet to begin."

Jan 06 2020

Play

Analysis: Countering Nation-State Attacks in 2020

Podcast cover
Read more
The latest edition of the ISMG Security Report discusses countering the threat of nation-state cyberattacks in 2020. Also featured: an update on France's experiment with facial recognition technology and sorting out what "zero trust" really means.

Jan 03 2020

Play

How Can Credential Stuffing Be Thwarted?

Podcast cover
Read more
Credential stuffing is a growing problem that's difficult to address, says Troy Hunt, creator of the Have I Been Pwned data breach notification service, who sizes up mitigation efforts.

Dec 31 2019

Play

2020: The Year of Zero Trust?

Podcast cover
Read more
"Zero Trust" security is rapidly transitioning from a marketing buzzword to a practical methodology for protecting today's global networks. Stan Lowe, global CISO of Zscaler, shares his 2020 vision for zero trust.

Dec 31 2019

Play

The Challenge of SOC Triage

Podcast cover
Read more
Machine-speed attacks require a machine-speed response, yet many of today's organizations still maintain legacy defenses. Mario Vuksan of ReversingLabs discusses the future of SOC triage.

Dec 30 2019

Play

FBI's Elvis Chan on Securing the 2020 Election

Podcast cover
Read more
Still stinging from efforts by foreign powers to influence the 2016 presidential election, the FBI is determined to keep the 2020 election tamper-free. Elvis Chan from the FBI's San Francisco office shares insights into the election defense strategy.

Dec 30 2019

Play

iTunes Ratings

8 Ratings
Average Ratings
4
2
1
0
1

Oh Algorithms

By morganfitzp - Mar 19 2016
Read more
There's either a recession coming or iTunes ratings system goes wonky on weekends.

Good content for me

By Spiel4 - Feb 13 2015
Read more
I find the content interesting great length, most are bite size and possible to digest. Production value is not top notch but guests and hosts are audible. I would rather they space out the content, one episode a day rather than releasing many at once.