Cover image of Cyber Pro Files
(11)
News
Tech News

Cyber Pro Files

Updated 2 months ago

News
Tech News
Read more

Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organizations, from the private sector, government and academia, are solving problems in the constantly changing security environment. They explore what is really keeping them up at night. Prepare to be enlightened, engaged, perhaps challenged and definitely informed while getting to know the pros who are responsible for it all.

Read more

Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organizations, from the private sector, government and academia, are solving problems in the constantly changing security environment. They explore what is really keeping them up at night. Prepare to be enlightened, engaged, perhaps challenged and definitely informed while getting to know the pros who are responsible for it all.

iTunes Ratings

11 Ratings
Average Ratings
4
2
1
2
2

iTunes Ratings

11 Ratings
Average Ratings
4
2
1
2
2
Cover image of Cyber Pro Files

Cyber Pro Files

Latest release on Jul 28, 2020

Read more

Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organizations, from the private sector, government and academia, are solving problems in the constantly changing security environment. They explore what is really keeping them up at night. Prepare to be enlightened, engaged, perhaps challenged and definitely informed while getting to know the pros who are responsible for it all.

Rank #1: SC 106: David Cass, Global CISO IBM Cloud & SaaS, and David Rooker, CISO Actian Corp, Discuss Today's Greatest Security Threats

Podcast cover
Read more

In the series brought to you by Security Current and Intersections IT Security ONE2ONE Summit and you will hear CISOs discuss today’s most critical issues in IT Security.

This episode features David Cass, IBM Cloud & SaaS Global CISO, and David Rooker, Actian Corporation CISO, who discuss the most prevalent attack vectors today, from email to ransomware with the Internet of Things (IoT) increasingly becoming a high security issue.

In this podcast you’ll hear about how the IoT brings great benefits while exponentially expanding the opportunity landscape for bad actors. You’ll also hear what Rooker is doing to enable business processes while bolstering security. They also touch on the need for qualified security personnel and how to find the right candidates.

Aug 18 2016

9mins

Play

Rank #2: SC 44: FBI Views on Cybersecurity

Podcast cover
Read more

The recent US Presidential Directive along with White House statements on cybersecurity have brought new energy to law enforcement approaches against cybercrime. 

Sharing threat data within the public and private partnership is becoming increasingly important as work continues to mitigate security breaches.

In this podcast, Security Current's Vic Wheatman speaks with FBI Assistant Special Agent in Charge for San Francisco's Cyber Division Malcomb Palmore about the evolution of cyber threats, cyber terrorism, industrial espionage and the FBI's focus.

Feb 18 2015

11mins

Play

Rank #3: SC 47: Cloud Security Monitoring, Cloud Access Security Brokers and MSSPs

Podcast cover
Read more

Monitoring new cloud environments for adequate security is challenging, particularly when trying to determine which approach might be best.

Most Managed Security Service Providers (MSSPs), while "out there" in someone else's data center, are not operating from the cloud and are not necessarily the right choice for monitoring the security of cloud instances.

Organizations have a responsibility to manage the relationship when MSSPs are used or money could be wasted.

Emerging between the enterprise and the cloud are Cloud Access Security Brokers or CASBs. These topics are explored in this discussion between Security Current's Vic Wheatman and Gartner Research Vice President Dr. Anton Chuvakin.

Mar 04 2015

7mins

Play

Rank #4: SC 105: Part 3- CISO of IBM Cloud & SaaS Speaks with Spirent on Medical Device and Autonomous Car Hacking

Podcast cover
Read more

In part three of the conversation David Cass, IBM cloud & SaaS global CISO and John Weinschenk, Spirent Communications general manager enterprise and network application discuss the potential hacking of medical devices and automated cars.

In this Spirent-sponsored podcast, Weinschenk explains how they worked with a surgeon to hack a medical device. He also talks about a second hack they conducted on an autonomous car that allowed them to take control of the systems and vehicle itself.

They discuss what needs to be done to secure these Internet of Things (IoT) devices and how manufacturers need to start thinking about how these systems can be exploited.

Aug 11 2016

8mins

Play

Rank #5: SC 104: David Cass, CISO IBM Cloud & SaaS, and David Mahon, CSO CenturyLink, Discuss the Most Common Threats Hitting Businesses Today

Podcast cover
Read more

In this conversation with  Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, CenturyLink Chief Security Officer, discusses what he sees as two of today’s critical security issues and how to tackle them.

Mahon points to phishing and ransomware as the most prevalent types of attacks he is seeing in the industry. The two executives talk about the importance of security awareness training and Mahon provides tactical approaches to reduce the likelihood of a successful breach. They also discuss metrics, ROI and best practices for reporting to the board.

Aug 10 2016

10mins

Play

Rank #6: SC 127: EDR for All – Bitdefender Discusses Best Practices for Implementing Endpoint Detection and Response Technology

Podcast cover
Read more

The business of information security is tough: the bad guys only need to get it right once, while the good guys have to get it right all the time. One hundred percent protection of all endpoints is not possible, and eventually, there will be an infection. The question is, how do you react as quickly as you can to detect the most important infections before they wreak havoc in your system?

In this Bitdefender-sponsored podcast, IBM Cloud and SaaS Operations Global CISO David Cass talks to Harish Agastya, VP of Enterprise Solutions at Bitdefender, about the challenges in Endpoint Detection and Response (EDR). They explore how EDR is one of many layers of protection and how it works best when it relies on the intelligence of prior layers.  

Harish emphasizes how the reduction of noise generated by these often-disparate solutions is crucial and how such solutions need to be available to all players in the market – not just to big organizations with deep pockets.

Apr 04 2018

11mins

Play

Rank #7: SC 45: The Security Hits Keep Coming

Podcast cover
Read more

Some research suggests that 97 percent of organizations are already compromised, according to former Gartner analyst Eric Ouellet. And according to Ouellet the hackers are smarter and more persistent than ever, often having a better understanding of an organization's particular computing environment better than its owners.

Recorded on the streets of San Francisco with Security Current's Vic Wheatman, Ouellet who is currently VP of Strategy for Bay Dynamics says that hackers will find a way to get inside an organization's network even if it takes a long time. There is only so much you can do to protect your environment, Ouellet adds and points to credit card companies use of anomalous behaviors as where the industry needs to head to mitigate attacks. 

Feb 24 2015

7mins

Play

Rank #8: SC 99: CISO David Cass Speaks to Spirent Communications on IoT, Ranswomware and More

Podcast cover
Read more

CISOs can never reduce risk to zero. As technology development increases at a lightning speed with the Internet of Things (IoT) bringing more Internet-enabled devices daily and the cloud becoming more pervasive, what can and should be done? 

CISO David Cass, IBM Cloud and SaaS, speaks with John Weinschenk, , general manager enterprise and network application security of Spirent Communications, about some of the biggest threats facing enterprises as a result of these trends. 

Listen to this sponsored podcast as David and John, discuss ransomware, including hacker help desks, and the Internet of Things, including the potential for your refrigerator to attack you. They talk about some of the top things enterprises need to do from patching systems to testing to awareness to bolster their defenses.

Jun 21 2016

11mins

Play

Rank #9: SC 125: Ron Green, Mastercard Executive VP & CISO, Talks New Technologies, What Keeps Him Up at Night and Provides Recommendations to His Peers

Podcast cover
Read more

Mastercard is a technology company in the global payments industry which operates the world’s fastest payments processing network, connecting consumers, financial institutions, merchants, governments and businesses in more than 210 countries and territories. Mastercard’s products and solutions make everyday commerce activities – such as shopping, traveling, running a business and managing finances – easier, more efficient and secure for everyone. 

As Mastercard’s Executive Vice President and CISO, Ron Green is responsible for upholding that mission. In this podcast, Green, a security visionary responsible for both cyber and physical security, speaks with David Cass, Global Partner, Cloud Security and FSS CISO at IBM, about what Mastercard is doing to ensure the promise of security not only today but in the future. Green talks about new technologies and processes, what keeps him up at night, and he provides recommendations to his peers. 

Oct 09 2017

10mins

Play

Rank #10: SC 122: CISO David Cass Talks Cloud Adoption and Security

Podcast cover
Read more
Enterprises are increasingly adopting cloud strategies. Despite this, adoption has been impacted in some cases due to cybersecurity concerns.   In this podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM reviews the state of cloud adoption and security with Mike Schuricht, Senior Director of Product Management at Bitglass, a cloud access security broker.   The two experts discuss how cloud is taking off and that despite security being a key concern of CISOs, with the right protections and solutions in place, cloud can be highly secure.    In this Bitglass sponsored podcast, the two touch on critical control areas and what CISOs should take into account when adopting and maintaining a cloud strategy.

Jun 06 2017

14mins

Play

Rank #11: SC 126: Tufin Talks Increasing Security and Agility Through Security Policy Orchestration

Podcast cover
Read more

Enterprise networks grow more complex by the day. With hundreds to thousands of firewall rules, devices and routers across on-premise and hybrid cloud environments, it is difficult to have visibility into the security policy change process.

This complexity, combined with the increasing rate of change, leads to vulnerability in the network. In addition, business owners need to have applications provisioned quickly but have little consideration as to the security implications of their requests.

In this Tufin sponsored podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discusses with Sagi Bar-Zvi, Tufin’s Solution Architect for the Americas, the benefits to CISOs of automating security policy orchestration. The two talk about how it delivers agility while verifying change requests – sometimes hundreds per day – will not cause a security breach once made.

Nov 07 2017

11mins

Play

Rank #12: SC 20: Securing the Branch Location and Remote Site

Podcast cover
Read more

BLACK HAT SERIES 2014

Hackers continue to go after the easiest target -- the branch or remote office be it a gas station, retail store, bank branch, local health clinic or the like.

Armed with the knowledge that organizations are increasingly distributed and most organizations' budgets are allocated to headquarters, a branch or remote office often provides an easy access point for attackers.

Vic Wheatman speaks at Black Hat with Dave Porcello, CTO and founder of Pwnie Express about what kinds of attack the organization should actually be concerned about.

Is it the advanced persistent threat or is it that unknown rogue access point? As you'll hear from Porcello, your organization may have unbelievable security 99 percent of the time but it's that one computer, or air conditioning duct, that often opens the door.

Aug 11 2014

11mins

Play

Rank #13: SC 17: Sex Tapes, Cloud and Security

Podcast cover
Read more

A recent movie shows what happens when a private video goes "up into the cloud" for everyone to see. 

The movie is called "Sex Tape." A memorable refrain from one of the characters in the movie is "Nobody Understands the Cloud."

securitycurrent's Vic Wheatman speaks with cloud expert JD Sherry of Trend Micro about the controls and protective services organizations should implement to protect their cloud-based applications.

Sherry, Trend Micro's VP of Technology and Solutions, notes that by 2014 some 51 percent of workloads will be processed in the cloud, pointing out that organizations are seeing the benefits of the adoption of these huge cloud-based services.

The also examine the importance of security and privacy and note real-world instances of just what can happen in a cloud ecosystem. 

Jul 09 2014

13mins

Play

Rank #14: SC 66: Using User Behavior Intelligence To Identify Account Takeovers

Podcast cover
Read more

Massive database breaches have resulted in millions of user identification and authentication profiles being compromised. Identifying unauthorized attempts to access systems or accounts is a basic requirement for financial institutions, etailers, retailers, healthcare provides and other enterprises.

Knowing the difference between employee and attacker behavior is key to avoiding security alert fatigue and using scarce resources to parse the good from the bad access attempts.

Further, collecting information about rogue takeovers for forensics purposes is a a good idea. Security Current's Vic Wheatman speaks on these issues and others with Mark Seward, Vice President of Marketing for Exabeam in this sponsored podcast.

Jul 14 2015

6mins

Play

Rank #15: SC 81: Addressing the Growing Cybersecurity Threat in 2016 with Jason Witty, U.S. Bancorp CISO

Podcast cover
Read more

The overall cost of cyber crime in 2015 to the world economy as a whole was estimated at a conservative $575 billion, according to research. Breaches are growing in number and sophistication.

According to Jason Witty, Executive Vice President and CISO at U.S. Bancorp, there are five major sources of information security threats and they are continuing to evolve dramatically.

He identified five high-level classifications which include: insider threats, organized crime, hactivists, terrorists, and nation states.

But as Witty tells Security Current’s Vic Wheatman there is a light at the end of the tunnel. Using security frameworks and taking advantage of new legislation that supports threat information sharing among organizations are some of the most viable approaches to combating the increasingly sophisticated and emerging threats.  Hear about these topics, as well as the growth in business email compromise, in this conversation.

Dec 23 2015

13mins

Play

Rank #16: SC 120: DocuSign CISO Discusses the Human Element of Incident Response

Podcast cover
Read more

The volume of threats and attacks most security teams face daily can leave them overworked and fatigued, operating in what DocuSign CISO Vanessa Pegueros has identified as level one trauma – a sort of cyber PTSD that can put organizations at risk. In this podcast, Pegueros talks with David Cass, IBM Cloud & SaaS Global CISO, about her four-part series in Security Current that explores the human element of incident response and how CISOs can identify and resolve trauma in the organization. They also discuss the Board’s role in incident response and why being quick to fire after a breach may not always be the most effective approach. Read the series: Read Part OneRead Part TwoRead Part ThreeRead Part Four

Feb 28 2017

13mins

Play

Rank #17: SC 40: A Small Company Takes on the Devil Inside the Beltway

Podcast cover
Read more

LabMD processes medical specimens. One day, a security services company emailed them advising that its patented searching software, which looks for problems caused by peer-to-peer applications, found a file with sensitive information.

The security company offered its services at $475 an hour in what was interpreted as a shakedown. LabMD refused to play and refused to pay, choosing to mitigate the problem themselves. 

The security company turned over its finding to the Federal Trade Commission (FTC) leading to a multi-year, resource-draining battle by LabMD to try prove that they did nothing wrong. 

Security Current's Vic Wheatman spoke with LabMD's CEO Mike Daugherty, author of The Devil Inside the Beltway: The Shocking Expose of the US Government's Surveillance and Overreach into Cybersecurity, Medicine and Small Business. Daugherty talks about taking on a government bureaucracy over matters of principle. 

Also, read Security Current's Richard Stiennon's review of Daugherty's book.

Jan 06 2015

19mins

Play

Rank #18: SC 21: Yale New Haven Health System Cyber Security Case Study

Podcast cover
Read more

YALE NEW HAVEN HEALTH SYSTEM CASE STUDY

With an increase in cyber attacks across industries, and in particular healthcare with medical-related identity theft accounting for 43 percent of all identity thefts reported in the United States last year according to the Identity Theft Resource Center, managing risk has never been more pressing for organizations.

With risk growing daily and the consequences -- both in terms of data loss, patient and employee confidence and potential fines -- looming large, one healthcare organization that takes cyber security seriously is Yale New Haven Health System.

Steve Bartolotta, who heads the health system's information security and risk management program talks about the challenges facing organizations today across verticals and what measures he recommends taking. 

In this podcast with securitycurrent's Vic Wheatman, Bartolotta talks about the actual tools he uses to support Yale New Haven's risk management system and what he has gained. 

Aug 18 2014

12mins

Play

Rank #19: SC 62: Augmenting the Past with Network Forensics

Podcast cover
Read more

Most "new" security technologies use functions and features developed years ago. Network Forensics applies machine learning, automating detection functions via machine-based analytics to decode and visualize relevant metadata.

Accordingly, Network Forensics represents an evolutionary trend in security. Who is providing these tools and capabilities? Gartner Research Director Lawrence Pingree answers the questions in this interview with Security Current's Vic Wheatman.

Jun 05 2015

8mins

Play

Rank #20: SC 67: Cloud SIEM Doesn't Really Exist - Yet

Podcast cover
Read more

SIEM stands for Security Information and Event Management.

SIEM is continuing to grow in usage but where does it stand in terms of cloud deployments and what is its cloud-based market share?

Gartner's Dr. Anton Chuvakin challenges the idea that one can compute market share for "Cloud SIEM" products because they actually don't quite exist, yet.

While he acknowledges that there are some "almost" SaaS (Software as a Service) SIEM products and services, true cloud-based SIEM solutions are not available.

In conversation with Security Current's Vic Wheatman, Dr. Chuvakin provides a taxonomy for SIEM and describes for the definitional differences.

Jul 20 2015

7mins

Play

SC 136: Tomás Maldonado, CISO of the National Football League (NFL), speaks with Ian Keller, CSO of SBV Bank

Podcast cover
Read more

Tomás Maldonado, CISO of the National Football League (NFL), speaks with Ian Keller, CSO of SBV Bank, which operates across Africa and is the only company in South Africa to partner with the South African Reserve Bank to collect banknotes and coins.

The two leading security executives talk about their everyday experiences and the commonalities in terms of what they face from business and technical perspectives. They also discuss the convergence of physical and information security.

In particular, Ian discusses attacks on their over 700 armored vehicles and how it impacts not only physical security but information security. He also touches on the decline in use of cash and how that impacts the business.

Security Current’s host Tomás also discusses today’s technology trends in security with Ian and how there has been a shift to focus on the endpoint which with a remote workforce is outside of a CISOs direct control.

Jul 28 2020

21mins

Play

CISOs Talk Third Party Risk Management

Podcast cover
Read more

Jul 21 2020

5mins

Play

SC 135: VP and CISO of Sentara Healthcare Dan Bowden speaks about the not-for-profit health system’s journey post COVID-19

Podcast cover
Read more

Dan Bowden, VP and CISO Sentara Healthcare, speaks with *David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York, about the not-for-profit health system’s journey post COVID-19. The two leaders talk about how each industry - and within healthcare itself - have encountered different issues when ramping up. They discuss security, cloud capabilities, training and more. They also touch on personnel and the importance of taking care of employees while acknowledging the commitment and impressive work Sentara’s team, which serves Virginia and North Carolina, has performed. Listen to learn about the successes and some of the unique challenges Dan has encountered and how he has met them.

*Any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System

Jun 30 2020

14mins

Play

SC 134: SVP and CISO of Ellie Mae Selim Aissi shares his invaluable insights

Podcast cover
Read more

Having conducted a major influenza pandemic exercise in Q4 of last year assuming all employees were sent home, Ellie Mae SVP & CISO Selim Aissi was able to quickly and effectively respond to COVID-19. In this podcast, Selim speaks with *David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York. Selim talks about technology and the importance of endpoint security as the perimeter becomes unknown. He also discusses attack trends he is seeing since COVID-19 hit, noting an increase in phishing using COVID as bait. And he talks about the importance of ensuring the well-being of employees and the need to communicate regularly. Listen now to hear Selim’s invaluable insights.

*Any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System

Jun 10 2020

11mins

Play

Listen to a sneak peek on our upcoming CISO Roundtable: Unprecedented Times

Podcast cover
Read more

Host and moderator Joey Johnson, CISO of Premise Health, will be joined by leading healthcare CISOs Hussein Syed of RWJBarnabas Health and Anahi Santiago of ChristianaCare as they discuss the unique challenges they face as they support frontline and remote medical workers as well as the myriad of other personnel and people. As you’ll hear from Joey in this preview, he will talk about how they are facilitating and securing a diverse workforce as well as patients, what they have learned and where they see things heading. Sponsored by Forescout --- for every registrant, Forescout will donate 10 meals to Feed America.

Jun 10 2020

1min

Play

SC 133: Chief Information Security Officer (CISO) at Metropolitan Water District of Southern California Jake Margolis

Podcast cover
Read more

Jake Margolis, CISO Metropolitan Water District of Southern California – the largest distributor of treated drinking water in the United States, has leveraged tried and true foundational technologies in response to COVID-19 while moving forward with their tech procurement plans. In this conversation with *David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York, the two leaders discuss the impact the pandemic has had on organizations from a technology, security and personnel perspective. They talk about how today’s changes with the shift to working remotely may impact hiring and the way a business operates in the future. Listen to learn some of the innovative and creative ways Jake has met the challenge facing all CISOs.

*Any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System

Jun 08 2020

10mins

Play

SC 132: Chief Information Security Officer (CISO) of Fannie Mae Christopher Porter talks about today’s challenging times and the importance of people

Podcast cover
Read more

Fannie Mae CISO Christopher Porter speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York. The two industry leaders discuss today’s challenging times and the importance of people. They talk about staying connected with and taking care of staff. Chris provides additional insights into his new normal and where he sees things heading.

*Any opinions David expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System.

Jun 02 2020

12mins

Play

SC 131: Global CSO of TikTok Roland Cloutier discuss the new normal and what things may look like on the other side.

Podcast cover
Read more

Global CSO of TikTok Roland Cloutier speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions David expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System). A seasoned executive, Roland provides guidance on being successful when starting a new role. The two industry leaders also discuss the new normal and what things may look like on the other side. They talk business resiliency and CISO TikToks.

May 28 2020

10mins

Play

SC 130: Dr. Pablo Molina, AVP and CISO at Drexel University Speaks About Distance Learning and the Challenges the University Has Encountered

Podcast cover
Read more

Dr. Pablo Molina, AVP and CISO at Drexel University speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System).

Dr. Molina discusses how the university transitioned faculty, staff and students among others to a work remotely and distance learning and the challenges the leading university has encountered. Additionally, he addresses Zoom bombing incidents, increased phishing attempts with bad actors trying to leverage COVID-19 and the need for the university to maintain an open network from a research and  academic freedom point of view.

May 19 2020

11mins

Play

Listen to a sneak peek on our upcoming CISO Roundtable: The New Normal

Podcast cover
Read more

Host and moderator David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York* talks about what to expect when his CISO peers Frank Aiello of Maximus, David Levine of RICOH USA, Colin Anderson of Levi Strauss and Tessian CEO Tim Sadler join him to discuss the people and processes in place due to the pandemic and what to expect moving forward.

* The opinions David expresses are his own and do not represent the Federal Reserve Bank of NY or the Federal Reserve System

May 14 2020

1min

Play

SC 129: Chief Information Security Officer (CISO) Colin Anderson Discusses People Being Paramount During COVID-19

Podcast cover
Read more

CISO Colin Anderson of Levi Strauss speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions he expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System). Colin discusses how Levi Strauss is putting people first and using the current crisis to move the business forward. The two seasoned security professionals also discuss challenges that have arisen due to COVID-19.

May 11 2020

11mins

Play

SC 128: CISO David Levine of RICOH USA Talks Quickly Moving to a Remote Workforce Due to the Pandemic

Podcast cover
Read more

What impact has the COVID-19 pandemic had on the security of organizations that have now by and large had to quickly migrate to a remote workforce? David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions he expresses are his own opinions and don’t represent the Federal Reserve Bank of NY or the Federal Reserve System) speaks with David Levine, VP and CISO of RICOH USA, Inc. The experts discuss how the move impacts RICOH and what it has meant in terms of security. Prepare to be enlightened, engaged, and definitely informed on the new normal.

May 11 2020

14mins

Play

SC 127: EDR for All – Bitdefender Discusses Best Practices for Implementing Endpoint Detection and Response Technology

Podcast cover
Read more

The business of information security is tough: the bad guys only need to get it right once, while the good guys have to get it right all the time. One hundred percent protection of all endpoints is not possible, and eventually, there will be an infection. The question is, how do you react as quickly as you can to detect the most important infections before they wreak havoc in your system?

In this Bitdefender-sponsored podcast, IBM Cloud and SaaS Operations Global CISO David Cass talks to Harish Agastya, VP of Enterprise Solutions at Bitdefender, about the challenges in Endpoint Detection and Response (EDR). They explore how EDR is one of many layers of protection and how it works best when it relies on the intelligence of prior layers.  

Harish emphasizes how the reduction of noise generated by these often-disparate solutions is crucial and how such solutions need to be available to all players in the market – not just to big organizations with deep pockets.

Apr 04 2018

11mins

Play

SC 126: Tufin Talks Increasing Security and Agility Through Security Policy Orchestration

Podcast cover
Read more

Enterprise networks grow more complex by the day. With hundreds to thousands of firewall rules, devices and routers across on-premise and hybrid cloud environments, it is difficult to have visibility into the security policy change process.

This complexity, combined with the increasing rate of change, leads to vulnerability in the network. In addition, business owners need to have applications provisioned quickly but have little consideration as to the security implications of their requests.

In this Tufin sponsored podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discusses with Sagi Bar-Zvi, Tufin’s Solution Architect for the Americas, the benefits to CISOs of automating security policy orchestration. The two talk about how it delivers agility while verifying change requests – sometimes hundreds per day – will not cause a security breach once made.

Nov 07 2017

11mins

Play

SC 125: Ron Green, Mastercard Executive VP & CISO, Talks New Technologies, What Keeps Him Up at Night and Provides Recommendations to His Peers

Podcast cover
Read more

Mastercard is a technology company in the global payments industry which operates the world’s fastest payments processing network, connecting consumers, financial institutions, merchants, governments and businesses in more than 210 countries and territories. Mastercard’s products and solutions make everyday commerce activities – such as shopping, traveling, running a business and managing finances – easier, more efficient and secure for everyone. 

As Mastercard’s Executive Vice President and CISO, Ron Green is responsible for upholding that mission. In this podcast, Green, a security visionary responsible for both cyber and physical security, speaks with David Cass, Global Partner, Cloud Security and FSS CISO at IBM, about what Mastercard is doing to ensure the promise of security not only today but in the future. Green talks about new technologies and processes, what keeps him up at night, and he provides recommendations to his peers. 

Oct 09 2017

10mins

Play

Maxim Integrated Chief Cyber Risk Officer and SentinelOne's CEO Talk Endpoint Security, Automation and Visibility

Podcast cover
Read more

The endpoint is becoming the new edge of the business. As the doorway to your data, with more and more breaches getting in via the endpoint, it is turning into one of the weakest links for today’s business. It is critical that businesses can detect new, and real threats at the endpoint, and respond to those threats in near real-time.

However, with masses of data being generated and processed, being able to scale and respond effectively is getting harder. As you’ll hear in this SentinelOne sponsored podcast with CEO & Co-founder Tomer Weingarten and Maxim Integrated Chief Cyber Risk Officer Matt Hollcraft, automation and machine learning are key components in being successful in protecting against today’s malware.

Sep 28 2017

12mins

Play

SC 123: Bay Dynamics CEO Discusses How to Gain Insight in to Security Risks Using User Behavior Analytics

Podcast cover
Read more

CISOs are increasingly looking to User Behavior Analytics (UBA) as a key security tool to help combat threats by identifying anomalous behavior.

According to the report, CISOs Investigate: UBA, authored by more than a dozen CISOs, by quickly providing actionable intelligence, UBA enables them to potentially reduce loss to their organizations by identifying and thwarting attacks earlier.

Feris Rifai, CEO of Bay Dynamics, a provider of analytics and UBA solutions, says CISOs are realizing that to effectively protect their organization they need to add a UBA component to their security arsenal.

In this sponsored podcast, Rifai and David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discuss what UBA offers and how it is helping organizations across industries.

Aug 28 2017

9mins

Play

SC 122: CISO David Cass Talks Cloud Adoption and Security

Podcast cover
Read more
Enterprises are increasingly adopting cloud strategies. Despite this, adoption has been impacted in some cases due to cybersecurity concerns.   In this podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM reviews the state of cloud adoption and security with Mike Schuricht, Senior Director of Product Management at Bitglass, a cloud access security broker.   The two experts discuss how cloud is taking off and that despite security being a key concern of CISOs, with the right protections and solutions in place, cloud can be highly secure.    In this Bitglass sponsored podcast, the two touch on critical control areas and what CISOs should take into account when adopting and maintaining a cloud strategy.

Jun 06 2017

14mins

Play

SC 121: Joey Johnson, Premise Health CISO, Discusses Challenges in Securing Distributed, Highly Regulated Environments

Podcast cover
Read more

Premise Health is a leader in onsite health and wellness programs providing some 600 large employer sponsored employee clinics. With a highly distributed and regulated environment, Johnson is responsible for all cybersecurity and information technology, compliance, audit and vendor risk management. Johnson was just named the winner of the prestigious Information Security Executive® of the Year Award in the Southeast. In this podcast, Johnson speaks with David Cass, IBM Cloud & SaaS Global CISO, about Premise Health’s unique business model and how he uses proactive security and risk management to meet challenging security, compliance and audit demands.

Mar 27 2017

13mins

Play

SC 120: DocuSign CISO Discusses the Human Element of Incident Response

Podcast cover
Read more

The volume of threats and attacks most security teams face daily can leave them overworked and fatigued, operating in what DocuSign CISO Vanessa Pegueros has identified as level one trauma – a sort of cyber PTSD that can put organizations at risk. In this podcast, Pegueros talks with David Cass, IBM Cloud & SaaS Global CISO, about her four-part series in Security Current that explores the human element of incident response and how CISOs can identify and resolve trauma in the organization. They also discuss the Board’s role in incident response and why being quick to fire after a breach may not always be the most effective approach. Read the series: Read Part OneRead Part TwoRead Part ThreeRead Part Four

Feb 28 2017

13mins

Play

iTunes Ratings

11 Ratings
Average Ratings
4
2
1
2
2