Cover image of Security Current podcast - for IT security, networking, risk, compliance and privacy professionals
(10)

Rank #108 in Tech News category

News
Tech News

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Updated 9 days ago

Rank #108 in Tech News category

News
Tech News
Read more

The securitycurrent podcast explores what is really on the mind of information technology security executives and practitioners. Prepare to be enlightened, engaged, perhaps challenged, and definitely informed. Hear first hand what the real security issues are, learn what is behind the issues and get to know the people who are responsible for online security and privacy.Hosted by IT security professionals for everyone.

Read more

The securitycurrent podcast explores what is really on the mind of information technology security executives and practitioners. Prepare to be enlightened, engaged, perhaps challenged, and definitely informed. Hear first hand what the real security issues are, learn what is behind the issues and get to know the people who are responsible for online security and privacy.Hosted by IT security professionals for everyone.

iTunes Ratings

10 Ratings
Average Ratings
3
2
1
2
2

iTunes Ratings

10 Ratings
Average Ratings
3
2
1
2
2
Cover image of Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Security Current podcast - for IT security, networking, risk, compliance and privacy professionals

Latest release on Apr 04, 2018

Read more

The securitycurrent podcast explores what is really on the mind of information technology security executives and practitioners. Prepare to be enlightened, engaged, perhaps challenged, and definitely informed. Hear first hand what the real security issues are, learn what is behind the issues and get to know the people who are responsible for online security and privacy.Hosted by IT security professionals for everyone.

Rank #1: SC 55: Next Generation Endpoint Protection

Podcast cover
Read more

Is there room for yet another endpoint protection product in a market crowded with alternatives?

SentinelOne says there is and that they are reinventing endpoint protection with an aim to replace antivirus within the enterprise. In this sponsored podcast SentinelOne explains its approach to protecting against advanced persistent threats (APTs) and zero-day attacks while also providing forensics. Tomer Weingarten, co-founder and CEO of SentinelOne, explains to Security Current's Vic Wheatman just how the startup combines behavior detection with cloud intelligence and whitelisting to block, detect and predict attacks.

May 01 2015

5mins

Play

Rank #2: SC 46: Addressing a Critical Vulnerability Management Problem

Podcast cover
Read more

Scanning a network, devices or applications for security vulnerabilities may not tell the whole story or even tell the true story. IP addresses and host names are a moving target, constantly changing. This leads to frustration and potentially remediation of the wrong assets while broken assets may remain unevaluated and vulnerable. And the problem is worse as organizations use cloud environments. In this sponsored podcast, Security Current's Vic Wheatman speaks with security expert Tom Desot, CIO of Digital Defense Inc., who talks about the problem and offers ways to mitigate.

Mar 02 2015

8mins

Play

Rank #3: SC 60: The Role of the CISO with Daniel Conroy, Synchrony Financial

Podcast cover
Read more

As the news of breaches across multiple sectors continues the role of the Chief Information Security Officer (CISO) has never been more important.

The CISO is not only responsible for protecting the organization they are tasked with enabling the business. And with the CISO speaking in both business and technical languages, they are quickly gaining visibility with the Board of Directors that needs to understand, and to provide resources for, enterprise security.

In this podcast, Daniel Conroy, the CISO of Synchrony Financial, a leading financial institution, speaks with Security Current's Vic Wheatman about the CISO role, the definition of security intelligence, and what keeps him up at night.

May 18 2015

12mins

Play

Rank #4: SC 67: Cloud SIEM Doesn't Really Exist - Yet

Podcast cover
Read more

SIEM stands for Security Information and Event Management.

SIEM is continuing to grow in usage but where does it stand in terms of cloud deployments and what is its cloud-based market share?

Gartner's Dr. Anton Chuvakin challenges the idea that one can compute market share for "Cloud SIEM" products because they actually don't quite exist, yet.

While he acknowledges that there are some "almost" SaaS (Software as a Service) SIEM products and services, true cloud-based SIEM solutions are not available.

In conversation with Security Current's Vic Wheatman, Dr. Chuvakin provides a taxonomy for SIEM and describes for the definitional differences.

Jul 20 2015

7mins

Play

Rank #5: SC 47: Cloud Security Monitoring, Cloud Access Security Brokers and MSSPs

Podcast cover
Read more

Monitoring new cloud environments for adequate security is challenging, particularly when trying to determine which approach might be best.

Most Managed Security Service Providers (MSSPs), while "out there" in someone else's data center, are not operating from the cloud and are not necessarily the right choice for monitoring the security of cloud instances.

Organizations have a responsibility to manage the relationship when MSSPs are used or money could be wasted.

Emerging between the enterprise and the cloud are Cloud Access Security Brokers or CASBs. These topics are explored in this discussion between Security Current's Vic Wheatman and Gartner Research Vice President Dr. Anton Chuvakin.

Mar 04 2015

7mins

Play

Rank #6: SC 69: Anton Chuvakin on the Operational Effectiveness of Security Analytics

Podcast cover
Read more

How effective are Security Analytics tools and how do you compare their operational effectiveness?

After spending months researching this subject, Gartner's Dr. Anton Chuvakin says the long and short is that they just don't know how well the tools work as there isn't much data on the operational effectiveness of security analytics.

He points out that for analytics tools, many of the vendors have just 5-10 customers that have some data but it isn't enough. He tells Security Current's Vic Wheatman that a lot of stuff is very anecdotal and we only hear the success stories. So, he says it is hard to say, which type of a tool, model and statistics are working well. Listen to hear what you should do.

Jul 28 2015

9mins

Play

Rank #7: SC 120: DocuSign CISO Discusses the Human Element of Incident Response

Podcast cover
Read more

The volume of threats and attacks most security teams face daily can leave them overworked and fatigued, operating in what DocuSign CISO Vanessa Pegueros has identified as level one trauma – a sort of cyber PTSD that can put organizations at risk. In this podcast, Pegueros talks with David Cass, IBM Cloud & SaaS Global CISO, about her four-part series in Security Current that explores the human element of incident response and how CISOs can identify and resolve trauma in the organization. They also discuss the Board’s role in incident response and why being quick to fire after a breach may not always be the most effective approach. Read the series: Read Part OneRead Part TwoRead Part ThreeRead Part Four

Feb 28 2017

13mins

Play

Rank #8: SC 64: Overcoming Silos Between Security and Privacy

Podcast cover
Read more

For organizations to achieve maximum privacy and security the two need to go hand-in-hand but unfortunately they are often siloed within organizations. So how are organizations evolving to incorporate privacy, risk and compliance to address information security requirements? 

Finding the balance between holding what may be sensitive information about individuals and partners among others with regulations and laws protecting that information has become critical. Security Current's Vic Wheatman speaks with internationally-acclaimed, Professor Daniel Solove of the George Washington Law School, and CEO and Founder of training company TeachPrivacy about these issues and a groundbreaking conference being held in October 2015 that bridges the silos between privacy and security.

Jul 06 2015

19mins

Play

Rank #9: SC 99: CISO David Cass Speaks to Spirent Communications on IoT, Ranswomware and More

Podcast cover
Read more

CISOs can never reduce risk to zero. As technology development increases at a lightning speed with the Internet of Things (IoT) bringing more Internet-enabled devices daily and the cloud becoming more pervasive, what can and should be done? 

CISO David Cass, IBM Cloud and SaaS, speaks with John Weinschenk, , general manager enterprise and network application security of Spirent Communications, about some of the biggest threats facing enterprises as a result of these trends. 

Listen to this sponsored podcast as David and John, discuss ransomware, including hacker help desks, and the Internet of Things, including the potential for your refrigerator to attack you. They talk about some of the top things enterprises need to do from patching systems to testing to awareness to bolster their defenses.

Jun 21 2016

11mins

Play

Rank #10: SC 104: David Cass, CISO IBM Cloud & SaaS, and David Mahon, CSO CenturyLink, Discuss the Most Common Threats Hitting Businesses Today

Podcast cover
Read more

In this conversation with  Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, CenturyLink Chief Security Officer, discusses what he sees as two of today’s critical security issues and how to tackle them.

Mahon points to phishing and ransomware as the most prevalent types of attacks he is seeing in the industry. The two executives talk about the importance of security awareness training and Mahon provides tactical approaches to reduce the likelihood of a successful breach. They also discuss metrics, ROI and best practices for reporting to the board.

Aug 10 2016

10mins

Play

Rank #11: SC 107: John Masserini, CSO MIAX Options, Speaks with Barmak Meftah, President and CEO AlienVault, About Threat Detection and Response

Podcast cover
Read more

In this conversation, MIAX Options CSO John Masserini discusses the threat detection and response space with AlienVault President and CEO Barmak Meftah.

An early adopter of threat intelligence, Masserini notes its challenges and asks Meftah what AlienVault is seeing in the market and how threat intelligence is being integrated into companies’ security organizations.

Meftah talks about the need to efficiently aggregate information while noting that it is more important to synthesize the information to ensure it is easily consumable and actionable.

He describes AlienVault’s crowdsourcing approach and how it is helping SMBs centralize and simplify their threat detection and response. They were speaking in this sponsored podcast at the Black Hat Conference in Las Vegas earlier this month.

Aug 23 2016

13mins

Play

Rank #12: SC 105: Part 3- CISO of IBM Cloud & SaaS Speaks with Spirent on Medical Device and Autonomous Car Hacking

Podcast cover
Read more

In part three of the conversation David Cass, IBM cloud & SaaS global CISO and John Weinschenk, Spirent Communications general manager enterprise and network application discuss the potential hacking of medical devices and automated cars.

In this Spirent-sponsored podcast, Weinschenk explains how they worked with a surgeon to hack a medical device. He also talks about a second hack they conducted on an autonomous car that allowed them to take control of the systems and vehicle itself.

They discuss what needs to be done to secure these Internet of Things (IoT) devices and how manufacturers need to start thinking about how these systems can be exploited.

Aug 11 2016

8mins

Play

Rank #13: SC 109: IBM Global CISO Cloud & SaaS and ADP Vice President & Global Security Architect Discuss the Business and Technology Benefits of User Behavior Analytics (UBA) Tools

Podcast cover
Read more

The use of user behavior analytics (UBA) is at the forefront of technologies that CISOs are seeking for their security toolkits to help them identify that needle-in-a-haystack.

In this podcast sponsored by Exabeam, IBM’s David Cass talks with ADP’s V.Jay LaRosa about how UBA provides always on threat hunting to detect and thwart cyber attacks. LaRosa discusses ADP’s selection and implementation of the UBA solution and how his team uses it to quickly and effectively identify potential anomalous behavior. He also talks ROI, staffing and why he wishes he had started sooner.

Sep 26 2016

9mins

Play

Rank #14: SC 121: Joey Johnson, Premise Health CISO, Discusses Challenges in Securing Distributed, Highly Regulated Environments

Podcast cover
Read more

Premise Health is a leader in onsite health and wellness programs providing some 600 large employer sponsored employee clinics. With a highly distributed and regulated environment, Johnson is responsible for all cybersecurity and information technology, compliance, audit and vendor risk management. Johnson was just named the winner of the prestigious Information Security Executive® of the Year Award in the Southeast. In this podcast, Johnson speaks with David Cass, IBM Cloud & SaaS Global CISO, about Premise Health’s unique business model and how he uses proactive security and risk management to meet challenging security, compliance and audit demands.

Mar 27 2017

13mins

Play

Rank #15: Creating and Managing a Security Aware Culture

Podcast cover
Read more

In both the public and private sectors employees are by and large the weakest links when it comes to information security breaches.

Training needs to be more than simply a checkbox on a compliance list. Optimal approaches combine training and technology to ensure employees are security aware.

As you'll hear from Gartner Research Director Perry Carpenter in this conversation with Security Current's Vic Wheatman, training is not a one-time endeavor but needs to be multifaceted and continuous. 

Oct 20 2015

8mins

Play

Rank #16: SC 110: David Mahon, CSO of CenturyLink, and David Cass, Global CISO IBM Cloud & SaaS, Discuss the Evolution of the CISO and Provide Tips to Current and Aspiring CISOs

Podcast cover
Read more

In this conversation with Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, CenturyLink CSO, talks about the evolution of the CISO role.

A seasoned security executive, with experience reporting to boards-of-directors, Mahon also provides guidance on how to present to a board. He also gives recommendations to current and aspiring CISOs on how to advance their careers.

Oct 26 2016

10mins

Play

Rank #17: SC 115: Gartner Research VP Anton Chuvakin Speaks with Global CISO David Cass on Security Monitoring, SIEM and UBA

Podcast cover
Read more

What specific things should companies look at when it comes to security monitoring in 2017? As you’ll hear in this podcast, a lot of the security problems facing organizations from the late 1990s and early 2000s have yet to be solved. David Cass, Global CISO IBM Cloud and SaaS, and Dr. Anton Chuvakin, research VP at Gartner’s Technical Professionals (GTP) Security and Risk Management Strategies team, discuss how security executives are still operationally challenged.

Chuvakin discusses how the technology landscape is changing but a lot of the challenges with the people themselves actually haven’t changed and the “old problems” haven’t been solved. In this podcast, he talks to Cass about the essential things organizations should be looking at, including newer technology like User Behavior Analytics (UBA) as well as Data Loss Prevention (DLP) solutions.

Jan 17 2017

11mins

Play

Rank #18: SC 111: Matt Hollcraft, Maxim Integrated CISO, Speaks with Dan Schiappa, SVP & GM, Sophos Enduser Security Group on Ransomware, IoT and Hacking as a Business

Podcast cover
Read more

In this interview Matt Hollcraft, Maxim Integrated CISO, discusses common threat vectors – what is old and what is new – with Dan Schiappa, SVP & GM, Sophos Enduser Security Group. They talk about ransomware, the mobile workforce, Internet of things and hacking as a business. In this sponsored podcast, you’ll also hear about approaches that enterprises can take to reduce threats, which are increasingly sophisticated and continuous.

Nov 04 2016

14mins

Play

Rank #19: SC 106: David Cass, Global CISO IBM Cloud & SaaS, and David Rooker, CISO Actian Corp, Discuss Today's Greatest Security Threats

Podcast cover
Read more

In the series brought to you by Security Current and Intersections IT Security ONE2ONE Summit and you will hear CISOs discuss today’s most critical issues in IT Security.

This episode features David Cass, IBM Cloud & SaaS Global CISO, and David Rooker, Actian Corporation CISO, who discuss the most prevalent attack vectors today, from email to ransomware with the Internet of Things (IoT) increasingly becoming a high security issue.

In this podcast you’ll hear about how the IoT brings great benefits while exponentially expanding the opportunity landscape for bad actors. You’ll also hear what Rooker is doing to enable business processes while bolstering security. They also touch on the need for qualified security personnel and how to find the right candidates.

Aug 18 2016

9mins

Play

Rank #20: SC 118: Global CISO David Cass Discusses the Proliferating Attack Surface Being Created by Internet of Things Devices with ForeScout’s Commercial CTO and VP Len Rosenberg

Podcast cover
Read more

There has been an exponential adoption of Internet of Things (IoT) with experts predicting billions of IoT devices coming into use. And with the strategy more often than not being go to market and secure it later, enterprises are increasingly exposed to a variety of attacks.

As you’ll hear in this podcast with David Cass, Global CISO IBM Cloud and SaaS, and Len Rosenberg, ForeScout’s Commercial CTO and VP of Systems Engineering, the IoT is here to stay and security needs to be by design and not an afterthought. They also discuss what CISOs can do today to mitigate their exposure and what they should demand from IoT manufacturers.

Feb 10 2017

12mins

Play

SC 127: EDR for All – Bitdefender Discusses Best Practices for Implementing Endpoint Detection and Response Technology

Podcast cover
Read more

The business of information security is tough: the bad guys only need to get it right once, while the good guys have to get it right all the time. One hundred percent protection of all endpoints is not possible, and eventually, there will be an infection. The question is, how do you react as quickly as you can to detect the most important infections before they wreak havoc in your system?

In this Bitdefender-sponsored podcast, IBM Cloud and SaaS Operations Global CISO David Cass talks to Harish Agastya, VP of Enterprise Solutions at Bitdefender, about the challenges in Endpoint Detection and Response (EDR). They explore how EDR is one of many layers of protection and how it works best when it relies on the intelligence of prior layers.  

Harish emphasizes how the reduction of noise generated by these often-disparate solutions is crucial and how such solutions need to be available to all players in the market – not just to big organizations with deep pockets.

Apr 04 2018

11mins

Play

SC 126: Tufin Talks Increasing Security and Agility Through Security Policy Orchestration

Podcast cover
Read more

Enterprise networks grow more complex by the day. With hundreds to thousands of firewall rules, devices and routers across on-premise and hybrid cloud environments, it is difficult to have visibility into the security policy change process.

This complexity, combined with the increasing rate of change, leads to vulnerability in the network. In addition, business owners need to have applications provisioned quickly but have little consideration as to the security implications of their requests.

In this Tufin sponsored podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discusses with Sagi Bar-Zvi, Tufin’s Solution Architect for the Americas, the benefits to CISOs of automating security policy orchestration. The two talk about how it delivers agility while verifying change requests – sometimes hundreds per day – will not cause a security breach once made.

Nov 07 2017

11mins

Play

SC 125: Ron Green, Mastercard Executive VP & CISO, Talks New Technologies, What Keeps Him Up at Night and Provides Recommendations to His Peers

Podcast cover
Read more

Mastercard is a technology company in the global payments industry which operates the world’s fastest payments processing network, connecting consumers, financial institutions, merchants, governments and businesses in more than 210 countries and territories. Mastercard’s products and solutions make everyday commerce activities – such as shopping, traveling, running a business and managing finances – easier, more efficient and secure for everyone. 

As Mastercard’s Executive Vice President and CISO, Ron Green is responsible for upholding that mission. In this podcast, Green, a security visionary responsible for both cyber and physical security, speaks with David Cass, Global Partner, Cloud Security and FSS CISO at IBM, about what Mastercard is doing to ensure the promise of security not only today but in the future. Green talks about new technologies and processes, what keeps him up at night, and he provides recommendations to his peers. 

Oct 09 2017

10mins

Play

Maxim Integrated Chief Cyber Risk Officer and SentinelOne's CEO Talk Endpoint Security, Automation and Visibility

Podcast cover
Read more

The endpoint is becoming the new edge of the business. As the doorway to your data, with more and more breaches getting in via the endpoint, it is turning into one of the weakest links for today’s business. It is critical that businesses can detect new, and real threats at the endpoint, and respond to those threats in near real-time.

However, with masses of data being generated and processed, being able to scale and respond effectively is getting harder. As you’ll hear in this SentinelOne sponsored podcast with CEO & Co-founder Tomer Weingarten and Maxim Integrated Chief Cyber Risk Officer Matt Hollcraft, automation and machine learning are key components in being successful in protecting against today’s malware.

Sep 28 2017

12mins

Play

SC 123: Bay Dynamics CEO Discusses How to Gain Insight in to Security Risks Using User Behavior Analytics

Podcast cover
Read more

CISOs are increasingly looking to User Behavior Analytics (UBA) as a key security tool to help combat threats by identifying anomalous behavior.

According to the report, CISOs Investigate: UBA, authored by more than a dozen CISOs, by quickly providing actionable intelligence, UBA enables them to potentially reduce loss to their organizations by identifying and thwarting attacks earlier.

Feris Rifai, CEO of Bay Dynamics, a provider of analytics and UBA solutions, says CISOs are realizing that to effectively protect their organization they need to add a UBA component to their security arsenal.

In this sponsored podcast, Rifai and David Cass, the Global Partner, Cloud Security and FSS CISO at IBM, discuss what UBA offers and how it is helping organizations across industries.

Aug 28 2017

9mins

Play

SC 122: CISO David Cass Talks Cloud Adoption and Security

Podcast cover
Read more
Enterprises are increasingly adopting cloud strategies. Despite this, adoption has been impacted in some cases due to cybersecurity concerns.   In this podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM reviews the state of cloud adoption and security with Mike Schuricht, Senior Director of Product Management at Bitglass, a cloud access security broker.   The two experts discuss how cloud is taking off and that despite security being a key concern of CISOs, with the right protections and solutions in place, cloud can be highly secure.    In this Bitglass sponsored podcast, the two touch on critical control areas and what CISOs should take into account when adopting and maintaining a cloud strategy.

Jun 06 2017

14mins

Play

SC 121: Joey Johnson, Premise Health CISO, Discusses Challenges in Securing Distributed, Highly Regulated Environments

Podcast cover
Read more

Premise Health is a leader in onsite health and wellness programs providing some 600 large employer sponsored employee clinics. With a highly distributed and regulated environment, Johnson is responsible for all cybersecurity and information technology, compliance, audit and vendor risk management. Johnson was just named the winner of the prestigious Information Security Executive® of the Year Award in the Southeast. In this podcast, Johnson speaks with David Cass, IBM Cloud & SaaS Global CISO, about Premise Health’s unique business model and how he uses proactive security and risk management to meet challenging security, compliance and audit demands.

Mar 27 2017

13mins

Play

SC 120: DocuSign CISO Discusses the Human Element of Incident Response

Podcast cover
Read more

The volume of threats and attacks most security teams face daily can leave them overworked and fatigued, operating in what DocuSign CISO Vanessa Pegueros has identified as level one trauma – a sort of cyber PTSD that can put organizations at risk. In this podcast, Pegueros talks with David Cass, IBM Cloud & SaaS Global CISO, about her four-part series in Security Current that explores the human element of incident response and how CISOs can identify and resolve trauma in the organization. They also discuss the Board’s role in incident response and why being quick to fire after a breach may not always be the most effective approach. Read the series: Read Part OneRead Part TwoRead Part ThreeRead Part Four

Feb 28 2017

13mins

Play

SC 119: Marci McCarthy, President & CEO of T.E.N. and Founder of the ISE® Awards Provides Insights into the Evolution of the CISO Role

Podcast cover
Read more

The CISO increasingly has a seat in the boardroom, as the role is becoming more of the rule than the exception in enterprises.

During RSA Conference 2017, Marci McCarthy, President & CEO of T.E.N., sat down with David Cass, Global CISO IBM Cloud & SaaS, to discuss the continuing evolution of the information security industry and specifically the role of the executive.

McCarthy founded the prestigious ISE® Awards Program, which has helped elevate the role of security executives, who are recognized by their peers for their contributions and specific security projects. In this podcast, McCarthy provides insights into the profession and talks about the shortage of security personnel, the startup ecosystem and where the industry is headed.

Feb 23 2017

9mins

Play

SC 119: San Diego CISO Gary Hayslip Talks Strategies for Building Executive Buy-in, Security Tech and Leveraging the Cloud

Podcast cover
Read more

The city of San Diego is a $4 billion business and it doesn’t shut down. As you’ll hear in this discussion between Gary Hayslip, the city’s CISO, and David Cass, Global CISO IBM Cloud and SaaS, San Diego is a smart city which is continuously rolling out new technologies to facilitate 'the business' while bolstering its security.

In this podcast, recorded during the RSA Conference, Hayslip talks about joining the city as its first CISO some three years ago and how he established a five-year-plan which leveraged established frameworks like the National Institute of Standards and Technology (NIST) to increase the security of the city and its 24 networks and 40 departments. The two also discuss ‘cloud first’ initiatives, resilient networks and the role of the CISO, which Hayslip provides practical guidance on with his book “A CISO Desk Reference Guide: A Practical Guide for CISOs.”

Feb 22 2017

12mins

Play

SC 118: Global CISO David Cass Discusses the Proliferating Attack Surface Being Created by Internet of Things Devices with ForeScout’s Commercial CTO and VP Len Rosenberg

Podcast cover
Read more

There has been an exponential adoption of Internet of Things (IoT) with experts predicting billions of IoT devices coming into use. And with the strategy more often than not being go to market and secure it later, enterprises are increasingly exposed to a variety of attacks.

As you’ll hear in this podcast with David Cass, Global CISO IBM Cloud and SaaS, and Len Rosenberg, ForeScout’s Commercial CTO and VP of Systems Engineering, the IoT is here to stay and security needs to be by design and not an afterthought. They also discuss what CISOs can do today to mitigate their exposure and what they should demand from IoT manufacturers.

Feb 10 2017

12mins

Play

117 SC: Gartner Research VP Anton Chuvakin Talks New CISOs at RSA, New Technologies and Box Fatigue with Global CISO David Cass

Podcast cover
Read more

With RSA around the corner and more security vendors than you can count, if you are a new CISO at the conference what should your game plan be? As you’ll hear in this podcast, the sheer number of interesting technologies at RSA can potentially overwhelm new CISOs.

David Cass, Global CISO IBM Cloud and SaaS, and Dr. Anton Chuvakin, research VP at Gartner’s Technical Professionals (GTP) Security and Risk Management Strategies team and a speaker at the RSA conference leading sessions on threat intelligence, discuss how RSA is a great place to talk to the vendors and their top product executives and see solutions up close. They also stress that people and process gaps and not a “particular box” are what needs to be addressed first.

Chuvakin first addresses today’s malware, box fatigue, and critical challenges and ways to think about threat vectors in 2017.

Feb 09 2017

12mins

Play

SC 116: Jason Witty, US Bancorp EVP and CISO, Discusses The Benefits of Tokenization with David Cass, Global CISO IBM Cloud & SaaS

Podcast cover
Read more

Tokenization is helping render data theft obsolete. Jason Witty, US Bancorp EVP and CISO, is in the midst of completing a multi-year tokenization integration project, for which his team won the recent ISE North America Project of the Year Award in the Financial Services category.

He discussed the many benefits of tokenization with David Cass, Global CISO IBM Cloud & SaaS, including fraud prevention and the reduction of risk and the attack surface. They discuss how it is a complex process, which is “simple” to implement but difficult to adopt. Witty also touches on the many unintended business benefits.

Jan 31 2017

10mins

Play

SC 115: Gartner Research VP Anton Chuvakin Speaks with Global CISO David Cass on Security Monitoring, SIEM and UBA

Podcast cover
Read more

What specific things should companies look at when it comes to security monitoring in 2017? As you’ll hear in this podcast, a lot of the security problems facing organizations from the late 1990s and early 2000s have yet to be solved. David Cass, Global CISO IBM Cloud and SaaS, and Dr. Anton Chuvakin, research VP at Gartner’s Technical Professionals (GTP) Security and Risk Management Strategies team, discuss how security executives are still operationally challenged.

Chuvakin discusses how the technology landscape is changing but a lot of the challenges with the people themselves actually haven’t changed and the “old problems” haven’t been solved. In this podcast, he talks to Cass about the essential things organizations should be looking at, including newer technology like User Behavior Analytics (UBA) as well as Data Loss Prevention (DLP) solutions.

Jan 17 2017

11mins

Play

SC 114: Global CISO David Cass continues his discussion in part two of the series with Chief Security Architect Chris Roberts on Acalvio's threat deception technology

Podcast cover
Read more

As you’ll hear in part two of the conversation between David Cass, Global CISO IBM Cloud and SaaS, and Chris Roberts, Acalvio Chief Security Architect, threat detection technology is allowing enterprises to identify intruders quickly. In this sponsored podcast you’ll hear how this burgeoning field of cybersecurity is helping enterprises protect their perimeters and internal infrastructure while shortening the time to discovery. ​

Dec 19 2016

11mins

Play

SC 113: Payment Card Processor Monext Discusses Continuous Compliance, Reducing Complexity and Heightening Security

Podcast cover
Read more

Ensuring continuous compliance while reducing complexity is essential to bolstering security for many organizations, in particular, those that process credit card data.

In this Tufin-sponsored podcast, IBM’s David Cass talks with Monext’s Laurent Klefstad, Leader for Systems, Network and Telecom, about automated security policy orchestration and how it allows the French company to save time and money by reducing the complexity of its networks and firewalls. Klefstad explains how Monext’s implementation of the Tufin solution provided Monext continuous compliance and the ability to reduce its firewall rules, of which there were about 3,000, by upwards of 20 percent. He also talks ROI, staffing implications and business enablement.

Nov 29 2016

9mins

Play

SC112: David Cass, Global CISO IBM Cloud and SaaS Speaks with Chris Roberts, Acalvio Chief Security Architect, on Threat Deception, the Internet of Things and Technology Innovation

Podcast cover
Read more

It’s becoming an old adage: it isn’t a matter of if an attacker will infiltrate your network but when.” With that being the case and with research showing that attackers often reside on an enterprise’s network for many months doing reconnaissance and exfiltrating data before being identified, what are and can enterprises do? The use of autonomous threat deception technologies to identify an intruder once inside the network is being adopted by enterprises seeking preventive and proactive to technologies. As you’ll hear in this conversation with David Cass, Global CISO IBM Cloud and SaaS CISO, and Chris Roberts, Acalvio Chief Security Architect there has been a significant evolution in threat detection technology to allow enterprises to identify intruders quickly. In this sponsored podcast you’ll hear how a new dynamic and smart approach to traditional honeypots is helping enterprises by allowing them to immediately detect lateral movement, shortening the time to discovery.

Nov 23 2016

11mins

Play

SC 111: Matt Hollcraft, Maxim Integrated CISO, Speaks with Dan Schiappa, SVP & GM, Sophos Enduser Security Group on Ransomware, IoT and Hacking as a Business

Podcast cover
Read more

In this interview Matt Hollcraft, Maxim Integrated CISO, discusses common threat vectors – what is old and what is new – with Dan Schiappa, SVP & GM, Sophos Enduser Security Group. They talk about ransomware, the mobile workforce, Internet of things and hacking as a business. In this sponsored podcast, you’ll also hear about approaches that enterprises can take to reduce threats, which are increasingly sophisticated and continuous.

Nov 04 2016

14mins

Play

SC 110: David Mahon, CSO of CenturyLink, and David Cass, Global CISO IBM Cloud & SaaS, Discuss the Evolution of the CISO and Provide Tips to Current and Aspiring CISOs

Podcast cover
Read more

In this conversation with Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, CenturyLink CSO, talks about the evolution of the CISO role.

A seasoned security executive, with experience reporting to boards-of-directors, Mahon also provides guidance on how to present to a board. He also gives recommendations to current and aspiring CISOs on how to advance their careers.

Oct 26 2016

10mins

Play

SC 109: IBM Global CISO Cloud & SaaS and ADP Vice President & Global Security Architect Discuss the Business and Technology Benefits of User Behavior Analytics (UBA) Tools

Podcast cover
Read more

The use of user behavior analytics (UBA) is at the forefront of technologies that CISOs are seeking for their security toolkits to help them identify that needle-in-a-haystack.

In this podcast sponsored by Exabeam, IBM’s David Cass talks with ADP’s V.Jay LaRosa about how UBA provides always on threat hunting to detect and thwart cyber attacks. LaRosa discusses ADP’s selection and implementation of the UBA solution and how his team uses it to quickly and effectively identify potential anomalous behavior. He also talks ROI, staffing and why he wishes he had started sooner.

Sep 26 2016

9mins

Play

iTunes Ratings

10 Ratings
Average Ratings
3
2
1
2
2