Cover image of Info Risk Today Podcast
(3)
Business

Info Risk Today Podcast

Updated 1 day ago

Business
Read more

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Read more

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

iTunes Ratings

3 Ratings
Average Ratings
1
0
0
2
0

Great content but...

By [O]bfuscator - May 29 2019
Read more
The content is extremely timely and useful but the sound quality is terrible and sometimes one cannot understand what’s being said. Sound levels for the interviewer and interviewee are frequently not similar and the listener has to put up with the too loud/too quiet problem found in podcasts produced in basements and garages. Bring up the sound quality. You’re addressing technology issues and clearly are a security professional - your product should be much better.

iTunes Ratings

3 Ratings
Average Ratings
1
0
0
2
0

Great content but...

By [O]bfuscator - May 29 2019
Read more
The content is extremely timely and useful but the sound quality is terrible and sometimes one cannot understand what’s being said. Sound levels for the interviewer and interviewee are frequently not similar and the listener has to put up with the too loud/too quiet problem found in podcasts produced in basements and garages. Bring up the sound quality. You’re addressing technology issues and clearly are a security professional - your product should be much better.
Cover image of Info Risk Today Podcast

Info Risk Today Podcast

Updated 1 day ago

Read more

Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders

Rank #1: Protecting Data in Sprawling Computing Environments

Podcast cover
Read more
Sprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA.

Nov 08 2019

Play

Rank #2: Responding to Ransomware Attacks: Critical Steps

Podcast cover
Read more
Organizations must take a number of critical steps to prepare a response to ransomware attacks before they hit, says Caleb Barlow, the new president and CEO of security consulting firm CynergisTek, who offers a guide.

Oct 07 2019

Play

Rank #3: Analysis: Fallout From the Snowden Memoir

Podcast cover
Read more
The latest edition of the ISMG Security Report features a discussion of the controversies surrounding the release of whistleblower Edward Snowden's memoir. Also featured: An update on Lumen PDF's breach disclosure; insights on financial services identity management issues.

Sep 20 2019

Play

Rank #4: Using Artificial Intelligence to Combat Card Fraud

Podcast cover
Read more
Artificial intelligence is playing an important role in the fight against payment card fraud, says Gord Jamieson, senior director of Canada risk services at Visa. He'll offer a keynote presentation on the latest fraud trends at Information Security Media Group's Cybersecurity Summit in Toronto Sept 24-25.

Sep 17 2019

Play

Rank #5: Analysis: The Impact of Business Email Compromise Attacks

Podcast cover
Read more
This week's ISMG Security Report analyzes the cost of business email compromise attacks and the recent arrest of dozens of suspects. Also featured: updates on the easy availability of low-cost hacking tools and the latest payment card fraud trends.

Sep 13 2019

Play

Rank #6: Tips on Countering Insider Threat Risks

Podcast cover
Read more
Insider threats are difficult to counter. What happens when an employee goes rogue, and how do you catch them? Charles Carmakal of Mandiant, who says his firm is dealing with more insider threat investigations, shares tips for better defenses.

Sep 13 2019

Play

Rank #7: A New Credential for Healthcare Security Leaders

Podcast cover
Read more
A new professional credential aims to help healthcare organizations bolster their security leadership bench strength, says William Brad Marsh, co-chair of a committee that developed the certification.

Aug 12 2019

Play

Rank #8: Spotlight on Zero Trust Network Access

Podcast cover
Read more
The promise of cloud and mobility is to provide access to key services quickly and from anywhere at any time from any device. Zscaler's Lisa Lorenzin opens up on zero trust network access technologies, which provide a secure alternative to legacy methods.

Jul 30 2019

Play

Rank #9: The Prolonged Cost of a Data Breach

Podcast cover
Read more
Data breach costs continue well after the initial year, according to the latest IBM/Ponemon Institute,"Cost of a Data Breach" report. Limor Kessem of IBM Security shares details of the study.

Jul 29 2019

Play

Rank #10: John Halamka: Mitigating Medical Device Security Risks

Podcast cover
Read more
Enumerating medical devices, identifying where the security risks lie and then implementing a multilayered defense plan to mitigate risks should be top priorities for healthcare organizations, says thought leader John Halamka, M.D., executive director for technology exploration at Beth Israel Lahey Health.

Jul 15 2019

Play

Rank #11: Battling Supply Chain Security Risks

Podcast cover
Read more
Incidents involving supply chain vendors pose increasingly significant risks to health data, says Rick McElroy of Carbon Black, who addresses "island hopping" and other emerging threats.

Jul 12 2019

Play

Rank #12: Identity as a Game-Changing Breach Defense

Podcast cover
Read more
Often in breach response, security professionals focus on the technical aspects of the attack. Yet, the non-technical aspects are often more insidious, says Teju Shyamsundar of Okta. And Identity can be a powerful tool to bolster defenses.

Jun 25 2019

Play

Rank #13: Facebook's Cryptocurrency Plan Scrutinized

Podcast cover
Read more
The latest edition of the ISMG Security Report analyzes the security and privacy implications of Facebook's new digital currency - Libra. Also featured: Discussions on the rise of machine learning and IT and OT collaboration on cybersecurity.

Jun 21 2019

Play

Rank #14: Healthcare's Unique Digital Transformation

Podcast cover
Read more
The term "digital transformation" is not just marketing buzz; it's the here and now for many organizations. And the healthcare sector is uniquely impacted, says Stuart Reed of Nominet in the wake of a recent roundtable discussion.

May 24 2019

Play

Rank #15: WannaCry Still Causing Tears 2 Years On

Podcast cover
Read more
The latest edition of the ISMG Security Report assesses the legacy of WannaCry ransomware two years on. Also featured: the evolving role of healthcare CISOs; threat mitigation recommendations based on the 2019 Verizon Data Breach Investigations Report.

May 24 2019

Play

Rank #16: Vendor Risk Management: A Better Approach

Podcast cover
Read more
The risks posed by third-party vendors are a top concern for Aaron Miri, CIO of University of Texas at Austin's Dell Medical School and its affiliated UT Health Austin group practice. He explains steps he's taking to help mitigate those risks.

Apr 26 2019

Play

Rank #17: Defending Against Authorized Push Payment Fraud

Podcast cover
Read more
The advent of faster payments has helped accelerate authorized push payment fraud schemes in which victims are defrauded under false pretenses. Banking regulators are responding to the trend, and Rob Tharle of NICE Actimize offers advice for multilayered defense.

Apr 16 2019

Play

Rank #18: Analysis: The Evolving Ransomware Threat

Podcast cover
Read more
The latest edition of the ISMG Security Report offers an in-depth look at the ever-changing ransomware threat. Other topics: filling the DevSecOps skills gap and the repercussions of Australia's encryption-busting law.

Apr 05 2019

Play

Rank #19: Analyzing the $7.5 Million UCLA Health Data Breach Settlement

Podcast cover
Read more
A proposed settlement in a class action lawsuit filed against ULCA Health in the wake of a 2015 cyberattack affecting 4.5 million individuals stands apart from other settlements because it requires the organization to spend a substantial sum on improving its security, says attorney Steven Teppler.

Mar 29 2019

Play

Rank #20: Network Security Strategies for 2019

Podcast cover
Read more
OT, IoT and systems targeted by cryptominers - those are among the main network security concerns of Greg Young, VP of cybersecurity at Trend Micro. Which technology trends should security leaders follow to improve network security? Young shares his insight.

Mar 22 2019

Play