Careers Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editora: Podcast
  • Mais informações

Informações:

Sinopse

Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episódios

  • Ransomware Experts Agree: Don't Buy Data Deletion Promises

    22/12/2022

    The latest edition of the ISMG Security Report discusses why it is always a bad idea for organizations to pay hackers for data deletion, practical steps organizations can and should take to avoid being at the heart of a data subject complaint, and the latest efforts to tackle the ransomware threat.

  • Managing the Evolving Cyber Risk Posed by Third Parties

    21/12/2022

    As major cyber incidents involving vendors surge, healthcare entities must carefully and continuously scrutinize the security practices of their third-party vendors, says Kathy Hughes, CISO of Northwell Health.

  • Planning for Prolonged Regional Medical Device Outages

    15/12/2022

    A ransomware attack knocking out a medical center's imaging and lab equipment is an incident felt by an entire network of healthcare providers. Entities everywhere should plan for outages even when they don't directly experience an attack, say Aftin Ross of the FDA and Penny Chase of MITRE.

  • Top 5 Tips for Choosing Endpoint Security

    15/12/2022

    After years of digital transformation, cloud migration and deployment of hybrid workforces, enterprises have more endpoints than ever, which makes it important to take endpoint security to a whole new level. Pat Correia of Cisco Security shares five tips for choosing endpoint security.

  • Palo Alto Founder Nir Zuk on Making the SOC More Autonomous

    15/12/2022

    Businesses should capitalize on AI, ML and robotic process automation to address every event rather than just ignoring the ones deemed unimportant by a SIEM. Palo Alto Networks founder and CTO Nir Zuk says AI can be used to probe security incidents in real time rather than waiting for a breach.

  • Prosecutors Accuse FTX's Founder of Crypto-Based 'Deception'

    15/12/2022

    The latest edition of the ISMG Security Report discusses how investigators saw the collapse of cryptocurrency exchange FTX as "one of the biggest financial frauds in American history," how CISOs can guard against their own liability, and major security and privacy shifts and the outlook for 2023.

  • Palo Alto's BJ Jenkins on Changing Cloud Needs for Customers

    15/12/2022

    Companies have transitioned since COVID-19 began from lifting and shifting their existing apps to the cloud to entirely rebuilding their applications in cloud-native form. Palo Alto President BJ Jenkins says companies need "shift left" security to get protection as they're coding and building apps.

  • Assessing Cyber Risk, Maturity in Healthcare M&As

    14/12/2022

    When healthcare organizations come together through mergers or acquisitions, it is critical for the entities to carefully assess the cyber risk each poses, as well as its level of cyber maturity, says Jigar Kadakia, CISO and chief privacy officer at Boston-based Mass General Brigham.

  • Nikesh Arora on Palo Alto's Approach to Supply Chain Defense

    14/12/2022

    The $250 million acquisition of Cider Security will allow Palo Alto Networks to secure a piece of code from development to its implementation in a runtime environment. CEO Nikesh Arora says the company must understand the tool sets and open-source widgets coming into the customer's supply chain.

  • Combating Ransomware Attacks: Which Strategies Hold Promise?

    14/12/2022

    Defenders have made strides in disrupting ransomware, but assessing the effectiveness of countermeasures is tough due to a scarcity of information, says cybersecurity veteran Jen Ellis. "We know what the tip of the iceberg looks like, but we don't know what percentage of that iceberg we can see."

  • A Plan to Address Future Healthcare Cyber Challenges

    09/12/2022

    The Health Sector Coordinating Council is embarking on a five-year strategic plan to help the healthcare and public health sector address future cybersecurity threats, risks and associated difficulties, says Greg Garcia, executive director for cybersecurity at HSCC.

  • Ransomware Defense: Common Mistakes to Avoid

    08/12/2022

    This week's edition of the ISMG Security Report discusses the mistakes enterprises commonly make when building ransomware defenses, the cybersecurity capabilities being built by the U.S. Department of Energy, and the first female CEO at Securonix - one of only a handful in the vendor community.

  • Why Ransomware Victims Avoid Calling It 'Ransomware'

    01/12/2022

    The latest edition of the ISMG Security Report discusses why too few organizations admit to being victims of ransomware attacks, how delayed enterprise subscription start dates forced CrowdStrike to cut sales forecasts, and leveraging threat intelligence to protect critical infrastructure.

  • Addressing the Shortage of Medical Device Cyber Talent

    28/11/2022

    The shortage of cybersecurity professionals in the United States includes a scarcity of expertise in medical device security, says Bill Aerts, senior fellow and managing director of the University of Minnesota's recently launched Center for Medical Device Cybersecurity.

  • Ransomware Group Zeppelin's Costly Encryption Mistake

    24/11/2022

    The latest edition of the ISMG Security Report discusses how the profits of ransomware group Zeppelin have been smashed by security researchers, FTX again highlighting the risks of trading cryptocurrencies, and vendor Extrahop's newly appointed, high-profile president.

  • Beating Clever Phishing Through Strong Authentication

    23/11/2022

    Successful account takeovers are one of the most common ways that organizations end up with attackers in their systems. But strong authentication can thwart even the most clever phishing campaigns, says Brett Winterford, regional chief security officer for APJ at Okta.

  • Cybersecurity Analysis of the FTX Crypto Heist: Part 2

    19/11/2022

    On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks of CertiK shares the status of data that FTX stores, the role of regulations and best cybersecurity practices for crypto exchanges.

  • Cybersecurity Analysis of the FTX Crypto Heist: Part One

    18/11/2022

    On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch. Hugh Brooks, director of security operations at CertiK, shares how the funds may have been stolen and what happens next.

  • Cyberwarfare's Role in the Next National Defense Strategy

    17/11/2022

    Despite the strategic priorities laid out by the Biden administration and initial indicators provided by the Department of Defense, it's unclear how the next national defense strategy will prioritize threats and define the primary role of the U.S. military. Chris Dougherty discusses cyberwarfare.

  • Managing Cyber Risk in a Technology-Dependent World

    16/11/2022

    Complexity is the enemy of security, and information technology grows ever more complex. Have we created a problem space in computing so complicated that we will be unable to safely operate in it for its intended purposes? Fred Cohen says that's unlikely. He discusses managing risk in the future.

Página 13 de 144