Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Careers Information Security Podcast:How many episodes does Careers Information Security Podcast have?The podcast currently has 2,901 episodes available.
May 24, 2019Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)ISMG and Fortinet hosted a roundtable dinner in Atlanta on May 7 focused on "Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)". Challenges in communication and gaining buy in from operational teams for security initiatives were explored, and Richard Peters, Director, Operational Technology Global Engagement, of Fortinet provided his insight on the event in this exclusive interview....more0minPlay
May 24, 2019Executive Roundtable Recap: Securing the Digital EnterpriseISMG and Fortinet hosted a roundtable dinner in Nashville, TN on May 15 focused on "Securing the Digital Enterprise". Challenges in gaining internal buy in for security initiatives and the problems of M&A activity were discussed, and Sonia Arista, National Healthcare Lead of Fortinet provided her insight on the event in this exclusive interview....more0minPlay
May 24, 2019Healthcare's Unique Digital TransformationThe term "digital transformation" is not just marketing buzz; it's the here and now for many organizations. And the healthcare sector is uniquely impacted, says Stuart Reed of Nominet in the wake of a recent roundtable discussion....more0minPlay
May 23, 2019Executive Roundtable Recap: Confessions of a Healthcare CISOISMG and NTT hosted a roundtable dinner in Chicago on May 8 focused on "Confessions of a Healthcare CISO"....more0minPlay
May 22, 2019Verizon DBIR: C-Level Executives in the CrosshairsC-level executives are 12 times more likely to be the target of social incidents and nine times more likely to be the target of social breaches. This is among the key findings of the latest Verizon's Data Breach Investigations Report. Author John Grim shares insight....more0minPlay
May 20, 2019Lack of Secure Coding Called a National Security ThreatThe lack of secure coding is a pervasive and serious threat to national security, according to a new paper from the Institute for Critical Infrastructure Technology. In an interview, Rob Roy, co-author of the report, outlines what steps should be taken to encourage or enforce secure coding practices....more0minPlay
May 17, 2019Minimizing Cloud Security RisksHealthcare organizations need to take bold steps to help ensure that their cloud services providers are effectively protecting patient data. That's the advice of John Houston, CISO of UPMC, and Ira "Gus" Hunt, a security specialist at the consultancy Accenture Federal Services....more0minPlay
May 17, 2019WhatsApp's Spyware ProblemThe latest edition of the ISMG Security Report digs into the WhatsApp flaw that paved the way for spyware installation. Also: Microsoft patches old operating systems and a 'virtual CISO' sizes up security challenges....more0minPlay
May 14, 2019WhatsApp Exploit Reveals 'Legalized Hacking' at WorkAttackers exploiting a buffer overflow in WhatsApp's signaling software to automatically infect devices with malware - without users even having to answer their phone - and then alter call logs to hide attack traces is "a bit of a nightmare scenario," says cybersecurity expert Alan Woodward....more0minPlay
May 14, 2019Capturing ROI on Your Unified Endpoint Management InvestmentUnified endpoint management exists because devices have grown in number, variety and complexity of how they're being used in the workplace. So how should IT and security leaders approach UEM? John Harrington Jr. and Ryan Schwartz of IBM MaaS360 with Watson share insight....more0minPlay
FAQs about Careers Information Security Podcast:How many episodes does Careers Information Security Podcast have?The podcast currently has 2,901 episodes available.