Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,285 episodes available.
May 25, 2016Identity Management as a Business EnablerIdentity and access management should empower businesses, satisfying customers and other stakeholders who need secure access to an enterprise's data and systems, says security expert Jeremy Grant, former leader at the federal government's National Strategy for Trusted Identities in Cyberspace....more0minPlay
May 24, 2016ISMG Security Report: Unusual Twist in RansomwareInformation Security Media Group is premiering the twice-weekly ISMG Security Report, a concise, on-demand audio report in which ISMG editors and other experts analyze the latest IT security news....more0minPlay
May 24, 2016Data Protection: The Value of MaskingData today is money - especially in financial services, where account data is every hacker's target. How, then, can institutions mask that data and protect it when it's in non-production environments? Mike Logan of Delphix offers new insights....more0minPlay
May 23, 2016Analysis: Walmart's EMV Lawsuit Against VisaWalmart's lawsuit against Visa, which claims the card brand is unfairly preventing retailers from requiring that customers enter PINs when they conduct EMV debit transactions, poses important questions about fair business practices, says Liz Garner of the Merchant Advisory Group....more0minPlay
May 23, 2016How to Protect Wearable Device DataThe manufacturers of wearable health devices should incorporate key privacy and security best practices into the R&D of their products, says privacy advocate Michelle De Mooy of the Center for Democracy & Technology, who describes recommendations in a new study....more0minPlay
May 19, 2016Why Should Government Monitor Mobile Security?In today's rapidly changing cyber threat environment, the federal government needs to take a lead role in making sure mobile device security is adequate, says security researcher Stephen Cobb, who analyzes ongoing investigations by the FTC and FCC in this audio interview....more0minPlay
May 18, 2016OCR's Deven McGraw on HIPAA Audit PreparationOrganizations chosen for remote "desk audits" of their HIPAA compliance, which will begin this summer, need to be prepared to quickly provide supporting documentation, Deven McGraw, deputy director of health information privacy at the HHS Office for Civil Rights, explains this in-depth audio interview....more0minPlay
May 18, 2016Blocking Hack Attacks: SWIFT Must Do MoreWith hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems....more0minPlay
May 13, 2016Ransomware: Re-Evaluating Our DefensesThere are two elements of a ransomware attack - the infection and then the action that takes place on infected devices. And both elements are evolving, says Ben Johnson of Carbon Black. He shares insight on how to improve ransomware defenses....more0minPlay
May 11, 2016Cyber Breach - What If Your Defenses Fail?It's one thing to talk or even plan about "What happens if we are breached?" It's quite another to undertake a true breach exercise. What are the critical elements of such a drill? Author Regina Phelps shares advice from her new book....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,285 episodes available.