Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
February 18, 2015Managing Cloud Providers: New ApproachElayne Starkey, the state of Delaware's chief security officer, no longer micromanages how cloud services providers secure state data. Find out why she's giving providers more leeway in defining security requirements....more0minPlay
February 16, 2015Cyber-Insurance: How Much Is Enough?Mega-breaches, including the recent hacking attack on Anthem Inc. always result in an uptick of interest in cyber-insurance, but determining how much coverage to buy is an ongoing challenge, says data privacy attorney Marc Voses....more0minPlay
February 12, 2015Raduege: Why New Cyber Agency MattersA new federal cyberthreat intelligence center could help the government build more resilient networks and better identify cyber-attackers, leading to arrests and punishments, says Harry Raduege, a former top Defense Department IT leader....more0minPlay
February 12, 2015Phishing: Learning from Recent BreachesThe Anthem breach, which possibly started with a phishing campaign, is a prime example of how hackers are perfecting their schemes to target key employees who have access to valued information, says Dave Jevans of the Anti-Phishing Working Group....more0minPlay
February 12, 2015Why 'Adaptive Defense' Is CriticalAs hack attacks, such as the breach of Anthem Inc., become more common, it's more critical than ever for organizations to carry out an "adaptive defense model" to protect sensitive information, says Dave Merkel, chief technology officer at FireEye....more0minPlay
February 10, 2015Can PINs Reduce Online Fraud?PINS can effectively reduce card-not-present as well as card-present fraud, argues Liz Garner of the Merchant Advisory Group, who will be a featured speaker at Information Security Media Group's upcoming Fraud Summit Los Angeles....more0minPlay
February 10, 2015Improving Cyberthreat IntelligenceTechnologies that allow companies to analyze cyberthreats are evolving and soon should provide better intelligence to mitigate attacks, says Jim Anderson, a president at BAE Systems Applied Intelligence....more0minPlay
February 05, 2015Why Fraud Is Shifting to Mobile DevicesAs a result of the explosive growth in worldwide use of smart phones, mobile malware will play a much bigger role in fraud this year, predicts Daniel Cohen, a threat researcher for RSA, which just released its 2014 Cybercrime Roundup report....more0minPlay
February 04, 2015Monitoring Third-Party Breach RisksTarget is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight....more0minPlay
February 02, 2015Radware CEO on Identifying IntrudersRecognizing the behavior of an intruder, rather than relying on digital signatures, will prove to be a better way to prevent hackers from pilfering data and creating havoc in IT systems, says Radware CEO Roy Zisapel....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.