Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
August 05, 2014Targeted Attacks: Raising Risk UrgencyDetecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies....more0minPlay
August 04, 2014Assessing Controls: A NASCAR LessonIn devising advice to help organizations identify which information security and privacy controls to adopt, NIST risk management expert Ron Ross, a NASCAR fan, looks to the way mechanics decide how to fix a car....more0minPlay
August 01, 2014'Internet of Things' Security AnalysisVendors are rushing useful new "Internet of Things" products to market, but too often treat device security and data privacy as an afterthought, says Forrester Research analyst Andrew Rose....more0minPlay
July 29, 2014Banks as Cybercrime Fighters?Karl Schimmeck of the Securities Industry and Financial Markets Association won't discuss reports about the group's alleged backing of the formation of a cyberwar council, but says financial institutions must play a role in protecting critical infrastructure....more0minPlay
July 24, 2014Shaping a Cloud Services ContractAs a customer, Delaware Chief Security Officer Elayne Starkey has seen the evolution of cloud computing over the past three years to a point where she has more sway over the security terms of cloud services contracts....more0minPlay
July 23, 2014Big Lessons in Small DataBig data has been the recent buzz in security circles, but what are organizations missing by overlooking the power of "small data?" Verizon's Jay Jacobs discusses how to get the most from data analytics....more0minPlay
July 23, 2014Application Security: The Leader's RoleAttackers increasingly focus on software vulnerabilities in what application security expert Anthony Lim calls "the invisible onslaught." How can the CISO exert more control over software development?...more0minPlay
July 22, 2014Attack Response: Before, During, AfterAttacks are more frequent, severe and complex. How can security pros defend against the entire attack continuum - before, during and after? Cisco's Bret Hartman describes a threat-centric approach....more0minPlay
July 22, 2014Modernizing the VA's EHR SystemEnabling the secure sharing of patient data is a key aspect of work under way to modernize the Department of Veterans Affair's VistA electronic health record system, says Jim Traficant of ASM Research, which is leading an infrastructure project....more0minPlay
July 21, 2014The Analytics-Enabled SOCTo detect and deter today's threats, security teams need new and dynamic data analytics capabilities. Haiyan Song of Splunk discusses the analytics-enabled SOC and how to improve incident response....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.