Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
April 01, 2014Inside the New Global Threat ReportEven so-called minor breaches can cost organizations nearly $200,000, according to one finding from NTT Group's annual Intelligence Report. Rob Kraus of Solutionary shares the study's insights and advice....more0minPlay
March 31, 2014Advanced Threat DefenseAdvanced threats are like the weather. Everyone talks about them, but few have a solid defense plan - or even a solid understanding of the threat landscape. Mike Nichols of General Dynamics Fidelis Cybersecurity Solutions offers insight....more0minPlay
March 25, 2014(ISC)² Turns 25: What's Ahead?(ISC)² is celebrating its silver anniversary as a global organization educating and certifying information security professionals. What are the key threats and trends driving the profession's future growth?...more0minPlay
March 24, 2014Why Is End-to-End Encryption So Daunting?Retail point-of-sale breaches at Target Corp. and Neiman Marcus have put a spotlight on payment card security and encryption. But achieving true end-to-end encryption isn't easy, says data protection specialist Richard Moulds....more0minPlay
March 20, 2014State Marijuana Laws: The ChallengesNew guidance from FinCEN addresses know-your-customer concerns surrounding financial transactions linked to legal marijuana businesses. Anti-money-laundering expert Kevin Sullivan sorts through the advice....more0minPlay
March 18, 2014So, You Want a Career in Privacy?There have never been more career options for privacy professionals. But what are the essential skills and experience for advancement? Michelle Dennedy of Intel Security discusses her career path....more0minPlay
March 12, 2014Retail Breaches: The Malware SourceAttackers likely purchased malware in underground "cybercrime-as-a-service" markets to use in recent credit card breaches, including the Target Corp. attack, a new report from McAfee Labs asserts. Adam Wosotowsky explains the report's findings....more0minPlay
March 12, 2014FIDO: Pushing International Buy-InOne key factor in efforts to reduce reliance on passwords for authentication will be international acceptance of the FIDO Alliance's soon-to-be released protocol for advanced authentication, says Michael Barrett, the alliance's president....more0minPlay
March 11, 2014Deploying a Continuous Monitoring PlanA problem federal agencies face in deploying effective continuous monitoring is that there's just too much guidance, former federal chief information security officer Patrick Howard says....more0minPlay
March 04, 2014Continuous Diagnostics: A Game ChangerPhyllis Schneck, the Department of Homeland Security's deputy undersecretary for cybersecurity, equates the department's continuous diagnostics and mitigation initiative with a medical probe detecting an infection in the human body....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.