Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
December 16, 2013Fighting Fraud With ID ManagementMost fraud on the Internet is linked to unsecured identities, which is why a new global identification framework is needed, says Paul Simmonds, who heads a coalition working on a framework model....more0minPlay
December 16, 2013Timely Advice on IAM, Asset ManagementCybersecurity risks posed by inadequate IAM and IT asset management are mounting. Now the National Cybersecurity Center of Excellence has drafted guidance to address banking institutions' unique risks, says Nate Lesser, the center's deputy director....more0minPlay
December 11, 2013How a Flaw in VA Software Was FoundSecurity analyst Doug Mackey says his discovery of a vulnerability in the Department of Veterans Affairs' VistA electronic health record system highlights the importance of software security testing....more0minPlay
December 10, 2013Creating Role-Based Security TrainingManagers at all levels must understand their responsibilities in providing role-based cybersecurity training, says Patricia Toth, a computer scientist at the National Institute of Standards and Technology....more0minPlay
December 09, 2013How Will NIST Framework Affect Banks?The NIST cybersecurity framework will help U.S. banking institutions assess their security strategies, but some institutions fear the framework could trigger unnecessary regulations, says Bill Stewart of Booz Allen Hamilton....more0minPlay
December 06, 2013Major Password Breach: Lessons LearnedThe theft of 2 million credentials reminds security professionals that their organizations are at risk because many employees use the same passwords and devices for personal and business purposes, data security lawyer Ronald Raether says....more0minPlay
December 02, 2013Questioning the Culture of SurveillanceYou can be outraged that the NSA collects Internet communications records of U.S. citizens. But don't be surprised, says sociologist William Staples. This is just one example of our "culture of surveillance."...more0minPlay
November 27, 2013Cloud Security: Top 10 TipsGovernments and others using cloud-based services should keep 10 security tips in mind, including making sure they can maintain control of their data if a service provider goes bankrupt, says Dimitra Liveri, co-author of a new report....more0minPlay
November 27, 2013Push for Patent Reform AdvancesIn the wake of a surge of lawsuits, bipartisan Congressional support is building for a measure designed to help protect banking institutions from frivolous patent infringement claims, says NAFCU's Brad Thaler....more0minPlay
November 27, 2013Authentication: Balancing Act for HIEsEnsuring strong authentication of users while maintaining ease of use is a difficult challenge for health information exchanges nationwide, says David Whitlinger of New York's statewide HIE....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.