Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.
January 20, 2012Are Anti-Piracy Laws Really Needed?Does the U.S. government's shuttering of the file-sharing website Megaupload.com show that new laws are not needed to battle intellectual property piracy? Brookings's Allan Friedman believes it does....more0minPlay
January 20, 2012Visa on EMV in the U.S.The Europay, MasterCard, Visa standard, commonly used in most global markets, is coming to the U.S. The sooner issuers, acquirers and merchants initiate migrations, the better, says Stephanie Ericksen, head of authentication product integration at Visa....more0minPlay
January 19, 2012Breach Resolution: 8 Lessons LearnedThe Massachusetts eHealth Collaborative, a non-profit consultancy that experienced a health information breach, learned eight important lessons from the experience, says CEO Micky Tripathi....more0minPlay
January 17, 2012How to Identify the Insider ThreatSecurity managers need the heads up from non-IT executives before they dismiss employees, some of whom might seek payback for their sacking by pilfering data or sabotaging systems, Carnegie Mellon University's Dawn Cappelli and Mike Hanley say....more0minPlay
January 11, 2012Tips for Encrypting Mobile DevicesTo help prevent breaches, mobile devices should be encrypted even if storage of sensitive information on them is prohibited, says security expert Melodi Mosley Gates....more0minPlay
January 10, 2012Tablets Seen Mitigating Security RisksChief Information Officer Chad Eckes is overseeing the slow phase in of iPads and iPhones at the Cancer Treatment Centers of America, which has relied heavily on laptop computers, in an effort to mitigate security risks....more0minPlay
January 09, 2012Why Insource Forensics?When it's time to stand up in court and discuss forensic evidence in a legal matter, you need someone who knows your business best, says Greg Thompson, VP enterprise security services at Scotiabank Group....more0minPlay
January 03, 2012Automation with a Dash of HumanityAs organizations move to the continuous monitoring of their IT systems to assure they're secure, they rely much more on automated processes. But don't forget the role people play....more0minPlay
January 02, 20122012 Government Strategy Guide to Defending Against Cyber-AttacksHow can government agencies protect against new and trending cyber attacks? What are today's top application security trends and threats? Robert Haas of HP has expert insight and tips....more0minPlay
December 30, 2011Top Tech Trends for 2012Big data. Consumerization. Mobile growth. ISACA picks these as the top technology trends for IT and information security leaders to tackle in 2012. Robert Stroud offers tips to help manage the risks....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,286 episodes available.