Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,243 episodes available.
November 14, 2019The Dark Web's Automobile Hacking ForumsThere are robust and detailed discussions in cybercriminal forums on how to attack modern vehicles, seeking clandestine methods to steal cars, says Etay Maor of IntSights. Luckily, hackers aren't aiming to remotely trigger an accident, but there are broader concerns as vehicles become increasingly computerized....more0minPlay
November 14, 2019'Zero Trust': Can It Be Defined?"Zero trust" is arguably the cybersecurity buzzword of 2019, but what exactly does it mean? Jack Koons of Unisys provides his perspective....more0minPlay
November 13, 2019Google's Push Into Health Sector: Emerging Privacy IssuesWith Google aggressively expanding its push into the healthcare sector, critical privacy-related issues are emerging, says regulatory attorney Alisa Chestler, who offers an overview of key issues....more0minPlay
November 12, 2019What Mega Breaches Can Teach about Best PracticesGetting breached is not a question of "if," but "when." Nick Carstensen of Graylog explains what steps should be taken to mitigate data breach risk....more0minPlay
November 12, 2019CCPA Compliance: Identity Verification ChallengesOne key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues....more0minPlay
November 11, 2019Identity Fraud: Account OriginationBala Kumar of iovation, a TransUnion company, sees a marked spike in identity fraud in general, and at account origination in particular. How does this increase manifest across industry sectors, and how should organizations re-think their defenses?...more0minPlay
November 08, 2019Protecting Data in Sprawling Computing EnvironmentsSprawling computing environments - from cloud to containers to serverless - are posing challenges in maintaining visibility and determining if data is secure, says Mike Adler of RSA....more0minPlay
November 08, 2019Analysis: Using Twitter for EspionageThe latest edition of the ISMG Security Report offers an analysis of how Twitter allegedly was used to spy on critics of the Saudi Arabian government. Also featured: A preview of the new NIST Privacy Framework and an update on business email compromise attacks....more0minPlay
November 07, 2019Why Is Third-Party Risk Management So Complex?Organizations should develop a comprehensive strategy for managing third-party security risks and avoid over-reliance on any one tool, such as vendor security risk assessment, monitoring or ratings services, says analyst Jie Zhang of Gartner....more0minPlay
November 06, 2019Getting Ready for the NIST Privacy FrameworkBy year's end, the National Institute of Standards and Technology should be ready to publish the first version of its privacy framework, a tool to help organizations identify, assess, manage and communicate about privacy risk, says NIST's Naomi Lefkovitz, who provides implementation insights....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,243 episodes available.