Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,243 episodes available.
October 21, 2019Managing Tool SprawlWhat is the risk of having too many cybersecurity tools? Compromised visibility because of "tool sprawl," say Brian Murphy and Seth Goldhammer of ReliaQuest. Enterprises are now awakening to this challenge and attempting to overcome it....more0minPlay
October 18, 2019Darknet Markets: As Police Crack Down, Cybercriminals AdaptThe latest edition of the ISMG Security Report discusses the shutdown of DeepDotWeb. Plus, dealing with breach fatigue and the Pitney Bowes ransomware attack....more0minPlay
October 17, 2019How 'Zero Trust' Better Secures Applications and AccessOrganizations are accepting that the network perimeter no longer serves as the "ultimate defense" and thus adapting zero-trust principles, including least privilege, based on the understanding that they may already have been compromised, says Darran Rolls of SailPoint....more0minPlay
October 17, 2019Robotic Process Automation: Security EssentialsRobotic process automation aims to use machine learning to create bots that automate high-volume, repeatable tasks. But as organizations tap RPA, they must ensure they take steps to maintain data security, says Deloitte's Ashish Sharma....more0minPlay
October 16, 2019The Ultimate Missing Link in Cyber: Continuous Compromise AssessmentAccording to Ricardo Villadiego, Lumu Technologies' Founder and CEO, organizations are "sitting on a gold mine: their own data". Under the single premise that organizations should assume they are compromised and prove otherwise, Lumu seeks to empower enterprises to answer the most basic question: Is your organization talking with adversary infrastructure?...more0minPlay
October 16, 2019IoT in Vehicles: The Trouble With Too Much CodeThe threat and risk surface of internet of things devices deployed in automobiles is exponentially increasing, which poses risks for the coming wave of autonomous vehicles, says Campbell Murray of BlackBerry. Large code bases, which likely have many hidden software bugs, are part of the problem, he says....more0minPlay
October 16, 2019Open Source Vulnerabilities Cut Across SectorsLarge or small, enterprises from all sectors are dealing with the same vulnerabilities in open source code. The difference: the scale of the problem. DJ Schleen of Sonatype discusses insights from the latest ISMG roundtable dinner....more0minPlay
October 15, 2019How Has FTC Data Security Enforcement Changed?In the wake of a federal appeals court ruling last year vacating a Federal Trade Commission enforcement action against LabMD, the FTC's data security consent orders are becoming far more detailed and rigorous, says former FTC attorney Julie O'Neill....more0minPlay
October 15, 2019Analysis: New ISO Privacy StandardWhat's the purpose of ISO 27701, the new privacy extension to the ISO 27001 information security management standard? Matthieu Grall, CISO and DPO at SodiFrance, a French IT services company, who participated in development of 27701, explains the standard and discusses "privacy by design" compliance issues....more0minPlay
October 15, 2019Stung by Takedowns, Criminals Tap Distributed Dark MarketsLaw enforcement success inevitably sparks criminals to become more innovative, including shifting from centralized markets - such as Hansa and Wall Street Market - to encrypted and distributed marketplaces, says the University of Surrey's Alan Woodward....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,243 episodes available.