Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!... more
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,284 episodes available.
September 03, 2019Managing IoT Risks: Reinventing SecuritySecurity needs to be reinvented for the internet of things, and start-up companies can play a critical role, says Robin Saxby, the former CEO and founder of Arm Holdings, a U.K.-based semiconductor company, who now invests in start-up firms....more0minPlay
September 03, 2019Security's Role in Digital TransformationWhat role does security play in an enterprise's digital transformation? ISMG and Nominet recently raised this question to a group of security leaders in Las Vegas. The answers were eye-opening. Stuart Reed of Nominet shares his reaction to the roundtable discussion....more0minPlay
August 30, 2019Analysis: How Police Disrupted a Cryptomining Malware GangThe latest edition of the ISMG Security Report offers an analysis of how French cyber police disrupted a cryptomining malware gang. Also featured: Apple's botched patching of a jailbreaking vulnerability; an industry veteran's insights on battling payment card fraud....more0minPlay
August 30, 2019The 'Judicious' Use of AI and MLArtificial intelligence and machine learning must be judiciously used, such as when monitoring internet of things devices, says David De Roure, professor of e-research at the University of Oxford, who offers insights on IoT risk management....more0minPlay
August 23, 2019Analysis: The Texas Ransomware MessThe latest edition of the ISMG Security Report analyzes the ransomware attack on Texas municipalities as part of a broader trend. Also featured: An initiative designed to safeguard the 2020 presidential elections and a CIO's third-party risk management efforts....more0minPlay
August 22, 2019Account Takeover: The Stages of DefenseAccount takeover continues to be a lucrative path for fraudsters across all industry sectors. But Scott Olson of iovation says there are different levels of defense that can be deployed, based on the risk of specific types of transactions....more0minPlay
August 19, 2019Case Study: Improving ID and Access ManagementWhat are some of the moves that organizations can make to improve their identity and access management? Veda Sankepally, an IT security manager at managed care company Molina Healthcare, describes critical steps in this case study interview....more0minPlay
August 16, 2019US CyberDome Poised to Protect 2020 ElectionsAn A-list of cyber experts, including former Homeland Security Secretary Jeh Johnson, has put its weight behind U.S. CyberDome, a nonpartisan initiative to protect presidential campaigns against foreign influence. Matthew Barrett, a former NIST leader and co-founder of CyberDome, outlines how this group is gearing up....more0minPlay
August 16, 2019The Renaissance of Deception TechnologyThis edition of the ISMG Security Report discusses the latest improvements in deception technology and how best to apply it. Also featured: a report on the growth of mobile fraud, plus insights on Merck's experience recovering from a NotPetya attack....more0minPlay
August 12, 2019A New Credential for Healthcare Security LeadersA new professional credential aims to help healthcare organizations bolster their security leadership bench strength, says William Brad Marsh, co-chair of a committee that developed the certification....more0minPlay
FAQs about Government Information Security Podcast:How many episodes does Government Information Security Podcast have?The podcast currently has 3,284 episodes available.