Government Information Security Podcast

by GovInfoSecurity.com

Government Information Security Podcast
  • Language: eng
  • Episodes: 2,059
  • Last: 9 Mar 2018
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodes (2,059)

  • Top US General: Response to Russia Not Unified
    Top US General: Response to Russia Not Unified
    Play
    Published: 9 Mar 2018 Duration: n/a
    Leading the latest edition of the ISMG Security Report: America's top general says the U.S. response to Russian election interference isn't as well coordinated as it needs to be, and Pennsylvania sues Uber for failing to notify data breach ... Read more →
    Leading the latest edition of the ISMG Security Report: America's top general says the U.S. response to Russian election interference isn't as well coordinated as it needs to be, and Pennsylvania sues Uber for failing to notify data breach ... Read more →

  • Is Healthcare Sector Cybersecurity Finally Maturing?
    Is Healthcare Sector Cybersecurity Finally Maturing?
    Play
    Published: 8 Mar 2018 Duration: n/a
    More healthcare organizations are "decoupling" their HIPAA compliance efforts from their cybersecurity initiatives, a sign that the sector is maturing, says security expert Axel Wirth, discussing findings of a new study by HIMSS Analytics a... Read more →
    More healthcare organizations are "decoupling" their HIPAA compliance efforts from their cybersecurity initiatives, a sign that the sector is maturing, says security expert Axel Wirth, discussing findings of a new study by HIMSS Analytics a... Read more →

  • ONC Considering Tweaks to Trusted Exchange Framework
    ONC Considering Tweaks to Trusted Exchange Framework
    Play
    Published: 7 Mar 2018 Duration: n/a
    Based on the feedback it received, the Office of the National Coordinator for Health IT will consider making tweaks to its proposed Trusted Exchange Framework and Common Agreement, including provisions related to privacy and security, says ... Read more →
    Based on the feedback it received, the Office of the National Coordinator for Health IT will consider making tweaks to its proposed Trusted Exchange Framework and Common Agreement, including provisions related to privacy and security, says ... Read more →

  • Securing Borderless Networks
    Securing Borderless Networks
    Play
    Published: 7 Mar 2018 Duration: n/a
    In an age when every organization is essentially borderless, how do security leaders approach securing the borderless network? Paul Martini of iboss Cybersecurity offers insights and solutions.
    In an age when every organization is essentially borderless, how do security leaders approach securing the borderless network? Paul Martini of iboss Cybersecurity offers insights and solutions.

  • DDoS Extortion and Attack Techniques
    DDoS Extortion and Attack Techniques
    Play
    Published: 12 Feb 2018 Duration: n/a
    DDoS extortion comes in many forms. Campaigns over the past three years have varied in their nature and continue to evolve over even the past few months. What lessons can be learned from the latest attacks? Dennis Birchard of Akamai shares ... Read more →
    DDoS extortion comes in many forms. Campaigns over the past three years have varied in their nature and continue to evolve over even the past few months. What lessons can be learned from the latest attacks? Dennis Birchard of Akamai shares ... Read more →

  • Lauri Love: UK Blocks Suspected Hacker's US Extradition
    Lauri Love: UK Blocks Suspected Hacker's US Extradition
    Play
    Published: 9 Feb 2018 Duration: n/a
    Leading the latest edition of the ISMG Security Report: England's Court of Appeal rejects U.S. extradition request for suspected hacker Laurie Love. Also, what took Uber and Partners Health so long to come clean about their respective data ... Read more →
    Leading the latest edition of the ISMG Security Report: England's Court of Appeal rejects U.S. extradition request for suspected hacker Laurie Love. Also, what took Uber and Partners Health so long to come clean about their respective data ... Read more →

  • Bridging the Password Gap
    Bridging the Password Gap
    Play
    Published: 8 Feb 2018 Duration: n/a
    Rachael Stockton of LastPass says that 81 percent of breaches are caused by weak or reused passwords. So, is it time to take a hard look at password management and consider adding some technology to the practice?
    Rachael Stockton of LastPass says that 81 percent of breaches are caused by weak or reused passwords. So, is it time to take a hard look at password management and consider adding some technology to the practice?

  • Faster Payments Don't Have to Mean Faster Fraud
    Faster Payments Don't Have to Mean Faster Fraud
    Play
    Published: 7 Feb 2018 Duration: n/a
    As banks in the U.S. and Australia grapple with how to effectively launch faster payments, more will turn to big data and machine learning to help better manage expected upticks in fraud, says cybersecurity specialist John O'Neill Jr. of Da... Read more →
    As banks in the U.S. and Australia grapple with how to effectively launch faster payments, more will turn to big data and machine learning to help better manage expected upticks in fraud, says cybersecurity specialist John O'Neill Jr. of Da... Read more →

  • Integrity of Data: Medical Device Cybersecurity Concerns
    Integrity of Data: Medical Device Cybersecurity Concerns
    Play
    Published: 29 Dec 2017 Duration: n/a
    Ensuring the integrity of data generated and emitted by medical devices is a growing concern as cyber threats advance, says cybersecurity expert Kevin Fu, who also discusses concerns about consumer-wearable health devices.
    Ensuring the integrity of data generated and emitted by medical devices is a growing concern as cyber threats advance, says cybersecurity expert Kevin Fu, who also discusses concerns about consumer-wearable health devices.

  • 5 Trends Cybersecurity Practitioners Must Address in 2018
    5 Trends Cybersecurity Practitioners Must Address in 2018
    Play
    Published: 29 Dec 2017 Duration: n/a
    A look ahead at five trends that should have a significant impact on cybersecurity in 2018 is featured in the final ISMG Security Report for 2017. Cybersecurity and privacy thought leader Christopher Pierson forecasts the likely occurrences... Read more →
    A look ahead at five trends that should have a significant impact on cybersecurity in 2018 is featured in the final ISMG Security Report for 2017. Cybersecurity and privacy thought leader Christopher Pierson forecasts the likely occurrences... Read more →

  • Forecast 2018: Nation-States Test Offensive Waters
    Forecast 2018: Nation-States Test Offensive Waters
    Play
    Published: 28 Dec 2017 Duration: n/a
    Following the success of Russian offensive cyber operations, other countries will likely be testing their capabilities, says FireEye's Bryce Boland, who predicts nation-state attacks will become more common in 2018.
    Following the success of Russian offensive cyber operations, other countries will likely be testing their capabilities, says FireEye's Bryce Boland, who predicts nation-state attacks will become more common in 2018.

  • Why Healthcare Cybersecurity Spending Is Rising
    Why Healthcare Cybersecurity Spending Is Rising
    Play
    Published: 28 Dec 2017 Duration: n/a
    Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.
    Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.

  • Troy Hunt Discusses His Data Breach Message to Congress
    Troy Hunt Discusses His Data Breach Message to Congress
    Play
    Published: 27 Dec 2017 Duration: n/a
    Since the massive data breach of credit bureau Equifax, the U.S. Congress has become more interested in the causes of data breaches. Australian security expert Troy Hunt, who recently traveled to Washington to share his insights with a Hous... Read more →
    Since the massive data breach of credit bureau Equifax, the U.S. Congress has become more interested in the causes of data breaches. Australian security expert Troy Hunt, who recently traveled to Washington to share his insights with a Hous... Read more →

  • Using Better Information to Secure SWIFT International Transfers
    Using Better Information to Secure SWIFT International Transfers
    Play
    Published: 26 Dec 2017 Duration: n/a
    The international payments system is largely based on the three-decades old SWIFT messaging system. But cyberattackers have exploited weak controls employed by banks to make fraudulent transfers. Nick Armstrong of Identitii discusses a path... Read more →
    The international payments system is largely based on the three-decades old SWIFT messaging system. But cyberattackers have exploited weak controls employed by banks to make fraudulent transfers. Nick Armstrong of Identitii discusses a path... Read more →

  • The Man Behind the Cybersecurity 'Moonshot'
    The Man Behind the Cybersecurity 'Moonshot'
    Play
    Published: 26 Dec 2017 Duration: n/a
    Exploring Samuel Visner's vision - patterned after the Manhattan Project and moonshot - for collaborating to create innovative ways to improve cybersecurity leads the latest edition of the ISMG Security Report. Also featured: a report on le... Read more →
    Exploring Samuel Visner's vision - patterned after the Manhattan Project and moonshot - for collaborating to create innovative ways to improve cybersecurity leads the latest edition of the ISMG Security Report. Also featured: a report on le... Read more →

  • Former US CISO on Why Awareness Training Is Priority Number 1
    Former US CISO on Why Awareness Training Is Priority Number 1
    Play
    Published: 22 Dec 2017 Duration: n/a
    In an information technology environment where personnel are taking on increasingly complex responsibilities, the key to ensuring security is still awareness training, says former U.S. CISO Gregory Touhill, who says he'd put his last dollar... Read more →
    In an information technology environment where personnel are taking on increasingly complex responsibilities, the key to ensuring security is still awareness training, says former U.S. CISO Gregory Touhill, who says he'd put his last dollar... Read more →

  • Is North Korea the True Culprit Behind WannaCry?
    Is North Korea the True Culprit Behind WannaCry?
    Play
    Published: 22 Dec 2017 Duration: n/a
    An assessment on whether North Korea is behind the WannaCry ransomware attacks leads the latest edition of the ISMG Security Report. Also, the co-author of NIST's revised Trustworthy Email special publication discusses changes in the guidan... Read more →
    An assessment on whether North Korea is behind the WannaCry ransomware attacks leads the latest edition of the ISMG Security Report. Also, the co-author of NIST's revised Trustworthy Email special publication discusses changes in the guidan... Read more →

  • Exploring Cyber's Role in the New National Security Strategy
    Exploring Cyber's Role in the New National Security Strategy
    Play
    Published: 19 Dec 2017 Duration: n/a
    An analysis of the cyber component of the Trump administration's just-published National Security Strategy leads the latest edition of the ISMG Security. Also, DHS and industry establish a cyber coordinating council to help secure the U.S. ... Read more →
    An analysis of the cyber component of the Trump administration's just-published National Security Strategy leads the latest edition of the ISMG Security. Also, DHS and industry establish a cyber coordinating council to help secure the U.S. ... Read more →

  • Is Legislation Backing 'Hacking Back' a Good Idea?
    Is Legislation Backing 'Hacking Back' a Good Idea?
    Play
    Published: 18 Dec 2017 Duration: n/a
    Legislation pending in Congress that would offer protections for companies and individuals who seek to "hack back" in retaliation against cybercriminals who have attacked them is a bad idea, contends Alan Brill of Kroll.
    Legislation pending in Congress that would offer protections for companies and individuals who seek to "hack back" in retaliation against cybercriminals who have attacked them is a bad idea, contends Alan Brill of Kroll.

  • How Malware Known as Triton Threatens Public Safety
    How Malware Known as Triton Threatens Public Safety
    Play
    Published: 15 Dec 2017 Duration: n/a
    The latest ISMG Security Report leads with a report on a malware attack on an industrial safety system that experts contend could threaten public safety. Also, legislation giving DHS's cybersecurity unit a meaningful name progresses through... Read more →
    The latest ISMG Security Report leads with a report on a malware attack on an industrial safety system that experts contend could threaten public safety. Also, legislation giving DHS's cybersecurity unit a meaningful name progresses through... Read more →

Related

The Tech Blog Writer Podcast - Inspired Tech Startup Stories & Interviews With Tech Leaders, Entrepreneurs and Innovators

by Tech Columnist Neil C. Hughes Talks With Tech Leaders, CEOs, Entrepreneurs & Thought Leaders about Startup Stories, Tech Trends, Innovation, Startup Interviews, This Popular Top Rated Tech Show & Startup Podcast

Brakeing Down Security Podcast

by Bryan Brake - CISSP | Information Security | Vuln Management

Bill Murphy's RedZone Podcast | World Class IT Security

by Bill Murphy Interviews Thought Leaders About IT Security, Innovation, Ideas, Creativity, Neuroscience and More.

Mr. Media Interviews by Bob Andelman

by Mr. Media Interviews - Bob Andelman

Down the Security Rabbithole

by Rafal Los (Wh1t3Rabbit)

Paul's Security Weekly

by paul@securityweekly.com