Credit Union Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • RSA Conference 2007 Interviews

    10/02/2007

    Information Security Media Group recently attended the RSA Conference 2007, the premier information security conference representing more than 200 comprehensive educational sessions and close to 400 of the top vendors in the infosec industry. The following audio is a selection of recordings taken on the expo floor where industry-leading vendors of all shapes and sizes presented their products and services to attendees. We encountered all kinds of vendor solutions ranging from multi-factor authentication to database encryption and security to automated regulatory compliance. We hope you find their take on specifically the banking and finance industry as intriguing as we did. Vendor interviews and recordings are presented in alphabetical order and please note that we are not endorsing any particular vendor or product, we are just reporting on their take on the finance industry.

  • RSA Conference 2007 Vendor Interviews

    10/02/2007

    Information Security Media Group recently attended the RSA Conference 2007, the premier information security conference representing more than 200 comprehensive educational sessions and close to 400 of the top vendors in the infosec industry. The following audio is a selection of recordings taken on the expo floor where industry-leading vendors of all shapes and sizes presented their products and services to attendees. We encountered all kinds of vendor solutions ranging from multi-factor authentication to database encryption and security to automated regulatory compliance. We hope you find their take on specifically the banking and finance industry as intriguing as we did. Vendor interviews and recordings are presented in alphabetical order and please note that we are not endorsing any particular vendor or product, we are just reporting on their take on the finance industry.

  • CUInfoSecurity.com Interviews Markus Jakobbson - Part 2 of 2

    29/01/2007

    Listen to CUInfoSecurity’s latest podcast as a leading phishing researcher explains some of his newest findings on phishing. Dr. Markus Jakobsson is a professor at Indiana University, and a research fellow with the Anti Phishing Working Group (AWPG). Dr. Jakobsson is also Associate Director of the Center of Applied Cybersecurity Research, and a founder of RavenWhite Inc, and he heads the efforts at www.stop-phishing.com. Author and inventor of more than fifty patents, Jakobsson’s research delves into not the technical aspects of phishing and other types of cyber attacks, but also focuses on the human aspect. His latest paper, “The Human Factor in Phishing” is discussed in this two-part podcast. During the interview Dr. Jakobsson describes the research he is doing on fraud, social engineering and phishing, and the prevention of these attacks. His interview is not to be missed, as he explains some of the new ways attackers are targeting th

  • CUInfoSecurity.com Interviews Markus Jakobsson - Part 1 of 2

    29/01/2007

    Listen to CUInfoSecurity’s latest podcast as a leading phishing researcher explains some of his newest findings on phishing. Dr. Markus Jakobsson is a professor at Indiana University, and a research fellow with the Anti Phishing Working Group (AWPG). Dr. Jakobsson is also Associate Director of the Center of Applied Cybersecurity Research, and a founder of RavenWhite Inc, and he heads the efforts at www.stop-phishing.com. Author and inventor of more than fifty patents, Jakobsson’s research delves into not the technical aspects of phishing and other types of cyber attacks, but also focuses on the human aspect. His latest paper, “The Human Factor in Phishing” is discussed in this first part of a two-part podcast. During the interview Dr. Jakobsson describes the research he is doing on fraud, social engineering and phishing, and the prevention of these attacks. His interview is not to be missed, as he explains some of the new ways attackers

  • Excerpt of FAQs from the Webinar "IT Risk Assessments: Understanding the Process"

    24/01/2007

    Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our IT risk assessments webinar. See below for a sampling of the questions asked.

  • Excerpt of FAQs from the Webinar "Preparing for an Information Technology Regulatory Exam"

    24/01/2007

    Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our Preparing for a Regulatory IT Exam webinar. See below for a sampling of the questions asked.

  • CUInfoSecurity.com Interview with Howard Schmidt on the State of Information Security in the Finance Industry

    24/01/2007

    A former FBI agent/computer specialist, Schmidt is one of the world’s top information security luminaries who helped lead the escalating war against cybercrime. He is one of the most credible and influential names in information security, and was Microsoft’s CSO and later eBay’s CISO. He’s also served as CyberSecurity Advisor to the White House. As co-author of two books on information security, his latest book, “Patrolling Cyberspace – Lessons Learned from a Lifetime in Data Security,” details his nearly 30 years spent on the bleeding edge of government and corporate information security. CUInfoSecurity.com’s interview with Schmidt covers information security threats, efforts to thwart international cybercrime, upcoming privacy regulations and enforcement, the use of encryption software, financial industry’s information sharing with government a

  • CUInfoSecurity.com Interviews Alan Paller of the SANS Institute

    24/01/2007

    The SANS Institute is the largest source for information security training and certification in the world. CUInfoSecurity.com recently interviewed Alan Paller, Director of Research for SANS and probed his views on information security and cyber threats facing financial institutions. As Director of Research for the SANS Institute, Alan is responsible for overseeing all research projects ranging from the SANS Step-by-Step guides to the SANS digests to the Top Twenty Internet Security Threats. He is the founder of the CIO Institute, and earned his degrees in Computer Science and Engineering from Cornell and MIT. Alan is the author of the EIS Book: Information Systems for Top Managers and How to Give the Best Presentation of Your Life. In 2001 the President named Alan as one of the original members of the National Infrastructure Advisory Council, and in 2005 the Federal CIO Council chose him as its 2005 Azimuth Award winner recognizing his vision and outstanding service to federal information technology. In

  • CUInfoSecurity.com Interviews Gary McGraw on His Thoughts of Information Security at Financial Institutions

    24/01/2007

    A world authority on software and application security, Gary McGraw, PhD and CTO of Cigital, carries the software security torch. Over the past 11 years his six books on the subject of software security seem to have touched off a revolution. Security people who once relied solely on firewalls, intrusion detection, and antivirus mechanisms came to understand and embrace the necessity of better software. Author of more than 90 peer reviewed technical publications, he is a principal investigator working with the Air Force Research Labs, DARPA, National Science Foundation and NIST’s Advanced Technology Program. He also is an advisor to top U.S. university computer science departments, and sits on the IEEE Board of Governors. In this interview McGraw discusses with CUInfoSecurity.com the state of information security in the financial services industry, pervasive computing, the trusted computing initiative, cyber threats on the horizon for financial institutions, software security, information s

  • Excerpt of Webinar FAQs from "Board Responsibilities for IT Risk Management"

    24/01/2007

    Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our information security for board members and senior management webinar. See below for a sampling of the questions asked.

  • Fighting the Mobile Malware Hydra

    01/01/1970

    Every organization is concerned about malware - how it evolves, slips past multilayered defenses and infects networks. John Nielsen, Product Manager for IBM Mobile Security, discusses the latest malware trends and steps organizations may take to fight back.

  • The Case for Privileged ID Management

    01/01/1970

    If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.

  • Brent Williams

    01/01/1970

    Brent discusses deploying multi-factor authentication to mega-enterprises with millions of end-users, knowledge-based authentication user enrollment, and how educational institutions are utilizing multi-factor authentication solutions.

página 166 de 166