Government Information Security Podcast show

Government Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 Managing Legacy Medical, OT, IoT Device Risk in Healthcare | File Type: audio/mpeg | Duration: Unknown

While patient safety risks posed by unpatched security vulnerabilities in legacy medical devices often grab headlines, healthcare entities shouldn't underestimate the serious business risks involving other poorly secured IoT and OT gear used in healthcare settings, said Mohammad Waqas of Armis.

 Reporting Cyber Incidents Within 72 Hours: Challenges Ahead | File Type: audio/mpeg | Duration: Unknown

Many critical infrastructure sector organizations, especially smaller entities, will likely struggle to comply with an upcoming requirement to report cyber incidents to federal regulators within 72 hours - due to an assortment of reasons, said Stanley Mierzwa of Kean University.

 The Surveillance Society and Digital Freedom | File Type: audio/mpeg | Duration: Unknown

We live in a surveillance society, but even though citizens are concerned about the lack of privacy, they don't know what to do about it, said David Sinclair, founder of 4Freedom Mobile, a mobile service provider that helps subscribers secure their phones and stop tracking, hacking and data theft.

 Critical Vendor Risk Considerations for AI Use in Healthcare | File Type: audio/mpeg | Duration: Unknown

As generative AI applications become more common in healthcare, organizations will need to carefully consider critical third-party risk issues involving the use of these technologies, said Damian Chung, business information security officer at security firm Netskope.

 MDM: Balancing the Need for User Privacy, Corporate Control | File Type: audio/mpeg | Duration: Unknown

In this episode of CyberEd.io's podcast series "Cybersecurity Insights," Weldon Dodd of Kandji discusses the evolution of Apple's security and privacy practices and how mobile device management can help achieve a balance between user privacy and corporate control.

 Navigating the Complexities of Cyber Insurance | File Type: audio/mpeg | Duration: Unknown

"Insurance is a tool," said Libby Benet, the global chief underwriting officer for AXA XL. "When you buy an insurance policy, you are buying a network of professional crisis managers." In this episode of "Cybersecurity Insights," Benet discussed present and future cybersecurity insurance issues.

 Cisco XDR: Making Defenders' Lives Better | File Type: audio/mpeg | Duration: Unknown

Cisco connected the world; who better to defend it? This is the mindset Carlos Diaz brings to the new Cisco XDR release, which he says is designed to make cybersecurity defenders' lives easier. The message that defenders should draw from this XDR solution, he says, is: "Cisco knows me."

 Threat Detection for 'DEED' Environments of Enterprises Today | File Type: audio/mpeg | Duration: Unknown

Martin Roesch, CEO of Netography, discusses the company's platform, which is for dispersed, ephemeral, encrypted and diverse - what he refers to as "DEED" - environments. DEED works with the multi-cloud, hybrid and on-premises, IT and OT environments that modern large enterprises have today.

 Securing OT and IoT Assets in an Interconnected World | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Insights," Antoinette Hodes of Check Point Research discusses the need to consolidate an organization's cybersecurity posture, gain visibility into OT and IT assets, and use cybersecurity education to increase worker safety.

 Why Cyber Defenders Need Partnerships, Tools and Education | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Insights," Lonnie Price of Peraton discusses the importance of partnerships between the public and private sectors to help Ukrainians with the war effort. He also shares how we can become better educated and more efficient as cyber defenders.

 Are We Facing a Massive Cybersecurity Threat? | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Insights," Rodrigo Liang of SambaNova Systems discusses what he calls "the fastest industrial revolution we've seen." The topic, of course, is generative artificial intelligence, and Liang considers whether businesses should embrace it or hold back.

 Integrating Generative AI Into the Threat Detection Process | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Insights," Chen Burshan and Amir Shachar of Skyhawk Security discuss how they integrated generative AI into their threat detection process and significantly increased the speed and lowered the costs of detecting breaches based by focusing on anomalous activity.

 Top Privacy Considerations for Website Tracking Tools | File Type: audio/mpeg | Duration: Unknown

Federal regulators are aiming to protect patient information shared on websites. It's increasingly important for healthcare sector entities to take a careful and proactive approach in how they are using website tracking and analytics technologies, said Lokker CEO and privacy expert Ian Cohen.

 CyberArk CEO Touts New Browser That Secures Privileged Users | File Type: audio/mpeg | Duration: Unknown

CyberArk's new Secure Browser prevents adversaries from harvesting the credentials of privileged users who are accessing sensitive web applications. CEO Matt Cohen said this solution will help thwart attackers who are hijacking sessions on consumer-grade browsers through the use of cookies.

 What's Inside Washington State's New My Health My Data Act | File Type: audio/mpeg | Duration: Unknown

Organizations of all types have important work ahead to comply with Washington state's new My Health My Data Act, which pertains to any entity - inside or outside the state - that handles health data of consumers in the state, said Cat Kozlowski, attorney at law firm Polsinelli.

Comments

Login or signup comment.