Government Information Security Podcast show

Government Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 The Ransomware Files, Episode 9: Dr. Ransomware, Part 1 | File Type: audio/mpeg | Duration: Unknown

Moises Zagala is a 55-year-old cardiologist living in Ciudad Bolivar, Venezuela. He has a bald head and an earnest smile. In one photo, he wears a doctor's white overcoat and has a stethoscope around his neck. But U.S. prosecutors allege Zagala led a double life and claim he's also a cybercriminal.

 A New CISO Playbook | File Type: audio/mpeg | Duration: Unknown

Chaim Mazal, discusses the issues affecting CISOs, including how increased market share leads to increased problems and how having uniform, automated controls can provide security and enforce compliance.

 How Double-Extortion Attacks Vary By Victims' Sector | File Type: audio/mpeg | Duration: Unknown

Ransomware attackers executing double-extortion schemes very carefully choose which data to steal and leak based on victims' economic sector, says Erick Galinkin, artificial intelligence researcher at security firm Rapid7. He discusses the latest ransomware data theft trends.

 Leveraging Interindustry Data to Discover Mule Accounts | File Type: audio/mpeg | Duration: Unknown

How can you leverage artificial intelligence and make sense of data from different industries to determine whether a customer is creditworthy or whether an account is a mule account? Guy Sheppard, general manager of financial services at Aboitiz Data Innovation, discusses a case study.

 How to Respond to the New 'Fraud Universe' | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how financial service organizations should respond to the new "fraud universe." It also shares how CISOs can incorporate social media into their threat intelligence programs and describes the skills required by today's security leaders.

 Safety in the Cloud | File Type: audio/mpeg | Duration: Unknown

Anneka Gupta, chief product officer at Rubrik, discusses embedding zero trust principles into how the security company provides data resilience, data observability and data recovery for organizations. She also describes the "software-first" approach of building immutability directly into software.

 The Mounting Threats to Sensitive Data After Roe v. Wade | File Type: audio/mpeg | Duration: Unknown

Location data, browser history, IP addresses, and appointment scheduling are among the sensitive data putting individuals' privacy at risk in the wake of the decision to overturn Roe v. Wade, says Alexandra Reeve Givens of the Center for Democracy and Technology.

 OT Security: Has the Industry Made Progress? | File Type: audio/mpeg | Duration: Unknown

OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go.

 Zero Trust Architecture: No Firewalls or VPNs | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report describes why firewalls and VPNs don't belong in Zero Trust design. It also discusses cybercriminals' evolving ransomware tactics and the devastating price of responding to a ransomware attack, as experienced by Travelex in 2019.

 Why FDA's Device Security Draft Guidance Is a Game-Changer | File Type: audio/mpeg | Duration: Unknown

Recent draft guidance from the Food and Drug Administration represents a game-changer in how the makers of medical devices should approach the cybersecurity of their products, say Axel Wirth and Vidya Murthy of medical device security firm MedCrypt.

 Cybercrime: Conti Ransomware Retools After Backing Moscow | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report investigates the reboot of ransomware group Conti, which supports Russia's invasion of Ukraine. It also discusses why paying ransomware actors is a "business decision" and how to respond to the talent shortage in the financial sector.

 The Ransomware Files, Episode 8: Travelex | File Type: audio/mpeg | Duration: Unknown

Ransomware struck global currency exchange and remittance company Travelex on New Year's Eve 2019. Don Gibson, a security architect at Travelex, became publicly linked with the incident, and the undesired attention he received contributed to a health situation that nearly led to a tragic outcome.

 Highlights of RSA Conference 2022 | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report includes highlights and observations from RSA Conference 2022, including a key message from RSA CEO Rohit Ghai. It also discusses the value of automation and the Cybersecurity and Infrastructure Security Agency's mission to grow cyber talent.

 Elasticsearch Attack: The Problem of Unsecured Databases | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report discusses how security researchers have warned of a new attack campaign targeting 1,200 cloud-based Elasticsearch databases. It also revisits the Kaseya supply chain attack and examines how we can mitigate mobile phone fraud.

 Where the Healthcare Sector Lags in Security | File Type: audio/mpeg | Duration: Unknown

The healthcare sector is still behind many other critical infrastructure sectors in implementing critically important security technologies to protect against the rise in potentially devastating cyber incidents, says threat intelligence analyst Christiaan Beek of security firm Trellix.

Comments

Login or signup comment.