Government Information Security Podcast show

Government Information Security Podcast

Summary: Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Join Now to Subscribe to this Podcast

Podcasts:

 Are Rewards Effective in Combating Nation-State Cybercrime? | File Type: audio/mpeg | Duration: Unknown

This ISMG Security Report analyzes the U.S. State Department's reward offer of up to $10 million for information about Russian military hackers implicated in NotPetya. It also examines how ransomware may evolve and the new cybersecurity draft guidance issued by the Food and Drug Administration.

 Cyberwarfare in the Russia-Ukraine War | File Type: audio/mpeg | Duration: Unknown

As one of the architects of Israel's offensive Red Team intelligence unit and Incident Response Team, Reuven (Rubi) Aronashvili, CEO of Israeli cybersecurity company CYE, provides a highly informed view of current cyberwarfare in the Russia-Ukraine war, including how it differs from kinetic warfare.

 HIPAA-Compliant Email: 5 Steps Healthcare Needs to Take | File Type: audio/mpeg | Duration: Unknown

The cost of a data breach is mighty. And for healthcare entities, the cost of a HIPAA violation also can prove costly. Greg Hoffman of Paubox shares five critical steps you might be overlooking to ensure emails remain HIPAA-compliant and tells how to take compliance responsibility out of human hands.

 Expanding Your Cybersecurity Marketing Process | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Prachee Kale - a pioneer of CyberEd.io's Think.Design.Cyber. - discusses the need for systems and design thinking in cybersecurity marketing, how to tell your marketing story, and how systems and design thinking can lead to creative solutions.

 Raising the Bar on Premarket Medical Device Cybersecurity | File Type: audio/mpeg | Duration: Unknown

The Food and Drug Administration's decision to incorporate "quality systems regulations" into its new draft guidance for premarket medical device cybersecurity is an important development in the scope of the agency's expectations for manufacturers, says Dr. Suzanne Schwartz of the FDA.

 The Global Threat Landscape 1 Year After SolarWinds | File Type: audio/mpeg | Duration: Unknown

In this episode of "Cybersecurity Unplugged," Roger Sels, vice president, solution, EMEA at BlackBerry, discusses the global threat landscape one year after SolarWinds, including cyberthreats from Russia and China; the cyber impact of the Russia-Ukraine war; and the cyber call to action.

 Critical Steps for Enhancing 3rd-Party Risk Management | File Type: audio/mpeg | Duration: Unknown

Recent security incidents involving third-party software, including Okta and Log4j, underscore the importance of healthcare entities taking steps to enhance their vendor risk management programs, says Chris Frenz, assistant vice president of IT security at Mount Sinai South Nassau.

 Could $5 Million Reward Rattle North Korean Cybercriminals? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report analyzes how the U.S. government is offering a reward of up to $5 million for information to help it disrupt the illicit flow of funds to North Korea. The report also examines approaches to enhance banks' cyber defenses and U.S. regulatory trends.

 Changing Data Quantification in Security Insurance | File Type: audio/mpeg | Duration: Unknown

Lynn Peachey, the director of business development at Arete Incident Response, says that insurance companies have made "a pretty quick turnaround in terms of trying to respond to the ransomware epidemic." She discusses the changes they are making, which include leveraging data quantification.

 Medical Devices: Negotiating Cybersecurity Contract Terms | File Type: audio/mpeg | Duration: Unknown

New guidance provides healthcare entities and medical device makers a jump-start for negotiating critical cybersecurity issues pertaining to procurement contracts, says Jim Jacobson of device manufacturer Siemens Healthineers, co-chair of an industry group that developed the contract template.

 Why New Incident Reporting Mandates Are 'Groundbreaking' | File Type: audio/mpeg | Duration: Unknown

New legislation mandating cyber incident reporting for critical infrastructure providers within 72 hours, and the reporting of ransom payments within 24 hours, is "groundbreaking," says former National Security Agency deputy commander Tim Kosiba, CEO of security firm bracket f.

 Russia-Ukraine Crisis: What's the Threat to Energy Sector? | File Type: audio/mpeg | Duration: Unknown

The latest edition of the ISMG Security Report analyzes the latest cyberthreats to the energy sector as Russia's invasion of Ukraine continues. It also examines best practices for Customer Identity and Access Management and how healthcare institutions can sharpen their defense strategies.

 Lessons Learned From REvil's Attack on Kaseya | File Type: audio/mpeg | Duration: Unknown

This edition discusses the latest episode of "The Ransomware Files," which covers the REvil ransomware gang's 2021 attack on Kaseya. It also examines how healthcare entities can prepare for potential spillover attacks from the hybrid Russia-Ukraine war and highlights from ISMG's Chicago Summit.

 The Ransomware Files, Episode 6: Kaseya and REvil | File Type: audio/mpeg | Duration: Unknown

The REvil ransomware gang's attack against the U.S. software company Kaseya in July 2021 is one of the largest and most intriguing ransomware attacks of all time. Here's the inside story of how the attack went down and how organizations recovered.

 Tapping Public Health Research Tools to Fight Cybercrime | File Type: audio/mpeg | Duration: Unknown

Tools and methodologies that have been helpful for global public health research might also provide better understanding of the root causes of cybercrime and the motivation of cybercriminals, especially as such crime has surged during the COVID-19 pandemic, says Stanley Mierzwa of Kean University.

Comments

Login or signup comment.