Sinopsis
Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Episodios
-
CUInfoSecurity.com Interview with Howard Schmidt on the State of Information Security in the Finance Industry
24/01/2007A former FBI agent/computer specialist, Schmidt is one of the world’s top information security luminaries who helped lead the escalating war against cybercrime. He is one of the most credible and influential names in information security, and was Microsoft’s CSO and later eBay’s CISO. He’s also served as CyberSecurity Advisor to the White House. As co-author of two books on information security, his latest book, “Patrolling Cyberspace – Lessons Learned from a Lifetime in Data Security,†details his nearly 30 years spent on the bleeding edge of government and corporate information security. CUInfoSecurity.com’s interview with Schmidt covers information security threats, efforts to thwart international cybercrime, upcoming privacy regulations and enforcement, the use of encryption software, financial industry’s information sharing with government a
-
CUInfoSecurity.com Interviews Alan Paller of the SANS Institute
24/01/2007The SANS Institute is the largest source for information security training and certification in the world. CUInfoSecurity.com recently interviewed Alan Paller, Director of Research for SANS and probed his views on information security and cyber threats facing financial institutions. As Director of Research for the SANS Institute, Alan is responsible for overseeing all research projects ranging from the SANS Step-by-Step guides to the SANS digests to the Top Twenty Internet Security Threats. He is the founder of the CIO Institute, and earned his degrees in Computer Science and Engineering from Cornell and MIT. Alan is the author of the EIS Book: Information Systems for Top Managers and How to Give the Best Presentation of Your Life. In 2001 the President named Alan as one of the original members of the National Infrastructure Advisory Council, and in 2005 the Federal CIO Council chose him as its 2005 Azimuth Award winner recognizing his vision and outstanding service to federal information technology. In
-
CUInfoSecurity.com Interviews Gary McGraw on His Thoughts of Information Security at Financial Institutions
24/01/2007A world authority on software and application security, Gary McGraw, PhD and CTO of Cigital, carries the software security torch. Over the past 11 years his six books on the subject of software security seem to have touched off a revolution. Security people who once relied solely on firewalls, intrusion detection, and antivirus mechanisms came to understand and embrace the necessity of better software. Author of more than 90 peer reviewed technical publications, he is a principal investigator working with the Air Force Research Labs, DARPA, National Science Foundation and NIST’s Advanced Technology Program. He also is an advisor to top U.S. university computer science departments, and sits on the IEEE Board of Governors. In this interview McGraw discusses with CUInfoSecurity.com the state of information security in the financial services industry, pervasive computing, the trusted computing initiative, cyber threats on the horizon for financial institutions, software security, information s
-
Excerpt of Webinar FAQs from "Board Responsibilities for IT Risk Management"
24/01/2007Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our information security for board members and senior management webinar. See below for a sampling of the questions asked.
-
Fighting the Mobile Malware Hydra
01/01/1970Every organization is concerned about malware - how it evolves, slips past multilayered defenses and infects networks. John Nielsen, Product Manager for IBM Mobile Security, discusses the latest malware trends and steps organizations may take to fight back.
-
The Case for Privileged ID Management
01/01/1970If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.
-
Brent Williams
01/01/1970Brent discusses deploying multi-factor authentication to mega-enterprises with millions of end-users, knowledge-based authentication user enrollment, and how educational institutions are utilizing multi-factor authentication solutions.