Credit Union Information Security Podcast

  • Autor: Vários
  • Narrador: Vários
  • Editor: Podcast
  • Mas informaciones

Informações:

Sinopsis

Exclusive, insightful audio interviews by our staff with creditunion/security leading practitioners and thought-leaders. Transcripts are also available on our site!

Episodios

  • CUInfoSecurity.com Interview with Howard Schmidt on the State of Information Security in the Finance Industry

    24/01/2007

    A former FBI agent/computer specialist, Schmidt is one of the world’s top information security luminaries who helped lead the escalating war against cybercrime. He is one of the most credible and influential names in information security, and was Microsoft’s CSO and later eBay’s CISO. He’s also served as CyberSecurity Advisor to the White House. As co-author of two books on information security, his latest book, “Patrolling Cyberspace – Lessons Learned from a Lifetime in Data Security,” details his nearly 30 years spent on the bleeding edge of government and corporate information security. CUInfoSecurity.com’s interview with Schmidt covers information security threats, efforts to thwart international cybercrime, upcoming privacy regulations and enforcement, the use of encryption software, financial industry’s information sharing with government a

  • CUInfoSecurity.com Interviews Alan Paller of the SANS Institute

    24/01/2007

    The SANS Institute is the largest source for information security training and certification in the world. CUInfoSecurity.com recently interviewed Alan Paller, Director of Research for SANS and probed his views on information security and cyber threats facing financial institutions. As Director of Research for the SANS Institute, Alan is responsible for overseeing all research projects ranging from the SANS Step-by-Step guides to the SANS digests to the Top Twenty Internet Security Threats. He is the founder of the CIO Institute, and earned his degrees in Computer Science and Engineering from Cornell and MIT. Alan is the author of the EIS Book: Information Systems for Top Managers and How to Give the Best Presentation of Your Life. In 2001 the President named Alan as one of the original members of the National Infrastructure Advisory Council, and in 2005 the Federal CIO Council chose him as its 2005 Azimuth Award winner recognizing his vision and outstanding service to federal information technology. In

  • CUInfoSecurity.com Interviews Gary McGraw on His Thoughts of Information Security at Financial Institutions

    24/01/2007

    A world authority on software and application security, Gary McGraw, PhD and CTO of Cigital, carries the software security torch. Over the past 11 years his six books on the subject of software security seem to have touched off a revolution. Security people who once relied solely on firewalls, intrusion detection, and antivirus mechanisms came to understand and embrace the necessity of better software. Author of more than 90 peer reviewed technical publications, he is a principal investigator working with the Air Force Research Labs, DARPA, National Science Foundation and NIST’s Advanced Technology Program. He also is an advisor to top U.S. university computer science departments, and sits on the IEEE Board of Governors. In this interview McGraw discusses with CUInfoSecurity.com the state of information security in the financial services industry, pervasive computing, the trusted computing initiative, cyber threats on the horizon for financial institutions, software security, information s

  • Excerpt of Webinar FAQs from "Board Responsibilities for IT Risk Management"

    24/01/2007

    Listen to Susan Orr CISA, CISM, CRP - ex-FDIC examiner respond to some of the FAQs from our information security for board members and senior management webinar. See below for a sampling of the questions asked.

  • Fighting the Mobile Malware Hydra

    01/01/1970

    Every organization is concerned about malware - how it evolves, slips past multilayered defenses and infects networks. John Nielsen, Product Manager for IBM Mobile Security, discusses the latest malware trends and steps organizations may take to fight back.

  • The Case for Privileged ID Management

    01/01/1970

    If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.

  • Brent Williams

    01/01/1970

    Brent discusses deploying multi-factor authentication to mega-enterprises with millions of end-users, knowledge-based authentication user enrollment, and how educational institutions are utilizing multi-factor authentication solutions.

página 167 de 167