All content for Government Information Security Podcast is the property of GovInfoSecurity.com and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders
As cyberthreats increase and evolve, the security of sensitive data and critical operations is paramount. There is a pressing need for government agencies and critical infrastructure to choose a FedRAMP-authorized identity security, also known as identity governance, solution.
The Big Data explosion will expand in volume, velocity and variety. Analytics are key to deriving insights from this data, particularly in cybersecurity and anti-fraud, says Dominic Ligot of Teradata Philippines.
Chris Buse, CISO for the state of Minnesota, says centralizing IT systems should make it easier to defend against cyber-attacks because there are fewer computing environments to protect.
Elayne Starkey, the state of Delaware's chief security officer, no longer micromanages how cloud services providers secure state data. Find out why she's giving providers more leeway in defining security requirements.
Texas Chief Information Security Officer Brian Engle, like other CISOs, has voiced concerns that the state government didn't have sufficient staffers and managers with the right set of IT security skills. Engle, however, did something about it.
U.S. President Barack Obama's visit to India this month may prove to be the fulcrum for a new era of Indo-U.S. cyber cooperation and collaboration, says Bruce McConnell, senior vice president at the EastWest Institute.
Tripwire CTO Dwayne Melancon, a keen observer of risk management practices in the federal government, says he's seen a marked improvement in the way federal agencies address risk management, partly because of efforts by DHS.
After 20 years in the Army and nearly that long as an information risk management leader at the National Institute of Standards and Technology, Ron Ross says his career is still evolving. Find out what he plans to do next.
Most citizens rightly don't trust the Internet as a voting booth. But the Atlantic Council's Jason Healey says that could change, not because of better security, but because the digital generation might demand it as they age.
In a wide-ranging interview, Senate Homeland Security and Governmental Affairs Committee Chairman Tom Carper discusses bipartisan efforts to enact FISMA reform, the impact of payment card breaches and his personal approach to IT security.
To address the reluctance of federal agencies to move sensitive data to the cloud, the former CISO at the Nuclear Regulatory Commission, Patrick Howard, and his colleague, Michael Rohde, champion a FedRAMP workaround.
If the U.S. military awarded a decoration for hacking, Army Col. Gregory Conti would wear it proudly on his uniform. Hear Conti, director of the Army Cyber Institute, explain why ethical hacking helps drive America's innovation engine.
Ex-Navy Secretary Richard Danzig likens society's growing dependence on IT to surviving on a diet of poisoned fruit. He says we're taking risks with critical cybersystems that ultimately can cause irreparable harm.
In devising advice to help organizations identify which information security and privacy controls to adopt, NIST risk management expert
Ron Ross, a NASCAR fan, looks to the way mechanics decide how to fix a car.
Julie Conroy once was a financial services practitioner who subscribed to Aite Group's research. Today she is one of Aite's top fraud researchers. What was her career path, and what tips can she share?
To protect their privacy, organizations should get their IT security staffs involved in vendor-requested audits conducted to verify software licensing agreement compliance, says Gartner Research Director Victoria Barber.
The word 'security' takes on a whole new level of importance when you take a job in federal law enforcement. Joshua Belk, CSO of the FBI's San Francisco division, offers career insights for security pros.
A problem federal agencies face in deploying effective continuous monitoring is that there's just too much guidance, former federal chief information security officer Patrick Howard says.
Karen Evans, formerly the federal government's top IT executive, prescribes a way to get inspectors general and federal agencies on the same page in regards to annual IT security audits.
As the federal government ramps up deployment of continuous monitoring, agencies should significantly reduce the time to certify and accredit IT systems and detect vulnerabilities, says the Defense Department's Robert Carey.