All content for Info Risk Today Podcast is the property of InfoRiskToday.com and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Exclusive, insightful audio interviews by our staff with info risk/security leading practitioners and thought-leaders
STEM education has moved to the forefront in the last 15 years, but we still need to do a better job of celebrating technologists as people who can solve significant world problems, says Dr. Heather Monthie, author of the book “Beginner’s Guide to Developing a High School Cybersecurity Program.”
Companies should establish clear policies for how employees can report signs of accounts payable fraud, says Peter Goldmann, president of FraudAware, which provides antifraud training.
When security teams apply agile methodologies, they are better able to deliver value and can more easily pivot and change plans, says Kevin Fielder, CISO of Just Eat, a British online food ordering and delivery service with operations in 13 countries.
To ensure data is protected, business units must work closely with IT and security specialists to resolve data governance issues, says Sydney-based Prashant Haldankar, CISO at Privasec.
The South African airline ComAir is using artificial intelligence to help mitigate the threat of cyberattacks, says Ramon Lipparoni, the company's IT integration manager.
Machine learning is supporting new ways of battling evolving cyber threats, such as by analyzing behaviors, says Darshan Appayanna, CISO at Happiest Minds, an IT services firm, who will be a featured speaker at ISMG's upcoming Fraud and Breach Prevention Summit in Bengaluru.
How do we establish and maintain digital trust without burdening our users? What are the critical questions that need to be addressed by anyone managing identity and access management in a modern enterprise? David Duncan of CA Technologies offers answers to these questions.
The key to simplifying the implementation of identity and access management, and streamlining integration with other systems, is to take advantage of industry standards, says Mark Perry of Ping Identity, an identity-defined security provider
As new schemes from hackers get more disruptive and harmful, it is critical to scale up defences, disrupt these attacks and make your organization a lesser target. Alex Holden, founder and CISO of Hold Security, tells how.
Deception technology is gaining prominence with top organizations around the world. As more practitioners join the active defense bandwagon, is your organization ready? Smokescreen Technologies' Sahir Hidayatullah shares some insights to get you going.
Deception technology could be a game-changer, with many thought leaders and organizations already getting behind the concept of "assume compromise." Smokescreen founder Sahir Hidayatullah speaks about the rise of this emerging technology.
One of the unforeseen advantages of the so-called "brain-drain" in cybersecurity is that organizations have had to think outside the IT box and hire staff that don't fit the traditional computer science mold. Jen Miller-Osborn of Palo Alto Networks discusses why diverse backgrounds benefit security.
Security leaders expect the new Union budget to give a needed boost to cybersecurity education, as well as increased investment in critical infrastructure, biometrics and surveillance to fight cybercrime.
The subject of privacy has been debated ever since the release of the AP Shah Committee report on the subject. Kamlesh Bajaj, CEO of the Data Security Council of India, shares insights on how the nation's Data Privacy Act may finally be taking shape.
Increasingly, security and risk issues have the attention of boards of directors. What are the keys to discussing these topics with the board? John South, CSO of Heartland Payment Systems, shares tips.
What are the critical steps that IT security professionals should take in the aftermath of a breach? CEO Micky Tripathi of The Massachusetts eHealth Collaborative offers eight practical lessons based on his breach resolution experience.
Five years ago, the Council of Registered Ethical Security Testers began as an organization to bring standardization to the penetration testing industry. Today, CREST's scope is expanding across industries and global regions, says president Ian Glover.
Malcolm Harkins, CISO of Intel was quick to embrace BYOD as a means to cut costs and improve employee productivity. His advice to leaders struggling with the trend: "Don't shy away from the risk issues."
Complexity is among the most significant information risk challenges IT security practitioners face. Mobile and cloud computing, new technologies, outsourcing and growing threats from malware and people make managing risk more complex.
The threat landscape has evolved, and India's banking institutions must grow their information security strategies, says Anand Naik of Symantec, which just released a report that offers a new security agenda to institutions.