David Cass, CISO IBM Cloud & SaaS, and Richard Seiersen, General Manager Cybersecurity and Privacy GE Healthcare, Discuss Security, Trust and Privacy in Healthcare

In the series brought to you by Security Current and Intersections IT Security ONE2ONE Summit and you will hear CISOs discuss today’s most critical issues in IT Security.

This episode features David Cass, IBM Cloud & SaaS CISO, and Richard Seierson, GE Healthcare’s General Manager Cybersecurity and Privacy who discuss the different types of attack vectors in healthcare, which as you’ll hear is “As Security as it Gets.”

In this podcast you’ll hear about implantable medical devices or wearables, and the Industrial Internet of Healthcare Things. They also touch on the Seierson’s upcoming book “How to Measure Anything in Cybersecurity Risk,” which explores decision science and in particular quantitative approaches to decision making.

 

David Cass, CISO IBM Cloud & SaaS, and Jonathon Neel, CISO University of Virginia School of Medicine, Discuss the Changing Threat Landscape in Healthcare

In the series brought to you by Intersections IT Security ONE2ONE Summit and Security Current you will hear CISOs discuss today’s most critical issues in IT Security.

This episode features David Cass, IBM Cloud & SaaS CISO, and Jonathon Neel, University of Virginia School of Medicine CISO who discuss threat sharing with other CISOs, compliance, wearables and how to keep up with technology.

In this podcast you’ll also hear about FISMA and how it may impact the way universities operate in the future. David and Jonathon also touch on the Internet of Things (IoT) and how that impacts application development in the healthcare setting.

 

In part two of the conversation David Cass, IBM cloud & SaaS global CISO and John Weinschenk, Spirent Communications general manager enterprise and network application security, discuss managing risk.

In this Spirent sponsored podcast they talk about the need for continuous monitoring and testing to optimize spend to reduce risk. They also touch on the ability to respond quickly to a breach by ensuring strong remediation plans are in place, and discuss the need to diversify technology solutions.

 

CISOs can never reduce risk to zero.  As technology development increases at a lightning speed with the Internet of Things (IoT) bringing more Internet-enabled devices daily and the cloud becoming more pervasive, what can and should be done?

CISO David Cass, IBM Cloud and SaaS, speaks with John Weinschenk, general manager enterprise and network application security at Spirent Communications, about some of the biggest threats facing enterprises as a result of these trends.

Listen to this sponsored podcast as David and John, discuss ransomware, including hacker help desks, and the Internet of Things, including the potential for your refrigerator to attack you. They talk about some of the top things enterprises need to do from patching systems to testing to awareness in order to bolster their defenses.

 

David Cass, CISO IBM Cloud & SaaS CISO, and James Beeson, CISO GE Capital Americas, Discuss the Changing and Increasingly Destructive Nature of Cyberattacks

In the series brought to you by Intersections IT Security ONE2ONE Summit and Security Current you will hear CISOs discuss today’s most critical issues in IT Security.

This episode features David Cass, IBM Cloud & SaaS CISO, and James Beeson, GE Capital America’s CISO, who discuss how the nature of attacks has fundamentally changed and are becoming more destructive, for example with ransomware, which impacts corporations and individuals.

In this podcast you’ll also hear about organized crime and the traditional bad actors and how it is much easier to recruit because of the economics of it. David and James discuss how cybercrime has become so ‘mainstream’ that support is even offered on malware that easily purchased online. They also talk about what they think needs to be done to help combat today’s increasing attacks.

 

David Cass, IBM Cloud & SaaS CISO, and David Hahn, Hearst Corporation CISO, Discuss the Biggest Security Challenges Facing Media Corporations

In the series you will hear CISOs discuss today’s most critical issues in IT Security.

The first episode features David Cass, IBM Cloud & SaaS CISO, and David Hahn, Hearst Corporation CISO, who discuss today’s biggest security and associated business problems facing media corporations and how they are  leading to billions of dollars in lost revenue.

In this podcast you’ll hear about malvertising, how it works, the absence of regulations and government intervention, and the Sony breach and its implications.

 

In today’s digital age, there are more connected devices than ever before. A look at the history of the digital universe shows that, like the real universe, it is expanding. From a single device meeting our needs—starting with the PC, then moving to laptops and phones--we seem poised on the brink of a technological “big bang” resulting in an ever-more-diffuse array of gadgets, monitors, appliances, and communications all working in tandem to enhance our personal and professional lives. And with the convergence of technologies more data is being generated than ever.

The question arises as to how then will we secure our networks and data?

As you’ll hear in this interview with David Cass, IBM Cloud & SaaS CISO, who speaks with Dr. J.R. Reagan, Deloitte Touche Tohmatsu Limited CISO, the way enterprises approach security likely may require new ways of thinking. They discuss how security has transformed from managing things to managing data in order to protect the enterprise. Dr. Reagan provides 3 key takeaways for security executives in today’s digital age.

Read Dr. JR Reagan's article on Cybersecurity Convergence

Cloud security continues to be a key consideration for CISOs with them weighing in on the pros and cons of whether or not to migrate to the cloud and if so, best practices for migrating.

A recent report issued by the Cloud Security Alliance (CSA), a member-driven organization chartered with promoting the use of best practices, touches on the key concerns facing adoption today. In this podcast recorded at the RSA 2016 Conference with Security Current's Vic Wheatman, CSA Chief Technology Officer Daniele Catteddu discusses the current and future state of the cloud.

 

Morgan Wright is an internationally recognized cybersecurity, cyberterrorism and identity theft expert.

He's testified in front of congress, advised the U.S. State Department and served in law enforcement.  In this conversation with Security Current's Vic Wheatman, Morgan speaks about ISIS-inspired cyber terrorism, ransomware, and social engineering as a tool for enabling spear phishing to steal credentials and corrupt business systems.

Training, policy and philosophy are critical, even before security technologies are implemented.  As you'll hear from Wright: "Think before you click the link."

 

With vast amounts of personal information and Internet-enabled medical equipment, health care faces unique security requirements. Some are a result of regulatory mandates such as HIPAA while others are because of the critical clinical equipment found in hospitals and doctors offices.

Gaining visibility into the variety of platforms present while positioning for future needs becomes a challenge.  Technologies such as Network Access Control (NAC) can provide a needed overview into the security environment.  In this podcast with Security Current’s Vic Wheatman, Barnabas Health’s CISO Hussein Syed and Dominic Hart, the health care system’s manager of information security architecture discuss their approach to this complex environment.

 

1 5 6 7 8 9 16