Securitycurrent public
[search 0]

Download the App!

show episodes
 
Are you a cyber security pro and want to hear what your peers are doing to safeguard their organizations? Or are you someone who wants to learn how the nation’s top cyber security pros are protecting your data against hackers or just human error? In these real-world conversations, the nation’s leading Chief Information Security Officers (CISOs) and their security, risk and privacy colleagues, in addition to top thought leaders, share what is top of mind for them. They discuss how their organ ...
 
Loading …
show series
 
Richard Stiennon, leading author and analyst, speaks with Mark Rasch, well-known attorney, on the charges against Joe Sullivan, former Uber CSO. With more than 30 years of experience in cybersecurity and data privacy – including within the U.S. Department of Justice, where he created the DOJ Computer Crime Unit and Cyber-Forensics practice, Mark di…
 
Tomás Maldonado, CISO of the National Football League (NFL), speaks with Ian Keller, CSO of SBV Bank, which operates across Africa and is the only company in South Africa to partner with the South African Reserve Bank to collect banknotes and coins. The two leading security executives talk about their everyday experiences and the commonalities in t…
 
Special thanks for making this video on TPRM to CISOs Mike Davis, Bob Turner, Marcos Marrero, Joey Johnson, David Levine, Al Ghous and Marc Crudgington, MBA, and to our corporate sponsor NormShield CyberSecurity for their continued support of the CISO community. #TPRM #ThirdPartyRiskManagement #CISO #ResearchReport #RiskManagement #thirdpartyrisk #…
 
Dan Bowden, VP and CISO Sentara Healthcare, speaks with *David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York, about the not-for-profit health system’s journey post COVID-19. The two leaders talk about how each industry - and within healthcare itself - have encountered different issues when ramping up. They discuss security, cl…
 
Having conducted a major influenza pandemic exercise in Q4 of last year assuming all employees were sent home, Ellie Mae SVP & CISO Selim Aissi was able to quickly and effectively respond to COVID-19. In this podcast, Selim speaks with *David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York. Selim talks about technology and the i…
 
Host and moderator Joey Johnson, CISO of Premise Health, will be joined by leading healthcare CISOs Hussein Syed of RWJBarnabas Health and Anahi Santiago of ChristianaCare as they discuss the unique challenges they face as they support frontline and remote medical workers as well as the myriad of other personnel and people. As you’ll hear from Joey…
 
Jake Margolis, CISO Metropolitan Water District of Southern California – the largest distributor of treated drinking water in the United States, has leveraged tried and true foundational technologies in response to COVID-19 while moving forward with their tech procurement plans. In this conversation with *David Cass, VP of Cyber & IT Risk at the Fe…
 
Fannie Mae CISO Christopher Porter speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York. The two industry leaders discuss today’s challenging times and the importance of people. They talk about staying connected with and taking care of staff. Chris provides additional insights into his new normal and where he sees t…
 
Global CSO of TikTok Roland Cloutier speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions David expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System). A seasoned executive, Roland provides guidance on being successful when starting a new…
 
Dr. Pablo Molina, AVP and CISO at Drexel University speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (any opinions David expresses are his own and do not represent the Federal Reserve Bank of New York or the Federal Reserve System). Dr. Molina discusses how the university transitioned faculty, staff and students…
 
Host and moderator David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York* talks about what to expect when his CISO peers Frank Aiello of Maximus, David Levine of RICOH USA, Colin Anderson of Levi Strauss and Tessian CEO Tim Sadler join him to discuss the people and processes in place due to the pandemic and what to expect moving…
 
CISO Colin Anderson of Levi Strauss speaks with David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions he expresses are his own opinions and don't represent the Federal Reserve Bank of New York or the Federal Reserve System). Colin discusses how Levi Strauss is putting people first and using the current crisis to m…
 
What impact has the COVID-19 pandemic had on the security of organizations that have now by and large had to quickly migrate to a remote workforce? David Cass, VP of Cyber & IT Risk at the Federal Reserve Bank of New York (*any opinions he expresses are his own opinions and don’t represent the Federal Reserve Bank of NY or the Federal Reserve Syste…
 
The business of information security is tough: the bad guys only need to get it right once, while the good guys have to get it right all the time. One hundred percent protection of all endpoints is not possible, and eventually, there will be an infection. The question is, how do you react as quickly as you can to detect the most important infection…
 
Enterprise networks grow more complex by the day. With hundreds to thousands of firewall rules, devices and routers across on-premise and hybrid cloud environments, it is difficult to have visibility into the security policy change process. This complexity, combined with the increasing rate of change, leads to vulnerability in the network. In addit…
 
Mastercard is a technology company in the global payments industry which operates the world’s fastest payments processing network, connecting consumers, financial institutions, merchants, governments and businesses in more than 210 countries and territories. Mastercard’s products and solutions make everyday commerce activities – such as shopping, t…
 
The endpoint is becoming the new edge of the business. As the doorway to your data, with more and more breaches getting in via the endpoint, it is turning into one of the weakest links for today’s business. It is critical that businesses can detect new, and real threats at the endpoint, and respond to those threats in near real-time. However, with …
 
CISOs are increasingly looking to User Behavior Analytics (UBA) as a key security tool to help combat threats by identifying anomalous behavior. According to the report, CISOs Investigate: UBA, authored by more than a dozen CISOs, by quickly providing actionable intelligence, UBA enables them to potentially reduce loss to their organizations by ide…
 
Enterprises are increasingly adopting cloud strategies. Despite this, adoption has been impacted in some cases due to cybersecurity concerns. In this podcast, David Cass, the Global Partner, Cloud Security and FSS CISO at IBM reviews the state of cloud adoption and security with Mike Schuricht, Senior Director of Product Management at Bitglass, a c…
 
Premise Health is a leader in onsite health and wellness programs providing some 600 large employer sponsored employee clinics. With a highly distributed and regulated environment, Johnson is responsible for all cybersecurity and information technology, compliance, audit and vendor risk management. Johnson was just named the winner of the prestigio…
 
The volume of threats and attacks most security teams face daily can leave them overworked and fatigued, operating in what DocuSign CISO Vanessa Pegueros has identified as level one trauma – a sort of cyber PTSD that can put organizations at risk. In this podcast, Pegueros talks with David Cass, IBM Cloud & SaaS Global CISO, about her four-part ser…
 
The CISO increasingly has a seat in the boardroom, as the role is becoming more of the rule than the exception in enterprises. During RSA Conference 2017, Marci McCarthy, President & CEO of T.E.N., sat down with David Cass, Global CISO IBM Cloud & SaaS, to discuss the continuing evolution of the information security industry and specifically the ro…
 
The city of San Diego is a $4 billion business and it doesn’t shut down. As you’ll hear in this discussion between Gary Hayslip, the city’s CISO, and David Cass, Global CISO IBM Cloud and SaaS, San Diego is a smart city which is continuously rolling out new technologies to facilitate 'the business' while bolstering its security. In this podcast, re…
 
There has been an exponential adoption of Internet of Things (IoT) with experts predicting billions of IoT devices coming into use. And with the strategy more often than not being go to market and secure it later, enterprises are increasingly exposed to a variety of attacks. As you’ll hear in this podcast with David Cass, Global CISO IBM Cloud and …
 
With RSA around the corner and more security vendors than you can count, if you are a new CISO at the conference what should your game plan be? As you’ll hear in this podcast, the sheer number of interesting technologies at RSA can potentially overwhelm new CISOs. David Cass, Global CISO IBM Cloud and SaaS, and Dr. Anton Chuvakin, research VP at Ga…
 
Tokenization is helping render data theft obsolete. Jason Witty, US Bancorp EVP and CISO, is in the midst of completing a multi-year tokenization integration project, for which his team won the recent ISE North America Project of the Year Award in the Financial Services category. He discussed the many benefits of tokenization with David Cass, Globa…
 
What specific things should companies look at when it comes to security monitoring in 2017? As you’ll hear in this podcast, a lot of the security problems facing organizations from the late 1990s and early 2000s have yet to be solved. David Cass, Global CISO IBM Cloud and SaaS, and Dr. Anton Chuvakin, research VP at Gartner’s Technical Professional…
 
As you’ll hear in part two of the conversation between David Cass, Global CISO IBM Cloud and SaaS, and Chris Roberts, Acalvio Chief Security Architect, threat detection technology is allowing enterprises to identify intruders quickly. In this sponsored podcast you’ll hear how this burgeoning field of cybersecurity is helping enterprises protect the…
 
Ensuring continuous compliance while reducing complexity is essential to bolstering security for many organizations, in particular, those that process credit card data. In this Tufin-sponsored podcast, IBM’s David Cass talks with Monext’s Laurent Klefstad, Leader for Systems, Network and Telecom, about automated security policy orchestration and ho…
 
It’s becoming an old adage: it isn’t a matter of if an attacker will infiltrate your network but when.” With that being the case and with research showing that attackers often reside on an enterprise’s network for many months doing reconnaissance and exfiltrating data before being identified, what are and can enterprises do? The use of autonomous t…
 
In this interview Matt Hollcraft, Maxim Integrated CISO, discusses common threat vectors – what is old and what is new – with Dan Schiappa, SVP & GM, Sophos Enduser Security Group. They talk about ransomware, the mobile workforce, Internet of things and hacking as a business. In this sponsored podcast, you’ll also hear about approaches that enterpr…
 
In this conversation with Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, CenturyLink CSO, talks about the evolution of the CISO role. A seasoned security executive, with experience reporting to boards-of-directors, Mahon also provides guidance on how to present to a board. He also gives recommendations to curre…
 
The use of user behavior analytics (UBA) is at the forefront of technologies that CISOs are seeking for their security toolkits to help them identify that needle-in-a-haystack. In this podcast sponsored by Exabeam, IBM’s David Cass talks with ADP’s V.Jay LaRosa about how UBA provides always on threat hunting to detect and thwart cyber attacks. LaRo…
 
In this conversation, CISO David Cass and CTO Reuven Harrison, discuss the journey to the cloud. They talk about increasing enterprise cloud adoption and hybrid environments. They also discuss the associated demand for automation of network security policy implementation across these hybrid cloud infrastructures. In this sponsored podcast, you’ll h…
 
In this conversation, MIAX Options CSO John Masserini discusses the threat detection and response space with AlienVault President and CEO Barmak Meftah. An early adopter of threat intelligence, Masserini notes its challenges and asks Meftah what AlienVault is seeing in the market and how threat intelligence is being integrated into companies’ secur…
 
In the series brought to you by Security Current and Intersections IT Security ONE2ONE Summit and you will hear CISOs discuss today’s most critical issues in IT Security. This episode features David Cass, IBM Cloud & SaaS Global CISO, and David Rooker, Actian Corporation CISO, who discuss the most prevalent attack vectors today, from email to ranso…
 
In part three of the conversation David Cass, IBM cloud & SaaS global CISO and John Weinschenk, Spirent Communications general manager enterprise and network application discuss the potential hacking of medical devices and automated cars. In this Spirent-sponsored podcast, Weinschenk explains how they worked with a surgeon to hack a medical device.…
 
In this conversation with Security Current podcast host David Cass, Global CISO IBM Cloud & SaaS, David Mahon, CenturyLink Chief Security Officer, discusses what he sees as two of today’s critical security issues and how to tackle them. Mahon points to phishing and ransomware as the most prevalent types of attacks he is seeing in the industry. The …
 
In the series brought to you by Security Current and Intersections IT Security ONE2ONE Summit you will hear CISOs discuss today’s most critical issues in IT Security. This episode features David Cass, IBM Cloud & SaaS Global CISO, and William Okula, Executive Officer Police Technology Bureau at the Suffolk County Police Department who, discuss the …
 
This episode features David Cass, IBM Cloud & SaaS CISO, and Richard Seiersen, GE Healthcare’s General Manager Cybersecurity and Privacy who discuss the different types of attack vectors in healthcare, which as you’ll hear is “As Security as it Gets.” In this podcast you’ll hear about implantable medical devices or wearables, and the Industrial Int…
 
In the series brought to you by Intersections IT Security ONE2ONE Summit and Security Current you will hear CISOs discuss today’s most critical issues in IT Security. This episode features David Cass, IBM Cloud & SaaS CISO, and Jonathon Neel, University of Virginia School of Medicine CISO, who discuss threat sharing with other CISOs, compliance, we…
 
In part two of the conversation David Cass, IBM cloud & SaaS global CISO and John Weinschenk, Spirent Communications general manager enterprise and network application security, discuss managing risk. In this Spirent sponsored podcast they talk about the need for continuous monitoring and testing to optimize spend to reduce risk. They also touch on…
 
CISOs can never reduce risk to zero. As technology development increases at a lightning speed with the Internet of Things (IoT) bringing more Internet-enabled devices daily and the cloud becoming more pervasive, what can and should be done? CISO David Cass, IBM Cloud and SaaS, speaks with John Weinschenk, , general manager enterprise and network ap…
 
Welcome to the Intersections IT Security One2One Summit podcast series presented in conjunction with Security Current. In the series you will hear CISOs discuss today’s most critical issues in IT Security. This episode features David Cass, IBM Cloud & SaaS CISO, and James Beeson, GE Capital Americas' CISO, who discuss how the nature of attacks has …
 
Welcome to the Intersections IT Security ONE2ONE Summit podcast series presented in conjunction with Security Current. In the series you will hear CISOs discuss today’s most critical issues in IT Security. The first episode features David Cass, IBM Cloud & SaaS CISO, and David Hahn, Hearst Corporation CISO, who discuss today’s biggest security and …
 
In today’s digital age, there are more connected devices than ever before. A look at the history of the digital universe shows that, like the real universe, it is expanding. From a single device meeting our needs—starting with the PC, then moving to laptops and phones—we seem poised on the brink of a technological “big bang” resulting in an ever-mo…
 
Cloud security continues to be a key consideration for CISOs with them weighing in on the pros and cons of whether or not to migrate to the cloud and, if so, best practices for migrating. A recent report issued by the Cloud Security Alliance (CSA), a member-driven organization chartered with promoting the use of best practices, touches on the key c…
 
Skyport Systems mission is to deliver a simple and effective secure-computing platform for enterprise applications. As we hear from Skyport Systems Corporate Vice President Doug Gourlay, Skyport Systems SkySecure is a turnkey platform to run and manage application workloads that are the highest priority for the business to protect. It fully integra…
 
Tempered Networks enables enterprises to ‘cloak’ their networks, communications and endpoints so they are undetectable and tamper-proof, protected from cyber threats and human misuse/errors. As we hear from Tempered Networks VP Security Architecture and Services Marc Kaplan, the company addresses a TCP/IP vulnerability by replacing IP addresses wit…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login