The Case for Model-Driven Security

Aetna CSO Jim Routh on Why We Need a Whole New Approach to Cybersecurity Security thought leaders have long called for organizations to shift from a conventional “peacetime” view of cybersecurity to more of a “wartime” mindset. Aetna CSO Jim Routh now says it’s time for enterprises to shift from conventional to unconventional security controls. […]

The Challenge of Fighting Identity Fraud

IBM’s Shaked Vax on Emerging Technologies to Assure Digital IDs Armed with stolen personal data, cybercriminals can easily bypass conventional identity authentication methods. So, how can organizations strengthen authentication without harming customer experience? Shaked Vax of IBM Security shares insights. In a video interview at Information Security Media Group’s recent New York City Fraud Summit, Vax discusses: The […]

Vendor Risk Management: Conquering the Challenges

Mark Eggleston of Health Partners Plans Discusses Best Practices for Ensuring Security Organizations must carefully monitor that their business associates are adequately addressing data security to help guard against breaches, says Mark Eggleston, CISO at Health Partners Plans. “For example … we ask for business continuity plans, but it’s also really more important to get the results […]

Future-Proof Against Fraud

Keith Carlson of Amazon Web Services on Making Smarter Investments in Skills, Technologies How can we future-proof against fraud? Keith Carlson, general manager of payments and fraud prevention at Amazon Web Services, discusses the people, skills and technologies necessary to prevent fraud – and prepare for the unexpected. In a video interview at Information Security Media […]

Former Federal CISO on Cyber State of the Union

Gregory Touhill Reflects on Challenges for New Administration Brigadier General (retired) Gregory Touhill was the first federal CISO of the United States. Fresh from that role, he opens up on the state of federal cybersecurity and what the new administration should do to enhance protections. In a video interview at the RSA Conference, Touhill discusses: […]

Ashley Madison: The Breach Recovery

Ruby CISO Matthew Maglieri on How to Bounce Back From a High-Profile Breach View More Speaker Interviews >>   The Ashley Madison breach of 2015 quickly became one the most famous of high-profile hacks. Three years later, CISO Matthew Maglieri discusses the breach recovery and what he refers to as “cybersecurity in a world of discretion.”In an […]

‘Original Internet Godfather’ Opens Up on Crimes

Brett Johnson on Why He Turned From Committing Fraud to Fighting It View More Chicago Speaker Interviews >>   Brett Johnson stole millions in a fraud career that made him one of the FBI’s most wanted criminals. But now he’s sharing his secrets to help organizations fight fraud. Why the change of heart? In an interview at […]

Ratings’ Role in Vendor Risk Management

SecurityScorecard’s Sam Kassoumeh on How to Improve Vendor Assessments and Results From GDPR to the NIST Cybersecurity Framework, vendor risk management is a key component of every new piece of cybersecurity guidance. Yet, security leaders still struggle to inventory and assess their strategic partners. Sam Kassoumeh of SecurityScorecard explores the challenges. In an interview at […]

Security Readiness: How Do You Stack Up?

Intel’s David Houlding on the Value of Benchmarking Tool and Data Looking for a way to benchmark your cybersecurity organization against those of your peers? Intel Health and Life Sciences and its partners offer a Healthcare Security Readiness program that provides a benchmarking opportunity, David Houlding explains. In an interview at Information Security Media Group’s […]

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research Randy Trzeciak of Carnegie Mellon University’s CERT describes the latest edition of the group’s common sense guide to mitigating insider threats and offers an update on his latest research. In a video interview at RSA Conference 2017, Trzeciak: Highlights changes in the new common sense guide; Discusses […]