Fighting Against Malicious Bot Attacks

Malicious bot attacks now account for nearly one-third of all internet traffic, says Franklyn Jones of Cequence, who describes why conventional tools for fighting against these attacks are ineffective. In a video interview at Information Security Media Group’s recent Fraud Summit in New York, Jones discusses: Why malicious bot attacks are growing; Why conventional tools can’t deal […]

New Account Fraud’s ‘Perfect Storm’

Aite’s Julie Conroy calls it a “perfect storm.” In the post-EMV U.S., and in the wake of massive data breaches and the move to mobility, financial institutions are besieged by a new flood of new account fraud. How can data analytics help them improve fraud prevention? In an interview recorded at the Chicago Fraud and Breach Prevention Summit, […]

Why Security Pros Need a Framework for Change

Dora Gomez of the Association of Certified Fraud Examiners, New York Chapter, discusses why security professionals should set up a framework to deal with changing regulations and threats. In a video interview at Information Security Media Group’s recent New York Security Summit, Gomez discusses: Designing a framework to deal with regulation and changing threats; Preparing for […]

FBI’s Palmore on Leadership and Diversity

At a time when diversity is a key topic within the cybersecurity leadership and workforce, MK Palmore, formerly of the FBI, says we also need a diversification of skills to help improve breach defense and response. In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Palmore discusses: The cybersecurity leadership […]

The Case for Model-Driven Security

Aetna CSO Jim Routh on Why We Need a Whole New Approach to Cybersecurity Security thought leaders have long called for organizations to shift from a conventional “peacetime” view of cybersecurity to more of a “wartime” mindset. Aetna CSO Jim Routh now says it’s time for enterprises to shift from conventional to unconventional security controls. […]

Vendor Risk Management: Conquering the Challenges

Mark Eggleston of Health Partners Plans Discusses Best Practices for Ensuring Security Organizations must carefully monitor that their business associates are adequately addressing data security to help guard against breaches, says Mark Eggleston, CISO at Health Partners Plans. “For example … we ask for business continuity plans, but it’s also really more important to get the results […]

CyberEdTalks Preview

Highlights from our Cyber Security Summit Brasil brought to you by CyberEdTalks CyberEdTalks, is a division of the global events arm of Information Security Media Groups (ISMG). The CyberEdTalks brand hosts summits around the world in markets that have been determined to be underserved, providing much needed content and education to information security professionals. Content […]

Is Regulating Cryptocurrency Necessary and Feasible?

Former Cybercriminal Brett Johnson Discusses Cracking Down on Misuse of the Currencies Government regulation is key to minimizing the misuse of cryptocurrencies for cybercrime, says Brett Johnson, a longtime cybercriminal who now consults on ways to prevent crime. But regulating cryptocurrencies is no easy task, he acknowledges in an interview with Information Security Media Group. “The […]

Preparing for Mid-Term Elections

  FBI’s Elvis Chan on Efforts to Bolster Cybersecurity of Social Media Stung by signs of Russian influencing of the 2016 presidential election, the FBI is working with social media companies to bolster cybersecurity in advance of the 2018 mid-term election. Elvis Chan of the FBI describes these efforts. In a video interview at RSA Conference […]

Future-Proof Against Fraud

Keith Carlson of Amazon Web Services on Making Smarter Investments in Skills, Technologies How can we future-proof against fraud? Keith Carlson, general manager of payments and fraud prevention at Amazon Web Services, discusses the people, skills and technologies necessary to prevent fraud – and prepare for the unexpected. In a video interview at Information Security Media […]