Government Information Security Podcast cover art

All Episodes

Government Information Security Podcast — 206 episodes

#
Title
1

Why Hospitals Must Rethink Cyber Resilience

2

Securing the Nation: FedRAMP-Authorized Identity Security

3

Zero Trust, Auditability and Identity Governance

4

Could HIPAA Changes Weaken Patient Privacy?

5

Secure Patient Access to Health Records: The Challenges

6

Medical Device Cybersecurity: EU vs. U.S. Approaches

7

Making the Case for National Unique Patient ID

8

Measure Security and Its Impact on the Mission

9

Will HIPAA Audits Result in Settlements?

10

Threat Intel Sharing Project: A CISO Leads the Way

11

CHIME's Charles Christian on 2016 Cyber Threat Outlook

12

Tapping Analytics In CyberSec, Fraud

13

Could Big HIPAA Settlements Be Coming?

14

Taking Security Training to the Next Level

15

A Boost for Indo-U.S. Cyber Cooperation

16

Agencies Seen Improving in Gauging Risk

17

Debunking Medical Device Cyber Myths

18

Adapting FedRAMP to Secure Sensitive Info

19

Modernizing the VA's EHR System

20

Florida Fights Fraud with Authentication

21

A CISO's Strategy for Winning Funding

22

How a Flaw in VA Software Was Found

23

Accessing Big Data for Health Research

24

Consumer Advocate: Shut Obamacare Site

25

State Insurance Exchange: Why It Works

26

The Role of EHRs in Healthcare Fraud

27

Using NIST Guidance for HIPAA Compliance

28

HIPAA Audits: A Status Report

29

HHS Official Explains HIPAA Omnibus

30

Storm Offers Disaster Planning Lessons

31

Mobile Policy: One Size Doesn't Fit All

32

Continuous Monitoring: Overcome the Challenges

33

ONC Plans Mobile Security Guidance

34

Getting California ISOs Up to Snuff

35

Prospects Iffy for Cybersecurity Bills

36

Fewer Than 150 HIPAA Audits Expected

37

Fraud Fight: How to Pick Your Battles

38

Firestorm of Privacy Activity

39

GovInfoSecurity.com <br>Week In Review <br>for Friday, Dec. 17, 2010

40

Infosec's Role in Feds' 25-Pt. IT Plan

41

GovInfoSecurity.com <br>Week In Review for <br>Friday, Dec. 10, 2010

42

Warrior Battles Military's PII Misuse

43

Electronic Driver's License: The New Secure ID Solution

44

GovInfoSecurity.com Week In Review for Dec. 3, 2010

45

Exempting Infosec from Civil Service

46

GovInfoSecurity.com Month In Review for November 2010

47

Facing Tradeoffs to Secure IT Systems

48

GovInfoSecurity.com <br>Week In Review <br>for Friday, Nov. 19, 2010

49

GovInfoSecurity.com <br>Week In Review <br>for Friday, Nov. 12, 2010

50

Physical Vs. Virtual Security: No Contest

51

GovInfoSecurity.com Week In Review for Friday, Nov. 5, 2010

52

Ex-Cyber Chair in House Extols New One

53

Tech Skills Not Enough for Advance

54

Never Say Never: Apps On, Off the Cloud

55

Editor's Choice: GovInfoSecurity.com October's Best

56

GovInfoSecurity.com Week In Review for Friday, Oct. 29, 2010

57

CISO's Plan to Transform Government

58

GovInfoSecurity.com Week In Review for Oct. 22, 2010

59

CAG Vs. IG: Conflict Over Infosec

60

Cyber Education Initiative: Creating Metrics

61

Steady Approach to Critical Controls

62

NICE: Fed's Cyber Education Initiative

63

Editor's Notebook: Jim Lewis

64

GovInfoSecurity.com Week In Review for Oct. 15, 2010

65

IT Security's Future Rests with Young

66

Lack of Spending Alarms State CISO

67

Infosec Evolution Mimics Immune System

68

GovInfoSecurity.com Week In Review for Oct. 8, 2010

69

It'll Take Time to Achieve Obama's Goals

70

GovInfoSecurity.com's Month In Review for September 2010

71

GovInfoSecurity.com Week In Review for Sept. 24, 2010

72

Redefining Role of Cybersec Adviser

73

GovInfoSecurity.com Week In Review for Friday, Sept. 17, 2010

74

GovInfoSecurity.com Week In Review for Sept, Sept. 10, 2010

75

Editor's Choice for August: Senate Tackles Cybersecurity Bill, DoD Infosec Strategy, U.S.-CERT, State CISOs

76

GovInfoSecurity.com Week In Review for Friday, Sept. 3, 2010

77

Risk Management and Social Media

78

Reasoning Behind Enhancing DHS Infosec Prowess

79

Senator Gives White House 'Incomplete'<br> on Cybersecurity Performance

80

GovInfoSecurity.com Week In Review for Friday, Aug. 27, 2010

81

Intrusion Detection: Analyzing Data Proves Valuable

82

DoD Unveils New Cyber Defense Strategy

83

The Cloud: A More Secure Environment?

84

Michigan Eyes Hosting Own Cloud Data Center

85

NASA's JPL Reaches for the Cloud

86

GovInfoSecurity.com Week In Review for Friday, Aug. 20, 2010

87

GovInfoSecurity.com Week In Review for Aug. 13, 2010

88

Altruistic CISOs Employ Their Smarts to Succeed

89

Defending IT: Swimming Against the Tide

90

GovInfoSecurity.com Week in Review for Aug. 6, 2010

91

GovInfoSecurity.com's Best of July

92

GovInfoSecurity.com Week in Review for Saturday, July 31, 2010

93

Physical, Virtual Security Commonalities

94

GovInfoSecurity.com Week in Review for Saturday, July 24, 2010

95

Conflict of Interest: Certifiers Who Train?

96

Infosec Skills Gap Threatens Key IT Systems

97

Departing Words from the Navy CIO

98

Is Cybersecurity Getting the Attention It Needs?

99

GovInfoSecurity.com Week in Review for Saturday, July 17, 2010

100

Authentication's Chicken 'n' Egg Dilemma

101

GovInfoSecurity.com Week in Review for Saturday, July 10, 2010

102

DHS Addresses New FISMA Responsibilities

103

Cyber Warfare Prevention - Securing Your Software and Applications

104

GovInfoSecurity.com June Editor's Choice for Monday, July 5, 2010

105

GovInfoSecurity.com Week in Review for Saturday, July 3, 2010

106

Why CISOs Need to be at CEO's Side

107

GovInfoSecurity.com Week in Review for Saturday, June 26, 2010

108

Karen Evans, U.S. Cyber Challenge director and ex-federal e-government chief.

109

GovInfoSecurity.com Week In Review for Saturday, June 19, 2010

110

GovInfoSecurity.com Week in Review for Saturday, June 12, 2010

111

Understanding the New Senate Cybersecurity Bill

112

Story Behind NASA's Move to Continuous Monitoring

113

GovInfoSecurity.com Week in Review for Saturday, June 5, 2010

114

Showcasing Infosec Talent to Recruit Infosec Talent

115

Crafting a Social Media Security Policy

116

GovInfoSecurity.com Week in Review for Saturday, May 29, 2010

117

GovInfoSecurity.com Month in Review, Monday, May 31, 2010

118

GovInfoSecurity.com Week in Review for Saturday, May 22, 2010

119

Securing Open Source App Development

120

GovInfoSecurity.com Week in Review for Saturday, May 15, 2010

121

Curing the Cloud Computing Jitters

122

GovInfoSecurity.Com Week in Review: Saturday, May 8, 2010

123

Giving Sweeping Budgeting Power to White House Cyberspace Director

124

Surviving Cyber War

125

GovInfoSecurity.Com Week in Review: May 1, 2010

126

Beyond Firewalls, Speeding Cloud Adoption, Story Behind CISO's Firing

127

Microsoft Echoes Public-Private Partnership Mantra

128

Cybersecurity Summit: Building Trust, Globally

129

Meeting of the Minds Over Fed Cybersecurity

130

GovInfoSecurity.Com Week in Review: April 24, 2010

131

Speeding Cloud Adoption Through New FedRAMP Initiative

132

When Gregory Wilshusen Talks, People Listen

133

Hathaway Speaks Out on CNCI Declassification

134

Bridging Silicon Valley and the Beltway

135

Infosec Guru Ron Ross on NIST's Revolutionary Guidance

136

Beyond Compliance: Forrester's 5 Key Principles

137

Putting Threats of Cloud Computing in Perspective

138

Getting Ready for Cyberwar

139

Howard Schmidt, White House Cybersecurity Coordinator

140

Google Attack: Prelude to More Intrusions

141

Taming the Wild-West Internet

142

Grading Obama's First-Year Cybersecurity Performance

143

Einstein and Citizens' Privacy: Philip Reitinger, Deputy Undersecretary, Homeland Security National Protection and Programs Directorate

144

Don't Overload DHS with Cybersecurity Tasks

145

Rep. David Wu Takes On His Allies: Conversation with the Chair of the House Technology & Innovation Subcommittee

146

Myra Powell, Mission Assurance and Network Operations Program, DISA

147

Human Capital No. 1 Infosec Goal: Philip Reitinger, Deputy Undersecretary, Homeland Security National Protection and Programs Directorate

148

Having His Subordinate's Back: NIST Director Patrick Gallagher

149

Blurring the Bull's Eye on Federal IT: Dickie George, Technical Director of Information Assurance, National Security Agency

150

Equipping the Federal Workforce for the Cyber Age: Ruby DeMesme, Senior Adviser, Deloitte

151

Thinking Like a Hacker: Dickie George, Technical Director of Information Assurance, National Security Agency

152

Ron Ross, NIST's Infosec Guru, on the Institute's Latest Transformational Guidance

153

User-Centric Identity Comes to Washington: Heather West of the Center for Democracy and Technology

154

Why Strategic Cyber Warfare Shouldn't Be a Military Priority

155

Authentication: The Biometrics Advantage

156

NIST and IT Security: Much More Than Guidance

157

Biometrics: From Kabul to Washington

158

Training Next Gen Army Brass on IT Security

159

Lockheed Martin's Point Man on Fed Cybersecurity

160

Secure Access to Sensitive Data: Insights from John Bordwine, Public Sector CTO, Symantec

161

City Defends IT System from Social Network Threats

162

Cooperate, Not Regulate, on Cybersecurity

163

FISMA: The Misunderstood Law

164

Safeguarding a Massive, Decentralized IT System - Interview with California CISO Mark Weatherford

165

Feds Seen Regulating IT Industry

166

Creating InfoSec Occupational Categories - Interview with California CISO Mark Weatherford

167

Valuing FISMA: Interview with Immigration and Customs Enforcement CISO Gil Vega

168

In Rhode Island, Size Can be Deceptive - Interview with Rhode Island CIO Jack Landers and CISO Ernie Quaglieri

169

The CISOs CISO: Part 2

170

The CISOs CISO

171

Collaboration: Keeping IT in Kansas Safe - Interview with Kansas CISO Larry Kettlewell

172

State Lures Higher-Paid IT Security Pros - Interview with Minnesota CISO Chris Buse

173

IT Security: Scarce Money, No Excuses

174

In Praise of FISMA

175

Can Cyber Terrorism Exist? - Interview with Jim Harper of The Cato Institute

176

Marrying Physical, Virtual Security - Interview with Honolulu CIO Gordon Bruce

177

Getting the Basics Rights - Interview with Jerry Davis, NASA deputy chief information officer for IT security.

178

Match Game: Security Controls and Reported Incidents - Interview with John Streufert, State Department Deputy CIO and CISO, Part 2

179

Beyond FISMA: State Dept.'s Next Gen Metric - Interview with John Streufert, State Department Deputy CIO and CISO

180

4 Key Areas of Cybersecurity R&D

181

Yearly Security Awareness Training Isn't Enough - Interview with Hord Tipton of (ISC)2

182

IT Security Pros Collaborate on Privacy Act Rewrite - Interview with Ari Schwartz of the Center for Democracy and Technology

183

In Silence, Cybersecurity Action - Interview with Jim Flyzk, former Treasury CIO

184

Michigan's Pass-Fail IT Security Challenge - Interview with Michigan CTO Dan Lohrmann

185

Finding Cybersecurity Talent - Interview with Tom Stanton of Johns Hopkins University

186

Obama's Cyber Plan Needs More Oomph - Interview with Eugene Spafford of Purdue University

187

Call for Privacy Act to Catch Up with IT - Interview with Dan Chenok

188

Creating Your Own Guidance - Interview with Charlotte CISO Randy Moulton

189

Key Lawmaker: High Rank for Cyber Czar - Interview with Rep. James Langevin

190

A Red Team Primer

191

From Audit Guidelines to Red Team Attacks - Interview with Former Air Force CIO John Gilligan, Part 2

192

Embezzlement: Find the Liars, Cheaters and Thieves

193

Securing Off-The-Shelf IT

194

Creating an IT Security Culture - Interview with Vermont CISO Kris Rowley

195

DISA's Cloud Computing Initiatives

196

Safeguarding New Tech: Navy CIO Robert Carey

197

Federal IT Security Alignment: Navy CIO Robert Carey

198

What's Happening at NIST: Curtis Barker

199

Information Resources Management College: Director Robert Childs

200

Defining Information Security Metrics: Ron Ross of NIST

201

FISMA Author on Reform: Former Rep. Tom Davis

202

Advising Obama on Cybersecurity Part 2: Ret. Air Force Lt. Gen. Harry Raduege

203

Advising Obama on Cybersecurity Part 1: Ret. Air Force Lt. Gen. Harry Raduege

204

Probing Federal IT Security Programs: Gregory Wilshusen, GAO

205

Security & Accountability: Paul Kurtz, Cyber Security Advisor

206

FISMA Reforms Outlined: Senator Tom Carper