All Episodes
Government Information Security Podcast — 206 episodes
Why Hospitals Must Rethink Cyber Resilience
Securing the Nation: FedRAMP-Authorized Identity Security
Zero Trust, Auditability and Identity Governance
Could HIPAA Changes Weaken Patient Privacy?
Secure Patient Access to Health Records: The Challenges
Medical Device Cybersecurity: EU vs. U.S. Approaches
Making the Case for National Unique Patient ID
Measure Security and Its Impact on the Mission
Will HIPAA Audits Result in Settlements?
Threat Intel Sharing Project: A CISO Leads the Way
CHIME's Charles Christian on 2016 Cyber Threat Outlook
Tapping Analytics In CyberSec, Fraud
Could Big HIPAA Settlements Be Coming?
Taking Security Training to the Next Level
A Boost for Indo-U.S. Cyber Cooperation
Agencies Seen Improving in Gauging Risk
Debunking Medical Device Cyber Myths
Adapting FedRAMP to Secure Sensitive Info
Modernizing the VA's EHR System
Florida Fights Fraud with Authentication
A CISO's Strategy for Winning Funding
How a Flaw in VA Software Was Found
Accessing Big Data for Health Research
Consumer Advocate: Shut Obamacare Site
State Insurance Exchange: Why It Works
The Role of EHRs in Healthcare Fraud
Using NIST Guidance for HIPAA Compliance
HIPAA Audits: A Status Report
HHS Official Explains HIPAA Omnibus
Storm Offers Disaster Planning Lessons
Mobile Policy: One Size Doesn't Fit All
Continuous Monitoring: Overcome the Challenges
ONC Plans Mobile Security Guidance
Getting California ISOs Up to Snuff
Prospects Iffy for Cybersecurity Bills
Fewer Than 150 HIPAA Audits Expected
Fraud Fight: How to Pick Your Battles
Firestorm of Privacy Activity
GovInfoSecurity.com <br>Week In Review <br>for Friday, Dec. 17, 2010
Infosec's Role in Feds' 25-Pt. IT Plan
GovInfoSecurity.com <br>Week In Review for <br>Friday, Dec. 10, 2010
Warrior Battles Military's PII Misuse
Electronic Driver's License: The New Secure ID Solution
GovInfoSecurity.com Week In Review for Dec. 3, 2010
Exempting Infosec from Civil Service
GovInfoSecurity.com Month In Review for November 2010
Facing Tradeoffs to Secure IT Systems
GovInfoSecurity.com <br>Week In Review <br>for Friday, Nov. 19, 2010
GovInfoSecurity.com <br>Week In Review <br>for Friday, Nov. 12, 2010
Physical Vs. Virtual Security: No Contest
GovInfoSecurity.com Week In Review for Friday, Nov. 5, 2010
Ex-Cyber Chair in House Extols New One
Tech Skills Not Enough for Advance
Never Say Never: Apps On, Off the Cloud
Editor's Choice: GovInfoSecurity.com October's Best
GovInfoSecurity.com Week In Review for Friday, Oct. 29, 2010
CISO's Plan to Transform Government
GovInfoSecurity.com Week In Review for Oct. 22, 2010
CAG Vs. IG: Conflict Over Infosec
Cyber Education Initiative: Creating Metrics
Steady Approach to Critical Controls
NICE: Fed's Cyber Education Initiative
Editor's Notebook: Jim Lewis
GovInfoSecurity.com Week In Review for Oct. 15, 2010
IT Security's Future Rests with Young
Lack of Spending Alarms State CISO
Infosec Evolution Mimics Immune System
GovInfoSecurity.com Week In Review for Oct. 8, 2010
It'll Take Time to Achieve Obama's Goals
GovInfoSecurity.com's Month In Review for September 2010
GovInfoSecurity.com Week In Review for Sept. 24, 2010
Redefining Role of Cybersec Adviser
GovInfoSecurity.com Week In Review for Friday, Sept. 17, 2010
GovInfoSecurity.com Week In Review for Sept, Sept. 10, 2010
Editor's Choice for August: Senate Tackles Cybersecurity Bill, DoD Infosec Strategy, U.S.-CERT, State CISOs
GovInfoSecurity.com Week In Review for Friday, Sept. 3, 2010
Risk Management and Social Media
Reasoning Behind Enhancing DHS Infosec Prowess
Senator Gives White House 'Incomplete'<br> on Cybersecurity Performance
GovInfoSecurity.com Week In Review for Friday, Aug. 27, 2010
Intrusion Detection: Analyzing Data Proves Valuable
DoD Unveils New Cyber Defense Strategy
The Cloud: A More Secure Environment?
Michigan Eyes Hosting Own Cloud Data Center
NASA's JPL Reaches for the Cloud
GovInfoSecurity.com Week In Review for Friday, Aug. 20, 2010
GovInfoSecurity.com Week In Review for Aug. 13, 2010
Altruistic CISOs Employ Their Smarts to Succeed
Defending IT: Swimming Against the Tide
GovInfoSecurity.com Week in Review for Aug. 6, 2010
GovInfoSecurity.com's Best of July
GovInfoSecurity.com Week in Review for Saturday, July 31, 2010
Physical, Virtual Security Commonalities
GovInfoSecurity.com Week in Review for Saturday, July 24, 2010
Conflict of Interest: Certifiers Who Train?
Infosec Skills Gap Threatens Key IT Systems
Departing Words from the Navy CIO
Is Cybersecurity Getting the Attention It Needs?
GovInfoSecurity.com Week in Review for Saturday, July 17, 2010
Authentication's Chicken 'n' Egg Dilemma
GovInfoSecurity.com Week in Review for Saturday, July 10, 2010
DHS Addresses New FISMA Responsibilities
Cyber Warfare Prevention - Securing Your Software and Applications
GovInfoSecurity.com June Editor's Choice for Monday, July 5, 2010
GovInfoSecurity.com Week in Review for Saturday, July 3, 2010
Why CISOs Need to be at CEO's Side
GovInfoSecurity.com Week in Review for Saturday, June 26, 2010
Karen Evans, U.S. Cyber Challenge director and ex-federal e-government chief.
GovInfoSecurity.com Week In Review for Saturday, June 19, 2010
GovInfoSecurity.com Week in Review for Saturday, June 12, 2010
Understanding the New Senate Cybersecurity Bill
Story Behind NASA's Move to Continuous Monitoring
GovInfoSecurity.com Week in Review for Saturday, June 5, 2010
Showcasing Infosec Talent to Recruit Infosec Talent
Crafting a Social Media Security Policy
GovInfoSecurity.com Week in Review for Saturday, May 29, 2010
GovInfoSecurity.com Month in Review, Monday, May 31, 2010
GovInfoSecurity.com Week in Review for Saturday, May 22, 2010
Securing Open Source App Development
GovInfoSecurity.com Week in Review for Saturday, May 15, 2010
Curing the Cloud Computing Jitters
GovInfoSecurity.Com Week in Review: Saturday, May 8, 2010
Giving Sweeping Budgeting Power to White House Cyberspace Director
Surviving Cyber War
GovInfoSecurity.Com Week in Review: May 1, 2010
Beyond Firewalls, Speeding Cloud Adoption, Story Behind CISO's Firing
Microsoft Echoes Public-Private Partnership Mantra
Cybersecurity Summit: Building Trust, Globally
Meeting of the Minds Over Fed Cybersecurity
GovInfoSecurity.Com Week in Review: April 24, 2010
Speeding Cloud Adoption Through New FedRAMP Initiative
When Gregory Wilshusen Talks, People Listen
Hathaway Speaks Out on CNCI Declassification
Bridging Silicon Valley and the Beltway
Infosec Guru Ron Ross on NIST's Revolutionary Guidance
Beyond Compliance: Forrester's 5 Key Principles
Putting Threats of Cloud Computing in Perspective
Getting Ready for Cyberwar
Howard Schmidt, White House Cybersecurity Coordinator
Google Attack: Prelude to More Intrusions
Taming the Wild-West Internet
Grading Obama's First-Year Cybersecurity Performance
Einstein and Citizens' Privacy: Philip Reitinger, Deputy Undersecretary, Homeland Security National Protection and Programs Directorate
Don't Overload DHS with Cybersecurity Tasks
Rep. David Wu Takes On His Allies: Conversation with the Chair of the House Technology & Innovation Subcommittee
Myra Powell, Mission Assurance and Network Operations Program, DISA
Human Capital No. 1 Infosec Goal: Philip Reitinger, Deputy Undersecretary, Homeland Security National Protection and Programs Directorate
Having His Subordinate's Back: NIST Director Patrick Gallagher
Blurring the Bull's Eye on Federal IT: Dickie George, Technical Director of Information Assurance, National Security Agency
Equipping the Federal Workforce for the Cyber Age: Ruby DeMesme, Senior Adviser, Deloitte
Thinking Like a Hacker: Dickie George, Technical Director of Information Assurance, National Security Agency
Ron Ross, NIST's Infosec Guru, on the Institute's Latest Transformational Guidance
User-Centric Identity Comes to Washington: Heather West of the Center for Democracy and Technology
Why Strategic Cyber Warfare Shouldn't Be a Military Priority
Authentication: The Biometrics Advantage
NIST and IT Security: Much More Than Guidance
Biometrics: From Kabul to Washington
Training Next Gen Army Brass on IT Security
Lockheed Martin's Point Man on Fed Cybersecurity
Secure Access to Sensitive Data: Insights from John Bordwine, Public Sector CTO, Symantec
City Defends IT System from Social Network Threats
Cooperate, Not Regulate, on Cybersecurity
FISMA: The Misunderstood Law
Safeguarding a Massive, Decentralized IT System - Interview with California CISO Mark Weatherford
Feds Seen Regulating IT Industry
Creating InfoSec Occupational Categories - Interview with California CISO Mark Weatherford
Valuing FISMA: Interview with Immigration and Customs Enforcement CISO Gil Vega
In Rhode Island, Size Can be Deceptive - Interview with Rhode Island CIO Jack Landers and CISO Ernie Quaglieri
The CISOs CISO: Part 2
The CISOs CISO
Collaboration: Keeping IT in Kansas Safe - Interview with Kansas CISO Larry Kettlewell
State Lures Higher-Paid IT Security Pros - Interview with Minnesota CISO Chris Buse
IT Security: Scarce Money, No Excuses
In Praise of FISMA
Can Cyber Terrorism Exist? - Interview with Jim Harper of The Cato Institute
Marrying Physical, Virtual Security - Interview with Honolulu CIO Gordon Bruce
Getting the Basics Rights - Interview with Jerry Davis, NASA deputy chief information officer for IT security.
Match Game: Security Controls and Reported Incidents - Interview with John Streufert, State Department Deputy CIO and CISO, Part 2
Beyond FISMA: State Dept.'s Next Gen Metric - Interview with John Streufert, State Department Deputy CIO and CISO
4 Key Areas of Cybersecurity R&D
Yearly Security Awareness Training Isn't Enough - Interview with Hord Tipton of (ISC)2
IT Security Pros Collaborate on Privacy Act Rewrite - Interview with Ari Schwartz of the Center for Democracy and Technology
In Silence, Cybersecurity Action - Interview with Jim Flyzk, former Treasury CIO
Michigan's Pass-Fail IT Security Challenge - Interview with Michigan CTO Dan Lohrmann
Finding Cybersecurity Talent - Interview with Tom Stanton of Johns Hopkins University
Obama's Cyber Plan Needs More Oomph - Interview with Eugene Spafford of Purdue University
Call for Privacy Act to Catch Up with IT - Interview with Dan Chenok
Creating Your Own Guidance - Interview with Charlotte CISO Randy Moulton
Key Lawmaker: High Rank for Cyber Czar - Interview with Rep. James Langevin
A Red Team Primer
From Audit Guidelines to Red Team Attacks - Interview with Former Air Force CIO John Gilligan, Part 2
Embezzlement: Find the Liars, Cheaters and Thieves
Securing Off-The-Shelf IT
Creating an IT Security Culture - Interview with Vermont CISO Kris Rowley
DISA's Cloud Computing Initiatives
Safeguarding New Tech: Navy CIO Robert Carey
Federal IT Security Alignment: Navy CIO Robert Carey
What's Happening at NIST: Curtis Barker
Information Resources Management College: Director Robert Childs
Defining Information Security Metrics: Ron Ross of NIST
FISMA Author on Reform: Former Rep. Tom Davis
Advising Obama on Cybersecurity Part 2: Ret. Air Force Lt. Gen. Harry Raduege
Advising Obama on Cybersecurity Part 1: Ret. Air Force Lt. Gen. Harry Raduege
Probing Federal IT Security Programs: Gregory Wilshusen, GAO
Security & Accountability: Paul Kurtz, Cyber Security Advisor
FISMA Reforms Outlined: Senator Tom Carper