eiqcast's Podcast

PODCAST · technology

eiqcast's Podcast

  1. 22

    eIQcast Episode 22: Update on PCI

    Discussions about PCI-DSS rules this year have focused on how effective the guidelines really are at preventing theft of credit card data. Recent survey data indicates merely following PCI does not protect a wide range of protected data. In the newest episode of the eIQcast, eIQneworks Product Evangelist John Linkous provides an update on PCI compliance and how far it goes to actually keep credit card data secure. Running time: 10:38

  2. 21

    eIQcast Episode 21: The Role of File Integrity Monitoring

    In this episode of the eIQcast, Mike Rothman dives into the nuances of file integrity monitoring and why it's an important aspect of both security and compliance. One of the first things an attacker is going to do is mess around with system files, so having some mechanism to ensure that system files, registry values and the like aren't tampered with is a big part of "reacting faster" to potential security issues. Mike also discusses how eIQ's SecureVue security and compliance management platform provides this capability through it's newly updated agent technology, continuing to show technical innovation beyond simple security information and event management (SIEM) and log management solutions. Running time: 10:41

  3. 20

    eIQcast Episode 20: Seeing Clearly Through the Clouds

    In this latest episode of the eIQcast, eIQnetworks SVP of Strategy Mike Rothman discusses some of the challenges of cloud computing with Ross Levanto. Mike goes into the issues of maintaining visibility when networks and systems reside in someone else's datacenter, and some of the mechanisms eIQ is adding to SecureVue to help customers address this issue. This coincides with the recent announcement from eIQnetworks regarding security and compliance management in the cloud. Check it out on http://www.eiqnetworks.com. Running time: 11:40

  4. 19

    eIQcast Episode 19: BUSTED! The Greatest Hacker Goes Down...

    This past Monday the U.S. Justice Department charged 28 year-old Albert Gonzalez with a series of crimes that resulted in the theft of more than 130 million credit and debit card numbers from late 2006 to early 2008. The indictment places blame for several high-profile data theft incidents on a small group of individuals who found holes in websites used to transfer the credit card data. Basically, these folks have to be the best hackers out there if they were behind every high profile data breach of the past two years. In the latest episode of eIQcast, Security and Compliance Evangelist John Linkous reviews the charges, talks about how retailers and consumers can protect themselves, and notes how the crime was carried out by exploiting a well-known (and extremely easy to replicate) web site security weakness.

  5. 18

    eIQcast Episode 18: eIQviews on Black Hat

    eIQnetworks Senior Vice President of Strategy Mike Rothman just returned from Black Hat USA 2009 in Las Vegas, which took place from July 25-30, 2009. Mike has been to Black Hat many times, and the more things change, the more they stay the same. The presentations all lead to same conclusion: No matter who you are, where you are or how secure your network is, you are vulnerabile. In the latest episode of the eIQcast, Mike discusses his thoughts about the latest Black Hat show, the leading attack vectors (like SSL, iPhones, and web apps), and other assorted topics with Ross Levanto.

  6. 17

    eIQcast Episode 17: Exposed Smart Metering and Energy Security Compliance

    According to published reports, one of the anticipated sessions at the upcoming Black Hat conference will show vulnerabilities within smart metering technologies that certain utilities are deploying to make the electricity grid more intelligent-- from energy production through consumption. The big question is whether the vulnerabilities would put utilities out of compliance with energy industry regulations regarding security. In the latest episode of the eIQcast, Ross Levanto asks eIQnetworks Product Evangelist John Linkous for a review of what we know about the vulnerabilities and the current state of security compliance within the energy industry.

  7. 16

    eIQcast Episode 16: The need for Automation

    As noted in the previous post on eIQviews, the results of spring surveys show that security spending is down. While that's not exactly a surprise, it puts security managers in a pickle. Given the economic situation, how are they to keep their systems secure and compliant, especially since the regulations haven't change and the hackers don't take time off during a recession? That question is the subject of the latest episode of eIQcast, where Ross Levanto interviews eIQnetworks senior vice president of strategy. Running time: 10:46

  8. 15

    eIQcast Episode 15: Beyond PCI to Security

    Since Your Working Toward PCI Compliance, Why Not Try to Make Your Enterprise Secure, too? Events in 2009 provide further proof that PCI compliance is not enough to secure credit card information, yet PCI compliance is a major driver of technology purchases each and every day. If the need-to-have products for PCI compliance are not enough for security, what are the nice-to-have products that can make an enterprise far more secure? In the latest episode of the eIQcast podcast series, Ross Levanto asks eIQNetworks Product Evangelist John Linkous for his thoughts on the question. In the process, they discuss the features and functionality that IT and security teams can investigate as part of PCI compliance projects to greatly enhance the security of their systems.

  9. 14

    eIQcast Episode 14 - Analyzing Melissa Hathaway's Recommendations

    During one of the most hyped keynotes at the recent RSA conference, President Obama's "cyber-security czar" Melissa Hathaway outlined at a high level plans for improved security within the federal government. In the latest episode of eIQcast, Host Ross Levanto and eIQnetworks Product Evangelist John Linkous analyze Hathaway's comments and the industry's reaction to them. The report Hathaway recently completed and sent to the President has not been made public; it's expected that many of her recommendations will emphasize the need for ongoing monitoring of networks and security controls, as well as the need for the White House to step up its management of IT security across the entire government. Editor's note: This episode was recorded on Friday, May 1, and therefore references the RSA Conference that ended on April 23. Running time: 10:57

  10. 13

    eIQcast Episode 13: Verizon Breach Report

    Recently the folks at Verizon Business released their annual data breach analysis report. From the RSA 2009 show, Ross Levanto and eIQ Product Evangelist John Linkous discuss the findings and help interpret what issues are identified by looking at the report. Running time: 9:53

  11. 12

    eIQcast Episode 12 - Continuous Compliance Coming (or not)

    As recently discussed in a post by Mike Rothman, a Visa executive this week sought to clarify a company claim that no PCI-compliant company has suffered a data breach. Given that PCI compliance is determined at a fixed moment in time, the unattainable ideal is "continuous" compliance. In the latest episode of eIQcast, Ross Levanto asks eIQnetworks Product Evangelist John Linkous about Visa's claims. They review how companies can move toward the unattainable continuous compliance goal, and they provide tips on certain effective data security strategies not specifically mandated by the PCI rules.

  12. 11

    eIQcast Episode 11: Conficker Mania

    On the eve of the April 1 expected trigger date of the worm Conficker, host Ross Levanto interviewed eIQnetworks Product Evangelist John Linkous in this episode of eIQcast. They discussed why everyone is especially concerned about this particular worm. They also reviewed certain data sources that should be monitored to determine if Conficker has struck a network. Running time: 10:02

  13. 10

    eIQcast Episode 10: Stimulating the EHR

    The American Recovery and Reinvestment Act signed by President Obama last month includes a new initiative to create standard electronic health records over the next few years. Since a standard way to exchange health information opens up the possibility of a hacker attack, the federal government is creating new rules to protect the health records. In this episode of eIQcast, Ross Levanto interviews eIQnetworks Product Evangelist John Linkous. They walk through the new initiative outlined in the act and the timeline for the new IT rules addressing electronic record protection. Running time: 11:22

  14. 9

    eIQcast Episode 9: HIPAA is back!

    It looks like 2009 maybe finally be the year of HIPAA. For those of you in the business for a long time, HIPAA was big news back in the early part of this decade (2001-2004), but due to a lack of enforcement, the regulation has not been top of mind for years, in the wake of Sarbanes-Oxley and PCI. But that seems to be changing. Recently, the pharmacy company CVS/Caremark was levied a fine of more than $2M for a violation of HIPAA rules. Additionally, provisions in the stimulus bill recently signed into law by President Obama provide insight into future enforcement of HIPAA compliance. In this episode of eIQcast, host Ross Levanto interviews eIQnetworks Product Evangelist John Linkous on the news of the fine and what it means for IT and security managers. Running time: 10:51

  15. 8

    eIQcast Episode 8: Another Payment Processor Breach

    As noted in an earlier post on this blog, news surfaced this week of credit card theft at a payment processing firm. While the name of the firm has not been announced, you'd think the crime scene investigators are on the job. The news comes merely weeks after payment processor Heartland Payment systems reported credit card theft from its network. In the latest episode of eIQcast, host Ross Levanto interviews eIQnetworks Product Evangelist John Linkous, who discusses how the credit card information was reportedly stolen, whether this is evidence of a new trend, and how future incidents of this type may be prevented.

  16. 7

    eIQcast Episode 7: FAA and Incident Response

    In this episode of the eIQcast, Ross Levanto interviews Link (that's eIQ Product Evangelist John Linkous for newbies) about the recent FAA breach. Clearly the FAA had a strong incident response process in place since they disclosed the breach within a week. As with everything, there are always areas to improve, so John discusses some of the advantages of broad monitoring as well in detecting issues (and possible incidents) earlier in the process. Running time: 11:35

  17. 6

    eIQcast Episode 6 - Configuration Audit

    This week, John and Mike tackle the concept of configuration audit and why it's important to ensure devices are configured correctly. We also discuss some of the configuration "standards" out there, like Center for Internet Security and some suggestions from the US Federal Government. Running time: 12:23

  18. 5

    eIQcast Episode 5: Heartland and PCI

    This week's episode is focused on the Heartland data breach and it's eventual impact on PCI. Mike Rothman, eIQ's SVP of Strategy, is interviewed by Ross Levanto and discusses some of the specifics behind the breach and reinforces the message that log data alone is not going to catch these new attacks. More importantly, Mike talks about some of the changes that are needed with the PCI standard, given that two "PCI compliant" organizations have had high profile data breaches. Running time: 10:57

  19. 4

    eIQcast Episode 4 - Drilldown on COSO/COBIT

    In this episode, John Linkous and Mike Rothman drill deep into the COSO/COBIT framework. Why do you care? Well a good part of the acceptable practices of little regulations like Sarbanes-Oxley and FISMA are directly related to COBIT. Thus, if you have to worry about those regulations, you should be familiar with COBIT. Check it out. Running time: 11:43

  20. 3

    eIQcast Episode 3: Compliance Automation

    In the third episode of the eIQcast, John and Mike tackle the concept of compliance automation. What exactly are you automating? And how do you delve into some of the specific compliance regulations and frameworks to figure out how to do more with less. Given the economic backdrop heading into 2009, we believe that all customers will need to figure out how to make their operations much more effective and more importantly, efficient. Automation is one way to do that.

  21. 2

    eIQcast Episode 2: Security Automation

    In the second eIQcast, John and Mike discuss the need to automate security operations and some of the issues therein. The reality is that attacks have not stopped, but in this kind of macro-economic environment the opportunity to add resources to defend against attacks is limited. Thus we all need to work more effectively and more efficiently, which is what security automation is all about.

  22. 1

    eIQcast Episode 1 - Low and Slow Attacks

    In this inaugural episode of the eIQcast, Mike Rothman and John Linkous decompose a particularly nasty attack called the "low and slow" attack, which is designed to make existing defenses obsolete. Listeners will understand how the low and slow attack works and also how to defend against it using security management technology (like eIQ's SecureVue). Running time: 13:10

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

No description available.

HOSTED BY

Mike Rothman

CATEGORIES

URL copied to clipboard!