Government Information Security Podcast

PODCAST · government

Government Information Security Podcast

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders

  1. 1000

    Why Hospitals Must Rethink Cyber Resilience

    In the face of relentless cyberattacks that threaten patient safety, hospitals must strengthen their resilience, with clinical continuity, secure backups and coordinated recovery emerging as critical strategies, said John Riggi of the American Hospital Association and Josh Howell of Rubrik.

  2. 999

    Securing the Nation: FedRAMP-Authorized Identity Security

    As cyberthreats increase and evolve, the security of sensitive data and critical operations is paramount. There is a pressing need for government agencies and critical infrastructure to choose a FedRAMP-authorized identity security, also known as identity governance, solution.

  3. 998

    Zero Trust, Auditability and Identity Governance

    Two years after President Joe Biden's landmark cybersecurity executive order, the question remains: How are federal agencies adapting to the new focus on zero trust and identity governance? SailPoint's Frank Briguglio tackles this question with crucial insights into the state of cybersecurity today.

  4. 997

    Could HIPAA Changes Weaken Patient Privacy?

    Proposed changes to the HIPAA Privacy Rule could weaken patient data privacy protections, say Rita Bowen and Zachary Perry of the Association of Health Information Outsourcing Services, who explain why in this joint interview.

  5. 996

    Secure Patient Access to Health Records: The Challenges

    As the healthcare sector works to provide patients with secure access to their health information via smartphones and other devices, it must address critical identity and trust issues, says DirectTrust president and CEO Scott Stuewe.

  6. 995

    Medical Device Cybersecurity: EU vs. U.S. Approaches

    In May, new medical device regulations, including cybersecurity requirements, will take effect in the European Union. How do they compare with requirements in the U.S.? Attorneys Kim Roberts and Adam Solander offer an analysis.

  7. 994

    Making the Case for National Unique Patient ID

    How might a national unique patient identifier improve the accuracy of patient record matching and potentially help address identity fraud? Julie Dooling of the American Healthcare Information Management Association - which has been lobbying for the development of such an ID - makes the case.

  8. 993

    Measure Security and Its Impact on the Mission

    Government entities struggle not just to measure the effectiveness of their cybersecurity controls, but also how their metrics align to the agency's unique mission. Matt Alderman and John Chirhart of Tenable Network Security offer advice.

  9. 992

    Will HIPAA Audits Result in Settlements?

    As the Department of Health and Human Services gears up for its second round of HIPAA compliance audits, the focus will shift to using these audits for potential enforcement actions, including financial settlements, predicts attorney Anna Spencer.

  10. 991

    Threat Intel Sharing Project: A CISO Leads the Way

    In an exclusive interview, Harris Health System CISO Jeffrey Vinson explains how his team is spearheading an effort to help the federal government and the healthcare industry improve cyber threat intelligence sharing.

  11. 990

    CHIME's Charles Christian on 2016 Cyber Threat Outlook

    The healthcare cyber threat landscape will become even more menacing next year, while a shortage of cybersecurity resources will make dealing with those challenges increasingly difficult, predicts Charles Christian, chairman of CHIME.

  12. 989

    Tapping Analytics In CyberSec, Fraud

    The Big Data explosion will expand in volume, velocity and variety. Analytics are key to deriving insights from this data, particularly in cybersecurity and anti-fraud, says Dominic Ligot of Teradata Philippines.

  13. 988

    Could Big HIPAA Settlements Be Coming?

    Federal regulators will likely announce a number of eye-popping financial settlements for HIPAA violations later this year as a result of breach investigations, predicts privacy attorney Adam Greene.

  14. 987

    Taking Security Training to the Next Level

    Texas Chief Information Security Officer Brian Engle, like other CISOs, has voiced concerns that the state government didn't have sufficient staffers and managers with the right set of IT security skills. Engle, however, did something about it.

  15. 986

    A Boost for Indo-U.S. Cyber Cooperation

    U.S. President Barack Obama's visit to India this month may prove to be the fulcrum for a new era of Indo-U.S. cyber cooperation and collaboration, says Bruce McConnell, senior vice president at the EastWest Institute.

  16. 985

    Agencies Seen Improving in Gauging Risk

    Tripwire CTO Dwayne Melancon, a keen observer of risk management practices in the federal government, says he's seen a marked improvement in the way federal agencies address risk management, partly because of efforts by DHS.

  17. 984

    Debunking Medical Device Cyber Myths

    The Food and Drug Administration's Suzanne Schwartz, M.D., is on a mission to debunk the myth that medical device manufacturers need FDA approval for software updates or patches to address potential vulnerabilities.

  18. 983

    Adapting FedRAMP to Secure Sensitive Info

    To address the reluctance of federal agencies to move sensitive data to the cloud, the former CISO at the Nuclear Regulatory Commission, Patrick Howard, and his colleague, Michael Rohde, champion a FedRAMP workaround.

  19. 982

    Modernizing the VA's EHR System

    Enabling the secure sharing of patient data is a key aspect of work under way to modernize the Department of Veterans Affair's VistA electronic health record system, says Jim Traficant of ASM Research, which is leading an infrastructure project.

  20. 981

    Florida Fights Fraud with Authentication

    Florida's recent rollout of knowledge-based authentication in the application process for various benefits programs, including Medicaid, is already helping to crack down on ID theft and fraud, says Andrew McClenahan, who heads the effort.

  21. 980

    A CISO's Strategy for Winning Funding

    Making senior management aware of the risks involved in failing to invest in security technology is essential to getting buy-in, says Phil Curran, CISO at Cooper University Health Care.

  22. 979

    How a Flaw in VA Software Was Found

    Security analyst Doug Mackey says his discovery of a vulnerability in the Department of Veterans Affairs' VistA electronic health record system highlights the importance of software security testing.

  23. 978

    Accessing Big Data for Health Research

    Researchers have a new option for securely accessing more than 400 billion federal healthcare records via a virtual data center, says Niall Brennan of the Centers for Medicare and Medicaid Services.

  24. 977

    Consumer Advocate: Shut Obamacare Site

    From a risk management perspective, the federal HealthCare.gov website should be shut down until its technical problems are fixed and end-to-end security testing is completed, says consumer advocate Christopher Rasmussen.

  25. 976

    State Insurance Exchange: Why It Works

    Curt Kwak, CIO of the Washington state health insurance exchange, explains the steps his team took to help ensure the launch went relatively smoothly, paving the way for thousands to sign up for insurance.

  26. 975

    The Role of EHRs in Healthcare Fraud

    Attorney Maureen Ruane, who has prosecuted dozens of healthcare fraud cases, explains how the rollout of electronic health record systems at hospitals and clinics is creating new potential opportunities for fraud.

  27. 974

    Using NIST Guidance for HIPAA Compliance

    As healthcare organizations ramp up HIPAA compliance efforts, they should make far greater use of guidance from the National Institute of Standards and Technology, says security consultant Mac McMillan.

  28. 973

    HIPAA Audits: A Status Report

    The resumption of the HIPAA compliance audit program is on hold while regulators analyze pilot audit project results and implement the HIPAA Omnibus Rule, says Susan McAndrew of the HHS Office for Civil Rights.

  29. 972

    HHS Official Explains HIPAA Omnibus

    Susan McAndrew of the HHS Office for Civil Rights offers a detailed analysis of the final omnibus rule, which extensively modifies HIPAA and provides new guidance about when to report a breach.

  30. 971

    Storm Offers Disaster Planning Lessons

    An important lesson in the aftermath of Superstorm Sandy is the need to beef up contingency plans, including making sure staff members are cross-trained, says Deborah Kobza, CEO of the National Health Information Sharing and Analysis Center.

  31. 970

    Mobile Policy: One Size Doesn't Fit All

    In creating its mobile-device policy, the city of Honolulu allows its agency heads to tailor policy to meet their individual needs, Honolulu Chief Information Officer Gordon Bruce says.

  32. 969

    Continuous Monitoring: Overcome the Challenges

    Too many organizations misunderstand exactly what continuous monitoring is, says Centrify's Matt Hur, who offers insights on how to deploy continuous monitoring solutions for the best results.

  33. 968

    ONC Plans Mobile Security Guidance

    The Office of the National Coordinator for Health IT is studying use of mobile devices in small healthcare environments. The goal: new mobile security guidance that will be released in 2013.

  34. 967

    Getting California ISOs Up to Snuff

    A two-year-old California law requires each of some 120 state agencies to have an information security officer, but not every agency ISO is well-versed in IT security.

  35. 966

    Prospects Iffy for Cybersecurity Bills

    The House is getting ready to vote on a slew of cybersecurity bills, and the Center for Strategic and International Studies' James Lewis provides the skinny on the measures and their chances of passage.

  36. 965

    Fewer Than 150 HIPAA Audits Expected

    This year's HIPAA compliance audit program will come up somewhat short of the target of 150 audits, says Leon Rodriguez, the nation's lead HIPAA enforcer.

  37. 964

    Fraud Fight: How to Pick Your Battles

    From mobile malware to the Anonymous hacktivist attacks, how can organizations tackle the changing threat landscape? In an RSA Conference preview, Joe Rogalski of First Niagara Bank shares ideas.

  38. 963

    Firestorm of Privacy Activity

    "Literally, in my entire time working in the privacy field, I've never seen such profound and aggressive activity by the government in the privacy space," privacy expert Thomas Oscherwitz says.

  39. 962

    GovInfoSecurity.com <br>Week In Review <br>for Friday, Dec. 17, 2010

    This week's top news and views: Cyber reforms vanish, State Department creates cyber issues post, why risk management is hot and less stress during social media blackout. Don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow

  40. 961

    Infosec's Role in Feds' 25-Pt. IT Plan

    A new White House plan to reform how the feds manage IT should not only drive efficiencies but help secure digital assets, says Tim Young, former Office of Management and Budget deputy administrator for e-government and IT.

  41. 960

    GovInfoSecurity.com <br>Week In Review for <br>Friday, Dec. 10, 2010

    Cybersecurity reform stopped in the Senate, White House unveils new way to manage federal IT that emphasizes cloud computing and data consolidation and tips on preventing a WikiLeaks-style breach.

  42. 959

    Warrior Battles Military's PII Misuse

    "We use the Social Security number in every aspect, both mundane and sensitive," says Conti, coauthor of a report on the military's use of personal identifiable information. "It's everywhere, so we're courting disaster in how we us it."

  43. 958

    Electronic Driver's License: The New Secure ID Solution

    The identity credential is evolving, and the newest iteration is the electronic driver's license, which could revolutionize how we verify identity in both the real and virtual worlds.

  44. 957

    GovInfoSecurity.com Week In Review for Dec. 3, 2010

    Impact of the WikiLeak leaks, infosec spending rise, Delaware's CSO.

  45. 956

    Exempting Infosec from Civil Service

    Delaware's Department of Technology and Information is one of only two state departments in which all employees aren't protected by civil service, and state CSO Elayne Starkey says that approach attracts high-caliber infosec professionals.

  46. 955

    GovInfoSecurity.com Month In Review for November 2010

    Here's the top news and views for the past month: Navy gets new CIO, Cleveland Federal Reserve hacked, new GOP IT security leader praised, hackers next target could be the car.

  47. 954

    Facing Tradeoffs to Secure IT Systems

    One of the more intriguing tradeoffs with information security is green IT, says Robert Brammer, Northrop Grumman Information Systems vice president of advance technology.

  48. 953

    GovInfoSecurity.com <br>Week In Review <br>for Friday, Nov. 19, 2010

    This week's top news and views: Congress returns to Washington, but few see passage of cybersecurity legislation and a call for CISOs to take the lead in helping transform state government. And don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow.

  49. 952

    GovInfoSecurity.com <br>Week In Review <br>for Friday, Nov. 12, 2010

    This week's top news and views: automobiles as potential hackers' target, unrealistic expectations for cyber awareness training and Social Security Administration faulted on lax IT security enforcement.

  50. 951

    Physical Vs. Virtual Security: No Contest

    Gemalto's Ksheerabdhi Krishna on Physical-Virtual Synergies

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

Exclusive, insightful audio interviews by our staff with government/security leading practitioners and thought-leaders

HOSTED BY

GovInfoSecurity.com

CATEGORIES

URL copied to clipboard!