SORT BY Relevancy
Caleb talks with Joe DiPietro about practical security controls for databases and big data environments. The following aspects of security and compliance will be covered: - what to monitor - how to discover sensitive information - validating security controls & database policies - what role does the business owner play in the security framework - what to protect in a big data environment The Ready for IBM Security Intelligence Partner Program Webinar link reference in the show is as
Today, I am interviewing Hoyt Kesterson of Terra Verde Services. We will be talking about some of the trends in information security and challenges in security compliance. Mr. Kesterson is a security veteran and for many years chaired the international standards committee governing the use of digital certificates.
Terra Verde protects customer information through a combination of highly experienced professionals and innovative solutions. Its service professionals average 18 years of front-line experience in protecting some of the most important information in the world. Terra Verde uses that wisdom and knowledge to offer a set of solutions that helps businesses of all sizes keep their information secure.
Contact info for Terra Verde is
Today, I am interviewing Hoyt Kesterson of Terra Verde Services. We will be talking about the Payment Card Industryt (PCI) Data Security Standard (DSS). The interview will focus on key information executives need to know about PCI compliance and what they can do to comply. Mr. Kesterson is a security veteran and for many years chaired the international standards committee governing the use of digital certificates. Terra Verde protects customer information through a combination of highly experienced professionals and innovative solutions. Its service professionals average 18 years of front-line experience in protecting some of the most important information in the world. Terra Verde uses that wisdom and knowledge to offer a set of solutions that helps businesses of all sizes keep their information secure. Contact info for Terra Verde is email@example.com 877-707-7997
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "[a] jewel box of little surprises you can actually use." Beyond Fear tackles the problems of security from the small to the large: personal safety, crime, corporate security, national security. His book, Schneier on Security, offers insight into everything from the risk of identity theft (vastly overrated) to the long-range security threat of unchecked presidential power and the surprisingly simple way to tamper-proof elections.
Regularly quoted in the media -- and subject of an Internet meme -- he has testified on security before the United States Congress on several occasions and has written articles and op eds for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, and The Washington Post.
Schneier also publishes a free monthly newsletter, Crypto-Gram, with over 150,000 readers. In its ten years of regular publication, Crypto-Gram has become one of the most widely read forums for free-wheeling discussions, pointed critiques, and serious debate about security. As head curmudgeon at the table, Schneier explains, debunks, and draws lessons f
Our guest today is Peter Gregory. He is a security manager, computer security specialist, and author of over 20 books, including CISSP for Dummies. He has experience in the information technology sector, which spans over thirty-years and began in the 1970s.
He has worked in:
· local government
· wireless telecommunications, and
· financial management Our topic today is about writing books in the security sector
Welcome to Security Radio. Your host James Hall with our No. 3 episode - a discussion about mobile phone security.
This evening we have with us the Chief Security Officer of FIXMO a provider of Mobile Risk Management services. Dan has been an information security professional for more than 15 years, and has worked for notable organizations such as XM Radio, Secure Computing, McAfee, Nominum, and Accuvant. He has extensive experience running security programs within the government segment; his most notable role was as Director of Network Security at the Transportation and Security Administration, which was the largest managed service contract within the federal government. Dan joined Fixmo in 2012 to drive security and technology innovation within Fixmo's suite of Mobile Risk Management solutions. In his role at Fixmo, he is directly responsible for global security and information assurance initiatives – researching trends, discovering security vulnerabilities and exploits, building strategic partnerships; and attaining industry certifications - as well as product innovation. Dan holds an M.S. in Information Assurance/Computer Forensics from Capitol College and a D.Sc in Information Assurance from Capitol College with a dissertation focus on enterprise smartphone security.
Security Radio thanks you for listening.
This week Jay Kassing is back to talk about his book, Big Data. Join us to find out how Big Data is going to impact your brand and the world of banking. Big Data isn't scarry, unless you dont use it the right way. Join us for a fun and informative show.
To get the book simply click the link below:
How much is your privacy worth? Data privacy is an issue that only comes into focus in the collective consciousness when shoved into view by a substantive breach in personal data security. Whether the origin of the incursion is criminal or governmental, the focus quickly fades to black and a general feeling of helplessness persists. Privacy advocates who continue to insist that the battle being fought is one of rights are galvanizing our collective impotence in the realm of data privacy.
Battles for civil or human rights are typically measured in decades and we simply don’t have the time. Do we need to temporarily suspend our efforts in establishing footholds in the rights to privacy? Should we instead be working quickly and diligently towards establishing the price of privacy?
Dr. Katina Michael, Associate Dean - International, and the University of Wollongong, joins Fred and Howard on The COIL to share her insights on the future of privacy and personal data.