Our Terms of Use and Privacy Policy have changed. We think you'll like them better this way.

  • 00:38

    Cyber Security

    in Business

    On May 20, my guest will be Chris Moschovitis, the CEO of TMG-eMedia.  Chris studied Physics, Computer Science, and Mathematics, receiving his Bachelors of Science degree from The College at Brockport. His follow-up graduate studies at the University of Rochester, and New York University include advanced courses in technology, management, and education. In 1985 Chris was appointed Director of Academic Computing at Pratt Institute, and in 1987 he was recruited by the O’Connor Group for the position of Vice President of Information Technology. In heChris started his own company — the Technology Management Group. (“TMG” ) — focused on providing independent technology management expertise and outsourcing services. TMG further expanded its Internet offerings in 2004 by investing in emedia – a prominent, award winning, and internationally acclaimed interactive agency, forming TMG-eMedia, one of the premier independent consulting firms in the country. Over his career at TMG Chris has personally led a wide array of projects including: Due Diligence, Business Transformation, and Strategic Consulting assignments; Framework implementations (e.g. Balanced Scorecard, BCG, COBIT, ITIL, etc.); Content and Document Management (ECM/WCM) initiatives; ERP and CRM assessments, and rollouts ; Systems Architecture design and Cyber Security audits. Chris is co-author of the critically acclaimed “History of the Internet: 1843 to the Present” as well as a contributor to the “Encyclopedia of Computers and Computer History” and the “Encyclopedia of New Media.” In addition heis a member of several industry organizations (e.g. ISACA, IEEE, AMA) frequently writes articles, and is a sought after public speaker.

  • 00:36

    Cyber-Terrorism and Cyber-Security

    in Education

     


    February 25, 2015, 1pm CST


    Call in with comments or questions at (646) 478-5814


    In recent years, the demand for cyber security professionals has grown more than 3.5 times faster than the demand for other IT jobs during the past five years and more than 12 times faster than the demand for all other non-IT jobs.


    Join us on CSUTalkRadio as we discuss the rise in cyber terrorism and the need for cyber security professionals in the workforce. We will also let you know more about one of CSU’s new degree program offerings, a bachelor’s in information systems security.

  • 01:23

    #301 Critical Thinking Applied Cyber Security & Protecting Your Digital Identity

    in Technology

    Find out HOW to Be Smart About How You Use Technology and Use Critical Thinking to Make Smart Decisions!


    Risk-Based Security and Self-Protection with Gary Vause and Derrick Brown 


    All roads to the digital future lead through security. However, in a digital business world, security cannot be a roadblock that stops all progress. Organizations will increasingly recognize that it is not possible to provide a 100 percent secured environment. Once organizations acknowledge that, they can begin to apply more-sophisticated risk assessment and mitigation tools. On the technical side, recognition that perimeter defense is inadequate and applications need to take a more active role in security gives rise to a new multifaceted approach. Security-aware application design, dynamic and static application security testing, and runtime application self-protection combined with active context-aware and adaptive access controls are all needed in today's dangerous digital world. This will lead to new models of building security directly into applications. Perimeters and firewalls are no longer enough; every app needs to be self-aware and self-protecting.

  • 00:16

    It's a jungle out there - the current cyber security landscape

    in Technology

    Authomate's CTO, Piyush Bhatnagar, and CEO, Jeff Schmidt, join the program to discuss the current cybersecurity landscape facing today's consumers and enterprises, and why U.S. citizens today need to take more personal responsibility for the security of their personal data.

  • 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 01:08

    Dealing with cyber-security

    in Atheism

    Join us as we talk to Merlyn Horton on the issue of cyber-security and internet usage when dealing with kids. We will try to get author Paula Todd to talk about her book: extreme mean.


     Liam Johnson returns to the show with a new science segment, and all our usual jazz..

  • 01:00

    S3-E25 Cyber Security and Manufacturing

    in News

    The transformation of manufacturing from closed to open systems is creating opportunities for everyone; including hackers poised to poach data and disrupt production.  What’s the best strategy to deal with the cyber attacks that process automation invites and how can manufacturers quickly pivot to protect their data, systems and resume production?  Tune in as Sid Snitkin, Vice President and GM, Enterprise Advisory Services, ARC Advisory Group discusses “Cyber Security and Manufacturing” with Lew Weiss and Tim Grady on Tuesday, April 28th at 1:00pm.

  • 00:32

    Is Your Cloud Infrastructure At Risk From Cyber Based Attacks? Find Out More!

    in Technology

    Up to this point, most of our podcasts on network security have been about learning how to protect the actual infrastructure of your business - both from the inside and the outside.  But, there is also another critical asset which is just as much at risk.  This is your 'Cloud based Infrastructure'.  In today's business world, many entities now outsource their entire IT system to the Cloud.  The benefits of it are very obvious, such as on demand software services, and low, predicatble costs.


    But, your Cloud Infrastructure is also prone to being the point of major Cyber based attacks and hacks.  In today's podcast, we interview Ms. Michele Borovac of HyTrust Corporation, and learn how a business owner can apply their security solutions in protecting your Cloud.

  • 00:11

    PODCAST: National Cyber Security Awareness Month

    in Technology

    Welcome to the TechSource podcast series.  Today we are speaking with Paul Asadoorian, Product Evangelist, with Tenable Network Security, about National Cyber Security Awareness Month, as well as the “Internet of Things” and security.

  • 00:24

    Bird's Eye View: What I've Learned Working In Cyber Security

    in Technology

    In this podcast Caleb Barlow speaks with Sandy Bird, CTO of IBM Security Systems, co-founder of Q1 Labs to discuss his recent appointment as an IBM Fellow, part of IBM’s elite "most exceptional" technical professionals. Sandy will explain what makes being an IBM Fellow so rewarding and will shed some light on the types of people that have been honored with this distinction. In addition, Sandy will discuss how his career and the security landscape have both evolved during his during a time that threats have constantly evolved for financial profit. He’ll also explain what it’s like to work in the security industry and why college students should consider a career working in cyber security. 

  • 01:01

    Cyber Security - Disaster Prevention for Small Businesses

    in Business

    The average small business may not think that the same exposures for hacking, like what happened to Home Depot or Target, apply to them, but the truth is that small and Main Street businesses are far more vulnerable and face a greater risk.

Join Host Live Chats

From the BTR Blog