Email Alerts
-
Jim Lewis on cyberwarfare, secure infrastructure collaboration
In this video, the director of the Center for Strategic and International Studies discusses cyberwar and the need for collaborative infrastucture protection. Video
-
CISO interview: Choosing enterprise risk management policy
In this video interview from RSA Conference 2011, CISO Scott Sysol discusses his organization's enterprise risk management policy on various emerging technologies. Video
-
The future of hacking: Dealing with the underground economy
How is the underground economy evolving, and what can security practitioners do to anticipate and respond to future threats? In this Face-off video, Hugh Thompson and Adam Shostack discuss the best options. Video
-
Face-off: Information security management metrics
Are metrics useful, or do they just distract security pros from the real issues at hand? In this video, Hugh Thompson and Adam Shostack discuss the necessity of metrics. Video
-
Security risk management video: Business partner security and pandemic planning
In this exclusive interview, Sara Santarelli gives tips on how to deal with the risks posed by business partners and possible pandemics, and how to assess your enterprise's exposure to these risks. Video
-
Schneier-Ranum face-off part 5: Security metrics
In part 5 of this face-off series, filmed at ISD 09, Bruce Schneier and Marcus Ranum give their takes on the most (and least) effective security metrics. Video
-
How to detect and respond to money laundering
Money laundering, by its very nature, is difficult to detect, but expert Eric Holmquist gives advice on how to spot it and how to respond. Video
-
Countdown: Top 5 most important questions to ask endpoint security vendors
After the endpoint security assessment is over and it's time to go talk to vendors, how can you tell between a song and a dance, and what you can truly expect out of a product? Podcasts
-
Discussing security operations: Security 7 awards video
The industry's best and brightest security officers discuss key issues and answer questions during the Security 7 awards at the 2007 Information Security Decisions conference. Video
Security Management Strategies for the CIO