Video

Video Library

  • 201 CMR 17 compliance: What you need to know

    The new Massachusetts data protection law, 201 CMR 17, is known as one of the most stringent laws of its kind. In this interview, David Navetta of the Information Law Group discusses how enterprise...

  • Bruce Schneier on cryptography and U.S. gov. infosec

    Author and leading security expertBruce Schneier digs into the topics of the current state of cryptography and whether or not companies should care about the U.S. government's release of portions o...

  • Metasploit and software vulnerability testing

    Metasploit is a free tool that can be used to pen test for new and potentially damaging vulnerabilites. In this interview, H.D. Moore, creator of Metasploit, explains how the tool works and what it...

  • The future of PCI DSS

    Bob Russo, General Manager of the PCI Security Standards Council, discusses upcoming changes to the PCI DSS, including what new changes might be mandated, and when they might go into effect.

  • Re-evaluating QSA training

    Recently, the PCI QSA training process has come under scrutiny over the quality of individual PCI assessors. In part two of this interview, Bob Russo, General Manager of the PCI Security Standards ...

  • Assessing the botnet threat

    Botnet researcher Joe Stewart discusses the current threat levels presented by botnets and how to protect your enterprise from DDoS and other botnet attacks.

  • Face-off: Has social networking changed data privacy?

    In this exclusive conversation, security industry luminaries Hugh Thompson, founder of People Security, and Adam Shostack, author of "The New School of Information Security," discuss the state of s...

  • David Navetta on proposed DATA law

    Attorney David Navetta discusses the proposed DATA law, including the similarities and differences with existing state data privacy laws.

  • Cryptographer on SSL, encryption and cloud computing

    Cryptographer, Taher Elgamal of Axway Inc., the inventor and initial driving force behind SSL, explains how applications may be better adapted to defend against attacks.

  • Botnets, malware and capturing cybercriminals

    Malware isn't getting more sophisticated, but cybercriminals have better tools to control their botnets and deploy more targeted attacks, says Gunter Ollmann of Damballa, Inc.

  • VeriSign on DNSSEC support

    Joe Waldron, a product manager in VeriSign's Naming (DNS) Group, said engineers are testing and upgrading systems to support security extensions for DNS (DNSSEC).

  • Regulatory requirements driving role management

    Learn how implementing IAM technologies and strategies can help your enterprise achieve compliance with various regulations.

  • How to advance in your information career

    It's not news that the current economy is struggling, but what's the best way for infosec pros to position themselves to make it through? Sara Santarelli, Chief Network Security Officer of Verizon,...

  • Security risk factors: Business partners and pandemics

    In this exclusive interview, Sara Santarelli gives tips on how to deal with the risks posed by business partners and possible pandemics, and how to assess your enterprise's exposure to these risks.

  • Choosing the right authentication method

    These days, there are so many different authentication options for so many varied devices that it's hard to know what to choose. In this video, Mark Diodati of Burton Group explains what's new in t...

  • Schneier-Ranum face-off part 6: Audience questions

    Wrapping up their face-off at ISD 09, Bruce Schneier and Marcus Ranum take questions from the audience on everything from strategies for protecting risky assets to what they would do as the U.S. cy...

  • Schneier-Ranum face-off part 5: Security metrics

    In part 5 of this face-off series, filmed at ISD 09, Bruce Schneier and Marcus Ranum give their takes on the most (and least) effective security metrics.

  • Schneier-Ranum face-off, part 4: Cybersecurity czar

    Bruce Schneier and Marcus Ranum continue their face-off at ISD 2009 by discussing whether a U.S. cybersecurity coordinator is necessary.

  • Schneier-Ranum face-off, part 2: Social networking

    Is there a way that enterprises can allow social networking securely, or are sites like Facebook and Twitter simply too risky for enterprise consumption? Security experts Bruce Schneier and Marcus ...

  • Schneier-Ranum face-off, part 3: Compliance

    In this third part of Schneier and Ranum's Face-off at ISD 2009, the two security pros address questions surrounding how security and compliance interact, and how to get executives to care about se...