Video Library
-
Schou: (ISC)2 board trying to 'make things better'
Co-founder Corey Schou says (ISC)2 board member responsibilities include managing growth, certification value and building a "member-centric" culture.
-
NIATEC's Corey Schou on training future infosec pros
Video: NIATEC Director Corey Schou discusses how the information assurance training program prepares the next generation of infosec pros.
-
Interview: (ISC)2 seeks growth, value for membership
Video: Board member David Melnick discusses the "interesting challenge" of growing (ISC)2's ranks while still creating value for existing members.
-
Corporate culture vs. mobile device security policy
Video: Deloitte mobile security expert David Melnick discusses the challenges of mobile device security policy enforcement and how to develop reasonable controls.
-
How to configure pfSense as an SMB-caliber firewall
Video: Keith Barker of CBT Nuggets provides a brief pfSense tutorial. Learn how to configure pfSense, a free yet surprisingly capable firewall.
-
Video: The downside of layered security
A layered security plan is good, but Argonne National Laboratory vulnerability researcher Roger Johnston warns against too many layers.
-
Why GPS spoofing, angry insiders are worrisome threats
Roger Johnston of Argonne National Laboratory discusses the implications of spoofing GPS and ways to manage angry and potentially malicious insiders.
-
PCI SSC's Bob Russo on PCI-compliant P2P encryption
Video: The PCI SSC GM discusses tokenization, point-to-point encryption, PCI compliance and plans to approve vendor P2P encryption products.
-
PCI SSC's Bob Russo on mobile payments, PCI compliance
Video: The PCI SSC is working on guidance for businesses that want to accept mobile payments and are testing mobile payment applications for PCI compliance.
-
Log management and analysis: How, when and why
In this presentation, John Burke discusses how to make the most of logs to augment an organization’s overall security posture.
-
Black Hat 2012: Mobile apps heighten data leakage risks
Video: Mobile app privacy issues threaten contacts, calendar items and other sensitive data, said Domingo Guerra of San Francisco-based Appthority.
-
When to use network, storage and endpoint DLP
In this video, our expert will explain how different types of DLP work, such as network and endpoint DLP, and how it secures data at rest.
-
Black Hat 2012: Inside Windows 8 memory protections
Video: New memory-based protections in Windows 8 make heap-based buffer overflow attacks much more difficult.
-
Rodrigo Branco on new malware research database
Video: Qualys vulnerability researcher Rodrigo Branco discusses his new malware analysis system that will serve as a malware research database.
-
Expert makes case for end-user phishing tests
Video: Anti-spear phishing training is controversial, but can be effective if it is done right, says Rohyt Belani, CEO and co-founder of PhishMe Inc.
-
Video: Why new Zeus variants are even more dangerous
They have long plagued the financial industry, but the latest Spyeye/Zeus variants are a serious and complicated threat, says Dell SecureWorks.
-
Social media security risks and legal issues
Video: When a company or its employees use social media, the IT team should understand the legal terms and conditions of each social media site.
-
Improving internal pen testing quality
Video: Learn how to improve your pen testing methodology in the areas of reconnaissance, scanning, enumeration, penetration and reporting.
-
Video: How the U.S. economy affects IT security budgets
In this special keynote, In-Q-Tel's Peter Kuper analyzes the state of IT and the economy in 2012, and the resulting IT security spending outlook.
-
PCI compliance guidance fueling technology deployments
Despite no update to PCI DSS until the end of 2013, merchants are busy with compliance initiatives, explains Diana Kelley of SecurityCurve.
Security Management Strategies for the CIO