show episodes
 
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
  continue reading
 
Cyber risk is a complex topic and part of a larger picture in your organization. Cyber risk is a strategic necessity for any organization to increase cyber resilience. In this podcast, we will have an open conversation on governance, risk, and compliance to move your organization from as-is to the next level. Here we will have discussions on program assessments, control assessments, risk identification, risk register, mitigation plans, and much more.
  continue reading
 
Cybersecurity and data privacy is a requirement for any good business. So how can a CISO, CTO or compliance manager stay on top of where the industry is heading? Infosec veteran and former lead auditor, Blaise Wabo discusses the intersection of security, privacy and compliance. Topics will include: Guest interviews with industry experts, framework updates, the business implications of compliance (and non-compliance), and discussions about compliance challenges, tips and tricks.
  continue reading
 
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
  continue reading
 
G
GovCast

51
GovCast

GovCIO Media & Research

Unsubscribe
Unsubscribe
Monthly+
 
GovCast, a production of GovCIO Media & Research, tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. We share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered. 213656
  continue reading
 
Wiley Connected | Tech Law and Privacy, Explained. Wiley Connected is the Tech law and privacy podcast hosted by technology-focused lawyers at Wiley, who break down developments at the intersection of tech, law and policy with a uniquely DC perspective. For additional resources and materials, head over to WileyConnect.com.
  continue reading
 
In AI We Trust? is a new podcast with Miriam Vogel of EqualAI and Mark Caine of the World Economic Forum that surveys the global landscape for inspiration and lessons in developing responsible, trustworthy artificial intelligence. Each episode aims to answer a ‘big question' in ethical AI with prominent lawmakers, leading thinkers, and internationally renowned authors.
  continue reading
 
Over the last century, manufacturing has undergone many changes. And, now, the manufacturing industry is experiencing another revolution. Featuring conversations from the field, Shifting Gears highlights manufacturers, consultants, and industry experts from the modern world of manufacturing. Join us each quarter, as we share the latest news, trends, technology, and expert insights to help manufacturers thrive in today’s economy.
  continue reading
 
D
Double Loop Podcast

1
Double Loop Podcast

Glenn Langenburg and Eric Ray

Unsubscribe
Unsubscribe
Monthly
 
Whether you're a practicing Latent Print Examiner or you're interested in forensics and true crime, the Double Loop Podcast is a weekly show featuring Glenn Langenburg and Eric Ray discussing latent print topics, current events in forensic science, the newest research articles, interesting guests, and analysis of notable cases from a forensic scientist perspective.
  continue reading
 
A podcast for digital transformation leaders. Network security experts Pam Kubiatowski and Lisa Lorenzin discuss the latest cyber-attack issues, enterprise security strategies, and current security events so that you can successfully accelerate network and security transformation. You can subscribe to the podcast feed on Apple Podcasts and Spotify.
  continue reading
 
Triage: Rapid Legal Lessons for Busy Health Care Professionals has been created by K&L Gates to convey information about developments in health law through short podcasts. If you work in the health care industry, you have grown accustomed to frequent changes in laws and regulations. On some days, it may seem like an insurmountable task to keep up with every change, especially as a new presidential administration and new policies take shape. The K&L Gates Health Care practice will regularly c ...
  continue reading
 
Cybersecurity is hard and every business regardless of size struggles to deal with its complexities. One of the pressing questions executives have is where is the easy button? The Bite Size Security Podcast is for executives & business owners to stay on top of emerging cybersecurity trends, news on risks and regulations, as well as proven strategies that will simplify your approach to addressing risks. Join your host & guide Mike Fitzpatrick, the Founder & CEO of NCX Group on Bite Size Secur ...
  continue reading
 
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
  continue reading
 
Loading …
show series
 
In this episode of Wiley Connected, Wiley attorneys discuss the latest revisions to the FTC Safeguards Rule, which are effective on June 9. Join Wiley attorneys Duane Pozza, Antonio Reynolds, Kat Scott, and Stephen Conley as they discuss what the revised Rule requires, who is covered, and how to prepare for and implement compliance.…
  continue reading
 
Gilman Louie is CEO and co-founder of America’s Frontier Fund, CEO of In-Q-Tel, and an NSCAI Commissioner. Tune into this week’s episode of In AI we Trust, where Gilman shares his thoughts on the government's role in regulating, funding, and convening key stakeholders to promote responsible AI. Gilman invokes similar moments of technological innova…
  continue reading
 
Customer service continues to be a key focus for the Department of Education. As part of its Strategic Plan, the agency has fully executed the 21st Century Integrated Digital Experience Act to provide millions of customers with ease of access to digital services. Tune in to this special update from Education CIO Luis Lopez about the progress made o…
  continue reading
 
Do you know the average payout organizations are hit with for every attack? William Parks and Bill Dean discuss a service dedicated to helping your organization (big or small) withstand a ransomware attack. Bill and his team are ready to help you and your organization obtain peace of mind when it comes to these advanced threats. Questions for Bill?…
  continue reading
 
Cloud Smart is one of several initiatives underway to boost IT modernization at the Department of Homeland Security. This approach is not only helping DHS better manage and access data, it's also empowering the workforce to make decisions in their environments at a faster pace. DHS CTO David Larrimore has created a Chief Technology Officer Council …
  continue reading
 
Chloe Hawker provides updates on rocket launches, phone calls from space, and the FCC during the Orbital Debrief. Then, 2001: A Space Odyssey has been called both a masterpiece and monumentally unimaginative. Stanley Kubrick’s 1968 movie covers about 4 million years, but guest Steve Merlis of Samsung and host Henry Gola need only 20 minutes to brea…
  continue reading
 
Meet one of the Bad A#%* women in Congress, Representative Chrissy Houlahan (D-PA). She is a trailblazer: a strong advocate for and accomplished practitioner in STEAM (science, technology, engineering, art and math) as an engineer, Air Force veteran, successful entrepreneur and former chemistry teacher. This week on In AI we Trust? Miriam Vogel and…
  continue reading
 
After repeatedly falling victim to identity thieves through SIM swap attacks, a telecom engineer and entrepreneur, Haseeb Awan, decided to start his own carrier with security as its top priority. Today, Haseeb is the founder and CEO of EFANI Secure Mobile, a private cell phone service provider catering to individuals and organizations that need ext…
  continue reading
 
The Department of Homeland Security (DHS) Science & Technology Directorate (S&T) welcomed a new head of information security in 2023. With over 25 years of experience in enterprise-level digital transformation across federal government, CISO Michele Thomas highlights some of the lessons learned throughout her career, what led her to the agency and …
  continue reading
 
In this episode of In AI we Trust? Dr. Haniyeh Mahmoudian, Global AI Ethicist at DataRobot, provides insight into the timely and critical role of an AI ethicist. Haniyeh explains how culture is a key element of responsible AI development. She also reflects on the questions to ask in advance of designing an AI model and the importance of engaging mu…
  continue reading
 
Women tech leaders across government and industry gathered at GovCIO Media & Research’s annual Women Tech Leaders Summit to discuss how to recruit more women for government tech jobs, market the government mission and government job perks more effectively, and inspire the next generation of women tech leaders through mentorship. This special episod…
  continue reading
 
A Hard Look Honest communication between board members and information officers is critical to good cybersecurity. Cyber experts must relay their insights through non-technical storytelling and make a pertinent business case. Business leaders should aim for a cyber-aware culture permeating an entire organization. Read more: https://www.weforum.org/…
  continue reading
 
A State Department-supported effort is bringing together powerful geospatial and satellite data visualization tools to document and assess the impacts of Russia’s war on Ukraine. At the heart of the data behind this effort is Susan Wolfinbarger, team lead for State’s Location-based Observations for Conflict Analysis, Trends, and Evidence (LOCATE) i…
  continue reading
 
LBMC Shareholder Bill Dean and William Parks spend today’s episode discussing Advance Guard, a new service offering from LBMC's Security Technical Team. Learn how Advance Guard may help protect your organization's most valuable assets, save time on compliance audits, and give peace of mind about your current security stance. Want to see Bill’s “Pre…
  continue reading
 
In this episode of Wiley Connected, we are joined by Elham Tabassi, Chief of Staff in the Information Technology Laboratory at NIST, who leads NIST’s efforts to create an Artificial Intelligence Risk Management Framework (the “AI RMF”). We discuss the overall goals of the AI RMF (1:31), the use of a risk-based approach to AI (6:02), different categ…
  continue reading
 
Is your organization using threat intelligence to run threat modeling? If not, that’s a miss-opportunity. Your organization should establish desktop exercises or an informal cross-functional team to run threat modeling scenarios. This team would do the following four steps: Identify and characterize the systems supporting the organization's mission…
  continue reading
 
Justin Hotard leads the High Performance Computing (HPC) & AI business group at Hewlett Packard Enterprise (HPE). Tune in to In AI we Trust? this week as he discusses supercomputing, HPE’s commitment to open source models for global standardization and using responsible data to ensure responsible AI. – Resources mentioned in this episode: What are …
  continue reading
 
Episode 3 features three executives from Mizuho OSI – Steve Lamb, Kevin Thorne, and Bill Bregar – as well as Denise Shields, Principal of the Shields Resource Group. Steve, Kevin, Bill, and Denise explain the Malcolm Baldrige National Quality Award and the MBNQA Framework. The group then discusses Mizuho’s continuous improvement journey using the B…
  continue reading
 
Episode 2 features Christopher Thornberg, Ph.D., Founding Partner at Beacon Economics LLC. Christopher discusses the current state of the economy and what he calls the “stimulus hangover.” In addition, Christopher covers key indicators of economic health, trends impacting the manufacturing sector, and what manufacturers should look out for in the f…
  continue reading
 
Episode 1 features Dr. Jim Davis, Vice Provost of IT at UCLA’s Office of Advanced Research Computing (OARC). Jim explains what artificial intelligence (AI) is, the process for how it works, and its value in the world of manufacturing. In addition, Jim offers recommendations for how SMMs can get started with AI as well as ensure long-term success wi…
  continue reading
 
Time to start looking into cyber security frameworks. For this episode we’re looking at the the NIST Cyber Security Framework. We’re also explaining what a cyber security framework is and how they can help. LINKS 1. NIST Cyber Security Framework (CSF) FIND US ON 1. Twitter - DamienHull 2. YouTubeBy SECTION 9
  continue reading
 
Glenn Langenburg and Eric Ray eventually discuss the results of the recent NIST Evaluation of Latent Friction Ridge Technology. But first there are a couple of detours. Glenn discusses recent testimony regarding questionable nanogram testing for the presence of drugs. Eric talks about the Cousins By Blood podcast and his involvement in that case. O…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2023 | Sitemap | Privacy Policy | Terms of Service