We retired this podcast, because we couldn't parse it for 10 consecutive times.
Date | Title & Description | Contributors |
---|---|---|
2016-10-31 |
Millennials Rising! Will a Younger Workforce Increase Federal Security Risk? With hundreds of thousands of millennials expected to enter the federal workforce over the next few years, agencies must quickly develop strategies which balance demands for anytime / anywhere access with concerns about millennial apathy towards cybers... |
|
2016-07-04 | In ICIT's 2016 report entitled "Combatting the Ransomware Blitzkrieg", the institute shed light on what later became one of the most talked about cybersecurity phenomenon of the year. During this discussion, ICIT Sr. Fellow Parham Eftekhari and ICIT F... |
|
2016-05-30 |
ICIT Insights: Improving Resiliency with User Behavior Analytics As security professionals focus increasingly on predictive technologies, user behavior analytics has emerged as powerful tool which can bolster an organization's security strategy. Join Rick Caccia from Exabeam, an ICIT Fellow organization, and Parham... |
|
2016-05-06 |
ICIT Fellow Insights: Securing User Credentials - A Cyber Hygiene Requirement Despite years of discussion on the importance of identity management, the majority of organizations still grapple with this basic component of cyber hygiene and fail to adequately secure user credentials. ICIT Sr. Fellow Parham Eftekhari speaks with G... |
|
2016-04-06 |
ICIT Fellow Insights: The State of Cybersecurity Operations 2016 ICIT Fellow HPE has recently published its "State of Cybersecurity Operations" report which found that SOC security has declined over 2015. Join ICIT Fellow Stan Wisseman and Sr. Fellow Parham Eftekhari as they dig deeper into these findings to uncove... |
|
2016-02-27 |
ICIT Fellow Insights: Why Leadership Should Be the Top Priority Public and private sector leaders are slowly accepting the reality that the weakest link - and greatest asset - in their cybersecurity strategy is the human element. The question which now must be answered is how to best train, motivate and inspire th... |
|
2016-01-28 |
Why Industrial Control Systems are the most Important – and Complex – to Secure Our Nation's energy, water, transportation and other physical critical infrastructures are woefully unprepared for cyber attacks due to archaic infrastructures, frankenstiened networks and complex ecosystems with multiple disparate - yet interdependent... |
|
2015-07-02 |
ICIT Fellow Insights: Why OPM's Breach was a Game Changer, Risk to the Victims, & Recommendations The OPM Breach has gripped headlines and is considered the biggest known breach against the U.S. Government. But what about this breach is different than the others aside from the sheer volume of victims that has caused it to gain such notoriety both i... |
|
2015-06-26 |
ICIT Fellow Insights: Proposed Cyber Legislation And Their Impact On The Security Community As the number of breach incidents continues to climb, the importance of a highly skilled cybersecurity workforce on protecting our nation's critical infrastructure sectors continues to grow. But how does proposed legislation impact the cyber communiti... |
|
2015-04-19 |
ICIT Fellow Insights: Targeted Cyber Attacks Against Critical Infrastructures Targeted attacks against our nation's critical infrastructures are on the rise, attacks are affecting every industry and all branches of the government, and the enemy is not only able to bypass security measures, becoming increasingly sophisticated in ... |
|