Once a technological marvel, the idea of a wireless connection to the Internet has become so engrained in the digital world that it is hard to fathom a time when that was not the case. But just because Wi-Fi has gone mainstream does not mean it is static. In this episode of the Cyber Pros Exchange series, security experts Dustin Brewer and Frank Downs consider the history of Wi-Fi, how it reached its position today and why it’s so important that it be secured properly.
The wave of remote working arrangements implemented as a response to the COVID-19 pandemic has introduced new and often unpredictable IT vulnerabilities. This has made it all the more important to identify Key Risk Indicators, or KRIs, as a method of providing a warning before risk can develop any further. In this episode of the ISACA Podcast, sponsored by Galvanize, Greg Slayton discusses ways that the pandemic has stretched technology’s limits and how organizations can use KRIs to restore proper risk management.
Putting effective privacy measures into practice can be a difficult task for organizations that lack a comprehensive, well-documented privacy strategy. Without one, enterprises may be exposing customer data to vulnerabilities, and could find themselves at risk of noncompliance with privacy regulations. In this episode of the podcast, Tim Clements, a featured speaker at EuroCACS 2020, explains why every organization should be creating and implementing a privacy strategy, what is at risk if one does not exist and how to get started with creating one. Clements will host the EuroCACS session “Privacy Strategy and Roadmap—Do You Have One, and Is It Aligned With Your Business Strategy?” with Clara Kromann from Pandora on 28 October 2020.
Once considered a privilege, remote work has become a necessity resulting from the public health risk posed by COVID-19. Telecommunication technologies such as video conferencing are core tools in the adoption of remote work, but virtual communication lacks the depth of in-person professional connections. In this episode of the ISACA Podcast, Vasant Raval and Edward Morse discuss how to make working from home productive, secure and personally fulfilling.
At its core, blockchain functions to maintain the integrity of data and systems. But how does it compare to other databases and when should it be used? In this episode of the ISACA podcast, cybersecurity experts Dustin Brewer and Frank Downs define blockchain, explain how it relates to cryptocurrency and the cloud, and discuss applications where it may prove useful.
Most organizations would agree that privacy by design is fundamental to growing a successful business and building customer trust. Yet putting this ideal into practice can often prove challenging. In this episode of the podcast, ISACA Journal columnist Steven Ross elaborates on his article “Privacy by Implementation and Execution” and explores some of the obstacles of implementing privacy by design.
When it comes to the ever-expanding field that is cybersecurity, passionate practitioners should adopt the attitude that there is always more to learn. Yet it is true that the very foundation of one’s education can impact what direction a career takes. In this episode of the ISACA podcast, Dustin Brewer and Frank Downs explore the value of cybersecurity degrees compared to certificates, and discuss how each accreditation can take participants in a different direction professionally.
The thought of taking a risk can dredge up feelings of discomfort or even outright fear for many. This reluctance has only been amplified by the uncertainty stemming from the COVID-19 pandemic. In this podcast, the Governance, Risk and Control (GRC) Conference 2020 keynote speaker Caspar Berry discusses the importance of taking risks and how not taking a risk may be costlier than taking a risk and failing.
Cybersecurity frameworks can be a valuable tool for organizations, helping them implement best practices and establish documentation for complex processes. But with so many different cybersecurity frameworks to choose from, selecting the right one can be challenging. In this episode of the ISACA podcast, Frank Downs and Dustin Brewer discuss what constitutes a framework, why there seem to be so many out there and how to determine what framework will best fit your enterprise.
As the role of technology has expanded, so has the amount of personal data that are being shared. While people want to protect their privacy, there is often a tradeoff between being able to use a service and not sharing data about yourself. In this podcast, Frank Downs and Dustin Brewer discuss the information we share and how to decide if we want to keep it private.