ISF Podcast
Episodes
Virtual Reality and a New Code of Ethics (Emory Craig, Part 2)
22 Nov 2018
Contributed by Lukas
Virtual reality has a great deal of potential for the betterment of society - but as with all new technologies, we should be aware of ethical concerns...
A Futurist's Insights on Virtual & Augmented Reality (Emory Craig, Part 1)
15 Nov 2018
Contributed by Lukas
Virtual, augmented and mixed reality has made tremendous progress over the last 4 years. Since then the landscape has dramatically shifted - consumers...
Doing Business the Cyber Way
23 Oct 2018
Contributed by Lukas
The traditional way of doing business is transforming, with businesses now required to adopt and embed cyber technology into their organisation. The s...
ISF Podcast: Cybersecurity Exercises: Enhanced Breach Response
09 Oct 2018
Contributed by Lukas
Cyber-attacks are steadily increasing year on year. Organisations are constantly under threat with over two-thirds experiencing data breaches in 2017....
Healthy Social Media and Technology Habits (Scott Amyx, Part 3)
03 Oct 2018
Contributed by Lukas
Social media has transformed the way users behave online and offline. It has prevailed over the last decade and billions of people around the world en...
The Global Economic Impact of Artificial Intelligence and Machine Learning (Scott Amyx, Part 2)
26 Sep 2018
Contributed by Lukas
‘Artificial Intelligence’ has materialised much faster than leading researchers and security professionals in the field expected and the future of...
A Futurist's View on IoT and its Implications for Businesses and Consumers (Scott Amyx, Part 1)
18 Sep 2018
Contributed by Lukas
The ‘Internet of Things’ is a name given to exponential technologies encompassing our physical devices, vehicles, home appliances and increasingly...
Marketing Teams - Adopt New Tactics to Increase Business
11 Sep 2018
Contributed by Lukas
Following the introduction of GDPR and new e-privacy laws, sales and marketing teams are under pressure to think of new tactics and methods in which t...
Data Breach Response
01 Aug 2018
Contributed by Lukas
The probability of a data breach for most organisations is highly likely, with it being a matter of ‘when’ not ‘if’. IT and security leaders a...
M&A Best Practices for Cybersecurity
24 Jul 2018
Contributed by Lukas
Today, acquirer companies in M&A’s are intensifying their cyber security due diligence during the negotiation period. Why? Because the cyber-ris...
The Challenges of Integrating Security into the Product Development Process (Richard Guida, Part 3)
19 Jul 2018
Contributed by Lukas
In the final part of this 3-part business leaders podcast series, Richard Guida, former CISO at Johnson & Johnson, and Steve Durbin, Managing Dire...
Is AI & Machine Learning Contributing to the Skills Shortage?
17 Jul 2018
Contributed by Lukas
Artificial intelligence and machine learning are redefining cyber security, re-engineering threat detection tools and exposing sophisticated attacks –...
Third Party Suppliers - Where is my data?
12 Jul 2018
Contributed by Lukas
A survey with ISF Members revealed that only 50% of organisations have a sufficient framework in place to manage third parties suppliers, and they don...
Connected Devices and Data Security: The Challenges to Business and the Consumer (Richard Guida, Part 2)
10 Jul 2018
Contributed by Lukas
In the second part of this 3-part business leaders podcast, Steve Durbin, Managing Director at ISF and Richard Guida, Managing Director at Guida Techn...
Steve Durbin in Conversation with Richard Guida - Part 1
24 Jun 2018
Contributed by Lukas
In the first of this 3 part Business Leaders podcast, Steve Durbin, Managing Director at the ISF talks with Richard Guida, Managing Director at Guida ...
Mobile Apps: My kingdom for an app!
24 Jun 2018
Contributed by Lukas
Increasingly organisations are incorporating mobile apps into their customer service offerings, however struggle to overcome the challenge of adequate...
GDPR SOS: Are we too late to meet compliance?
17 May 2018
Contributed by Lukas
In this podcast, Steve Durbin, Managing Director at the Information Security Forum, shares the 5 key actions organisations can take today to demonstra...
Building a Workforce for the Future: All roads lead to the CISO
24 Apr 2018
Contributed by Lukas
Recognising the need to build a sustainable security workforce is of real concern to organisations across all sectors, as any shortfalls in skills and...
Protect your critical information assets before it's too late
06 Feb 2018
Contributed by Lukas
When your most critical information assets represent 80% of your organisations total value, it’s important to know exactly what they are, where they...
Who is the real insider threat to you business?
23 Jan 2018
Contributed by Lukas
Insider threats account for 54% off all breaches, and are found at all levels of an organisation, from top to bottom. Numerous factors are increasing ...
Ransomware? The currency of cyber criminals...
10 Jan 2018
Contributed by Lukas
The frequency of ransomware attacks on businesses has significantly grown over the past two years, with the number of detections increasing by nearly ...
The CISO Reset: Redefining your value to the business
19 Dec 2017
Contributed by Lukas
The role of a CISO has evolved over the years’ and now requires someone who combines InfoSec capabilities with business requirements. They must be a...
EU GDPR for India: Are you ready to protect your European customers' data?
06 Dec 2017
Contributed by Lukas
With the main industries in India comprising IT Services providers, banks and conglomerates such as Tata Group, Birla Group, Mahindra, and Reliance wh...
Cyber and the Board: Stop making excuses and start making the decisions that matter
29 Nov 2017
Contributed by Lukas
When we talk about the board and cyber security, we have moved away from the board doesn’t get it, to the board gets it, to the board doesn’t feel...
IoT: All I did was press the button on my smartphone
21 Nov 2017
Contributed by Lukas
The smartphone has become an extension of our work and our personal life – everyone expects to be able to access something with a click of the butto...
Tackling the Cyber Skills Shortage: Innovation is Key
06 Sep 2017
Contributed by Lukas
As organisations of all sizes try to be more agile in responding to emerging threats, finding people with the right skill set is something of a challe...
Falsification: How to protect the integrity of data
15 Aug 2017
Contributed by Lukas
As organisations become increasingly dependent on data, unscrupulous competitors and cyber criminals are using falsified information as a form of atta...
GDPR Compliance: Full disclosure becomes a reality
26 Jul 2017
Contributed by Lukas
Many organisations with a footprint in Europe are still unclear if the GDPR applies to them, or if they have the right team and resources to address i...
Emerging Technology: AI's role in business
27 Jun 2017
Contributed by Lukas
Artificial Intelligence is a growing trend across industry sectors from medical and legal to automotive and manufacturing. However, the new capabiliti...
Building Cybersecurity into the mergers and acquisitions process
12 Jun 2017
Contributed by Lukas
Increasingly, organisations are waking up to the negative business impact of poor cybersecurity programmes and are taking cyber incidents more serious...
Threats to Critical Infrastructure: Internet as a utility
22 May 2017
Contributed by Lukas
In a digital age, the internet is viewed by businesses and individuals alike as a basic utility. Businesses are dependent upon it and this, in itself,...
The NY DFS: How the ISF can help
04 May 2017
Contributed by Lukas
In March 2017, the New York Department for Financial Services (DFS) implemented a Cyber Security regulation, requiring financial institutions to estab...
The Role of the End User - the Weakest or Strongest Link
22 Feb 2017
Contributed by Lukas
People remain a ‘wild card’ to the cyber security of an organisation. Many businesses recognise people as their biggest asset, yet still fail to r...
Government & Regulators Won't Do it for You
01 Feb 2017
Contributed by Lukas
The GDPR will require extreme preparation in order for organisations to meet new compliance rules. Businesses cannot rely on the government and regula...
Cyber Crime Syndicates Take a Quantum Leap
11 Jan 2017
Contributed by Lukas
Cyber-crime syndicates have rapidly matured and have now become businesses. With rogue states taking advantage of these services, the resulting cyber ...
The Internet of Things Adds Unmanaged Risks
11 Jan 2017
Contributed by Lukas
It is expected that 28.4 billion devices will be connected in 2017. IoT devices offer a way in for cyber-attacks. So what are the risks and how will t...
Managing Through a Breach, with Steve Durbin
28 Nov 2016
Contributed by Lukas
Organisations that suffer an incident face challenging and damaging circumstances: • data stolen • financial penalties • legislative and ...
Aligning Cyber Security to Business Strategy, with Steve Durbin
28 Nov 2016
Contributed by Lukas
ISF research shows that some of the largest organisations have misaligned cyber security practices. This podcast, in conversation with Steve Durbin, M...
Cyber Resilience in Today's Threat Environment, with Steve Durbin
28 Nov 2016
Contributed by Lukas
It is not a matter of if – but when you will experience a cyber-attack. Steve Durbin, Managing Director at the ISF, offers insights into how ISF Mem...
CISO And The Board: Triggers Of Engagement, with Steve Durbin
28 Nov 2016
Contributed by Lukas
With CISO’s busy preparing for an inevitable cyber-attack, triggers of engagement to communicate with the board have never been more important. In t...