Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

ISF Podcast

Technology Business

Activity Overview

Episode publication activity over the past year

Episodes

Showing 301-340 of 340
«« ← Prev Page 4 of 4

Virtual Reality and a New Code of Ethics (Emory Craig, Part 2)

22 Nov 2018

Contributed by Lukas

Virtual reality has a great deal of potential for the betterment of society - but as with all new technologies, we should be aware of ethical concerns...

A Futurist's Insights on Virtual & Augmented Reality (Emory Craig, Part 1)

15 Nov 2018

Contributed by Lukas

Virtual, augmented and mixed reality has made tremendous progress over the last 4 years. Since then the landscape has dramatically shifted - consumers...

Doing Business the Cyber Way

23 Oct 2018

Contributed by Lukas

The traditional way of doing business is transforming, with businesses now required to adopt and embed cyber technology into their organisation. The s...

ISF Podcast: Cybersecurity Exercises: Enhanced Breach Response

09 Oct 2018

Contributed by Lukas

Cyber-attacks are steadily increasing year on year. Organisations are constantly under threat with over two-thirds experiencing data breaches in 2017....

Healthy Social Media and Technology Habits (Scott Amyx, Part 3)

03 Oct 2018

Contributed by Lukas

Social media has transformed the way users behave online and offline. It has prevailed over the last decade and billions of people around the world en...

The Global Economic Impact of Artificial Intelligence and Machine Learning (Scott Amyx, Part 2)

26 Sep 2018

Contributed by Lukas

‘Artificial Intelligence’ has materialised much faster than leading researchers and security professionals in the field expected and the future of...

A Futurist's View on IoT and its Implications for Businesses and Consumers (Scott Amyx, Part 1)

18 Sep 2018

Contributed by Lukas

The ‘Internet of Things’ is a name given to exponential technologies encompassing our physical devices, vehicles, home appliances and increasingly...

Marketing Teams - Adopt New Tactics to Increase Business

11 Sep 2018

Contributed by Lukas

Following the introduction of GDPR and new e-privacy laws, sales and marketing teams are under pressure to think of new tactics and methods in which t...

Data Breach Response

01 Aug 2018

Contributed by Lukas

The probability of a data breach for most organisations is highly likely, with it being a matter of ‘when’ not ‘if’. IT and security leaders a...

M&A Best Practices for Cybersecurity

24 Jul 2018

Contributed by Lukas

Today, acquirer companies in M&A’s are intensifying their cyber security due diligence during the negotiation period. Why? Because the cyber-ris...

The Challenges of Integrating Security into the Product Development Process (Richard Guida, Part 3)

19 Jul 2018

Contributed by Lukas

In the final part of this 3-part business leaders podcast series, Richard Guida, former CISO at Johnson & Johnson, and Steve Durbin, Managing Dire...

Is AI & Machine Learning Contributing to the Skills Shortage?

17 Jul 2018

Contributed by Lukas

Artificial intelligence and machine learning are redefining cyber security, re-engineering threat detection tools and exposing sophisticated attacks –...

Third Party Suppliers - Where is my data?

12 Jul 2018

Contributed by Lukas

A survey with ISF Members revealed that only 50% of organisations have a sufficient framework in place to manage third parties suppliers, and they don...

Connected Devices and Data Security: The Challenges to Business and the Consumer (Richard Guida, Part 2)

10 Jul 2018

Contributed by Lukas

In the second part of this 3-part business leaders podcast, Steve Durbin, Managing Director at ISF and Richard Guida, Managing Director at Guida Techn...

Steve Durbin in Conversation with Richard Guida - Part 1

24 Jun 2018

Contributed by Lukas

In the first of this 3 part Business Leaders podcast, Steve Durbin, Managing Director at the ISF talks with Richard Guida, Managing Director at Guida ...

Mobile Apps: My kingdom for an app!

24 Jun 2018

Contributed by Lukas

Increasingly organisations are incorporating mobile apps into their customer service offerings, however struggle to overcome the challenge of adequate...

GDPR SOS: Are we too late to meet compliance?

17 May 2018

Contributed by Lukas

In this podcast, Steve Durbin, Managing Director at the Information Security Forum, shares the 5 key actions organisations can take today to demonstra...

Building a Workforce for the Future: All roads lead to the CISO

24 Apr 2018

Contributed by Lukas

Recognising the need to build a sustainable security workforce is of real concern to organisations across all sectors, as any shortfalls in skills and...

Protect your critical information assets before it's too late

06 Feb 2018

Contributed by Lukas

When your most critical information assets represent 80% of your organisations total value, it’s important to know exactly what they are, where they...

Who is the real insider threat to you business?

23 Jan 2018

Contributed by Lukas

Insider threats account for 54% off all breaches, and are found at all levels of an organisation, from top to bottom. Numerous factors are increasing ...

Ransomware? The currency of cyber criminals...

10 Jan 2018

Contributed by Lukas

The frequency of ransomware attacks on businesses has significantly grown over the past two years, with the number of detections increasing by nearly ...

The CISO Reset: Redefining your value to the business

19 Dec 2017

Contributed by Lukas

The role of a CISO has evolved over the years’ and now requires someone who combines InfoSec capabilities with business requirements. They must be a...

EU GDPR for India: Are you ready to protect your European customers' data?

06 Dec 2017

Contributed by Lukas

With the main industries in India comprising IT Services providers, banks and conglomerates such as Tata Group, Birla Group, Mahindra, and Reliance wh...

Cyber and the Board: Stop making excuses and start making the decisions that matter

29 Nov 2017

Contributed by Lukas

When we talk about the board and cyber security, we have moved away from the board doesn’t get it, to the board gets it, to the board doesn’t feel...

IoT: All I did was press the button on my smartphone

21 Nov 2017

Contributed by Lukas

The smartphone has become an extension of our work and our personal life – everyone expects to be able to access something with a click of the butto...

Tackling the Cyber Skills Shortage: Innovation is Key

06 Sep 2017

Contributed by Lukas

As organisations of all sizes try to be more agile in responding to emerging threats, finding people with the right skill set is something of a challe...

Falsification: How to protect the integrity of data

15 Aug 2017

Contributed by Lukas

As organisations become increasingly dependent on data, unscrupulous competitors and cyber criminals are using falsified information as a form of atta...

GDPR Compliance: Full disclosure becomes a reality

26 Jul 2017

Contributed by Lukas

Many organisations with a footprint in Europe are still unclear if the GDPR applies to them, or if they have the right team and resources to address i...

Emerging Technology: AI's role in business

27 Jun 2017

Contributed by Lukas

Artificial Intelligence is a growing trend across industry sectors from medical and legal to automotive and manufacturing. However, the new capabiliti...

Building Cybersecurity into the mergers and acquisitions process

12 Jun 2017

Contributed by Lukas

Increasingly, organisations are waking up to the negative business impact of poor cybersecurity programmes and are taking cyber incidents more serious...

Threats to Critical Infrastructure: Internet as a utility

22 May 2017

Contributed by Lukas

In a digital age, the internet is viewed by businesses and individuals alike as a basic utility. Businesses are dependent upon it and this, in itself,...

The NY DFS: How the ISF can help

04 May 2017

Contributed by Lukas

In March 2017, the New York Department for Financial Services (DFS) implemented a Cyber Security regulation, requiring financial institutions to estab...

The Role of the End User - the Weakest or Strongest Link

22 Feb 2017

Contributed by Lukas

People remain a ‘wild card’ to the cyber security of an organisation. Many businesses recognise people as their biggest asset, yet still fail to r...

Government & Regulators Won't Do it for You

01 Feb 2017

Contributed by Lukas

The GDPR will require extreme preparation in order for organisations to meet new compliance rules. Businesses cannot rely on the government and regula...

Cyber Crime Syndicates Take a Quantum Leap

11 Jan 2017

Contributed by Lukas

Cyber-crime syndicates have rapidly matured and have now become businesses. With rogue states taking advantage of these services, the resulting cyber ...

The Internet of Things Adds Unmanaged Risks

11 Jan 2017

Contributed by Lukas

It is expected that 28.4 billion devices will be connected in 2017. IoT devices offer a way in for cyber-attacks. So what are the risks and how will t...

Managing Through a Breach, with Steve Durbin

28 Nov 2016

Contributed by Lukas

Organisations that suffer an incident face challenging and damaging circumstances:  • data stolen  • financial penalties  • legislative and ...

Aligning Cyber Security to Business Strategy, with Steve Durbin

28 Nov 2016

Contributed by Lukas

ISF research shows that some of the largest organisations have misaligned cyber security practices. This podcast, in conversation with Steve Durbin, M...

Cyber Resilience in Today's Threat Environment, with Steve Durbin

28 Nov 2016

Contributed by Lukas

It is not a matter of if – but when you will experience a cyber-attack. Steve Durbin, Managing Director at the ISF, offers insights into how ISF Mem...

CISO And The Board: Triggers Of Engagement, with Steve Durbin

28 Nov 2016

Contributed by Lukas

With CISO’s busy preparing for an inevitable cyber-attack, triggers of engagement to communicate with the board have never been more important. In t...

«« ← Prev Page 4 of 4