Podcasts about data breach study

  • 5PODCASTS
  • 11EPISODES
  • 32mAVG DURATION
  • ?INFREQUENT EPISODES
  • Aug 11, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about data breach study

Latest podcast episodes about data breach study

Help Me With HIPAA
2023 Cost of a Data Breach Study - Ep 419

Help Me With HIPAA

Play Episode Listen Later Aug 11, 2023 54:17


As in years past, we dive into IBM's 2023 Cost of a Data Breach Report. This annual study sheds light on the ever-evolving landscape of data breaches and provides valuable insights for organizations looking for ways to focus their efforts and money to help prevent and reduce the costs associated with a data breach. More info at HelpMeWithHIPAA.com/419

Speakeasy Security
OMG! Another data breach!

Speakeasy Security

Play Episode Listen Later Jun 18, 2020 24:44


Think that data breaches have slowed down? Think again. Tony and Ranson discuss the alarming rate at which data breaches have been occurring and how some of the best-known companies in the world have been affected. What actions consumers can take to limit their exposure? Listen to this week’s episode and learn how to proactively protect your data. Links mentioned IBM and Ponemon Institute Cost of a Data Breach Study: https://www.ibm.com/security/data-breach Haveibeenpwnd: https://haveibeenpwned.com/ State of California Attorney General list of Data Breaches: https://oag.ca.gov/privacy/databreach/list

Paradigm Shift with Christina Martini
077 Effectively Tackling Cybersecurity Threats: An Interview with Libby Benet – Part 2 of 2

Paradigm Shift with Christina Martini

Play Episode Listen Later Dec 10, 2019 26:45


In this episode, Christina Martini and Libby Benet discuss:  Areas of cybersecurity that need to be evaluated by organizations.  What business leaders and employees can do to get more information on cyber security threats.  Where to go to get a cybersecurity evaluation.  Navigating through finding materials online.  Key Takeaways:  There are different types of evaluations of cybersecurity with different questions and tools depending on the purpose.  Powering down your computer can help prevent your computer from causing a breach or being affected by a breach.  Have a cyber response protocol in place.  Prevention is key. The costs associated with no having prevention in place are high. "The topic, the whole area of cybersecurity, is really an ecosystem. Different companies have different levels of maturity." — Libby Benet About Libby Benet: Libby is currently the President of Cyber Secure Work Inc., a cybersecurity, privacy and insurance consulting practice located in Maryland. She has been in the insurance and reinsurance industry for over 30 years. Libby spent time at Beazley Insurance Group as the US Lead Treaty Underwriter for specialty lines products including cyber liability. Prior to that, she held various senior treaty underwriting positions managing professional lines, employment practices and cyber liability with General Reinsurance Inc., a Berkshire Hathaway Company. She has also worked for Zurich in primary underwriting of various property and casualty products. In the mid 1990’s, Ms. Benet became a licensed Maryland Attorney and worked in private practice. She served as Chair of the Emerging Issues Committee of the Torts and Insurance Practice section of the ABA. She is a member of the Minnesota Lawyers Mutual Board of Directors. Through the International Association of Privacy Professionals (IAPP) Libby is a Certified Information Privacy Professional (CIPP US) and certified as a Privacy Information Manager (CIPM). Episode References: “Into the Web of Profit. Understanding the Growth of the Cyber Crime Economy” (https://www.bromium.com/wp-content/uploads/2018/05/Into-the-Web-of-Profit_Bromium.pdf) - Dr. Michael McGuire Cost of a Data Breach Study (https://www.ibm.com/security/data-breach) - IBM Security Report Cybersecurity Framework (https://www.nist.gov/topics/cybersecurity) – National Institute of Standards and Technology (NIST) Connect with Libby Benet: Email: LBenet@Assured.Enterprises & LBenet@CyberSecureWork.com LinkedIn: Libby Benet (https://www.linkedin.com/in/libbybenet/) Connect with Christina Martini: Twitter: @TinaMartini10 (https://twitter.com/TinaMartini10?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor) Website: www.paradigmshiftshow.com (http://www.paradigmshiftshow.com/) LinkedIn: Christina Martini (https://www.linkedin.com/in/christinamartini) Email: christinamartini.paradigmshift@gmail.com Show notes by Podcastologist: Chelsea Taylor-Sturkie Audio production by Turnkey Podcast Productions. (https://www.turnkeypodcast.com/) You're the expert. Your podcast will prove it. 

Paradigm Shift with Christina Martini
076 Effectively Tackling Cybersecurity Threats: An Interview with Libby Benet – Part 1 of 2

Paradigm Shift with Christina Martini

Play Episode Listen Later Dec 3, 2019 29:50


In this episode, Christina Martini and Libby Benet discuss:  The scope of the cyber security problem that businesses face today.  The main threats that drive cyber breach losses.  The greatest sources of cyber threat over the last 12-18 months.  How cybersecurity depends on employees and members of all levels of a business.    Key Takeaways:  Thousands of businesses are impacted by cyber breaches every year – and may don’t even know it.  Cybersecurity is a team effort at all levels.   It is surprisingly easy to perpetrate cybercrimes.    "All employees of a company are responsible. Employees are both a good first line of defense, and also a source of attacks." — Libby Benet    About Libby Benet: Libby is currently the President of Cyber Secure Work Inc., a cybersecurity, privacy and insurance consulting practice located in Maryland. She has been in the insurance and reinsurance industry for over 30 years. Libby spent time at Beazley Insurance Group as the US Lead Treaty Underwriter for specialty lines products including cyber liability. Prior to that, she held various senior treaty underwriting positions managing professional lines, employment practices and cyber liability with General Reinsurance Inc., a Berkshire Hathaway Company. She has also worked for Zurich in primary underwriting of various property and casualty products. In the mid 1990’s, Ms. Benet became a licensed Maryland Attorney and worked in private practice. She served as Chair of the Emerging Issues Committee of the Torts and Insurance Practice section of the ABA. She is a member of the Minnesota Lawyers Mutual Board of Directors. Through the International Association of Privacy Professionals (IAPP) Libby is a Certified Information Privacy Professional (CIPP US) and certified as a Privacy Information Manager (CIPM).    Episode References:  “Into the Web of Profit. Understanding the Growth of the Cyber Crime Economy” (https://www.bromium.com/wp-content/uploads/2018/05/Into-the-Web-of-Profit_Bromium.pdf) - Dr. Michael McGuire  Cost of a Data Breach Study (https://www.ibm.com/security/data-breach) - IBM Security Report  Cybersecurity Framework (https://www.nist.gov/topics/cybersecurity) – National Institute of Standards and Technology (NIST)    Connect with Libby Benet:    Email: LBenet@Assured.Enterprises & LBenet@CyberSecureWork.com  LinkedIn: Libby Benet (https://www.linkedin.com/in/libbybenet/)     Connect with Christina Martini:    Twitter: @TinaMartini10 (https://twitter.com/TinaMartini10?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor)   Website: www.paradigmshiftshow.com (http://www.paradigmshiftshow.com/)   LinkedIn: Christina Martini (https://www.linkedin.com/in/christinamartini)   Email: christinamartini.paradigmshift@gmail.com        Show notes by Podcastologist: Chelsea Taylor-Sturkie    Audio production by Turnkey Podcast Productions. (https://www.turnkeypodcast.com/) You're the expert. Your podcast will prove it. 

The Intrazone by Microsoft
Crawl, Walk, Run to the Cloud

The Intrazone by Microsoft

Play Episode Listen Later Apr 16, 2019 67:47


In this episode we examine what customers do when they first move to the cloud, and review steps to compliment that move with search best practices and backup technologies. We hear firsthand from customer Love's Travel Stops & County Stores their ongoing process moving from on premises to the cloud. And Matt McDermott from Spanning Cloud Apps talks in depth about cloud data backup, protection, the 93-day recycle bin limit and retention policies.  Running Time: 67min Show Intro [00:00:00:00] Topic of the Week – Early Cloud Adoption Guest Perspective with Love’s Travel Stops & Country Stores [00:13:50:00] Guest Perspective with Matt McDermott  Upcoming Events [00:55:15:00] FAQs Roundtable [00:58:35:00] Show Wrap [01:06:10:00] Social and Info Links: SharePoint Community Blog SharePoint Facebook @MSSharePoint SharePoint Twitter @SharePoint Mark Kashman Twitter @mkashman Chris McNulty Twitter @cmcnulty2000 Matt McDermott, Spanning Cloud Apps, principal technical marketing engineer Web | Twitter | LinkedIn Daryl Bowdoin, Manager of Business Systems, Love’s Travel Stops & Country Stores – @LovesTravelStop | website | LinkedIn Marrell Sanders, Senior AppDev Administrator, Love’s Travel Stops & Country Stores – @TechRevMarrell | @LovesTravelStop | website | LinkedIn Resources: 2018 Cost of a Data Breach Study by Ponemon Institute  "Overview of retention policies"  "Restore items in the Recycle Bin of a SharePoint site"   Upcoming Events: SPS Events, Twitter @SPS_Events April 20th - Boise, Idaho (St. Luke's Anderson Center). April 27th - Doha - Microsoft Campus, Qatar. May 4th - Chicago at the DeVry University #SPSChiBurbs, @SPSChicagoBurbs SharePoint Fest, Washington, D.C., April 29 - May 3, @SharePointFest Microsoft Build 2019, Seattle, WA, May 6-8, SharePoint Conference North America, Las Vegas, NV, May 21-23, European Collaboration Summit, Wiesbaden, Germany, May 27-29 Microsoft Ignite | The Tour (various cities worldwide)  Microsoft Business Applications Summit, Atlanta, GA, June 10-11 ESPC, European SharePoint, Office 365 & Azure Conference - Dec.2-5 (Prague, Czech Republic)  Subscribe to The Intrazone: Show Page: https://aka.ms/TheIntrazone Apple Podcasts Google Play Spotify Stitcher Overcast RadioPublic iHeart RSS

Security Intelligence Podcast
Larry Ponemon Goes Behind the Scenes of the 2018 Cost of a Data Breach Study

Security Intelligence Podcast

Play Episode Listen Later Jul 24, 2018 26:30


The 2018 Cost of a Data Breach Study from Ponemon Institute, released earlier this month, breaks down precisely what lost and stolen records could cost companies this year. So, there's no better time to chat with Dr. Larry Ponemon, founder of the Ponemon Institute, about historical highlights of the annual study, how things have changed in the last decade, and what's next for corporate data breaches and cybersecurity overall. To learn more, read the blog [https://ibm.co/2v8MnV1] and download the complete 2018 Cost of a Data Breach Study [https://ibm.co/2NDPVGc].

Security Intelligence Podcast
IBM and Senetas: Providing Secure Data Collaboration In An Insecure World

Security Intelligence Podcast

Play Episode Listen Later Sep 28, 2017 13:28


In this podcast, Julian Fay, CTO of Senetas, joins Deepraj Emmanuel Datt, Solution Design Leader at IBM Security Services Asia-Pacific, for a conversation about data protection and secure data collaboration. Listen now to discover the unique capabilities of Senetas' enterprise-grade SureDrop file-sharing platform [http://bit.ly/2xNVtcw], including full encryption, data sovereignty and key management control. You'll also hear about how IBM and Senetas are working together to promote secure data collaboration and storage in ASEAN and beyond. For a better understanding of why data security is so critical to data's enterprise, read the 2017 Ponemon Institute Cost of a Data Breach Study: https://ibm.co/2w0A9zd.

Security Intelligence Podcast
IBM and Check Point: Taking On Security Challenges In Asia Pacific And Around The World

Security Intelligence Podcast

Play Episode Listen Later Aug 22, 2017 16:46


Organizations around the world confront serious security challenges every day, and companies in the Asia-Pacific region are no exception. In this podcast, Evan Dumas, Head of Emerging Technologies for APAC, Middle East and Africa at Check Point Software, joins Deepraj Emmanuel Datt, Solution Design Leader at IBM Security Services Asia-Pacific, for a conversation about the key security challenges facing their clients and best practices for fighting back. Listen now to learn not only how IBM and Check Point are each protecting their own clients against advanced cyber threats, but also how the two companies are working together to automate endpoint detection, increase threat visibility and extend security to cloud deployments. To learn more about the latest developments in the IBM-Check Point partnership, read the article, "IBM and Check Point: Breaking New Ground in Collaborative Defense" [https://ibm.co/2x8FQts] and check out the new Check Point SmartView for QRadar app on the IBM App Exchange [http://bit.ly/2wjNCDf]. You can also download the 2017 Ponemon Institute Cost of a Data Breach Study, including individual reports for ANZ, ASEAN, India and Japan: https://ibm.co/2w0A9zd.

Help Me With HIPAA
Breach reporting costs and decisions for 2017 - Ep 111

Help Me With HIPAA

Play Episode Listen Later Jul 13, 2017 48:17


In June, the NY State Attorney General announced a settlement with CoPilot, a healthcare services company that illegally deferred notice of breach of more than 220,000 patient records.  Another annual report was also just released with the latest numbers : 2017 Cost of a Data Breach Study from Ponemon Institute and IBM.  Today, we are going to discuss how the two of them can help us all make better decisions where potential breaches of PHI are concerned.  Breach reporting costs and decisions in 2017 are proving to be something you should understand before a crisis, not after one hits. For more info: HelpMeWithHIPAA.com/111

Security Intelligence Podcast
RSA Asia Preview: A Look at the ASEAN Threat Landscape

Security Intelligence Podcast

Play Episode Listen Later Jul 11, 2017 18:29


With the 2017 RSA Asia Pacific and Japan Conference set to kick off in Singapore in just two weeks, now is the perfect time to take a look at the threat landscape in the Association of Southeast Asian Nations (ASEAN). In this podcast, IBM Executive Security Advisor Diana Kelley talks with Security Sales Specialist Liang Yang Loi about the security challenges organizations in ASEAN are facing today, with a focus on smaller businesses that may not have a dedicated security or incident response team. For more insights from Diana, Yang and other IBM experts, we invite you to visit IBM at RSA Asia at Booth P06 and attend the following sessions: Proxy Wars — New Cybercrime Threats and Defence Technologies: http://bit.ly/2v8G6qp Avoiding Cybersecurity Groundhog Day—Taking Security into the Future: http://bit.ly/2tJcsIZ You can also download the new 2017 Ponemon Institute Cost of a Data Breach Study for ASEAN: https://ibm.co/2tJorGE

Help Me With HIPAA
Healthcare Data Breach Study - Ep 61

Help Me With HIPAA

Play Episode Listen Later Jul 8, 2016 33:10


Since 2010, ID Experts has sponsored this Ponemon Institute study which has been tracking data breach trends of patient data at healthcare organizations. The annual economic impact of a data breach has risen over the past six years, as has the frequency of data breaches. Criminal attacks and internal threats are the leading cause of healthcare breaches. Evolving cyber attack threats such as ransomware and malware are of primary concern for 2016. At the same time, internal issues such as employee negligence, third-party snafus, and stolen computing devices continue to put patient data at risk. For more info on this episode go to helpmewithhipaa.com/61 28w47ezq