artofinfosecAuthor: Erik Heidt
15 Aug 2018

artofinfosec

Download, listen or watch all podcasts

Random Insights on Protecting Data, Privacy, and Digital Infrastructure

  • Listen

    AoIS Resurrection… to blogs.Gartner.com

    As you may have noticed there has been no activity on Art of Information Security for a long time. Things got really busy in my work and personal lives, and well, something had to give. One of those changes is a move to the Security and Risk Management Strategies team at Gartner. I will be […]

  • Posted on 17 May 2013

    download
  • Listen

    ((AoIS Webcast)) Cryptography: Issues and Insight from Practical Implementations

    Kevin Flanagan and I delivered a presentation on Cryptography at this year’s RSA 2010. Now, doing a cryptography presentation at RSA is a bit like putting a target on yourself that says “please shoot me down!”. Well, the presentation was very well received, and the RSA conference folks have asked Kevin and I to do […]

  • Posted on 17 Jun 2010

    download
  • Listen

    Add Some Architecture to RSA 2010

    Once again the RSA Conference is giving Dan Houser and I the opportunity to provide a one-day Identity Management Architecture tutorial. One-day tutorials can be added to your RSA Conference registration for a small fee. These sessions are designed to provide more depth and detail on particular important topics. This year’s program is titled “Foundations […]

  • Posted on 07 Jan 2010

    download
  • Listen

    Auditing Time…

    Time is critical in security systems; specifically, having systems know the time  is very important. Adequate clock synchronization is important for: Operational Integrity (things happen when they are supposed to happen – backups, tasks, etc.) Reproducibility of events (meaningful logs and records) Validation of SSL certificate expiration (or other tokens, etc.) Correct application of time restricted controls Etc. So, the […]

  • Posted on 01 Jul 2009

    download
  • Listen

    AoIS Interviews Heather Deem, Part 2

    Welcome to the second part of Art of Information Security’s interview with seasoned Information Security marketer Heather Deem (part 1 link). In the first part Heather discussed the importance of having reasonable time and resource expectations. In this part we will start off by discussing some low cost marketing techniques. Erik: Are there any ‘free’ (but effective) marketing activities […]

  • Posted on 12 May 2009

    download

Follow Playlisto