Computing and Information Technology

By Plymouth University

About this podcast   English    United States

At Plymouth, we offer general courses such as Computing and Computer Science to more specialised courses which focus on our enterprise and research strengths in areas such as security, networking and robotics, all of which equip Plymouth graduates with up-to-the-minute knowledge and skills.
268 episodes · since Jul, 2010
In this podcast

Computing

Information Technology

Machine generated. There may be errors. Report errors to us.
July 20, 2017
Each wave of technology brings its own challenges in terms of new threats and expected safeguards, and it is arguable that we have not caught up with yesterday’s challenges yet. Steven Furnell moderates a panel session with Elisa Bertino, Nancy Cam-Winget, Edgar Weippl, and Ali Ghorbani to discuss the issue. The panel was part of the ICISSP 2017 conference in Porto from 19-21 February 2017. [(CC) BY-NC-SA 2.0 UK]
May 11, 2017
Nathan Clarke describes two approaches to utilising transparent biometrics for investigating and attributing insider misuse: a proactive approach that embeds biometrics within digital objects (to identify and attribute the source of any stolen information); and a reactive measure that seeks to identify users from network meta-data. The talk was part of the panel session at the 16th Annual Security Conference, held in Las Vegas from 18-20 April 2017. [(CC) BY-NC-SA 2.0 UK]
March 28, 2017
Tiger Team assessments can be specifically tailored to a company's threats (encompassing IT, physical and human security) and reflect the actual risk for the company. Thomas Hackner discusses all three areas and demonstrates typical vulnerabilities, along with the solutions required to protect companies. The talk was part of Secure South West 8 at Plymouth University on 7 February 2017. [(CC) BY-NC-SA 2.0 UK]
March 20, 2017
In a landscape characterised by hacking, malware, phishing and other attacks, how is cybercrime affecting trust and confidence in technologies we depend upon? What should we be most concerned about? How much can technology protect us? Are we keeping pace, or perpetually playing catch-up? Steven Furnell chairs a panel discussion, with Nathan Clarke, Victoria Stone and Pete Woodward. The session was part of Secure South West 8 at Plymouth University on 7 February 2017. [(CC) BY-NC-SA 2.0 UK]
March 13, 2017
It is acknowledged that cyber security is critical to UK PLC, enabling business to prosper in a safe environment. Robin King considers elements key to the UK’s ability to step forward with an enhanced, nationally-embraced improvement in baseline cyber security. He explores views shared from several organisations directly addressing the challenges of supply chain assurance. The talk was part of Secure South West 8 at Plymouth University on 7 February 2017. [(CC) BY-NC-SA 2.0 UK]
March 13, 2017
Rob Partridge talks about how employers and employees can develop skills for themselves and in their workforce using innovative approaches to learning and education, specifically in the security environment. He also talks about dispelling myths around cyber skills and challenging employers to change recruitment practices to find talented security professionals. The session was part of Secure South West 8 at the University of Plymouth on 7 February 2017. [(CC) BY-NC-SA 2.0 UK]
March 13, 2017
Jane Dickinson talks about CompTIA's approach to supporting individuals and businesses with security readiness, including the CyberSecure certification (which empowers individuals to keep themselves – and organisations they work for – safe online), and the Cybersecurity Pathway, which supports development of the security skills each IT professional requires, according to job role. The talk was part of Secure South West 8 at Plymouth University on 7 February 2017. [(CC) BY-NC-SA 2.0 UK]
Jan. 15, 2017
While it is tempting to write off passwords, research suggests that weaknesses relating to user behaviour can be addressed by more effective guidance and feedback. Related findings are presented as scene-setting for a panel discussion, considering the pros and cons of sustaining password-based approaches, and the feasibility of moving to alternatives. The session was part of the 50th Hawaii International Conference on System Sciences from 5 January 2017. [(CC) BY-NC-SA 2.0 UK]
Dec. 12, 2016
Recognising the breadth of cyber security, there is a corresponding recognition of the widening need for skills - from strategists to specialists – and the contexts in which they are needed. Steven Furnell considers the current state of cyber security skills, including how we recognise them, whether we have them, and how this positions us for the future. The session was part of the Cyber Career Development Event, hosted by the IISP in London on 25 November 2016. [(CC) BY-NC-SA 2.0 UK]
Nov. 28, 2016
Thinking offensively will harden a business' cyber defenses. Ian Trump, Global Security Lead for SolarWindsMSP describes the common attacks which leave a business infrastructure in tatters. The reality of cyber defense is it's the simple - and in some cases free - things which can be done to catch and stop attackers. The session was part of Secure South West 7, at Plymouth University on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]

Podcasts like "Computing and Information Technology"   ·   View all

By Center for Strategic and International Studies
By Swinburne University of Technology
By Blaez Lowell / Anchor
By Jason Hiner, Bill Detwiler and the TechRepublic team
Disclaimer: The podcast and artwork embedded on this page are from Plymouth University, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.