Computing and Information Technology

By Plymouth University

About this podcast   English    United States

At Plymouth, we offer general courses such as Computing and Computer Science to more specialised courses which focus on our enterprise and research strengths in areas such as security, networking and robotics, all of which equip Plymouth graduates with up-to-the-minute knowledge and skills.
268 episodes · since Jul, 2010
In this podcast

Computing

Information Technology

Machine generated. There may be errors. Report errors to us.
Episodes published before Nov. 28, 2016
Nov. 22, 2016
Footage from the Retro Gaming 2016 event, hosted at Plymouth University on 7th November 2016 (part of the South West Retro Computing Archive collaboration with the BCS South West Branch). [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]
Nov. 21, 2016
Data protection remains high on the agenda, as the ICO continues to take action against organisations who fail to fulfil their obligations under the law. Victoria Cetinkaya provides a timely reminder of data controller obligations under the current law, together with a look at the changes (and uncertainties) afoot for the future data protection framework in the UK. The session was part of Secure South West 7 at Plymouth University on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]
Nov. 14, 2016
Steven Furnell moderates a panel session discussing the need for cyber security skills and the implications of the widely recognised skills shortage. Providing the expert input are Peter Fischer from the IISP, Maria Papadaki from Plymouth University, and Peter Woodward from Securious Ltd. The session was part of Secure South West 7, at Plymouth University on 5 October 2016. [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]
Nov. 7, 2016
In a threat landscape dominated by malware that is designed to be as unobtrusive as possible, ransomware stands out as a blunt instrument in the hands of cybercriminals. David Emm explains what ransomware is, how it works, what techniques cybercriminals use, and what organisations need to do to secure their data. The session was part of Secure South West 7 on 5 October 2016. [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]
Oct. 31, 2016
This presentation addresses the complexity, scale and depth of information security challenges within an environment; it defines a methodical approach that can be transferred to other organisations to remediate the problems identified. Craig Douglas and Paul Ferrier introduce the Enterprise Architecture approach to consolidate, evolve and orchestrate Information Security developments at Plymouth University. The session was part of Secure South West 7 on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]
Oct. 24, 2016
John Finch examines the anatomy of a cyber-attack that caused a breach of public sector data, considering the impact assessment, the remediation applied, and future implications. This details a type of data breach that has been happening for years, but is now becoming more widely publicised. The talk considers what you can do about it, how to spot it and what can be done nationally. The session was part of Secure South West 7 at Plymouth University on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]
Oct. 17, 2016
A recurrent theme of exploits and attacks on ICT systems is a root cause resulting from software weaknesses, with certain risks (e.g. Buffer Overflows) recurring on a depressingly frequent basis. In this talk, Ian Bryant covers the Trustworthy Software approach, which is intended to be a proactive management system to mitigate many frequently occurring risks. The session was part of Secure South West 7 at Plymouth University on 5 October 2016. [(CC) BY-NC-SA 2.0 UK]
Aug. 18, 2016
The ICT professional has to design, develop, and maintain appropriate measures in ICT systems to provide assurance that they are secure enough. The ICT professional must have the right knowledge, skills and competencies, must be responsible and accountable, and has a duty of care. In this keynote talk from HAISA 2016, Leon Strous asks how we can achieve a situation where our profession meets the expectations. [(CC) BY-NC-SA 2.0 UK]
June 3, 2016
Given the ease with which our online data can be gathered by manual search and automated tools, should we take more care over what we share? Prof. Steven Furnell moderates a panel session that considers the implications and risks of online data sharing, and the potential impacts for both individuals and their employers. The panel was a joint event from the South West branches of BCS and IISP, hosted at Plymouth University on 26 May 2016. [(CC) BY-NC-SA 2.0 UK]
May 20, 2016
Steven Furnell moderates a panel exploring the varying views around cybersecurity, considering whether the name reflects something distinct or just a case of rebranding, before going on to discuss whether this even matters given the increased prominence it has given to security issues. The panel was part of the 15th Annual Security Conference in Las Vegas from 29-31 March 2016. [Released under Creative Commons Attribution-NonCommercial-ShareAlike 2.0 UK: England & Wales licence.]

Podcasts like "Computing and Information Technology"   ·   View all

By Center for Strategic and International Studies
By Swinburne University of Technology
By Blaez Lowell / Anchor
By Jason Hiner, Bill Detwiler and the TechRepublic team
Disclaimer: The podcast and artwork embedded on this page are from Plymouth University, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.