Podcasts

2021 CISO Choice Awards Vendor Recognition: Lynx Technology Partners with Richard Stiennon

Published: Nov. 19, 2021, 2:28 p.m.
Duration: 10 minutes 31 seconds

Listed in: News

2021 CISO Choice Awards Vendor Recognition: deepwatch with Richard Stiennon

Published: Nov. 16, 2021, 1:39 p.m.
Duration: 14 minutes 39 seconds

Listed in: News

2021 CISO Choice Awards Vendor Recognition: Salt Security with Richard Stiennon

Published: Nov. 16, 2021, 1:30 p.m.
Duration: 10 minutes 42 seconds

Listed in: News

2021 CISO Choice Awards Vendor Recognition: Telos with Richard Stiennon

Published: Nov. 16, 2021, 1:29 p.m.
Duration: 7 minutes 47 seconds

Listed in: News

2021 CISO Choice Awards Vendor Recognition: Stacklet with Richard Stiennon

Published: Nov. 16, 2021, 1:26 p.m.
Duration: 6 minutes 3 seconds

Listed in: News

2021 CISO Choice Awards Vendor Recognition: RackTop with Richard Stiennon

Published: Nov. 16, 2021, 1:26 p.m.
Duration: 9 minutes 37 seconds

Listed in: News

2021 CISO Choice Awards Vendor Recognition: Black Kite with Richard Stiennon

Published: Nov. 16, 2021, 1:19 p.m.
Duration: 12 minutes 32 seconds

Listed in: News

2021 CISO Choice Awards Vendor Recognition: Axonius with Richard Stiennon

Published: Nov. 16, 2021, 1:19 p.m.
Duration: 12 minutes 35 seconds

Listed in: News

2021 CISO Choice Awards Vendor Recognition: Armorblox with Richard Stiennon

Published: Nov. 16, 2021, 1:13 p.m.
Duration: 9 minutes 12 seconds

Listed in: News

Congratulations to the Winners of the 2021 CISO Choice Awards

Published: Oct. 26, 2021, 10 a.m.
Duration: 1 minute 14 seconds

Listed in: News

C100 Esteemed Judges Congratulate the Soon to Be Announced Winners

Published: June 25, 2021, 3:43 p.m.
Duration: 3 minutes 2 seconds

Listed in: News

CISOs Connect's CISOs Top 100 CISOs Awards 2021

Published: April 7, 2021, 4:49 p.m.
Duration: 2 minutes 42 seconds

Listed in: News

CISO Choice Awards Security Startup Winner Cyral Speaks with CISO Judge

Published: Dec. 23, 2020, 12:52 a.m.
Duration: 6 minutes 44 seconds

Listed in: News

Congratulations to the CISO Choice Awards 2020 Winners!

Published: Nov. 18, 2020, 2:02 p.m.
Duration: 2 minutes 7 seconds

Listed in: News

Hear what the charges against Joe Sullivan, former CSO of Uber, can mean for CSOs and CISOs

Published: Aug. 31, 2020, 8:47 p.m.
Duration: 27 minutes 5 seconds

Listed in: News

SC 136: Tomás Maldonado, CISO of the National Football League (NFL), speaks with Ian Keller, CSO of SBV Bank

Published: July 28, 2020, 6:26 p.m.
Duration: 21 minutes 8 seconds

Listed in: News

CISOs Talk Third Party Risk Management

Published: July 21, 2020, 4:56 p.m.
Duration: 5 minutes 18 seconds

Listed in: News

SC 134: SVP and CISO of Ellie Mae Selim Aissi shares his invaluable insights

Published: June 10, 2020, 3:02 p.m.
Duration: 11 minutes 23 seconds

Listed in: News

SC 133: Chief Information Security Officer (CISO) at Metropolitan Water District of Southern California Jake Margolis

Published: June 8, 2020, 12:49 p.m.
Duration: 10 minutes 50 seconds

Listed in: News

Listen to a sneak peek on our upcoming CISO Roundtable: The New Normal

Published: May 14, 2020, 9:43 a.m.
Duration: 1 minute 13 seconds

Listed in: News

SC 129: Chief Information Security Officer (CISO) Colin Anderson Discusses People Being Paramount During COVID-19

Published: May 11, 2020, 6:19 a.m.
Duration: 11 minutes 22 seconds

Listed in: News

SC 128: CISO David Levine of RICOH USA Talks Quickly Moving to a Remote Workforce Due to the Pandemic

Published: May 11, 2020, 5:57 a.m.
Duration: 14 minutes 2 seconds

Listed in: News

SC 126: Tufin Talks Increasing Security and Agility Through Security Policy Orchestration

Published: Nov. 7, 2017, 5:17 p.m.
Duration: 11 minutes 24 seconds

Listed in: News

Maxim Integrated Chief Cyber Risk Officer and SentinelOne's CEO Talk Endpoint Security, Automation and Visibility

Published: Sept. 28, 2017, 4:24 p.m.
Duration: 12 minutes 38 seconds

Listed in: News

SC 123: Bay Dynamics CEO Discusses How to Gain Insight in to Security Risks Using User Behavior Analytics

Published: Aug. 28, 2017, 11:46 a.m.
Duration: 9 minutes 17 seconds

Listed in: News

SC 122: CISO David Cass Talks Cloud Adoption and Security

Published: June 6, 2017, 6:46 p.m.
Duration: 14 minutes 41 seconds

Listed in: News

SC 121: Joey Johnson, Premise Health CISO, Discusses Challenges in Securing Distributed, Highly Regulated Environments

Published: March 27, 2017, 7:12 p.m.
Duration: 13 minutes 44 seconds

Listed in: News

SC 120: DocuSign CISO Discusses the Human Element of Incident Response

Published: Feb. 28, 2017, 9:18 p.m.
Duration: 13 minutes 24 seconds

Listed in: News

SC 115: Gartner Research VP Anton Chuvakin Speaks with Global CISO David Cass on Security Monitoring, SIEM and UBA

Published: Jan. 17, 2017, 3:37 p.m.
Duration: 11 minutes 17 seconds

Listed in: News

SC 113: Payment Card Processor Monext Discusses Continuous Compliance, Reducing Complexity and Heightening Security

Published: Nov. 29, 2016, 2:23 p.m.
Duration: 9 minutes 24 seconds

Listed in: News

SC 105: Part 3- CISO of IBM Cloud & SaaS Speaks with Spirent on Medical Device and Autonomous Car Hacking

Published: Aug. 11, 2016, 5:43 p.m.
Duration: 8 minutes 10 seconds

Listed in: News

SC 100: Part 2 CISO of IBM Cloud & SaaS Speaks with Spirent on Risk, Remediation, Testing and Technology

Published: June 28, 2016, 1:01 p.m.
Duration: 11 minutes 24 seconds

Listed in: News

SC 99: CISO David Cass Speaks to Spirent Communications on IoT, Ranswomware and More

Published: June 21, 2016, 2:56 p.m.
Duration: 11 minutes 19 seconds

Listed in: News

SC 96: IBM Cloud & SaaS CISO Speaks with Deloitte's CISO on Security and the Convergence of Technologies

Published: May 27, 2016, 4:21 p.m.
Duration: 16 minutes 57 seconds

Listed in: News

SC 95: Cloud Security Alliance Talks Challenges, CISO and Other Trends

Published: March 15, 2016, 9:32 p.m.
Duration: 9 minutes 36 seconds

Listed in: News

SC 94: Security Shark Tank Vendor Spotlight: Skyport Systems

Published: March 8, 2016, 6:02 a.m.
Duration: 14 minutes 4 seconds

Listed in: News

SC 93: Security Shark Tank Vendor Spotlight: Tempered Networks

Published: March 8, 2016, 5:42 a.m.
Duration: 10 minutes 59 seconds

Listed in: News

SC 92: Security Shark Tank Vendor Spotlight: Spikes Security

Published: March 8, 2016, 5:18 a.m.
Duration: 9 minutes 7 seconds

Listed in: News

SC 91: Security Shark Tank Vendor Spotlight: Pwnie Express

Published: March 8, 2016, 4:43 a.m.
Duration: 12 minutes 45 seconds

Listed in: News

SC 90: Security Shark Tank Vendor Spotlight: Interset

Published: March 8, 2016, 4:14 a.m.
Duration: 11 minutes 18 seconds

Listed in: News

SC 89: Security Shark Tank Vendor Spotlight: GuardiCore

Published: March 8, 2016, 3:54 a.m.
Duration: 10 minutes 7 seconds

Listed in: News

SC 88: Security Shark Tank Vendor Spotlight: ProtectWise

Published: March 8, 2016, 3:41 a.m.
Duration: 11 minutes 54 seconds

Listed in: News

SC 87: Security Shark Tank Vendor Spotlight: Exabeam

Published: March 7, 2016, 11:20 p.m.
Duration: 10 minutes 37 seconds

Listed in: News

SC 86: Social Media and Cyberterrorism - A Conversation with Cybercrime Expert Morgan Wright

Published: Feb. 16, 2016, 4:33 p.m.
Duration: 15 minutes 21 seconds

Listed in: News

SC 85: Security and Network Access Control at Barnabas Healthcare

Published: Feb. 10, 2016, 2:33 p.m.
Duration: 11 minutes 53 seconds

Listed in: News

SC 84: Of Encryption and Backdoor Access - A Conversation with a CISO

Published: Jan. 29, 2016, 2:38 p.m.
Duration: 9 minutes 18 seconds

Listed in: News

SC 83: Bug Bounty Programs: Trends in Developing Secure Software with SANS John Pescatore

Published: Jan. 13, 2016, 10:22 p.m.
Duration: 10 minutes 23 seconds

Listed in: News

A CISO Looks at Where We Go From Here in Information Security?

Published: Dec. 29, 2015, 3:21 p.m.
Duration: 14 minutes 59 seconds

Listed in: News

SC 81: Addressing the Growing Cybersecurity Threat in 2016 with Jason Witty, U.S. Bancorp CISO

Published: Dec. 23, 2015, 3:14 a.m.
Duration: 13 minutes 56 seconds

Listed in: News

SC 80: Hurdling Obstacles to Security Training and Awareness Success

Published: Nov. 30, 2015, 2:54 p.m.
Duration: 8 minutes 54 seconds

Listed in: News

SC 79: Software Defined Perimeters

Published: Nov. 5, 2015, 2:13 p.m.
Duration: 6 minutes 42 seconds

Listed in: News

SC 79: CISO Buying Trends, Approaches and Considerations

Published: Oct. 27, 2015, 6:04 p.m.
Duration: 10 minutes 50 seconds

Listed in: News

Creating and Managing a Security Aware Culture

Published: Oct. 20, 2015, 2:49 p.m.
Duration: 8 minutes 14 seconds

Listed in: News

SC 76: The European's "Safe Harbor" Provisions are Invalid. So What?

Published: Oct. 14, 2015, 2:22 p.m.
Duration: 6 minutes 51 seconds

Listed in: News

SC 74: Management Hierarchy and CISO Reporting Roles – Part 2 with CISO Brian Lozada

Published: Sept. 16, 2015, 2:45 p.m.
Duration: 10 minutes 28 seconds

Listed in: News

SC 73: Information Security in Hedge and Private Equity Funds - Part 1

Published: Sept. 8, 2015, 1:05 p.m.
Duration: 7 minutes 42 seconds

Listed in: News

SC 72: Vetting Security Startups -- Venture Capital Series Part 3

Published: Aug. 31, 2015, 3:10 p.m.
Duration: 13 minutes 33 seconds

Listed in: News

SC 71: What Happens When Your Security Vendor is Acquired –Venture Capital Series Part 2

Published: Aug. 18, 2015, 6 p.m.
Duration: 13 minutes 10 seconds

Listed in: News

SC 70: Security Shark Tank Quick Hits

Published: Aug. 13, 2015, 9:42 a.m.
Duration: 14 minutes 20 seconds

Listed in: News

SC 70: Experience Matters for Security Startups - Venture Capital Series Part 1

Published: Aug. 10, 2015, 6:48 a.m.
Duration: 8 minutes 21 seconds

Listed in: News

SC 69: Anton Chuvakin on the Operational Effectiveness of Security Analytics

Published: July 28, 2015, 6:19 p.m.
Duration: 9 minutes 35 seconds

Listed in: News

SC 68: DataStealth from Datex, Inc.- Transforming Sensitive Information Securely

Published: July 23, 2015, 12:34 p.m.
Duration: 12 minutes 42 seconds

Listed in: News

SC 67: Cloud SIEM Doesn't Really Exist - Yet

Published: July 20, 2015, 3:49 p.m.
Duration: 7 minutes 23 seconds

In conversation with Security Current's Vic Wheatman, Dr. Chuvakin provides a taxonomy for SIEM and describes for the definitional differences.

-->

Listed in: News

SC 66: Using User Behavior Intelligence To Identify Account Takeovers

Published: July 14, 2015, 8:52 p.m.
Duration: 6 minutes 28 seconds

Listed in: News

SC 65: Changing User Behavior Through Security Education

Published: July 10, 2015, 5:33 a.m.
Duration: 5 minutes 49 seconds

Listed in: News

SC 64: Overcoming Silos Between Security and Privacy

Published: July 6, 2015, 3:45 p.m.
Duration: 19 minutes 44 seconds

Listed in: News

SC 63: Gartner's Anton Chuvakin On the Failure of Security Policies

Published: June 29, 2015, 2:19 p.m.
Duration: 10 minutes 5 seconds

Listed in: News

SC 62: Augmenting the Past with Network Forensics

Published: June 5, 2015, 3:44 p.m.
Duration: 8 minutes 41 seconds

Listed in: News

SC 61: An Information Security Officer's Deep Thoughts

Published: June 1, 2015, 4:05 p.m.
Duration: 2 minutes 57 seconds

Listed in: News

SC 60: The Role of the CISO with Daniel Conroy, Synchrony Financial

Published: May 18, 2015, 3:25 p.m.
Duration: 12 minutes 54 seconds

Listed in: News

SC 59: Breach Detection with Seculert

Published: May 15, 2015, 2:37 p.m.
Duration: 3 minutes 41 seconds

Listed in: News

SC 58: A CISO Talks Security in Healthcare

Published: May 11, 2015, 5:29 p.m.
Duration: 8 minutes 33 seconds

Listed in: News

A CISO Reviews RSA 2015: Patricia Titus

Published: May 6, 2015, 3:09 p.m.
Duration: 4 minutes 13 seconds

Listed in: News

SC 56: The State of Cyber Security: Implications for 2015

Published: May 5, 2015, 4:25 p.m.
Duration: 7 minutes 14 seconds

 

-->

Listed in: News

SC 55: Next Generation Endpoint Protection

Published: May 1, 2015, 1:57 p.m.
Duration: 5 minutes 14 seconds

Listed in: News

Gartner Analyst on the Bus - Security Budgets Up as Staffing Down

Published: April 30, 2015, 5:47 p.m.
Duration: 4 minutes 24 seconds

Listed in: News

SC 53: The New Perimeter is Around the Cloud: CYREN Annual Report Details Latest Threats

Published: April 29, 2015, 3:51 p.m.
Duration: 14 minutes 16 seconds

Listed in: News

SC 52: Protecting Against Targeted Corporate Email Attacks

Published: April 27, 2015, 4:40 p.m.
Duration: 9 minutes 39 seconds

-->

Listed in: News

SC 51: Tempered Networks: Addressing TCP/IP Vulnerabilities

Published: April 14, 2015, 11:31 p.m.
Duration: 10 minutes 50 seconds

For more on the Security Shark Tank visit www.securitysharktank.com

-->

Listed in: News

SC 50: Security Analytics: Buy or Build

Published: April 7, 2015, 3:48 p.m.
Duration: 9 minutes 38 seconds

In any case, the buy versus build discussion becomes much more than binary. Dr. Chuvakin explores this largely undefined territory with Security Current's Vic Wheatman.

-->

Listed in: News

SC 49: A Five-time CISO on Attacks, Security Personnel Shortages and More

Published: March 25, 2015, 9:16 p.m.
Duration: 8 minutes 21 seconds

Listed in: News

SC 48: Automotive Security and the Car of the Future

Published: March 24, 2015, 1:55 a.m.
Duration: 7 minutes 11 seconds

Listed in: News

SC 47: Cloud Security Monitoring, Cloud Access Security Brokers and MSSPs

Published: March 4, 2015, 5:35 p.m.
Duration: 7 minutes 27 seconds

Emerging between the enterprise and the cloud are Cloud Access Security Brokers or CASBs. These topics are explored in this discussion between Security Current's Vic Wheatman and Gartner Research Vice President Dr. Anton Chuvakin.

-->

Listed in: News

SC 46: Addressing a Critical Vulnerability Management Problem

Published: March 2, 2015, 6:50 p.m.
Duration: 8 minutes 1 second

Listed in: News

SC 45: The Security Hits Keep Coming

Published: Feb. 24, 2015, 5:56 p.m.
Duration: 7 minutes 38 seconds

Listed in: News

SC 44: FBI Views on Cybersecurity

Published: Feb. 18, 2015, 3:13 p.m.
Duration: 11 minutes 23 seconds

Listed in: News

SC 43: The City of San Diego's CISO Talks About Security & Innovation

Published: Feb. 11, 2015, 8:25 p.m.
Duration: 14 minutes 41 seconds

Listed in: News

SC 42: Emerging Deception Techniques, Technologies and Tools

Published: Feb. 4, 2015, 4:50 a.m.
Duration: 6 minutes 29 seconds

Listed in: News

SC 40: Aviation Security: Who's Watching Out for Us?

Published: Jan. 27, 2015, 8:18 p.m.
Duration: 8 minutes 15 seconds

Listed in: News

SC 40: A Small Company Takes on the Devil Inside the Beltway

Published: Jan. 6, 2015, 6:49 p.m.
Duration: 19 minutes 41 seconds

Listed in: News

SC 39: Legal Issues with BYOD

Published: Dec. 29, 2014, 3:05 p.m.
Duration: 7 minutes 46 seconds

Listed in: News

SC 38: Where Are the New Security Professionals Coming From?

Published: Dec. 15, 2014, 5:06 p.m.
Duration: 11 minutes 3 seconds

Listed in: News

SC 37: How History Impacts Security Around the World

Published: Dec. 9, 2014, 7:49 p.m.
Duration: 8 minutes 9 seconds

Listed in: News

SC 36: Securing the API Economy: A CISO Tutorial

Published: Dec. 4, 2014, 2:41 a.m.
Duration: 9 minutes 5 seconds

Listed in: News

SC 35: A Secure Internet of Things Ecoysystem

Published: Nov. 21, 2014, 7:13 a.m.
Duration: 7 minutes 34 seconds

Listed in: News

SC 34: PKI and Securing the Internet of Things

Published: Nov. 18, 2014, 2:59 a.m.
Duration: 11 minutes 57 seconds

Listed in: News

SC 33: Smart Carpets and Cheney's Heart

Published: Nov. 11, 2014, 2:22 p.m.
Duration: 12 minutes 16 seconds

Listed in: News

SC 32: Information Sharing Among Security Executives

Published: Nov. 6, 2014, 6:46 p.m.
Duration: 9 minutes 42 seconds

Listed in: News

SC 31: An Interview with the First CISO, Steve Katz Formerly of Citigroup

Published: Oct. 31, 2014, 3:53 a.m.
Duration: 12 minutes 36 seconds

Listed in: News

SC 30: Securing Embedded Systems on the Internet of Things

Published: Oct. 24, 2014, 3:30 a.m.
Duration: 10 minutes 2 seconds

Listed in: News

SC 29: Overcoming Security Silos

Published: Oct. 22, 2014, 5:58 p.m.
Duration: 10 minutes 7 seconds

Listed in: News

SC 28: Threat Intelligence: What it Is. How it is Used.

Published: Oct. 17, 2014, 3:18 p.m.
Duration: 8 minutes 14 seconds

Listed in: News

SC 27: Data Loss Prevention Use Cases

Published: Oct. 9, 2014, 8:29 p.m.
Duration: 11 minutes 29 seconds

Listed in: News

SC 26: Security Incident Response and the Lack of Sleep

Published: Sept. 26, 2014, 4:35 a.m.
Duration: 13 minutes 37 seconds

Listed in: News

SC 25: History of Malware and How Privacy Gets No Respect

Published: Sept. 17, 2014, 2:56 p.m.
Duration: 16 minutes 32 seconds

Listed in: News

SC 24: Do Honeypots Still Have Value in Network Security?

Published: Sept. 12, 2014, 2:31 p.m.
Duration: 5 minutes 27 seconds

Listed in: News

SC 23: Raytheon's Perspectives on Commercial Information Security Projects

Published: Sept. 10, 2014, 7:49 p.m.
Duration: 13 minutes 28 seconds Why should a commercial entity consider a defense contractor for security projects?Answering the question is Edward Hammersla, President of Raytheon's Trusted Computer Solutions, Inc.

Mr. Hammersla provides perspective on the role of trusted operating systems, the ways of protecting data in a highly sensitive bring your own device (BYOD) environment and the appeal of using the term "cyber" in describing today's approaches to information security. Mr. Hammersla was speaking with securitycurrent's Vic Wheatman.     

-->

Listed in: News

SC 22: Live Attack Intelligence, Big Data and the X-Ray Machine that Could Hack

Published: Aug. 20, 2014, 8:29 a.m.
Duration: 11 minutes 28 seconds

Listed in: News

SC 21: Yale New Haven Health System Cyber Security Case Study

Published: Aug. 18, 2014, 8:11 p.m.
Duration: 12 minutes 24 seconds

Listed in: News

SC 20: Securing the Branch Location and Remote Site

Published: Aug. 11, 2014, 5:44 p.m.
Duration: 11 minutes 34 seconds

Listed in: News

SC19: "Backoff" Point of Sales Malware, Ransomware and More

Published: Aug. 10, 2014, 7:10 p.m.
Duration: 10 minutes 58 seconds

Listed in: News

SC 18: The Bad Guys Get Smarter

Published: Aug. 9, 2014, 12:21 a.m.
Duration: 15 minutes 29 seconds

Listed in: News

SC 17: Sex Tapes, Cloud and Security

Published: July 9, 2014, 2:58 p.m.
Duration: 13 minutes 10 seconds

Listed in: News

SC 16: Is Big Data Analytics for Security Mainstream?

Published: July 3, 2014, 11:38 a.m.
Duration: 10 minutes 32 seconds

Listed in: News

SC 15: From UserID and Password to Digital ID

Published: June 2, 2014, 8:01 p.m.
Duration: 7 minutes 31 seconds

Listed in: News

SC 14: Flavors of Intelligence

Published: May 19, 2014, 9:54 p.m.
Duration: 5 minutes 26 seconds

Listed in: News

SC 13: Voltage Spies Secure Email

Published: May 1, 2014, 1:59 p.m.
Duration: 7 minutes 52 seconds

Listed in: News

SC 12: PCI DSS Version 3, What's New?

Published: April 17, 2014, 2:28 p.m.
Duration: 10 minutes 25 seconds

Listed in: News

SC 11: Tools for Securing the Cloud

Published: April 15, 2014, 4:14 p.m.
Duration: 5 minutes 3 seconds

Listed in: News

SC 10: IT Security Entrepreneurs Forum 2014; Bridging the Gap Between the Federal Government and Private Industry

Published: April 10, 2014, 3:20 p.m.
Duration: 5 minutes 45 seconds

Listed in: News

SC 009: Data Visualization in Threat Intelligence

Published: March 31, 2014, 6:57 p.m.
Duration: 7 minutes 27 seconds

Listed in: News

SC 008: Pentesting and Hacking Hardware

Published: March 26, 2014, 2:24 p.m.
Duration: 8 minutes 14 seconds

Listed in: News

SC 007: What is Tokenization?

Published: March 21, 2014, 3:42 p.m.
Duration: 9 minutes 9 seconds

Listed in: News

SC 006: Security and the Internet of (Every)Thing

Published: March 18, 2014, 1:20 p.m.
Duration: 11 minutes 28 seconds

Listed in: News

E5 Vic Wheatman Discusses Threat Intelligence with Spire Security's Pete Lindstrom

Published: March 10, 2014, 7:27 p.m.
Duration: 4 minutes 7 seconds

Listed in: News

E-4 Vic Wheatman Speaks to Hytrust's President Eric Chui on Defensive Cloud and Virtualization

Published: March 3, 2014, 5:57 a.m.
Duration: 9 minutes 32 seconds

Listed in: News

E3 Victor Wheatman speaks with Trend Micro on what c-level executives needs to know about information security

Published: Feb. 28, 2014, 5:59 p.m.
Duration: 11 minutes 57 seconds

Listed in: News

E2 Victor Wheatman Discusses Symantec's CyberWar Games with Forrester and Enterprise Management Analysts

Published: Feb. 24, 2014, 6:58 a.m.
Duration: 6 minutes 10 seconds

Listed in: News

E1 Vic Wheatman Speaks with Gartner's Lawrence Pingree on the NSA & RSA

Published: Feb. 19, 2014, 6:38 p.m.
Duration: 5 minutes 33 seconds

Listed in: News