ID | Interpret | Skladba | Album | |
31. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
32. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
33. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
34. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 1: Understanding the Threat | CERT’s Podcasts for Business Leaders | |
35. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 3: The Upside and the Downside of Peer-to-Peer | CERT’s Podcasts for Business Leaders | |
36. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 2: Being Prepared for an e-Discovery Request | CERT's Podcasts for Business Leaders | |
37. | David Matthews | Integrating Security Incident Response and e-Discovery | CERT's Podcasts for Business Leaders | |
38. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
39. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 3: A Common Process: Incident Management and e-Discovery; Key Roles | CERT's Podcasts for Business Leaders | |
40. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 4: Key Roles; Steps for Getting Started | CERT's Podcasts for Business Leaders | |
41. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
42. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
43. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
44. | Dawn Cappelli | Protecting Against Insider Threat - Part 1: The Threat | CERT Podcasts for Business Leaders | |
45. | Dawn Cappelli | Protecting Against Insider Threat | CERT Podcasts for Business Leaders | |
46. | Dawn Cappelli | Protecting Against Insider Threat - Part 2: Warning Signs | CERT Podcasts for Business Leaders | |
47. | Dawn Cappelli | Protecting Against Insider Threat - Part 3: Mitigating Insider Threat | CERT Podcasts for Business Leaders | |
48. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 4: Software Process and Raising Awareness | CERT’s Podcasts for Business Leaders | |
49. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 1: The Increasing Scope and Importance of Business Continuity Planning | CERT’s Podcasts for Business Leaders | |
50. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 3: Developing & Exercising a Business Continuity Plan | CERT’s Podcasts for Business Leaders | |
51. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 2: Determining What to Protect; Identifying Key Players | CERT’s Podcasts for Business Leaders | |
52. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
53. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 1: The Resiliency Engineering Model | CERT’s Podcasts for Business Leaders | |
54. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity | CERT’s Podcasts for Business Leaders | |
55. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 2: Applying the Model to Operations | CERT’s Podcasts for Business Leaders | |
56. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 2: How Can I Find Out if a Peer-to-Peer Disclosure Has Occurred? | CERT’s Podcasts for Business Leaders | |
57. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks | CERT’s Podcasts for Business Leaders | |
58. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 2: Allegro's Eight Steps, and Getting Started | CERT's Podcasts for Business Leaders | |
59. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application | CERT's Podcasts for Business Leaders | |
60. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro | CERT's Podcasts for Business Leaders | |