ID | Interpret | Skladba | Album | |
61. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
62. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction | CERT's Podcasts for Business Leaders | |
63. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
64. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted | CERT’s Podcasts for Business Leaders | |
65. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 2: How To Help Ensure Graduates Are Successful | CERT’s Podcasts for Business Leaders | |
66. | Gene Kim | The Security 'X' Factor - Part 2: Taking Action | CERT Podcasts for Business Leaders | |
67. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 2: The Shifting Vulnerability Landscape | CERT's Podcasts for Business Leaders | |
68. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
69. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
70. | Gary Hinson | Getting in Front of Social Engineering - Part 1: Why We're Susceptible | CERT's Podcasts for Business Leaders | |
71. | Gary Hinson | Getting in Front of Social Engineering | CERT's Podcasts for Business Leaders | |
72. | Gary Hinson | Getting in Front of Social Engineering - Part 3: Detective, Corrective, and Preventive Actions | CERT's Podcasts for Business Leaders | |
73. | Gary Hinson | Getting in Front of Social Engineering - Part 2: Identifying Social Engineering Attempts and Attacks | CERT's Podcasts for Business Leaders | |
74. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 1: Metrics as a Means for Directing Attention and Energy | CERT's Podcasts for Business Leaders | |
75. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 3: Where to Start | CERT's Podcasts for Business Leaders | |
76. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 2: Challenges and Tips for Implementing Standard Configurations | CERT’s Podcasts for Business Leaders | |
77. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 2: Some Challenges, and Work in Progress | CERT's Podcasts for Business Leaders | |
78. | Clint Kreitner | Getting to a Useful Set of Security Metrics | CERT's Podcasts for Business Leaders | |
79. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 3: Having the Collective Will to Make It Stick | CERT’s Podcasts for Business Leaders | |
80. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
81. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most | CERT's Podcasts for Business Leaders | |
82. | Gene Kim | The Security 'X' Factor - Part 3: Overcoming Hurdles | CERT Podcasts for Business Leaders | |
83. | Gene Kim | The Security 'X' Factor - Part 1: The Study | CERT Podcasts for Business Leaders | |
84. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 2: Benchmarking and Situational Awareness | CERT's Podcasts for Business Leaders | |
85. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
86. | Gene Kim | Connecting the Dots between IT Operations and Security | CERT's Podcasts for Business Leaders | |
87. | Gene Kim | The Security 'X' Factor | CERT Podcasts for Business Leaders | |
88. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 1: The Disconnects, and Why Business Leaders Should Care | CERT's Podcasts for Business Leaders | |
89. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
90. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |