ID | Interpret | Skladba | Album | |
121. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 2: Allegro's Eight Steps, and Getting Started | CERT's Podcasts for Business Leaders | |
122. | Betsy Nichols | Building a Security Metrics Program | CERT’s Podcasts for Business Leaders | |
123. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 2: Benchmarking Challenges and Some Works In Progress | CERT’s Podcasts for Business Leaders | |
124. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
125. | Rich Caralli | Adapting to Changing Risk Environments: Operational Resilience - Part 2: Determining How Much Is Enough | CERT's Podcasts for Business Leaders | |
126. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted | CERT’s Podcasts for Business Leaders | |
127. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 1: The Disconnects, and Why Business Leaders Should Care | CERT's Podcasts for Business Leaders | |
128. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives | CERT’s Podcasts for Business Leaders | |
129. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
130. | Gene Kim | Connecting the Dots between IT Operations and Security | CERT's Podcasts for Business Leaders | |
131. | Gene Kim | The Security 'X' Factor | CERT Podcasts for Business Leaders | |
132. | Georgia Killcrece & Robin Ruefle | The Real Secrets of Incident Management | CERT's Podcasts for Business Leaders | |
133. | Chris May | Better Incident Response through Scenario-Based Training - Part 2: Training Geographically Distributed Teams: CERT’s XNET | CERT's Podcasts for Business Leaders | |
134. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 2: Assuring Mission Success | CERT's Podcasts for Business Leaders | |
135. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 3: Methods and Tools for Tackling Risk in Complex Environments | CERT's Podcasts for Business Leaders | |
136. | Christopher Alberts | Assuring Mission Success in Complex Environments | CERT's Podcasts for Business Leaders | |
137. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 3: Collaboration Among National CSIRTs - How Business Leaders Can Benefit | CERT’s Podcasts for Business Leaders | |
138. | Paul Love | Making Information Security Policy Happen | CERT's Podcasts for Business Leaders | |
139. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders | CERT’s Podcasts for Business Leaders | |
140. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 2: How Business Leaders Can Interact with National CSIRTs | CERT’s Podcasts for Business Leaders | |
141. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 1: An Introduction to National CSIRTs | CERT’s Podcasts for Business Leaders | |
142. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 3: Having the Collective Will to Make It Stick | CERT’s Podcasts for Business Leaders | |
143. | Clint Kreitner | Getting to a Useful Set of Security Metrics | CERT's Podcasts for Business Leaders | |
144. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks | CERT’s Podcasts for Business Leaders | |
145. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 2: How Can I Find Out if a Peer-to-Peer Disclosure Has Occurred? | CERT’s Podcasts for Business Leaders | |
146. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 2: Challenges and Tips for Implementing Standard Configurations | CERT’s Podcasts for Business Leaders | |
147. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 3: The Upside and the Downside of Peer-to-Peer | CERT’s Podcasts for Business Leaders | |
148. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 3: Where to Start | CERT's Podcasts for Business Leaders | |
149. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 1: Metrics as a Means for Directing Attention and Energy | CERT's Podcasts for Business Leaders | |
150. | Ralph Hood & Kim Howell | Integrating Privacy Practices into the Software Development Lifecycle - Part 3: Gain Parental Consent; Ensure Privacy in the SDL | CERT�s Podcasts for Business Leaders | |