ID | Interpret | Skladba | Album | |
151. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 1: Understanding the Threat | CERT’s Podcasts for Business Leaders | |
152. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
153. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security | CERT's Podcasts for Business Leaders | |
154. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
155. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 3: Starting Up a Secure Coding Project; Barriers and First Steps | CERT's Podcasts for Business Leaders | |
156. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
157. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 2: Some Challenges, and Work in Progress | CERT's Podcasts for Business Leaders | |
158. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 1: Background and Evolution from OCTAVE | CERT's Podcasts for Business Leaders | |
159. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
160. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
161. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
162. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes | CERT's Podcasts for Business Leaders | |
163. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
164. | Chris Alberts | Rethinking Risk Management - Part 2: Managing Risks across the Life Cycle; Using the Mosaic Toolkit | CERT's Podcasts for Business Leaders | |
165. | Chris Alberts | Rethinking Risk Management | CERT's Podcasts for Business Leaders | |
166. | Chris May | Better Incident Response through Scenario-Based Training - Part 1: Train as You Fight: Use Scenario-Based Exercises | CERT's Podcasts for Business Leaders | |
167. | Steve Huth & Steve Kalinowski | IT Infrastructure: Tips for Navigating Tough Spots - Part 1: Mastering Merger Hazards | CERT\'s Podcasts for Business Leaders | |
168. | Steve Huth & Steve Kalinowski | IT Infrastructure: Tips for Navigating Tough Spots - Part 3: Business-Side Buy-In and Tone from the Top | CERT\'s Podcasts for Business Leaders | |
169. | Steve Huth & Steve Kalinowski | IT Infrastructure: Tips for Navigating Tough Spots - Part 2: What to Do When You Inherit Trouble | CERT\'s Podcasts for Business Leaders | |
170. | Steve Huth & Steve Kalinowski | IT Infrastructure: Tips for Navigating Tough Spots | CERT\'s Podcasts for Business Leaders | |
171. | Chris Alberts | Rethinking Risk Management - Part 3: Dealing with Preventable Failures | CERT's Podcasts for Business Leaders | |
172. | Chris May | Better Incident Response through Scenario-Based Training | CERT's Podcasts for Business Leaders | |
173. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
174. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
175. | Chris May | Better Incident Response through Scenario-Based Training - Part 3: Using XNET for Simple and Complex Scenarios | CERT's Podcasts for Business Leaders | |
176. | Mary Ann Davidson | Developing Secure Software: Universities as Supply Chain Partners - Part 1: The Software Security Knowledge Gap | CERT's Podcasts for Business Leaders | |
177. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
178. | Greg Newby | The Human Side of Security Trade-Offs | CERT’s Podcasts for Business Leaders | |
179. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
180. | Georgia Killcrece & Robin Ruefle | The Real Secrets of Incident Management - Part 1: Communication Is Key | CERT's Podcasts for Business Leaders | |