ID | Interpret | Skladba | Album | |
31. | Chris Alberts | Rethinking Risk Management - Part 2: Managing Risks across the Life Cycle; Using the Mosaic Toolkit | CERT's Podcasts for Business Leaders | |
32. | Martin Lindner, Stephanie Losi & Julia Allen | Proactive Remedies for Rising Threats - Part 2: Redundancy and Diversity | CERT Podcasts for Business Leaders | |
33. | Martin Lindner, Stephanie Losi & Julia Allen | Proactive Remedies for Rising Threats - Part 3: Other Strategies and Conclusion | CERT Podcasts for Business Leaders | |
34. | Julia Allen & Stephanie Losi | Compliance vs. Buy-In | CERT Podcasts for Business Leaders | |
35. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
36. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 2: Implications and Potential Consequences | CERT's Podcasts for Business Leaders | |
37. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
38. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
39. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
40. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
41. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
42. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted | CERT’s Podcasts for Business Leaders | |
43. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
44. | Martin Lindner, Stephanie Losi, & Julia Allen | Proactive Remedies for Rising Threats | CERT Podcasts for Business Leaders | |
45. | Martin Lindner, Stephanie Losi & Julia Allen | Proactive Remedies for Rising Threats - Part 1: The Evolving Threat | CERT Podcasts for Business Leaders | |
46. | Bob Charette | Is There Value in Identifying Software Security Never Events? | CERT's Podcasts for Business Leaders | |
47. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 1: Errors in Medical Care as an Analogy for Errors in Software | CERT's Podcasts for Business Leaders | |
48. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
49. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 1: The Increasing Scope and Importance of Business Continuity Planning | CERT’s Podcasts for Business Leaders | |
50. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 3: Developing & Exercising a Business Continuity Plan | CERT’s Podcasts for Business Leaders | |
51. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 2: Determining What to Protect; Identifying Key Players | CERT’s Podcasts for Business Leaders | |
52. | Gary Hinson | Getting in Front of Social Engineering - Part 3: Detective, Corrective, and Preventive Actions | CERT's Podcasts for Business Leaders | |
53. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
54. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most | CERT's Podcasts for Business Leaders | |
55. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
56. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 2: The Shifting Vulnerability Landscape | CERT's Podcasts for Business Leaders | |
57. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
58. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
59. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
60. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |