ID | Interpret | Skladba | Album | |
151. | Larry Rogers | A New Look at the Business of IT Education - Part 1: Filling a Gap | CERT's Podcasts for Business Leaders | |
152. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 3: Where to Start | CERT's Podcasts for Business Leaders | |
153. | Clint Kreitner | Getting to a Useful Set of Security Metrics - Part 1: Metrics as a Means for Directing Attention and Energy | CERT's Podcasts for Business Leaders | |
154. | Steve Huth & Steve Kalinowski | IT Infrastructure: Tips for Navigating Tough Spots - Part 1: Mastering Merger Hazards | CERT\'s Podcasts for Business Leaders | |
155. | Barbara Laswell | Building Staff Competence in Security - Part 3: Creating a Culture of Security; Actions Leaders Can Take | CERT Podcasts for Business Leaders | |
156. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 1: The Resiliency Engineering Model | CERT’s Podcasts for Business Leaders | |
157. | Julia Allen | Getting Real about Security Governance - Part 3: Making Security a Mainstream Process | CERT’s Podcasts for Business Leaders | |
158. | Julia Allen | Getting Real about Security Governance - Part 2: A Guide to Effective Governance | CERT’s Podcasts for Business Leaders | |
159. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks | CERT’s Podcasts for Business Leaders | |
160. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 2: How Can I Find Out if a Peer-to-Peer Disclosure Has Occurred? | CERT’s Podcasts for Business Leaders | |
161. | Julia Allen | Getting Real about Security Governance - Part 1: An Evolution Toward Practicality | CERT’s Podcasts for Business Leaders | |
162. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 3: The Upside and the Downside of Peer-to-Peer | CERT’s Podcasts for Business Leaders | |
163. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
164. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
165. | Paul Love | Making Information Security Policy Happen | CERT's Podcasts for Business Leaders | |
166. | Julia Allen | Getting Real about Security Governance | CERT’s Podcasts for Business Leaders | |
167. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
168. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 1: Understanding the Threat | CERT’s Podcasts for Business Leaders | |
169. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
170. | Greg Newby | The Human Side of Security Trade-Offs - Part 2: Building a Security Conscious Culture | CERT’s Podcasts for Business Leaders | |
171. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 1: Background and Evolution from OCTAVE | CERT's Podcasts for Business Leaders | |
172. | Christopher Alberts | Assuring Mission Success in Complex Environments | CERT's Podcasts for Business Leaders | |
173. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 3: Methods and Tools for Tackling Risk in Complex Environments | CERT's Podcasts for Business Leaders | |
174. | Christopher Alberts | Assuring Mission Success in Complex Environments - Part 2: Assuring Mission Success | CERT's Podcasts for Business Leaders | |
175. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
176. | Brian Gallagher | Becoming a Smart Buyer of Software | CERT's Podcasts for Business Leaders | |
177. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
178. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity | CERT’s Podcasts for Business Leaders | |
179. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 2: Applying the Model to Operations | CERT’s Podcasts for Business Leaders | |
180. | Greg Newby | The Human Side of Security Trade-Offs | CERT’s Podcasts for Business Leaders | |