ID | Interpret | Skladba | Album | |
91. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
92. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
93. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
94. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 2: Determining What to Protect; Identifying Key Players | CERT’s Podcasts for Business Leaders | |
95. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
96. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
97. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
98. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
99. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
100. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
101. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
102. | Craig Armstrong | Business: part 1 / part 2 / part 3 | Plunkett & Macleane | |
103. | The Five Minute Linguist | What does language have to do with national security? | Talking About Talk | |
104. | Bruce Schneier | The Economics of Information Security - Ten Trends | | |
105. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
106. | Jon Allen, Robert Paul Hartland | Security Assessments for Information Technology | EDUCAUSE 2005 Annual Conference | |
107. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
108. | Mark Estberg; John - Webcast Team | TechNet Webcast: How Microsoft IT Does Information Security | | |
109. | Paul Love | Making Information Security Policy Happen | CERT's Podcasts for Business Leaders | |
110. | Bill Wilson | Using Standards to Build an Information Security Program | CERT’s Podcasts for Business Leaders | |
111. | Tammy Clark & William Monahan | Start with a Great Information Security Plan! | EDUCAUSE 2006 Annual Conference | |
112. | Information Security Media Group | Information Security Media Group Interview with RCG | InfoSecurity NY 2007 | |
113. | Host Vic Wheatman and Guest Mark Nicolett | Security Information & Event Management Use Cases | Gartner Voice | |
114. | Tammy Clark & William Monahan | Start with a Great Information Security Plan! | EDUCAUSE 2006 Annual Conference | |
115. | Host Dale Kutnick and Guest Tom Scholtz | Information Security Architecture: Structure & Content | Gartner Voice | |
116. | Michael Farnum, Jim Broome, and Guest - Kirk Greene | An Information Security Place Podcast - Episode #8 | Recorded On: October 30, 2008 | |
117. | Rich Caralli | Adapting to Changing Risk Environments: Operational Resilience - Part 2: Determining How Much Is Enough | CERT's Podcasts for Business Leaders | |
118. | Christopher Budd | TechNet Webcast: Information About Microsoft May Security Bulletins | | |
119. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance | CERT’s Podcasts for Business Leaders | |
120. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |