ID | Interpret | Skladba | Album | |
151. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
152. | Julia Allen | Getting Real about Security Governance - Part 3: Making Security a Mainstream Process | CERT’s Podcasts for Business Leaders | |
153. | Julia Allen | Getting Real about Security Governance - Part 2: A Guide to Effective Governance | CERT’s Podcasts for Business Leaders | |
154. | Julia Allen | Getting Real about Security Governance - Part 1: An Evolution Toward Practicality | CERT’s Podcasts for Business Leaders | |
155. | Steve Huth & Steve Kalinowski | IT Infrastructure: Tips for Navigating Tough Spots - Part 2: What to Do When You Inherit Trouble | CERT\'s Podcasts for Business Leaders | |
156. | Barbara Laswell | Building Staff Competence in Security | CERT Podcasts for Business Leaders | |
157. | Chris Alberts | Rethinking Risk Management - Part 2: Managing Risks across the Life Cycle; Using the Mosaic Toolkit | CERT's Podcasts for Business Leaders | |
158. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
159. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
160. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
161. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
162. | Brian Gallagher | Becoming a Smart Buyer of Software | CERT's Podcasts for Business Leaders | |
163. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
164. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 2: National Risk Management Frameworks and Public/Private Partnerships | CERT’s Podcasts for Business Leaders | |
165. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 1: Critical Infrastructures and Their Reliance on Critical Information Infrastructures | CERT’s Podcasts for Business Leaders | |
166. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 3: First Steps and Additional Resources | CERT’s Podcasts for Business Leaders | |
167. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 1: Buying vs. Building Software | CERT's Podcasts for Business Leaders | |
168. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
169. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
170. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 3: Collaboration Among National CSIRTs - How Business Leaders Can Benefit | CERT’s Podcasts for Business Leaders | |
171. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders | CERT’s Podcasts for Business Leaders | |
172. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 2: How Business Leaders Can Interact with National CSIRTs | CERT’s Podcasts for Business Leaders | |
173. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 1: An Introduction to National CSIRTs | CERT’s Podcasts for Business Leaders | |
174. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes | CERT's Podcasts for Business Leaders | |
175. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
176. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
177. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
178. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
179. | Bob Charette | Is There Value in Identifying Software Security Never Events? | CERT's Podcasts for Business Leaders | |
180. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 1: Errors in Medical Care as an Analogy for Errors in Software | CERT's Podcasts for Business Leaders | |