ID | Interpret | Skladba | Album | |
181. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 2: Implications and Potential Consequences | CERT's Podcasts for Business Leaders | |
182. | Bill Wilson | Using Standards to Build an Information Security Program | CERT’s Podcasts for Business Leaders | |
183. | Bill Wilson | Using Standards to Build an Information Security Program - Part 2: Getting Started | CERT’s Podcasts for Business Leaders | |
184. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
185. | Betsy Nichols | Building a Security Metrics Program | CERT’s Podcasts for Business Leaders | |
186. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 2: Benchmarking Challenges and Some Works In Progress | CERT’s Podcasts for Business Leaders | |
187. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
188. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 1: What Is Benchmarking and Why Is It Useful? | CERT’s Podcasts for Business Leaders | |
189. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions | CERT’s Podcasts for Business Leaders | |
190. | Betsy Nichols | Building a Security Metrics Program - Part 1: Understand Your Objectives and the Business Context | CERT’s Podcasts for Business Leaders | |
191. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
192. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
193. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
194. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 1: Roles, Responsibilities, and Reporting | CERT's Podcasts for Business Leaders | |
195. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security | CERT's Podcasts for Business Leaders | |
196. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 2: Getting Started | CERT’s Podcasts for Business Leaders | |
197. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 2: Selling Security and Pinpointing Acceptable Risk | CERT's Podcasts for Business Leaders | |
198. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 1: What Is Convergence and Why Is It Important? | CERT’s Podcasts for Business Leaders | |
199. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 3: Trends and Future Directions | CERT’s Podcasts for Business Leaders | |
200. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 3: Role-Based Advice | CERT's Podcasts for Business Leaders | |