ID | Interpret | Skladba | Album | |
181. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 3: Role-Based Advice | CERT's Podcasts for Business Leaders | |
182. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
183. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance | CERT’s Podcasts for Business Leaders | |
184. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
185. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
186. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
187. | Bill Wilson | Using Standards to Build an Information Security Program | CERT’s Podcasts for Business Leaders | |
188. | Bill Wilson | Using Standards to Build an Information Security Program - Part 2: Getting Started | CERT’s Podcasts for Business Leaders | |
189. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
190. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks | CERT’s Podcasts for Business Leaders | |
191. | Betsy Nichols | Building a Security Metrics Program | CERT’s Podcasts for Business Leaders | |
192. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 2: Benchmarking Challenges and Some Works In Progress | CERT’s Podcasts for Business Leaders | |
193. | Patty Morrison & Bill Boni | Dual Perspectives: A CIO's and CISO's Take on Security - Part 1: Roles, Responsibilities, and Reporting | CERT's Podcasts for Business Leaders | |
194. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 3: The Upside and the Downside of Peer-to-Peer | CERT’s Podcasts for Business Leaders | |
195. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 1: Buying vs. Building Software | CERT's Podcasts for Business Leaders | |
196. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
197. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 2: Acquiring Software with Security in Mind | CERT's Podcasts for Business Leaders | |
198. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
199. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
200. | Brian Gallagher | Becoming a Smart Buyer of Software | CERT's Podcasts for Business Leaders | |