ID | Interpret | Skladba | Album | |
121. | Larry Rogers | A New Look at the Business of IT Education - Part 1: Filling a Gap | CERT's Podcasts for Business Leaders | |
122. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
123. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 1: Understanding the Threat | CERT’s Podcasts for Business Leaders | |
124. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 3: The Upside and the Downside of Peer-to-Peer | CERT’s Podcasts for Business Leaders | |
125. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks - Part 2: How Can I Find Out if a Peer-to-Peer Disclosure Has Occurred? | CERT’s Podcasts for Business Leaders | |
126. | Scott Dynes & Eric Johnson | Inadvertent Data Disclosure on Peer-to-Peer Networks | CERT’s Podcasts for Business Leaders | |
127. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 1: What Is Convergence and Why Is It Important? | CERT’s Podcasts for Business Leaders | |
128. | Alessandro Acquisti | Privacy: The Slow Tipping Point | CERT Podcasts for Business Leaders | |
129. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 3: Lessons Learned and the Future | CERT Podcasts for Business Leaders | |
130. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 2: The Evolution of User Attitudes | CERT Podcasts for Business Leaders | |
131. | Alessandro Acquisti | Privacy: The Slow Tipping Point - Part 1: The Economics of Privacy Breaches | CERT Podcasts for Business Leaders | |
132. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 3: Starting Up a Secure Coding Project; Barriers and First Steps | CERT's Podcasts for Business Leaders | |
133. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
134. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity | CERT’s Podcasts for Business Leaders | |
135. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 2: Applying the Model to Operations | CERT’s Podcasts for Business Leaders | |
136. | Timothy J. Keller | How the Gospel Changes Us; Part 2 | Leaders@7: The Gospel-Transformed Heart | |
137. | Gary McGraw | How to Start a Secure Software Development Program - Part 1: The Evolution of Secure Software Development | CERT’s Podcasts for Business Leaders | |
138. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted | CERT’s Podcasts for Business Leaders | |
139. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 3: Developing & Exercising a Business Continuity Plan | CERT’s Podcasts for Business Leaders | |
140. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 1: The Increasing Scope and Importance of Business Continuity Planning | CERT’s Podcasts for Business Leaders | |
141. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
142. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most | CERT's Podcasts for Business Leaders | |
143. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 1: The Challenges in Defining a Security Vulnerability | CERT's Podcasts for Business Leaders | |
144. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
145. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
146. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
147. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 2: The Shifting Vulnerability Landscape | CERT's Podcasts for Business Leaders | |
148. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
149. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro | CERT's Podcasts for Business Leaders | |
150. | Greg Newby | The Human Side of Security Trade-Offs | CERT’s Podcasts for Business Leaders | |