ID | Interpret | Skladba | Album | |
61. | Ranald Macaulay | Secular Context; Xn Worldview | ELF2003 Leaders In Society Nwk | |
62. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
63. | Gary Hinson | Getting in Front of Social Engineering - Part 2: Identifying Social Engineering Attempts and Attacks | CERT's Podcasts for Business Leaders | |
64. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
65. | Gary McGraw | How to Start a Secure Software Development Program - Part 3: Two Ways to Get Started; Two to Avoid | CERT's Podcasts for Business Leaders | |
66. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
67. | Gene Kim | The Security 'X' Factor - Part 3: Overcoming Hurdles | CERT Podcasts for Business Leaders | |
68. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
69. | Gene Kim | The Security 'X' Factor - Part 2: Taking Action | CERT Podcasts for Business Leaders | |
70. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions | CERT’s Podcasts for Business Leaders | |
71. | Brian Gallagher | Becoming a Smart Buyer of Software - Part 1: Buying vs. Building Software | CERT's Podcasts for Business Leaders | |
72. | Dawn Cappelli | Protecting Against Insider Threat - Part 2: Warning Signs | CERT Podcasts for Business Leaders | |
73. | Betsy Nichols | Building a Security Metrics Program - Part 1: Understand Your Objectives and the Business Context | CERT’s Podcasts for Business Leaders | |
74. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
75. | Dawn Cappelli | Protecting Against Insider Threat - Part 1: The Threat | CERT Podcasts for Business Leaders | |
76. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 3: Deployment and Maintenance: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
77. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 1: An Update on CERT's Insider Threat Research | CERT’s Podcasts for Business Leaders | |
78. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 2: Benchmarking and Situational Awareness | CERT's Podcasts for Business Leaders | |
79. | Dawn Cappelli | Insider Threat and the Software Development Life Cycle - Part 2: Requirements, Design, and Implementation: Oversights and Flaws | CERT’s Podcasts for Business Leaders | |
80. | Gene Kim | The Security 'X' Factor - Part 1: The Study | CERT Podcasts for Business Leaders | |
81. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
82. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 1: What Is Benchmarking and Why Is It Useful? | CERT’s Podcasts for Business Leaders | |
83. | Gary McGraw | How to Start a Secure Software Development Program | CERT’s Podcasts for Business Leaders | |
84. | Betsy Nichols | Building a Security Metrics Program | CERT’s Podcasts for Business Leaders | |
85. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
86. | Chris May | Better Incident Response through Scenario-Based Training - Part 2: Training Geographically Distributed Teams: CERT’s XNET | CERT's Podcasts for Business Leaders | |
87. | David Matthews | Integrating Security Incident Response and e-Discovery | CERT's Podcasts for Business Leaders | |
88. | Chris Alberts | Rethinking Risk Management - Part 2: Managing Risks across the Life Cycle; Using the Mosaic Toolkit | CERT's Podcasts for Business Leaders | |
89. | Chris Alberts | Rethinking Risk Management | CERT's Podcasts for Business Leaders | |
90. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 2: Being Prepared for an e-Discovery Request | CERT's Podcasts for Business Leaders | |