ID | Interpret | Skladba | Album | |
1. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
2. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
3. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes | CERT's Podcasts for Business Leaders | |
4. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 084 - Business Use Cases for PMO Processes and Policies | | |
5. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 084 - Business Use Cases for PMO Processes and Policies | | |
6. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
7. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 3: Collaboration Among National CSIRTs - How Business Leaders Can Benefit | CERT’s Podcasts for Business Leaders | |
8. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 2: How Business Leaders Can Interact with National CSIRTs | CERT’s Podcasts for Business Leaders | |
9. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 086 - Convincing Executives on the Value of PMO Processes and Policies | | |
10. | The PMO Podcast Host: Mark Perry | The PMO Podcast: Episode 086 - Convincing Executives on the Value of PMO Processes and Policies | | |
11. | Editorial Team | Achieving Business Intelligence Impact: Integrating Business Intelligence with Core Business Processes | 6283 | |
12. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 1: The Disconnects, and Why Business Leaders Should Care | CERT's Podcasts for Business Leaders | |
13. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 2: How To Help Ensure Graduates Are Successful | CERT’s Podcasts for Business Leaders | |
14. | Dr. Neal Krawetz | You Are What You Type: Non-Classical Computer Forensics | Black Hat USA 2006 | |
15. | Computerworld | Computerworld TechCast: Computer Forensics | | |
16. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 1: Nuts and Bolts versus the Big Picture | CERT’s Podcasts for Business Leaders | |
17. | Barbara Laswell | Building Staff Competence in Security - Part 3: Creating a Culture of Security; Actions Leaders Can Take | CERT Podcasts for Business Leaders | |
18. | Betsy Nichols | Building a Security Metrics Program - Part 1: Understand Your Objectives and the Business Context | CERT’s Podcasts for Business Leaders | |
19. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
20. | Business Intelligence Network | Business Intelligence for Revenue-Generating Processes | Audio Article | |
21. | Jon Udell, Mark Ericson | A conversation with Mark Ericson about communications-enabled business processes | Interviews with Innovators: Jon Udell's Friday Podcasts | |
22. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
23. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
24. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
25. | Michael Vincent | ALP courts business leaders | The World Today - October 27 | |
26. | Colby College 56th Leadership Institute | Tips for Business Leaders | | |
27. | Boyd Doc on the ROQ Britton | Gangster Computer God Worldwide Secret Containment Policy | | |
28. | Boyd "Doc on the ROQ" Britton | Gangster Computer God Worldwide Secret Containment Policy | | |
29. | Francis E. Dec, Esq | Gangster Computer God Worldwide Secret Containment Policy | Worldwide Living Death Frankenstein Slavery | |
30. | Boyd | Gangster Computer God Worldwide Secret Containment Policy | | |