ID | Interpret | Skladba | Album | |
121. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Digital Persona | | |
122. | Christopher Budd; Heather - Webcast Team | TechNet Webcast Audio: Information About Microsoft October Security Bulletins | | |
123. | Bill Sisk; mreavey; Christopher Budd | TechNet Webcast Audio: Information About Microsoft July Security Bulletins | | |
124. | Bill Sisk, CISSP and Adrian Stone, Lead Security Program Manager | TechNet Webcast Audio: Information About Microsoft March Security Bulletins | | |
125. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
126. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
127. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - VoIP Shield Systems | | |
128. | Bruce Cowper | Microsoft Webcast: Security Series : An End-to-End Identity and Access Management Solution | | |
129. | Jeff Jones | TechNet Webcast Audio: Microsoft Security Intelligence Report: Software Vulnerability Disclosure Trends | | |
130. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
131. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
132. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
133. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
134. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
135. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 2: Allegro's Eight Steps, and Getting Started | CERT's Podcasts for Business Leaders | |
136. | Paul Cooke | Microsoft Webcast : Security Series : Securing Sensitive Data with Rights Management Services | | |
137. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application | CERT's Podcasts for Business Leaders | |
138. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
139. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
140. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
141. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
142. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
143. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
144. | Doug Mueller | Lower Service Support Costs and Increase Business Value Through a Holistic Approach: Doug Mueller,Chief Technology Officer in the Service Management Business Unit of BMC Software | TalkBMC Podcast | |
145. | Alex - Webcast Team | TechNet Webcast Audio: Managing Exchange Server and SharePoint Protection with Forefront Server Security Management Console | | |
146. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 1: Critical Infrastructures and Their Reliance on Critical Information Infrastructures | CERT’s Podcasts for Business Leaders | |
147. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
148. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
149. | Jerry Taylor | An Alternative View on Alternative Energy | Cato Daily Podcast | |
150. | Jerry Taylor | An Alternative View on Alternative Energy | Cato Daily Podcast | |