ID | Interpret | Skladba | Album | |
31. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
32. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
33. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
34. | Barbara Laswell | Building Staff Competence in Security - Part 2: What Skills Should a Hiring Manager Look For? | CERT Podcasts for Business Leaders | |
35. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
36. | Bill Wilson | Using Standards to Build an Information Security Program - Part 2: Getting Started | CERT’s Podcasts for Business Leaders | |
37. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
38. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
39. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
40. | Felix Domke, Michael Steil | Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security | Chaos Communication Congress 2007 (24c3) | |
41. | Barbara Laswell | Building Staff Competence in Security - Part 1: Identify and Match Required Competencies to Roles | CERT Podcasts for Business Leaders | |
42. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 2: Allegro's Eight Steps, and Getting Started | CERT's Podcasts for Business Leaders | |
43. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application | CERT's Podcasts for Business Leaders | |
44. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
45. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most - Part 3: Determining which Vulnerabilities to Pay Attention To | CERT's Podcasts for Business Leaders | |
46. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
47. | Julia Allen | Building More Secure Software - Part 2: Develop Software with a Security Mind-set | CERT's Podcasts for Business Leaders | |
48. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
49. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
50. | Adam Graham | When the UN Becomes a Security Risk | | |
51. | David and Carol Tegenfeldt | Building Peace: Relationships, Curiosity, Creativity and Risk | Seattle First Baptist Church | |
52. | David and Carol Tegenfeldt | Building Peace: Relationships, Curiosity, Creativity and Risk | Seattle First Baptist Church | |
53. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 2: National Risk Management Frameworks and Public/Private Partnerships | CERT’s Podcasts for Business Leaders | |
54. | Sanjay Anand, Scott Kwarta, Sari Abdo | Evolving Sox to an Integrated Risk & Control Program | Xtalks Webconferences | |
55. | Chris May | Better Incident Response through Scenario-Based Training - Part 1: Train as You Fight: Use Scenario-Based Exercises | CERT's Podcasts for Business Leaders | |
56. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro | CERT's Podcasts for Business Leaders | |
57. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most | CERT's Podcasts for Business Leaders | |
58. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
59. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance | CERT’s Podcasts for Business Leaders | |
60. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |