ID | Interpret | Skladba | Album | |
61. | Christopher Budd | TechNet Webcast: Information About Microsoft May Security Bulletins | | |
62. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance | CERT’s Podcasts for Business Leaders | |
63. | Robert LeFevre | In Gods We Trust?: Social Security Among the Ancient Incas | Robert LeFevre Commentary | |
64. | Christopher Budd | TechNet Webcast: Information About Microsoft October Security Bulletins | | |
65. | Bill Wilson | Using Standards to Build an Information Security Program - Part 2: Getting Started | CERT’s Podcasts for Business Leaders | |
66. | Christopher Budd; Heather - Webcast Team | TechNet Webcast Audio: Information About Microsoft August Security Bulletins | | |
67. | Christopher Budd; Heather - Webcast Team | TechNet Webcast Audio: Information About Microsoft October Security Bulletins | | |
68. | Bill Sisk, CISSP and Adrian Stone, Lead Security Program Manager | TechNet Webcast Audio: Information About Microsoft March Security Bulletins | | |
69. | mreavey; Christopher Budd; Heather - Webcast Team | TechNet Webcast Audio: Information About Microsoft September Security Bulletins | | |
70. | Bill Sisk; mreavey; Christopher Budd | TechNet Webcast Audio: Information About Microsoft July Security Bulletins | | |
71. | Tom Eston and Dan Hanson/Dan Hanson and Tom Eston | Social Media Security | The Great Lakes Geek Show | |
72. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
73. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
74. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 3: A Case in Point; Examine Your Environment | CERT's Podcasts for Business Leaders | |
75. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
76. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 2: Learning from Other Disciplines: Standards, Compliance, and Process | CERT's Podcasts for Business Leaders | |
77. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
78. | Program narration:Denise Manzari~Segment producers:Melinda Tuhus~Executive Producer:Scott Harris~Music:Mikata | BETWEEN THE LINES Opposition to NBC - Comcast Merger Plan Corie Wright, Counsel with the Media Reform Group Free Press Producer: Scott Harris | | |
79. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
80. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
81. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
82. | Kent Bottles, MD and Ron Rosenberg of Practice Management Resource Group | Interview with Ron Rosenberg, President of Practice Management Resource Group | The Journal of Medical Practice Management | |
83. | Brian Aker | O'Reilly Media Interview | | |
84. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
85. | David Tesar | Enterprise Mobile Security Interview | Enterprise Mobile Security Interview | |
86. | CNET News.com | Security Bites 71: An interview with Rsnake | Security Bites | |
87. | CNET News.com | Security Bites 71: An interview with Rsnake | Security Bites | |
88. | Interwoven's GearUp Podcast | Interview: Ira Winkler, Security Expert | podcast@interwoven.com | |
89. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
90. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |