ID | Interpret | Skladba | Album | |
31. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
32. | Dan York & Jonathan Zar | Blue Box Podcast #12: VoIPShield Systems interview, WiFi handset vulnerabilities, VoIP security news and more... | Blue Box: The VoIP Security Podcast | |
33. | Gary Hart, Former U.S. Senator (D-CO), 6-15-07 | Future Challenges for U.S. National Security | Johns Hopkins SAIS Events - Summer 2007 | |
34. | Rahul Roy-Chaudhury | Security challenges for a rising India | Wednesday Lunch at Lowy | |
35. | Steve Gibson with Leo Laporte | Security Now Special Edition: The Animated Cursor Vulnerability - sponsored by Astaro Corp. | Security Now April 2007 | |
36. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 2: Challenges and Tips for Implementing Standard Configurations | CERT’s Podcasts for Business Leaders | |
37. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
38. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
39. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
40. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
41. | Daniel Estrada | Managing Your Company's Intellectual Property: An Introduction to IT Security | HOPE Number Six, 21-23 July 2006 | |
42. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
43. | Darren Lacey, Chief Information Security Officer, Johns Hopkins University/Johns Hopkins Medicine | Managing Insecurity: Practitioner Reflections on Social Costs of Security | 17th USENIX Security Symposium Invited Talks | |
44. | Jeff Jones | TechNet Webcast Audio: Microsoft Security Intelligence Report: Software Vulnerability Disclosure Trends | | |
45. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
46. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
47. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
48. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
49. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
50. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
51. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
52. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
53. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
54. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
55. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
56. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
57. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
58. | Eric Rescorla, RTFM, Inc. | Understanding the Security Properties of Ballot-Based Verification Techniques | EVT/WOTE '09 | |
59. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
60. | Ambassador Marc Perrin de Brichambaut | The Organization for Security and Co-operation in Europe: Why it matters to the Asia-Pacific | Distinguished Speaker Series | |