ID | Interpret | Skladba | Album | |
151. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Kaspersky Lab | | |
152. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Imperva | | |
153. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |
154. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
155. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
156. | Christopher Budd; Heather - Webcast Team | TechNet Webcast Audio: Information About Microsoft August Security Bulletins | | |
157. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Digital Persona | | |
158. | Bill Sisk, CISSP and Adrian Stone, Lead Security Program Manager | TechNet Webcast Audio: Information About Microsoft March Security Bulletins | | |
159. | Christopher Budd; Heather - Webcast Team | TechNet Webcast Audio: Information About Microsoft October Security Bulletins | | |
160. | Bill Sisk; mreavey; Christopher Budd | TechNet Webcast Audio: Information About Microsoft July Security Bulletins | | |
161. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Digital Defense | | |
162. | mreavey; Christopher Budd; Heather - Webcast Team | TechNet Webcast Audio: Information About Microsoft September Security Bulletins | | |
163. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 2: Structure and Scope; Where to Start | CERT's Podcasts for Business Leaders | |
164. | Greg Newby | The Human Side of Security Trade-Offs - Part 3: Tackling Secure Software Development | CERT’s Podcasts for Business Leaders | |
165. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - VoIP Shield Systems | | |
166. | Bruce Cowper | Microsoft Webcast: Security Series : An End-to-End Identity and Access Management Solution | | |
167. | Jeff Jones | TechNet Webcast Audio: Microsoft Security Intelligence Report: Software Vulnerability Disclosure Trends | | |
168. | Bill Wilson | Using Standards to Build an Information Security Program - Part 3: Implementation Challenges, Barriers, & Key Roles | CERT’s Podcasts for Business Leaders | |
169. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 2: The Importance of Mutual Education | CERT's Podcasts for Business Leaders | |
170. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
171. | Paul Love | Making Information Security Policy Happen - Part 1: Know Your Requirements; Make Sure Business Leaders Are Engaged | CERT's Podcasts for Business Leaders | |
172. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 2: Allegro's Eight Steps, and Getting Started | CERT's Podcasts for Business Leaders | |
173. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
174. | Paul Cooke | Microsoft Webcast : Security Series : Securing Sensitive Data with Rights Management Services | | |
175. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
176. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro - Part 1: Introduction to Allegro: Rationale and Application | CERT's Podcasts for Business Leaders | |
177. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 1: Motivation and Target Audience; Drawing from Observed Practices | CERT's Podcasts for Business Leaders | |
178. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
179. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
180. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |