ID | Interpret | Skladba | Album | |
181. | Betsy Nichols | Using Benchmarking to Make Better Security Decisions - Part 1: What Is Benchmarking and Why Is It Useful? | CERT’s Podcasts for Business Leaders | |
182. | Steve Gibson with Leo Laporte | Security Now 179: Cracking Security Certificates | Security Now January 2009 | |
183. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
184. | Gary McGraw | How to Start a Secure Software Development Program - Part 2: Key Practices for New Software; COTS and Legacy Software | CERT's Podcasts for Business Leaders | |
185. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 3: Collaboration Among National CSIRTs - How Business Leaders Can Benefit | CERT’s Podcasts for Business Leaders | |
186. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 2: How Business Leaders Can Interact with National CSIRTs | CERT’s Podcasts for Business Leaders | |
187. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 3: A Common Process: Incident Management and e-Discovery; Key Roles | CERT's Podcasts for Business Leaders | |
188. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 1: The Resiliency Engineering Model | CERT’s Podcasts for Business Leaders | |
189. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
190. | Bob Charette | Is There Value in Identifying Software Security Never Events? - Part 1: Errors in Medical Care as an Analogy for Errors in Software | CERT's Podcasts for Business Leaders | |
191. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
192. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
193. | Dr David Cook | Considering the Challenges | ELF 2004: Theologians Network | |
194. | EDUCAUSE | Top Ten Challenges | 2007 Annual Conference | |
195. | Dr David Cook | Considering the Challenges | European Leadership Forum 2004 | |
196. | Guruka Singh Khalsa | The Five Challenges | www.MrSikhNet.com | |
197. | His Excellency Paul Kagame | The Challenges of Development | LSE: Public lectures and event | |
198. | Bob Enyart | Ben challenges Bob on Law vs Grace | BEL Aug 2006 | |
199. | Dr Ralph Enlow | Dealing with Challenges | ELF2003: Leadership & Ed. WS | |
200. | The Reverend Canon Kati L. Houts | Love’s Challenges | October 22, 2006, 9:50 am | |