ID | Interpret | Skladba | Album | |
61. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Relational Security | | |
62. | Information Security Media Group | Information Security Media Group Interview with Application Security, Inc. | InfoSecurity NY 2007 | |
63. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
64. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
65. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
66. | Clint Kreitner | Reducing Security Costs with Standard Configurations: U.S. Government Initiatives - Part 2: Challenges and Tips for Implementing Standard Configurations | CERT’s Podcasts for Business Leaders | |
67. | Betsy Nichols | Building a Security Metrics Program - Part 2: Selecting Useful Metrics Based on Risk | CERT’s Podcasts for Business Leaders | |
68. | Professor Alan Dupont, Centre for International Security Studies | New Security challenges | University of Sydney Podcast : Key Directions | |
69. | Judy Heumann, Sam Worthington, John Kemp, Eric Rosenthal | The New UN Disability Rights Convention: Building Support in the United States for Ratification and Implementation - Implementation through International Development Policy | Washington College of Law | |
70. | Dr. Stephen Spinelli Jr. and Trevor Bonney | Podcast 18 - Challenges of PA Program | PhilaU on iTunes | |
71. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
72. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
73. | Rahul Roy-Chaudhury | Security challenges for a rising India | Wednesday Lunch at Lowy | |
74. | Gary Hart, Former U.S. Senator (D-CO), 6-15-07 | Future Challenges for U.S. National Security | Johns Hopkins SAIS Events - Summer 2007 | |
75. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
76. | Dan Skinner | Build San Antonio Green - Program 002 | | |
77. | Dan Skinner | Build San Antonio Green - Program 005 | | |
78. | Dan Skinner | Build San Antonio Green - Program 004 | | |
79. | Dan Skinner | Build San Antonio Green - Program 006 | | |
80. | Dan Skinner | Build San Antonio Green - Program 003 | | |
81. | Dan Skinner | Build San Antonio Green - Program 002 | | |
82. | Jon Allen, Robert Paul Hartland | Security Assessments for Information Technology | EDUCAUSE 2005 Annual Conference | |
83. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
84. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
85. | Bruce Schneier | The Economics of Information Security - Ten Trends | | |
86. | Mark Estberg; John - Webcast Team | TechNet Webcast: How Microsoft IT Does Information Security | | |
87. | Host Dale Kutnick and Guest Tom Scholtz | Information Security Architecture: Structure & Content | Gartner Voice | |
88. | Michael Farnum, Jim Broome, and Guest - Kirk Greene | An Information Security Place Podcast - Episode #8 | Recorded On: October 30, 2008 | |
89. | Host Vic Wheatman and Guest Mark Nicolett | Security Information & Event Management Use Cases | Gartner Voice | |
90. | Tammy Clark & William Monahan | Start with a Great Information Security Plan! | EDUCAUSE 2006 Annual Conference | |