ID | Interpret | Skladba | Album | |
121. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Chosen Security | | |
122. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Relational Security | | |
123. | Information Security Media Group | Information Security Media Group Interview with Application Security, Inc. | InfoSecurity NY 2007 | |
124. | Business Intelligence Network | Part 3, What is the impact of changing business requirements and how can that change be most effectively handled? | Audio Article | |
125. | Business Intelligence Network | Part 2, What is the impact of changing business requirements and how can that change be most effectively handled? | Audio Article | |
126. | Business Intelligence Network | Defining the Economic Value for Business Intelligence Implementations in the Pharmaceutical Industry, Part 1 | Audio Article | |
127. | BeyeNETWORK | Gathering the Best Busines Requirements to Help Ensure Business Intelligence Success, Part 1 | Audio Article | |
128. | Business Intelligence Network | Data Analysis: A Pivotal Activity for Operational Business Intelligence, Part 2 | Audio Article | |
129. | Alicia H. Munnell, Peter F. Drucker Professor of Management Sciences, Carroll School of Management, Boston College | YLS The Declining Number of Players in the Retirement Income Game: The Withdrawl of Business - Part 2 | Storrs Lecture #2 | |
130. | Steve Huth & Steve Kalinowski | IT Infrastructure: Tips for Navigating Tough Spots - Part 3: Business-Side Buy-In and Tone from the Top | CERT\'s Podcasts for Business Leaders | |
131. | Paul Love | Making Information Security Policy Happen - Part 2: Policy Structure and Life Cycle | CERT's Podcasts for Business Leaders | |
132. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
133. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
134. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 2: Determining What to Protect; Identifying Key Players | CERT’s Podcasts for Business Leaders | |
135. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 1: Why Policy Is Key | CERT's Podcasts for Business Leaders | |
136. | Cal Waits | Computer Forensics for Business Leaders: Building Robust Policies and Processes - Part 2: The Complex Realities of Investigations | CERT's Podcasts for Business Leaders | |
137. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
138. | Robert Seacord | Mainstreaming Secure Coding Practices - Part 1: Making the Business Case for Secure Code | CERT's Podcasts for Business Leaders | |
139. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
140. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
141. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
142. | Craig Armstrong | Business: part 1 / part 2 / part 3 | Plunkett & Macleane | |
143. | The Five Minute Linguist | What does language have to do with national security? | Talking About Talk | |
144. | Jon Allen, Robert Paul Hartland | Security Assessments for Information Technology | EDUCAUSE 2005 Annual Conference | |
145. | Bruce Schneier | The Economics of Information Security - Ten Trends | | |
146. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
147. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
148. | Tammy Clark & William Monahan | Start with a Great Information Security Plan! | EDUCAUSE 2006 Annual Conference | |
149. | Host Dale Kutnick and Guest Tom Scholtz | Information Security Architecture: Structure & Content | Gartner Voice | |
150. | Michael Farnum, Jim Broome, and Guest - Kirk Greene | An Information Security Place Podcast - Episode #8 | Recorded On: October 30, 2008 | |