ID | Interpret | Skladba | Album | |
91. | David and Carol Tegenfeldt | Building Peace: Relationships, Curiosity, Creativity and Risk | Seattle First Baptist Church | |
92. | David and Carol Tegenfeldt | Building Peace: Relationships, Curiosity, Creativity and Risk | Seattle First Baptist Church | |
93. | Bradford Willke | Managing Risk to Critical Infrastructures at the National Level - Part 2: National Risk Management Frameworks and Public/Private Partnerships | CERT’s Podcasts for Business Leaders | |
94. | Sanjay Anand, Scott Kwarta, Sari Abdo | Evolving Sox to an Integrated Risk & Control Program | Xtalks Webconferences | |
95. | Chris May | Better Incident Response through Scenario-Based Training - Part 1: Train as You Fight: Use Scenario-Based Exercises | CERT's Podcasts for Business Leaders | |
96. | Lisa Young | Security Risk Assessment Using OCTAVE Allegro | CERT's Podcasts for Business Leaders | |
97. | Art Manion | Managing Security Vulnerabilities Based on What Matters Most | CERT's Podcasts for Business Leaders | |
98. | Brian Chess | An Alternative to Risk Management for Information and Software Security | CERT's Podcasts for Business Leaders | |
99. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance | CERT’s Podcasts for Business Leaders | |
100. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
101. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
102. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
103. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
104. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
105. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
106. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
107. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
108. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security | CERT's Podcasts for Business Leaders | |
109. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
110. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
111. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
112. | Dan Cvrcek | Security of MICA*-based wireless sensor networks | Chaos Communication Congress 2008 (25c3) | |
113. | Eric Rescorla, RTFM, Inc. | Understanding the Security Properties of Ballot-Based Verification Techniques | EVT/WOTE '09 | |
114. | Gerry Andersen | The World's Worst Building Program | Genesis 11:1-9 | |
115. | Barbara Laswell | Building Staff Competence in Security | CERT Podcasts for Business Leaders | |
116. | Julia Allen | Getting Real about Security Governance - Part 3: Making Security a Mainstream Process | CERT’s Podcasts for Business Leaders | |
117. | Julia Allen & William Pollak | Why Leaders Should Care About Security - Part 2: Why Is Security a Governance Issue? | CERT Podcasts for Business Leaders | |
118. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
119. | Bill Wilson | Using Standards to Build an Information Security Program | CERT’s Podcasts for Business Leaders | |
120. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |