ID | Interpret | Skladba | Album | |
31. | Paul Love | Making Information Security Policy Happen - Part 3: Engage Users and Track Policy Performance | CERT's Podcasts for Business Leaders | |
32. | Bill Wilson | Using Standards to Build an Information Security Program - Part 1: An Introduction to the Leading Standards: ISO 17799 and ISO 27001 | CERT’s Podcasts for Business Leaders | |
33. | Shaykh abu al-Yusr Ahmad Khashab | 19 - L'importance de l'éducation des enfants | Dawra en Belgique | |
34. | Gary McGraw, Brian Chess, Sammy Migues | An Experience-Based Maturity Model for Software Security - Part 3: Setting Expectations; Making the Business Case | CERT's Podcasts for Business Leaders | |
35. | Gartner Voice: Host Dale Kutnick and Guest Rita Knox | Gartner Voice: The Importance of Information Access | | |
36. | Gartner Voice: Host Dale Kutnick and Guest Rita Knox | Gartner Voice: The Importance of Information Access | | |
37. | Daryl Bradford Smith | 2005 01 21 Fri. The importance of de-toxifying before being able to digest new information. The bill of rights. | The French Connection | |
38. | Julia Allen | Building More Secure Software - Part 1: Software Security Is Just Good Business | CERT's Podcasts for Business Leaders | |
39. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
40. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 2: Applying the Model to Operations | CERT’s Podcasts for Business Leaders | |
41. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 3: Building a Risk-Based Compliance Program | CERT’s Podcasts for Business Leaders | |
42. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction - Part 1: Internal Audit as Assurance Provider | CERT's Podcasts for Business Leaders | |
43. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 2: Zeroing in on a Risk Assessment Method | CERT’s Podcasts for Business Leaders | |
44. | Dan Swanson | Internal Audit's Role in Information Security: An Introduction- Part 2: Internal Audit as Collaborator | CERT's Podcasts for Business Leaders | |
45. | Kent Bottles, MD and David Leach, MD | The Importance of Private Practitioners in the Education of the Next Generation of Physicians with David Leach, MD, and Executive Director of ACGME | The Journal of Medical Practice Management | |
46. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 3: Collaboration Among National CSIRTs - How Business Leaders Can Benefit | CERT’s Podcasts for Business Leaders | |
47. | Jeff Carpenter | Tackling Security at the National Level: A Resource for Leaders - Part 2: How Business Leaders Can Interact with National CSIRTs | CERT’s Podcasts for Business Leaders | |
48. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 1: The Resiliency Engineering Model | CERT’s Podcasts for Business Leaders | |
49. | Jon Allen, Robert Paul Hartland | Security Assessments for Information Technology | EDUCAUSE 2005 Annual Conference | |
50. | Bruce Schneier | The Economics of Information Security - Ten Trends | | |
51. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
52. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
53. | Larry Rogers | A New Look at the Business of IT Education | CERT's Podcasts for Business Leaders | |
54. | Robert Kvavik & John Voloudakis | IT Security in Higher Education: A Sea Change | EDUCAUSE 2006 Annual Conference | |
55. | Bill Wilson | Using Standards to Build an Information Security Program | CERT’s Podcasts for Business Leaders | |
56. | Michael Farnum, Jim Broome, and Guest - Kirk Greene | An Information Security Place Podcast - Episode #8 | Recorded On: October 30, 2008 | |
57. | Host Dale Kutnick and Guest Tom Scholtz | Information Security Architecture: Structure & Content | Gartner Voice | |
58. | Paul Love | Making Information Security Policy Happen | CERT's Podcasts for Business Leaders | |
59. | Mark Estberg; John - Webcast Team | TechNet Webcast: How Microsoft IT Does Information Security | | |
60. | Host Vic Wheatman and Guest Mark Nicolett | Security Information & Event Management Use Cases | Gartner Voice | |