CERT's Podcast Series: Security for Business Leaders show

CERT's Podcast Series: Security for Business Leaders

Summary: In this series of podcasts, CERT provides both general principles and specific starting points for business leaders who want to launch an enterprise-wide security effort or make sure their existing security program is as good as it can be.

Podcasts:

 Getting in Front of Social Engineering | File Type: audio/mp3 | Duration: 23:33

Getting in Front of Social Engineering

 Using Benchmarks to Make Better Security Decisions | File Type: audio/mp3 | Duration: 20:07

Using Benchmarks to Make Better Security Decisions

 Protecting Information Privacy - How To and Lessons Learned | File Type: audio/mp3 | Duration: 22:12

Protecting Information Privacy - How To and Lessons Learned

 Initiating a Security Metrics Program: Key Points to Consider | File Type: audio/mp3 | Duration: 12:04

Initiating a Security Metrics Program: Key Points to Consider

 Insider Threat and the Software Development Life Cycle | File Type: audio/mp3 | Duration: 23:33

Insider Threat and the Software Development Life Cycle

 Tackling the Growing Botnet Threat | File Type: audio/mp3 | Duration: 20:33

Tackling the Growing Botnet Threat

 Building a Security Metrics Program | File Type: audio/mp3 | Duration: 22:33

Building a Security Metrics Program

 Inadvertent Data Disclosure on Peer-to-Peer Networks | File Type: audio/mp3 | Duration: 20:13

Inadvertent Data Disclosure on Peer-to-Peer Networks

 Information Compliance: A Growing Challenge for Business Leaders | File Type: audio/mp3 | Duration: 21:53

Information Compliance: A Growing Challenge for Business Leaders

 Internal Audit's Role in Information Security: An Introduction | File Type: audio/mp3 | Duration: 14:25

Internal Audit's Role in Information Security: An Introduction

 What Business Leaders Can Expect from Security Degree Programs | File Type: audio/mp3 | Duration: 18:29

What Business Leaders Can Expect from Security Degree Programs

 The Path from Information Security Risk Assessment to Compliance | File Type: audio/mp3 | Duration: 26:17

The Path from Information Security Risk Assessment to Compliance

 Computer Forensics for Business Leaders: Building Robust Policies and Processes | File Type: audio/mp3 | Duration: 12:21

Computer Forensics for Business Leaders: Building Robust Policies and Processes

 Business Resilience: A More Compelling Argument for Information Security | File Type: audio/mp3 | Duration: 24:33

Business Resilience: A More Compelling Argument for Information Security

 Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity | File Type: audio/mp3 | Duration: 18:23

Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity

Comments

Login or signup comment.