ID | Interpret | Skladba | Album | |
1. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 1: The Resiliency Engineering Model | CERT’s Podcasts for Business Leaders | |
2. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 3: Resiliency and Risk | CERT’s Podcasts for Business Leaders | |
3. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity | CERT’s Podcasts for Business Leaders | |
4. | Lisa Young | Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity - Part 2: Applying the Model to Operations | CERT’s Podcasts for Business Leaders | |
5. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 1: The Increasing Scope and Importance of Business Continuity Planning | CERT’s Podcasts for Business Leaders | |
6. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 3: Developing & Exercising a Business Continuity Plan | CERT’s Podcasts for Business Leaders | |
7. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted | CERT’s Podcasts for Business Leaders | |
8. | Gary Daniels | Ensuring Continuity of Operations when Business Is Disrupted - Part 2: Determining What to Protect; Identifying Key Players | CERT’s Podcasts for Business Leaders | |
9. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 1: The Disconnects, and Why Business Leaders Should Care | CERT's Podcasts for Business Leaders | |
10. | Rich Caralli | Adapting to Changing Risk Environments: Operational Resilience - Part 3: Resiliency Engineering: A Preview | CERT's Podcasts for Business Leaders | |
11. | Editorial Team | Achieving Business Intelligence Impact: Integrating Business Intelligence with Core Business Processes | 6283 | |
12. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
13. | Bruce Hennes and Dan Hanson | Business Continuity Planning and Web 2.0 | The Great Lakes Geek Show | |
14. | Bruce Hennes and Dan Hanson | Business Continuity Planning and Web 2.0 | The Great Lakes Geek Show | |
15. | Host Dale Kutnick and Guest Roberta Witty | A Business Continuity Update | Gartner Voice | |
16. | Host Dale Kutnick and Guest Roberta Witty | A Business Continuity Update | Gartner Voice | |
17. | David Matthews | Integrating Security Incident Response and e-Discovery | CERT's Podcasts for Business Leaders | |
18. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 2: Getting Started | CERT’s Podcasts for Business Leaders | |
19. | Gene Kim | Connecting the Dots between IT Operations and Security | CERT's Podcasts for Business Leaders | |
20. | Hector Linares | TechNet Webcast Audio: Creating Business Continuity Solutions Using Windows Virtualization | | |
21. | Sean Beggs | What Business Leaders Can Expect from Security Degree Programs - Part 3: Keeping Pace as the Security Field Evolves | CERT’s Podcasts for Business Leaders | |
22. | Ross Anderson | 01 - What is Security Engineering? | Security Engineering | |
23. | Scott Dynes | Business Resilience: A More Compelling Argument for Information Security - Part 1: Bridging the Business – INFOSEC Language Gap | CERT's Podcasts for Business Leaders | |
24. | Bill Crowell & Brian Contos | Convergence: Integrating Physical and IT Security - Part 3: Trends and Future Directions | CERT’s Podcasts for Business Leaders | |
25. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 4: Key Roles; Steps for Getting Started | CERT's Podcasts for Business Leaders | |
26. | John Lambert | Security Engineering in Windows Vista | Black Hat USA 2006 | |
27. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 2: Benchmarking and Situational Awareness | CERT's Podcasts for Business Leaders | |
28. | Jon Udell, Bob Glushko | A conversation with Bob Glushko about document engineering and business patterns | Interviews with Innovators: Jon Udell's Friday Podcasts | |
29. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
30. | Gene Kim | Connecting the Dots between IT Operations and Security - Part 3: Risk-based Scoping, Upstream Involvement, and Meaningful Metrics | CERT's Podcasts for Business Leaders | |