ID | Interpret | Skladba | Album | |
1. | Jon Allen, Robert Paul Hartland | Security Assessments for Information Technology | EDUCAUSE 2005 Annual Conference | |
2. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - eDMZ Security | | |
3. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Calyptix Security | | |
4. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Relational Security | | |
5. | Information Security Media Group | Information Security Media Group - RSA Conference 2007 - Chosen Security | | |
6. | Information Security Media Group | Information Security Media Group Interview with Application Security, Inc. | InfoSecurity NY 2007 | |
7. | David Matthews | Integrating Security Incident Response and e-Discovery - Part 1: Information Security for City Governments; Defining e-Discovery | CERT's Podcasts for Business Leaders | |
8. | Bill Wilson | The Path from Information Security Risk Assessment to Compliance - Part 1: Assessing Security Risk in a Business Context | CERT’s Podcasts for Business Leaders | |
9. | ECT News Network | Information Asymmetry: Shattered by Technology | Tech Business Commentary From E-Commerce Times Columnist Ted di Stefano | |
10. | BeyeNETWORK | Inmon's Hierarchy of Needs for Information Technology, Part 2 | Audio Article | |
11. | Christine Tyler & Jackie Wilson | Information Technology at Purdue's Job Family System | EDUCAUSE 2006 Annual Conference | |
12. | BeyeNETWORK | Inmon's Hierarchy of Needs for Information Technology, Part 1 | Audio Article | |
13. | EDUCAUSE | The Role of Information Technology in an Age of Access, Affordability, and Accountability | 2007 Annual Conference | |
14. | Anand S. Dighe, M.D., Ph.D. | Information Technology as a Key Enabler for Enhanced Automation in the Core Laboratory | LabInfoTech Summit 2009 | |
15. | Brian Chess | An Alternative to Risk Management for Information and Software Security - Part 1: Why Risk Management Is a Poor Foundation for Security | CERT's Podcasts for Business Leaders | |
16. | INSEAD | INSEAD Knowledgecast n°43: Global information technology report: Making progress | INSEAD Knowledgecast | |
17. | Dr. Ego, (Sara ,) init | Culture, Politix and Information Technology - Report from Plug'n'Politx in Zurich Outlook | | |
18. | Dr. Ego, init | Culture, Politix and Information Technology - Report from Plug'n'Politx in Zurich Outlook | | |
19. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
20. | Host Dale Kutnick and Guest Amrit Williams | Security Information & Event Management | Gartner Voice | |
21. | Bruce Schneier | The Economics of Information Security - Ten Trends | | |
22. | Mark Estberg; John - Webcast Team | TechNet Webcast: How Microsoft IT Does Information Security | | |
23. | Tammy Clark & William Monahan | Start with a Great Information Security Plan! | EDUCAUSE 2006 Annual Conference | |
24. | Bill Wilson | Using Standards to Build an Information Security Program | CERT’s Podcasts for Business Leaders | |
25. | Paul Love | Making Information Security Policy Happen | CERT's Podcasts for Business Leaders | |
26. | Host Vic Wheatman and Guest Mark Nicolett | Security Information & Event Management Use Cases | Gartner Voice | |
27. | Tammy Clark & William Monahan | Start with a Great Information Security Plan! | EDUCAUSE 2006 Annual Conference | |
28. | Host Dale Kutnick and Guest Tom Scholtz | Information Security Architecture: Structure & Content | Gartner Voice | |
29. | Michael Farnum, Jim Broome, and Guest - Kirk Greene | An Information Security Place Podcast - Episode #8 | Recorded On: October 30, 2008 | |
30. | Information Security Media Group | Information Security Media Group Interview with RCG | InfoSecurity NY 2007 | |