Podcast Episodes

Back to Search
Analyzing Internet Traffic for Better Cyber Situational Awareness

Automation, innovation, reaction, and expansion are the foundation for obtaining meaningful network traffic intelligence in today's extended enterpri…

17 years, 8 months ago

Short Long
View Episode
Managing Security Vulnerabilities Based on What Matters Most

Determining which security vulnerabilities to address should be based on the importance of the information asset. Related Course Information Secu…

17 years, 8 months ago

Short Long
View Episode
Identifying Software Security Requirements Early, Not After the Fact

During requirements engineering, software engineers need to think deeply about (and document) how software should behave when under attack. Related …

17 years, 9 months ago

Short Long
View Episode
Making Information Security Policy Happen

Targeted, innovative communications and a robust life cycle are keys for security policy success. Related Course Managing Enterprise Information Se…

17 years, 9 months ago

Short Long
View Episode
Becoming a Smart Buyer of Software

Managing software that is developed by an outside organization can be more challenging than building it yourself. Related Course Software Acquisiton…

17 years, 10 months ago

Short Long
View Episode
Building More Secure Software

Software security is about building better, more defect-free software to reduce vulnerabilities that are targeted by attackers. Related Course Sec…

17 years, 10 months ago

Short Long
View Episode
Connecting the Dots Between IT Operations and Security

High performing organizations effectively integrate information security controls into mainstream IT operational processes. Related Course Managin…

17 years, 11 months ago

Short Long
View Episode
Getting in Front of Social Engineering

Helping your staff learn how to identify social engineering attempts is the first step in thwarting them. Listen on Apple Podcasts.

17 years, 11 months ago

Short Long
View Episode
Using Benchmarks to Make Better Security Decisions

Benchmark results can be used to compare with peers, drive performance, and help determine how much security is enough. Listen on Apple Podcasts.

18 years ago

Short Long
View Episode
Protecting Information Privacy - How To and Lessons Learned

Aligning with business objectives, integrating with enterprise risks, and collaborating with stakeholders are key to ensuring information privacy. L…

18 years ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us