Podcast Episodes
Back to SearchAnalyzing Internet Traffic for Better Cyber Situational Awareness
Automation, innovation, reaction, and expansion are the foundation for obtaining meaningful network traffic intelligence in today's extended enterpri…
17 years, 8 months ago
Managing Security Vulnerabilities Based on What Matters Most
Determining which security vulnerabilities to address should be based on the importance of the information asset. Related Course Information Secu…
17 years, 8 months ago
Identifying Software Security Requirements Early, Not After the Fact
During requirements engineering, software engineers need to think deeply about (and document) how software should behave when under attack. Related …
17 years, 9 months ago
Making Information Security Policy Happen
Targeted, innovative communications and a robust life cycle are keys for security policy success. Related Course Managing Enterprise Information Se…
17 years, 9 months ago
Becoming a Smart Buyer of Software
Managing software that is developed by an outside organization can be more challenging than building it yourself. Related Course Software Acquisiton…
17 years, 10 months ago
Building More Secure Software
Software security is about building better, more defect-free software to reduce vulnerabilities that are targeted by attackers. Related Course Sec…
17 years, 10 months ago
Connecting the Dots Between IT Operations and Security
High performing organizations effectively integrate information security controls into mainstream IT operational processes. Related Course Managin…
17 years, 11 months ago
Getting in Front of Social Engineering
Helping your staff learn how to identify social engineering attempts is the first step in thwarting them. Listen on Apple Podcasts.
17 years, 11 months ago
Using Benchmarks to Make Better Security Decisions
Benchmark results can be used to compare with peers, drive performance, and help determine how much security is enough. Listen on Apple Podcasts.
18 years ago
Protecting Information Privacy - How To and Lessons Learned
Aligning with business objectives, integrating with enterprise risks, and collaborating with stakeholders are key to ensuring information privacy. L…
18 years ago