Podcast Episodes
Back to SearchInitiating a Security Metrics Program: Key Points to Consider
A sound security metrics program is grounded in selecting data that is relevant to consumers and collecting it from repeatable processes. Listen on …
18 years ago
Insider Threat and the Software Development Life Cycle
Significant insider threat vulnerabilities can be introduced (and mitigated) during all phases of the software development life cycle. Listen on App…
18 years, 1 month ago
Tackling the Growing Botnet Threat
Business leaders need to understand the risks to their organizations caused by the proliferation of botnets. Listen on Apple Podcasts.
18 years, 1 month ago
Building a Security Metrics Program
Selecting and reporting meaningful security metrics depend on picking topics of great interest, defining the business context, and having access to s…
18 years, 2 months ago
Inadvertent Data Disclosure on Peer-to-Peer Networks
Peer-to-peer networks are being used today to unintentionally disclose government, commercial, and personal information. Listen on Apple Podcasts.
18 years, 2 months ago
Information Compliance: A Growing Challenge for Business Leaders
Directors and senior executives are personally accountable for protecting information entrusted to their care. Related Course Managing Enterprise In…
18 years, 3 months ago
Internal Audit's Role in Information Security: An Introduction
Internal Audit can serve a key role in putting an effective information security program in place, and keeping it there. Listen on Apple Podcasts.
18 years, 4 months ago
What Business Leaders Can Expect from Security Degree Programs
Information security degree programs are proliferating, but what do they really offer business leaders who are seeking knowledgeable employees? Liste…
18 years, 4 months ago
The Path from Information Security Risk Assessment to Compliance
Information security risk assessment, performed in concert with operational risk management, can contribute to compliance as an outcome. Related Cour…
18 years, 5 months ago
Computer Forensics for Business Leaders: Building Robust Policies and Processes
Business leaders can play a key role in computer forensics by establishing strong policies and proactively testing to ensure those policies work in t…
18 years, 5 months ago