Podcast Episodes

Back to Search
Initiating a Security Metrics Program: Key Points to Consider

A sound security metrics program is grounded in selecting data that is relevant to consumers and collecting it from repeatable processes. Listen on …

18 years ago

Short Long
View Episode
Insider Threat and the Software Development Life Cycle

Significant insider threat vulnerabilities can be introduced (and mitigated) during all phases of the software development life cycle. Listen on App…

18 years, 1 month ago

Short Long
View Episode
Tackling the Growing Botnet Threat

Business leaders need to understand the risks to their organizations caused by the proliferation of botnets. Listen on Apple Podcasts.

18 years, 1 month ago

Short Long
View Episode
Building a Security Metrics Program

Selecting and reporting meaningful security metrics depend on picking topics of great interest, defining the business context, and having access to s…

18 years, 2 months ago

Short Long
View Episode
Inadvertent Data Disclosure on Peer-to-Peer Networks

Peer-to-peer networks are being used today to unintentionally disclose government, commercial, and personal information. Listen on Apple Podcasts.

18 years, 2 months ago

Short Long
View Episode
Information Compliance: A Growing Challenge for Business Leaders

Directors and senior executives are personally accountable for protecting information entrusted to their care. Related Course Managing Enterprise In…

18 years, 3 months ago

Short Long
View Episode
Internal Audit's Role in Information Security: An Introduction

Internal Audit can serve a key role in putting an effective information security program in place, and keeping it there. Listen on Apple Podcasts.

18 years, 4 months ago

Short Long
View Episode
What Business Leaders Can Expect from Security Degree Programs

Information security degree programs are proliferating, but what do they really offer business leaders who are seeking knowledgeable employees? Liste…

18 years, 4 months ago

Short Long
View Episode
The Path from Information Security Risk Assessment to Compliance

Information security risk assessment, performed in concert with operational risk management, can contribute to compliance as an outcome. Related Cour…

18 years, 5 months ago

Short Long
View Episode
Computer Forensics for Business Leaders: Building Robust Policies and Processes

Business leaders can play a key role in computer forensics by establishing strong policies and proactively testing to ensure those policies work in t…

18 years, 5 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us