Ranked #1
Structuring the Chief Information Security Officer Organization
Structuring the Chief Information Security Officer Organization
Chief Information Security Officers (CISOs) are increasingly finding that the tried-and-true, traditional information se... Read more
23 Dec 2015
•
31mins
Ranked #2
Inside Defense-in-Depth
Inside Defense-in-Depth
Defense-in-Depth is one path toward enterprise resilience - the ability to withstand threats and failures. The foundatio... Read more
19 Dec 2006
•
15mins
Similar Podcasts
Ranked #3
Security: A Key Enabler of Business Innovation
Security: A Key Enabler of Business Innovation
Making security strategic to business innovation involves seven strategies and calculating risk-reward based on risk app... Read more
3 Mar 2009
•
23mins
Ranked #4
Applying Agile in the DoD: Second Principle
Applying Agile in the DoD: Second Principle
In this episode, the second in a series by Suzanne Miller and Mary Ann Lapham exploring the application of agile princip... Read more
13 Jun 2013
•
12mins
Ranked #5
Three Roles and Three Failure Patterns of Software Architects
Three Roles and Three Failure Patterns of Software Architects
As a software system moves through its lifecycle, each phase calls for the architect to use a different mix of skills. T... Read more
26 Jan 2017
•
13mins
Ranked #6
Measuring Operational Resilience
Measuring Operational Resilience
Measures of operational resilience should answer key questions, inform decisions, and affect behavior. Related Course ... Read more
4 Oct 2011
•
25mins
Ranked #7
Comparing IT Risk Assessment and Analysis Methods
Comparing IT Risk Assessment and Analysis Methods
Technical professionals are often called on to research, recommend, implement, and execute IT risk assessment and analys... Read more
25 Mar 2014
•
37mins
Ranked #8
Applying Agile in the DoD: Third Principle
Applying Agile in the DoD: Third Principle
In this episode, the third in a series by Suzanne Miller and Mary Ann Lapham exploring the application of agile principl... Read more
15 Aug 2013
•
16mins
Ranked #9
Predicting Software Assurance Using Quality and Reliability Measures
Predicting Software Assurance Using Quality and Reliability Measures
Security vulnerabilities are defects that enable an external party to compromise a system. Our research indicates that i... Read more
29 Jan 2015
•
19mins
Ranked #10
The Smart Grid: Managing Electrical Power Distribution and Use
The Smart Grid: Managing Electrical Power Distribution and Use
The smart grid is the use of digital technology to modernize the power grid, which comes with some new privacy and secur... Read more
29 Sep 2009
•
20mins
Ranked #11
Reducing Complexity in Software & Systems
Reducing Complexity in Software & Systems
Systems are increasingly software-reliant and interconnected, making design, analysis and evaluation harder than in the ... Read more
16 Jul 2015
•
19mins
Ranked #12
Cisco's Adoption of CERT Secure Coding Standards
Cisco's Adoption of CERT Secure Coding Standards
Implementing secure coding standards to reduce the number of vulnerabilities that can escape into operational systems is... Read more
28 Feb 2012
•
24mins
Ranked #13
Improving Cybersecurity Through Cyber Intelligence
Improving Cybersecurity Through Cyber Intelligence
Cyber intelligence is the acquisition of information to identify, track, or predict the cyber capabilities and actions o... Read more
10 Nov 2016
•
18mins
Ranked #14
The Path from Information Security Risk Assessment to Compliance
The Path from Information Security Risk Assessment to Compliance
Information security risk assessment, performed in concert with operational risk management, can contribute to complianc... Read more
13 Nov 2007
•
26mins
Ranked #15
The Real Secrets of Incident Management
The Real Secrets of Incident Management
Incident management is not just about technical response. It is a cross-enterprise effort that requires good communicati... Read more
3 Apr 2007
•
21mins
Ranked #16
Evolving Air Force Intelligence with Agile Techniques
Evolving Air Force Intelligence with Agile Techniques
In the past decade, the U.S. Air Force has built up great capability with the Distributed Common Ground System (AF DCGS)... Read more
26 May 2016
•
17mins
Ranked #17
Predicting Quality Assurance with Software Metrics and Security Methods
Predicting Quality Assurance with Software Metrics and Security Methods
To ensure software will function as intended and is free of vulnerabilities (aka software assurance), software engineers... Read more
13 Oct 2016
•
11mins
Ranked #18
Building More Secure Software
Building More Secure Software
Software security is about building better, more defect-free software to reduce vulnerabilities that are targeted by att... Read more
27 May 2008
•
16mins
Ranked #19
Internal Audit's Role in Information Security: An Introduction
Internal Audit's Role in Information Security: An Introduction
Internal Audit can serve a key role in putting an effective information security program in place, and keeping it there.... Read more
10 Dec 2007
•
14mins
Ranked #20
Making Information Security Policy Happen
Making Information Security Policy Happen
Targeted, innovative communications and a robust life cycle are keys for security policy success. Related Course Manag... Read more
24 Jun 2008
•
24mins