Becoming a CISO: Formal and Informal Requirements
In this podcast, Darrell Keeling, Vice President of Information Security and HIPAA Security...
23:31
Becoming a CISO: Formal and Informal Requirements
In this podcast, Darrell Keeling, Vice President of Information Security and HIPAA Security...
23:31
Global Value Chain – An Expanded View of the ICT Supply Chain
In this podcast, Edna Conway, and John Haller, discuss the global value chain for organizations...
30:11
Intelligence Preparation for Operational Resilience
In this podcast, Douglas Gray, a member of the CERT Cyber Risk Management team, discusses how to...
27:00
Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations
In this podcast, Gary McGraw, the Chief Technology Officer for Cigital, discusses the latest...
31:27
Structuring the Chief Information Security Officer Organization
In this podcast, Nader Mehravari and Julia Allen, members of the CERT Cyber Risk Management team,...
31:22
How Cyber Insurance Is Driving Risk and Technology Management
In this podcast, Chip Block, Vice President at Evolver, discusses the growth of the cyber...
21:22
How the University of Pittsburgh Is Using the NIST Cybersecurity Framework
In this podcast, Sean Sweeney, Information Security Officer (ISO) for the University of...
23:46
Capturing the Expertise of Cybersecurity Incident Handlers
In this podcast, Dr. Richard Young, a professor with CMU, and Sam Perl, a member of the CERT...
26:00
Supply Chain Risk Management: Managing Third Party and External Dependency Risk
In this podcast, Matt Butkovic and John Haller discuss approaches for more effectively managing...
28:09
A Workshop on Measuring What Matters
This podcast summarizes the inaugural Measuring What Matters Workshop conducted in November 2014,...
30:41
Cyber Insurance and Its Role in Mitigating Cybersecurity Risk
In this podcast, Jim Cebula and David White discuss cyber insurance and its potential role in...
37:25
A Taxonomy of Operational Risks for Cyber Security
In this webinar, James Cebula describes how to use a taxonomy to increase confidence that your...
32:46
Characterizing and Prioritizing Malicious Code
In this podcast, Jose Morales discusses how to prioritize malware samples, helping analysts to...
27:07
Comparing IT Risk Assessment and Analysis Methods
ES-C2M2 helps improve the operational resilience of the U.S. power grid.
37:27
The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)
ES-C2M2 helps improve the operational resilience of the U.S. power grid.
28:49
Raising the Bar - Mainstreaming CERT C Secure Coding Rules
CERT led the 7-year effort to publish an ISO/IEC technical specification containing 46 CERT-based...
25:17
Raising the Bar - Mainstreaming CERT C Secure Coding Rules
CERT led the 7-year effort to publish an ISO/IEC technical specification containing 46 CERT-based...
25:17
Participating in a CRR allows critical infrastructure owners and operators to compare their...
27:46
Participating in a CRR allows critical infrastructure owners and operators to compare their...
27:46
Why Use Maturity Models to Improve Cybersecurity - Key Concepts, Principles, and Definitions
Maturity models are providing measurable value in improving an organization's cybersecurity...
32:54
Critical Thinking
Episodio
Sistema tributario
Episodio
After Work 24/04/2024
Episodio
Tesla: Carmaker Now, Robotaxi Future
Episodio
Decoding Hollywood's Power Dynamics
Episodio