Ahorra 5 meses con 1 año de Premium al 35% dto ¡Lo quiero!
CERT Podcast

podcast

Suscribirse

CERT Podcast

Por Miquel Bahia
En CERT

Becoming a CISO: Formal and Informal Requirements

In this podcast, Darrell Keeling, Vice President of Information Security and HIPAA Security...

Añadir a ... 

Global Value Chain – An Expanded View of the ICT Supply Chain

In this podcast, Edna Conway, and John Haller, discuss the global value chain for organizations...

Añadir a ... 

Intelligence Preparation for Operational Resilience

In this podcast, Douglas Gray, a member of the CERT Cyber Risk Management team, discusses how to...

Añadir a ... 

Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations

In this podcast, Gary McGraw, the Chief Technology Officer for Cigital, discusses the latest...

Añadir a ... 

Structuring the Chief Information Security Officer Organization

In this podcast, Nader Mehravari and Julia Allen, members of the CERT Cyber Risk Management team,...

Añadir a ... 

How Cyber Insurance Is Driving Risk and Technology Management

In this podcast, Chip Block, Vice President at Evolver, discusses the growth of the cyber...

Añadir a ... 

How the University of Pittsburgh Is Using the NIST Cybersecurity Framework

In this podcast, Sean Sweeney, Information Security Officer (ISO) for the University of...

Añadir a ... 

Capturing the Expertise of Cybersecurity Incident Handlers

In this podcast, Dr. Richard Young, a professor with CMU, and Sam Perl, a member of the CERT...

Añadir a ... 

Supply Chain Risk Management: Managing Third Party and External Dependency Risk

In this podcast, Matt Butkovic and John Haller discuss approaches for more effectively managing...

Añadir a ... 

A Workshop on Measuring What Matters

This podcast summarizes the inaugural Measuring What Matters Workshop conducted in November 2014,...

Añadir a ... 

Cyber Insurance and Its Role in Mitigating Cybersecurity Risk

In this podcast, Jim Cebula and David White discuss cyber insurance and its potential role in...

Añadir a ... 

A Taxonomy of Operational Risks for Cyber Security

In this webinar, James Cebula describes how to use a taxonomy to increase confidence that your...

Añadir a ... 

Characterizing and Prioritizing Malicious Code

In this podcast, Jose Morales discusses how to prioritize malware samples, helping analysts to...

Añadir a ... 

Comparing IT Risk Assessment and Analysis Methods

ES-C2M2 helps improve the operational resilience of the U.S. power grid.

Añadir a ... 

The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)

ES-C2M2 helps improve the operational resilience of the U.S. power grid.

Añadir a ... 

Raising the Bar - Mainstreaming CERT C Secure Coding Rules

CERT led the 7-year effort to publish an ISO/IEC technical specification containing 46 CERT-based...

Añadir a ... 

Raising the Bar - Mainstreaming CERT C Secure Coding Rules

CERT led the 7-year effort to publish an ISO/IEC technical specification containing 46 CERT-based...

Añadir a ... 

Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience

Participating in a CRR allows critical infrastructure owners and operators to compare their...

Añadir a ... 

Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience

Participating in a CRR allows critical infrastructure owners and operators to compare their...

Añadir a ... 

Why Use Maturity Models to Improve Cybersecurity - Key Concepts, Principles, and Definitions

Maturity models are providing measurable value in improving an organization's cybersecurity...

Añadir a ...