

Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
Episodes
Mentioned books

Jan 9, 2010 • 26min
Leveraging Security Policies and Procedures for Electronic Evidence Discovery
Being able to effectively respond to e-discovery requests depends on well-defined, enacted policies, procedures, and processes. Listen on Apple Podcasts.

Dec 22, 2009 • 17min
Integrating Privacy Practices into the Software Development Life Cycle
Addressing privacy during software development is just as important as addressing security. Listen on Apple Podcasts.

Dec 1, 2009 • 22min
Using the Facts to Protect Enterprise Networks: CERT's NetSA Team
Network defenders and business leaders can use NetSA measures and evidence to better protect their networks. Listen on Apple Podcasts.

Nov 10, 2009 • 21min
Ensuring Continuity of Operations When Business Is Disrupted
Providing critical services during times of stress depends on documented, tested business continuity plans. Related Course Introduction to CERT Resiliency Management Model Listen on Apple Podcasts.

Oct 20, 2009 • 27min
Managing Relationships with Business Partners to Achieve Operational Resiliency
A defined, managed process for third party relationships is essential, particularly when business is disrupted. Related Course Introduction to CERT Resiliency Management Model Listen on Apple Podcasts.

Sep 29, 2009 • 20min
The Smart Grid: Managing Electrical Power Distribution and Use
The smart grid is the use of digital technology to modernize the power grid, which comes with some new privacy and security challenges. Listen on Apple Podcasts.

Sep 8, 2009 • 26min
Electronic Health Records: Challenges for Patient Privacy and Security
Electronic health records (EHRs) are possibly the most complicated area of IT today, more difficult than defense. Listen on Apple Podcasts.

Aug 18, 2009 • 36min
Mitigating Insider Threat: New and Improved Practices
Two hundred and eighty-two cases of actual insider attacks suggest 16 best practices for preventing and detecting insider threat. Listen on Apple Podcasts.

Jul 7, 2009 • 30min
Rethinking Risk Management
Business leaders need new approaches to address multi-enterprise, systems of systems risks across the life cycle and supply chain. Related Courses Assessing Information Security Risk Using the OCTAVE Practical Risk Management: Framework and Methods Listen on Apple Podcasts.

Jun 16, 2009 • 28min
The Upside and Downside of Security in the Cloud
When considering cloud services, business leaders need to weigh the economic benefits against the security and privacy risks. Listen on Apple Podcasts.


