Software Engineering Institute (SEI) Podcast Series

Members of Technical Staff at the Software Engineering Institute
undefined
Jan 9, 2010 • 26min

Leveraging Security Policies and Procedures for Electronic Evidence Discovery

Being able to effectively respond to e-discovery requests depends on well-defined, enacted policies, procedures, and processes. Listen on Apple Podcasts.
undefined
Dec 22, 2009 • 17min

Integrating Privacy Practices into the Software Development Life Cycle

Addressing privacy during software development is just as important as addressing security. Listen on Apple Podcasts.
undefined
Dec 1, 2009 • 22min

Using the Facts to Protect Enterprise Networks: CERT's NetSA Team

Network defenders and business leaders can use NetSA measures and evidence to better protect their networks. Listen on Apple Podcasts.
undefined
Nov 10, 2009 • 21min

Ensuring Continuity of Operations When Business Is Disrupted

Providing critical services during times of stress depends on documented, tested business continuity plans. Related Course Introduction to CERT Resiliency Management Model Listen on Apple Podcasts.
undefined
Oct 20, 2009 • 27min

Managing Relationships with Business Partners to Achieve Operational Resiliency

A defined, managed process for third party relationships is essential, particularly when business is disrupted. Related Course Introduction to CERT Resiliency Management Model Listen on Apple Podcasts.
undefined
Sep 29, 2009 • 20min

The Smart Grid: Managing Electrical Power Distribution and Use

The smart grid is the use of digital technology to modernize the power grid, which comes with some new privacy and security challenges. Listen on Apple Podcasts.
undefined
Sep 8, 2009 • 26min

Electronic Health Records: Challenges for Patient Privacy and Security

Electronic health records (EHRs) are possibly the most complicated area of IT today, more difficult than defense. Listen on Apple Podcasts.
undefined
Aug 18, 2009 • 36min

Mitigating Insider Threat: New and Improved Practices

Two hundred and eighty-two cases of actual insider attacks suggest 16 best practices for preventing and detecting insider threat. Listen on Apple Podcasts.
undefined
Jul 7, 2009 • 30min

Rethinking Risk Management

Business leaders need new approaches to address multi-enterprise, systems of systems risks across the life cycle and supply chain. Related Courses Assessing Information Security Risk Using the OCTAVE Practical Risk Management: Framework and Methods Listen on Apple Podcasts.
undefined
Jun 16, 2009 • 28min

The Upside and Downside of Security in the Cloud

When considering cloud services, business leaders need to weigh the economic benefits against the security and privacy risks. Listen on Apple Podcasts.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app