Software Engineering Institute (SEI) Podcast Series

Members of Technical Staff at the Software Engineering Institute
undefined
Mar 4, 2008 • 24min

Insider Threat and the Software Development Life Cycle

Significant insider threat vulnerabilities can be introduced (and mitigated) during all phases of the software development life cycle. Listen on Apple Podcasts.
undefined
Feb 19, 2008 • 21min

Tackling the Growing Botnet Threat

Business leaders need to understand the risks to their organizations caused by the proliferation of botnets. Listen on Apple Podcasts.
undefined
Feb 5, 2008 • 23min

Building a Security Metrics Program

Selecting and reporting meaningful security metrics depend on picking topics of great interest, defining the business context, and having access to sound data. Listen on Apple Podcasts.
undefined
Jan 22, 2008 • 20min

Inadvertent Data Disclosure on Peer-to-Peer Networks

Peer-to-peer networks are being used today to unintentionally disclose government, commercial, and personal information. Listen on Apple Podcasts.
undefined
Jan 8, 2008 • 22min

Information Compliance: A Growing Challenge for Business Leaders

Directors and senior executives are personally accountable for protecting information entrusted to their care. Related Course Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth Listen on Apple Podcasts.
undefined
Dec 10, 2007 • 14min

Internal Audit's Role in Information Security: An Introduction

Internal Audit can serve a key role in putting an effective information security program in place, and keeping it there. Listen on Apple Podcasts.
undefined
Nov 27, 2007 • 19min

What Business Leaders Can Expect from Security Degree Programs

Information security degree programs are proliferating, but what do they really offer business leaders who are seeking knowledgeable employees? Listen on Apple Podcasts.
undefined
Nov 13, 2007 • 26min

The Path from Information Security Risk Assessment to Compliance

Information security risk assessment, performed in concert with operational risk management, can contribute to compliance as an outcome. Related Course Assessing Information Security Risk Using the OCTAVE Approach Listen on Apple Podcasts.
undefined
Oct 30, 2007 • 12min

Computer Forensics for Business Leaders: Building Robust Policies and Processes

Business leaders can play a key role in computer forensics by establishing strong policies and proactively testing to ensure those policies work in tough situations. Related Training Computer Forensics for Technical Staff Listen on Apple Podcasts.
undefined
Oct 16, 2007 • 25min

Business Resilience: A More Compelling Argument for Information Security

A business resilience argument can bridge the communication gap that often exists between information security officers and business leaders. Related Course Introduction to the CERT Resiliency Engineering Framework Listen on Apple Podcasts.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app