

Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
Episodes
Mentioned books

Mar 4, 2008 • 24min
Insider Threat and the Software Development Life Cycle
Significant insider threat vulnerabilities can be introduced (and mitigated) during all phases of the software development life cycle. Listen on Apple Podcasts.

Feb 19, 2008 • 21min
Tackling the Growing Botnet Threat
Business leaders need to understand the risks to their organizations caused by the proliferation of botnets. Listen on Apple Podcasts.

Feb 5, 2008 • 23min
Building a Security Metrics Program
Selecting and reporting meaningful security metrics depend on picking topics of great interest, defining the business context, and having access to sound data. Listen on Apple Podcasts.

Jan 22, 2008 • 20min
Inadvertent Data Disclosure on Peer-to-Peer Networks
Peer-to-peer networks are being used today to unintentionally disclose government, commercial, and personal information. Listen on Apple Podcasts.

Jan 8, 2008 • 22min
Information Compliance: A Growing Challenge for Business Leaders
Directors and senior executives are personally accountable for protecting information entrusted to their care. Related Course Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth Listen on Apple Podcasts.

Dec 10, 2007 • 14min
Internal Audit's Role in Information Security: An Introduction
Internal Audit can serve a key role in putting an effective information security program in place, and keeping it there. Listen on Apple Podcasts.

Nov 27, 2007 • 19min
What Business Leaders Can Expect from Security Degree Programs
Information security degree programs are proliferating, but what do they really offer business leaders who are seeking knowledgeable employees? Listen on Apple Podcasts.

Nov 13, 2007 • 26min
The Path from Information Security Risk Assessment to Compliance
Information security risk assessment, performed in concert with operational risk management, can contribute to compliance as an outcome. Related Course Assessing Information Security Risk Using the OCTAVE Approach Listen on Apple Podcasts.

Oct 30, 2007 • 12min
Computer Forensics for Business Leaders: Building Robust Policies and Processes
Business leaders can play a key role in computer forensics by establishing strong policies and proactively testing to ensure those policies work in tough situations. Related Training Computer Forensics for Technical Staff Listen on Apple Podcasts.

Oct 16, 2007 • 25min
Business Resilience: A More Compelling Argument for Information Security
A business resilience argument can bridge the communication gap that often exists between information security officers and business leaders. Related Course Introduction to the CERT Resiliency Engineering Framework Listen on Apple Podcasts.


