Parent directory/ | - | - |
= CERT.org Podcast (2006-2014) Thank You.txt | 543 B | 2020 Sep 07 06:12 |
CERT.org - 2006 - CERT Lessons Learned - A Conversation with Rich Pethia, Director of CERT.opus | 3.5 MiB | 2020 Sep 07 06:46 |
CERT.org - 2006 - Compliance vs. Buy-In.opus | 1.3 MiB | 2020 Sep 07 06:45 |
CERT.org - 2006 - Evolving Business Models, Threats, and Technologies.opus | 3.2 MiB | 2020 Sep 07 06:46 |
CERT.org - 2006 - Inside Defense-in-Depth.opus | 2.3 MiB | 2020 Sep 07 06:45 |
CERT.org - 2006 - Proactive Remedies for Rising Threats.opus | 2.9 MiB | 2020 Sep 07 06:46 |
CERT.org - 2006 - Protecting Against Insider Threat.opus | 4.0 MiB | 2020 Sep 07 06:46 |
CERT.org - 2006 - The ROI of Security.opus | 3.1 MiB | 2020 Sep 07 06:46 |
CERT.org - 2006 - The Security 'X' Factor.opus | 2.7 MiB | 2020 Sep 07 06:46 |
CERT.org - 2006 - Why Leaders Should Care About Security.opus | 2.6 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - 47232.opus | 4.6 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - A New Look at the Business of IT Education.opus | 2.6 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Adapting to Changing Risk Environments - Operational Resilience.opus | 3.6 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Assuring Mission Success in Complex Environments.opus | 2.6 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Building Staff Competence in Security.opus | 3.2 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Business Resilience - A More Compelling Argument for Information Security.opus | 3.6 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Computer Forensics for Business Leaders - A Primer.opus | 2.4 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Computer Forensics for Business Leaders - Building Robust Policies and Processes.opus | 1.8 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Convergence - Integrating Physical and IT Security.opus | 4.2 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Crisis Communications During a Security Incident.opus | 2.0 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Dual Perspectives - A CIO's and CISO's Take on Security.opus | 3.9 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Getting Real about Security Governance.opus | 2.9 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - IT Infrastructure - Tips for Navigating Tough Spots.opus | 3.3 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Internal Audit's Role in Information Security - An Introduction.opus | 2.1 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Privacy - The Slow Tipping Point.opus | 2.6 MiB | 2020 Sep 07 06:46 |
CERT.org - 2007 - Real-World Security for Business Leaders.opus | 3.0 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - Reducing Security Costs with Standard Configurations - U.S. Government Initiatives.opus | 3.7 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - Resiliency Engineering - Integrating Security, IT Operations, and Business Continuity.opus | 2.7 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - Tackling Security at the National Level - A Resource for Leaders.opus | 3.4 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - The Human Side of Security Trade-Offs.opus | 4.0 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - The Legal Side of Global Security.opus | 3.8 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - The Path from Information Security Risk Assessment to Compliance.opus | 3.9 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - The Real Secrets of Incident Management.opus | 3.1 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - Using Standards to Build an Information Security Program.opus | 4.1 MiB | 2020 Sep 07 06:47 |
CERT.org - 2007 - What Business Leaders Can Expect from Security Degree Programs.opus | 2.7 MiB | 2020 Sep 07 06:47 |
CERT.org - 2008 - Analyzing Internet Traffic for Better Cyber Situational Awareness.opus | 4.4 MiB | 2020 Sep 07 06:47 |
CERT.org - 2008 - Becoming a Smart Buyer of Software.opus | 3.1 MiB | 2020 Sep 07 06:47 |
CERT.org - 2008 - Building More Secure Software.opus | 2.4 MiB | 2020 Sep 07 06:47 |
CERT.org - 2008 - Building a Security Metrics Program.opus | 3.3 MiB | 2020 Sep 07 06:47 |
CERT.org - 2008 - Climate Change - Implications for Information Technology and Security.opus | 3.5 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Concrete Steps for Implementing an Information Security Program.opus | 3.2 MiB | 2020 Sep 07 06:47 |
CERT.org - 2008 - Connecting the Dots between IT Operations and Security.opus | 3.7 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Developing Secure Software - Universities as Supply Chain Partners.opus | 3.4 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Getting in Front of Social Engineering.opus | 3.5 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Getting to a Useful Set of Security Metrics.opus | 2.6 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - How to Start a Secure Software Development Program.opus | 2.8 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Identifying Software Security Requirements Early, Not After the Fact.opus | 3.3 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Inadvertent Data Disclosure on Peer-to-Peer Networks.opus | 3.0 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Information Compliance - A Growing Challenge for Business Leaders.opus | 3.2 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Initiating a Security Metrics Program - Key Points to Consider.opus | 1.8 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Insider Threat and the Software Development Life Cycle.opus | 3.5 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Integrating Security Incident Response and e-Discovery.opus | 3.8 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Making Information Security Policy Happen.opus | 3.6 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Managing Risk to Critical Infrastructures at the National Level.opus | 3.2 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Managing Security Vulnerabilities Based on What Matters Most.opus | 3.4 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Protecting Information Privacy - How To and Lessons Learned.opus | 3.3 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Security Risk Assessment Using OCTAVE Allegro.opus | 2.7 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Tackling the Growing Botnet Threat.opus | 3.0 MiB | 2020 Sep 07 06:48 |
CERT.org - 2008 - Using Benchmarking to Make Better Security Decisions.opus | 2.9 MiB | 2020 Sep 07 06:49 |
CERT.org - 2008 - Using High Fidelity, Online Training to Stay Sharp.opus | 3.9 MiB | 2020 Sep 07 06:49 |
CERT.org - 2008 - Virtual Communities - Risks and Opportunities.opus | 2.7 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - An Alternative to Risk Management for Information and Software Security.opus | 3.8 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - An Experience-Based Maturity Model for Software Security.opus | 3.2 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Better Incident Response through Scenario-Based Training.opus | 3.4 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Cyber Security, Safety, and Ethics for the Net Generation.opus | 3.0 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Electronic Health Records - Challenges for Patient Privacy & Security.opus | 3.9 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Ensuring Continuity of Operations when Business Is Disrupted.opus | 3.2 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Integrating Privacy Practices into the Software Development Lifecycle.opus | 2.6 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Is There Value in Identifying Software Security _Never Events__.opus | 2.9 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Mainstreaming Secure Coding Practices.opus | 2.9 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Managing Relationships with Business Partners to Achieve Operational Resiliency.opus | 3.9 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Mitigating Insider Threat - New and Improved Practices.opus | 5.3 MiB | 2020 Sep 07 06:50 |
CERT.org - 2009 - More Targeted, Sophisticated Attacks - Where to Pay Attention.opus | 3.0 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Rethinking Risk Management.opus | 4.3 MiB | 2020 Sep 07 06:50 |
CERT.org - 2009 - Security - A Key Enabler of Business Innovation.opus | 3.5 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - Tackling Tough Challenges - Insights from CERT’s Director Rich Pethia.opus | 2.6 MiB | 2020 Sep 07 06:49 |
CERT.org - 2009 - The Smart Grid - Managing Electrical Power Distribution and Use.opus | 3.0 MiB | 2020 Sep 07 06:50 |
CERT.org - 2009 - The Upside and Downside of Security in the Cloud.opus | 4.1 MiB | 2020 Sep 07 06:50 |
CERT.org - 2009 - Using the Facts to Protect Enterprise Networks.opus | 3.1 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - 46614.opus | 4.0 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - 47404.opus | 3.7 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - 50071.opus | 3.8 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - CERT's Podcast Series - Software Assurance - A Master's Level Curriculum.opus | 5.0 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - Computer and Network Forensics - A Masters-Level Curriculum.opus | 3.6 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - How Resilient is my Organization_.opus | 5.7 MiB | 2020 Sep 07 06:51 |
CERT.org - 2010 - How to Develop More Secure Software - Practices from Thirty Organizations.opus | 4.3 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - Introducing the Smart Grid Maturity Model (SGMM).opus | 3.8 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - Leveraging Security Policies and Procedures for Electronic Evidence Discovery.opus | 3.9 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - Protect Your Business from Money Mules.opus | 2.8 MiB | 2020 Sep 07 06:50 |
CERT.org - 2010 - Public-Private Partnerships - Essential for National Cyber Security.opus | 4.5 MiB | 2020 Sep 07 06:51 |
CERT.org - 2010 - Securing Industrial Control Systems.opus | 3.3 MiB | 2020 Sep 07 06:51 |
CERT.org - 2010 - TJX, Heartland, and CERT’s Forensics Analysis Capabilities.opus | 5.1 MiB | 2020 Sep 07 06:51 |
CERT.org - 2010 - The Power of Fuzz Testing to Reduce Security Vulnerabilities.opus | 3.8 MiB | 2020 Sep 07 06:51 |
CERT.org - 2010 - The Role of the CISO in Developing More Secure Software.opus | 4.0 MiB | 2020 Sep 07 06:51 |
CERT.org - 2011 - 47337.opus | 372.9 KiB | 2020 Sep 07 06:50 |
CERT.org - 2011 - 47343.opus | 4.1 MiB | 2020 Sep 07 06:51 |
CERT.org - 2011 - Building a Malware Analysis Capability.opus | 3.6 MiB | 2020 Sep 07 06:51 |
CERT.org - 2011 - Considering Security and Privacy in the Move to Electronic Health Records.opus | 4.1 MiB | 2020 Sep 07 06:51 |
CERT.org - 2011 - Controls for Monitoring the Security of Cloud Services.opus | 2.7 MiB | 2020 Sep 07 06:51 |
CERT.org - 2011 - Indicators and Controls for Mitigating Insider Threat.opus | 3.4 MiB | 2020 Sep 07 06:51 |
CERT.org - 2011 - Measuring Operational Resilience.opus | 3.7 MiB | 2020 Sep 07 06:51 |
CERT.org - 2011 - Using the Smart Grid Maturity Model (SGMM).opus | 4.3 MiB | 2020 Sep 07 06:52 |
CERT.org - 2011 - Why Organizations Need a Secure Domain Name System.opus | 3.0 MiB | 2020 Sep 07 06:51 |
CERT.org - 2012 - Cisco's Adoption of CERT Secure Coding Standards.opus | 3.5 MiB | 2020 Sep 07 06:52 |
CERT.org - 2012 - How to Become a Cyber Warrior.opus | 3.8 MiB | 2020 Sep 07 06:52 |
CERT.org - 2012 - How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them.opus | 5.4 MiB | 2020 Sep 07 06:52 |
CERT.org - 2012 - Insights from the First CERT Resilience Management Model Users Group.opus | 3.9 MiB | 2020 Sep 07 06:52 |
CERT.org - 2012 - Managing Disruptive Events - Making the Case for Operational Resilience.opus | 3.5 MiB | 2020 Sep 07 06:52 |
CERT.org - 2012 - NIST Catalog of Security and Privacy Controls, Including Insider Threat.opus | 4.1 MiB | 2020 Sep 07 06:52 |
CERT.org - 2012 - US Postal Inspection Service Use of the CERT Resilience Management Model.opus | 3.5 MiB | 2020 Sep 07 06:52 |
CERT.org - 2012 - Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities.opus | 4.3 MiB | 2020 Sep 07 06:52 |
CERT.org - 2013 - 46310.opus | 3.4 MiB | 2020 Sep 07 06:52 |
CERT.org - 2013 - 48508.opus | 5.1 MiB | 2020 Sep 07 06:53 |
CERT.org - 2013 - DevOps - Transform Development and Operations for Fast, Secure Deployments.opus | 4.9 MiB | 2020 Sep 07 06:53 |
CERT.org - 2013 - Managing Disruptive Events - CERT-RMM Experience Reports.opus | 5.2 MiB | 2020 Sep 07 06:53 |
CERT.org - 2013 - Managing Disruptive Events - Demand for an Integrated Approach to Better Manage Risk.opus | 3.8 MiB | 2020 Sep 07 06:53 |
CERT.org - 2013 - Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity.opus | 3.1 MiB | 2020 Sep 07 06:53 |
CERT.org - 2013 - Why Use Maturity Models to Improve Cybersecurity - Key Concepts, Principles, and Definitions.opus | 4.8 MiB | 2020 Sep 07 06:53 |
CERT.org - 2013 - sing the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience.opus | 4.0 MiB | 2020 Sep 07 06:53 |
CERT.org - 2014 - 81842.opus | 4.2 MiB | 2020 Sep 07 06:53 |
CERT.org - 2014 - 91168.opus | 3.9 MiB | 2020 Sep 07 06:53 |
CERT.org - 2014 - Comparing IT Risk Assessment and Analysis Methods.opus | 5.4 MiB | 2020 Sep 07 06:53 |
CERT.org - 2014 - Raising the Bar - Mainstreaming CERT C Secure Coding Rules.opus | 3.7 MiB | 2020 Sep 07 06:53 |