Software Engineering Institute (SEI) Podcast Series artwork

Software Engineering Institute (SEI) Podcast Series

426 episodes - English - Latest episode: 14 days ago - ★★★★★ - 18 ratings

The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.

Technology Science futuretech softwareengineering cybersecurity
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Tackling Security at the National Level: A Resource for Leaders

August 07, 2007 17:00 - 22 minutes - 5.11 MB

Business leaders can use national CSIRTs (Computer Security Incident Response Teams) as a key resource when dealing with incidents with a national or worldwide scope. Related Courses Creating a Computer Security Incident Response Team Managing Computer Security Incident Response Teams Fundamentals of Incident Handling Advanced Incident Handling for Technical Staff Listen on Apple Podcasts.

Reducing Security Costs with Standard Configurations: U.S. Government Initiatives

August 07, 2007 17:00 - 25 minutes - 5.76 MB

Information security costs can be significantly reduced by enforcing standard configurations for widely deployed systems. Listen on Apple Podcasts.

Real-World Security for Business Leaders

July 24, 2007 17:00 - 20 minutes - 4.68 MB

Security is not an option - but it may be time to start viewing it as a business enabler, rather than just a cost of doing business. Related Courses Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth Listen on Apple Podcasts.

Using Standards to Build an Information Security Program

July 10, 2007 17:00 - 27 minutes - 6.38 MB

Business leaders can use international standards to create a business- and risk-based information security program. Listen on Apple Podcasts.

Getting Real About Security Governance

June 26, 2007 17:00 - 19 minutes - 4.44 MB

Enterprise security governance is not just a vague idea - it can be achieved by implementing a defined, repeatable process with specific activities. Related Courses Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth Listen on Apple Podcasts.

Convergence: Integrating Physical and IT Security

June 12, 2007 17:00 - 28 minutes - 6.58 MB

Deploying common solutions for physical and IT security is a cost-effective way to reduce risk and save money. Listen on Apple Podcasts.

IT Infrastructure: Tips for Navigating Tough Spots

May 29, 2007 17:00 - 22 minutes - 5.17 MB

Organizations occasionally may need to redefine their IT infrastructures - but to succeed, they must be prepared to handle tricky situations. Related Courses Information Security for Technical Staff Advanced Information Security for Technical Staff Listen on Apple Podcasts.

The Value of De-Identified Personal Data

May 15, 2007 17:00 - 31 minutes - 7.19 MB

As the legal compliance landscape grows increasingly complex, de-identification can help organizations share data more securely. Listen on Apple Podcasts.

Adapting to Changing Risk Environments: Operational Resilience

May 01, 2007 17:00 - 24 minutes - 5.67 MB

Business leaders need to ensure that their organizations can keep critical business processes and services up and running in the face of the unexpected. Related Course Introduction to the CERT Resiliency Engineering Framework Listen on Apple Podcasts.

Computer Forensics for Business Leaders: A Primer

April 17, 2007 17:00 - 16 minutes - 3.78 MB

Computer forensics is often overlooked when planning an incident response strategy; however, it is a critical part of incident response, and business leaders need to understand how to tackle it. Related Courses Computer Forensics for Technical Staff Listen on Apple Podcasts.

The Real Secrets of Incident Management

April 03, 2007 17:00 - 21 minutes - 4.87 MB

Incident management is not just about technical response. It is a cross-enterprise effort that requires good communication and informed risk management. Related Courses Creating a Computer Security Incident Response Team Managing Computer Security Incident Response Teams Fundamentals of Incident Handling Advanced Incident Handling for Technical Staff Listen on Apple Podcasts.

The Legal Side of Global Security

March 20, 2007 17:00 - 25 minutes - 5.94 MB

Business leaders, including legal counsel, need to understand how to tackle complex security issues for a global enterprise. Listen on Apple Podcasts.

A New Look at the Business of IT Education

March 06, 2007 17:00 - 17 minutes - 4.09 MB

System administrators increasingly need business savvy in addition to technical skills, and IT training courses must try to keep pace with this trend. Listen on Apple Podcasts.

Crisis Communications During a Security Incident

February 20, 2007 17:00 - 13 minutes - 3.14 MB

Business leaders need to be prepared to communicate with the media and their staff during high-profile security incident or crisis. Listen on Apple Podcasts.

Assuring Mission Success in Complex Environments

February 06, 2007 17:00 - 17 minutes - 4.08 MB

Analysis tools are needed for assessing complex organizational and technological issues that are well beyond traditional approaches. Related Courses Assessing Information Security Risk Using the OCTAVE Approach Listen on Apple Podcasts.

Privacy: The Slow Tipping Point

January 23, 2007 17:00 - 17 minutes - 4.05 MB

A trend toward more and more data disclosure, as seen in online social networks, may be causing users to become desensitized to privacy breaches in general. Listen on Apple Podcasts.

Building Staff Competence in Security

January 09, 2007 17:00 - 21 minutes - 5.02 MB

Practical specifications and guidelines now exist that define necessary knowledge, skills, and competencies for staff members in a range of security positions - from practitioners to managers. Listen on Apple Podcasts.

Evolving Business Models, Threats, and Technologies: A Conversation with CERT's Deputy Director for Technology

December 26, 2006 17:00 - 21 minutes - 4.96 MB

Business models are evolving. This has challenging implications as security threats become more covert and technologies facilitate information migration. Listen on Apple Podcasts.

Inside Defense-in-Depth

December 19, 2006 17:00 - 15 minutes - 3.6 MB

Defense-in-Depth is one path toward enterprise resilience - the ability to withstand threats and failures. The foundational aspects of compliance management and risk management serve as stepping-stones to and supports for other, more technical aspects. Related Course Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth Listen on Apple Podcasts.

Protecting Against Insider Threat

November 28, 2006 17:00 - 27 minutes - 6.21 MB

The threat of attack from insiders is real and substantial. Insiders have a significant advantage over others who might want to harm an organization.   Listen on Apple Podcasts.

Change Management: The Security 'X' Factor

November 14, 2006 17:00 - 18 minutes - 4.27 MB

In a recent survey of organizations' security posture, one factor separated high performers from the rest of the pack: change management. Listen on Apple Podcasts.

CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT

October 31, 2006 17:00 - 23 minutes - 5.4 MB

Learn more about the future of CERT and Rich Pethia's view of the Internet security landscape. Listen on Apple Podcasts.

The ROI of Security

October 17, 2006 17:00 - 21 minutes - 4.88 MB

ROI is a useful tool because it enables comparison among investments in a consistent way. Listen on Apple Podcasts.

Why Leaders Should Care About Security

October 17, 2006 17:00 - 17 minutes - 8.19 MB

Leaders need to be security conscious and to treat adequate security as a non-negotiable requirement of being in business. Listen on Apple Podcasts.

Compliance vs. Buy-in

October 17, 2006 17:00 - 8 minutes - 1.99 MB

Integrating security into standard business operating processes and procedures is more effective than treating security as a compliance exercise. Listen on Apple Podcasts.

Proactive Remedies for Rising Threats

October 17, 2006 17:00 - 19 minutes - 4.49 MB

Threats to information security are increasingly stealthy, but they are on the rise and must be mitigated through sound policy and strategy. Listen on Apple Podcasts.

Guests

Grady Booch
1 Episode