Software Engineering Institute (SEI) Podcast Series
426 episodes - English - Latest episode: 14 days ago - ★★★★★ - 18 ratingsThe SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Episodes
Tackling Security at the National Level: A Resource for Leaders
August 07, 2007 17:00 - 22 minutes - 5.11 MBBusiness leaders can use national CSIRTs (Computer Security Incident Response Teams) as a key resource when dealing with incidents with a national or worldwide scope. Related Courses Creating a Computer Security Incident Response Team Managing Computer Security Incident Response Teams Fundamentals of Incident Handling Advanced Incident Handling for Technical Staff Listen on Apple Podcasts.
Reducing Security Costs with Standard Configurations: U.S. Government Initiatives
August 07, 2007 17:00 - 25 minutes - 5.76 MBInformation security costs can be significantly reduced by enforcing standard configurations for widely deployed systems. Listen on Apple Podcasts.
Real-World Security for Business Leaders
July 24, 2007 17:00 - 20 minutes - 4.68 MBSecurity is not an option - but it may be time to start viewing it as a business enabler, rather than just a cost of doing business. Related Courses Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth Listen on Apple Podcasts.
Using Standards to Build an Information Security Program
July 10, 2007 17:00 - 27 minutes - 6.38 MBBusiness leaders can use international standards to create a business- and risk-based information security program. Listen on Apple Podcasts.
Getting Real About Security Governance
June 26, 2007 17:00 - 19 minutes - 4.44 MBEnterprise security governance is not just a vague idea - it can be achieved by implementing a defined, repeatable process with specific activities. Related Courses Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth Listen on Apple Podcasts.
Convergence: Integrating Physical and IT Security
June 12, 2007 17:00 - 28 minutes - 6.58 MBDeploying common solutions for physical and IT security is a cost-effective way to reduce risk and save money. Listen on Apple Podcasts.
IT Infrastructure: Tips for Navigating Tough Spots
May 29, 2007 17:00 - 22 minutes - 5.17 MBOrganizations occasionally may need to redefine their IT infrastructures - but to succeed, they must be prepared to handle tricky situations. Related Courses Information Security for Technical Staff Advanced Information Security for Technical Staff Listen on Apple Podcasts.
The Value of De-Identified Personal Data
May 15, 2007 17:00 - 31 minutes - 7.19 MBAs the legal compliance landscape grows increasingly complex, de-identification can help organizations share data more securely. Listen on Apple Podcasts.
Adapting to Changing Risk Environments: Operational Resilience
May 01, 2007 17:00 - 24 minutes - 5.67 MBBusiness leaders need to ensure that their organizations can keep critical business processes and services up and running in the face of the unexpected. Related Course Introduction to the CERT Resiliency Engineering Framework Listen on Apple Podcasts.
Computer Forensics for Business Leaders: A Primer
April 17, 2007 17:00 - 16 minutes - 3.78 MBComputer forensics is often overlooked when planning an incident response strategy; however, it is a critical part of incident response, and business leaders need to understand how to tackle it. Related Courses Computer Forensics for Technical Staff Listen on Apple Podcasts.
The Real Secrets of Incident Management
April 03, 2007 17:00 - 21 minutes - 4.87 MBIncident management is not just about technical response. It is a cross-enterprise effort that requires good communication and informed risk management. Related Courses Creating a Computer Security Incident Response Team Managing Computer Security Incident Response Teams Fundamentals of Incident Handling Advanced Incident Handling for Technical Staff Listen on Apple Podcasts.
The Legal Side of Global Security
March 20, 2007 17:00 - 25 minutes - 5.94 MBBusiness leaders, including legal counsel, need to understand how to tackle complex security issues for a global enterprise. Listen on Apple Podcasts.
A New Look at the Business of IT Education
March 06, 2007 17:00 - 17 minutes - 4.09 MBSystem administrators increasingly need business savvy in addition to technical skills, and IT training courses must try to keep pace with this trend. Listen on Apple Podcasts.
Crisis Communications During a Security Incident
February 20, 2007 17:00 - 13 minutes - 3.14 MBBusiness leaders need to be prepared to communicate with the media and their staff during high-profile security incident or crisis. Listen on Apple Podcasts.
Assuring Mission Success in Complex Environments
February 06, 2007 17:00 - 17 minutes - 4.08 MBAnalysis tools are needed for assessing complex organizational and technological issues that are well beyond traditional approaches. Related Courses Assessing Information Security Risk Using the OCTAVE Approach Listen on Apple Podcasts.
Privacy: The Slow Tipping Point
January 23, 2007 17:00 - 17 minutes - 4.05 MBA trend toward more and more data disclosure, as seen in online social networks, may be causing users to become desensitized to privacy breaches in general. Listen on Apple Podcasts.
Building Staff Competence in Security
January 09, 2007 17:00 - 21 minutes - 5.02 MBPractical specifications and guidelines now exist that define necessary knowledge, skills, and competencies for staff members in a range of security positions - from practitioners to managers. Listen on Apple Podcasts.
Evolving Business Models, Threats, and Technologies: A Conversation with CERT's Deputy Director for Technology
December 26, 2006 17:00 - 21 minutes - 4.96 MBBusiness models are evolving. This has challenging implications as security threats become more covert and technologies facilitate information migration. Listen on Apple Podcasts.
Inside Defense-in-Depth
December 19, 2006 17:00 - 15 minutes - 3.6 MBDefense-in-Depth is one path toward enterprise resilience - the ability to withstand threats and failures. The foundational aspects of compliance management and risk management serve as stepping-stones to and supports for other, more technical aspects. Related Course Managing Enterprise Information Security: A Practical Approach for Achieving Defense-in-Depth Listen on Apple Podcasts.
Protecting Against Insider Threat
November 28, 2006 17:00 - 27 minutes - 6.21 MBThe threat of attack from insiders is real and substantial. Insiders have a significant advantage over others who might want to harm an organization. Listen on Apple Podcasts.
Change Management: The Security 'X' Factor
November 14, 2006 17:00 - 18 minutes - 4.27 MBIn a recent survey of organizations' security posture, one factor separated high performers from the rest of the pack: change management. Listen on Apple Podcasts.
CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT
October 31, 2006 17:00 - 23 minutes - 5.4 MBLearn more about the future of CERT and Rich Pethia's view of the Internet security landscape. Listen on Apple Podcasts.
The ROI of Security
October 17, 2006 17:00 - 21 minutes - 4.88 MBROI is a useful tool because it enables comparison among investments in a consistent way. Listen on Apple Podcasts.
Why Leaders Should Care About Security
October 17, 2006 17:00 - 17 minutes - 8.19 MBLeaders need to be security conscious and to treat adequate security as a non-negotiable requirement of being in business. Listen on Apple Podcasts.
Compliance vs. Buy-in
October 17, 2006 17:00 - 8 minutes - 1.99 MBIntegrating security into standard business operating processes and procedures is more effective than treating security as a compliance exercise. Listen on Apple Podcasts.
Proactive Remedies for Rising Threats
October 17, 2006 17:00 - 19 minutes - 4.49 MBThreats to information security are increasingly stealthy, but they are on the rise and must be mitigated through sound policy and strategy. Listen on Apple Podcasts.