FileMood

Download CERT.org (2006-2014)

CERT org 2006 2014

Name

CERT.org (2006-2014)

 DOWNLOAD Copy Link

Total Size

444.4 MB

Total Files

123

Hash

854569A0A4C7B39A55D4ABD6E224F8BBFDC80053

/

= CERT.org Podcast (2006-2014) Thank You.txt

0.5 KB

CERT.org - 2006 - CERT Lessons Learned - A Conversation with Rich Pethia, Director of CERT.opus

3.6 MB

CERT.org - 2006 - Compliance vs. Buy-In.opus

1.3 MB

CERT.org - 2006 - Evolving Business Models, Threats, and Technologies.opus

3.3 MB

CERT.org - 2006 - Inside Defense-in-Depth.opus

2.4 MB

CERT.org - 2006 - Proactive Remedies for Rising Threats.opus

3.0 MB

CERT.org - 2006 - Protecting Against Insider Threat.opus

4.2 MB

CERT.org - 2006 - The ROI of Security.opus

3.3 MB

CERT.org - 2006 - The Security 'X' Factor.opus

2.8 MB

CERT.org - 2006 - Why Leaders Should Care About Security.opus

2.7 MB

CERT.org - 2007 - 47232.opus

4.8 MB

CERT.org - 2007 - A New Look at the Business of IT Education.opus

2.8 MB

CERT.org - 2007 - Adapting to Changing Risk Environments - Operational Resilience.opus

3.8 MB

CERT.org - 2007 - Assuring Mission Success in Complex Environments.opus

2.7 MB

CERT.org - 2007 - Building Staff Competence in Security.opus

3.4 MB

CERT.org - 2007 - Business Resilience - A More Compelling Argument for Information Security.opus

3.7 MB

CERT.org - 2007 - Computer Forensics for Business Leaders - A Primer.opus

2.5 MB

CERT.org - 2007 - Computer Forensics for Business Leaders - Building Robust Policies and Processes.opus

1.9 MB

CERT.org - 2007 - Convergence - Integrating Physical and IT Security.opus

4.4 MB

CERT.org - 2007 - Crisis Communications During a Security Incident.opus

2.1 MB

CERT.org - 2007 - Dual Perspectives - A CIO's and CISO's Take on Security.opus

4.0 MB

CERT.org - 2007 - Getting Real about Security Governance.opus

3.0 MB

CERT.org - 2007 - IT Infrastructure - Tips for Navigating Tough Spots.opus

3.5 MB

CERT.org - 2007 - Internal Audit's Role in Information Security - An Introduction.opus

2.2 MB

CERT.org - 2007 - Privacy - The Slow Tipping Point.opus

2.7 MB

CERT.org - 2007 - Real-World Security for Business Leaders.opus

3.1 MB

CERT.org - 2007 - Reducing Security Costs with Standard Configurations - U.S. Government Initiatives.opus

3.9 MB

CERT.org - 2007 - Resiliency Engineering - Integrating Security, IT Operations, and Business Continuity.opus

2.9 MB

CERT.org - 2007 - Tackling Security at the National Level - A Resource for Leaders.opus

3.5 MB

CERT.org - 2007 - The Human Side of Security Trade-Offs.opus

4.2 MB

CERT.org - 2007 - The Legal Side of Global Security.opus

4.0 MB

CERT.org - 2007 - The Path from Information Security Risk Assessment to Compliance.opus

4.1 MB

CERT.org - 2007 - The Real Secrets of Incident Management.opus

3.3 MB

CERT.org - 2007 - Using Standards to Build an Information Security Program.opus

4.3 MB

CERT.org - 2007 - What Business Leaders Can Expect from Security Degree Programs.opus

2.9 MB

CERT.org - 2008 - Analyzing Internet Traffic for Better Cyber Situational Awareness.opus

4.6 MB

CERT.org - 2008 - Becoming a Smart Buyer of Software.opus

3.2 MB

CERT.org - 2008 - Building More Secure Software.opus

2.5 MB

CERT.org - 2008 - Building a Security Metrics Program.opus

3.5 MB

CERT.org - 2008 - Climate Change - Implications for Information Technology and Security.opus

3.6 MB

CERT.org - 2008 - Concrete Steps for Implementing an Information Security Program.opus

3.3 MB

CERT.org - 2008 - Connecting the Dots between IT Operations and Security.opus

3.8 MB

CERT.org - 2008 - Developing Secure Software - Universities as Supply Chain Partners.opus

3.6 MB

CERT.org - 2008 - Getting in Front of Social Engineering.opus

3.7 MB

CERT.org - 2008 - Getting to a Useful Set of Security Metrics.opus

2.7 MB

CERT.org - 2008 - How to Start a Secure Software Development Program.opus

3.0 MB

CERT.org - 2008 - Identifying Software Security Requirements Early, Not After the Fact.opus

3.5 MB

CERT.org - 2008 - Inadvertent Data Disclosure on Peer-to-Peer Networks.opus

3.1 MB

CERT.org - 2008 - Information Compliance - A Growing Challenge for Business Leaders.opus

3.4 MB

CERT.org - 2008 - Initiating a Security Metrics Program - Key Points to Consider.opus

1.9 MB

CERT.org - 2008 - Insider Threat and the Software Development Life Cycle.opus

3.6 MB

CERT.org - 2008 - Integrating Security Incident Response and e-Discovery.opus

4.0 MB

CERT.org - 2008 - Making Information Security Policy Happen.opus

3.8 MB

CERT.org - 2008 - Managing Risk to Critical Infrastructures at the National Level.opus

3.4 MB

CERT.org - 2008 - Managing Security Vulnerabilities Based on What Matters Most.opus

3.6 MB

CERT.org - 2008 - Protecting Information Privacy - How To and Lessons Learned.opus

3.4 MB

CERT.org - 2008 - Security Risk Assessment Using OCTAVE Allegro.opus

2.8 MB

CERT.org - 2008 - Tackling the Growing Botnet Threat.opus

3.2 MB

CERT.org - 2008 - Using Benchmarking to Make Better Security Decisions.opus

3.1 MB

CERT.org - 2008 - Using High Fidelity, Online Training to Stay Sharp.opus

4.1 MB

CERT.org - 2008 - Virtual Communities - Risks and Opportunities.opus

2.8 MB

CERT.org - 2009 - An Alternative to Risk Management for Information and Software Security.opus

4.0 MB

CERT.org - 2009 - An Experience-Based Maturity Model for Software Security.opus

3.3 MB

CERT.org - 2009 - Better Incident Response through Scenario-Based Training.opus

3.5 MB

CERT.org - 2009 - Cyber Security, Safety, and Ethics for the Net Generation.opus

3.1 MB

CERT.org - 2009 - Electronic Health Records - Challenges for Patient Privacy & Security.opus

4.1 MB

CERT.org - 2009 - Ensuring Continuity of Operations when Business Is Disrupted.opus

3.3 MB

CERT.org - 2009 - Integrating Privacy Practices into the Software Development Lifecycle.opus

2.7 MB

CERT.org - 2009 - Is There Value in Identifying Software Security _Never Events__.opus

3.1 MB

CERT.org - 2009 - Mainstreaming Secure Coding Practices.opus

3.0 MB

CERT.org - 2009 - Managing Relationships with Business Partners to Achieve Operational Resiliency.opus

4.1 MB

CERT.org - 2009 - Mitigating Insider Threat - New and Improved Practices.opus

5.6 MB

CERT.org - 2009 - More Targeted, Sophisticated Attacks - Where to Pay Attention.opus

3.1 MB

CERT.org - 2009 - Rethinking Risk Management.opus

4.6 MB

CERT.org - 2009 - Security - A Key Enabler of Business Innovation.opus

3.7 MB

CERT.org - 2009 - Tackling Tough Challenges - Insights from CERT’s Director Rich Pethia.opus

2.7 MB

CERT.org - 2009 - The Smart Grid - Managing Electrical Power Distribution and Use.opus

3.1 MB

CERT.org - 2009 - The Upside and Downside of Security in the Cloud.opus

4.3 MB

CERT.org - 2009 - Using the Facts to Protect Enterprise Networks.opus

3.3 MB

CERT.org - 2010 - 46614.opus

4.2 MB

CERT.org - 2010 - 47404.opus

3.9 MB

CERT.org - 2010 - 50071.opus

4.0 MB

CERT.org - 2010 - CERT's Podcast Series - Software Assurance - A Master's Level Curriculum.opus

5.2 MB

CERT.org - 2010 - Computer and Network Forensics - A Masters-Level Curriculum.opus

3.8 MB

CERT.org - 2010 - How Resilient is my Organization_.opus

5.9 MB

CERT.org - 2010 - How to Develop More Secure Software - Practices from Thirty Organizations.opus

4.5 MB

CERT.org - 2010 - Introducing the Smart Grid Maturity Model (SGMM).opus

4.0 MB

CERT.org - 2010 - Leveraging Security Policies and Procedures for Electronic Evidence Discovery.opus

4.1 MB

CERT.org - 2010 - Protect Your Business from Money Mules.opus

2.9 MB

CERT.org - 2010 - Public-Private Partnerships - Essential for National Cyber Security.opus

4.7 MB

CERT.org - 2010 - Securing Industrial Control Systems.opus

3.5 MB

CERT.org - 2010 - TJX, Heartland, and CERT’s Forensics Analysis Capabilities.opus

5.3 MB

CERT.org - 2010 - The Power of Fuzz Testing to Reduce Security Vulnerabilities.opus

4.0 MB

CERT.org - 2010 - The Role of the CISO in Developing More Secure Software.opus

4.2 MB

CERT.org - 2011 - 47337.opus

381.9 KB

CERT.org - 2011 - 47343.opus

4.3 MB

CERT.org - 2011 - Building a Malware Analysis Capability.opus

3.8 MB

CERT.org - 2011 - Considering Security and Privacy in the Move to Electronic Health Records.opus

4.3 MB

CERT.org - 2011 - Controls for Monitoring the Security of Cloud Services.opus

2.9 MB

CERT.org - 2011 - Indicators and Controls for Mitigating Insider Threat.opus

3.5 MB

CERT.org - 2011 - Measuring Operational Resilience.opus

3.9 MB

CERT.org - 2011 - Using the Smart Grid Maturity Model (SGMM).opus

4.5 MB

CERT.org - 2011 - Why Organizations Need a Secure Domain Name System.opus

3.1 MB

CERT.org - 2012 - Cisco's Adoption of CERT Secure Coding Standards.opus

3.6 MB

CERT.org - 2012 - How to Become a Cyber Warrior.opus

3.9 MB

CERT.org - 2012 - How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them.opus

5.7 MB

CERT.org - 2012 - Insights from the First CERT Resilience Management Model Users Group.opus

4.1 MB

CERT.org - 2012 - Managing Disruptive Events - Making the Case for Operational Resilience.opus

3.7 MB

CERT.org - 2012 - NIST Catalog of Security and Privacy Controls, Including Insider Threat.opus

4.3 MB

CERT.org - 2012 - US Postal Inspection Service Use of the CERT Resilience Management Model.opus

3.7 MB

CERT.org - 2012 - Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities.opus

4.5 MB

CERT.org - 2013 - 46310.opus

3.6 MB

CERT.org - 2013 - 48508.opus

5.3 MB

CERT.org - 2013 - DevOps - Transform Development and Operations for Fast, Secure Deployments.opus

5.1 MB

CERT.org - 2013 - Managing Disruptive Events - CERT-RMM Experience Reports.opus

5.4 MB

CERT.org - 2013 - Managing Disruptive Events - Demand for an Integrated Approach to Better Manage Risk.opus

4.0 MB

CERT.org - 2013 - Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity.opus

3.3 MB

CERT.org - 2013 - Why Use Maturity Models to Improve Cybersecurity - Key Concepts, Principles, and Definitions.opus

5.0 MB

CERT.org - 2013 - sing the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience.opus

4.2 MB

CERT.org - 2014 - 81842.opus

4.4 MB

CERT.org - 2014 - 91168.opus

4.1 MB

CERT.org - 2014 - Comparing IT Risk Assessment and Analysis Methods.opus

5.7 MB

CERT.org - 2014 - Raising the Bar - Mainstreaming CERT C Secure Coding Rules.opus

3.8 MB

 

Total files 123


Copyright © 2024 FileMood.com