Subscribe by email, free
Your daily briefing for podcasting and on-demand

Software Engineering Institute (SEI) Podcast Series - deep links to episodes

These are magic links to individual episodes for Software Engineering Institute (SEI) Podcast Series, provided to help you share audio for this podcast.

These links work on everything - they open the episode on Apple Podcasts on an iOS device like an iPhone; will open the episode on the Google Podcasts player on an Android device; and will open a web player on any other device. We’re currently linking to Google Podcasts on the web, since it displays episode notes in full. Right-click a link to copy the link address.

Just want to link to the podcast? Use this magic link: Listen to Software Engineering Institute (SEI) Podcast Series

September 18, 2019:AI in Humanitarian Assistance and Disaster Response
Apple Podcasts | Google Podcasts | Audio file
August 30, 2019:The AADL Error Library: 4 Families of Systems Errors
Apple Podcasts | Google Podcasts | Audio file
August 22, 2019:Women in Software and Cybersecurity: Suzanne Miller
Apple Podcasts | Google Podcasts | Audio file
July 29, 2019:Privacy in the Blockchain Era
Apple Podcasts | Google Podcasts | Audio file
July 25, 2019:Cyber Intelligence: Best Practices and Biggest Challenges
Apple Podcasts | Google Podcasts | Audio file
July 12, 2019:Assessing Cybersecurity Training
Apple Podcasts | Google Podcasts | Audio file
June 27, 2019:DevOps in Highly Regulated Environments
Apple Podcasts | Google Podcasts | Audio file
June 20, 2019:Women in Software and Cybersecurity: Dr. Ipek Ozkaya
Apple Podcasts | Google Podcasts | Audio file
June 11, 2019:The Role of the Software Factory in Acquisition and Sustainment
Apple Podcasts | Google Podcasts | Audio file
May 30, 2019:Defending Your Organization Against Business Email Compromise
Apple Podcasts | Google Podcasts | Audio file
May 21, 2019:My Story in Computing with Dr. Eliezer Kanal
Apple Podcasts | Google Podcasts | Audio file
April 19, 2019:Women in Software and Cybersecurity: Eileen Wrubel
Apple Podcasts | Google Podcasts | Audio file
March 21, 2019:Managing Technical Debt: A Focus on Automation, Design, and Architecture
Apple Podcasts | Google Podcasts | Audio file
March 14, 2019:Women in Software and Cybersecurity: Grace Lewis
Apple Podcasts | Google Podcasts | Audio file
March 1, 2019:Women in Software and Cybersecurity: Bobbie Stempfley
Apple Podcasts | Google Podcasts | Audio file
March 1, 2019:Women in Software and Cybersecurity: Dr. Lorrie Cranor
Apple Podcasts | Google Podcasts | Audio file
March 1, 2019:Leading in the Age of Artificial Intelligence
Apple Podcasts | Google Podcasts | Audio file
February 27, 2019:Applying Best Practices in Network Traffic Analysis
Apple Podcasts | Google Podcasts | Audio file
February 25, 2019:10 Types of Application Security Testing Tools and How to Use Them
Apple Podcasts | Google Podcasts | Audio file
February 18, 2019:Using Test Suites for Static Analysis Alert Classifiers
Apple Podcasts | Google Podcasts | Audio file
February 18, 2019:Blockchain at CMU and Beyond
Apple Podcasts | Google Podcasts | Audio file
February 15, 2019:Leading in the Age of Artificial Intelligence
Apple Podcasts | Google Podcasts | Audio file
November 28, 2018:Deep Learning in Depth: The Future of Deep Learning
Apple Podcasts | Google Podcasts | Audio file
November 27, 2018:Deep Learning in Depth: Adversarial Machine Learning
Apple Podcasts | Google Podcasts | Audio file
November 15, 2018:System Architecture Virtual Integration: ROI on Early Discovery of Defects
Apple Podcasts | Google Podcasts | Audio file
November 7, 2018:Deep Learning in Depth: The Importance of Diverse Perspectives
Apple Podcasts | Google Podcasts | Audio file
November 4, 2018:A Technical Strategy for Cybersecurity
Apple Podcasts | Google Podcasts | Audio file
October 26, 2018:Best Practices for Security in Cloud Computing
Apple Podcasts | Google Podcasts | Audio file
October 22, 2018:Risks, Threats, and Vulnerabilities in Moving to the Cloud
Apple Podcasts | Google Podcasts | Audio file
October 12, 2018:Deep Learning in Depth: IARPA's Functional Map of the World Challenge
Apple Podcasts | Google Podcasts | Audio file
October 5, 2018:Deep Learning in Depth: Deep Learning versus Machine Learning
Apple Podcasts | Google Podcasts | Audio file
September 14, 2018:How to Be a Network Traffic Analyst
Apple Podcasts | Google Podcasts | Audio file
August 28, 2018:Workplace Violence and Insider Threat
Apple Podcasts | Google Podcasts | Audio file
August 2, 2018:Why Does Software Cost So Much?
Apple Podcasts | Google Podcasts | Audio file
July 26, 2018:Cybersecurity Engineering & Software Assurance: Opportunities & Risks
Apple Podcasts | Google Podcasts | Audio file
July 10, 2018:Software Sustainment and Product Lines
Apple Podcasts | Google Podcasts | Audio file
June 25, 2018:Best Practices in Cyber Intelligence
Apple Podcasts | Google Podcasts | Audio file
June 7, 2018:Deep Learning in Depth: The Good, the Bad, and the Future
Apple Podcasts | Google Podcasts | Audio file
May 24, 2018:The Evolving Role of the Chief Risk Officer
Apple Podcasts | Google Podcasts | Audio file
May 10, 2018:Obsidian: A Safer Blockchain Programming Language
Apple Podcasts | Google Podcasts | Audio file
April 19, 2018:Agile DevOps
Apple Podcasts | Google Podcasts | Audio file
April 5, 2018:Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon University
Apple Podcasts | Google Podcasts | Audio file
March 15, 2018:Is Software Spoiling Us? Technical Innovations in the Department of Defense
Apple Podcasts | Google Podcasts | Audio file
February 8, 2018:Is Software Spoiling Us? Innovations in Daily Life from Software
Apple Podcasts | Google Podcasts | Audio file
February 1, 2018:How Risk Management Fits into Agile & DevOps in Government
Apple Podcasts | Google Podcasts | Audio file
December 28, 2017:5 Best Practices for Preventing and Responding to Insider Threat
Apple Podcasts | Google Podcasts | Audio file
December 12, 2017:Pharos Binary Static Analysis: An Update
Apple Podcasts | Google Podcasts | Audio file
November 30, 2017:Positive Incentives for Reducing Insider Threat
Apple Podcasts | Google Podcasts | Audio file
November 16, 2017:Mission-Practical Biometrics
Apple Podcasts | Google Podcasts | Audio file
October 24, 2017:At Risk Emerging Technology Domains
Apple Podcasts | Google Podcasts | Audio file
October 12, 2017:DNS Blocking to Disrupt Malware
Apple Podcasts | Google Podcasts | Audio file
September 21, 2017:Best Practices: Network Border Protection
Apple Podcasts | Google Podcasts | Audio file
September 7, 2017:Verifying Software Assurance with IBM’s Watson
Apple Podcasts | Google Podcasts | Audio file
August 31, 2017:The CERT Software Assurance Framework
Apple Podcasts | Google Podcasts | Audio file
August 3, 2017:Scaling Agile Methods
Apple Podcasts | Google Podcasts | Audio file
July 14, 2017:Ransomware: Best Practices for Prevention and Response
Apple Podcasts | Google Podcasts | Audio file
June 29, 2017:Integrating Security in DevOps
Apple Podcasts | Google Podcasts | Audio file
June 15, 2017:SEI Fellows Series: Peter Feiler
Apple Podcasts | Google Podcasts | Audio file
May 25, 2017:NTP Best Practices
Apple Podcasts | Google Podcasts | Audio file
May 18, 2017:Establishing Trust in Disconnected Environments
Apple Podcasts | Google Podcasts | Audio file
April 20, 2017:Distributed Artificial Intelligence in Space
Apple Podcasts | Google Podcasts | Audio file
March 27, 2017:Verifying Distributed Adaptive Real-Time Systems
Apple Podcasts | Google Podcasts | Audio file
March 23, 2017:10 At-Risk Emerging Technologies
Apple Podcasts | Google Podcasts | Audio file
February 27, 2017:Technical Debt as a Core Software Engineering Practice
Apple Podcasts | Google Podcasts | Audio file
February 23, 2017:DNS Best Practices
Apple Podcasts | Google Podcasts | Audio file
January 26, 2017:Three Roles and Three Failure Patterns of Software Architects
Apple Podcasts | Google Podcasts | Audio file
January 12, 2017:Security Modeling Tools
Apple Podcasts | Google Podcasts | Audio file
December 19, 2016:Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks
Apple Podcasts | Google Podcasts | Audio file
December 8, 2016:Cyber Security Engineering for Software and Systems Assurance
Apple Podcasts | Google Podcasts | Audio file
November 30, 2016:Moving Target Defense
Apple Podcasts | Google Podcasts | Audio file
November 10, 2016:Improving Cybersecurity Through Cyber Intelligence
Apple Podcasts | Google Podcasts | Audio file
October 27, 2016:A Requirement Specification Language for AADL
Apple Podcasts | Google Podcasts | Audio file
October 19, 2016:Becoming a CISO: Formal and Informal Requirements
Apple Podcasts | Google Podcasts | Audio file
October 13, 2016:Predicting Quality Assurance with Software Metrics and Security Methods
Apple Podcasts | Google Podcasts | Audio file
September 29, 2016:Network Flow and Beyond
Apple Podcasts | Google Podcasts | Audio file
September 15, 2016:A Community College Curriculum for Secure Software Development
Apple Podcasts | Google Podcasts | Audio file
August 25, 2016:Security and the Internet of Things
Apple Podcasts | Google Podcasts | Audio file
August 10, 2016:The SEI Fellow Series: Nancy Mead
Apple Podcasts | Google Podcasts | Audio file
July 28, 2016:An Open Source Tool for Fault Tree Analysis
Apple Podcasts | Google Podcasts | Audio file
July 18, 2016:Global Value Chain – An Expanded View of the ICT Supply Chain
Apple Podcasts | Google Podcasts | Audio file
June 21, 2016:Intelligence Preparation for Operational Resilience
Apple Podcasts | Google Podcasts | Audio file
May 26, 2016:Evolving Air Force Intelligence with Agile Techniques
Apple Podcasts | Google Podcasts | Audio file
May 12, 2016:Threat Modeling and the Internet of Things
Apple Podcasts | Google Podcasts | Audio file
April 14, 2016:Open Systems Architectures: When & Where to Be Closed
Apple Podcasts | Google Podcasts | Audio file
March 18, 2016:Effective Reduction of Avoidable Complexity in Embedded Systems
Apple Podcasts | Google Podcasts | Audio file
March 18, 2016:Toward Efficient and Effective Software Sustainment
Apple Podcasts | Google Podcasts | Audio file
March 8, 2016:Quality Attribute Refinement and Allocation
Apple Podcasts | Google Podcasts | Audio file
February 19, 2016:Is Java More Secure Than C?
Apple Podcasts | Google Podcasts | Audio file
February 4, 2016:Identifying the Architectural Roots of Vulnerabilities
Apple Podcasts | Google Podcasts | Audio file
February 3, 2016:Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations
Apple Podcasts | Google Podcasts | Audio file
January 12, 2016:An Interview with Grady Booch
Apple Podcasts | Google Podcasts | Audio file
December 23, 2015:Structuring the Chief Information Security Officer Organization
Apple Podcasts | Google Podcasts | Audio file
November 9, 2015:How Cyber Insurance Is Driving Risk and Technology Management
Apple Podcasts | Google Podcasts | Audio file
October 15, 2015:A Field Study of Technical Debt
Apple Podcasts | Google Podcasts | Audio file
October 1, 2015:How the University of Pittsburgh Is Using the NIST Cybersecurity Framework
Apple Podcasts | Google Podcasts | Audio file
September 24, 2015:A Software Assurance Curriculum for Future Engineers
Apple Podcasts | Google Podcasts | Audio file
September 10, 2015:Four Types of Shift Left Testing
Apple Podcasts | Google Podcasts | Audio file
August 27, 2015:Toward Speed and Simplicity: Creating a Software Library for Graph Analytics
Apple Podcasts | Google Podcasts | Audio file
August 27, 2015:Capturing the Expertise of Cybersecurity Incident Handlers
Apple Podcasts | Google Podcasts | Audio file
August 13, 2015:Improving Quality Using Architecture Fault Analysis with Confidence Arguments
Apple Podcasts | Google Podcasts | Audio file
July 30, 2015:A Taxonomy of Testing Types
Apple Podcasts | Google Podcasts | Audio file
July 16, 2015:Reducing Complexity in Software & Systems
Apple Podcasts | Google Podcasts | Audio file
June 25, 2015:Designing Security Into Software-Reliant Systems
Apple Podcasts | Google Podcasts | Audio file
June 11, 2015:Agile Methods in Air Force Sustainment
Apple Podcasts | Google Podcasts | Audio file
May 28, 2015:Defect Prioritization With the Risk Priority Number
Apple Podcasts | Google Podcasts | Audio file
May 14, 2015:SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers
Apple Podcasts | Google Podcasts | Audio file
April 23, 2015:An Introduction to Context-Aware Computing
Apple Podcasts | Google Podcasts | Audio file
April 9, 2015:Data Driven Software Assurance
Apple Podcasts | Google Podcasts | Audio file
March 26, 2015:Applying Agile in the DoD: Twelfth Principle
Apple Podcasts | Google Podcasts | Audio file
March 26, 2015:Supply Chain Risk Management: Managing Third Party and External Dependency Risk
Apple Podcasts | Google Podcasts | Audio file
March 12, 2015:Introduction to the Mission Thread Workshop
Apple Podcasts | Google Podcasts | Audio file
February 26, 2015:Applying Agile in the DoD: Eleventh Principle
Apple Podcasts | Google Podcasts | Audio file
February 20, 2015:A Workshop on Measuring What Matters
Apple Podcasts | Google Podcasts | Audio file
February 12, 2015:Applying Agile in the DoD: Tenth Principle
Apple Podcasts | Google Podcasts | Audio file
January 29, 2015:Predicting Software Assurance Using Quality and Reliability Measures
Apple Podcasts | Google Podcasts | Audio file
January 16, 2015:Applying Agile in the DoD: Ninth Principle
Apple Podcasts | Google Podcasts | Audio file
January 8, 2015:Cyber Insurance and Its Role in Mitigating Cybersecurity Risk
Apple Podcasts | Google Podcasts | Audio file
December 18, 2014:AADL and Dassault Aviation
Apple Podcasts | Google Podcasts | Audio file
December 4, 2014:Tactical Cloudlets
Apple Podcasts | Google Podcasts | Audio file
November 27, 2014:Agile Software Teams and How They Engage with Systems Engineering on DoD Acquisition Programs
Apple Podcasts | Google Podcasts | Audio file
November 13, 2014:Coding with AADL
Apple Podcasts | Google Podcasts | Audio file
October 30, 2014:The State of Agile
Apple Podcasts | Google Podcasts | Audio file
October 9, 2014:Applying Agile in the DoD: Eighth Principle
Apple Podcasts | Google Podcasts | Audio file
October 7, 2014:A Taxonomy of Operational Risks for Cyber Security
Apple Podcasts | Google Podcasts | Audio file
September 25, 2014:Agile Metrics
Apple Podcasts | Google Podcasts | Audio file
September 11, 2014:Four Principles for Engineering Scalable, Big Data Systems
Apple Podcasts | Google Podcasts | Audio file
August 28, 2014:An Appraisal of Systems Engineering: Defense v. Non-Defense
Apple Podcasts | Google Podcasts | Audio file
August 14, 2014:HTML5 for Mobile Apps at the Edge
Apple Podcasts | Google Podcasts | Audio file
July 24, 2014:Applying Agile in the DoD: Seventh Principle
Apple Podcasts | Google Podcasts | Audio file
July 10, 2014:AADL and Edgewater
Apple Podcasts | Google Podcasts | Audio file
June 26, 2014:Security and Wireless Emergency Alerts
Apple Podcasts | Google Podcasts | Audio file
June 12, 2014:Safety and Behavior Specification Using the Architecture Analysis and Design Language
Apple Podcasts | Google Podcasts | Audio file
May 29, 2014:Applying Agile in the DoD: Sixth Principle
Apple Podcasts | Google Podcasts | Audio file
May 29, 2014:Characterizing and Prioritizing Malicious Code
Apple Podcasts | Google Podcasts | Audio file
May 15, 2014:Using Quality Attributes to Improve Acquisition
Apple Podcasts | Google Podcasts | Audio file
April 29, 2014:Best Practices for Trust in the Wireless Emergency Alerts Service
Apple Podcasts | Google Podcasts | Audio file
April 10, 2014:Three Variations on the V Model for System and Software Testing
Apple Podcasts | Google Podcasts | Audio file
March 27, 2014:Adapting the PSP to Incorporate Verified Design by Contract
Apple Podcasts | Google Podcasts | Audio file
March 25, 2014:Comparing IT Risk Assessment and Analysis Methods
Apple Podcasts | Google Podcasts | Audio file
March 13, 2014:AADL and Aerospace
Apple Podcasts | Google Podcasts | Audio file
February 27, 2014:Assuring Open Source Software
Apple Podcasts | Google Podcasts | Audio file
February 13, 2014:Security Pattern Assurance through Roundtrip Engineering
Apple Podcasts | Google Podcasts | Audio file
February 11, 2014:The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2)
Apple Podcasts | Google Podcasts | Audio file
January 30, 2014:Applying Agile in the DoD: Fifth Principle
Apple Podcasts | Google Podcasts | Audio file
January 16, 2014:Software Assurance Cases
Apple Podcasts | Google Podcasts | Audio file
January 7, 2014:Raising the Bar - Mainstreaming CERT C Secure Coding Rules
Apple Podcasts | Google Podcasts | Audio file
December 26, 2013:AADL and Télécom Paris Tech
Apple Podcasts | Google Podcasts | Audio file
December 12, 2013:From Process to Performance-Based Improvement
Apple Podcasts | Google Podcasts | Audio file
November 27, 2013:An Approach to Managing the Software Engineering Challenges of Big Data
Apple Podcasts | Google Podcasts | Audio file
November 26, 2013:Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience
Apple Podcasts | Google Podcasts | Audio file
November 14, 2013:Situational Awareness Mashups
Apple Podcasts | Google Podcasts | Audio file
October 31, 2013:Applying Agile in the DoD: Fourth Principle
Apple Podcasts | Google Podcasts | Audio file
October 17, 2013:Architecting Systems of the Future
Apple Podcasts | Google Podcasts | Audio file
September 26, 2013:Acquisition Archetypes
Apple Podcasts | Google Podcasts | Audio file
September 12, 2013:Human-in-the-Loop Autonomy
Apple Podcasts | Google Podcasts | Audio file
August 29, 2013:Mobile Applications for Emergency Managers
Apple Podcasts | Google Podcasts | Audio file
August 27, 2013:Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions
Apple Podcasts | Google Podcasts | Audio file
August 15, 2013:Applying Agile in the DoD: Third Principle
Apple Podcasts | Google Podcasts | Audio file
July 30, 2013:DevOps - Transform Development and Operations for Fast, Secure Deployments
Apple Podcasts | Google Podcasts | Audio file
July 25, 2013:Application Virtualization as a Strategy for Cyber Foraging
Apple Podcasts | Google Podcasts | Audio file
July 11, 2013:Common Testing Problems: Pitfalls to Prevent and Mitigate
Apple Podcasts | Google Podcasts | Audio file
June 27, 2013:Joint Programs and Social Dilemmas
Apple Podcasts | Google Podcasts | Audio file
June 13, 2013:Applying Agile in the DoD: Second Principle
Apple Podcasts | Google Podcasts | Audio file
June 11, 2013:Managing Disruptive Events - CERT-RMM Experience Reports
Apple Podcasts | Google Podcasts | Audio file
May 23, 2013:Reliability Validation and Improvement Framework
Apple Podcasts | Google Podcasts | Audio file
May 9, 2013:Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity
Apple Podcasts | Google Podcasts | Audio file
May 9, 2013:The Business Case for Systems Engineering
Apple Podcasts | Google Podcasts | Audio file
April 18, 2013:Applying Agile in the DoD: First Principle
Apple Podcasts | Google Podcasts | Audio file
April 4, 2013:The Evolution of a Science Project
Apple Podcasts | Google Podcasts | Audio file
March 26, 2013:Securing Mobile Devices aka BYOD
Apple Podcasts | Google Podcasts | Audio file
March 21, 2013:What's New With Version 2 of the AADL Standard?
Apple Podcasts | Google Podcasts | Audio file
March 7, 2013:The State of the Practice of Cyber Intelligence
Apple Podcasts | Google Podcasts | Audio file
February 28, 2013:Mitigating Insider Threat - New and Improved Practices Fourth Edition
Apple Podcasts | Google Podcasts | Audio file
February 21, 2013:Technology Readiness Assessments
Apple Podcasts | Google Podcasts | Audio file
February 7, 2013:Standards in Cloud Computing Interoperability
Apple Podcasts | Google Podcasts | Audio file
January 31, 2013:Managing Disruptive Events: Demand for an Integrated Approach to Better Manage Risk
Apple Podcasts | Google Podcasts | Audio file
January 17, 2013:The Latest Developments in AADL
Apple Podcasts | Google Podcasts | Audio file
January 3, 2013:The Fundamentals of Agile
Apple Podcasts | Google Podcasts | Audio file
December 20, 2012:Software for Soldiers who use Smartphones
Apple Podcasts | Google Podcasts | Audio file
December 19, 2012:Managing Disruptive Events: Making the Case for Operational Resilience
Apple Podcasts | Google Podcasts | Audio file
December 6, 2012:Architecting Service-Oriented Systems
Apple Podcasts | Google Podcasts | Audio file
November 15, 2012:The SEI Strategic Plan
Apple Podcasts | Google Podcasts | Audio file
November 1, 2012:Quantifying Uncertainty in Early Lifecycle Cost Estimation
Apple Podcasts | Google Podcasts | Audio file
October 23, 2012:Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities
Apple Podcasts | Google Podcasts | Audio file
October 18, 2012:Architecting a Financial System with TSP
Apple Podcasts | Google Podcasts | Audio file
October 4, 2012:The Importance of Data Quality
Apple Podcasts | Google Podcasts | Audio file
September 25, 2012:How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them
Apple Podcasts | Google Podcasts | Audio file
September 20, 2012:Misaligned Incentives
Apple Podcasts | Google Podcasts | Audio file
September 4, 2012:How a Disciplined Process Enhances & Enables Agility
Apple Podcasts | Google Podcasts | Audio file
September 4, 2012:Agile Acquisition
Apple Podcasts | Google Podcasts | Audio file
September 4, 2012:An Architecture-Focused Measurement Framework for Managing Technical Debt
Apple Podcasts | Google Podcasts | Audio file
September 4, 2012:Cloud Computing for the Battlefield
Apple Podcasts | Google Podcasts | Audio file
August 21, 2012:U.S. Postal Inspection Service Use of the CERT Resilience Management Model
Apple Podcasts | Google Podcasts | Audio file
July 17, 2012:Insights from the First CERT Resilience Management Model Users Group
Apple Podcasts | Google Podcasts | Audio file
April 24, 2012:NIST Catalog of Security and Privacy Controls, Including Insider Threat
Apple Podcasts | Google Podcasts | Audio file
February 28, 2012:Cisco's Adoption of CERT Secure Coding Standards
Apple Podcasts | Google Podcasts | Audio file
January 31, 2012:How to Become a Cyber Warrior
Apple Podcasts | Google Podcasts | Audio file
December 20, 2011:Considering Security and Privacy in the Move to Electronic Health Records
Apple Podcasts | Google Podcasts | Audio file
October 4, 2011:Measuring Operational Resilience
Apple Podcasts | Google Podcasts | Audio file
September 6, 2011:Why Organizations Need a Secure Domain Name System
Apple Podcasts | Google Podcasts | Audio file
August 2, 2011:Controls for Monitoring the Security of Cloud Services (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
July 12, 2011:Building a Malware Analysis Capability (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 5, 2011:Using the Smart Grid Maturity Model (SGMM) (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 29, 2011:Integrated, Enterprise-Wide Risk Management: NIST 800-39 and CERT-RMM (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
February 22, 2011:Conducting Cyber Exercises at the National Level (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
January 25, 2011:Indicators and Controls for Mitigating Insider Threat (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
December 9, 2010:How Resilient Is My Organization? (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
November 30, 2010:Public-Private Partnerships: Essential for National Cyber Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 26, 2010:Software Assurance: A Master's Level Curriculum (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
September 28, 2010:How to Develop More Secure Software - Practices from Thirty Organizations (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
August 31, 2010:Mobile Device Security: Threats, Risks, and Actions to Take (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
August 19, 2010:Establishing a National Computer Security Incident Response Team (CSIRT) (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
July 27, 2010:Securing Industrial Control Systems (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 25, 2010:The Power of Fuzz Testing to Reduce Security Vulnerabilities (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
April 27, 2010:Protect Your Business from Money Mules (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 3, 2010:Train for the Unexpected (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 2, 2010:The Role of the CISO in Developing More Secure Software (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
February 2, 2010:Computer and Network Forensics: A Master's Level Curriculum (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
January 12, 2010:Introducing the Smart Grid Maturity Model (SGMM) (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
January 9, 2010:Leveraging Security Policies and Procedures for Electronic Evidence Discovery (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
December 22, 2009:Integrating Privacy Practices into the Software Development Life Cycle (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
December 1, 2009:Using the Facts to Protect Enterprise Networks: CERT's NetSA Team (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
November 10, 2009:Ensuring Continuity of Operations When Business Is Disrupted (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 20, 2009:Managing Relationships with Business Partners to Achieve Operational Resiliency (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
September 29, 2009:The Smart Grid: Managing Electrical Power Distribution and Use (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
September 8, 2009:Electronic Health Records: Challenges for Patient Privacy and Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
August 18, 2009:Mitigating Insider Threat: New and Improved Practices (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
July 7, 2009:Rethinking Risk Management (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
June 16, 2009:The Upside and Downside of Security in the Cloud (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 26, 2009:More Targeted, Sophisticated Attacks: Where to Pay Attention (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 5, 2009:Is There Value in Identifying Software Security "Never Events?" (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
April 14, 2009:Cyber Security, Safety, and Ethics for the Net Generation (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 31, 2009:An Experience-Based Maturity Model for Software Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 17, 2009:Mainstreaming Secure Coding Practices (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 3, 2009:Security: A Key Enabler of Business Innovation (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
February 17, 2009:Better Incident Response Through Scenario Based Training (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
February 3, 2009:An Alternative to Risk Management for Information and Software Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
January 20, 2009:Tackling Tough Challenges: Insights from CERT’s Director Rich Pethia (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
December 9, 2008:Climate Change: Implications for Information Technology and Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
November 25, 2008:Using High Fidelity, Online Training to Stay Sharp (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
November 11, 2008:Integrating Security Incident Response and e-Discovery (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 28, 2008:Concrete Steps for Implementing an Information Security Program (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 14, 2008:Virtual Communities: Risks and Opportunities (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
September 30, 2008:Developing Secure Software: Universities as Supply Chain Partners (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
September 16, 2008:Security Risk Assessment Using OCTAVE Allegro (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
September 2, 2008:Getting to a Useful Set of Security Metrics (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
August 20, 2008:How to Start a Secure Software Development Program (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
August 5, 2008:Managing Risk to Critical Infrastructures at the National Level (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
July 28, 2008:Analyzing Internet Traffic for Better Cyber Situational Awareness (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
July 22, 2008:Managing Security Vulnerabilities Based on What Matters Most (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
July 8, 2008:Identifying Software Security Requirements Early, Not After the Fact (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
June 24, 2008:Making Information Security Policy Happen (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
June 10, 2008:Becoming a Smart Buyer of Software (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 27, 2008:Building More Secure Software (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 13, 2008:Connecting the Dots Between IT Operations and Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
April 29, 2008:Getting in Front of Social Engineering (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
April 15, 2008:Using Benchmarks to Make Better Security Decisions (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
April 1, 2008:Protecting Information Privacy - How To and Lessons Learned (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 18, 2008:Initiating a Security Metrics Program: Key Points to Consider (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 4, 2008:Insider Threat and the Software Development Life Cycle (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
February 19, 2008:Tackling the Growing Botnet Threat (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
February 5, 2008:Building a Security Metrics Program (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
January 22, 2008:Inadvertent Data Disclosure on Peer-to-Peer Networks (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
January 8, 2008:Information Compliance: A Growing Challenge for Business Leaders (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
December 10, 2007:Internal Audit's Role in Information Security: An Introduction (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
November 27, 2007:What Business Leaders Can Expect from Security Degree Programs (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
November 13, 2007:The Path from Information Security Risk Assessment to Compliance (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 30, 2007:Computer Forensics for Business Leaders: Building Robust Policies and Processes (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 16, 2007:Business Resilience: A More Compelling Argument for Information Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 15, 2007:Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
September 18, 2007:The Human Side of Security Trade-Offs (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
September 4, 2007:Dual Perspectives: A CIO's and CISO's Take on Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
August 7, 2007:Tackling Security at the National Level: A Resource for Leaders (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
August 7, 2007:Reducing Security Costs with Standard Configurations: U.S. Government Initiatives (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
July 24, 2007:Real-World Security for Business Leaders (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
July 10, 2007:Using Standards to Build an Information Security Program (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
June 26, 2007:Getting Real About Security Governance (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
June 12, 2007:Convergence: Integrating Physical and IT Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 29, 2007:IT Infrastructure: Tips for Navigating Tough Spots (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 15, 2007:The Value of De-Identified Personal Data (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
May 1, 2007:Adapting to Changing Risk Environments: Operational Resilience (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
April 17, 2007:Computer Forensics for Business Leaders: A Primer (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
April 3, 2007:The Real Secrets of Incident Management (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 20, 2007:The Legal Side of Global Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
March 6, 2007:A New Look at the Business of IT Education (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
February 20, 2007:Crisis Communications During a Security Incident (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
February 6, 2007:Assuring Mission Success in Complex Environments (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
January 23, 2007:Privacy: The Slow Tipping Point (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
January 9, 2007:Building Staff Competence in Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
December 26, 2006:Evolving Business Models, Threats, and Technologies: A Conversation with CERT's Deputy Director for Technology (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
December 19, 2006:Inside Defense-in-Depth (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
November 28, 2006:Protecting Against Insider Threat (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
November 14, 2006:Change Management: The Security 'X' Factor (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 31, 2006:CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 17, 2006:The ROI of Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 17, 2006:Compliance vs. Buy-in (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 17, 2006:Why Leaders Should Care About Security (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file
October 17, 2006:Proactive Remedies for Rising Threats (links coming shortly)
Apple Podcasts | Google Podcasts | Audio file

Want direct links to the audio files?

Get a global view on podcasting and on-demand with our daily news briefing

Subscribe to our daily newsletter by email, free