Subscribe by email, free
Your daily briefing for podcasting and on-demand

Software Engineering Institute (SEI) Podcast Series - deep links to episodes

These are magic links to individual episodes for Software Engineering Institute (SEI) Podcast Series, provided to help you share audio for this podcast.

These links work on everything - they open the episode on Apple Podcasts on an iOS device like an iPhone; will open the episode on the Google Podcasts player on an Android device; and will open a web player on any other device. We’re currently linking to Google Podcasts on the web, since it displays episode notes in full. Right-click a link to copy the link address.

Just want to link to the podcast? Use this magic link: Listen to Software Engineering Institute (SEI) Podcast Series

June 11, 2019: The Role of the Software Factory in Acquisition and Sustainment | Audio file

May 30, 2019: Defending Your Organization Against Business Email Compromise | Audio file

May 21, 2019: My Story in Computing with Dr. Eliezer Kanal | Audio file

April 19, 2019: Women in Software and Cybersecurity: Eileen Wrubel | Audio file

March 21, 2019: Managing Technical Debt: A Focus on Automation, Design, and Architecture | Audio file

March 14, 2019: Women in Software and Cybersecurity: Grace Lewis | Audio file

March 1, 2019: Women in Software and Cybersecurity: Bobbie Stempfley | Audio file

March 1, 2019: Women in Software and Cybersecurity: Dr. Lorrie Cranor | Audio file

March 1, 2019: Leading in the Age of Artificial Intelligence | Audio file

February 27, 2019: Applying Best Practices in Network Traffic Analysis | Audio file

February 25, 2019: 10 Types of Application Security Testing Tools and How to Use Them | Audio file

February 18, 2019: Using Test Suites for Static Analysis Alert Classifiers | Audio file

February 18, 2019: Blockchain at CMU and Beyond | Audio file

February 15, 2019: Leading in the Age of Artificial Intelligence | Audio file

November 28, 2018: Deep Learning in Depth: The Future of Deep Learning | Audio file

November 27, 2018: Deep Learning in Depth: Adversarial Machine Learning | Audio file

November 15, 2018: System Architecture Virtual Integration: ROI on Early Discovery of Defects | Audio file

November 7, 2018: Deep Learning in Depth: The Importance of Diverse Perspectives | Audio file

November 4, 2018: A Technical Strategy for Cybersecurity | Audio file

October 26, 2018: Best Practices for Security in Cloud Computing | Audio file

October 22, 2018: Risks, Threats, and Vulnerabilities in Moving to the Cloud | Audio file

October 12, 2018: Deep Learning in Depth: IARPA's Functional Map of the World Challenge | Audio file

October 5, 2018: Deep Learning in Depth: Deep Learning versus Machine Learning | Audio file

September 14, 2018: How to Be a Network Traffic Analyst | Audio file

August 28, 2018: Workplace Violence and Insider Threat | Audio file

August 2, 2018: Why Does Software Cost So Much? | Audio file

July 26, 2018: Cybersecurity Engineering & Software Assurance: Opportunities & Risks | Audio file

July 10, 2018: Software Sustainment and Product Lines | Audio file

June 25, 2018: Best Practices in Cyber Intelligence | Audio file

June 7, 2018: Deep Learning in Depth: The Good, the Bad, and the Future | Audio file

May 24, 2018: The Evolving Role of the Chief Risk Officer | Audio file

May 10, 2018: Obsidian: A Safer Blockchain Programming Language | Audio file

April 19, 2018: Agile DevOps | Audio file

April 5, 2018: Kicking Butt in Computer Science: Women in Computing at Carnegie Mellon University | Audio file

March 15, 2018: Is Software Spoiling Us? Technical Innovations in the Department of Defense | Audio file

February 8, 2018: Is Software Spoiling Us? Innovations in Daily Life from Software | Audio file

February 1, 2018: How Risk Management Fits into Agile & DevOps in Government | Audio file

December 28, 2017: 5 Best Practices for Preventing and Responding to Insider Threat | Audio file

December 12, 2017: Pharos Binary Static Analysis: An Update | Audio file

November 30, 2017: Positive Incentives for Reducing Insider Threat | Audio file

November 16, 2017: Mission-Practical Biometrics | Audio file

October 24, 2017: At Risk Emerging Technology Domains | Audio file

October 12, 2017: DNS Blocking to Disrupt Malware | Audio file

September 21, 2017: Best Practices: Network Border Protection | Audio file

September 7, 2017: Verifying Software Assurance with IBM’s Watson | Audio file

August 31, 2017: The CERT Software Assurance Framework | Audio file

August 3, 2017: Scaling Agile Methods | Audio file

July 14, 2017: Ransomware: Best Practices for Prevention and Response | Audio file

June 29, 2017: Integrating Security in DevOps | Audio file

June 15, 2017: SEI Fellows Series: Peter Feiler | Audio file

May 25, 2017: NTP Best Practices | Audio file

May 18, 2017: Establishing Trust in Disconnected Environments | Audio file

April 20, 2017: Distributed Artificial Intelligence in Space | Audio file

March 27, 2017: Verifying Distributed Adaptive Real-Time Systems | Audio file

March 23, 2017: 10 At-Risk Emerging Technologies | Audio file

February 27, 2017: Technical Debt as a Core Software Engineering Practice | Audio file

February 23, 2017: DNS Best Practices | Audio file

January 26, 2017: Three Roles and Three Failure Patterns of Software Architects | Audio file

January 12, 2017: Security Modeling Tools | Audio file

December 19, 2016: Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks | Audio file

December 8, 2016: Cyber Security Engineering for Software and Systems Assurance | Audio file

November 30, 2016: Moving Target Defense | Audio file

November 10, 2016: Improving Cybersecurity Through Cyber Intelligence | Audio file

October 27, 2016: A Requirement Specification Language for AADL | Audio file

October 19, 2016: Becoming a CISO: Formal and Informal Requirements | Audio file

October 13, 2016: Predicting Quality Assurance with Software Metrics and Security Methods | Audio file

September 29, 2016: Network Flow and Beyond | Audio file

September 15, 2016: A Community College Curriculum for Secure Software Development | Audio file

August 25, 2016: Security and the Internet of Things | Audio file

August 10, 2016: The SEI Fellow Series: Nancy Mead | Audio file

July 28, 2016: An Open Source Tool for Fault Tree Analysis | Audio file

July 18, 2016: Global Value Chain – An Expanded View of the ICT Supply Chain | Audio file

June 21, 2016: Intelligence Preparation for Operational Resilience | Audio file

May 26, 2016: Evolving Air Force Intelligence with Agile Techniques | Audio file

May 12, 2016: Threat Modeling and the Internet of Things | Audio file

April 14, 2016: Open Systems Architectures: When & Where to Be Closed | Audio file

March 18, 2016: Effective Reduction of Avoidable Complexity in Embedded Systems | Audio file

March 18, 2016: Toward Efficient and Effective Software Sustainment | Audio file

March 8, 2016: Quality Attribute Refinement and Allocation | Audio file

February 19, 2016: Is Java More Secure Than C? | Audio file

February 4, 2016: Identifying the Architectural Roots of Vulnerabilities | Audio file

February 3, 2016: Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations | Audio file

January 12, 2016: An Interview with Grady Booch | Audio file

December 23, 2015: Structuring the Chief Information Security Officer Organization | Audio file

November 9, 2015: How Cyber Insurance Is Driving Risk and Technology Management | Audio file

October 15, 2015: A Field Study of Technical Debt | Audio file

October 1, 2015: How the University of Pittsburgh Is Using the NIST Cybersecurity Framework | Audio file

September 24, 2015: A Software Assurance Curriculum for Future Engineers | Audio file

September 10, 2015: Four Types of Shift Left Testing | Audio file

August 27, 2015: Toward Speed and Simplicity: Creating a Software Library for Graph Analytics | Audio file

August 27, 2015: Capturing the Expertise of Cybersecurity Incident Handlers | Audio file

August 13, 2015: Improving Quality Using Architecture Fault Analysis with Confidence Arguments | Audio file

July 30, 2015: A Taxonomy of Testing Types | Audio file

July 16, 2015: Reducing Complexity in Software & Systems | Audio file

June 25, 2015: Designing Security Into Software-Reliant Systems | Audio file

June 11, 2015: Agile Methods in Air Force Sustainment | Audio file

May 28, 2015: Defect Prioritization With the Risk Priority Number | Audio file

May 14, 2015: SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers | Audio file

April 23, 2015: An Introduction to Context-Aware Computing | Audio file

April 9, 2015: Data Driven Software Assurance | Audio file

March 26, 2015: Applying Agile in the DoD: Twelfth Principle | Audio file

March 26, 2015: Supply Chain Risk Management: Managing Third Party and External Dependency Risk | Audio file

March 12, 2015: Introduction to the Mission Thread Workshop | Audio file

February 26, 2015: Applying Agile in the DoD: Eleventh Principle | Audio file

February 20, 2015: A Workshop on Measuring What Matters | Audio file

February 12, 2015: Applying Agile in the DoD: Tenth Principle | Audio file

January 29, 2015: Predicting Software Assurance Using Quality and Reliability Measures | Audio file

January 16, 2015: Applying Agile in the DoD: Ninth Principle | Audio file

January 8, 2015: Cyber Insurance and Its Role in Mitigating Cybersecurity Risk | Audio file

December 18, 2014: AADL and Dassault Aviation | Audio file

December 4, 2014: Tactical Cloudlets | Audio file

November 27, 2014: Agile Software Teams and How They Engage with Systems Engineering on DoD Acquisition Programs | Audio file

November 13, 2014: Coding with AADL | Audio file

October 30, 2014: The State of Agile | Audio file

October 9, 2014: Applying Agile in the DoD: Eighth Principle | Audio file

October 7, 2014: A Taxonomy of Operational Risks for Cyber Security | Audio file

September 25, 2014: Agile Metrics | Audio file

September 11, 2014: Four Principles for Engineering Scalable, Big Data Systems | Audio file

August 28, 2014: An Appraisal of Systems Engineering: Defense v. Non-Defense | Audio file

August 14, 2014: HTML5 for Mobile Apps at the Edge | Audio file

July 24, 2014: Applying Agile in the DoD: Seventh Principle | Audio file

July 10, 2014: AADL and Edgewater | Audio file

June 26, 2014: Security and Wireless Emergency Alerts | Audio file

June 12, 2014: Safety and Behavior Specification Using the Architecture Analysis and Design Language | Audio file

May 29, 2014: Applying Agile in the DoD: Sixth Principle | Audio file

May 29, 2014: Characterizing and Prioritizing Malicious Code | Audio file

May 15, 2014: Using Quality Attributes to Improve Acquisition | Audio file

April 29, 2014: Best Practices for Trust in the Wireless Emergency Alerts Service | Audio file

April 10, 2014: Three Variations on the V Model for System and Software Testing | Audio file

March 27, 2014: Adapting the PSP to Incorporate Verified Design by Contract | Audio file

March 25, 2014: Comparing IT Risk Assessment and Analysis Methods | Audio file

March 13, 2014: AADL and Aerospace | Audio file

February 27, 2014: Assuring Open Source Software | Audio file

February 13, 2014: Security Pattern Assurance through Roundtrip Engineering | Audio file

February 11, 2014: The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) | Audio file

January 30, 2014: Applying Agile in the DoD: Fifth Principle | Audio file

January 16, 2014: Software Assurance Cases | Audio file

January 7, 2014: Raising the Bar - Mainstreaming CERT C Secure Coding Rules | Audio file

December 26, 2013: AADL and Télécom Paris Tech | Audio file

December 12, 2013: From Process to Performance-Based Improvement | Audio file

November 27, 2013: An Approach to Managing the Software Engineering Challenges of Big Data | Audio file

November 26, 2013: Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience | Audio file

November 14, 2013: Situational Awareness Mashups | Audio file

October 31, 2013: Applying Agile in the DoD: Fourth Principle | Audio file

October 17, 2013: Architecting Systems of the Future | Audio file

September 26, 2013: Acquisition Archetypes | Audio file

September 12, 2013: Human-in-the-Loop Autonomy | Audio file

August 29, 2013: Mobile Applications for Emergency Managers | Audio file

August 27, 2013: Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions | Audio file

August 15, 2013: Applying Agile in the DoD: Third Principle | Audio file

July 30, 2013: DevOps - Transform Development and Operations for Fast, Secure Deployments | Audio file

July 25, 2013: Application Virtualization as a Strategy for Cyber Foraging | Audio file

July 11, 2013: Common Testing Problems: Pitfalls to Prevent and Mitigate | Audio file

June 27, 2013: Joint Programs and Social Dilemmas | Audio file

June 13, 2013: Applying Agile in the DoD: Second Principle | Audio file

June 11, 2013: Managing Disruptive Events - CERT-RMM Experience Reports | Audio file

May 23, 2013: Reliability Validation and Improvement Framework | Audio file

May 9, 2013: Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity | Audio file

May 9, 2013: The Business Case for Systems Engineering | Audio file

April 18, 2013: Applying Agile in the DoD: First Principle | Audio file

April 4, 2013: The Evolution of a Science Project | Audio file

March 26, 2013: Securing Mobile Devices aka BYOD | Audio file

March 21, 2013: What's New With Version 2 of the AADL Standard? | Audio file

March 7, 2013: The State of the Practice of Cyber Intelligence | Audio file

February 28, 2013: Mitigating Insider Threat - New and Improved Practices Fourth Edition | Audio file

February 21, 2013: Technology Readiness Assessments | Audio file

February 7, 2013: Standards in Cloud Computing Interoperability | Audio file

January 31, 2013: Managing Disruptive Events: Demand for an Integrated Approach to Better Manage Risk | Audio file

January 17, 2013: The Latest Developments in AADL | Audio file

January 3, 2013: The Fundamentals of Agile | Audio file

December 20, 2012: Software for Soldiers who use Smartphones | Audio file

December 19, 2012: Managing Disruptive Events: Making the Case for Operational Resilience | Audio file

December 6, 2012: Architecting Service-Oriented Systems | Audio file

November 15, 2012: The SEI Strategic Plan | Audio file

November 1, 2012: Quantifying Uncertainty in Early Lifecycle Cost Estimation | Audio file

October 23, 2012: Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities | Audio file

October 18, 2012: Architecting a Financial System with TSP | Audio file

October 4, 2012: The Importance of Data Quality | Audio file

September 25, 2012: How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them | Audio file

September 20, 2012: Misaligned Incentives | Audio file

September 4, 2012: How a Disciplined Process Enhances & Enables Agility | Audio file

September 4, 2012: Agile Acquisition | Audio file

September 4, 2012: An Architecture-Focused Measurement Framework for Managing Technical Debt | Audio file

September 4, 2012: Cloud Computing for the Battlefield | Audio file

August 21, 2012: U.S. Postal Inspection Service Use of the CERT Resilience Management Model | Audio file

July 17, 2012: Insights from the First CERT Resilience Management Model Users Group | Audio file

April 24, 2012: NIST Catalog of Security and Privacy Controls, Including Insider Threat | Audio file

February 28, 2012: Cisco's Adoption of CERT Secure Coding Standards | Audio file

January 31, 2012: How to Become a Cyber Warrior | Audio file

December 20, 2011: Considering Security and Privacy in the Move to Electronic Health Records | Audio file

October 4, 2011: Measuring Operational Resilience | Audio file

September 6, 2011: Why Organizations Need a Secure Domain Name System | Audio file

August 2, 2011: Controls for Monitoring the Security of Cloud Services | Audio file

July 12, 2011: Building a Malware Analysis Capability | Audio file

May 5, 2011: Using the Smart Grid Maturity Model (SGMM) | Audio file

March 29, 2011: Integrated, Enterprise-Wide Risk Management: NIST 800-39 and CERT-RMM | Audio file

February 22, 2011: Conducting Cyber Exercises at the National Level | Audio file

January 25, 2011: Indicators and Controls for Mitigating Insider Threat | Audio file

December 9, 2010: How Resilient Is My Organization? | Audio file

November 30, 2010: Public-Private Partnerships: Essential for National Cyber Security | Audio file

October 26, 2010: Software Assurance: A Master's Level Curriculum (links coming shortly) | Audio file

September 28, 2010: How to Develop More Secure Software - Practices from Thirty Organizations (links coming shortly) | Audio file

August 31, 2010: Mobile Device Security: Threats, Risks, and Actions to Take (links coming shortly) | Audio file

August 19, 2010: Establishing a National Computer Security Incident Response Team (CSIRT) (links coming shortly) | Audio file

July 27, 2010: Securing Industrial Control Systems (links coming shortly) | Audio file

May 25, 2010: The Power of Fuzz Testing to Reduce Security Vulnerabilities (links coming shortly) | Audio file

April 27, 2010: Protect Your Business from Money Mules (links coming shortly) | Audio file

March 3, 2010: Train for the Unexpected (links coming shortly) | Audio file

March 2, 2010: The Role of the CISO in Developing More Secure Software (links coming shortly) | Audio file

February 2, 2010: Computer and Network Forensics: A Master's Level Curriculum (links coming shortly) | Audio file

January 12, 2010: Introducing the Smart Grid Maturity Model (SGMM) (links coming shortly) | Audio file

January 9, 2010: Leveraging Security Policies and Procedures for Electronic Evidence Discovery (links coming shortly) | Audio file

December 22, 2009: Integrating Privacy Practices into the Software Development Life Cycle (links coming shortly) | Audio file

December 1, 2009: Using the Facts to Protect Enterprise Networks: CERT's NetSA Team (links coming shortly) | Audio file

November 10, 2009: Ensuring Continuity of Operations When Business Is Disrupted (links coming shortly) | Audio file

October 20, 2009: Managing Relationships with Business Partners to Achieve Operational Resiliency (links coming shortly) | Audio file

September 29, 2009: The Smart Grid: Managing Electrical Power Distribution and Use (links coming shortly) | Audio file

September 8, 2009: Electronic Health Records: Challenges for Patient Privacy and Security (links coming shortly) | Audio file

August 18, 2009: Mitigating Insider Threat: New and Improved Practices (links coming shortly) | Audio file

July 7, 2009: Rethinking Risk Management (links coming shortly) | Audio file

June 16, 2009: The Upside and Downside of Security in the Cloud (links coming shortly) | Audio file

May 26, 2009: More Targeted, Sophisticated Attacks: Where to Pay Attention (links coming shortly) | Audio file

May 5, 2009: Is There Value in Identifying Software Security "Never Events?" (links coming shortly) | Audio file

April 14, 2009: Cyber Security, Safety, and Ethics for the Net Generation (links coming shortly) | Audio file

March 31, 2009: An Experience-Based Maturity Model for Software Security (links coming shortly) | Audio file

March 17, 2009: Mainstreaming Secure Coding Practices (links coming shortly) | Audio file

March 3, 2009: Security: A Key Enabler of Business Innovation (links coming shortly) | Audio file

February 17, 2009: Better Incident Response Through Scenario Based Training (links coming shortly) | Audio file

February 3, 2009: An Alternative to Risk Management for Information and Software Security (links coming shortly) | Audio file

January 20, 2009: Tackling Tough Challenges: Insights from CERT’s Director Rich Pethia (links coming shortly) | Audio file

December 9, 2008: Climate Change: Implications for Information Technology and Security (links coming shortly) | Audio file

November 25, 2008: Using High Fidelity, Online Training to Stay Sharp (links coming shortly) | Audio file

November 11, 2008: Integrating Security Incident Response and e-Discovery (links coming shortly) | Audio file

October 28, 2008: Concrete Steps for Implementing an Information Security Program (links coming shortly) | Audio file

October 14, 2008: Virtual Communities: Risks and Opportunities (links coming shortly) | Audio file

September 30, 2008: Developing Secure Software: Universities as Supply Chain Partners (links coming shortly) | Audio file

September 16, 2008: Security Risk Assessment Using OCTAVE Allegro (links coming shortly) | Audio file

September 2, 2008: Getting to a Useful Set of Security Metrics (links coming shortly) | Audio file

August 20, 2008: How to Start a Secure Software Development Program (links coming shortly) | Audio file

August 5, 2008: Managing Risk to Critical Infrastructures at the National Level (links coming shortly) | Audio file

July 28, 2008: Analyzing Internet Traffic for Better Cyber Situational Awareness (links coming shortly) | Audio file

July 22, 2008: Managing Security Vulnerabilities Based on What Matters Most (links coming shortly) | Audio file

July 8, 2008: Identifying Software Security Requirements Early, Not After the Fact (links coming shortly) | Audio file

June 24, 2008: Making Information Security Policy Happen (links coming shortly) | Audio file

June 10, 2008: Becoming a Smart Buyer of Software (links coming shortly) | Audio file

May 27, 2008: Building More Secure Software (links coming shortly) | Audio file

May 13, 2008: Connecting the Dots Between IT Operations and Security (links coming shortly) | Audio file

April 29, 2008: Getting in Front of Social Engineering (links coming shortly) | Audio file

April 15, 2008: Using Benchmarks to Make Better Security Decisions (links coming shortly) | Audio file

April 1, 2008: Protecting Information Privacy - How To and Lessons Learned (links coming shortly) | Audio file

March 18, 2008: Initiating a Security Metrics Program: Key Points to Consider (links coming shortly) | Audio file

March 4, 2008: Insider Threat and the Software Development Life Cycle (links coming shortly) | Audio file

February 19, 2008: Tackling the Growing Botnet Threat (links coming shortly) | Audio file

February 5, 2008: Building a Security Metrics Program (links coming shortly) | Audio file

January 22, 2008: Inadvertent Data Disclosure on Peer-to-Peer Networks (links coming shortly) | Audio file

January 8, 2008: Information Compliance: A Growing Challenge for Business Leaders (links coming shortly) | Audio file

December 10, 2007: Internal Audit's Role in Information Security: An Introduction (links coming shortly) | Audio file

November 27, 2007: What Business Leaders Can Expect from Security Degree Programs (links coming shortly) | Audio file

November 13, 2007: The Path from Information Security Risk Assessment to Compliance (links coming shortly) | Audio file

October 30, 2007: Computer Forensics for Business Leaders: Building Robust Policies and Processes (links coming shortly) | Audio file

October 16, 2007: Business Resilience: A More Compelling Argument for Information Security (links coming shortly) | Audio file

October 15, 2007: Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity (links coming shortly) | Audio file

September 18, 2007: The Human Side of Security Trade-Offs (links coming shortly) | Audio file

September 4, 2007: Dual Perspectives: A CIO's and CISO's Take on Security (links coming shortly) | Audio file

August 7, 2007: Tackling Security at the National Level: A Resource for Leaders (links coming shortly) | Audio file

August 7, 2007: Reducing Security Costs with Standard Configurations: U.S. Government Initiatives (links coming shortly) | Audio file

July 24, 2007: Real-World Security for Business Leaders (links coming shortly) | Audio file

July 10, 2007: Using Standards to Build an Information Security Program (links coming shortly) | Audio file

June 26, 2007: Getting Real About Security Governance (links coming shortly) | Audio file

June 12, 2007: Convergence: Integrating Physical and IT Security (links coming shortly) | Audio file

May 29, 2007: IT Infrastructure: Tips for Navigating Tough Spots (links coming shortly) | Audio file

May 15, 2007: The Value of De-Identified Personal Data (links coming shortly) | Audio file

May 1, 2007: Adapting to Changing Risk Environments: Operational Resilience (links coming shortly) | Audio file

April 17, 2007: Computer Forensics for Business Leaders: A Primer (links coming shortly) | Audio file

April 3, 2007: The Real Secrets of Incident Management (links coming shortly) | Audio file

March 20, 2007: The Legal Side of Global Security (links coming shortly) | Audio file

March 6, 2007: A New Look at the Business of IT Education (links coming shortly) | Audio file

February 20, 2007: Crisis Communications During a Security Incident (links coming shortly) | Audio file

February 6, 2007: Assuring Mission Success in Complex Environments (links coming shortly) | Audio file

January 23, 2007: Privacy: The Slow Tipping Point (links coming shortly) | Audio file

January 9, 2007: Building Staff Competence in Security (links coming shortly) | Audio file

December 26, 2006: Evolving Business Models, Threats, and Technologies: A Conversation with CERT's Deputy Director for Technology (links coming shortly) | Audio file

December 19, 2006: Inside Defense-in-Depth (links coming shortly) | Audio file

November 28, 2006: Protecting Against Insider Threat (links coming shortly) | Audio file

November 14, 2006: Change Management: The Security 'X' Factor (links coming shortly) | Audio file

October 31, 2006: CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT (links coming shortly) | Audio file

October 17, 2006: The ROI of Security (links coming shortly) | Audio file

October 17, 2006: Compliance vs. Buy-in (links coming shortly) | Audio file

October 17, 2006: Why Leaders Should Care About Security (links coming shortly) | Audio file

October 17, 2006: Proactive Remedies for Rising Threats (links coming shortly) | Audio file

Want direct links to the audio files?

Get a global view on podcasting and on-demand with our daily news briefing

Subscribe to our daily newsletter by email, free