Sunday, July 6, 2014
Establishing your Information Security Program - Part 2
This is the continuation of our podcast from last week with Phil Beyer.
We started out talking about risk registers, and we end the podcast with a little Q&A about positions in companies (Chief Risk Officer, Chief Data Protection Officer), and whether these positions are useful.
Risk registers - http://en.wikipedia.org/wiki/Risk_register
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
Here is a new episode of Brakeing Down Security!