Establishing your Information Security Program - Part 2
This is the continuation of our podcast from last week with Phil Beyer. We started out talking about risk registers, and we end the podcast with a little QaA about positions in companies (Chief Risk Officer, Chief Data Protection Officer), and whether these positions are useful. Risk registers - http://en.wikipedia.org/wiki/Risk_register Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/