Establishing your Information Security Program - Part 2

This is the continuation of our podcast from last week with Phil Beyer. We started out talking about risk registers, and we end the podcast with a little QaA about positions in companies (Chief Risk Officer, Chief Data Protection Officer), and whether these positions are useful.    Risk registers - http://en.wikipedia.org/wiki/Risk_register   Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

2356 232

Suggested Podcasts

IVM Podcasts

Wondery

The Classic Metal Show

Dr. Drew

Charles Schwab

JJ Flizanes a Doug Sandler

Shaun Rollins and Remington Chase

Ishita Chatterjee