Establishing your Information Security Program - Part 2

This is the continuation of our podcast from last week with Phil Beyer. We started out talking about risk registers, and we end the podcast with a little QaA about positions in companies (Chief Risk Officer, Chief Data Protection Officer), and whether these positions are useful.    Risk registers - http://en.wikipedia.org/wiki/Risk_register   Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

2356 232

Suggested Podcasts

Oxford University

Lelu Love: YOUR Virtual Girlfriend Who Makes Personal Porn

Evie McLeod & Lindsey Roman

Quiet Juice

Molly Martin, MD

France Inter

Suno India

someone