BBC Radio 5 live’s award winning gaming podcast, discussing the world of video games and games culture.
…
continue reading
Player FM - Internet Radio Done Right
Checked 2y ago
seven 年前已添加!
内容由IT Governance Publishing提供。所有播客内容(包括剧集、图形和播客描述)均由 IT Governance Publishing 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
Player FM -播客应用
使用Player FM应用程序离线!
使用Player FM应用程序离线!
值得一听的播客
赞助
S
State Secrets: Inside The Making Of The Electric State


Host Francesca Amiker sits down with directors Joe and Anthony Russo, producer Angela Russo-Otstot, stars Millie Bobby Brown and Chris Pratt, and more to uncover how family was the key to building the emotional core of The Electric State . From the Russos’ own experiences growing up in a large Italian family to the film’s central relationship between Michelle and her robot brother Kid Cosmo, family relationships both on and off of the set were the key to bringing The Electric State to life. Listen to more from Netflix Podcasts . State Secrets: Inside the Making of The Electric State is produced by Netflix and Treefort Media.…
The Benefits of Implementing a NIST Cyber Security Framework (CSF): Podcast
Manage episode 219377200 series 2372136
内容由IT Governance Publishing提供。所有播客内容(包括剧集、图形和播客描述)均由 IT Governance Publishing 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
This book extract from the NIST Cybersecurity Framework: A Pocket Guide, will take you through the benefits of implementing the NIST (National Institute of Standards and Technology) CSF (Cybersecurity Framework). Receive a 15% discount on the NIST Cybersecurity Framework: A Pocket Guide when you use the code, CALDER15 at the checkout in October only. https://www.itgovernancepublishing.co.uk/product/nist-cybersecurity-framework
…
continue reading
41集单集
Manage episode 219377200 series 2372136
内容由IT Governance Publishing提供。所有播客内容(包括剧集、图形和播客描述)均由 IT Governance Publishing 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal。
This book extract from the NIST Cybersecurity Framework: A Pocket Guide, will take you through the benefits of implementing the NIST (National Institute of Standards and Technology) CSF (Cybersecurity Framework). Receive a 15% discount on the NIST Cybersecurity Framework: A Pocket Guide when you use the code, CALDER15 at the checkout in October only. https://www.itgovernancepublishing.co.uk/product/nist-cybersecurity-framework
…
continue reading
41集单集
所有剧集
×I
IT Governance Publishing

First in our ITGP Author Interview series - We interview Dr Julie Mehan to discuss her book Artificial Intelligence - Ethical, social, and security impacts for the present and the future
I
IT Governance Publishing

Brexit and Schrems II and the practical implications for the UK and EU data transfers
I
IT Governance Publishing

Understand why cyber security awareness is vital for your professional and personal life
I
IT Governance Publishing

Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by international regulatory frameworks. Having conducted more than 3,000 data mapping audits, he also understands the practical realities of project management in operationalizing compliance initiatives. Preston’s legal experience and enthusiasm for technology make him uniquely suited to understanding the business impact of privacy regulations such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). He has advised more than 250 organizations engaged in businesses as varied as SaaS platforms, mobile geolocation applications, GNSS/telematics tools, financial institutions, fleet management software, architectural/engineering design systems, and web hosting. He also teaches certification courses on GDPR compliance and ISO 27001 implementation, and writes on data privacy law topics. Preston lives in Denver, Colorado. Prior to working as a data privacy consultant, he worked for an international GPS software company, advising business areas on compliance issues across 140 countries. Preston holds a juris doctorate from the University of Kansas School of Law, along with a basketball signed by Hall of Fame coach Bill Self. tection in North America…
I
IT Governance Publishing

Cyber Security Threats and the risks they pose to SMEs
I
IT Governance Publishing

The world of work is changing. Many employees no longer hold the traditional nine-to-five job. Instead, working time is increasingly flexible. Technology has enabled a rapid rise in the number of remote workers in recent years; the TUC estimates that the number of UK people working from home increased by a fifth in the ten years to 2018, and now stands at around 2.5 million people. This number is expected to continue to rise – as a result of changing attitudes and technological developments – with half the UK workforce expected to be working remotely by 2025.…
I
IT Governance Publishing

The increase in commercial aviation and international travel means that pandemics now spread faster than ever before. Seasonal flu, zoonotic contagions such as Ebola, swine flu and avian flu (e.g. H5N1 and H7N9), respiratory syndromes such as SARS and MERS, and now COVID-19 (the 2019 novel coronavirus) have affected millions worldwide. Add the ever-present threat of terrorism and biological warfare, and the possibility of large proportions of your workforce being incapacitated is a lot stronger than you might think. How would your business fare if 50% or more of your employees, including those you rely on to execute your business continuity plan, were afflicted by illness – or worse? Although nothing can be done to prevent pandemics, their impact can be significantly mitigated. Business Continuity and the Pandemic Threat explains how.…
I
IT Governance Publishing

Sophie Sayer and Bridget Kenyon are joined by Nicola Day and Camden Woollven to discuss the release of ISO 27001 controls – A guide to implementing and auditing.
A new is book titled, A Guide to the Implementation and Auditing of ISMS Controls based on ISO/IEC 27001. Reasons why Bridget chose us to publish her book are:- because you're quite prominent in the marketplace and I can see what you're aiming to achieve which is, bridging the gap between what people need and what they think they need. If you know what I mean, helping people understand what they actually need and turning that into reality. Where the books are there to support that process and then the consulting is there to facilitate it. This is the book you need when you’ve decided you want to be complaint with or certified to ISO 27001 Implementation guidance, which is easy to understand by people working in business This book fills the gap between the standard and how companies can implement it This book also includes auditing guidance…
The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increasingly demanded by employers and buyers in the security market. This podcast is 3 minutes long and talks about updating Richards book and his new business venture.…
I
IT Governance Publishing

Listen to an exclusive extract from Toomas Viira’s book Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure. The extract features Chapter 1: “Critical Infrastructure Services.” It explores what critical infrastructure services are, and how the definition of critical services changes over time. To find out more, order Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure from www.itgovernancepublishing.co.uk.…
In this exclusive interview, cyber security risk manager and IT auditor Toomas Viira discusses his book Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure and gives advice on how to protect your critical information infrastructure. Save 20% on Toomas' book if you order from the ITGP website in February 2019. Visit www.itgovernancepublishing.co.uk to place your order and enter discount code VIIRA20 at the checkout.…
I
IT Governance Publishing

In this exclusive interview, risk consultant and cyber security specialist Leron Zinatullin discusses the human aspects of information security and offers his advice for improving the security culture in your organisation. To save 20% on Leron's book, the Psychology of Information Security, order from the ITGP website by 31 January and enter code Jan19 at the checkout. https://www.itgovernancepublishing.co.uk/author/leron-zinatullin…
I
IT Governance Publishing

In this podcast we are reading an extract from Alan Field's book, ISO 37001 - An Introduction to Anti-Bribery Management Systems. This extract will take you through the importance of why organisations should implement ISO37001:2016. As an early Christmas gift, receive a 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP checkout. https://www.itgovernancepublishing.co.uk/author/alan-field…
I
IT Governance Publishing

In our final interview with Alan Field, we discuss the importance of implementing an EnMS (energy management system) and what steps organisations should take to achieve certification. Receive a 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP checkout. https://www.itgovernancepublishing.co.uk/author/alan-field…
欢迎使用Player FM
Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。