Securing Mobile Devices aka BYOD
In this podcast, Joe Mayes discusses how to ensure the security of personal mobile devices that have access to enterprise networks.
Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities
In this podcast, participants discuss how a network profile can help identify unintended points of entry, misconfigurations, and other weaknesses.
Securing Industrial Control Systems
In this podcast, Julia Allen how critical it is to secure systems that control physical switches, valves, pumps, meters, and manufacturing lines.
TJX, Heartland, and CERT's Forensics Analysis Capabilities
In this podcast, participants recount complex, distributed, multi-year investigations of computer crimes using sophisticated methods, techniques, and tools.
Using the Facts to Protect Enterprise Networks: CERT's NetSA Team
In this podcast, Timothy Shimeall describes how network defenders and business leaders can use NetSA measures to protect their networks.