Last update: 2010-12-16

Episode 99: Should Security Compliance Fall on the Independent Software Vendor?

play
2010-12-16 :: Amrit Williams Length: 22s
Amrit Williams, BigFix CTO, looks at the responsibility of the ISV in security compliance with Jack Danahy, founder of Ounce Labs, and now the World Wide Security Executive for the Rational division of IBM.…


Episode 98: Is Education the Key to a Rapidly Evolving Security Marketplace?

play
2010-12-02 :: Amrit Williams Length: 20s
Amrit Williams, BigFix CTO, discusses the role of education in security with Jack Danahy, founder of Ounce Labs, and now the World Wide Security Executive for the Rational division of IBM.…


Episode 97: What Changes do Businesses Need to Make in the Coming Year?

play
2010-09-03 :: Amrit Williams Length: 17s
Amrit Williams, BigFix CTO, concludes his discussion about the Verizon Business 2010 Data Breach Report with Alex Hutton, Principal of Research and Intelligence at Verizon Business.…


Episode 96: Verizon Business Releases the 2010 Data Breach Report

play
2010-08-28 :: Amrit Williams Length: 19s
Amrit Williams, BigFix CTO, digs into the details of the Verizon Business 2010 Data Breach Report with Alex Hutton, Principal of Research and Intelligence at Verizon Business.…


Episode 95: What's Next? Looking to the Future of Cloud Computing

play
2010-07-30 :: Amrit Williams Length: 8s
Amrit Williams, BigFix CTO, discusses the possibilities for cloud computing in the next few years with Chris Hoff, Director of Cloud & Virtualization Solutions of the Security Technology Business Unit at Cisco Systems.…


Episode 94: Overcoming Compliance Requirements and Legacy Systems When Moving to the Cloud

play
2010-07-23 :: Amrit Williams Length: 23s
Amrit Williams, BigFix CTO, continues his discussion on effectively using cloud computing at the enterprise level with Chris Hoff, Director of Cloud & Virtualization Solutions of the Security Technology Business Unit at Cisco Systems.…


Episode 93: Is Trust the Real Barrier to Cloud Computing?

play
2010-07-16 :: Amrit Williams Length: 22s
Amrit Williams, BigFix CTO, discusses the barriers to effectively using cloud computing at the enterprise level with Chris Hoff, Director of Cloud & Virtualization Solutions of the Security Technology Business Unit at Cisco Systems.…


Episode 92: The Inconvenient Truth of Security from the 2010 InfoSec Conference

play
2010-06-26 :: Amrit Williams Length: 22s
Amrit Williams, BigFix CTO, discusses Cloud Computing and other trends with Philippe Courtot, CEO of Qualys Inc. at the 2010 InfoSec Conference.…


Episode 92: The Inconvenient Truth of Security from the 2010 InfoSec Conference

play
2010-06-26 :: Amrit Williams Length: 22s
Amrit Williams, BigFix CTO, discusses Cloud Computing and other trends with Philippe Courtot, CEO of Qualys Inc. at the 2010 InfoSec Conference.…


Episode 91: Horror Films to Hackers

play
2010-06-18 :: Amrit Williams Length: 24s
Amrit Williams, BigFix CTO, discusses the lessons learned from the film industry with inventor, nCircle founder, and Life Zero blogger John Flowers.…


Episode 91: Horror Films to Hackers

play
2010-06-18 :: Amrit Williams Length: 24s
Amrit Williams, BigFix CTO, discusses the lessons learned from the film industry with inventor, nCircle founder, and Life Zero blogger John Flowers.…


Episode 90: What in the World is a Kane Box?

play
2010-06-11 :: Amrit Williams Length: 25s
Amrit Williams, BigFix CTO, discusses the forthcoming network security tool, the Kane Box with inventor, nCircle founder, and Life Zero blogger John Flowers.…


Episode 90: What in the World is a Kane Box?

play
2010-06-11 :: Amrit Williams Length: 25s
Amrit Williams, BigFix CTO, discusses the forthcoming network security tool, the Kane Box with inventor, nCircle founder, and Life Zero blogger John Flowers.…


Episode 89: How to Create a CSIRT

play
2010-06-04 :: Amrit Williams Length: 17s
Amrit Williams, BigFix CTO, discusses the details of how to create a successful CSIRT with Ireland's own Brian Honan of The Irish Reporting and Information Security Service.…


Episode 89: How to Create a CSIRT

play
2010-06-04 :: Amrit Williams Length: 17s
Amrit Williams, BigFix CTO, discusses the details of how to create a successful CSIRT with Ireland's own Brian Honan of The Irish Reporting and Information Security Service.…


Episode 88: Malware Free Europe?

play
2010-05-29 :: Amrit Williams Length: 18s
Amrit Williams, BigFix CTO, discusses information security education and response with Ireland's own Brian Honan of The Irish Reporting and Information Security Service.…


Episode 87: Verizon Call Out the Vulnerability Pimps

play
2010-05-22 :: Amrit Williams Length: 14s
Amrit Williams, BigFix CTO, continues his discussion with Mark Maiffreit of Fire Eye on emerging threats and the new vulnerability pimps.…


Episode 86: Modern Malware Exposed!

play
2010-05-14 :: Amrit Williams Length: 14s
Amrit Williams, BigFix CTO, discusses the malware landscape and new resources available to IT professionals with Mark Maiffreit of Fire Eye.…


Episode 85: Connecting Consequences to People's Actions, Part 2

play
2010-04-30 :: Amrit Williams Length: 17s
Amrit Williams, BigFix CTO, takes an in depth look at security awareness and training with security catalyst Michael Santarcangelo. Part One.…


Episode 85: Connecting Consequences to People's Actions, Part 2

play
2010-04-30 :: Amrit Williams Length: 17s
Amrit Williams, BigFix CTO, takes an in depth look at security awareness and training with security catalyst Michael Santarcangelo. Part One.…


Episode 84: Connecting Consequences to People's Actions, Part 1

play
2010-04-26 :: Amrit Williams Length: 12s
Amrit Williams, BigFix CTO, takes an in depth look at security awareness and training with security catalyst Michael Santarcangelo. Part One.…


Episode 84: Connecting Consequences to People's Actions, Part 1

play
2010-04-26 :: Amrit Williams Length: 12s
Amrit Williams, BigFix CTO, takes an in depth look at security awareness and training with security catalyst Michael Santarcangelo. Part One.…


Episode 83: Geekonomics and the Impact of Insecure Software, Part 2

play
2010-04-02 :: Amrit Williams Length: 22s
Amrit Williams, BigFix CTO, discusses with David Rice, author of Geekonomics, ways to create incentive for increasing software assurance.…


Episode 82: Geekonomics and the Impact of Insecure Software, Part 1

play
2010-03-26 :: Amrit Williams Length: 21s
Amrit Williams, BigFix CTO, discusses Author David Rice's concept of Geekonomics in this two part interview.…


Episode 81: Moving Security and Management Outside of the OS

play
2010-03-20 :: Amrit Williams Length: 18s
Amrit Williams, BigFix CTO, discusses how enterprises can move security and management facilities outside of the OS with Chad Jones and Bill Corrigan of Neocleus.…


Episode 80: Finding the "So What" of Virtualization

play
2010-03-12 :: Amrit Williams Length: 18s
Amrit Williams, BigFix CTO, discusses current limitations and new possibilities of virtualization with Chad Jones and Bill Corrigan of Neocleus.…


Episode 79: Cyber-crime Vs. Cyber-warfare Vs. Cyber-espionage

play
2010-03-06 :: Amrit Williams Length: 14s
Amrit Williams, BigFix CTO, discusses the differences between cyber-crime, cyber-warfare, and cyber-expionage with Will Gragido and John Pirc of Cassandra Security.…


Episode 78: The More Threats Change, The More Solutions Stay The Same

play
2010-02-26 :: Amrit Williams Length: 16s
Amrit Williams, BigFix CTO, discusses how the ever-changing threat landscape is met by a static set of solutions. He is joined by Will Gragido and John Pirc of Cassandra Security.…


Episode 77: Is Your Software RUGGED?

play
2010-02-20 :: Amrit Williams Length: 29s
Amrit Williams, BigFix CTO, investigates the new RUGGED Software Manifesto with its authors by Joshua Corman and David Rice.…


Episode 76: APT's Vs. SMT's

play
2010-02-13 :: Amrit Williams Length: 19s
Amrit Williams, BigFix CTO, discusses advanced persistent threats and subversive multi-vector threats with Will Gragido and John Pirc of Cassandra Security.…


Episode 75: Women in Security, and the Pitfalls of Offshore Banking

play
2010-02-06 :: Amrit Williams Length: 17s
Amrit Williams, BigFix CTO, discusses with Andrew Hay the challenges women in security face and also the many security issues surrounding offshore banking.…


Episode 74: The Good, The Bad, and The Ugly of Being an Author

play
2010-02-02 :: Amrit Williams Length: 16s
Amrit Williams, BigFix CTO, discusses the ins and outs of writing tech books with author Andrew Hay.…


Episode 74: The Good, The Bad, and The Ugly of Being an Author

play
2010-02-02 :: Amrit Williams Length: 16s
Amrit Williams, BigFix CTO, discusses the ins and outs of writing tech books with author Andrew Hay.…


Episode 73: Is the Auditor Scarier Than the Attacker?

play
2010-01-22 :: Amrit Williams Length: 23s
Amrit Williams, BigFix CTO, discusses how profit and politics have changed the security landscape with John Corman, research director for the enterprise security practice at The 451 Group.…


Episode 72: What Are the Real Threats for 2010?

play
2010-01-15 :: Amrit Williams Length: 20s
Amrit Williams, BigFix CTO, takes a look back at 2009, and a look ahead at what the real threats of 2010 will be with Mike Rothman, founder of Security Incite.…


Episode 71: Is Information Asymetry the Biggest Threat to Information Security?

play
2010-01-08 :: Amrit Williams Length: 17s
Amrit Williams, BigFix CTO, discusses the information divide between the good guys and the bad guys with Josh Corman, research director for the enterprise security practice at The 451 Group.…


Episode 70: Blocking and Tackling with Log Management and SIEM

play
2010-01-01 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO, discusses how many enterprises are still struggling with log management and SIEM with Mike Rothman, founder of Security Incite.…


Episode 70: Blocking and Tackling with Log Management and SIEM

play
2010-01-01 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO, discusses how many enterprises are still struggling with log management and SIEM with Mike Rothman, founder of Security Incite.…


Episode 69: Trends and Challenges for 2010

play
2009-12-25 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO, discusses the trends and challenges in technology for 2010 with Mike Vizard, editor of CTO Edge.…


Episode 69: Trends and Challenges for 2010

play
2009-12-25 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO, discusses the trends and challenges in technology for 2010 with Mike Vizard, editor of CTO Edge.…


Episode 68: Technology, Journalism, and the Flow of Information

play
2009-12-18 :: Amrit Williams Length: 13s
Amrit Williams, BigFix CTO, discusses the current state of tech journalism and how we receive information with Mike Vizard, editor of CTO Edge.…


Episode 67: Working Safe Online and On The Road

play
2009-12-11 :: Amrit Williams Length: 13s
Amrit Williams, BigFix CTO, discusses how to work remotely while maintaining a secure online environment with Mike Rothman, founder of Security Incite.…


Episode 67: Working Safe Online and On The Road

play
2009-12-11 :: Amrit Williams Length: 13s
Amrit Williams, BigFix CTO, discusses how to work remotely while maintaining a secure online environment with Mike Rothman, founder of Security Incite.…


Episode 66: Is the Economic Downturn Over?

play
2009-11-24 :: Amrit Williams Length: 12s
Amrit Williams, BigFix CTO, discusses the outlook on the economy for 2010 with Jack Phillips, co-founder of IANS, the Institute for Applied Network Security.…


Episode 66: Is the Economic Downturn Over?

play
2009-11-24 :: Amrit Williams Length: 12s
Amrit Williams, BigFix CTO, discusses the outlook on the economy for 2010 with Jack Phillips, co-founder of IANS, the Institute for Applied Network Security.…


Episode 65: IANS Offers Vendors and Users a High Value Proposition

play
2009-11-20 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO, discusses with Jack Phillips, co-founder of IANS, the Institute for Applied Network Security. the value IANS offers to both users and vendors.…


Episode 65: IANS Offers Vendors and Users a High Value Proposition

play
2009-11-20 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO, discusses with Jack Phillips, co-founder of IANS, the Institute for Applied Network Security. the value IANS offers to both users and vendors.…


Episode 64: Peer Based Research Breaks the Analyst Mold

play
2009-11-17 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO, discusses the benefits of peer based research with Jack Phillips, co-founder of IANS, the Institute for Applied Network Security.…


Episode 64: Peer Based Research Breaks the Analyst Mold

play
2009-11-17 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO, discusses the benefits of peer based research with Jack Phillips, co-founder of IANS, the Institute for Applied Network Security.…


Episode 63: What is the Future of Application Control?

play
2009-11-13 :: Amrit Williams Length: 8s
Amrit Williams, BigFix CTO and Tom Murphy of Bit9 discuss the future of application control as new technologies like cloud computing and virtualization permeate the marketplace.…


Episode 63: What is the Future of Application Control?

play
2009-11-13 :: Amrit Williams Length: 8s
Amrit Williams, BigFix CTO and Tom Murphy of Bit9 discuss the future of application control as new technologies like cloud computing and virtualization permeate the marketplace.…


Episode 62: Tuning Application Control Technologies

play
2009-11-10 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO discusses application control with Tom Murphy of Bit9, and how to avoid endpoint lockdown.…


Episode 62: Tuning Application Control Technologies

play
2009-11-10 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO discusses application control with Tom Murphy of Bit9, and how to avoid endpoint lockdown.…


Episode 61: Can Whitelisting Secure Endpoints Without Interupting Work Flow?

play
2009-11-06 :: Amrit Williams Length: 8s
Amrit Williams, BigFix CTO discusses Whitelisting with Tom Murphy of Bit9, and what practices can embolden endpoint security without disturbing work flow.…


Episode 60: Insiders: Security Threat or Ally? Part 3

play
2009-10-30 :: Amrit Williams Length: 12s
Amrit Williams, BigFix CTO winds up the conversation with author and speaker Michael Santarcangelo on the nature of insider threats and how to manage them.…


Episode 59: Insiders: Security Threat or Ally? Part 2

play
2009-10-27 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO continues the conversation with author and speaker Michael Santarcangelo on the nature of insider threats and how to manage them.…


Episode 58: Insiders: Security Threat or Ally?

play
2009-10-23 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO begins an interesting series of conversations with author and speaker Michael Santarcangelo. Michael questions the statistics and growing concerns over insider threats.…


Episode 58: Insiders: Security Threat or Ally?

play
2009-10-23 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO begins an interesting series of conversations with author and speaker Michael Santarcangelo. Michael questions the statistics and growing concerns over insider threats.…


Episode 58: Insiders: Security Threat or Ally?

play
2009-10-23 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO begins an interesting series of conversations with author and speaker Michael Santarcangelo. Michael questions the statistics and growing concerns over insider threats.…


Episode 57: Unifying Virtual and Bare Metal Computing, Part 2

play
2009-10-20 :: Amrit Williams Length: 7s
Amrit Williams, BigFix CTO continues his conversation with Vikram Desai, president and CEO of Liquid Computing on optimizing virtual and bare metal computing to optimize service provision to end users.…


Episode 57: Unifying Virtual and Bare Metal Computing, Part 2

play
2009-10-20 :: Amrit Williams Length: 7s
Amrit Williams, BigFix CTO continues his conversation with Vikram Desai, president and CEO of Liquid Computing on optimizing virtual and bare metal computing to optimize service provision to end users.…


Episode 57: Unifying Virtual and Bare Metal Computing, Part 2

play
2009-10-20 :: Amrit Williams Length: 7s
Amrit Williams, BigFix CTO continues his conversation with Vikram Desai, president and CEO of Liquid Computing on optimizing virtual and bare metal computing to optimize service provision to end users.…


Episode 56: Unifying Virtual and Bare Metal Computing, Part 1

play
2009-10-16 :: Amrit Williams Length: 8s
Amrit Williams, BigFix CTO speaks with Vikram Desai, president and CEO of Liquid Computing on optimizing virtual and bare metal computing to optimize service provision to end users.…


Episode 56: Unifying Virtual and Bare Metal Computing, Part 1

play
2009-10-16 :: Amrit Williams Length: 8s
Amrit Williams, BigFix CTO speaks with Vikram Desai, president and CEO of Liquid Computing on optimizing virtual and bare metal computing to optimize service provision to end users.…


Episode 56: Unifying Virtual and Bare Metal Computing, Part 1

play
2009-10-16 :: Amrit Williams Length: 8s
Amrit Williams, BigFix CTO speaks with Vikram Desai, president and CEO of Liquid Computing on optimizing virtual and bare metal computing to optimize service provision to end users.…


Episode 55: Web Applications Need Security Too, Part 3

play
2009-10-06 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO concludes his interview with Doug Wilson co-chair of Open Web Application Security Project Washington DC chapter, focusing on what enterprises can do to include security into the product development life-cycle.…


Episode 55: Web Applications Need Security Too, Part 3

play
2009-10-06 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO concludes his interview with Doug Wilson co-chair of Open Web Application Security Project Washington DC chapter, focusing on what enterprises can do to include security into the product development life-cycle.…


Episode 55: Web Applications Need Security Too, Part 3

play
2009-10-06 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO concludes his interview with Doug Wilson co-chair of Open Web Application Security Project Washington DC chapter, focusing on what enterprises can do to include security into the product development life-cycle.…


Episode 54: Web Applications Need Security Too, Part 2

play
2009-10-02 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO continues his interview with Doug Wilson co-chair of Open Web Application Security Project Washington DC chapter, highlighting the upcoming OWASP-sponsored AppSecDC conference Nov. 12-13 at the Washington DC Convention Center.…


Episode 54: Web Applications Need Security Too, Part 2

play
2009-10-02 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO continues his interview with Doug Wilson co-chair of Open Web Application Security Project Washington DC chapter, highlighting the upcoming OWASP-sponsored AppSecDC conference Nov. 12-13 at the Washington DC Convention Center.…


Web Applications Need Security Too: Part 1

play
2009-09-29 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO speaks with Doug Wilson co-chair of Open Web Application Security Project (OWASP) Washington DC chapter and Michael Smith, the Guerilla CISO, on community efforts to improve security of web-based applications.…


Web Applications Need Security Too: Part 1

play
2009-09-29 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO speaks with Doug Wilson co-chair of Open Web Application Security Project (OWASP) Washington DC chapter and Michael Smith, the Guerilla CISO, on community efforts to improve security of web-based applications.…


Web Applications Need Security Too: Part 1

play
2009-09-29 :: Amrit Williams Length: 11s
Amrit Williams, BigFix CTO speaks with Doug Wilson co-chair of Open Web Application Security Project (OWASP) Washington DC chapter and Michael Smith, the Guerilla CISO, on community efforts to improve security of web-based applications.…


Information Security and the Application Stack Part 3

play
2009-09-25 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO concludes his conversation with Brad Arkin, Adobe Systems director of security and privacy, this time focusing on Adobe's processes to build in security during the product development cycle.…


Information Security and the Application Stack Part 3

play
2009-09-25 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO concludes his conversation with Brad Arkin, Adobe Systems director of security and privacy, this time focusing on Adobe's processes to build in security during the product development cycle.…


Information Security and the Application Stack Part 2

play
2009-09-22 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO continues his conversation with Brad Arkin, Adobe Systems director of security and privacy focusing on post-release patch and update processes.…


Information Security and the Application Stack Part 2

play
2009-09-22 :: Amrit Williams Length: 10s
Amrit Williams, BigFix CTO continues his conversation with Brad Arkin, Adobe Systems director of security and privacy focusing on post-release patch and update processes.…


Information Security and the Application Stack Part 1

play
2009-09-18 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO talks to Brad Arkin, Adobe Systems director of security and privacy, about Adobe's programs to improve security properties of its widely used software products both during development and after release to the field.…


Information Security and the Application Stack Part 1

play
2009-09-18 :: Amrit Williams Length: 9s
Amrit Williams, BigFix CTO talks to Brad Arkin, Adobe Systems director of security and privacy, about Adobe's programs to improve security properties of its widely used software products both during development and after release to the field.…


Do We Need to Regulate Software Development?

play
2009-09-15 :: Amrit Williams Length: 10s
Beyond The Perimeter…


Do We Need to Regulate Software Development?

play
2009-09-15 :: Amrit Williams Length: 10s
Beyond The Perimeter…


Overcoming the IT Security Crisis

play
2009-09-11 :: Amrit Williams Length: 10s
Beyond the Perimeter…


Overcoming the IT Security Crisis

play
2009-09-11 :: Amrit Williams Length: 10s
Beyond the Perimeter…


The IT Security Industry Winter

play
2009-09-08 :: Amrit Williams Length: 12s
Beyond the Perimeter…


The IT Security Industry Winter

play
2009-09-08 :: Amrit Williams Length: 12s
Beyond the Perimeter…


Coping With the Malware Explosion

play
2009-09-04 :: Amrit Williams Length: 12s
Beyond the Perimeter…


Coping With the Malware Explosion

play
2009-09-04 :: Amrit Williams Length: 12s
Beyond the Perimeter…


Clouds, Communities and New Models for Anti-Virus

play
2009-09-01 :: Amrit Williams Length: 11s
Beyond The Perimeter…


Clouds, Communities and New Models for Anti-Virus

play
2009-09-01 :: Amrit Williams Length: 11s
Beyond The Perimeter…


Can IT Security, Operations, and Senior Management Speak the Same Language?

play
2009-08-28 :: Amrit Williams Length: 12s
Beyond The Perimeter…


Can IT Security, Operations, and Senior Management Speak the Same Language?

play
2009-08-28 :: Amrit Williams Length: 12s
Beyond The Perimeter…


The Oil and Water Relationship of Compliance and Security

play
2009-08-26 :: Amrit Williams Length: 12s
Beyond The Perimeter…


The Oil and Water Relationship of Compliance and Security

play
2009-08-26 :: Amrit Williams Length: 12s
Beyond The Perimeter…


The Oil and Water Relationship of Compliance and Security

play
2009-08-26 :: Amrit Williams Length: 12s
Beyond The Perimeter…


The Education of an IT Risk Management Consultant

play
2009-08-21 :: Amrit Williams Length: 9s
Beyond The Perimeter…


The Education of an IT Risk Management Consultant

play
2009-08-21 :: Amrit Williams Length: 9s
Beyond The Perimeter…


The Education of an IT Risk Management Consultant

play
2009-08-21 :: Amrit Williams Length: 9s
Beyond The Perimeter…


Security B-Sides: Party With a Purpose

play
2009-08-18 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Security B-Sides: Party With a Purpose

play
2009-08-18 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Security B-Sides: Party With a Purpose

play
2009-08-18 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Taking Care of the Fundamentals

play
2009-08-14 :: Amrit Williams Length: 12s
Beyond The Perimeter…


Taking Care of the Fundamentals

play
2009-08-14 :: Amrit Williams Length: 12s
Beyond The Perimeter…


Compliance: Security Floor or Ceiling?

play
2009-08-12 :: Amrit Williams Length: 12s
Beyond The Perimeter…


Compliance: Security Floor or Ceiling?

play
2009-08-12 :: Amrit Williams Length: 12s
Beyond The Perimeter…


Black Hat, Defcon, Hackers for Charity and More

play
2009-08-08 :: Amrit Williams Length: 13s
Beyond The Perimeter…


Black Hat, Defcon, Hackers for Charity and More

play
2009-08-08 :: Amrit Williams Length: 13s
Beyond The Perimeter…


Black Hat, Defcon, Hackers for Charity and More

play
2009-08-08 :: Amrit Williams Length: 13s
Beyond The Perimeter…


Securing Web Applications: Improving the Application Development Life Cycle

play
2009-07-28 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Securing Web Applications: Improving the Application Development Life Cycle

play
2009-07-28 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Securing Web Applications: Improving the Application Development Life Cycle

play
2009-07-28 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Securing Web Applications: Instituting Operational Controls

play
2009-07-24 :: Amrit Williams Length: 11s
Beyond The Perimeter…


Securing Web Applications: Instituting Operational Controls

play
2009-07-24 :: Amrit Williams Length: 11s
Beyond The Perimeter…


Securing Web Applications: Surveying the Threat Landscape

play
2009-07-21 :: Amrit Williams Length: 10s
Beyond The Perimeter…


Securing Web Applications: Surveying the Threat Landscape

play
2009-07-21 :: Amrit Williams Length: 10s
Beyond The Perimeter…


Securing Web Applications: Surveying the Threat Landscape

play
2009-07-21 :: Amrit Williams Length: 10s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part III

play
2009-07-14 :: Amrit Williams Length: 12s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part III

play
2009-07-14 :: Amrit Williams Length: 12s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part III

play
2009-07-14 :: Amrit Williams Length: 12s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part II

play
2009-07-10 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part II

play
2009-07-10 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part II

play
2009-07-10 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part I

play
2009-07-07 :: Amrit Williams Length: 13s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part I

play
2009-07-07 :: Amrit Williams Length: 13s
Beyond The Perimeter…


Cybsersecurity, Cyberdefense and Cyberwarfare: Part I

play
2009-07-07 :: Amrit Williams Length: 13s
Beyond The Perimeter…


PCI: Tastes Great or Less Filling?

play
2009-06-30 :: Amrit Williams Length: 18s
Beyond The Perimeter…


PCI: Tastes Great or Less Filling?

play
2009-06-30 :: Amrit Williams Length: 18s
Beyond The Perimeter…


PCI: Tastes Great or Less Filling?

play
2009-06-30 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Patch Management: Still a Hamster Wheel of Pain After All These Years

play
2009-06-23 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Patch Management: Still a Hamster Wheel of Pain After All These Years

play
2009-06-23 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Embrace Change to Cut the Cost and Complexity of IT Security

play
2009-06-19 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Embrace Change to Cut the Cost and Complexity of IT Security

play
2009-06-19 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Security and Systems Management Convergence Part II: The Resolution

play
2009-06-16 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Security and Systems Management Convergence Part II: The Resolution

play
2009-06-16 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Security and Systems Management Convergence Part II: The Resolution

play
2009-06-16 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Security and Systems Management Convergence Part I: The Balancing Act

play
2009-06-12 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Security and Systems Management Convergence Part I: The Balancing Act

play
2009-06-12 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Security and Systems Management Convergence Part I: The Balancing Act

play
2009-06-12 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Situational Awareness Inside and Beyond the Perimeter

play
2009-06-10 :: Amrit Williams Length: 16s
Beyond The Perimeter…


Situational Awareness Inside and Beyond the Perimeter

play
2009-06-10 :: Amrit Williams Length: 16s
Beyond The Perimeter…


The Security Implications of Virtualization

play
2009-06-05 :: Amrit Williams Length: 15s
Beyond The Perimeter…


The Security Implications of Virtualization

play
2009-06-05 :: Amrit Williams Length: 15s
Beyond The Perimeter…


The Security Implications of Virtualization

play
2009-06-05 :: Amrit Williams Length: 15s
Beyond The Perimeter…


20th Century Databases Need 21st Century Security

play
2009-06-02 :: Amrit Williams Length: 20s
Beyond The Perimeter…


20th Century Databases Need 21st Century Security

play
2009-06-02 :: Amrit Williams Length: 20s
Beyond The Perimeter…


20th Century Databases Need 21st Century Security

play
2009-06-02 :: Amrit Williams Length: 20s
Beyond The Perimeter…


Johnny Long: Hacker for Charity

play
2009-05-29 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Technical Publishing for Fun, Fame, and Modest Profit

play
2009-05-26 :: Amrit Williams Length: 16s
Beyond The Perimeter…


Technical Publishing for Fun, Fame, and Modest Profit

play
2009-05-26 :: Amrit Williams Length: 16s
Beyond The Perimeter…


Cyber Warfare/Cyber Defense: Part II

play
2009-05-22 :: Amrit Williams Length: 9s
Beyond The Perimeter…


Cyber Warfare/Cyber Defense: Part II

play
2009-05-22 :: Amrit Williams Length: 9s
Beyond The Perimeter…


Cyber Warfare/Cyber Defense: Part I

play
2009-05-19 :: Amrit Williams Length: 17s
Beyond The Perimeter…


The State of Cybercrime in 2009

play
2009-05-12 :: Amrit Williams Length: 16s
Beyond The Perimeter…


The State of Cybercrime in 2009

play
2009-05-12 :: Amrit Williams Length: 16s
Beyond The Perimeter…


The State of Cybercrime in 2009

play
2009-05-12 :: Amrit Williams Length: 16s
Beyond The Perimeter…


Green Computing is Everyone's Business

play
2009-04-22 :: Amrit Williams Length: 16s
Beyond The Perimeter…


Green Computing is Everyone's Business

play
2009-04-22 :: Amrit Williams Length: 16s
Beyond The Perimeter…


Crossing the IT and Physical Facilities Management Chasm

play
2009-04-17 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Crossing the IT and Physical Facilities Management Chasm

play
2009-04-17 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Waking Up to Web Application Security Risks

play
2009-04-15 :: Amrit Williams Length: 15s
Beyond The Perimeter…


Security Attacks Make News: What's the Story?

play
2009-04-15 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Getting Serious About IT Security Risk Management

play
2009-04-10 :: Amrit Williams Length: 22s
Beyond The Perimeter…


Getting Serious About IT Security Risk Management

play
2009-04-10 :: Amrit Williams Length: 22s
Beyond The Perimeter…


Game Theory and Predicting the Probability of Malware Attacks

play
2009-04-07 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Game Theory and Predicting the Probability of Malware Attacks

play
2009-04-07 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Game Theory and Predicting the Probability of Malware Attacks

play
2009-04-07 :: Amrit Williams Length: 18s
Beyond The Perimeter…


Of Firewalls and VPNs: Two Examples of IT Security Business Enablement

play
2009-04-02 :: Amrit Williams Length: 23s
Beyond The Perimeter…


Of Firewalls and VPNs: Two Examples of IT Security Business Enablement

play
2009-04-02 :: Amrit Williams Length: 23s
Beyond The Perimeter…


Of Firewalls and VPNs: Two Examples of IT Security Business Enablement

play
2009-04-02 :: Amrit Williams Length: 23s
Beyond The Perimeter…


The Conficker Worm: Fighting Back

play
2009-03-31 :: Amrit Williams Length: 14s
Beyond The Perimeter…


The Conficker Worm: Fighting Back

play
2009-03-31 :: Amrit Williams Length: 14s
Beyond The Perimeter…


The Conficker Worm: Fighting Back

play
2009-03-31 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Industry Response to the Conficker Worm

play
2009-03-30 :: Amrit Williams Length: 17s
Beyond The Perimeter…


Industry Response to the Conficker Worm

play
2009-03-30 :: Amrit Williams Length: 17s
Beyond The Perimeter…


Industry Response to the Conficker Worm

play
2009-03-30 :: Amrit Williams Length: 17s
Beyond The Perimeter…


Systems and Security Management in the Healthcare Industry: A Conversation with Amrit Williams and Dave Watson

play
2009-03-27 :: Amrit Williams Length: 9s
Beyond The Perimeter…


Systems and Security Management in the Healthcare Industry: A Conversation with Amrit Williams and Dave Watson

play
2009-03-27 :: Amrit Williams Length: 9s
Beyond The Perimeter…


Systems and Security Management in the Healthcare Industry: A Conversation with Amrit Williams and Dave Watson

play
2009-03-27 :: Amrit Williams Length: 9s
Beyond The Perimeter…


Defending Data, Enabling Availability: The View from Securosis

play
2009-03-24 :: Amrit Williams Length: 19s
Beyond The Perimeter…


Defending Data, Enabling Availability: The View from Securosis

play
2009-03-24 :: Amrit Williams Length: 19s
Beyond The Perimeter…


Security, System Management, and Healthcare: In Conversation with Mark Starry

play
2009-03-20 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Security, System Management, and Healthcare: In Conversation with Mark Starry

play
2009-03-20 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Security, System Management, and Healthcare: In Conversation with Mark Starry

play
2009-03-20 :: Amrit Williams Length: 14s
Beyond The Perimeter…


Special Edition: BigFix and IBM: The New Dynamics of Endpoint Security

play
2009-03-18 :: Amrit Williams Length: 17s
Amrit Williams and IBM's Scott Johnson discuss the market trends that influenced development of the new IBM Proventia ESC product.…


Special Edition: BigFix and IBM: The New Dynamics of Endpoint Security

play
2009-03-18 :: Amrit Williams Length: 17s
Amrit Williams and IBM's Scott Johnson discuss the market trends that influenced development of the new IBM Proventia ESC product.…


Special Edition: BigFix and IBM: The New Dynamics of Endpoint Security

play
2009-03-18 :: Amrit Williams Length: 17s
Amrit Williams and IBM's Scott Johnson discuss the market trends that influenced development of the new IBM Proventia ESC product.…


PCI and Compliance Initiatives

play
2009-03-06 :: Amrit Williams Length: 15s
Interview with David Mortman…


PCI and Compliance Initiatives

play
2009-03-06 :: Amrit Williams Length: 15s
Interview with David Mortman…


PCI and Compliance Initiatives

play
2009-03-06 :: Amrit Williams Length: 15s
Interview with David Mortman…


The Human Factor in Enterprise IT Security

play
2009-03-06 :: Amrit Williams Length: 22s
Interview with Michael Santarcangelo…


The Human Factor in Enterprise IT Security

play
2009-03-06 :: Amrit Williams Length: 22s
Interview with Michael Santarcangelo…


The Human Factor in Enterprise IT Security

play
2009-03-06 :: Amrit Williams Length: 22s
Interview with Michael Santarcangelo…


Cyber Security and the Obama Administration

play
2009-02-28 :: Amrit Williams Length: 16s
Beyond The Perimeter…


Cyber Security and the Obama Administration

play
2009-02-28 :: Amrit Williams Length: 16s
Beyond The Perimeter…


Cyber Security and the Obama Administration

play
2009-02-28 :: Amrit Williams Length: 16s
Beyond The Perimeter…


The Hathaway Appointment

play
2009-02-28 :: Amrit Williams Length: 22s
Beyond The Perimeter…


The Hathaway Appointment

play
2009-02-28 :: Amrit Williams Length: 22s
Beyond The Perimeter…


The Hathaway Appointment

play
2009-02-28 :: Amrit Williams Length: 22s
Beyond The Perimeter…


The Kaspersky Break-in

play
2009-02-20 :: Amrit Williams Length: 15s
Beyond The Perimeter…


The Kaspersky Break-in

play
2009-02-20 :: Amrit Williams Length: 15s
Beyond The Perimeter…


The Kaspersky Break-in

play
2009-02-20 :: Amrit Williams Length: 15s
Beyond The Perimeter…


About this podcast:

Beyond The Perimeter

With Amrit Williams

Beyond The Perimeter