Catch-up on the latest information security news with our Podcast. Also, keep an eye out for our 'Author Interviews' where we speak with industry experts, covering; InfoSec, Cyber Security, IT, project management, and more.
…
continue reading
1
ITGP Author Interview with Dr Julie Mehan discussing her book Artificial Intelligence
29:15
29:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
29:15
First in our ITGP Author Interview series - We interview Dr Julie Mehan to discuss her book Artificial Intelligence - Ethical, social, and security impacts for the present and the futureبقلم IT Governance Publishing
…
continue reading
1
Episode 6 - Brexit And Schrems II - Practical Implications For UK - EU Data Transfers
1:10:25
1:10:25
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:10:25
Brexit and Schrems II and the practical implications for the UK and EU data transfersبقلم IT Governance Publishing
…
continue reading
1
Episode 5 - 7 Cyber Security Risks And How To Overcome Them
50:49
50:49
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
50:49
Understand why cyber security awareness is vital for your professional and personal lifeبقلم IT Governance Publishing
…
continue reading
1
Episode 4 - GDPR Does My North American Organization Need To Comply
53:11
53:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
53:11
Preston Bukaty is an attorney and consultant. He specializes in data privacy GRC projects, from data inventory audits to gap analyses, contract management, and remediation planning. His compliance background and experience operationalizing compliance in a variety of industries give him a strong understanding of the legal issues presented by interna…
…
continue reading
1
Episode 3 - Cyber Threats And The Risks They Pose To SMEs
35:01
35:01
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
35:01
Cyber Security Threats and the risks they pose to SMEsبقلم IT Governance Publishing
…
continue reading
1
Episode 2 - Making A Success Of Managing And Working Remotely
37:03
37:03
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:03
The world of work is changing. Many employees no longer hold the traditional nine-to-five job. Instead, working time is increasingly flexible. Technology has enabled a rapid rise in the number of remote workers in recent years; the TUC estimates that the number of UK people working from home increased by a fifth in the ten years to 2018, and now st…
…
continue reading
1
Episode 1 - Business Continuity And The COVID - 19 Pandemic
44:19
44:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
44:19
The increase in commercial aviation and international travel means that pandemics now spread faster than ever before.Seasonal flu, zoonotic contagions such as Ebola, swine flu and avian flu (e.g. H5N1 and H7N9), respiratory syndromes such as SARS and MERS, and now COVID-19 (the 2019 novel coronavirus) have affected millions worldwide.Add the ever-p…
…
continue reading
1
Sophie Sayer and Bridget Kenyon: ISO 27001 controls – A guide to implementing and auditing
20:10
20:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
20:10
Sophie Sayer and Bridget Kenyon are joined by Nicola Day and Camden Woollven to discuss the release of ISO 27001 controls – A guide to implementing and auditing.بقلم IT Governance Publishing
…
continue reading
A new is book titled, A Guide to the Implementation and Auditing of ISMS Controls based on ISO/IEC 27001.Reasons why Bridget chose us to publish her book are:-because you're quite prominent in the marketplace and I can see what you're aiming to achieve which is, bridging the gap between what people need and what they think they need. If you know wh…
…
continue reading
The modern security practitioner has shifted from a predominantly protective site and assets manager to a leading contributor to overall organisational resilience. Accordingly, The Security Consultant's Handbook sets out a holistic overview of the essential core knowledge, emerging opportunities and approaches to corporate thinking that are increas…
…
continue reading
1
New podcast: Critical Infrastructure Services
3:34
3:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:34
Listen to an exclusive extract from Toomas Viira’s book Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure.The extract features Chapter 1: “Critical Infrastructure Services.” It explores what critical infrastructure services are, and how the definition of critical services changes ov…
…
continue reading
In this exclusive interview, cyber security risk manager and IT auditor Toomas Viira discusses his book Lessons Learned: Critical Information Infrastructure Protection – How to protect critical information infrastructure and gives advice on how to protect your critical information infrastructure.Save 20% on Toomas' book if you order from the ITGP w…
…
continue reading
1
Interview with author Leron Zinatullin
19:20
19:20
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
19:20
In this exclusive interview, risk consultant and cyber security specialist Leron Zinatullin discusses the human aspects of information security and offers his advice for improving the security culture in your organisation.To save 20% on Leron's book, the Psychology of Information Security, order from the ITGP website by 31 January and enter code Ja…
…
continue reading
1
Book extract: Why consider ISO37001:2016 at all?
5:27
5:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:27
In this podcast we are reading an extract from Alan Field's book, ISO 37001 - An Introduction to Anti-Bribery Management Systems. This extract will take you through the importance of why organisations should implement ISO37001:2016.As an early Christmas gift, receive a 20% discount on all Alan’s products when you enter the discount code FIELD20 at …
…
continue reading
1
How to achieve energy management system (ISO 50001:2018) certification
4:32
4:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:32
In our final interview with Alan Field, we discuss the importance of implementing an EnMS (energy management system) and what steps organisations should take to achieve certification.Receive a 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP checkout.https://www.itgovernancepublishing.co.uk/author/alan-field…
…
continue reading
For this week’s podcast, Alan Field explains the differences between a gift and a bribe and he also discusses what plans an organisation should have in place for giving and receiving gifts from clients.20% discount on all Alan’s productsFor December only, save 20% discount on all Alan’s products when you enter the discount code FIELD20 at the ITGP …
…
continue reading
1
Interview with author of the month, Alan Field
4:15
4:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:15
Our first podcast in December is an interview with anti-bribery expert, Alan Field. In this interview he talks about his career to date and what he has lined up for ITGP in 2019.Save 20% on all of Alan’s productsFor December only, receive a 20% discount on Alan’s products when you enter the discount code FIELD20 at the ITGP checkout.https://www.itg…
…
continue reading
1
Why do we need to exercise our business continuity plans?
5:44
5:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:44
In our final business continuity podcast, Robert reads a sample from his book Validating Your Business Continuity Plan. This extract emphasises the importance of exercising completed BCPs (business continuity plans).Receive a 20% discount on all Robert’s ITGP booksThis is your last chance to get 20% off Robert’s books. Use discount code BCM20 at th…
…
continue reading
1
New podcast: The characteristics of a pandemic
4:53
4:53
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:53
Robert Clark reads an extract from his book, Business Continuity and the Pandemic Threat in our latest podcast. He discusses the distinct characteristics of a pandemic and how the public often confuses a pandemic for an epidemic.20% discount on all Robert’s ITGP booksFor November only, save 20% on Robert’s books when you enter discount code BCM20 a…
…
continue reading
1
Does your organisation have a business continuity plan for these threats?
6:36
6:36
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:36
In this week's podcast, we’re reading a passage from In Hindsight – A compendium of Business Continuity case studies. The extract shows the smaller threats that could still have a massive impact on your business continuity effectiveness.Save 20% off all of Robert’s ITGP books this November when you use discount code BCM20 at the checkout. Find the …
…
continue reading
1
Robert Clark's top tip for business continuity
6:12
6:12
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:12
In the second episode of Robert Clark's interview, he shares his top tip for organisations trying to create a business continuity plan. We then discuss one of his bestselling titles with ITGP, Business Continuity and the Pandemic Threat.20% off all Robert’s ITGP booksReceive a 20% discount on all of Robert’s ITGP books this November when you use di…
…
continue reading
1
Interview with Business Continuity Expert and ITGP Author of the Month, Robert Clark
4:22
4:22
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:22
Listen to our latest interview with Business Continuity expert and ITGP author, Robert Clark.In the first part of the interview, Robert discusses his career to date and how he began writing books for ITGP.For November, receive 20% discount on Robert's ITGP books when you use the code BCM20 at the checkout.His books can be found here: https://www.it…
…
continue reading
1
The Seven Steps to an ISO 27001 Risk Assessment Process
6:57
6:57
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
6:57
In this podcast we are releasing an extract from one of our bestselling books, ISO27001/ISO27002:2013 – A Pocket Guide, discussing the seven steps that must be followed when carrying out an ISO 27001 risk assessment.Purchase this book or any other Alan Calder product in October to get a 15% discount when you use code Calder15 at the checkout.https:…
…
continue reading
1
The Benefits of Implementing a NIST Cyber Security Framework (CSF): Podcast
3:34
3:34
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:34
This book extract from the NIST Cybersecurity Framework: A Pocket Guide, will take you through the benefits of implementing the NIST (National Institute of Standards and Technology) CSF (Cybersecurity Framework).Receive a 15% discount on the NIST Cybersecurity Framework: A Pocket Guide when you use the code, CALDER15 at the checkout in October only…
…
continue reading
1
Nine Steps To Success Audiobook Extract - The ISMS Iniation
4:37
4:37
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:37
To celebrate the release of our new audiobooks, we’re giving away an exclusive clip from one of our bestselling titles, Nine Steps to Success – An ISO27001:2013 Implementation Overview.Get 15% off this audiobook when you use the code, Calder15 at the checkout.https://www.itgovernancepublishing.co.uk/product/nine-steps-to-success…
…
continue reading
1
Interview with founder and executive chairman of ITGP, Alan Calder
9:11
9:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:11
In this exclusive interview with ITGP founder, Alan Calder, explains how his bestselling pocket guides can help you with your implementation projects, outlines his inspiration for introducing toolkits into the industry and discusses the work that needs to be done for organisations to become GDPR compliant.Get 15% off all of Alan’s ITGP publications…
…
continue reading
1
What Your Children Need To Know About The Internet
3:32
3:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:32
In the final episode of our Security in the Digital World podcast series, we discuss the key messages parents need to get across to their children about the dangers of the Internet.Disclaimer: These are the views of Tom Wood, Selina Daley and Sarah Brown, not of ITGP.بقلم IT Governance Publishing
…
continue reading
1
Is Social Media Dangerous? Interview with security expert, Graham Day.
4:33
4:33
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:33
In Graham Day's second interview, he talks about the benefits and the dangers of social media.Save 15% on Graham Day’s book Security in the Digital World.Enter discount code ‘SEPT15’ at the checkout.https://www.itgovernancepublishing.co.uk/product/security-in-the-digital-worldبقلم IT Governance Publishing
…
continue reading
1
Graham Day Interview: Security in the Digital World
5:29
5:29
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:29
In this interview Graham Day tells us about working with ITGP as his publishers and tells us more about his book.بقلم IT Governance Publishing
…
continue reading
1
Build a Security Culture: final episode
3:42
3:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:42
In this book, Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour. He explains how to manage these threats by implementing an effective framework for an organ…
…
continue reading
1
Build a Security Culture: An introduction pt 2
4:32
4:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:32
http://ow.ly/4qVr50ieNgrIn this book, Kai Roer presents his Security Culture Framework, and addresses the human and cultural factors in organisational security. The author uses clear, everyday examples and analogies to reveal social and cultural triggers that drive human behaviour. He explains how to manage these threats by implementing an effectiv…
…
continue reading
1
Build a Security Culture: An Introduction
4:58
4:58
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:58
To understand security culture and its constant threats, first we need to look at sociology and work our human behavioural patterns. In this introduction to Kai Roer's book 'Build a Security Culture' we begin with this outlook.itgovernancepublishing.co.uk/product/build-a-security-cultureبقلم IT Governance Publishing
…
continue reading
1
Kai Roer Author of the Month Interview Live from InfoSec
4:17
4:17
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:17
For the month of August we are kicking off with a live interview with Build a Security Culture author Kai Roer. Back in June we caught up with our author Kair Roer this year at Infosecurity Europe, held at London Olympia. As well as interviewing Kai, we attended some really fantastic industry talks as well as helping out the free ice-cream stand by…
…
continue reading
1
Audiobook extract The Power of the Agile Business Analyst
5:43
5:43
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:43
In this podcast we introduce an extract from our new audiobook service.The Power Of the Agile Business Analyst by Jamie Lynn Cooke is available to buy now.For more information on our audiobooks please visit our website:www.itgovernancepublishing.co.uk/topic/audiobooksبقلم IT Governance Publishing
…
continue reading
1
ITGP author of the month: Jamie Lynn Cooke #3
5:51
5:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
5:51
For the month of July ITGP featured author Jamie Lynn Cook, and interviewed her about the world of project management, and how she got into writing books.بقلم IT Governance Publishing
…
continue reading
1
ITGP author of the month: Jamie Lynn Cooke #2
4:31
4:31
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:31
ITGP author of the month: Jamie Lynn Cooke. In this podcast we read an extract from the book 'The Power of the Agile Business Analyst' to introduce the book.itgovernancepublishing.co.uk/product/the-power-of-the-agile-business-analyst-second-editionبقلم IT Governance Publishing
…
continue reading
1
ITGP author of the month: Jamie Lynn Cooke #1
4:15
4:15
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
4:15
This book extract is taken from the new title by Jamie Lynn Cooke, The Power of the Agile Business Analyst, second edition – 30 surprising ways a business analyst can add value to your Agile development team.itgovernancepublishing.co.uk/product/the-power-of-the-agile-business-analyst-second-editionبقلم IT Governance Publishing
…
continue reading
1
Collaborative Business Design: The Fundamentals - podcast extract #3
3:10
3:10
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:10
This book extract is taken from Collaborative Business Design: The Fundamentals, written by our author of the month, Brian Johnson and his co-author Léon-Paul de Rouw.بقلم IT Governance Publishing
…
continue reading
1
Collaborative Business Design: The Fundamentals - podcast extract #2
3:27
3:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:27
This book extract is taken from Collaborative Business Design: The Fundamentals, written by our author of the month, Brian Johnson and his co-author Léon-Paul de Rouw.Episode 2 – Understanding IT-driven service requirements: “What is a business service?"بقلم IT Governance Publishing
…
continue reading
1
ITGP author of the month: Brian Johnson
9:59
9:59
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:59
In this podcast Brian Johnson discusses his new book IT for Business (IT4B) - From Genesis to Revolution, a business and IT approach to digital transformation, co-authored with Walter Zondervan and details how the book formed from a Dutch best practice conception on data management and business information practice, into its current international f…
…
continue reading
1
Collaborative Business Design: The Fundamentals - podcast extract #1
3:30
3:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
3:30
This book extract is taken from Collaborative Business Design: The Fundamentals, written by our author of the month, Brian Johnson and his co-author Léon-Paul de Rouw.Episode 1 – An introduction to IT-driven business services: “The primary focus of this guide is the needs of the business; what information must be collected, how IT is processed, wha…
…
continue reading