DiscussIT - The South African Podcast Portal
Kanal-Details

DiscussIT - The South African Podcast Portal
DiscussIT - The South African Podcast Portal
Neueste Episoden
200 Episoden
ISACA 2014 Conference - Benefits, Risks and Governance issues around Social Media
Ramses Gallego and Tracey Linnel take the stage together to contextualise social media Pubcast Episode 142160;Download the160;160;Full Audio Fileaudio...

ISACA 2014 Conference -CSX Cyber Security Nexus
Isaca has taken note of the shortage of Cyber Security practitioners.In this ISACA session, Ramses Gallego talks about this shortage, and announces IS...

ISACA 2014 Conference -Introduction to Corporate Cyber Forensics Pt 2
Barry Lewis concludes his introduction to Cyber Forensics, with specific implementation examples.Pubcast Episode 142160;Download the160;160;Full Audio...

ISACA 2014 Conference -Introduction to Corporate Cyber Forensics Pt 1
Barry Lewis provides an introduction to Cyber Forensics, leading in with five principles: - Do no harm; - Use copies (never originals); - Establish an...

ISACA 2014 Conference - Back to Basics
In the opening talk of the 2014 ISACA Conference, Quinton Coetzee discusses why the SAN Bushmen succeed - and what the business lessons are that can b...

PoPICast 24: Section 14 ... concluded
Due to a technology failure there has been a delay in releasing the PoPICast - but we're back!In this series of 10 minute podcasts, Tony interviews Pr...

PoPICast 23: Section 14 ... still
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In episode 23 we...

Pubcast: From the ITWeb Security Summit - ISACA 2014
ITWeb held their annual security summit, and as usual were gracious enough to provide the Pubcast with a recording booth.In this discussion, Winston H...

PoPICast 22: Section 14 Subsection 3
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In episode 22 we...

Pubcast: From the ITWeb Security Summit - InfoSure
ITWeb held their annual security summit during the past week, and as usual were gracious enough to provide the Pubcast with a recording booth.In this...

Pubcast: From the ITWeb Security Summit - Heartbleed
ITWeb held their annual security summit during the past week, and as usual were gracious enough to provide the Pubcast with a recording booth.In the f...

PoPICast 21: Section 14 Continued
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In episode 21 we...

PoPICast 20: Section 14 - Retention
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In episode 20 we...

PoPICast 19: Section 13
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In episode 19, t...

PoPICast 18: Section 12 (2)
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In episode 18, t...

PoPICast 17: Section 12
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.We had intended...

PoPICast 15: Genealogy: A case study (2)
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In this, the sec...

PoPICast 14: Genealogy: A case study (1)
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In this, the fir...

PoPICast 13: Condition 2, Section 11 (5)
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.Section 11 remai...

PoPICast 12: Condition 2, Section 11 (4)
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.Section 11 remai...

PoPICast 11: Condition 2, Section 11 (3)
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.Section 11 remai...

PoPICast 10: Condition 2, Section 11 (3)
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.Consent and Just...

PoPICast 09: Condition 2, Section 11
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.The important co...

Pubcast: Understanding the practicalities of privacy in a cyber world
ISC2 recently held a Privacy Breakfast.In this first release from the conference: having implemented a privacy programme herself, Ritasha Jethva talke...

PoPICast 08: Condition 2, Section 10
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.The important co...

PoPICast 07: Condition 2
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.The discussion f...

PoPICast 06: Condition 1 continued
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.Condition 1 has...

PoPICast 05: Condition 1
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In this episode,...

PoPICast 04: The PoPI Conditions
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In this episode,...

Pubcast: Websense 2014 Predictions
Websense recently released their Information Security predictions for 2014.Tony discussed the report with Brendan, Barend and Alan from Performanta.16...

PoPICast 03: What is Processing?
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In this episode,...

PoPICast 02: What is Personal Information?
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In this episode,...

PoPICast 01: What is PoPI, anyway?
In this series of 10 minute podcasts, Tony interviews Professor David Taylor on the Protection of Personal Information Act, 4 of 2013.In this opening...

Pubcast: SABSA
160;The Sherwood Applied Business Security Architecture (SABSA) provides a tool to translate business requirements into security controls.Having imple...

ISACA 2013 Conference - The perfect storm: threats and risks in the cloud (part 1)
In this, the first of two presentations, Ramses Gallego discusses the threats pertaining to Cloud Computing.Pubcast Episode 133160;Download the160;160...

ISACA 2013 Conference - Windows 2012 Server Security and Audit Part 2
In this presentation, the first of two, John Tannahill discusses the issues pertaining to Windows 2012 Server Security.Pubcast Episode 132160;Download...

ISACA 2013 Conference - Windows 2012 Server Security and Audit
In this presentation, the first of two, John Tannahill discusses the issues pertaining to Windows 2012 Server Security.Pubcast Episode 131160;Download...

ISACA 2013 Conference - The post-digital environment
ISACA opened the second day of the conference with a panel discussion by DeloittePubcast Episode 130160;Download the160;160;Full Audio Fileaudiohttp:/...

ISACA 2013 Conference - BYOD considerations and consequences
Barry Lewis discusses the impliacation of Bring your own disasterPubcast Episode 129160;Download the160;160;Full Audio Fileaudiohttp://www.discussit.c...

Pubcast: The only real defense is active defense
In an environment where companies are unable to utilize legal resources to defend against hacking attacks, many have taking the law into their own han...