Skip to main content
infosec   rss
(1-10 of 17 items)
Business Continuity: Technical Dependency Analysis | TechNet Video Kevin Harris, from Microsoft Information Security, explains what the Technical Dependency Analysis (TDA) is in the Business Continuity methodology. For more on Business Continuity, see overview video and explanation of the Business Impact Analysis. Kevin describes the technical dependency analysis t... More...

TechNet Edge, Security, INFOSEC, Information Security, Videos, English, Jossie, Zune, iPod
Business Continuity: Business Impact Analysis | TechNet Edge Tom Easthope, from Microsoft Information Security, explains what the Business Impact Analysis (BIA) is in the Business Continuity methodology. For more on Business Continuity, see overview video. Tom explains how the Business Impact Analysis is so beneficial not only for Business Continuity. He also... More...

TechNet Edge, Security, INFOSEC, Information Security, Videos, English, Jossie, Zune, iPod
Dogfooding: Deployment & Product Influence | TechNet Edge Steven Michalove, from Microsoft Information Security, concludes the dogfooding series where a product is tested on the enterprise, formally known as First Best Program. For more information on the other phases of dogfooding a product in IT see Evaluating Risk and Security Related Features. Steven ... More...

TechNet Edge, Security, risk, Infosec, information security, dogfooding, Videos, English, Jossie, Zune, iPod
Dogfooding Security-Related Features | TechNet Edge Yale Li and Price Oden, from Microsoft Information Security, explain the second phase of dogfooding a product on the enterprise, formally known as First Best Program. This second step consists of doing a security assessment on specific features in the product. For the first phase go here. With this... More...

TechNet Edge, Security, BitLocker To Go, Infosec, information security, dogfooding, Videos, English, Jossie, Zune, iPod
Dogfooding: Evaluating Risk | TechNet Edge Don Nguyen and  Mike Lange, from Microsoft Information Security, explain the first phase of dogfooding a product on the enterprise, formally known as First Best Program. This first step consists of a risk assessment or design review on the product. This phase is important as it allows them to look a... More...

TechNet Edge, Security, SQL Server 2008, Infosec, information security, dogfooding, Videos, English, Jossie, Zune, iPod
Microsoft Information Security & Dogfooding | TechNet Edge Mark Smith, from Microsoft Information Security, provides a glimpse at how Microsoft “dogfoods” its products. When launching a new product naturally there’s a concern about how a product will perform. Ever wonder about the process? This is part of a series of videos around Information Security and D... More...

TechNet Edge, Security, Dogfooding, Infosec, Information Security, Videos, English, Jossie, Zune, iPod
How Microsoft Uses Risk Tracker to Reduce Risk | TechNet Edge Sarah Pickard from Microsoft Information Security gives a hands-on demonstration on how the business uses the Risk Tracker application. Built using CISF (Connected Information Security Framework) this application captures and tracks high level security risks to effectively reduce risk at Microsoft. ... More...

TechNet Edge, Security, Connected Information Security Framework, tools, Infosec, information security, Videos, CISF, English, Jossie, Zune, iPod
CISF: Build Custom Security Solutions | TechNet Edge Mark Curphey and Marius Grigoriu, from Microsoft Information Security, talk about the release of the first version of Connected Information Security Framework (CISF). A software development framework comprising of API’s and reusable components that is designed to create bespoke or custom information... More...

TechNet Edge, Security, Connected Information Security Framework, tools, Infosec, information security, Videos, CISF, English, Jossie, Zune, iPod
Risk Tracker: Reducing Risks at Microsoft | TechNet Edge Sarah Pickard and Mark Curphey from Microsoft Information Security talk about the release of the Risk Tracker application. Built using CISF (Connected Information Security Framework) this application captures and tracks high level security risks to effectively reduce risk at Microsoft. They explain ... More...

TechNet Edge, Security, Risk Tracker, tools, Infosec, information security, Videos, CISF, English, Jossie, Zune, iPod
ACE from the Field: Laura A. Robinson on the Realities of Security | TechNet Video We’ve invited Talhah Mir, from Microsoft Information Security, to interview folks from the ACE Team that currently work on the field for a weekly video series. Laura has worked with and for enterprise customers in financial services, bio-pharma, energy and other industries, focusing on security sinc... More...

TechNet Edge, Security, Infosec, ACE, information security, Videos, English, Jossie, Zune, iPod