התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


1 Gene Baur: Confronting the Morality of Factory Farming 28:16
An Introduction to Software Cost Estimation
Manage episode 453708338 series 2487640
Software cost estimation is an important first step when beginning a project. It addresses important questions regarding budget, staffing, scheduling, and determining if the current environment will support the project. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Anandi Hira, a data scientist on the SEI’s Software Engineering Measurement and Analysis team sits down with Bill Nichols, principal engineer and SEI data science team lead, to discuss software cost estimation including various metrics, best practices, and common challenges when developing or building a model.
418 פרקים
Manage episode 453708338 series 2487640
Software cost estimation is an important first step when beginning a project. It addresses important questions regarding budget, staffing, scheduling, and determining if the current environment will support the project. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Anandi Hira, a data scientist on the SEI’s Software Engineering Measurement and Analysis team sits down with Bill Nichols, principal engineer and SEI data science team lead, to discuss software cost estimation including various metrics, best practices, and common challenges when developing or building a model.
418 פרקים
כל הפרקים
×
1 Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds 25:10

1 Mitigating Cyber Risk with Secure by Design 32:29

1 The Magic in the Middle: Evolving Scaled Software Solutions for National Defense 21:25

1 Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space 44:26


1 The Best and Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition 21:40

1 Updating Risk Assessment in the CERT Secure Coding Standard 26:04

1 Delivering Next Generation Cyber Capabilities to the DoD Warfighter 27:16

1 Getting the Most Out of Your Insider Risk Data with IIDES 39:14

1 Grace Lewis Outlines Vision for IEEE Computer Society Presidency 18:14

1 Improving Machine Learning Test and Evaluation with MLTE 29:06

1 DOD Software Modernization: SEI Impact and Innovation 27:12

1 Securing Docker Containers: Techniques, Challenges, and Tools 39:09

1 An Introduction to Software Cost Estimation 22:55

1 Cybersecurity Metrics: Protecting Data and Understanding Threats 27:00

1 3 Key Elements for Designing Secure Systems 36:28

1 Using Role-Playing Scenarios to Identify Bias in LLMs 45:07

1 Best Practices and Lessons Learned in Standing Up an AISIRT 38:29

1 3 API Security Risks (and How to Protect Against Them) 19:28

1 Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices 43:05

1 Capability-based Planning for Early-Stage Software Development 33:55

1 Safeguarding Against Recent Vulnerabilities Related to Rust 26:25

1 Developing a Global Network of Computer Security Incident Response Teams (CSIRTs) 30:51

1 Automated Repair of Static Analysis Alerts 27:05

1 Developing and Using a Software Bill of Materials Framework 37:37

1 Using Large Language Models in the National Security Realm 34:45

1 Atypical Applications of Agile and DevSecOps Principles 33:41

1 When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction 35:21

1 The Impact of Architecture on Cyber-Physical Systems Safety 34:05

1 ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies 46:22

1 The Cybersecurity of Quantum Computing: 6 Areas of Research 23:01


1 The Product Manager’s Evolving Role in Software and Systems Development 24:19

1 Measuring the Trustworthiness of AI Systems 19:27

1 Actionable Data in the DevSecOps Pipeline 31:58

1 Insider Risk Management in the Post-Pandemic Workplace 47:34

1 An Agile Approach to Independent Verification and Validation 31:57

1 Zero Trust Architecture: Best Practices Observed in Industry 27:53

1 Automating Infrastructure as Code with Ansible and Molecule 39:38

1 Identifying and Preventing the Next SolarWinds 46:04

1 A Penetration Testing Findings Repository 25:47

1 Understanding Vulnerabilities in the Rust Programming Language 36:45

1 We Live in Software: Engineering Societal-Scale Systems 39:31

1 Secure by Design, Secure by Default 54:05

1 Key Steps to Integrate Secure by Design into Acquisition and Development 48:50

1 An Exploration of Enterprise Technical Debt 25:56

1 The Messy Middle of Large Language Models 33:46

1 An Infrastructure-Focused Framework for Adopting DevSecOps 43:35


1 Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron 51:16

1 Asking the Right Questions to Coordinate Security in the Supply Chain 31:11

1 Securing Open Source Software in the DoD 35:33

1 A Model-Based Tool for Designing Safety-Critical Systems 48:43

1 Managing Developer Velocity and System Security with DevSecOps 32:55

1 A Method for Assessing Cloud Adoption Risks 21:47

1 Software Architecture Patterns for Deployability 29:09

1 ML-Driven Decision Making in Realistic Cyber Exercises 48:58

1 A Roadmap for Creating and Using Virtual Prototyping Software 56:30

1 Software Architecture Patterns for Robustness 31:13

1 A Platform-Independent Model for DevSecOps 23:41

1 Using the Quantum Approximate Optimization Algorithm (QAOA) to Solve Binary-Variable Optimization Problems 27:36



1 Challenges and Metrics in Digital Engineering 42:18

1 The 4 Phases of the Zero Trust Journey 34:28


1 Undiscovered Vulnerabilities: Not Just for Critical Software 35:26


1 Model-Based Systems Engineering Meets DevSecOps 34:10

1 Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy 31:46

1 Software and Systems Collaboration in the Era of Smart Systems 26:04

1 Securing the Supply Chain for the Defense Industrial Base 18:37

1 Building on Ghidra: Tools for Automating Reverse Engineering and Malware Analysis 23:24

1 Envisioning the Future of Software Engineering 40:11

1 Implementing the DoD's Ethical AI Principles 23:17

1 Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality Systems 39:36

1 Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML Systems 30:19

1 A Discussion on Automation with Watts Humphrey Award Winner Rajendra Prasad 37:17

1 Enabling Transition From Sustainment to Engineering Within the DoD 31:22

1 The Silver Thread of Cyber in the Global Supply Chain 26:56

1 Measuring DevSecOps: The Way Forward 39:32

1 Bias in AI: Impact, Challenges, and Opportunities 24:58

1 Agile Strategic Planning: Concepts and Methods for Success 29:50

1 Applying Scientific Methods in Cybersecurity 39:49

1 Zero Trust Adoption: Benefits, Applications, and Resources 30:25

1 Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions 31:40

1 11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula
48:05

1 Benefits and Challenges of Model-Based Systems Engineering 33:10

1 Can DevSecOps Make Developers Happier? 41:17

1 Is Your Organization Ready for AI? 30:20

1 Managing Vulnerabilities in Machine Learning and Artificial Intelligence Systems 40:59



1 Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs 13:18

1 Digital Engineering and DevSecOps 30:45

1 A 10-Step Framework for Managing Risk 30:31

1 7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts 20:23

1 Ransomware: Evolution, Rise, and Response 32:50

1 VINCE: A Software Vulnerability Coordination Platform 38:14

1 Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network
46:17


1 The CMMC Level 3 Assessment Guide: A Closer Look 13:45

1 The CMMC Level 1 Assessment Guide: A Closer Look 20:37

1 Achieving Continuous Authority to Operate (ATO) 33:29

1 Challenging the Myth of the 10x Programmer 16:51

1 A Stakeholder-Specific Approach to Vulnerability Management 37:11


1 Reviewing and Measuring Activities for Effectiveness in CMMC Level 4 13:13

1 Situational Awareness for Cybersecurity: Beyond the Network 25:35

1 Quantum Computing: The Quantum Advantage 30:34


1 Developing an Effective CMMC Policy 10:25

1 The Future of Cyber: Educating the Cybersecurity Workforce 28:10



1 CMMC Levels 1-3: Going Beyond NIST SP-171 12:56

1 The Future of Cyber: Secure Coding 41:16

1 Challenges to Implementing DevOps in Highly Regulated Environments 38:42



1 The CERT Guide to Coordinated Vulnerability Disclosure 35:01

1 The Future of Cyber: Security and Privacy 24:57

1 The Future of Cyber: Security and Resilience 33:19


1 Benchmarking Organizational Incident Management Practices 35:08

1 Machine Learning in Cybersecurity: 7 Questions for Decision Makers 27:49

1 Human Factors in Software Engineering 47:24

1 Improving the Common Vulnerability Scoring System 21:04

1 Why Software Architects Must Be Involved in the Earliest Systems Engineering Activities 22:07

1 Selecting Metrics for Software Assurance 18:37

1 AI in Humanitarian Assistance and Disaster Response 22:16

1 The AADL Error Library: 4 Families of Systems Errors 23:33


1 Cyber Intelligence: Best Practices and Biggest Challenges 35:54

1 Assessing Cybersecurity Training 13:43

1 DevOps in Highly Regulated Environments 40:48

1 The Role of the Software Factory in Acquisition and Sustainment 25:19

1 Defending Your Organization Against Business Email Compromise 44:24

1 Managing Technical Debt: A Focus on Automation, Design, and Architecture 35:15

1 Leading in the Age of Artificial Intelligence 21:47

1 Applying Best Practices in Network Traffic Analysis 22:12

1 10 Types of Application Security Testing Tools and How to Use Them 20:11

1 Using Test Suites for Static Analysis Alert Classifiers 30:11


1 Leading in the Age of Artificial Intelligence 21:47

1 System Architecture Virtual Integration: ROI on Early Discovery of Defects 29:13

1 A Technical Strategy for Cybersecurity 14:51

1 Best Practices for Security in Cloud Computing 19:20

1 Risks, Threats, and Vulnerabilities in Moving to the Cloud 18:11

1 How to Be a Network Traffic Analyst 21:10

1 Workplace Violence and Insider Threat 15:02



1 Software Sustainment and Product Lines 28:22

1 Best Practices in Cyber Intelligence 19:26

1 The Evolving Role of the Chief Risk Officer 28:22

1 Obsidian: A Safer Blockchain Programming Language 31:36


1 Is Software Spoiling Us? Technical Innovations in the Department of Defense 21:14

1 Is Software Spoiling Us? Innovations in Daily Life from Software 16:44

1 How Risk Management Fits into Agile & DevOps in Government 34:17

1 5 Best Practices for Preventing and Responding to Insider Threat 11:13

1 Pharos Binary Static Analysis: An Update 10:03

1 Positive Incentives for Reducing Insider Threat 24:10


1 At Risk Emerging Technology Domains 10:37


1 Best Practices: Network Border Protection 24:06

1 Verifying Software Assurance with IBM’s Watson 19:41

1 The CERT Software Assurance Framework 19:08


1 Ransomware: Best Practices for Prevention and Response 30:18


1 SEI Fellows Series: Peter Feiler 40:46


1 Establishing Trust in Disconnected Environments 17:46

1 Distributed Artificial Intelligence in Space 18:06

1 Verifying Distributed Adaptive Real-Time Systems 47:02

1 10 At-Risk Emerging Technologies 17:12

1 Technical Debt as a Core Software Engineering Practice 23:04


1 Three Roles and Three Failure Patterns of Software Architects 13:35


1 Best Practices for Preventing and Responding to Distributed Denial of Service (DDoS) Attacks 33:03

1 Cyber Security Engineering for Software and Systems Assurance 18:12


1 Improving Cybersecurity Through Cyber Intelligence 18:47

1 A Requirement Specification Language for AADL 30:44

1 Becoming a CISO: Formal and Informal Requirements 23:32

1 Predicting Quality Assurance with Software Metrics and Security Methods 11:24


1 A Community College Curriculum for Secure Software Development 20:23

1 Security and the Internet of Things 17:09

1 The SEI Fellow Series: Nancy Mead 28:37

1 An Open Source Tool for Fault Tree Analysis 14:19

1 Global Value Chain – An Expanded View of the ICT Supply Chain 30:12

1 Intelligence Preparation for Operational Resilience 27:00

1 Evolving Air Force Intelligence with Agile Techniques 17:00

1 Threat Modeling and the Internet of Things 17:39

1 Open Systems Architectures: When & Where to Be Closed 19:52

1 Toward Efficient and Effective Software Sustainment 23:20

1 Effective Reduction of Avoidable Complexity in Embedded Systems 18:32

1 Quality Attribute Refinement and Allocation 24:00


1 Identifying the Architectural Roots of Vulnerabilities 23:43

1 Build Security In Maturity Model (BSIMM) – Practices from Seventy Eight Organizations 31:27


1 Structuring the Chief Information Security Officer Organization 31:23

1 How Cyber Insurance Is Driving Risk and Technology Management 21:23


1 How the University of Pittsburgh Is Using the NIST Cybersecurity Framework 23:46

1 A Software Assurance Curriculum for Future Engineers 19:34

1 Four Types of Shift Left Testing 26:56

1 Capturing the Expertise of Cybersecurity Incident Handlers 26:01

1 Toward Speed and Simplicity: Creating a Software Library for Graph Analytics 15:37

1 Improving Quality Using Architecture Fault Analysis with Confidence Arguments 18:02


1 Reducing Complexity in Software & Systems 19:05

1 Designing Security Into Software-Reliant Systems 11:41

1 Agile Methods in Air Force Sustainment 12:27

1 Defect Prioritization With the Risk Priority Number 17:42

1 SEI-HCII Collaboration Explores Context-Aware Computing for Soldiers 20:18

1 An Introduction to Context-Aware Computing 19:24


1 Supply Chain Risk Management: Managing Third Party and External Dependency Risk 28:09

1 Applying Agile in the DoD: Twelfth Principle 12:14

1 Introduction to the Mission Thread Workshop 23:45

1 Applying Agile in the DoD: Eleventh Principle 14:05

1 A Workshop on Measuring What Matters 30:41

1 Applying Agile in the DoD: Tenth Principle 13:57

1 Predicting Software Assurance Using Quality and Reliability Measures 19:02

1 Applying Agile in the DoD: Ninth Principle 17:35

1 Cyber Insurance and Its Role in Mitigating Cybersecurity Risk 37:26



1 Agile Software Teams and How They Engage with Systems Engineering on DoD Acquisition Programs 11:46



1 Applying Agile in the DoD: Eighth Principle 13:28

1 A Taxonomy of Operational Risks for Cyber Security 32:47


1 Four Principles for Engineering Scalable, Big Data Systems 20:12

1 An Appraisal of Systems Engineering: Defense v. Non-Defense 14:05

1 HTML5 for Mobile Apps at the Edge 20:49

1 Applying Agile in the DoD: Seventh Principle 17:58


1 Security and Wireless Emergency Alerts 12:30

1 Safety and Behavior Specification Using the Architecture Analysis and Design Language 20:40

1 Characterizing and Prioritizing Malicious Code 27:08

1 Applying Agile in the DoD: Sixth Principle 15:00

1 Using Quality Attributes to Improve Acquisition 18:24

1 Best Practices for Trust in the Wireless Emergency Alerts Service 21:58

1 Three Variations on the V Model for System and Software Testing 21:25

1 Adapting the PSP to Incorporate Verified Design by Contract 17:44

1 Comparing IT Risk Assessment and Analysis Methods 37:27



1 Security Pattern Assurance through Roundtrip Engineering 16:00

1 The Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) 28:50

1 Applying Agile in the DoD: Fifth Principle 20:53


1 Raising the Bar - Mainstreaming CERT C Secure Coding Rules 25:17


1 From Process to Performance-Based Improvement 23:49

1 An Approach to Managing the Software Engineering Challenges of Big Data 20:07

1 Using the Cyber Resilience Review to Help Critical Infrastructures Better Manage Operational Resilience 27:46


1 Applying Agile in the DoD: Fourth Principle 18:19

1 Architecting Systems of the Future 12:44



1 Mobile Applications for Emergency Managers 10:15

1 Why Use Maturity Models to Improve Cybersecurity: Key Concepts, Principles, and Definitions 32:55

1 Applying Agile in the DoD: Third Principle 16:16

1 DevOps - Transform Development and Operations for Fast, Secure Deployments 33:44

1 Application Virtualization as a Strategy for Cyber Foraging 21:28

1 Common Testing Problems: Pitfalls to Prevent and Mitigate 16:45

1 Joint Programs and Social Dilemmas 13:19

1 Applying Agile in the DoD: Second Principle 12:33

1 Managing Disruptive Events - CERT-RMM Experience Reports 36:26

1 Reliability Validation and Improvement Framework 13:45

1 The Business Case for Systems Engineering 25:18

1 Using a Malware Ontology to Make Progress Towards a Science of Cybersecurity 21:24

1 Applying Agile in the DoD: First Principle 18:36

1 The Evolution of a Science Project 19:47

1 Securing Mobile Devices aka BYOD 24:06

1 What's New With Version 2 of the AADL Standard? 13:33

1 The State of the Practice of Cyber Intelligence 17:29

1 Mitigating Insider Threat - New and Improved Practices Fourth Edition 35:15

1 Technology Readiness Assessments 15:47


1 Managing Disruptive Events: Demand for an Integrated Approach to Better Manage Risk 26:45



1 Software for Soldiers who use Smartphones 16:57

1 Managing Disruptive Events: Making the Case for Operational Resilience 24:26


1 Quantifying Uncertainty in Early Lifecycle Cost Estimation 10:05

1 Using Network Flow Data to Profile Your Network and Reduce Vulnerabilities 28:55

1 Architecting a Financial System with TSP 28:27


1 How to More Effectively Manage Vulnerabilities and the Attacks that Exploit Them 37:39


1 An Architecture-Focused Measurement Framework for Managing Technical Debt 15:49


1 How a Disciplined Process Enhances & Enables Agility 21:04

1 U.S. Postal Inspection Service Use of the CERT Resilience Management Model 23:53

1 Insights from the First CERT Resilience Management Model Users Group 26:36

1 NIST Catalog of Security and Privacy Controls, Including Insider Threat 28:10

1 Cisco's Adoption of CERT Secure Coding Standards 24:41


1 Considering Security and Privacy in the Move to Electronic Health Records 28:27

1 Measuring Operational Resilience 25:32

1 Why Organizations Need a Secure Domain Name System 20:51

1 Controls for Monitoring the Security of Cloud Services 19:19

1 Building a Malware Analysis Capability 24:47

1 Using the Smart Grid Maturity Model (SGMM) 29:41

1 Integrated, Enterprise-Wide Risk Management: NIST 800-39 and CERT-RMM 28:06


1 Indicators and Controls for Mitigating Insider Threat 23:26

1 How Resilient Is My Organization? 39:02

1 Public-Private Partnerships: Essential for National Cyber Security 31:24

1 Software Assurance: A Master's Level Curriculum 34:37

1 How to Develop More Secure Software - Practices from Thirty Organizations 29:27

1 Mobile Device Security: Threats, Risks, and Actions to Take 26:15

1 Establishing a National Computer Security Incident Response Team (CSIRT) 27:56

1 Securing Industrial Control Systems 23:09

1 The Power of Fuzz Testing to Reduce Security Vulnerabilities 26:02

1 Protect Your Business from Money Mules 19:02


1 The Role of the CISO in Developing More Secure Software 26:56

1 Computer and Network Forensics: A Master's Level Curriculum 24:46

1 Introducing the Smart Grid Maturity Model (SGMM) 25:56

1 Leveraging Security Policies and Procedures for Electronic Evidence Discovery 25:45

1 Integrating Privacy Practices into the Software Development Life Cycle 17:28

1 Using the Facts to Protect Enterprise Networks: CERT's NetSA Team 22:01

1 Ensuring Continuity of Operations When Business Is Disrupted 21:23

1 Managing Relationships with Business Partners to Achieve Operational Resiliency 27:08

1 The Smart Grid: Managing Electrical Power Distribution and Use 20:16

1 Electronic Health Records: Challenges for Patient Privacy and Security 26:02

1 Mitigating Insider Threat: New and Improved Practices 36:22


1 The Upside and Downside of Security in the Cloud 27:41

1 More Targeted, Sophisticated Attacks: Where to Pay Attention 20:05

1 Is There Value in Identifying Software Security "Never Events?" 20:22

1 Cyber Security, Safety, and Ethics for the Net Generation 20:14

1 An Experience-Based Maturity Model for Software Security 21:49

1 Mainstreaming Secure Coding Practices 20:03

1 Security: A Key Enabler of Business Innovation 23:54

1 Better Incident Response Through Scenario Based Training 22:56

1 An Alternative to Risk Management for Information and Software Security 25:53

1 Tackling Tough Challenges: Insights from CERT’s Director Rich Pethia 17:33

1 Climate Change: Implications for Information Technology and Security 23:45

1 Using High Fidelity, Online Training to Stay Sharp 26:38

1 Integrating Security Incident Response and e-Discovery 25:34

1 Concrete Steps for Implementing an Information Security Program 21:29

1 Virtual Communities: Risks and Opportunities 18:06

1 Developing Secure Software: Universities as Supply Chain Partners 23:22

1 Security Risk Assessment Using OCTAVE Allegro 18:10

1 Getting to a Useful Set of Security Metrics 18:49

1 How to Start a Secure Software Development Program 20:01

1 Managing Risk to Critical Infrastructures at the National Level 22:13

1 Analyzing Internet Traffic for Better Cyber Situational Awareness 29:34

1 Managing Security Vulnerabilities Based on What Matters Most 23:28

1 Identifying Software Security Requirements Early, Not After the Fact 22:57

1 Making Information Security Policy Happen 24:18

1 Becoming a Smart Buyer of Software 21:11


1 Connecting the Dots Between IT Operations and Security 24:40

1 Getting in Front of Social Engineering 23:56

1 Using Benchmarks to Make Better Security Decisions 20:07

1 Protecting Information Privacy - How To and Lessons Learned 22:12

1 Initiating a Security Metrics Program: Key Points to Consider 12:05

1 Insider Threat and the Software Development Life Cycle 23:33

1 Tackling the Growing Botnet Threat 20:34

1 Building a Security Metrics Program 22:34

1 Inadvertent Data Disclosure on Peer-to-Peer Networks 20:14

1 Information Compliance: A Growing Challenge for Business Leaders 21:54

1 Internal Audit's Role in Information Security: An Introduction 14:26

1 What Business Leaders Can Expect from Security Degree Programs 18:30

1 The Path from Information Security Risk Assessment to Compliance 26:18

1 Computer Forensics for Business Leaders: Building Robust Policies and Processes 12:22

1 Business Resilience: A More Compelling Argument for Information Security 24:34

1 Resiliency Engineering: Integrating Security, IT Operations, and Business Continuity 18:24

1 The Human Side of Security Trade-Offs 27:15

1 Dual Perspectives: A CIO's and CISO's Take on Security 26:21

1 Reducing Security Costs with Standard Configurations: U.S. Government Initiatives 25:09

1 Tackling Security at the National Level: A Resource for Leaders 22:19

1 Evolving Business Models, Threats, and Technologies: A Conversation with CERT's Deputy Director for Technology 21:40


1 Protecting Against Insider Threat 27:09

1 Change Management: The Security 'X' Factor 18:38

1 CERT Lessons Learned: A Conversation with Rich Pethia, Director of CERT 23:35

1 Proactive Remedies for Rising Threats 19:36

1 Why Leaders Should Care About Security 17:53



1 Real-World Security for Business Leaders 20:27

1 Using Standards to Build an Information Security Program 27:52

1 Getting Real About Security Governance 19:24

1 Convergence: Integrating Physical and IT Security 28:44

1 IT Infrastructure: Tips for Navigating Tough Spots 22:34

1 The Value of De-Identified Personal Data 31:25

1 Adapting to Changing Risk Environments: Operational Resilience 24:45

1 Computer Forensics for Business Leaders: A Primer 16:32

1 The Real Secrets of Incident Management 21:17

1 The Legal Side of Global Security 25:56

1 A New Look at the Business of IT Education 17:52

1 Crisis Communications During a Security Incident 13:42

1 Assuring Mission Success in Complex Environments 17:49


1 Building Staff Competence in Security 21:56
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.