Media:
English
Navigation:
English
Please enter your search term
Sign In
Queue
Favorites
Cloud TV
FreeAir.tv Channels
My Library
A-la-carte Subscriptions
History
My Account
My Devices
Earn Cash
Help
"It's all about the story" Stand Up Comedian Tom Shillue, (from the standup TV special Comedy Central Presents: Tom Shillue), lives up to his reputation as New York's best comic storyteller with these largely improvised monologues. These stories were performed in front of a live audience in NYC.
- Tom Shillue Live Comedy Podcast -
A podcast all about Japanese cartoons and comics as discussed by three self-proclaimed experts in the world of anime and manga! Plus anime news / reviews, coverage of classic anime, hentai / yaoi, and much, much more. Updated every week. We hope.
Anime World Order Podcast
This is the Nosheteria, kind of like a cafeteria, where bites on food are served up to you like little morsels of goodness. Here you'll get a little bit of everything, the occasional recipe, the amusing observation, and the always entertaining story about my life (you're expected to care) in food. Haute cuisine for the masses!
Nosheteria Podcast
This is a companion podcast to the popular weblog Stock Picks Bob's Advice. Bob is an amateur investor who has 42 years of investing experience and shares with his audience some of his current picks and his actual trading portfolio on his weblog of the same name. New to podcasting, Bob has been blogging about stocks for over 6 years on his website and is enthusiastic about sharing a simple approach to understanding the complex world of stocks.
Stock Picks Bob's Advice
A candid discussion of guitarists, guitars and the guitar community.
Six String Bliss
Hear live recordings of the songs from the Tony-nominated composer's new songbook.
The Jeff Blumenkrantz Songbook Podcast
The PSN Podcast is dedicated to both the amateur and professional recording musician. It features news, talk, interviews and reviews on all topics related to the performing and recording of audio and video.
Join us every week for interesting insights, tips and tricks from inside the music business. The show is highly interactive and we encourage you to e-mail us with what you'd like to see on the show or questions you'd like us to answer.
Would you like to be a guest? Would you like us to play a cut from your latest project? Drop us a line and let us know why our listeners would like to hear what you have to say or play!
http://ProjectStudioNetwork.com
E-mail: hosts@ProjectStudioNetwork.com
Phone: (928) 395-1343
Project Studio Network Recording Podcast
Memo from users: educate, but don’t embarrass us
Training
USA
Investing & Finance
About
Discover in
Share
Playing on
The moment we judge someone, we forfeit the ability to help. Seems like a lot of what is being promulgated in so-called “security awareness” today is nothing short of berating people with a list of the things they shouldn’t do, coupled with a non-intuitive list of what they should do. I read a lot of [...]
Related posts:
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 10 (Reducing the Cost of Compliance)
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
0 views
العربية (المملكة العربية السعودية) \ North America \ USA
العربية (المملكة العربية السعودية) \ Audio Books \ Bussines \ Investing & Finance
العربية (المملكة العربية السعودية) \ Video \ Training
Direct link
Playing on all devices
Most Popular
Newer Episodes
Older Episodes
Most Popular
Most Recent
Most Viewed
The Security Catalyst
In the previous segments, we focused on special-case transfers that may be hard to recognize. At the macro level, when a user transfers between HR systems, a legitimate transfer can be mistaken for a termination, leading to poor customer service (and the trouble that ensues). At the micro level, when a user transfers within a [...]
Related posts:Identity Management Series – Termination and Transfer Gotchas Part 2: Transfers Within a Department
Identity Management Series – Termination and Transfer Gotchas Part 1: Transfers and Multiple HR Systems
Identity Management Series – HR as a Source of Record Part 4: Terminations
Identity Management Series – Termination and Transfer Gotchas Part 3: Terminating Employment vs. Terminating Access
In the first segment, we looked at one extreme of transfers – a job change entailing a move between HR systems. In this segment, we’ll look at the other extreme of transfers – a job change that may fall under the HR radar. When we talked about the implications of HR as a source of [...]
Related posts:Identity Management Series – HR as a Source of Record Part 3: Transfers
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 2: Identifying & Prioritizing Enterprise Roles
Identity Management Series – Termination and Transfer Gotchas Part 2: Transfers Within a Department
In the previous series, we started prepping for the key workflows that make an IAM implementation worth the cost and effort. Implementing workflows effectively is critical to achieving the desired value in terms of time savings and effort/cost reductions. It also gets the organization excited about IAM and makes them willing to keep maturing the [...]
Related posts:Identity Management Series – HR as a Source of Record Part 3: Transfers
Identity Management Series – HR as a Source of Record Part 1: Overview and Approach
Identity Management Series – HR as a Source of Record Part 4: Terminations
Identity Management Series – Termination and Transfer Gotchas Part 1: Transfers and Multiple HR Systems
Faced with the choice between changing one’s mind and proving that there is no need to do so, almost everyone gets busy on the proof. ~John Kenneth Galbraith We set out in January to live and explore full time in an RV. We challenged ourselves; we challenged our notions of nearly everything about modern life [...]
Related posts:Why people are not the problem and where to look (hint: grab a mirror)
Why the definition of awareness matters
How can The Catalyst Method™ benefit your efforts?
The wheels are turning… you ready to roll with the catalyst?
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
Identity Management Series – Workflows Part 5: Wrapping Up
This month, we focused on one of the key functionalities of identity management – workflows. Specifically, Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User and access recertification These workflows build on each other – it’s necessary to identify how access is de/provisioned before any recertification can be set up, because ultimately once [...]
Related posts:Vacancy Management and Hierarchies Part 5: Wrapping Up
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 5: Reliability and Accessibility
Identity Management Series – Workflows Part 5: Wrapping Up
In the previous segment, we worked through the non-employee management workflows. These are a special-case of user recertification and relatively less complex, making them a good place to start. Having built some experience and achieved a quick-win, we’ll now move on to discuss the full user and access recertification workflows. This has become a key [...]
Related posts:Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 4: User/access recertification
In the previous segment, we worked through the non-employee management workflows. These are a special-case of user recertification and relatively less complex, making them a good place to start. Having built some experience and achieved a quick-win, we’ll now move on to discuss the full user and access recertification workflows. This has become a key [...]
Related posts:Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 4: Documentation and Approval
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 4: User/access recertification
In the previous segment, we worked through the de/provisioning workflows. These are foundational to the non-employee management workflows in that a key objective of the non-employee management workflows is to terminate access when the non-employee departs. Without the de/provisioning workflows to trigger manual or automated tasks for access removal, the timely knowledge of a non-employee’s [...]
Related posts:Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
Identity Management Series – Workflows Part 1: Introduction
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 3: Non-Employee Management
In the previous segment, we worked through the de/provisioning workflows. These are foundational to the non-employee management workflows in that a key objective of the non-employee management workflows is to terminate access when the non-employee departs. Without the de/provisioning workflows to trigger manual or automated tasks for access removal, the timely knowledge of a non-employee’s [...]
Related posts:Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
Identity Management Series – Workflows Part 1: Introduction
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Workflows Part 3: Non-Employee Management
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This segment explores the first of these, de/provisioning) De/provisioning is the most common of IAM workflows. Done right, this workflow delivers tremendous ROI, improved audit results and improved customer satisfaction by significantly [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Role- and Rule-Basing Part 3: Designing and Testing IT Roles
Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
In this month’s Introduction, three workflow sets were introduced: Provisioning and deprovisioning (which I abbreviate as de/provisioning) Non-employee management User or access recertification This segment explores the first of these, de/provisioning) De/provisioning is the most common of IAM workflows. Done right, this workflow delivers tremendous ROI, improved audit results and improved customer satisfaction by significantly [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Role- and Rule-Basing Part 3: Designing and Testing IT Roles
Identity Management Series – Workflows Part 2: Provisioning and Deprovisioning
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins, which give credence to the IAM program. Since a full IAM implementation is typically a multi-year process, being able to point to tangible benefits along the way (other than, “hey – check [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Workflows Part 1: Introduction
We started developing workflows in last month’s activity to manage vacancies. Relatively speaking, vacancy management workflows are comparatively simple and provide business-relevant quick-wins, which give credence to the IAM program. Since a full IAM implementation is typically a multi-year process, being able to point to tangible benefits along the way (other than, “hey – check [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Identity Management Series – Role- and Rule-Basing Part 1: Introduction
Identity Management Series – HR as a Source of Record Part 2: New Hires
Identity Management Series – Workflows Part 1: Introduction
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
What a shopping carts reveals about awareness
What can grocery-shopping carts teach us about building awareness and influencing behavior change? Turns out perhaps more than imagined. During a recent hotel stay, I took a trip to a local grocery store to buy some snacks. I pulled into the lot, parked and headed to the store. Since I only needed a few items, [...]
Related posts:Why the definition of awareness matters
RV Adventure inspired Awareness that Works™
Into the Breach – Audio Series – Chapter 9 (Extending the Conversation: Rewards Beyond Protecting Information)
What a shopping carts reveals about awareness
This month we focused on vacancy management, shifting from the functions of identity manager to role manager. Vacancy management is difficult to control manually – in many cases an approval or ownership function is a minor part of someone’s job, so the task of finding a replacement when there is a transfer or termination often [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Vacancy Management and Hierarchies Part 5: Wrapping Up
This month we focused on vacancy management, shifting from the functions of identity manager to role manager. Vacancy management is difficult to control manually – in many cases an approval or ownership function is a minor part of someone’s job, so the task of finding a replacement when there is a transfer or termination often [...]
Related posts:Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Vacancy Management and Hierarchies Part 5: Wrapping Up
I once talked to a finance manager and asked her why her group couldn’t produce an accurate list of cost center owners. Her response was simple, “I would love to have an updated list, but no one ever tells me when there’s a change, so I have no way of maintaining a list.” As with [...]
Related posts:Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 2: Line Management Hierarchy
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
I once talked to a finance manager and asked her why her group couldn’t produce an accurate list of cost center owners. Her response was simple, “I would love to have an updated list, but no one ever tells me when there’s a change, so I have no way of maintaining a list.” As with [...]
Related posts:Vacancy Management and Hierarchies Part 3: Data/Access Ownership
Identity Management Series – Vacancy Management and Hierarchies Part 1: Introduction
Vacancy Management and Hierarchies Part 2: Line Management Hierarchy
Vacancy Management and Hierarchies Part 4: Cost Center Ownership
In Chapter 6 of Into the Breach (click here to listen to the audio book version of the chapter), I shared a method I use to effectively assess people, information and risk – in their own context and with a personal connection. That success led to the creation of The Catalyst Method™ — a powerful [...]
Related posts:Into the Breach – Audio Series – Chapter 7 (Putting the Strategy to Work: A Pilot)
Into the Breach – Audio Series – Chapter 8 (Measuring Success)
How can The Catalyst Method™ benefit your efforts?
1
2
3
4
5
6
Next
Total 113
Show More
The Security Catalyst
8/3/2010
Feedback
please wait...