{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"Establishing your Information Security Program - Part 1","description":"Establishing an Information Security program can make or break an organization. So what do you need to get that started?&amp;nbsp;\r\nWe have friend of the show Phil Beyer come in and discuss with us the five steps of the creation of an Information Security Program.&amp;nbsp; Join us for Part 1, and next week, we'll finish up with a little Q&amp;amp;A, as well as what a 'risk register' is.\r\n&amp;nbsp;\r\n&amp;nbsp;\r\n&amp;nbsp;\r\n&amp;nbsp;\r\n&amp;nbsp;\r\n&amp;nbsp;\r\nIntro &quot;Private Eye&quot;, and Outro &quot;Honeybee&quot; created by Kevin MacLeod (incompetech.com)&amp;nbsp;Licensed under Creative Commons: By Attribution 3.0http:\/\/creativecommons.org\/licenses\/by\/3.0\/","author_name":"BrakeSec Education Podcast","author_url":"https:\/\/www.youtube.com\/c\/BDSPodcast","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/2916799\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/item\/2916799"}