{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"Establishing your Information Security Program - Part 2","description":"This is the continuation of our podcast from last week with Phil Beyer.\r\nWe started out talking about risk registers, and we end the podcast with a little Q&amp;amp;A about positions in companies (Chief Risk Officer, Chief Data Protection Officer), and whether these positions are useful.\r\n&amp;nbsp;\r\n&amp;nbsp;Risk registers - http:\/\/en.wikipedia.org\/wiki\/Risk_register\r\n&amp;nbsp;\r\nIntro &quot;Private Eye&quot;, transition &quot;Mining by Moonlight&quot;, and Outro &quot;Honeybee&quot; created by Kevin MacLeod (incompetech.com)&amp;nbsp;Licensed under Creative Commons: By Attribution 3.0http:\/\/creativecommons.org\/licenses\/by\/3.0\/","author_name":"BrakeSec Education Podcast","author_url":"https:\/\/www.youtube.com\/c\/BDSPodcast","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/2930497\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/content\/7357753"}