show episodes
 
Artwork

1
Watermark Audio: Recovery Channel

Watermark Community Church, Dallas, TX

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
This podcast is a production of Watermark Community Church in Dallas, Texas, USA. Watermark exists to be and make more fully devoted followers of Christ, looking to God's Word as our only authority, conscience and guide.
  continue reading
 
Artwork

1
NCE Study Guide

Glenn Ostlund

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to the NCE National Counselor Exam Study Guide, your go-to resource for preparing to ace the National Counselor Exam. This podcast features a comprehensive collection of mock multiple-choice questions, delivered in a conversational, engaging format designed to reinforce your understanding of key counseling concepts. Whether you’re reviewing on the go or brushing up on specific topics, this study guide simplifies complex material into easy-to-digest episodes. Created in collaboration ...
  continue reading
 
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
  continue reading
 
Artwork

1
Krewe of Japan

Japan Society of New Orleans

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Krewe of Japan is a weekly podcast that takes listeners on audio journeys through Japanese culture. With our hosts as your guide, and the help of guest experts, Japanese natives, and ex-pats, understanding Japan is now easier than ever before.
  continue reading
 
Welcome to Study Sounds – The Ultimate Soundtrack for Focus, Productivity, and Calm Struggling to stay focused? Distracted by noise? Searching for the perfect background sound to elevate your concentration and motivation? You just found it. Study Sounds is the podcast designed to be your personal companion during deep work, study sessions, reading time, and any task that requires sustained mental clarity and calm. Whether you’re a student preparing for finals, a remote worker powering throug ...
  continue reading
 
Artwork

1
Lights In

Glenn Ostlund

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Lights In is a meditative exploration of consciousness inspired by Annaka Harris’s Lights On audio documentary. Hosted by therapist and folklorist Glenn Ostlund, each episode blends guided meditation, sound healing, and reflective commentary to invite listeners into a direct felt experience of the mystery of awareness. With binaural beats, Solfeggio frequencies, and golden ratio rhythms, Lights In is both a study guide and an inner journey—designed to soothe the nervous system, deepen insigh ...
  continue reading
 
Artwork

1
khōréō magazine

khōréō magazine, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
khōréō is a quarterly magazine of speculative fiction and migration. We publish fiction, non-fiction, and art by immigrant and diaspora authors and artists. Winner of the 2022 Ignyte Award for Best Fiction Podcast.
  continue reading
 
Awin-Win Marketing Podcast takes you behind the scenes of the most innovative and interesting affiliate marketing partnerships. Brought to you by global affiliate platform Awin, each episode is an audio case study that reveals how the channel actually works and illustrates why every affiliate partnership offers a win-win (yes, pun intended). Awin-Win Marketing Podcast introduces you to the people behind affiliate campaigns. Meet the CEOs, founders, entrepreneurs and marketing managers that m ...
  continue reading
 
Artwork

1
Lofi Sounds, LoFi Hip Hop, Chillhop, Study Beats, Chill Beats

Lofi Sounds, LoFi Hip Hop, Chillhop, Study Beats, Chill Beats

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Welcome to Lofi Sounds – Your Escape Into Chill, Focus, and Flow Need a mental break? Searching for calm beats to focus, study, work, or unwind? You just found the perfect podcast. Lofi Sounds is your daily companion for peaceful concentration, stress-free vibes, and mellow motivation. Whether you're burning the midnight oil or relaxing with a cup of tea, Lofi Sounds delivers handpicked soundscapes that blend lo-fi beats, ambient textures, and soulful loops designed to help you flow. Each ep ...
  continue reading
 
Artwork

1
Cochlea

Newton's Dark Room

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Learn about sound in a new non-fiction series from Newton's Dark Room. Talon Stradley is a recording arts student at CSUDH. They say the best way to learn is to teach, so Talon started this show as an audio study guide. You'll hear about the wonderful world of sound and Talon will be studying all of these concepts so he can pass his classes!
  continue reading
 
Artwork

1
Study With C. Martin

Chanda Martin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Study with CMartin podcast is the audio companion to the Bible study course entitled, "Study", by Chanda Martin, helping you to understand spiritual law, spiritual authority, and man's dominion so you can have God's power at work in your daily life. Get the FREE Study online course at www.StudyWithCMartin.com. Follow us: Facebook & Instagram @StudyWithCMartin Twitter: @StudyWithCMart #Christian #BibleStudy #spiritualauthority #free #freeBiblestudy #onlineBiblestudy #encouraging #inspirat ...
  continue reading
 
Artwork
 
Dive into the world of 'Relaxing Sounds Podcast' – your sanctuary for deep sleep, meditation, and focus. Immerse yourself in our curated collection of nature sounds and ambient soothing soundscapes, perfect for ASMR enthusiasts, tinnitus relief, yoga sessions, and study concentration. Scientifically proven to enhance relaxation and mindfulness, our audio experiences are designed to wash away daily stress, transporting you to a realm of tranquility. Whether you're winding down, meditating, or ...
  continue reading
 
Artwork

1
Ambient Sounds

Ambient Sounds

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Ambient Sounds, your ultimate escape into a world of tranquility, relaxation, and focus. At Ambient Sounds, we craft immersive soundscapes designed to soothe your mind, enhance concentration, and create a peaceful atmosphere. Our carefully curated episodes feature calming nature sounds, gentle white noise, and serene ambient tones to help you unwind, sleep better, and stay focused throughout your day. Whether you’re meditating, studying, or simply seeking a moment of peace, Ambien ...
  continue reading
 
Artwork

1
Mpower Gas Course

Mpower Training Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
A student friendly audio course guide covering all areas of the Level 3 NVQ gas course studied at MPower Training Solutions. Each episode covers a mandatory unit or topic and is designed to explain the principles and methods necessary for you to be successful. There are lectures, professional discussions and role-playing scenarios for you to use as study resources. Each episode displays a QR code which is linked to an important picture, document or lecture. Just use the QR code reader on you ...
  continue reading
 
The intention of this work is to provide a sketch of the History of the Church in the first six centuries of its existence, resting throughout on original authorities, and also giving references to the principal modern works which have dealt specially with its several portions. It is hoped that it may be found to supply a convenient summary for those who can give but little time to the study, and also to serve as a guide for those who desire to make themselves acquainted with the principal d ...
  continue reading
 
️ Welcome to Rain Sounds – Your Personal Escape into Calm, Sleep, and Serenity ️ Are you searching for the perfect sound to help you relax, fall asleep, concentrate, or find peace in the middle of a busy day? Rain Sounds is the podcast that transforms your space with the gentle, soothing sound of rainfall—any time, anywhere. Whether you love the steady rhythm of a night storm, the calming drip of rain on a window, or the soft patter of distant thunder, Rain Sounds brings nature’s most peacef ...
  continue reading
 
Artwork

1
The Self-Recording Band

Benedikt Hain / Manel Espinosa Berenguer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Produce exciting sounding music yourself and release songs that you're proud of! Professional producers/mixers Benedikt Hain and Manel Espinosa Berenguer help you make your next DIY-recording session a success!
  continue reading
 
In 1992, Dr. Darius Shahrokh, a retired physician-surgeon, recorded some deepening talks upon the insistence of friends in his Bahá’í Community. Each program in this series is the result of months of study of resources in both English and Persian. Some consider Windows to the Past to be stories, but it should be remembered that the stories are not intended to be entertainment, but to inform, elucidate, and inspire the listener. The programs have relevant stories purposefully placed to lighte ...
  continue reading
 
Artwork

1
The VirtualPharm

Despina & Ethan at Enkrisi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The VirtualPharm Podcast is an audio series that covers topics related to compliance and regulatory affairs in the Lifesciences industry. Each episode, hosted by experts on the topic with decades of experience, offers listeners detailed insight into the changing regulatory environment. The podcast provides timely information about emerging regulations, legal updates, industry insights, and best practices for organizations. The episodes are informative and engaging, helping educate profession ...
  continue reading
 
Need help with a personal injury compensation claim in Western Australia? The WA Personal Injury Claims Explained by Foyle Legal podcast offers expert advice and tips on how to claim compensation for motor vehicle accidents, workplace injuries, and more. Whether you've been in a car accident or suffered an injury at work, our podcast provides clear, actionable steps to help you navigate the legal process. Every week, we break down essential topics in WA personal injury law, including: Motor ...
  continue reading
 
The Audiobook Reviews in Five Minutes podcast has already explored some of the best popular nonfiction in over 100 episodes. Hosted by Janna, we review writing style, narration, production, and the overall listening experience. We're passionate about audiobooks because they offer a unique and immersive way to experience stories and ideas. From the subtle nuances of a narrator's voice to the production values that bring ideas and concepts to life, there's so much to appreciate about a well-cr ...
  continue reading
 
Loading …
show series
 
Welcome to Send Me to Sleep, your ultimate destination for deep sleep and nighttime relaxation. Hosted by Send Me to Sleep, this podcast is designed to help you unwind, relax, and drift effortlessly into a restful sleep. Whether you're battling insomnia, dealing with stress, or just need a tranquil moment, Send Me to Sleep is here to guide you. Eac…
  continue reading
 
In Part 2 of our Japanese soccer series, journalist Dan Orlowitz returns to help us explore how Japan’s soccer scene is making waves across the globe! We dive into Samurai Blue’s international success, Japanese players shining abroad, and the flow of global talent into the J.League. Plus — how can fans outside Japan actually watch the matches? We’v…
  continue reading
 
We close out with Awin CEO Adam Ross and CCO David Lloyd on the past, present and future of affiliate marketing. Visit awin.com/podcasts for additional details. Ways to listen to Awin-Win Marketing Podcast 👇 Website: https://awin.link/arolxk Spotify: https://awin.link/jb3np6 Apple: https://awin.link/7q37co Pocket Casts: https://awin.link/3sw3yu…
  continue reading
 
Send us a text Your next step: Apply for coaching! theselfrecordingband.com Our coaching community, The Self-Recording Syndicate, is the number one way for DIY producers around the world to get results that they'll be proud of forever. You have two options to get there: Apply for unlimited, personal 1-on-1 mentoring (results guaranteed) - This is b…
  continue reading
 
Dr. Karen Nelson-Field and Rory Sutherland unpack how attention, emotion and behavior shape better strategy. Visit awin.com/podcasts for additional details. Ways to listen to Awin-Win Marketing Podcast 👇 Website: https://awin.link/arolxk Spotify: https://awin.link/jb3np6 Apple: https://awin.link/7q37co Pocket Casts: https://awin.link/3sw3yu…
  continue reading
 
The Full Library Is Live + New Study Group Details! In this episode, Glenn announces the long-awaited completion of the NCE Study Guide Patreon Library—91 audio-based study modules now fully organized by CACREP content areas and exam domains. You’ll learn: How the modules are structured into accessible collections What’s available for free on Patre…
  continue reading
 
An imprisoned god is bound to the trees of an ancient swamp, until one day someone comes looking. Content warnings: Violence, body horror Copyright khōréō magazine 2025. Story by Natasha King, edited by Zhui Ning Chang. Audio edition read by Suzie Rai and produced by Lian Xia Rose, with casting by Jenelle DeCosta. Visit khoreomag.com and follow us …
  continue reading
 
Scott Galloway and Lily Ray joined us post-keynote to break down what AI means for marketing, media and beyond. Visit awin.com/podcasts for additional details. Ways to listen to Awin-Win Marketing Podcast 👇 Website: https://awin.link/arolxk Spotify: https://awin.link/jb3np6 Apple: https://awin.link/7q37co Pocket Casts: https://awin.link/3sw3yu…
  continue reading
 
Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss…
  continue reading
 
A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing…
  continue reading
 
Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections…
  continue reading
 
Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. W…
  continue reading
 
Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also co…
  continue reading
 
Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how …
  continue reading
 
Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engin…
  continue reading
 
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce tra…
  continue reading
 
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS da…
  continue reading
 
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
  continue reading
 
Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated i…
  continue reading
 
External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, P…
  continue reading
 
The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committee…
  continue reading
 
Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system c…
  continue reading
 
Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is …
  continue reading
 
Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data co…
  continue reading
 
Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss re…
  continue reading
 
Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and…
  continue reading
 
Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acce…
  continue reading
 
Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—including fines, sanctions, lawsuits, contract termination, and loss of certifications or business licenses. We examine examples where organizations were pe…
  continue reading
 
Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in this episode, we explore how to make it both accurate and efficient. We cover internal reporting practices, such as monthly compliance dashboards and policy enforcement summaries, as well as external repo…
  continue reading
 
Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and accountability. In this episode, we explore how organizations track vendor performance through periodic assessments, SLA reviews, compliance reports, and security questionnaires. We highlight how to use co…
  continue reading
 
Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that define roles, responsibilities, and expectations with external parties. We cover Service-Level Agreements (SLAs), which outline performance and availability targets; Memorandums of Understanding (MOUs) …
  continue reading
 
A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and off…
  continue reading
 
System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how systems behave under failure: Mean Time to Repair (MTTR), Mean Time Between Failures (MTBF), Mean Time to Detect (MTTD), and Mean Time to Respond (MTTR—the other one). MTTR (repair) reflects how long it takes…
  continue reading
 
Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore two of the most critical metrics: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO sets the maximum allowable downtime before business operations suffer unacceptable consequences, wh…
  continue reading
 
Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which processes matter most and how downtime affects operations. In this episode, we break down how BIAs identify critical systems, estimate recovery time objectives (RTOs) and recovery point objectives (RPOs), an…
  continue reading
 
Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical findings and business leadership. We explore how to craft reports that align with the audience: dashboards and trend lines for executives, technical remediation plans for IT, and regulatory compliance summar…
  continue reading
 
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring r…
  continue reading
 
Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, policy, and control. In this episode, we break down the concepts of risk appetite (what you’re willing to pursue), risk tolerance (what you’re willing to withstand), and risk thresholds (the hard lines th…
  continue reading
 
Managing risk at scale requires tools that provide structure and visibility, and in this episode, we examine two of the most important: risk registers and key risk indicators (KRIs). A risk register is a living document that catalogs identified risks, their likelihood, potential impact, status, ownership, and mitigation plans. It enables organizati…
  continue reading
 
After risks are identified, they need to be analyzed and prioritized—and that’s where risk scoring comes in. In this episode, we break down both qualitative methods (like high/medium/low ratings and heat maps) and quantitative techniques (like Single Loss Expectancy, Annualized Loss Expectancy, and Annualized Rate of Occurrence). We explain how the…
  continue reading
 
Risk assessments provide the data organizations need to make informed security decisions, and in this episode, we explore the different types of assessments and how they’re conducted. We start by comparing ad hoc, recurring, one-time, and continuous assessments, each of which serves different operational or compliance needs. We explain how to scope…
  continue reading
 
Risk management is the engine that drives strategic decision-making in security, helping organizations focus their efforts on what matters most. In this episode, we explain how to identify risks, evaluate their likelihood and impact, and decide whether to accept, avoid, mitigate, or transfer them. We cover key concepts like threat, vulnerability, a…
  continue reading
 
Having a governance structure is only the beginning—the real value comes from clearly defining roles and responsibilities within that structure. In this episode, we examine the key roles involved in managing data and systems securely, including data owners, custodians, stewards, processors, and controllers. Data owners are responsible for setting c…
  continue reading
 
Security governance relies on a clear structure that defines how decisions are made, who enforces them, and how oversight is maintained. In this episode, we explore governance structures such as boards, steering committees, and cross-functional security councils, each playing a role in shaping strategy, prioritizing risks, and allocating resources.…
  continue reading
 
Security policies must evolve with technology, threat landscapes, and business goals—and that’s why continuous monitoring and revision are essential. In this episode, we explore how organizations maintain governance effectiveness by regularly reviewing policies, tracking their implementation, and auditing their relevance. We cover methods like poli…
  continue reading
 
Security doesn't operate in a vacuum—organizations must navigate a complex web of external considerations that shape how security is governed. In this episode, we explore regulatory requirements (like GDPR, HIPAA, and PCI-DSS), industry standards, and legal obligations that influence security architecture, policies, and practices. We also cover how…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play