The Bare Metal Cyber CRISC Prepcast is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
…
continue reading
Welcome to the St Louis Rodent Control Advice Pod! Join us as we tackle the unique challenges of rodent control in the Gateway City. Each episode brings you expert advice, actionable tips, and local insights to help homeowners and renters keep their properties rodent-free. Whether you’re dealing with mice, rats, or other pests, we provide the knowledge and solutions you need for a cleaner, healthier home. Tune in and take control of your space—St. Louis deserves to be pest-free!
…
continue reading
the home of online investigations
…
continue reading
Avoid service issues by staying on top of your mobile balance. This episode explores simple ways to manage credit and usage in Saudi Arabia. We explain how the Mobily Balance Check works using quick codes, SMS, and apps. Discover how to access your balance instantly and with ease. You’ll also learn how online portals and mobile apps simplify recharging. Stay connected and in control of your mobile account from anywhere.
…
continue reading
The Control Amplified Podcast offers in-depth interviews and discussions with industry experts about important topics in the process control and automation field, exploring underlying issues affecting users, system integrators, suppliers and others in these industries.
…
continue reading
Welcome to The Corpus Christi Rodent Control Show! Join us for expert advice on identifying, preventing, and eliminating rodent problems in the Coastal Bend area. Each episode is packed with practical tips, local pest control insights, and interviews with professionals who know what works in South Texas. Whether you’re a homeowner, renter, or business owner, tune in for the latest strategies to keep your property safe and rodent-free. Let’s make Corpus Christi a more comfortable place to liv ...
…
continue reading
Who reports the news? People. And at The Christian Science Monitor, we believe that it’s our job to report each story with a sense of shared humanity. Through conversations with our reporters and editors, we explain the qualities behind our reporting that affect how we approach the news. Behind today’s headlines we find respect, resilience, dignity, agency, and hope. “Why We Wrote This” shows how. The Monitor is an award-winning, nonpartisan news organization with bureaus around the globe. V ...
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and operational efficiency. Equipped with advanced sensors, TempGenius monitors critical metrics including temperature, humidity, air pressure, CO₂ leve ...
…
continue reading
For businesses relying on consistent temperature control, the Walk-In Temperature Monitor from TempGenius provides unmatched precision and reliability. Designed for environments like cold storage, food services, and healthcare facilities, this advanced system ensures accurate, real-time temperature monitoring. With automated alerts, easy data access, and cloud storage, TempGenius takes the stress out of maintaining regulatory compliance and protecting valuable inventory. The system's customi ...
…
continue reading
Experience the ultimate in temperature monitoring with the TempGenius Remote Temperature Probe. This advanced device is designed to provide you with accurate and real-time temperature readings, ensuring the safety and integrity of your valuable assets, whether it's in a medical facility, laboratory, food storage, or any other environment where temperature control is critical. Key Features: Precision Monitoring: The TempGenius Remote Temperature Probe offers unparalleled accuracy, allowing yo ...
…
continue reading
A typical plant is losing millions annually from poorly-performing control systems. Typically, 20-30% of controls are in manual mode. Up to 85% of control loops have sub-optimal settings. 20-40% of controllers are oscillating, adding to plant variability, and hurting reliability. With so many issues, it can be hard to monitor, prioritize, and resolve issues.
…
continue reading
Videos discussing contamination control in pharmaceutical and microelectronics/semiconductor manufacturing.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
If you're serious about monitoring your health, chances are you use a smartwatch or a blood pressure monitor. The good news is that the Aspedan app is designed to integrate with many smart health devices, helping you track your wellness more efficiently in one place. What Devices Work with the Aspedan App? The Aspedan app is built to connect with various Bluetooth-enabled health devices, including: Smartwatches (e.g., Fitbit, Apple Watch, Samsung Galaxy Watch) Blood pressure monitors Body co ...
…
continue reading
When accuracy and safety are non-negotiable, TempGenius delivers with its advanced temperature alarm systems. Trusted by healthcare, food service, laboratories, and industrial sectors across the U.S., TempGenius offers real-time monitoring solutions that alert you instantly to any temperature deviations. Whether you're safeguarding vaccines, sensitive inventory, or lab samples, their wireless temperature alarms help prevent costly spoilage, ensure regulatory compliance, and protect what matt ...
…
continue reading
When it comes to maintaining accurate temperature control in critical environments, TempGenius offers top-tier probe monitoring systems designed for reliability and efficiency. Whether you're in healthcare, food storage, pharmaceuticals, or industrial sectors, their advanced technology ensures real-time temperature tracking, preventing costly fluctuations and compliance issues. TempGenius probe monitoring solutions provide wireless connectivity, automated alerts, and data logging, giving bus ...
…
continue reading
Welcome to today’s episode, where we explore how temperature monitoring is transforming the dairy industry. Precise temperature control is vital from milking to storage, ensuring safety, freshness, and compliance. Enter TempGenius—a smart monitoring system offering real-time tracking, alerts, and automated logging. It helps dairy producers prevent spoilage, reduce waste, and maintain product quality. Whether you're running a small farm or a large dairy facility, TempGenius makes temperature ...
…
continue reading
TempGenius offers state-of-the-art temperature monitoring systems designed to meet the highest standards of safety and efficiency. Trusted by industries ranging from healthcare to food services, TempGenius provides robust, wireless solutions that ensure 24/7, real-time temperature tracking. These systems help maintain compliance with regulatory requirements, minimize risk, and protect valuable assets through automatic alerts and data logging. With user-friendly interfaces and customizable fe ...
…
continue reading
Music Industry veteran talking about anything and everything with incredible people - behind the scenes creating live events, concert and entertainment. Over 300 episodes, with memorable conversations and stories from many pioneers of the event and concert touring world, including hot new up and comers. Geezers Of Gear is never boring, offering great surprises as well. Plus, check out the NEW "Leading Ladies" episodes - that celebrate the incredible women of the concert business, with host ( ...
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Information and advice about your health and how it is affected by blood pressure. We explore ways to control high blood pressure with lifestyle and diets changes. Also we offer the latest up to date list of validated BP Monitors approved for accuracy by BIHS https://blood-pressure-monitoring.org/monitors-bhs-approved/
…
continue reading
Welcome to your go-to source for understanding how government financial systems work — simplified for everyone! In this podcast, we explore topics like checking bill statuses, tracking advances and loans, understanding AGPR systems, and making sense of the PIFRA portal. Whether you’re a government employee trying to stay updated or just someone looking to better understand how public sector finances operate, this show is for you. Each episode offers clear explanations, step-by-step guides, a ...
…
continue reading

1
Effortless Wireless Temperature Logging with TempGenius for Reliable 24/7 Monitoring
freezer temperature monitoring
TempGenius offers a cutting-edge WiFi temperature logging solution designed to meet the demands of industries that require accurate, real-time monitoring. This advanced system provides wireless, automated data collection that eliminates the need for manual checks, helping businesses maintain compliance and protect valuable assets. Trusted by hospitals, laboratories, food services, and pharmaceutical companies, TempGenius delivers continuous logging and instant alerts to any connected device, ...
…
continue reading
Learn how to provide innovative, flexible, and powerful solutions for your customers using Shelly IoT products.
…
continue reading
Maintaining optimal humidity levels is critical for ensuring the quality and safety of sensitive environments, whether it's a storage facility, laboratory, or data center. TempGenius offers state-of-the-art humidity monitoring systems designed to provide real-time, accurate readings to prevent damaging fluctuations. With their user-friendly technology, you can easily track humidity levels remotely, receive instant alerts, and access comprehensive data reports to meet industry regulations. Te ...
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
The StrategyX platform provides the essential building blocks for your company’s success. Your complete strategy is on one page. The simple user interface will ensure you’re clear on your goals, your team is aligned, and you can measure, monitor, and manage the progress in real time. With your business operating structure in one place, you’ll feel comfortable and in control of achieving your business vision, mission, and goals.
…
continue reading
"Auto Care ON AIR" is a candid podcast dedicated to exploring the most relevant topics within the auto care industry. Each episode features insightful discussions with leading experts and prominent industry figures. Our content is thoughtfully divided into four distinct shows to cover four different categories of topics, ensuring collective professional growth and a comprehensive understanding of the auto care industry. The Driver's Seat: Navigating Business and the Journey of Leadership To ...
…
continue reading
Welcome to The Financially Healthy Business Podcast with Deb Halliday—Profit First Professional, founder of the award-winning accountancy practice The Accounts Ladies, and author of How to Build a Financially Healthy Business. This show is for business owners who are ready to stop winging it with their finances and start building a business that genuinely supports the life they want to live. Each episode follows a chapter of Deb’s book, guiding you through the step-by-step journey from finan ...
…
continue reading
If you're a busy, overweight & overworked entrepreneur, professional, business owner or consultant, this podcast is for you. Each episode gives you practical, time-efficient strategies to improve your health, fitness & lifestyle—without sacrificing your success. If stress, long hours and a growing waistline are dragging you down, you'll learn how to take back control, boost your energy & build sustainable habits that fit your busy life. Stay tuned for bonus episodes with special guests shari ...
…
continue reading
Featured here are original and timely podcasts from ARC analysts and guest speakers on topics such as Digitization, New Business Models, Internet of Things, Industry 4.0, and Smart Manufacturing. We dive into technologies such as additive manufacturing, machine learning, asset performance management, device connectivity, IIoT architecture, cybersecurity, augmented reality, and more related to digitalization and transformation of industries. For More Information Visit us at: https://www.arcwe ...
…
continue reading
This is a story about a machine. A big machine. A supercomputer the size and shape of an ancient pyramid. A device that runs the world from the secret recesses of the White House basement. A machine you never knew existed until now. A machine named “SIREN.” SIREN was built to monitor you and your data. It was programmed to identify and solve all of the problems plaguing America. It was made to control your mind, which it does very well, through a network of radio waves and cellphone signals. ...
…
continue reading
Insights into the latest clinical and research studies in orthopaedics. A podcast from JBJS, featuring Antonia Chen, MD, and Andrew Schoenfeld, MD
…
continue reading
This podcast is all about learning and sharing knowledge for PMI® - PMP® certification. We'll use simple language and day to day examples to focus on learning. It will take dedication and grit. HUSTLE! It's Grind season Homie. See you on the other side. All the best. PMI®, PMP®, CAPM®, PgMP®, PMBOK®; and the PMI®; Registered Education Provider logo are registered trademarks of the Project Management Institute, Inc
…
continue reading
Welcome to the GRCISO podcast, where Chief Information Security Officers (CISOs) gain indispensable insights into the dynamic world of Cyber Governance, Risk, and Compliance (GRC). Each episode delves into expert analysis and industry perspectives, designed to empower CISOs with the knowledge needed to make informed decisions in today’s complex cybersecurity landscape. Tune in for in-depth discussions, practical advice, and the latest trends to stay ahead in your role. Whether you’re a seaso ...
…
continue reading
What if technology could understand people in the same way that people understand one another? Tune in as Affectiva, the pioneer of Emotion AI, endeavors to humanize technology as a new Smart Eye Company. The Human-Centric AI podcast dissects how we can put the human before the artificial as AI manifests in our daily lives, with insights from the world’s top thinkers in automotive, market research, aviation, robotics, education, academia and beyond.
…
continue reading
TempGenius offers a state-of-the-art Wireless Monitoring System, providing businesses with seamless, real-time environmental tracking. Designed for industries requiring strict compliance—such as healthcare, food storage, and laboratories—this system ensures precise temperature, humidity, and other critical conditions are consistently monitored. With wireless connectivity, automated alerts, and cloud-based data storage, TempGenius empowers organizations to maintain regulatory standards effort ...
…
continue reading
The Dr. John Delony Show is a caller-driven show that gives you real talk on relationships and mental health challenges. We want to talk to you! To send us your questions, leave a voicemail at 844-693-3291 or email [email protected].
…
continue reading
The Tenacious Heart Podcast is hosted by Taylor Cox. Taylor is here to be YOUR life coach. Taylor will coach you on how to better manage your own mental health. If you're interested in mental health coping skills, emotion regulation, ADHD strategies, or want to hear about how Taylor parents two boys on the autism spectrum, then this is the place for you. All are welcome! New episodes every Wednesday.
…
continue reading
Have a drone question? We'll answer it. Welcome to "Your Drone Questions. Answered.", the podcast where we bring you the answers to your burning drone-related questions! Each episode, we take questions submitted by our audience and find industry experts to provide insightful and informative answers. Our interviews with these experts are typically 10-15 minutes long, making it easy to fit into your busy schedule. From flying techniques and gear to regulations and industry news, we cover it al ...
…
continue reading
Security Nation Podcast is hosted by ESA, and it brings the voice of the electronic security and life safety industry to you! Host Hannah Boone brings on security pros to discuss best practices, real-life experiences, industry forecasts, and more on this monthly podcast. It's the ever-present voice in an ever-changing industry.
…
continue reading
How does your body control your breathing unconsciously? This album explores this complex process in fascinating detail using a battery of detectors attached to human guinea-pigs to monitor their breathing, blood flow and heartbeats. How does an anxious mind affect this system during a stressful situation? Whether stress is physical or emotional, the ancient “fight or flight” response is triggered. Physiologically, this can lead to the stress-related diseases which are getting more common in ...
…
continue reading
The world of diabetes research and innovation is moving forward at a lightning pace. At Diabetes Technology Society (DTS) we recognize the need for a free and easily accessible resource that provides clinicians, researchers, innovators and people with diabetes with up-to-date and authoritative information on the latest developments in diabetes technology research and innovation. Diabetes Technology Report is a new podcast from DTS co-hosted by endocrinologists David Klonoff (UCSF), and David ...
…
continue reading
Join pest control veteran Steve Jarrett as he shares essential tips for effectively and safely deploying rodent traps in your Corpus Christi home. Learn expert techniques for optimal trap placement, choosing the right bait, and maintaining a monitoring schedule that maximizes capture success while keeping children and pets safe. Whether you’re deal…
…
continue reading
Join pest control veteran Colby Minto as he reveals the essential monitoring techniques St. Louis homeowners need to ensure their rodent treatments remain effective long-term. Learn the telltale signs of renewed rodent activity, discover exactly where and when to check for evidence of returning pests, and get expert guidance on documenting findings…
…
continue reading

1
Episode 51: Techniques for Control Monitoring and Continuous Improvement
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58Effective risk professionals don’t just implement controls—they monitor and refine them continuously. This episode explores how organizations use control monitoring techniques like metrics tracking, control self-assessments, and automated alerts to ensure effectiveness over time. You’ll also learn how continuous improvement cycles align with evolvi…
…
continue reading

1
Return to Ukraine’s Radio ROKS: Heavy metal (and hackers) for brothers in arms
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04Before the war, Serhii Zenin played Metallica and joked with listeners on Ukraine’s Radio ROKS. Now he wears fatigues. And the station? It's still playing heavy metal—but now it’s also broadcasting news, coordinating aid, and holding the line in its own way. We return to a story where the frontlines and the airwaves meet. Learn about your ad choice…
…
continue reading

1
adversary group naming (noun) [Word Notes]
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.By N2K Networks
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading

1
Goal Setting: From a Ninja Warrior and an Industry Legend
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05What separates those who achieve their goals from those who merely dream about them? In this illuminating conversation, Jacki Lutz brings together two remarkable individuals from vastly different worlds: Larry Pavey, former CEO of Federated Auto Parts Group, and Alex Weber, American Ninja Warrior competitor and host, to unpack the psychology and pr…
…
continue reading

1
CCT 260: CISSP Rapid Review Exam Prep - Domain 1 - Part I
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12Send us a text Ready to conquer CISSP Domain 1? This rapid review episode delivers essential knowledge on security and risk management fundamentals that form the cornerstone of information security practice. We begin with a timely discussion on preventing ransomware through exfiltration controls, noting the alarming shift where 90% of ransomware at…
…
continue reading

1
I Will Soon Be an Empty Nester (And I’m Dreading It)
54:48
54:48
Play later
Play later
Lists
Like
Liked
54:48On today’s episode, we hear about: · A mom struggling with the reality of becoming an empty nester soon · A wife wanting to let go of bitterness toward her husband · A woman wondering how to be a caregiver without feeling resentful Next Steps: 📞 Ask John a question! Call 844-693-3291 or send us a message. 📚 Building a Non-Anxious Life 📝 Anxiety Tes…
…
continue reading

1
Rik Stevens | Reality of Burnout in High-Stress Careers | Certain to Change | Fit For Life Podcast
43:27
43:27
Play later
Play later
Lists
Like
Liked
43:27In this episode of the Fit Life podcast, host Martin Sharp speaks with Rik Stevens, founder of Mentally Healthier, a former Met Police officer, and a British Army veteran turned mental wellness coach. Known as the “Calming Chaos Coach,” Rik brings 30+ years of high-pressure frontline experience to the table. Together, they discuss the cost of const…
…
continue reading

1
Episode 93: Evaluating Business Practices Alignment with Risk Management and Security Frameworks
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10Alignment is the final step toward risk maturity. In this capstone episode, we explore how to evaluate whether business practices support or undermine formal risk management and information security frameworks. You’ll learn how to detect misalignments, recommend improvements, and support compliance initiatives. This topic is a favorite for comprehe…
…
continue reading

1
Episode 92: Reporting Control Information and Supporting Risk-Based Decisions
9:46
9:46
Play later
Play later
Lists
Like
Liked
9:46Controls are only valuable if their performance is understood. This episode focuses on how to report control-related data—such as testing results, KCI trends, and implementation updates—to support decision-making. You’ll learn how to interpret control reporting in context and how it influences risk posture and treatment adjustments. Expect to apply…
…
continue reading

1
Episode 91: Reporting Risk Information to Stakeholders
9:46
9:46
Play later
Play later
Lists
Like
Liked
9:46Clear, timely risk reporting supports informed decision-making at every level. In this episode, we explain how to tailor risk reports for different audiences, from executive boards to process owners. You’ll learn best practices for content clarity, escalation protocols, and aligning reports with organizational priorities. These skills are often tes…
…
continue reading

1
Episode 90: Reviewing Control Assessments for Effectiveness and Maturity
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Mature organizations regularly review their control environment. In this episode, we cover how CRISC professionals assess whether controls are effective, scalable, and aligned with enterprise goals. You’ll learn about assessment techniques, maturity models, and reporting strategies. This material directly supports your ability to analyze real-world…
…
continue reading

1
Episode 89: Monitoring and Analyzing KPIs and KCIs
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19Once performance and control indicators are established, continuous monitoring is essential. This episode explains how to track KPI and KCI trends, detect anomalies, and report on performance across business units. You’ll also learn how these metrics support strategic decision-making. Expect to use this material when answering questions that focus …
…
continue reading

1
Episode 88: Collaborating with Control Owners on KPIs and KCIs Identification
10:57
10:57
Play later
Play later
Lists
Like
Liked
10:57Key Performance Indicators and Key Control Indicators help measure the health of processes and controls. In this episode, we discuss how CRISC professionals work with control owners to define metrics that reflect performance, resilience, and reliability. These indicators are often referenced in exam questions that test your ability to select approp…
…
continue reading

1
Episode 87: Monitoring and Analyzing Key Risk Indicators (KRIs)
10:04
10:04
Play later
Play later
Lists
Like
Liked
10:04KRIs are only useful when monitored and interpreted correctly. This episode walks through how to track, evaluate, and act on risk indicator trends. You’ll also learn how to detect deviations from risk appetite and escalate appropriately. Mastering KRI interpretation is essential for Domain 3 and 4 questions that test your ability to manage emerging…
…
continue reading

1
Episode 86: Defining and Establishing Key Risk Indicators (KRIs)
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38Key Risk Indicators help detect emerging risks before they escalate. In this episode, you’ll learn how to define KRIs that are specific, measurable, and aligned to business impact. We’ll explore how to select thresholds, determine data sources, and connect KRIs to strategic objectives. Expect to use this knowledge in CRISC exam questions that test …
…
continue reading

1
Episode 85: Validating Execution of Risk Responses Against Risk Treatment Plans
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Risk response without verification is a recipe for gaps. This episode teaches you how to validate that risk treatment plans have been carried out as intended. You’ll explore evidence-gathering techniques, stakeholder coordination, and response monitoring—skills needed to close the loop between risk identification and risk mitigation. This topic is …
…
continue reading

1
Episode 84: Collaborating with Control Owners: Control Implementation and Maintenance
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17A strong design isn’t enough—controls must be implemented and sustained. This episode shows how to support control owners through implementation, ongoing operations, documentation, and updates. You'll also learn how to monitor control lifecycles and assess when adjustments are needed. This is essential for mastering questions related to control mat…
…
continue reading

1
Episode 83: Collaborating with Control Owners: Control Selection and Design
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51Designing effective controls is a team effort. In this episode, we focus on how to work with control owners to select appropriate control types and design them to fit operational needs. You’ll learn how business context, system complexity, and risk level influence control design—an area frequently tested in Domain 3 and 4 questions involving techni…
…
continue reading

1
Episode 82: Collaborating with Risk Owners: Developing Risk Treatment Plans
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07Risk treatment plans must reflect ownership, accountability, and alignment with the organization's overall strategy. This episode walks through how CRISC professionals collaborate with risk owners to define actions, timelines, and success metrics. You’ll learn how treatment plans transition from planning to execution—an essential skill tested in qu…
…
continue reading

1
Episode 81: Facilitating Stakeholder Selection of Recommended Risk Responses
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47Stakeholder engagement is critical when selecting the most appropriate response to a risk. In this episode, we explore how CRISC professionals guide decision-makers through treatment options, balancing risk appetite, resource constraints, and business goals. You’ll learn how to structure these conversations and document decisions. This topic suppor…
…
continue reading

1
Episode 80: Reviewing Risk and Control Analysis for Gaps Assessment
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51After controls and risks have been analyzed, gaps become clear. This episode focuses on reviewing results to identify missing safeguards, ineffective responses, and misalignments with business needs. You’ll learn how to translate analysis into practical insights, and how CRISC expects you to use this knowledge to recommend action or escalate issues…
…
continue reading

1
Episode 79: Identifying and Evaluating Effectiveness of Existing Controls
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48Controls are only valuable if they work. In this episode, we explain how to identify current controls across systems and processes and how to evaluate their design and operational effectiveness. You'll also learn techniques to identify gaps, overlaps, and redundancies—skills you'll need to analyze real-world scenarios and propose improvements. This…
…
continue reading

1
Episode 78: Conducting a Comprehensive IT Risk Assessment
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55Risk assessments must be structured, repeatable, and aligned with business needs. This episode walks through how to conduct a comprehensive assessment, including risk identification, impact analysis, likelihood estimation, and prioritization. You’ll learn how to connect all the components into a cohesive evaluation that feeds into treatment plannin…
…
continue reading

1
Episode 77: Promoting a Risk-Aware Culture through Security Awareness Training
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Culture shapes risk behavior. In this episode, we look at how CRISC professionals help promote a risk-aware culture by supporting training programs and awareness campaigns. You'll learn how these efforts reduce human error, improve policy compliance, and reinforce security behaviors. This topic supports both Domain 1 and 4 content and is often test…
…
continue reading

1
Episode 76: Facilitating Identification of Risk Appetite and Tolerance
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50This episode focuses on helping stakeholders define and document risk appetite and tolerance—core elements of strategic alignment. You’ll learn how to facilitate discussions that clarify how much risk the organization is willing to accept and under what conditions. These concepts appear frequently in questions that test your ability to translate st…
…
continue reading

1
Episode 75: Establishing and Maintaining the IT Risk Register
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07The risk register is a living document that tracks an organization’s risk exposure. In this episode, we explore how to build and maintain a complete, dynamic risk register. You’ll learn to define attributes like likelihood, impact, ownership, and treatment status—and how CRISC uses the register to tie together governance, assessment, and reporting …
…
continue reading

1
Episode 74: Establishing Accountability Through Risk and Control Ownership
10:02
10:02
Play later
Play later
Lists
Like
Liked
10:02Without clear ownership, risk management breaks down. This episode shows you how to assign responsibility for risks and controls within the organization, ensuring accountability and follow-through. You'll learn how ownership affects governance, reporting, and response—and how ISACA expects you to spot accountability gaps in exam scenarios. This top…
…
continue reading

1
Episode 73: Evaluating Threats, Vulnerabilities, and Risks to Develop IT Risk Scenarios
9:48
9:48
Play later
Play later
Lists
Like
Liked
9:48Risk scenarios make risks measurable and actionable. This episode explains how to build effective scenarios using threat and vulnerability information, asset dependencies, and business objectives. You’ll learn the structure of a strong risk scenario, and how CRISC expects you to apply them to risk registers and assessments. Expect to see this teste…
…
continue reading

1
Episode 72: Identifying Threats and Vulnerabilities to People, Processes, and Technology
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Threats and vulnerabilities are the building blocks of risk—and CRISC candidates must assess all three layers: people, processes, and technology. This episode walks through methods to identify common risk sources and how to prioritize them. You'll gain the skills to interpret threat vectors and weak points within the organization, essential for sce…
…
continue reading

1
Episode 71: Identifying Potential or Realized Impacts of IT Risk
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40Understanding how IT risks impact business objectives is central to the CRISC exam. In this episode, we explore how to recognize both potential and actual consequences of risk events. You’ll learn to evaluate impacts across financial, operational, reputational, and compliance dimensions. This topic shows up frequently in questions that require inte…
…
continue reading

1
Episode 70: Collecting and Reviewing Organization’s Business and IT Information
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45This supporting task is foundational: you can’t manage risk without understanding your environment. In this episode, you’ll learn how to gather and evaluate information about business processes, IT systems, and organizational context. We walk through techniques for mapping assets, identifying dependencies, and building a full picture of the risk la…
…
continue reading

1
Episode 69: Domain 4 Review: Key Takeaways and Exam Tips
10:04
10:04
Play later
Play later
Lists
Like
Liked
10:04Domain 4 brings together technical and organizational elements of risk—this review episode ties them all together. We recap core topics including IT operations, system development, security, continuity, and privacy, and offer targeted study tips for exam success. Use this episode to clarify technical terms, strengthen connections between IT and ris…
…
continue reading

1
Episode 68: Data Privacy and Protection Principles
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Privacy is no longer optional—it’s a regulatory and reputational imperative. This episode explores core privacy concepts, including data subject rights, lawful processing, and protection controls. You’ll also review laws such as GDPR and how CRISC professionals incorporate privacy into risk assessments and control selection. Expect these principles…
…
continue reading

1
Episode 67: Business Continuity Management Concepts and Practices
10:53
10:53
Play later
Play later
Lists
Like
Liked
10:53Business Continuity Management (BCM) ensures critical operations continue under adverse conditions. This episode breaks down BCM elements such as continuity planning, recovery strategies, and business impact alignment. You’ll learn how to evaluate the maturity of BCM programs and prepare for CRISC questions that test resilience across business func…
…
continue reading

1
Episode 66: Information Security Awareness Training
10:36
10:36
Play later
Play later
Lists
Like
Liked
10:36People are often the weakest link in risk management. In this episode, we cover how security awareness training programs reduce human error and increase risk resilience. You’ll learn how CRISC professionals evaluate training effectiveness, integrate messaging with controls, and assess cultural readiness—concepts that appear often in Domain 4 scenar…
…
continue reading

1
Episode 65: Information Security Concepts, Frameworks, and Standards
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55A solid grasp of security frameworks is essential for risk alignment. This episode introduces key information security concepts—confidentiality, integrity, availability—and reviews common frameworks like ISO 27001, NIST CSF, and COBIT. You’ll learn how to evaluate security posture using structured approaches and anticipate CRISC questions that test…
…
continue reading

1
Episode 64: Emerging Technologies and Associated Risks
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03New technologies can bring competitive advantage—but also new risk. This episode discusses emerging trends such as cloud computing, AI, blockchain, and IoT, and how each introduces unique threats and control considerations. You’ll learn how CRISC professionals evaluate innovation through a risk lens and anticipate exam questions that challenge you …
…
continue reading

1
Episode 63: System Development Life Cycle (SDLC) Essentials
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56CRISC candidates must understand how security and risk controls integrate with the SDLC. In this episode, we walk through the major phases of system development—planning, design, testing, deployment, and maintenance—and explore how risks emerge at each step. You’ll gain clarity on how to embed controls into projects and spot exam questions that tes…
…
continue reading

1
Episode 62: Data Lifecycle Management Principles
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31Data carries risk throughout its entire lifecycle—from creation to deletion. This episode explains the stages of data lifecycle management, how retention and disposal policies mitigate risk, and the importance of classification. You’ll learn how to evaluate data-related controls and align them with compliance and privacy frameworks, a vital topic f…
…
continue reading

1
Episode 61: Disaster Recovery Management (DRM)
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Disaster Recovery Management is critical to ensuring operational continuity during and after unexpected events. This episode explores the components of a DRM strategy, including recovery time objectives (RTOs), recovery point objectives (RPOs), and alternate site arrangements. You’ll also learn how CRISC professionals evaluate recovery controls as …
…
continue reading

1
Episode 60: Project Management in the IT Environment
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47Every IT project introduces risk—and every CRISC candidate must be prepared to assess it. This episode covers how project management methodologies like Agile and Waterfall affect risk posture, and how scope, budget, and resource decisions influence exposure. You’ll learn to identify risk at each stage of the project lifecycle and align it with ente…
…
continue reading

1
Episode 59: IT Operations: Problem and Incident Management
10:20
10:20
Play later
Play later
Lists
Like
Liked
10:20Problem and incident management are essential components of operational resilience. This episode explains how organizations detect, document, and resolve IT issues while minimizing business impact. You’ll explore how these processes fit into the broader risk lifecycle and why CRISC professionals must evaluate their maturity and integration with con…
…
continue reading

1
Episode 58: IT Operations: Change and Asset Management
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47Change and asset management processes are central to minimizing IT risk. In this episode, we examine how structured change control reduces service disruption, and how asset inventories support effective risk assessments. You’ll also learn how failures in these areas contribute to vulnerabilities—a critical concept for both Domain 4 understanding an…
…
continue reading

1
Episode 57: Enterprise Architecture Principles
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13A strong enterprise architecture provides structure and clarity for risk-informed IT decisions. This episode explores the foundational components of enterprise architecture, how it aligns with business strategy, and how it supports secure, resilient design. You’ll learn how to analyze architecture from a risk perspective—important for answering CRI…
…
continue reading

1
Episode 56: CRISC Domain 4 Overview: Information Technology and Security Alignment
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45Domain 4 focuses on the integration of IT and security into enterprise risk management. This episode introduces you to the key topics within this domain, from enterprise architecture to information security awareness. You’ll understand how CRISC expects you to evaluate IT operations, projects, and systems as risk contributors. This overview prepare…
…
continue reading