The Remotely One podcast focuses on remote work, location- independence, and maintaining relationships. Hosted by Rick Haney and Kaleem Clarkson, Remotely We Are One takes a lighthearted look at today’s work climate and offers an entertaining twist: Each guest is encouraged to share their most comical or inspiring remote work experience. What ensues is spontaneous, and often hilarious, conversation surrounding life and the pursuit of workplace flexibility. Every day millions of us are skippi ...
…
continue reading
REMOTE LEADERSHIP provides targeted and timely information to accelerate success for leaders and their teams in the expanding hybrid workplace. Hosted by Debra A. Dinnocenzo, author, speaker, and leading expert on the virtual workplace for over 20 years. You will hear the best keys to success for the ‘next normal’ as the workplace continues evolving to work-from-anywhere.
…
continue reading
Welcome to Flex Space Dialogues, your one-stop podcast for deep dives into the world of flexible workspaces. Join us for engaging one-hour episodes where we invite business leaders from both workspace providers and clients to share best practices, strategies, and learnings. In each episode, we’ll discuss how the flex space industry is evolving and what the future holds. Whether you’re a workspace provider, a business considering flex space solutions, or just curious about the future of work, ...
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Leading Beyond Any Title - from the Corporate Training team at the Southern Alberta Institute of Technology (SAIT) brings you quick lessons and conversations about timely and topical leadership challenges. You'll leave with 1 BIG IDEA, 2 Applied Strategies, and 3 Questions to consider that can help enhance your leadership that very day.
…
continue reading
Made in Canada. Hope & Possibilities is a podcast where we talk about co-creating the future of work. It’s powered by questions. How do we bring the best elements of corporate from the past into the future? How can we design a workplace that will allow employees to thrive and integrate their work into their lives? What will the corporation of the future look like more importantly, what will it feel like? Will the future be hybrid or will we be working remotely? How will the office be re-imag ...
…
continue reading
Surprising insights into IT, security and the future of work – and what they mean for your business strategy. Join host and former Ivanti CEO Jeff Abbott and a rotating cast of global executives and thought leaders as they unpack Ivanti's latest research and share their own perspectives and experiences.
…
continue reading
Conversations about life in Minnesota and how the state is changing, weekdays from MPR News.
…
continue reading
Tune in to our podcast, Chaos & Rocketfuel, where we cover topics on the future of work and human acceleration with relevant thought leaders, innovators, and investors. Brought to you by the minds at WNDYR and Pattyrn.
…
continue reading
On this workplace podcast, your host Carol Schultz brings on experts to discuss problems many business owners face in real time. Guest experts provide context for the issue and advise those in leadership positions on best practices. Whether you are starting a company, or you lead an established organization-- the podcast is geared toward getting you helpful answers.
…
continue reading
Business executive, Katrina Craigwell and Founder and CEO, Annelise Campbell dive into the future of work with guests who are leading teams across companies of all sizes. Tune in for inspiring reflection and practical advice from some of the business world's most interesting leaders. Katrina's views are her own and do not represent those of her employer.
…
continue reading
Leadership Kung Fu was created with agile leaders like yourself in mind as a platform to share our best business development practices, self improvement tips, and share in our knowledge of what it means to be a high performing leader. We invite you to listen in as we chat with guests and provide our insight on various industry related topics as two seasoned executive coaches.
…
continue reading
Welcome to Remote Work Radio, where we chronicle the stories of people who live where they want and make their living by working remotely as employees, freelancers, and entrepreneurs. This podcast aims to empower you to make your work situation remote-friendly so you can improve your quality of life. Remote Work Radio is an original production of Utah State University Extension's Rural Online Initiative.
…
continue reading
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
…
continue reading
Digital-first has replaced digital transformation as the imperative for organizations to align technology investments with business goals. It is crucial for every business to respond quickly and adapt, and to become more resilient, more flexible and more prepared to drive recovery and growth in the face of inevitable future challenges. This is what VMware call being Future Ready. Provocative, compelling and above all, useful conversation from VMware. Get the very latest insights from leading ...
…
continue reading
Calling all remote professionals - entrepreneurs, team leaders, virtual facilitators and sales professionals. Join co-hosts Jennifer Britton and Michelle Mullins as we explore the resources for a variety of remote professionals. We explore the people, places, and pathways for working remotely. We’ll connect you with the tools, resources, and voices from the field to support you in navigating the dynamic, ever-changing pathways of working remotely. As remote workers ourselves, we are passiona ...
…
continue reading

1
The Maverick Show: Remote Entrepreneurship and World Travel
Matt Bowles: Digital Nomad & Full-Time Traveler Since 2013
Meet diverse travelers and digital nomads from every continent who share their personal journey to location-independence as well as their reflections on identity, the power dynamics that shape our world, and how we can be more thoughtful, conscious travelers as we move through it. Hosted by Matt Bowles—your typical Irish-American hip hop DJ turned human rights activist turned location-independent entrepreneur turned minimalist world-traveler and podcaster—these in-depth conversations take pl ...
…
continue reading
The Learning & Development Podcast is a fortnightly topical podcast show for L&D professionals hosted by David James and presented by 360Learning. In each episode David James discusses and debates topics affecting the profession alongside expert guests. David is the Chief Learning Officer at 360Learning and a highly respected voice in the Learning & Development industry. With a focus on harnessing technology to drive impactful learning strategies, David is recognised as one of the top 10 glo ...
…
continue reading
Remotely Possible, created and hosted by Adam Riggs, is a podcast about the people shaping the future of work. Adam talks with business leaders, tech innovators, and software partners about building and sustaining a collaborative environment for hybrid or fully remote teams. Remotely Possible seeks to spotlight the people and leaders who are shaping the successful and innovative future of work.
…
continue reading
The global workforce experienced a big disruption which brought a lot of new organizational cultural challenges. Every week, our host invites leaders from large or innovative companies like Slack, Hubspot, Gitlab, Elastic, Dropbox & Atlassian to provide insights around scalable strategies for a long-term remote-first workplace transformation. Listen in to learn: - Remote First Employee Experience - Hybrid Work best practices - Work from Anywhere Programs in large companies - Startup for Remo ...
…
continue reading
With over 25 years of experience, we have partnered with organizations to build respectful and inclusive work environments. Our range of services includes highly customized training programs - live, virtual-live, and on-demand; impartial complaint investigations; expert testimony in human resources and employment law; and a wide array of HR consulting services.
…
continue reading
Listen in on discussions with Cisco and industry experts regarding business, design, and deployment considerations of SSL VPN in focused 10-15 minute topics. This will be a series of seven discussions, occurring once monthly.
…
continue reading
Welcome to We Are Human Leaders - big conversations around human-centred leadership at work and beyond. This is a story about you, as a Human, and a Leader. It doesn’t matter your industry, your geography, the products you sell or the services that you offer. It doesn’t matter if you’re in a corporation, or a small business, it doesn’t matter your profit margins or your official job title. Our common denominator is the same, we are humans first and leaders second. This is a call to everyone ...
…
continue reading
eLABorate Topics, aims to be the leading platform empowering medical laboratory professionals to excel in their careers through industry-specific training and leadership development. We aim to create community where professionals feel valued, supported, and inspired to reach their full potential.
…
continue reading
Roger Dooley is the author of Brainfluence: 100 Ways to Persuade and Convince Consumers with Neuromarketing, and has been studying the effects of psychology, behavior research, and neuroscience on persuasion and marketing in business, leadership and everyday life. In every episode, Roger shares brain-oriented tactics, along with the expertise of his guests, to increase persuasion with concrete, research-based neuromarketing advice. Guests include best-selling authors and thought leaders like ...
…
continue reading
Your virtual command center for navigating the challenges of distributed work. Pixels & Projects delivers actionable strategies through our weekly podcast helping project managers transform scattered teammates into synchronized success stories. Tune in weekly to join a community of remote leaders who are redefining what's possible when distance is no obstacle.
…
continue reading
Back in late 2021, we decided that instead of chatting to each other about the challenges and triumphs of people management in small businesses, we should invite you to join the conversation. And the Work Wonders podcast was born! Managing people is serious business. We bring you all the latest, practical advice without the pain. The podcast is brought to you by Aster HR https://www.asterhr.com.au/ and your hosts are Angela Gauci and Susan Rochester
…
continue reading
Welcome to The Music Corner! Here you’ll find exciting and informative content on topics such as Music, Guitar, Classical Guitar, Piano, Music Education, and lots more ... Thanks for listening!
…
continue reading
Every great leader inspires, motivates and rewards their people for performance. Welcome to the People Strategy Forum podcast, a show that guides leaders to elevate the workforce. People are at the heart of successful organizations. Team members’ well-being and career development are essential. This show discusses practical and effective leadership strategies for top executives, senior professionals, and talent managers. Aligning employer and employee objectives is a must. Every team member ...
…
continue reading
Management Development Unlocked is a global top 5% podcast for new managers and leaders who want to transform from high-performing individual contributors to great people managers. As the saying goes, “What got you here won’t get you there.” The skills that made you a great employee are almost completely opposite from the skills that will make you a great manager and leader. Eric Girard is your guide during this key transition. Experienced managers and leaders will also benefit from the tips ...
…
continue reading
Open Sourced Workplace focuses on today's leading topics in science, technology, and how it relates to the workplace environment. Join Alek Dincoff, professional voice actor, as he narrates new articles Mondays, Tuesdays, and Thursdays. Also join Alek Dincoff and Steve Todd, founder of Open Sourced Workplace, every Friday for the podcast version of their Q&A. This segment covers what's new with Open Sourced Workplace, Steve Todd's journey to create a free online resource, and new information ...
…
continue reading
The Smart Woman Podcast presents applicable strategies, inspiration and tools for women who want to get professional results and achieve their boldest goals. This podcast is for you. You'll gets concrete ideas to help you redefine your own version of success and get what you really want in your career. The Smart Woman Podcast is hosted by Gabriela Mueller Mendoza. She’s an engaging, effective and humorous Professional Coach, global Speaker with European and Latin flavor. Her website is www.g ...
…
continue reading
Welcome to FloppED the Podcast by TreefishEDU. This is the show that features teacher guests sharing their stories of educational mishaps or “flops” and what they learned along the way. Why do we do it? Because teaching is tough and we all “flop” from time to time, but by sharing these flops and success stories we hope that you can benefit from their experiences
…
continue reading
Award-winning image consultant, author and personal branding pioneer Jon Michail spent over 32 years helping executives, entrepreneurs and changemakers to build, grow and monetise their personal brands. As he helped them, now it's time to help YOU with this podcast. This platform will introduce leading-edge concepts and tools to maximize your career, business and personal life. The show has two types of episodes: one based on conversations with personalities that will share their stories and ...
…
continue reading
Team Anywhere’s mission is to uncover Leaders on the Front Lines that are building teams and cultures where the majority of the workers are dispersed throughout the city, state, country, or world. We explore how these remote leaders foster engagement through trust, authenticity, and a sense of community. Ultimately, we are uncovering the new skills and practices that leaders must take on to connect, inspire, and transform their teams to compete in the new dispersed global economy. Hosted on ...
…
continue reading
Human Leadership is full of science-backed and practical knowledge and insight, designed to help anyone who leads people unleash the human talent we need for the next era of work. Presented by Susanne Jacobs, an organizational behaviour and performance expert who's worked as part of senior leadership teams for over thirty years and conducted more than a decade of research into the neurobiological drivers of intrinsic motivation and trust, each episode will take leaders through what they'll n ...
…
continue reading
National University Deans, Faculty, and Leadership discuss a wide range of topics with a focus on the higher education community. Tune in to hear from our experts, alumni, students, and faculty. Current programs include: Center for the Advancement of Virtual Organizations (CAVO), Virtual Education Support Center (VESC) and Whole Person Center (WPC), formerly Virtual Center for Health and Wellness (VC4HW).
…
continue reading
Welcome to 'Unsaid Truth,' the podcast presented by Thurgood Marshall College Fund that uncovers the unspoken insights HBCU students needs to navigate the world of corporate America. Join us as we delve into the candid conversations, hidden challenges, and untold stories that shape the professional journeys of today's emerging, diverse leaders. From decoding workplace dynamics to mastering negotiation skills, our episodes provide a platform for honest discussions that empower and equip the n ...
…
continue reading
…
continue reading
Discussions with industry leaders about philosophies of work, culture, and everything inbetween.
…
continue reading
Listen in on unscripted conversations between engineering leaders and other influential folks in tech.
…
continue reading
Thought-provoking videos about life and being human, with ideas from business leaders, psychologists and researchers speaking onstage at the TED conference, TEDx events and partner events around the world. You can also download these and many other videos free on TED.com, with an interactive English transcript and subtitles in up to 80 languages. TED is a nonprofit devoted to Ideas Worth Spreading.
…
continue reading
We are excited to share our first podcast which is about our company "VMukti Solutions Pvt. Ltd". Our company is a global exporter of innovative solutions, Proven Technology, and Hybrid Solutions for Smart Cities, Healthcare, Education, Vehicle Surveillance, Warehouse surveillance, Election surveillance, Bank surveillance, Examination surveillance, and many more. Our varieties of CCTV camera includes, - WIFI camera: Which is Suitable for Indoor and Outdoor location - 4G Camera: Specially des ...
…
continue reading
TIP - The Immersive Podcast- Dive into The Immersive Podcast (TIP), where your former rock star host, Tyler Tivador, engages with leading experts and passionate professionals. Whether we’re unraveling the mysteries of the cosmos, exploring profound ideas, addressing taboo subjects, or extraterrestrial contact. TIP is your gateway to the extraordinary. It’s not just a podcast; it’s an experience that makes you feel like you’re part of an exclusive Immersion Pod! Get ready to be intrigued, enl ...
…
continue reading
Remote job search tips and career advice from FlexJobs.FlexJobs is a job board highlighting only the best remote, hybrid, and flexible schedule jobs ranging from entry-level to executive, freelance to full-time, and local to global. Our team of trained researchers hand-screens every job listing to ensure legitimacy.In 2007, FlexJobs founder and CEO - Sara Sutton - was looking for something better after losing her full-time job. She was already seven months pregnant with her first child and n ...
…
continue reading

1
Hybrid and Remote Work Security Awareness (Domain 5)
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections…
…
continue reading

1
HYBRID HELL NO MORE! 🚀 7 Secrets Project Managers MUST Know to Dominate Remote & Hybrid Teams
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13🚨 STOP BURNING OUT! 🚨 69% of Remote Workers Are STRUGGLING... But These 7 GAME-CHANGING Secrets Will Save Your Sanity! 🔥 Are you drowning in the "always-on" remote work culture? 😰 This video reveals the EXACT strategies that top companies like Dropbox and GitLab use to DOMINATE remote work while protecting their teams' mental health!…
…
continue reading

1
Paradox Thinking: The Ultimate Leadership Hack in Times of Uncertainty with Wendy Smith
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36In this transformative episode of We Are Human Leaders, we sat down in Sydney with Wendy Smith—renowned expert on paradox and co-author of Both/And Thinking—to explore how shifting from either/or decision-making to both/and thinking can unlock deeper clarity, resilience, and creativity in leadership and life. Wendy walks us through the concept of p…
…
continue reading

1
'This cannot be the norm': Minnesotans struggle with surge in political violence
1:39:03
1:39:03
Play later
Play later
Lists
Like
Liked
1:39:03Minnesota House Democratic Leader Rep. Melissa Hortman and her husband Mark were fatally shot at their home in Brooklyn Park early Saturday. A second Democratic lawmaker, state Sen. John Hoffman, and his wife Yvette, were also shot and wounded at their home in Champlin. Gov. Tim Walz said the shooting “appears to be a politically motivated assassin…
…
continue reading

1
Developing and Executing Security Awareness Programs (Domain 5)
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss…
…
continue reading

1
Security Reporting and Monitoring (Domain 5)
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing…
…
continue reading

1
User Guidance and Training (Part 3) (Domain 5)
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. W…
…
continue reading

1
User Guidance and Training (Part 2) (Domain 5)
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also co…
…
continue reading

1
User Guidance and Training (Part 1) (Domain 5)
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how …
…
continue reading
Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engin…
…
continue reading
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce tra…
…
continue reading
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS da…
…
continue reading
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
…
continue reading

1
Fundamentals of Penetration Testing (Domain 5)
9:53
9:53
Play later
Play later
Lists
Like
Liked
9:53Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated i…
…
continue reading
External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, P…
…
continue reading
The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committee…
…
continue reading

1
Attestation and Internal Audits (Domain 5)
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system c…
…
continue reading
Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is …
…
continue reading

1
Privacy and Legal Implications of Compliance (Domain 5)
10:14
10:14
Play later
Play later
Lists
Like
Liked
10:14Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data co…
…
continue reading

1
Data Inventory, Retention, and the Right to Be Forgotten (Domain 5)
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss re…
…
continue reading

1
Privacy Laws and Global Compliance (Domain 5)
10:14
10:14
Play later
Play later
Lists
Like
Liked
10:14Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and…
…
continue reading

1
Attestation and Acknowledgement in Compliance (Domain 5)
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acce…
…
continue reading
Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—including fines, sanctions, lawsuits, contract termination, and loss of certifications or business licenses. We examine examples where organizations were pe…
…
continue reading

1
Effective Compliance Reporting (Domain 5)
10:08
10:08
Play later
Play later
Lists
Like
Liked
10:08Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in this episode, we explore how to make it both accurate and efficient. We cover internal reporting practices, such as monthly compliance dashboards and policy enforcement summaries, as well as external repo…
…
continue reading

1
Ongoing Vendor Monitoring and Engagement (Domain 5)
9:13
9:13
Play later
Play later
Lists
Like
Liked
9:13Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and accountability. In this episode, we explore how organizations track vendor performance through periodic assessments, SLA reviews, compliance reports, and security questionnaires. We highlight how to use co…
…
continue reading

1
Agreement Types and Contractual Security (Domain 5)
9:22
9:22
Play later
Play later
Lists
Like
Liked
9:22Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that define roles, responsibilities, and expectations with external parties. We cover Service-Level Agreements (SLAs), which outline performance and availability targets; Memorandums of Understanding (MOUs) …
…
continue reading

1
Vendor Risk and Supply Chain Considerations (Domain 5)
10:00
10:00
Play later
Play later
Lists
Like
Liked
10:00A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and off…
…
continue reading

1
Mean Time Metrics and System Resilience (Domain 5)
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how systems behave under failure: Mean Time to Repair (MTTR), Mean Time Between Failures (MTBF), Mean Time to Detect (MTTD), and Mean Time to Respond (MTTR—the other one). MTTR (repair) reflects how long it takes…
…
continue reading

1
Understanding Recovery Objectives (Domain 5)
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore two of the most critical metrics: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO sets the maximum allowable downtime before business operations suffer unacceptable consequences, wh…
…
continue reading
Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which processes matter most and how downtime affects operations. In this episode, we break down how BIAs identify critical systems, estimate recovery time objectives (RTOs) and recovery point objectives (RPOs), an…
…
continue reading
Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical findings and business leadership. We explore how to craft reports that align with the audience: dashboards and trend lines for executives, technical remediation plans for IT, and regulatory compliance summar…
…
continue reading
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring r…
…
continue reading

1
Risk Appetite, Tolerance, and Thresholds (Domain 5)
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, policy, and control. In this episode, we break down the concepts of risk appetite (what you’re willing to pursue), risk tolerance (what you’re willing to withstand), and risk thresholds (the hard lines th…
…
continue reading

1
Risk Registers and Key Risk Indicators (Domain 5)
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07Managing risk at scale requires tools that provide structure and visibility, and in this episode, we examine two of the most important: risk registers and key risk indicators (KRIs). A risk register is a living document that catalogs identified risks, their likelihood, potential impact, status, ownership, and mitigation plans. It enables organizati…
…
continue reading
After risks are identified, they need to be analyzed and prioritized—and that’s where risk scoring comes in. In this episode, we break down both qualitative methods (like high/medium/low ratings and heat maps) and quantitative techniques (like Single Loss Expectancy, Annualized Loss Expectancy, and Annualized Rate of Occurrence). We explain how the…
…
continue reading
Risk assessments provide the data organizations need to make informed security decisions, and in this episode, we explore the different types of assessments and how they’re conducted. We start by comparing ad hoc, recurring, one-time, and continuous assessments, each of which serves different operational or compliance needs. We explain how to scope…
…
continue reading
Risk management is the engine that drives strategic decision-making in security, helping organizations focus their efforts on what matters most. In this episode, we explain how to identify risks, evaluate their likelihood and impact, and decide whether to accept, avoid, mitigate, or transfer them. We cover key concepts like threat, vulnerability, a…
…
continue reading

1
Governance Structures and Roles (Part 2) (Domain 5)
9:27
9:27
Play later
Play later
Lists
Like
Liked
9:27Having a governance structure is only the beginning—the real value comes from clearly defining roles and responsibilities within that structure. In this episode, we examine the key roles involved in managing data and systems securely, including data owners, custodians, stewards, processors, and controllers. Data owners are responsible for setting c…
…
continue reading

1
Governance Structures and Roles (Part 1) (Domain 5)
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Security governance relies on a clear structure that defines how decisions are made, who enforces them, and how oversight is maintained. In this episode, we explore governance structures such as boards, steering committees, and cross-functional security councils, each playing a role in shaping strategy, prioritizing risks, and allocating resources.…
…
continue reading

1
Monitoring and Revising Governance Policies (Domain 5)
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31Security policies must evolve with technology, threat landscapes, and business goals—and that’s why continuous monitoring and revision are essential. In this episode, we explore how organizations maintain governance effectiveness by regularly reviewing policies, tracking their implementation, and auditing their relevance. We cover methods like poli…
…
continue reading

1
External Security Governance Considerations (Domain 5)
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23Security doesn't operate in a vacuum—organizations must navigate a complex web of external considerations that shape how security is governed. In this episode, we explore regulatory requirements (like GDPR, HIPAA, and PCI-DSS), industry standards, and legal obligations that influence security architecture, policies, and practices. We also cover how…
…
continue reading
Procedures and playbooks are the operational backbone of a mature security program—translating policy into detailed, repeatable steps for responding to specific threats or performing security tasks. In this episode, we explain the difference between general procedures (e.g., user onboarding or access review) and incident-specific playbooks (e.g., m…
…
continue reading

1
Security Standards and Physical Controls (Domain 5)
10:32
10:32
Play later
Play later
Lists
Like
Liked
10:32Standards and controls turn high-level policy into actionable, enforceable security, and in this episode, we explore how physical controls and documented standards create consistent, measurable protection. We discuss the value of security standards like password complexity requirements, encryption levels, and access review intervals that ensure sys…
…
continue reading

1
Incident Response Policies and Procedures (Domain 5)
9:20
9:20
Play later
Play later
Lists
Like
Liked
9:20An effective incident response program starts with well-defined policies and procedures that guide every action, role, and escalation during a security event. In this episode, we explore the components of an incident response policy—covering scope, roles, definitions, response timelines, and classification levels. We then break down procedures into…
…
continue reading

1
Key Security Policies and Standards (Domain 5)
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Policies and standards are the written expression of an organization’s security expectations—and in this episode, we explore how they’re developed, communicated, and enforced. We cover essential policies such as Acceptable Use Policies (AUPs), information security policies, disaster recovery policies, and software development lifecycle (SDLC) stand…
…
continue reading

1
Introduction to Security Governance (Domain 5)
9:22
9:22
Play later
Play later
Lists
Like
Liked
9:22Security governance is the blueprint for how an organization manages its security strategy, aligns it with business goals, and ensures accountability across all levels of operation. In this episode, we introduce the core elements of effective governance, including the development of security policies, acceptable use standards, change management pro…
…
continue reading

1
Introduction to Domain Five — Security Program Management and Oversight
8:17
8:17
Play later
Play later
Lists
Like
Liked
8:17Cybersecurity isn’t just about blocking attacks and managing firewalls. It’s also about building policies, assessing risk, managing vendors, and aligning security with the overall goals of the business. That’s the focus of Domain Five: Security Program Management and Oversight. This domain gives you the big-picture understanding of how security fit…
…
continue reading

1
Packet Captures in Investigations (Domain 4)
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13Packet captures are the most detailed and revealing form of network data available to defenders—showing not just what happened, but exactly how it happened, byte by byte. In this episode, we explain how tools like Wireshark and tcpdump allow analysts to capture and inspect network packets for signs of malicious activity, protocol abuse, data leakag…
…
continue reading

1
Dashboards and Visualization Tools (Domain 4)
9:24
9:24
Play later
Play later
Lists
Like
Liked
9:24A well-designed dashboard can turn complex security data into fast, actionable insight—and in this episode, we explore how visualization tools help analysts, engineers, and executives understand the health of their security environments at a glance. We discuss how dashboards consolidate metrics like open vulnerabilities, login anomalies, firewall e…
…
continue reading