Hybrid Remote public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Remotely One - A remote work podcast

Rick Haney and Kaleem Clarkson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Remotely One podcast focuses on remote work, location- independence, and maintaining relationships. Hosted by Rick Haney and Kaleem Clarkson, Remotely We Are One takes a lighthearted look at today’s work climate and offers an entertaining twist: Each guest is encouraged to share their most comical or inspiring remote work experience. What ensues is spontaneous, and often hilarious, conversation surrounding life and the pursuit of workplace flexibility. Every day millions of us are skippi ...
  continue reading
 
Artwork

1
Remote Leadership

Debra A. Dinnocenzo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
REMOTE LEADERSHIP provides targeted and timely information to accelerate success for leaders and their teams in the expanding hybrid workplace. Hosted by Debra A. Dinnocenzo, author, speaker, and leading expert on the virtual workplace for over 20 years. You will hear the best keys to success for the ‘next normal’ as the workplace continues evolving to work-from-anywhere.
  continue reading
 
Artwork
 
Welcome to Flex Space Dialogues, your one-stop podcast for deep dives into the world of flexible workspaces. Join us for engaging one-hour episodes where we invite business leaders from both workspace providers and clients to share best practices, strategies, and learnings. In each episode, we’ll discuss how the flex space industry is evolving and what the future holds. Whether you’re a workspace provider, a business considering flex space solutions, or just curious about the future of work, ...
  continue reading
 
Artwork

1
Self-Hosted

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
  continue reading
 
Leading Beyond Any Title - from the Corporate Training team at the Southern Alberta Institute of Technology (SAIT) brings you quick lessons and conversations about timely and topical leadership challenges. You'll leave with 1 BIG IDEA, 2 Applied Strategies, and 3 Questions to consider that can help enhance your leadership that very day.
  continue reading
 
Made in Canada. Hope & Possibilities is a podcast where we talk about co-creating the future of work. It’s powered by questions. How do we bring the best elements of corporate from the past into the future? How can we design a workplace that will allow employees to thrive and integrate their work into their lives? What will the corporation of the future look like more importantly, what will it feel like? Will the future be hybrid or will we be working remotely? How will the office be re-imag ...
  continue reading
 
Surprising insights into IT, security and the future of work – and what they mean for your business strategy. Join host and former Ivanti CEO Jeff Abbott and a rotating cast of global executives and thought leaders as they unpack Ivanti's latest research and share their own perspectives and experiences.
  continue reading
 
Artwork
 
On this workplace podcast, your host Carol Schultz brings on experts to discuss problems many business owners face in real time. Guest experts provide context for the issue and advise those in leadership positions on best practices. Whether you are starting a company, or you lead an established organization-- the podcast is geared toward getting you helpful answers.
  continue reading
 
Artwork

1
Am I on Mute?

Katrina Craigwell and Annelise Campbell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Business executive, Katrina Craigwell and Founder and CEO, Annelise Campbell dive into the future of work with guests who are leading teams across companies of all sizes. Tune in for inspiring reflection and practical advice from some of the business world's most interesting leaders. Katrina's views are her own and do not represent those of her employer.
  continue reading
 
Artwork

1
Leadership Kung Fu

Sandi Verrecchia and Jennifer Long

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Leadership Kung Fu was created with agile leaders like yourself in mind as a platform to share our best business development practices, self improvement tips, and share in our knowledge of what it means to be a high performing leader. We invite you to listen in as we chat with guests and provide our insight on various industry related topics as two seasoned executive coaches.
  continue reading
 
Artwork

1
Remote Work Radio

Paul Hill, PhD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Remote Work Radio, where we chronicle the stories of people who live where they want and make their living by working remotely as employees, freelancers, and entrepreneurs. This podcast aims to empower you to make your work situation remote-friendly so you can improve your quality of life. Remote Work Radio is an original production of Utah State University Extension's Rural Online Initiative.
  continue reading
 
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
  continue reading
 
Digital-first has replaced digital transformation as the imperative for organizations to align technology investments with business goals. It is crucial for every business to respond quickly and adapt, and to become more resilient, more flexible and more prepared to drive recovery and growth in the face of inevitable future challenges. This is what VMware call being Future Ready. Provocative, compelling and above all, useful conversation from VMware. Get the very latest insights from leading ...
  continue reading
 
Artwork

1
The Remote Pathways Podcast

Jennifer Britton and Michelle Mullins

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Calling all remote professionals - entrepreneurs, team leaders, virtual facilitators and sales professionals. Join co-hosts Jennifer Britton and Michelle Mullins as we explore the resources for a variety of remote professionals. We explore the people, places, and pathways for working remotely. We’ll connect you with the tools, resources, and voices from the field to support you in navigating the dynamic, ever-changing pathways of working remotely. As remote workers ourselves, we are passiona ...
  continue reading
 
Artwork

1
The Maverick Show: Remote Entrepreneurship and World Travel

Matt Bowles: Digital Nomad & Full-Time Traveler Since 2013

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Meet diverse travelers and digital nomads from every continent who share their personal journey to location-independence as well as their reflections on identity, the power dynamics that shape our world, and how we can be more thoughtful, conscious travelers as we move through it. Hosted by Matt Bowles—your typical Irish-American hip hop DJ turned human rights activist turned location-independent entrepreneur turned minimalist world-traveler and podcaster—these in-depth conversations take pl ...
  continue reading
 
The Learning & Development Podcast is a fortnightly topical podcast show for L&D professionals hosted by David James and presented by 360Learning. In each episode David James discusses and debates topics affecting the profession alongside expert guests. David is the Chief Learning Officer at 360Learning and a highly respected voice in the Learning & Development industry. With a focus on harnessing technology to drive impactful learning strategies, David is recognised as one of the top 10 glo ...
  continue reading
 
Remotely Possible, created and hosted by Adam Riggs, is a podcast about the people shaping the future of work. Adam talks with business leaders, tech innovators, and software partners about building and sustaining a collaborative environment for hybrid or fully remote teams. Remotely Possible seeks to spotlight the people and leaders who are shaping the successful and innovative future of work.
  continue reading
 
Artwork

1
Remote First

Modern Leaders

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The global workforce experienced a big disruption which brought a lot of new organizational cultural challenges. Every week, our host invites leaders from large or innovative companies like Slack, Hubspot, Gitlab, Elastic, Dropbox & Atlassian to provide insights around scalable strategies for a long-term remote-first workplace transformation. Listen in to learn: - Remote First Employee Experience - Hybrid Work best practices - Work from Anywhere Programs in large companies - Startup for Remo ...
  continue reading
 
Artwork

1
EPS-RealSolutions

Employment Practices Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
With over 25 years of experience, we have partnered with organizations to build respectful and inclusive work environments. Our range of services includes highly customized training programs - live, virtual-live, and on-demand; impartial complaint investigations; expert testimony in human resources and employment law; and a wide array of HR consulting services.
  continue reading
 
Artwork

1
We Are Human Leaders

Alexis Zahner & Sally Clarke

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to We Are Human Leaders - big conversations around human-centred leadership at work and beyond. This is a story about you, as a Human, and a Leader. It doesn’t matter your industry, your geography, the products you sell or the services that you offer. It doesn’t matter if you’re in a corporation, or a small business, it doesn’t matter your profit margins or your official job title. Our common denominator is the same, we are humans first and leaders second. This is a call to everyone ...
  continue reading
 
Artwork

1
eLABorate Topics

dibroadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
eLABorate Topics, aims to be the leading platform empowering medical laboratory professionals to excel in their careers through industry-specific training and leadership development. We aim to create community where professionals feel valued, supported, and inspired to reach their full potential.
  continue reading
 
Artwork

1
Brainfluence

Roger Dooley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Roger Dooley is the author of Brainfluence: 100 Ways to Persuade and Convince Consumers with Neuromarketing, and has been studying the effects of psychology, behavior research, and neuroscience on persuasion and marketing in business, leadership and everyday life. In every episode, Roger shares brain-oriented tactics, along with the expertise of his guests, to increase persuasion with concrete, research-based neuromarketing advice. Guests include best-selling authors and thought leaders like ...
  continue reading
 
Your virtual command center for navigating the challenges of distributed work. Pixels & Projects delivers actionable strategies through our weekly podcast helping project managers transform scattered teammates into synchronized success stories. Tune in weekly to join a community of remote leaders who are redefining what's possible when distance is no obstacle.
  continue reading
 
Artwork
 
Back in late 2021, we decided that instead of chatting to each other about the challenges and triumphs of people management in small businesses, we should invite you to join the conversation. And the Work Wonders podcast was born! Managing people is serious business. We bring you all the latest, practical advice without the pain. The podcast is brought to you by Aster HR https://www.asterhr.com.au/ and your hosts are Angela Gauci and Susan Rochester
  continue reading
 
Artwork
 
Welcome to The Music Corner! Here you’ll find exciting and informative content on topics such as Music, Guitar, Classical Guitar, Piano, Music Education, and lots more ... Thanks for listening!
  continue reading
 
Artwork

1
People Strategy Forum

Sam Reeve & Char Miller & Sumit Singla

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every great leader inspires, motivates and rewards their people for performance. Welcome to the People Strategy Forum podcast, a show that guides leaders to elevate the workforce. People are at the heart of successful organizations. Team members’ well-being and career development are essential. This show discusses practical and effective leadership strategies for top executives, senior professionals, and talent managers. Aligning employer and employee objectives is a must. Every team member ...
  continue reading
 
Management Development Unlocked is a global top 5% podcast for new managers and leaders who want to transform from high-performing individual contributors to great people managers. As the saying goes, “What got you here won’t get you there.” The skills that made you a great employee are almost completely opposite from the skills that will make you a great manager and leader. Eric Girard is your guide during this key transition. Experienced managers and leaders will also benefit from the tips ...
  continue reading
 
Open Sourced Workplace focuses on today's leading topics in science, technology, and how it relates to the workplace environment. Join Alek Dincoff, professional voice actor, as he narrates new articles Mondays, Tuesdays, and Thursdays. Also join Alek Dincoff and Steve Todd, founder of Open Sourced Workplace, every Friday for the podcast version of their Q&A. This segment covers what's new with Open Sourced Workplace, Steve Todd's journey to create a free online resource, and new information ...
  continue reading
 
Artwork

1
The Smart Woman Podcast

Gabriela Mueller Mendoza

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Smart Woman Podcast presents applicable strategies, inspiration and tools for women who want to get professional results and achieve their boldest goals. This podcast is for you. You'll gets concrete ideas to help you redefine your own version of success and get what you really want in your career. The Smart Woman Podcast is hosted by Gabriela Mueller Mendoza. She’s an engaging, effective and humorous Professional Coach, global Speaker with European and Latin flavor. Her website is www.g ...
  continue reading
 
Artwork
 
Welcome to FloppED the Podcast by TreefishEDU. This is the show that features teacher guests sharing their stories of educational mishaps or “flops” and what they learned along the way. Why do we do it? Because teaching is tough and we all “flop” from time to time, but by sharing these flops and success stories we hope that you can benefit from their experiences
  continue reading
 
Award-winning image consultant, author and personal branding pioneer Jon Michail spent over 32 years helping executives, entrepreneurs and changemakers to build, grow and monetise their personal brands. As he helped them, now it's time to help YOU with this podcast. This platform will introduce leading-edge concepts and tools to maximize your career, business and personal life. The show has two types of episodes: one based on conversations with personalities that will share their stories and ...
  continue reading
 
Artwork

1
Team Anywhere Leadership Podcast

Mitch Simon & Brett Putter

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Team Anywhere’s mission is to uncover Leaders on the Front Lines that are building teams and cultures where the majority of the workers are dispersed throughout the city, state, country, or world. We explore how these remote leaders foster engagement through trust, authenticity, and a sense of community. Ultimately, we are uncovering the new skills and practices that leaders must take on to connect, inspire, and transform their teams to compete in the new dispersed global economy. Hosted on ...
  continue reading
 
Artwork

1
Human Leadership

Susanne Jacobs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Human Leadership is full of science-backed and practical knowledge and insight, designed to help anyone who leads people unleash the human talent we need for the next era of work. Presented by Susanne Jacobs, an organizational behaviour and performance expert who's worked as part of senior leadership teams for over thirty years and conducted more than a decade of research into the neurobiological drivers of intrinsic motivation and trust, each episode will take leaders through what they'll n ...
  continue reading
 
National University Deans, Faculty, and Leadership discuss a wide range of topics with a focus on the higher education community. Tune in to hear from our experts, alumni, students, and faculty. Current programs include: Center for the Advancement of Virtual Organizations (CAVO), Virtual Education Support Center (VESC) and Whole Person Center (WPC), formerly Virtual Center for Health and Wellness (VC4HW).
  continue reading
 
Artwork

1
Unsaid Truth

Thurgood Marshall College Fund

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to 'Unsaid Truth,' the podcast presented by Thurgood Marshall College Fund that uncovers the unspoken insights HBCU students needs to navigate the world of corporate America. Join us as we delve into the candid conversations, hidden challenges, and untold stories that shape the professional journeys of today's emerging, diverse leaders. From decoding workplace dynamics to mastering negotiation skills, our episodes provide a platform for honest discussions that empower and equip the n ...
  continue reading
 
Thought-provoking videos about life and being human, with ideas from business leaders, psychologists and researchers speaking onstage at the TED conference, TEDx events and partner events around the world. You can also download these and many other videos free on TED.com, with an interactive English transcript and subtitles in up to 80 languages. TED is a nonprofit devoted to Ideas Worth Spreading.
  continue reading
 
We are excited to share our first podcast which is about our company "VMukti Solutions Pvt. Ltd". Our company is a global exporter of innovative solutions, Proven Technology, and Hybrid Solutions for Smart Cities, Healthcare, Education, Vehicle Surveillance, Warehouse surveillance, Election surveillance, Bank surveillance, Examination surveillance, and many more. Our varieties of CCTV camera includes, - WIFI camera: Which is Suitable for Indoor and Outdoor location - 4G Camera: Specially des ...
  continue reading
 
Artwork

1
The Immersive Podcast TIP

Tyler Tivador and Jane Lovascio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
TIP - The Immersive Podcast- Dive into The Immersive Podcast (TIP), where your former rock star host, Tyler Tivador, engages with leading experts and passionate professionals. Whether we’re unraveling the mysteries of the cosmos, exploring profound ideas, addressing taboo subjects, or extraterrestrial contact. TIP is your gateway to the extraordinary. It’s not just a podcast; it’s an experience that makes you feel like you’re part of an exclusive Immersion Pod! Get ready to be intrigued, enl ...
  continue reading
 
Remote job search tips and career advice from FlexJobs.FlexJobs is a job board highlighting only the best remote, hybrid, and flexible schedule jobs ranging from entry-level to executive, freelance to full-time, and local to global. Our team of trained researchers hand-screens every job listing to ensure legitimacy.In 2007, FlexJobs founder and CEO - Sara Sutton - was looking for something better after losing her full-time job. She was already seven months pregnant with her first child and n ...
  continue reading
 
Loading …
show series
 
Remote and hybrid work models create new layers of security complexity—blending corporate environments with home networks, personal devices, and cloud-first workflows. In this episode, we explore the core topics of remote work security awareness, starting with safe home Wi-Fi configurations, strong authentication, and VPN use for secure connections…
  continue reading
 
🚨 STOP BURNING OUT! 🚨 69% of Remote Workers Are STRUGGLING... But These 7 GAME-CHANGING Secrets Will Save Your Sanity! 🔥 Are you drowning in the "always-on" remote work culture? 😰 This video reveals the EXACT strategies that top companies like Dropbox and GitLab use to DOMINATE remote work while protecting their teams' mental health!…
  continue reading
 
In this transformative episode of We Are Human Leaders, we sat down in Sydney with Wendy Smith—renowned expert on paradox and co-author of Both/And Thinking—to explore how shifting from either/or decision-making to both/and thinking can unlock deeper clarity, resilience, and creativity in leadership and life. Wendy walks us through the concept of p…
  continue reading
 
Minnesota House Democratic Leader Rep. Melissa Hortman and her husband Mark were fatally shot at their home in Brooklyn Park early Saturday. A second Democratic lawmaker, state Sen. John Hoffman, and his wife Yvette, were also shot and wounded at their home in Champlin. Gov. Tim Walz said the shooting “appears to be a politically motivated assassin…
  continue reading
 
Security awareness programs don’t happen by accident—they’re built with intent, tested with feedback, and refined over time. In this final episode of the series, we walk through how to develop and execute a successful awareness program, from defining goals and identifying target audiences to choosing content formats and delivery methods. We discuss…
  continue reading
 
A well-informed workforce should be empowered not just to avoid risk—but to report it. In this episode, we explore how organizations build clear, accessible reporting channels that encourage employees to share suspicious activity, policy violations, or near misses without fear of reprisal. We also examine how recurring reports—like monthly phishing…
  continue reading
 
Security training must evolve with the threat landscape—and that means addressing common but high-risk topics like removable media, social engineering, and operational security (OPSEC). In this episode, we explain how removable media—like USB drives and external hard drives—pose significant threats when plugged into unmanaged or infected systems. W…
  continue reading
 
Beyond basic policy understanding, users need targeted training in key risk areas that attackers frequently exploit—especially insiders, passwords, and privileged access. In this episode, we focus on insider threat awareness, teaching employees how to recognize red flags like excessive access, unusual behavior, or data hoarding by peers. We also co…
  continue reading
 
Users are often the first and last line of defense in cybersecurity, and their success depends on clear guidance and ongoing training. In this episode, we focus on policy awareness and handbooks, which provide employees with a foundational understanding of acceptable use, access controls, device handling, and reporting expectations. We explore how …
  continue reading
 
Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger something unexpected—and that’s why recognizing anomalous behavior is such a valuable skill. In this episode, we explore how to identify risky, unexpected, or unintentional actions that may indicate insider threats, compromised accounts, or social engin…
  continue reading
 
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets people, not systems. In this episode, we explore how to build an effective phishing awareness program that trains employees to recognize and report suspicious messages before damage is done. We discuss how simulated phishing campaigns help reinforce tra…
  continue reading
 
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect malicious intent. In this episode, we break down both passive and active reconnaissance techniques used by ethical hackers and adversaries alike. Passive recon relies on publicly available data, such as DNS records, social media, job postings, WHOIS da…
  continue reading
 
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
  continue reading
 
Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see how systems, defenses, and teams hold up under pressure. In this episode, we explore the foundational concepts of penetration testing, starting with physical tests that assess physical security through social engineering, badge cloning, or simulated i…
  continue reading
 
External audits provide an independent review of an organization’s security and compliance posture, often driven by regulatory mandates, certification requirements, or contractual obligations. In this episode, we explore different types of external audits and assessments, starting with regulatory audits that evaluate adherence to laws like HIPAA, P…
  continue reading
 
The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit function is structured within the organization. In this episode, we examine audit committees—teams responsible for planning, conducting, and overseeing internal audits to ensure objectivity and alignment with organizational goals. We discuss how committee…
  continue reading
 
Attestation and internal audits are two of the most powerful tools for ensuring your security program is functioning as intended. In this episode, we start by exploring attestation—formal declarations that certify compliance with policies, procedures, or external frameworks. Attestations are used in vendor contracts, employee training, and system c…
  continue reading
 
Effective data management is critical for both operational success and regulatory compliance, and in this episode, we explore how organizations maintain control over what they collect, where it’s stored, and how long it’s retained. We begin with the concept of data ownership—assigning clear accountability for specific datasets to ensure someone is …
  continue reading
 
Privacy and compliance are deeply intertwined, especially as global regulations push organizations to safeguard personal data across jurisdictions. In this episode, we examine how privacy laws operate at local, national, and international levels—highlighting frameworks like GDPR in Europe and CCPA in California, and exploring how they shape data co…
  continue reading
 
Managing personal data effectively starts with knowing exactly what you have, where it lives, how long you keep it, and what rights users have over it. In this final episode, we explore how to build and maintain a data inventory that tracks types of data collected, processing activities, access permissions, and storage locations. We also discuss re…
  continue reading
 
Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode explores the complex and evolving landscape of privacy laws. We cover key regulations such as the European Union’s GDPR, California’s CCPA, Brazil’s LGPD, and other region-specific rules that govern how personal data is collected, processed, stored, and…
  continue reading
 
Attestation and acknowledgement are critical for ensuring that individuals and third parties formally understand and accept their roles in maintaining security and compliance. In this episode, we explain how attestation involves signing a formal statement that certifies understanding or adherence—used in contexts like security training, policy acce…
  continue reading
 
Failing to meet regulatory or contractual obligations can carry severe consequences, both financially and reputationally. In this episode, we break down the real-world impacts of non-compliance—including fines, sanctions, lawsuits, contract termination, and loss of certifications or business licenses. We examine examples where organizations were pe…
  continue reading
 
Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractual, and internal security requirements—and in this episode, we explore how to make it both accurate and efficient. We cover internal reporting practices, such as monthly compliance dashboards and policy enforcement summaries, as well as external repo…
  continue reading
 
Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship management are critical for maintaining visibility and accountability. In this episode, we explore how organizations track vendor performance through periodic assessments, SLA reviews, compliance reports, and security questionnaires. We highlight how to use co…
  continue reading
 
Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this episode, we break down the types of agreements that define roles, responsibilities, and expectations with external parties. We cover Service-Level Agreements (SLAs), which outline performance and availability targets; Memorandums of Understanding (MOUs) …
  continue reading
 
A growing portion of cybersecurity risk now comes from outside the organization—specifically, through third-party vendors, suppliers, and service providers. In this episode, we examine how to assess and manage vendor risk across the full lifecycle, starting with due diligence during procurement and continuing through onboarding, monitoring, and off…
  continue reading
 
System resilience depends not only on planning but on measurable performance—and in this episode, we explore four key metrics that define how systems behave under failure: Mean Time to Repair (MTTR), Mean Time Between Failures (MTBF), Mean Time to Detect (MTTD), and Mean Time to Respond (MTTR—the other one). MTTR (repair) reflects how long it takes…
  continue reading
 
Recovery objectives define how quickly and how completely a system must return to functionality after a disruption—and in this episode, we explore two of the most critical metrics: Recovery Time Objective (RTO) and Recovery Point Objective (RPO). RTO sets the maximum allowable downtime before business operations suffer unacceptable consequences, wh…
  continue reading
 
Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planning, helping organizations understand which processes matter most and how downtime affects operations. In this episode, we break down how BIAs identify critical systems, estimate recovery time objectives (RTOs) and recovery point objectives (RPOs), an…
  continue reading
 
Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how risk reporting bridges the gap between technical findings and business leadership. We explore how to craft reports that align with the audience: dashboards and trend lines for executives, technical remediation plans for IT, and regulatory compliance summar…
  continue reading
 
Once risks are identified and analyzed, organizations must decide how to respond—and in this episode, we examine the five primary risk management strategies: mitigate, transfer, accept, avoid, and exempt. Mitigation involves applying controls to reduce risk impact or likelihood, such as enabling MFA or installing endpoint protection. Transferring r…
  continue reading
 
Every organization must decide how much risk it is willing to accept in pursuit of its goals—and this decision informs every security investment, policy, and control. In this episode, we break down the concepts of risk appetite (what you’re willing to pursue), risk tolerance (what you’re willing to withstand), and risk thresholds (the hard lines th…
  continue reading
 
Managing risk at scale requires tools that provide structure and visibility, and in this episode, we examine two of the most important: risk registers and key risk indicators (KRIs). A risk register is a living document that catalogs identified risks, their likelihood, potential impact, status, ownership, and mitigation plans. It enables organizati…
  continue reading
 
After risks are identified, they need to be analyzed and prioritized—and that’s where risk scoring comes in. In this episode, we break down both qualitative methods (like high/medium/low ratings and heat maps) and quantitative techniques (like Single Loss Expectancy, Annualized Loss Expectancy, and Annualized Rate of Occurrence). We explain how the…
  continue reading
 
Risk assessments provide the data organizations need to make informed security decisions, and in this episode, we explore the different types of assessments and how they’re conducted. We start by comparing ad hoc, recurring, one-time, and continuous assessments, each of which serves different operational or compliance needs. We explain how to scope…
  continue reading
 
Risk management is the engine that drives strategic decision-making in security, helping organizations focus their efforts on what matters most. In this episode, we explain how to identify risks, evaluate their likelihood and impact, and decide whether to accept, avoid, mitigate, or transfer them. We cover key concepts like threat, vulnerability, a…
  continue reading
 
Having a governance structure is only the beginning—the real value comes from clearly defining roles and responsibilities within that structure. In this episode, we examine the key roles involved in managing data and systems securely, including data owners, custodians, stewards, processors, and controllers. Data owners are responsible for setting c…
  continue reading
 
Security governance relies on a clear structure that defines how decisions are made, who enforces them, and how oversight is maintained. In this episode, we explore governance structures such as boards, steering committees, and cross-functional security councils, each playing a role in shaping strategy, prioritizing risks, and allocating resources.…
  continue reading
 
Security policies must evolve with technology, threat landscapes, and business goals—and that’s why continuous monitoring and revision are essential. In this episode, we explore how organizations maintain governance effectiveness by regularly reviewing policies, tracking their implementation, and auditing their relevance. We cover methods like poli…
  continue reading
 
Security doesn't operate in a vacuum—organizations must navigate a complex web of external considerations that shape how security is governed. In this episode, we explore regulatory requirements (like GDPR, HIPAA, and PCI-DSS), industry standards, and legal obligations that influence security architecture, policies, and practices. We also cover how…
  continue reading
 
Procedures and playbooks are the operational backbone of a mature security program—translating policy into detailed, repeatable steps for responding to specific threats or performing security tasks. In this episode, we explain the difference between general procedures (e.g., user onboarding or access review) and incident-specific playbooks (e.g., m…
  continue reading
 
Standards and controls turn high-level policy into actionable, enforceable security, and in this episode, we explore how physical controls and documented standards create consistent, measurable protection. We discuss the value of security standards like password complexity requirements, encryption levels, and access review intervals that ensure sys…
  continue reading
 
An effective incident response program starts with well-defined policies and procedures that guide every action, role, and escalation during a security event. In this episode, we explore the components of an incident response policy—covering scope, roles, definitions, response timelines, and classification levels. We then break down procedures into…
  continue reading
 
Policies and standards are the written expression of an organization’s security expectations—and in this episode, we explore how they’re developed, communicated, and enforced. We cover essential policies such as Acceptable Use Policies (AUPs), information security policies, disaster recovery policies, and software development lifecycle (SDLC) stand…
  continue reading
 
Security governance is the blueprint for how an organization manages its security strategy, aligns it with business goals, and ensures accountability across all levels of operation. In this episode, we introduce the core elements of effective governance, including the development of security policies, acceptable use standards, change management pro…
  continue reading
 
Cybersecurity isn’t just about blocking attacks and managing firewalls. It’s also about building policies, assessing risk, managing vendors, and aligning security with the overall goals of the business. That’s the focus of Domain Five: Security Program Management and Oversight. This domain gives you the big-picture understanding of how security fit…
  continue reading
 
Packet captures are the most detailed and revealing form of network data available to defenders—showing not just what happened, but exactly how it happened, byte by byte. In this episode, we explain how tools like Wireshark and tcpdump allow analysts to capture and inspect network packets for signs of malicious activity, protocol abuse, data leakag…
  continue reading
 
A well-designed dashboard can turn complex security data into fast, actionable insight—and in this episode, we explore how visualization tools help analysts, engineers, and executives understand the health of their security environments at a glance. We discuss how dashboards consolidate metrics like open vulnerabilities, login anomalies, firewall e…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play