show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork
 
“Pod Save America” cohost Tommy Vietor thought foreign policy was boring and complicated until he got the education of a lifetime working for President Obama’s National Security Council. On “Pod Save the World,” he and former deputy national security adviser Ben Rhodes break down the latest global developments and bring you behind the scenes with the people who were there. New episodes every Wednesday. Subscribe to Friends of the Pod! Your subscription makes Crooked’s work possible and gives ...
  continue reading
 
Artwork

1
History Behind News Program

Adel Aali, History Behind News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Others cover the news. We uncover the history behind it. We make in-depth history researched and written by eminent scholars enjoyable and accessible to everyone. Our motto: "bridging scholarly works to everyday news." Adel Aali, podcast host, is a former attorney & healthcare entrepreneur with a long and deep passion for history. Adel started this program to provide a better understanding of news through history. More here: https://HistoryBehindNews.com/ Watch this program on YouTube: https ...
  continue reading
 
Artwork

1
Occupied Thoughts

Occupied Thoughts by FMEP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
From the Foundation for Middle East Peace (FMEP), Occupied Thoughts amplifies the voices of FMEP grantees and partners, offers critical framing, and promote new ideas and new angles on the many issues connected to achieving justice, security, and peace for Palestinians and Israelis. FMEP works to defend and support Palestinian rights, end Israel’s occupation of the West Bank, Gaza Strip, and East Jerusalem, and ensure a just and secure future for Palestinians and Israelis. FMEP advances this ...
  continue reading
 
Artwork

1
The DSR Network

The DSR Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
This podcast will take you on a smart, direct, sometimes scary, sometimes profane, sometimes hilarious tour of the inner workings of American power and of the impact of our leaders and their policies on our standing in the world. Hosted by noted author and commentator David Rothkopf and featuring regulars Rosa Brooks of Georgetown Law School, Kori Schake of AEI, and Ed Luce of the Financial Times, the program will be the lively, smart dinner table conversation on the big issues of the day th ...
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Artwork

1
The Application Security Podcast

Chris Romeo and Robert Hurlbut

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
  continue reading
 
CNN's lead DC anchor and chief Washington correspondent, Jake Tapper, hosts this two-hour long weekday afternoon program, with headlines from around the country and the world, the top stories in national and international news, politics, health, money, the environment, sports and popular culture. The Lead also concentrates on bringing stories that aren't found on front pages—buried leads—to the forefront.
  continue reading
 
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Artwork

1
Connect

Axis Communications

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
  continue reading
 
Artwork

1
CISO Tradecraft®

CISO Tradecraft®

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership. © Copyright 2025, National Security Corporation. All Rights Reserved
  continue reading
 
The Bare Metal Cyber CISM Prepcast is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers ...
  continue reading
 
Artwork
 
Sharyl Attkisson is a nonpartisan investigative journalist, five-time Emmy Award winner and recipient of the Edward R. Murrow award for investigative reporting. She is the New York Times bestselling author of "The Smear," "Stonewalled," "Slanted," and "Follow the Science." She is managing editor of the Sun. morning national TV news program “Full Measure with Sharyl Attkisson.” Find out why her podcasts and Tedx talks have received many millions of views. Do your own research. Make up your ow ...
  continue reading
 
Radio National Breakfast daily stories separated for easy listening. Radio National Breakfast is Australia's only daily national radio current affairs program, synonymous with agenda-setting news coverage, breaking news and a place where you will hear the most significant stories impacting the lives of all Australians wherever they live. It is a pre-eminent thought leader in Australia.
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
  continue reading
 
Artwork

1
Labor Express Radio

Jerry Mead - Lucero

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Labor Express Radio is Chicago's only English language labor news and current affairs radio program. “News for working people, by working people.” Our program covers issues in the labor movement locally, nationally, and internationally. The program also addresses issues of concern to working people such as housing, education, health care, immigrants rights, the environment and U.S. foreign policy, from a working class viewpoint. Labor Express Radio airs Sunday nights at 8:00 PM on Chicago's ...
  continue reading
 
Artwork

1
The Elara Edge

Regia Multimedia Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
  continue reading
 
Artwork

1
Inside Java

Chad Arimura, David Delabassee

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Inside Java is a podcast for Java Developers brought to you directly from the people that make Java at Oracle. We'll discuss the language, the JVM, OpenJDK, platform security, innovation projects like Loom and Panama, and everything in between.
  continue reading
 
America’s premier Sunday morning public affairs program. For nearly 70 years, Face the Nation has sought to help audiences understand how current events affect their lives. Today, that mission remains the same. Hear moderator Margaret Brennan’s illuminating and informative interviews with elected officials, policy experts and foreign leaders. Face the Nation airs Sundays at 10:30 AM, ET on the CBS Television Network and at 12 PM, ET on the CBS News Streaming Network. Face the Nation is also ...
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Where the course of history has been decided on the battlefield. These are the battles that made us -- a detailed, entertaining, and tangent-free program about history's greatest battles. In this podcast we journey through the constancy of human conflict, where the fates of nations and the course of global history have been decided on the battlefield. This podcast delves into our world-history's most significant and seminal battles, exploring not just the events themselves but their profound ...
  continue reading
 
TMZ Sports is a daily live-chat program hosted by Michael Babcock and Mojo Muhtadi covering the biggest stories at the cross section between sports and pop culture.
  continue reading
 
The hosts of NPR's All Things Considered help you make sense of a major news story and what it means for you, in 15 minutes. New episodes six days a week, Sunday through Friday. Support NPR and get your news sponsor-free with Consider This+. Learn more at plus.npr.org/considerthis
  continue reading
 
Meet Patrick Hayes, investment management counsel at Calfee, Halter & Griswold and your host for The Securities Compliance Podcast presented by the National Society of Compliance Professionals. A personal master class for the securities legal and compliance professional, Patrick’s passion is to help you put Compliance In Context™ by combining the technical expertise of industry thought leaders and innovators with the practical experience of doers and key decision-makers. Listen today to help ...
  continue reading
 
Established in 2022, Coffee with the Council is an ongoing podcast series produced by the PCI Security Standards Council, a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments worldwide. The podcast series seeks to engage the payment card industry by communicating Council news and updates; sharing interviews, panel discussions or case studies from third-parties; offering coverage from Counci ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
Breakeven Brothers

Bradley Bernard, Bennett Bernard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Breakeven Brothers podcast explores how AI is transforming the landscape for professionals. Join brothers Bradley Bernard and Bennett Bernard, a software engineer and a Certified Public Accountant, as they offer a unique perspective on how automation and intelligent agents are transforming knowledge work. They explore the shift from manual tasks to strategic oversight, the growing importance of prompt engineering, and the critical skills you'll need to not just survive, but thrive in an ...
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Artwork
 
Welcome to “Beyond the Broken Dream,” a California-focused podcast about the betrayal of desires for economic security and the hope that remains despite it. “Beyond the Broken Dream” was created by the 2024-2025 Calafia fellows. Calafia is a statewide journalism program by Youth Leadership Institute.
  continue reading
 
Artwork

1
The Rachel Maddow Show

Rachel Maddow, MSNBC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Rachel Maddow Show airs Mondays at 9pm ET on MSNBC, and shortly thereafter in this feed. **SPECIAL TO THIS FEED: The January 6th hearings and corresponding analysis from Rachel Maddow and other MSNBC panelists is also archived here.
  continue reading
 
Loading …
show series
 
Security must support the mission. This episode teaches you how to align your security initiatives with day-to-day business operations, process priorities, and performance expectations. This strategic alignment is central to Domain 3 and may appear in scenario questions about resource conflicts or program goals. Ready to start your journey with con…
  continue reading
 
In today’s episode, Democratic strategist Simon Rosenberg makes a crucial point: During months of debate about President Trump’s now-signed budget bill, there was very little public debate about what its explosion in Immigration and Customs Enforcement funding will inflict on America. Rosenberg chalks this up in part to Democrats’ failure to engage…
  continue reading
 
Vanishing nutrients in our food: exactly how ultra-processing is making us sick. Also, why it's illogical to support illegal immigration while pushing for higher American wages. Order Sharyl's bestseller “Slanted: How the News Media Taught Us to Love Censorship and Hate Journalism” at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Harper Collins⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠…
  continue reading
 
Ilya Kneppelhout is on a quest to make becoming unreachable, cool. He is one of the brains behind the Offline Club — an organisation designing events which are forcing people to put away their phones and get off their screens. The movement officially started in Amsterdam last year and now it's landed in Adelaide at the Illuminate festival over the …
  continue reading
 
It's fifty years this year since NAIDOC Week began - and another group of Australians has been recognised with NAIDOC awards for their work among indigenous Australians. Aunty Rosalie Kickett won the "female elder of the year" award, for her work in mental health and against domestic violence. Guest: Rosalie Kickett, female elder of the year Produc…
  continue reading
 
Victoria's Premier has pledged to convene an Anti-Hate Taskforce, following a spate of anti-semitic attacks in Melbourne over the weekend. A 34-year-old man — from New South Wales allegedly — set alight the front door of a synagogue in East Melbourne while 20 people were inside sharing a meal on Friday night. Guest: Dvir Abramovich, Chair of the An…
  continue reading
 
A warning to Aboriginal and Torres Strait Islander listeners that this story mentions the name of an Indigenous person who has died, used with the permission of their family. Justice and accountability … that's what the family of Kumanjayi Walker say they are hoping comes from today's coronial inquest findings into the fatal police shooting of the …
  continue reading
 
Immigration and Customs Enforcement is set to become the largest federal law enforcement agency in the United States, according to the law and policy institute, The Brennan Center for Justice. This comes in the wake of US President Donald Trump's Big Beautiful Bill passing last week. So how quickly, and how effectively, will government agencies car…
  continue reading
 
The Pacific has developed as a popular route of entry for drug smugglers, with 2.5 tonnes of cocaine discovered in a ship off the shore of New Caledonia. But the drug continues to get through, with the UN's latest global drug report confirming Australia and New Zealand are the world's biggest users. Guest: Stephen Jay, Commander of the Australian F…
  continue reading
 
If you're a parent, decisions about vaccines have gotten a lot more confusing recently. Robert F. Kennedy, Jr.'s health department is walking back longstanding recommendations. NPR's Pien Huang speaks with a pediatrician and a vaccine researcher to discuss how the changes may affect public health - and how frontline conversations are going between …
  continue reading
 
Israel is sending a delegation to Qatar to resume discussions on a potential ceasefire and hostage release as Israeli Prime Minister prepares to visit US President Donald Trump at the White House. It comes after Mr Trump said last week that Israel had agreed to conditions for a 60-day ceasefire in Gaza and promised to be "very firm" with Mr Netanya…
  continue reading
 
More than 70 people have been killed in flash flooding in Texas Floods at the weekend including multiple children at a summer camp on the Guadalupe river. Dozens remain missing and authorities say there is "no cap" to the broader tally of the missing. GUEST: Joey Palacios, reporter for Texas Public Radio PRODUCER: Grace Stranger…
  continue reading
 
This week on Face the Nation, disastrou⁠s flash floods kill dozens inTexas⁠. We'll have the latest on the tragedy. Plus, after a⁠ long weeklobbying for votes and cutting deals with his fellow Republicans,⁠ thepresident spent the Fourth of July celebrating the nation's 249th birthday by enacting his signature tax cut and spending plan. But Democrats…
  continue reading
 
Please enjoy this encore of Career Notes. Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer…
  continue reading
 
Mature security programs improve over time. In this final episode, we explain how to lead post-incident reviews, implement lessons learned, and reassess risk in light of new data. This is where governance, program management, and incident handling come full circle—just as ISACA intends for CISM-certified leaders. Ready to start your journey with co…
  continue reading
 
Managing risk doesn’t stop with one decision. In this episode, we explore how to supervise treatment activities (mitigation, transfer, acceptance) and establish ongoing monitoring to ensure sustained performance. These continuous oversight tasks are key to mastering Domain 2 and real-world risk leadership. Ready to start your journey with confidenc…
  continue reading
 
CISM-certified professionals must oversee—not just conduct—risk assessments. This episode covers how to supervise the process, validate results, and ensure assessments align with business priorities. ISACA expects you to understand both tactical execution and leadership-level oversight. Ready to start your journey with confidence? Learn more at Bar…
  continue reading
 
Vendors, suppliers, and partners all affect your risk posture. This episode explores how to define, enforce, and monitor external security requirements. You’ll learn how to handle audits, compliance failures, and communication with third parties—real-world skills with high relevance on the CISM exam. Ready to start your journey with confidence? Lea…
  continue reading
 
In this episode, we cover how to embed security into core business workflows—from procurement to development and beyond. You’ll learn how to ensure that security requirements become part of how the organization works, not just what it reacts to. Expect exam questions on integration in Domains 1, 3, and 4. Ready to start your journey with confidence…
  continue reading
 
Metrics turn performance into visibility. This episode shows you how to define, collect, and report information security metrics that support governance, justify decisions, and improve outcomes. You’ll also learn how ISACA expects you to evaluate effectiveness—a frequent target in Domain 3 and 4 questions. Ready to start your journey with confidenc…
  continue reading
 
CISM candidates must know how to report program results and risk insights to both executives and operational teams. This episode explains how to compile relevant data, translate it into actionable insights, and tailor the message to your audience. Exam questions will test your ability to do all three well. Ready to start your journey with confidenc…
  continue reading
 
Effective governance depends on clear roles and responsibilities. In this episode, we walk through how to assign, document, and communicate who owns what in your security program. From the board to front-line staff, clarity reduces risk and improves accountability—both on the exam and in real practice. Ready to start your journey with confidence? L…
  continue reading
 
Security programs rise or fall on leadership support. This episode teaches you how to earn and sustain executive commitment, communicate risk in business terms, and align your initiatives with organizational strategy. These skills show up in both Domain 1 and complex CISM scenario questions. Ready to start your journey with confidence? Learn more a…
  continue reading
 
CISM leaders must champion security through influence, not just authority. In this episode, we cover how to build and communicate compelling business cases for security investments. Learn how to present risk, value, and outcomes in language stakeholders understand—an essential Domain 1 and 3 skill for exam day. Ready to start your journey with conf…
  continue reading
 
Budgeting is about more than asking for money—it’s about justifying value. This episode explains how to estimate costs, present return on investment, and align security spending with business priorities. Expect questions on budgeting tradeoffs, prioritization, and executive persuasion on the CISM exam. Ready to start your journey with confidence? L…
  continue reading
 
Security can’t operate in a silo. This episode covers how to embed information security into broader corporate governance, ensuring risk, compliance, and audit processes align with your program. Learn how to advocate for security at the board level—just as ISACA expects of successful CISM candidates. Ready to start your journey with confidence? Lea…
  continue reading
 
Frameworks turn strategy into structure. In this episode, we explain how to implement security governance frameworks like COBIT and ISO in ways that support accountability, transparency, and control. If the exam asks you how to operationalize governance, this episode gives you the language to answer it. Ready to start your journey with confidence? …
  continue reading
 
Security strategy must serve the business. This episode walks you through aligning your security vision, priorities, and investment with what the organization truly values—its mission, objectives, and risk tolerance. This alignment is a core competency for CISM holders and appears frequently in Domain 1 questions. Ready to start your journey with c…
  continue reading
 
Domain 1 isn’t just about governance—it’s about understanding what shapes strategy. This episode teaches you how to identify organizational drivers, market forces, regulatory shifts, and threat evolution, and how to reflect these in your security planning. These insights often form the basis of scenario questions. Ready to start your journey with c…
  continue reading
 
CISM professionals must know how to lead structured post-incident reviews. This episode explains how to capture lessons learned, evaluate what went wrong (and right), and recommend improvements. You’ll also learn how to document findings in a way that supports governance and future risk mitigation. Ready to start your journey with confidence? Learn…
  continue reading
 
After eradication comes recovery—and it must be secure. This episode shows you how to safely bring systems back online, validate their integrity, and ensure that no backdoors or residual threats remain. These post-incident steps are essential in both the real world and your CISM Domain 4 study strategy. Ready to start your journey with confidence? …
  continue reading
 
Eradication is where you eliminate the root cause of an incident. This episode walks you through how to fully remove malware, close exploited vulnerabilities, and validate that threats are no longer active. You’ll also learn how to document these efforts—something ISACA expects you to be able to do on the exam. Ready to start your journey with conf…
  continue reading
 
Incident response is only effective if the right people are informed at the right time. In this episode, we explore how to build a communication plan that includes internal reporting, external notifications, and stakeholder escalation. CISM candidates must understand how to handle communication flow under pressure. Ready to start your journey with …
  continue reading
 
Containment is a critical phase in incident response—and a highly tested concept in Domain 4. This episode covers the strategies and decision points for containing incidents, from isolating affected systems to segmenting networks and communicating quickly. Learn how to apply containment while minimizing operational disruption. Ready to start your j…
  continue reading
 
You don’t have to be a forensic analyst—but you do need to understand the basics. This episode explains how evidence is collected, preserved, and documented during an incident. We also explore the chain of custody, admissibility, and the role of forensic data in investigations—high-value knowledge for the exam. Ready to start your journey with conf…
  continue reading
 
CISM candidates must understand how to manage an incident investigation. This episode covers how to gather evidence, document timelines, identify root causes, and follow structured investigative methods. You’ll learn how to support legal compliance and continuous improvement—all key areas of Domain 4. Ready to start your journey with confidence? Le…
  continue reading
 
Tools can streamline detection, coordination, and resolution during incidents. In this episode, we explore common technologies used in incident management, from SIEM platforms to communication systems. Learn what ISACA wants you to know about selecting, deploying, and using these tools strategically. Ready to start your journey with confidence? Lea…
  continue reading
 
Your incident response plan is only as strong as your ability to execute it. This episode covers how to train staff, conduct simulations, and evaluate performance to ensure your organization is prepared for real-world incidents. These lifecycle elements are important for both the exam and maturing your security function. Ready to start your journey…
  continue reading
 
Classifying incidents accurately enables proper response. In this episode, we discuss how to build an incident classification system based on impact, type, and severity—key for escalation and prioritization. These concepts are frequently tested in Domain 4 and appear in both technical and business-aligned scenarios. Ready to start your journey with…
  continue reading
 
A DRP must be tested, maintained, and improved over time to remain effective. This episode explains how to schedule recovery tests, evaluate outcomes, and implement improvements based on performance data. These lifecycle management concepts show up across multiple CISM domains and often appear in scenario-based questions. Ready to start your journe…
  continue reading
 
Disaster recovery planning ensures technology and data availability during a crisis. In this episode, we break down how to design and document a DRP that complements your BCP and incident response plan. You'll learn key recovery metrics, backup strategies, and restoration procedures—vital for the exam and real-world execution. Ready to start your j…
  continue reading
 
Business continuity is broader than disaster recovery—and the CISM exam knows it. This episode explains how to build a BCP that supports organizational resilience, continuity of operations, and stakeholder assurance. Learn the difference between continuity and crisis management and how ISACA frames these within Domain 4. Ready to start your journey…
  continue reading
 
CISM Domain 4 expects you to know how to conduct a business impact analysis. In this episode, we walk through how to identify critical functions, assess downtime impacts, and define recovery objectives like RTO and RPO. BIA supports planning for continuity, disaster recovery, and incident response—all tested areas on the exam. Ready to start your j…
  continue reading
 
An outdated incident response plan is a liability. This episode teaches you how to maintain IR documentation over time, incorporate lessons learned, and update plans to reflect changes in business structure, threat landscape, or regulatory requirements. Expect exam questions that test your ability to keep IR plans relevant and effective. Ready to s…
  continue reading
 
Domain 4 begins here. This episode walks you through how to design a comprehensive incident response plan—from defining roles and escalation paths to documenting procedures for detection, containment, and recovery. These are foundational skills for managing security incidents and passing the exam. Ready to start your journey with confidence? Learn …
  continue reading
 
Strong security programs communicate effectively. In this episode, we explain how to report program performance, risks, and control status to senior leaders, stakeholders, and technical staff. You’ll learn how to tailor your message and present strategic metrics—skills often tested in scenario-based exam questions. Ready to start your journey with …
  continue reading
 
Once a vendor is onboarded, the work doesn’t stop. This episode covers how to include security clauses in contracts, define SLAs, and monitor vendor compliance over time. We also address continuous assessment techniques and escalation procedures—high-yield content for your exam and real-world leadership. Ready to start your journey with confidence?…
  continue reading
 
Third-party vendors can expand capabilities—or introduce serious risk. This episode explains how to evaluate vendors before selection by conducting security assessments, verifying compliance, and aligning third-party practices with internal governance. These are must-know processes for Domain 3 and 4 questions. Ready to start your journey with conf…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play