All Episodes

Displaying 1 - 30 of 137 in total

What Is the CISSP and Why It Matters

In this foundational episode, we introduce the Certified Information Systems Security Professional—better known as the CISSP. You’ll learn what the certification repre...

CISSP vs. Other Certifications: Which One’s Right for You?

Choosing the right cybersecurity certification can shape your career for years to come. In this episode, we compare the CISSP to other well-known certifications includ...

Career Impact of the CISSP: Roles, Salaries, Growth

The CISSP isn’t just a certification—it’s a powerful career accelerator. This episode breaks down how earning your CISSP can open doors to high-level roles, raise your...

How to Study and Pass the CISSP Exam: Resources and Mindset

Success on the CISSP exam requires more than memorizing facts—it takes a strategy, the right materials, and a focused mindset. In this episode, we walk through the mos...

The CIA Triad: Confidentiality, Integrity, Availability

Every cybersecurity professional must understand the CIA triad—confidentiality, integrity, and availability. These three pillars form the core of nearly every security...

Security Governance Principles: Frameworks and Strategy

Governance gives structure and direction to an organization’s cybersecurity efforts. In this episode, we explore what it means to build a security strategy aligned wit...

Compliance Requirements: Legal, Regulatory, Contractual

Cybersecurity professionals must navigate a complex landscape of compliance obligations. This episode explains the differences between legal, regulatory, and contractu...

Organizational Roles and Responsibilities

Security is not the job of a single person or department—it’s a shared responsibility across the organization. In this episode, we examine the roles of executives, man...

Professional Ethics and (ISC)² Code of Ethics

Ethics are the backbone of trust in the cybersecurity profession. This episode explores the professional responsibilities outlined in the ISC² Code of Ethics, includin...

Risk Management Concepts: Threats, Vulnerabilities, Risk

Risk management is a cornerstone of cybersecurity, and this episode introduces the essential vocabulary and concepts you need to know. We define threats, vulnerabiliti...

Risk Response and Risk Appetite

Once a risk is identified and assessed, the next critical step is determining how to respond. In this episode, we examine the four primary risk response strategies: ri...

Business Continuity Planning (BCP) Fundamentals

Business Continuity Planning, or BCP, is essential for maintaining operations during unexpected disruptions. This episode explores the key elements of a successful BCP...

Disaster Recovery Planning (DRP) and Continuity of Operations

Disaster Recovery Planning is a focused component of business continuity that addresses the rapid restoration of IT infrastructure and systems. In this episode, we exp...

Security Policies, Standards, Procedures, and Guidelines

A strong cybersecurity program is built on clear and well-documented policies. In this episode, we break down the four foundational types of documentation: policies, s...

Personnel Security: Background Checks, Policies, Termination

People are often the weakest link in cybersecurity, and managing personnel risk is a critical responsibility. In this episode, we discuss best practices for pre-employ...

Security Awareness and Training Programs

Even the best technical defenses can fail if employees don’t understand their security responsibilities. This episode focuses on the development and delivery of effect...

Third-Party Risk Management

Today’s organizations rely heavily on vendors, contractors, and service providers—but each relationship introduces potential risks. In this episode, we cover the princ...

Supply Chain Risk and Due Diligence

Supply chains extend far beyond traditional logistics—they now include digital components, cloud providers, software dependencies, and more. This episode explores how ...

Privacy Principles and Data Protection (GDPR, CCPA)

Protecting personal data is not just a compliance requirement—it’s a trust imperative. In this episode, we dive into key privacy principles such as data minimization, ...

Intellectual Property and Licensing Laws

Cybersecurity professionals must understand how to protect not only data but also intellectual property. This episode unpacks the key types of intellectual property—co...

Legal Systems and Cybercrime Laws Globally

Cybersecurity professionals operate in a legal landscape that spans continents, jurisdictions, and regulatory systems. In this episode, we examine the major types of l...

Security Documentation and Governance Metrics

Effective security governance depends on clear documentation and measurable performance. This episode explains the structure and function of security documentation—inc...

Information Lifecycle and Data Classification

Understanding how data flows through its lifecycle is essential for protecting it appropriately. This episode walks through the phases of the information lifecycle: cr...

Data Sensitivity and Labeling Requirements

Labeling data according to its sensitivity is one of the most overlooked but powerful techniques in cybersecurity. In this episode, we explore what it means for data t...

Ownership and Stewardship Responsibilities

Every piece of information in an organization should have an assigned owner and one or more stewards. In this episode, we define what it means to be a data owner—someo...

Data Retention and Archival Strategies

Keeping data longer than necessary can increase your risk exposure, but disposing of it too early can create legal and operational gaps. This episode addresses how to ...

Privacy Protection and PII Handling

Personally Identifiable Information (PII) is one of the most regulated and targeted types of data in cybersecurity. This episode focuses on how organizations identify,...

Data Remanence and Secure Disposal Techniques

Even when you delete a file, remnants can linger—posing serious security risks. This episode delves into the concept of data remanence and the techniques used to ensur...

Secure Data Handling in Transit and at Rest

Data is constantly on the move—or waiting to be accessed—and must be protected in both states. In this episode, we examine the best practices for securing data at rest...

Media Storage and Sanitization Methods

Digital media—whether it’s a hard drive, USB stick, or backup tape—requires special handling to ensure data remains protected throughout its lifecycle. This episode ex...

Broadcast by