All Episodes
Displaying 21 - 40 of 137 in total
Episode 21: Legal Systems and Cybercrime Laws Globally
Cybersecurity professionals operate in a legal landscape that spans continents, jurisdictions, and regulatory systems. In this episode, we examine the major types of l...

Episode 22: Security Documentation and Governance Metrics
Effective security governance depends on clear documentation and measurable performance. This episode explains the structure and function of security documentation—inc...

Episode 23: Information Lifecycle and Data Classification
Understanding how data flows through its lifecycle is essential for protecting it appropriately. This episode walks through the phases of the information lifecycle: cr...

Episode 24: Data Sensitivity and Labeling Requirements
Labeling data according to its sensitivity is one of the most overlooked but powerful techniques in cybersecurity. In this episode, we explore what it means for data t...

Episode 25: Ownership and Stewardship Responsibilities
Every piece of information in an organization should have an assigned owner and one or more stewards. In this episode, we define what it means to be a data owner—someo...

Episode 26: Data Retention and Archival Strategies
Keeping data longer than necessary can increase your risk exposure, but disposing of it too early can create legal and operational gaps. This episode addresses how to ...

Episode 27: Privacy Protection and PII Handling
Personally Identifiable Information (PII) is one of the most regulated and targeted types of data in cybersecurity. This episode focuses on how organizations identify,...

Episode 28: Data Remanence and Secure Disposal Techniques
Even when you delete a file, remnants can linger—posing serious security risks. This episode delves into the concept of data remanence and the techniques used to ensur...

Episode 29: Secure Data Handling in Transit and at Rest
Data is constantly on the move—or waiting to be accessed—and must be protected in both states. In this episode, we examine the best practices for securing data at rest...

Episode 30: Media Storage and Sanitization Methods
Digital media—whether it’s a hard drive, USB stick, or backup tape—requires special handling to ensure data remains protected throughout its lifecycle. This episode ex...

Episode 31: Asset Inventory Management
You can’t protect what you don’t know you have. In this episode, we focus on the importance of maintaining a comprehensive and accurate inventory of all information as...

Episode 32: Data Sovereignty and Jurisdictional Control
In a global digital economy, where your data resides can determine which laws apply to it. This episode explains data sovereignty—the principle that data is subject to...

Episode 33: Secure Use of Cloud Storage and Shared Resources
Cloud services offer scalability and convenience, but they also introduce unique security risks—especially when sharing infrastructure with other tenants. In this epis...

Episode 34: Backup Controls and Data Recovery
Backup and recovery plans are your insurance against data loss. In this episode, we explore the critical controls necessary to ensure backups are available, secure, an...

Episode 35: Handling of Sensitive Systems and High-Value Assets
Some systems and data are too critical to treat like everything else. This episode focuses on how organizations identify, secure, and manage sensitive systems and high...

Episode 36: Logging, Monitoring, and Metadata Retention for Assets
Without visibility, security is just guesswork. In this episode, we explore how logging and monitoring give security teams the information they need to detect, investi...

Episode 37: Secure Design Principles: Defense in Depth, Least Privilege
Designing secure systems isn’t just about applying tools—it’s about embedding principles. This episode introduces two foundational security design concepts: defense in...

Episode 38: Security Models: Bell-LaPadula, Biba, Clark-Wilson
Security models are theoretical frameworks that help define how systems enforce access control, integrity, and confidentiality. In this episode, we review the three cl...

Episode 39: Architecture Layers: OSI, System, Application
Security must be applied across all layers of a system, from the physical infrastructure to the application interface. In this episode, we explore the layered nature o...

Episode 40: Secure Hardware Architecture and TPM
Security isn’t only about software—hardware matters too. This episode introduces key elements of secure hardware architecture, including trusted computing bases, secur...
