Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Education Podcasts

show episodes
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
Simply ICS Cyber

Simply Cyber Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
  continue reading
 
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Artwork
 
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
  continue reading
 
Artwork

1
CyBytes

Nik Mohanlal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CyBytes is a podcast that features bite-sized conversations with tech and cybersecurity pros - sharing insights, stories, and actionable advice to help you navigate and thrive in the industry
  continue reading
 
Artwork

1
The cyber weekly

Deogratius Okello, Josephine Olok and Angella Nabbanja

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
  continue reading
 
Artwork

1
Security Happy Hour

The Cyber Warrior

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
The CYSA Audio Course is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
  continue reading
 
Artwork
 
Cyber Octet Pvt. Ltd. is an IT Solution, Security, Training and Services Company providing best solution to its clients for any development solution to Securing data. We have end to end expertise and have served several Government, Institutions, and Private Sectors. https://cyberoctet.com/
  continue reading
 
Artwork

1
Soulful CXO Podcast

Soulful CXO, ITSPmagazine Soulful CXO, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Soulful CXO show is hosted by Dr. Rebecca Wynn, a renowned CISO and cybersecurity expert. The podcast focuses on the intersection of technology, business, and humanity, exploring how these three areas impact each other. Dr. Wynn interviews guests, including business leaders, entrepreneurs, and experts in various fields, to share insights and experiences on cybersecurity, risk management, and leadership. The podcast aims to provide a fresh perspective on how technology can be leveraged to ...
  continue reading
 
Artwork

1
Unmasked

Assura, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
  continue reading
 
Artwork

1
South West Cyber Beat

South West Cyber Resilience Centre

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are a Police led not for profit company. We offer simple, free and easily understood cyber security guidance for small and medium sized businesses. Remember it doesnt have to be complicated or expensive to give your business the cyber protection and peace of mind that you need. All this from industry experts who partner with us in the cyber security arena.
  continue reading
 
Artwork

1
GCA Hootworthy

Georgia Cyber Academy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Where Georgia Cyber Academy (GCA) shares hootworthy stories of their Champions rising up, aiming high, and soaring. GCA is an online, tuition-free, public charter school serving students in grades K-12 throughout the state of Georgia. We provide a learning environment where students are empowered to reach their full academic potential through active participation in live interactive classes and an engaging curriculum that supports individualized and differentiated student learning paths.
  continue reading
 
Artwork

1
Orpheus Talks

Orpheus Cyber

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Orpheus Talks, your go-to source for all things cyber threat intelligence and cybersecurity. Join the Orpheus team and other industry experts as they delve into the latest trends and threats in the digital world, and provide actionable insights on how to protect yourself and your organisation.https://orpheus-cyber.com/https://twitter.com/orpheuscyberhttps://www.linkedin.com/company/orpheuscyber/
  continue reading
 
Artwork

1
CYBER24

CYBER24

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CYBER24 is a weekly podcast with one simple goal: to help business leaders and policy makers understand the often-intimidating subjects of cybersecurity and data privacy. Each week, our panel of rotating experts discusses the top cybersecurity issues and stories in the news. We decode the cybersecurity jargon to help you understand the complexities of cybersecurity and to help you ask the right questions of your IT and cybersecurity teams.
  continue reading
 
Artwork

1
Girls Talk Cyber

girlstalkcyber

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
  continue reading
 
"Control-Alt-Alumni" is your gateway to the world of cybersecurity education and careers. Join us as we sit down with students, educators, and industry leaders to discuss the ins and outs of cyber education, the skills companies are looking for, and how to land your dream job in the field. Whether you're a student, teacher, or professional, this podcast offers actionable insights, inspiring stories, and expert advice to help you navigate the ever-evolving cybersecurity landscape.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course— your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.
  continue reading
 
Artwork

1
Verdicts and Voices

Canadian Bar Association

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Verdicts and Voices is a monthly podcast hosted by Alison Crawford in which we unpack key legal stories and celebrate the 150th anniversary of the Supreme Court of Canada. This special series delves into legal news, landmark cases and features expert guests who provide unique insights into Canada’s justice system.
  continue reading
 
Join Michael Merlin, Founder of Merlin Wealth Management at Rockefeller Global Family Office and various colleagues and experts as they take the complex and make it simple. In each episode Michael and friends discuss the key tenants of financial longevity: maximizing your wealth span and securing your financial future, spending money guilt-free while still growing your assets and enjoying your bigger future with confidence. Don't let financial complexity hold you back from living your best l ...
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
Security Explained

Chris Grayson, Drew Porter, Logan Lamb

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
  continue reading
 
This show is about doing business globally. We provide expert insights for Canadian companies looking to enter new markets and stay competitive. Whether your business has international presence, is considering the beginning of an international expansion or, if you’re in the middle of revising your expansion plan, then this show is for you.
  continue reading
 
Artwork

1
Ars Boni

idunivienna

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Ars Boni deals with Digitalisation, Media, Social Crisis (in particular the Covid-19 Crisis) and the Law, in different legal fields and in different countries. Ars Boni is a podcast launched by the Department of Innovation and Digitalisation in Law, University of Vienna. Prof. Dr. Nikolaus Forgó serves as its host.
  continue reading
 
Artwork

1
OMG Cyber!

Martin Overton

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about all things cyber security, news, views and clues; from yesteryear, today and even the future. Stories and interviews about cyber security, breaches, malware, hacking, social engineering, best practice, lessons learnt, and anything else related. Theme music: Please Listen Carefully, courtesy of Jahzarr http://freemusicarchive.org/music/Jahzzar/Tumbling_Dishes_Like_Old-Mans_Wishes/Please_Listen_Carefully Music licensed under https://creativecommons.org/licenses/by-sa/4.0/ Cover ...
  continue reading
 
Artwork

1
The Curious Ulsterman

The Curious Ulsterman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast with you in mind. It was created to equip you with the critical real-life skills and wisdom that you weren't taught in school. This show will give you the tools to not just get by in adulthood, but to ultimately thrive. I'll be interviewing people from all walks of life, including CEO's, veterans, therapists, and a host of other characters that will bring the life lessons and wisdom that they have learned on their life's journey so far, right to this podcast.
  continue reading
 
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
  continue reading
 
Loading …
show series
 
The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not from isolated tools but from coherent architectures that link cryptography, identity, networks, applications, and supply chains into a unified strategy. Frameworks such as NIST CSF, ISO…
  continue reading
 
“Age or education doesn’t matter in cybersecurity. What matters is initiative.” — Bhavika Ketani In this episode, we interview Bhavika Ketani, a cybersecurity lecturer at Curtin University, discussing the importance of education in the cybersecurity field. They explore Bhavika's journey into teaching, the challenges faced in cybersecurity education…
  continue reading
 
Send us a text Dive into the critical world of software development security with Sean Gerber as he tackles Domain 8.3 in this knowledge-packed CISSP Question Thursday episode. We examine fifteen challenging questions that address the security controls essential for protecting code throughout the development lifecycle. Discover why static applicati…
  continue reading
 
The Department of Defense is making one of the most significant changes to cybersecurity compliance in over a decade: a move from the Risk Management Framework (RMF) to the Cybersecurity Risk Management Construct (CSRMC). For defense contractors, integrators, and managed service providers, this shift will redefine how compliance is achieved and mea…
  continue reading
 
If I were starting my cybersecurity career from scratch in 2025, this is exactly what I’d do. No fluff, no unnecessary certs, and no wasted time. Too many professionals are burning out chasing certs or bootcamps without real clarity. In this episode, I share my complete 6-step cybersecurity roadmap, the one I’d follow if I had to start all over aga…
  continue reading
 
Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
  continue reading
 
Industrial control systems (ICS) and operational technology (OT) are the backbone of modern society—powering electricity, water, gas, communications, manufacturing, chemicals, and even medical technology. But what happens when these systems must be secured in the middle of a warzone? On this episode of Simply ICS Cyber, hosts Don C. Weber and Tom V…
  continue reading
 
Verdicts & Voices is a legal current affairs podcast presented by the Canadian Bar Association. With her retinue of expert guests, host Alison Crawford keeps listeners up to date on news, views, and stories about the law and the justice system in Canada. In this episode, writer and documentarian Karin Wells discusses her new book, Women Who Woke up…
  continue reading
 
A quiet data breach at Stellantis could be more than it seems. In this episode of Darnley’s Cyber Café, we take you inside the cyber underbelly of today’s automakers and explore how a single compromise can ripple through an entire industry. What’s really at stake when cars, code, and global supply chains collide? Grab your coffee and tune in to fin…
  continue reading
 
SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
  continue reading
 
Join Michael Merlin and guests Adrienne Heart, Head of Philanthropy, Rockefeller Global Family Office and Mallory Findley, Head of Family Values & Dynamics, Rockefeller Capital Management, as they discuss helping clients find the “why” in their charitable giving. This material was prepared by Rockefeller Capital Management. The views expressed of t…
  continue reading
 
Send us a text Ready to master the critical domain of Identity and Access Management for your CISSP exam? This comprehensive rapid review demystifies Domain 5, which accounts for 13% of all exam questions—knowledge you absolutely cannot skip. Dive deep into the fundamentals as we explore controlling physical and logical access to assets—from inform…
  continue reading
 
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending agains…
  continue reading
 
Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloged in the OWASP Top 10, including injection, misconfiguration, and weak session management, as well as the specific risks of mobile and API security. Case studies of T-Mobile and Pelot…
  continue reading
 
Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, continuous integration and delivery, and the challenges of configuration drift. Case studies of pipeline compromises show how trusted automation can be weaponized, with vulnerabilities …
  continue reading
 
This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The…
  continue reading
 
With the dissolution of traditional network perimeters, identity has emerged as the central gatekeeper of enterprise security. This week explores authentication, authorization, and access control as critical building blocks of trust. Students examine the weaknesses of passwords, the rise of multi-factor authentication, and the push toward passwordl…
  continue reading
 
Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern tr…
  continue reading
 
This week introduces security as a foundational discipline rather than a collection of scattered tools. Learners will examine the enduring concepts of confidentiality, integrity, and availability, understanding how these principles anchor defenses across decades of technological change. The CIA triad is presented as a lens through which design choi…
  continue reading
 
Join us on the latest episode of The Ciphered Reality Podcast, where your hosts Mike and Mari sit down with Steven from Newbridge Solutions to explore the impact of AI and the future of evolving IVR systems. In this episode, we unpack: How dynamically adapting IVR systems transform customer experience The direct impact on business toplines and grow…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The cybersecurity landscape is evolving rapidly with AI development creat…
  continue reading
 
Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Ransomware Protection. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe with ever-evolving AI Landscape. Tune in for an insightful episod…
  continue reading
 
Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: University Security. How to stay safe online where malicious threat actors lurk on every corner? Identifying & understanding more about how malware is offered as a service online. Tune in for…
  continue reading
 
Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Student & Parent Cyberawareness. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe from the latest malware expanding through copyright phi…
  continue reading
 
Got a question or comment? Message us here! 🔎 This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@a…
  continue reading
 
One of the most common questions Defense Industrial Base (DIB) contractors face is: “What CMMC Level do I need in order to respond to this solicitation?” The answer depends entirely on the contract language and the type of information your organization will handle. Let’s break it down into plain terms. Step 1: Look for DFARS 252.204-7012 or NIST SP…
  continue reading
 
When a fraudster posing as a vendor stole more than $1.5 million from the City of Baltimore, it exposed how even large public agencies can fall victim to Business Email Compromise (BEC) scams. In this episode of Darnley’s Cyber Café, we break down how the attack happened, why these schemes work, and what public-sector organizations and everyday fin…
  continue reading
 
🚨 The kernel-level security revolution you can't ignore — a must-listen with Liz Rice Eden Naftali and Amitai sit down with Liz Rice, Chief Open Source Officer at Isovalent (Cisco), and a global expert in eBPF, containers, and Kubernetes security. 🎙️ In this episode: How eBPF is reshaping cloud security from the ground up Practical strategies to ta…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv The effective management of digital identities throughout their lifecycle…
  continue reading
 
https://youtube.com/live/jweGSLb_zgU SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.t…
  continue reading
 
https://youtube.com/live/Slam57hVRYs I have been in GRC for years and I have just transitioned into Cloud. Day 0: How did I do it Preparation of GRC vs Cloud Open topics 🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/4632689196662784 SIGN UP FOR FREE COURSES 📚 http://convocourse…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Dive into the complex world of security models as we unpack Domain 3.2 of…
  continue reading
 
Image of Timeline The Department of Defense’s Cybersecurity Maturity Model Certification (CMMC) program is moving from planning to execution. With the Final CMMC Acquisition Rule now published, contractors across the Defense Industrial Base (DIB) must prepare for phased implementation beginning November 10, 2025. Understanding the timeline is criti…
  continue reading
 
https://youtube.com/live/VuiCYeVHr2s Lets check out the biggest GRC news as of AUG 2025! We will also take questions. 🎙️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! 😍 https://streamyard.com/pal/d/4632689196662784 SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop…
  continue reading
 
CMMC LEVEL 1 SELF-ASSESSMENT QUICK ENTRY GUIDE VERSION 4.0 The Defense Industrial Base (DIB), compliance with the Cybersecurity Maturity Model Certification (CMMC) is no longer optional, it’s a prerequisite for doing business with the Department of Defense (DoD). While CMMC Level 1 is the foundational tier, it still requires contractors to demonstr…
  continue reading
 
Got a question or comment? Message us here! 💡 This week on The SOC Brief, we’re breaking down incident response (IR) ... why it’s essential, how to build a strong plan, and what SOC teams can do to turn chaos into control. From preparation and containment to recovery and lessons learned, learn how a solid IR strategy saves time, money, and reputati…
  continue reading
 
In this episode of Simply ICS Cyber, co-hosts Don C. Weber and Tom VanNorman are joined by maritime and energy cybersecurity expert Marco (Marc) Ayala — vOT-CISO, Senior Principal Advisor for Energy, Oil, and Gas at the Cyber Infrastructure Protection Innovation Center (CIPIC), President of InfraGard Houston Members Alliance, and National Sector Ch…
  continue reading
 
For prime contractors in the Defense Industrial Base (DIB), meeting Cybersecurity Maturity Model Certification (CMMC) requirements is no longer optional, it’s a contractual obligation. But compliance doesn’t stop with your own systems. As a prime, you’re also responsible for ensuring that your subcontractors meet the appropriate CMMC level before t…
  continue reading
 
Wir sprechen erneut (vgl. Ars Boni #532) mit MMag. Michael Hofstätter. Er ist Rechtsanwalt in Innsbruck und hat einen Mandanten vertreten, der anlässlich einer postalischen Lieferung von 85g Cannabis von von der polizeilichen Sicherstellung seines Handys betroffen war. Nach einer Vorabentscheidung das EuGH, C-548/21, hat das LVwG Tirol der Maßnahme…
  continue reading
 
Dawn Capelli, Head of OT-CERT at Dragos, unpacks the evolving risks to Operational Technology. From nation-state attacks on Ukraine’s infrastructure to hacktivists targeting U.S. water systems, she explains the PIPEDREAM malware, the top five SANS critical OT controls, and how Dragos’ OT-CERT program offers free resources to help organizations defe…
  continue reading
 
In this episode, I share news from my recent trip to the UK, noticing how it seems to have reached the epic proportions of a Black Mirror episode; from the absurd TV licensing program to the new Digital ID Brit cards that will track your behavior. I also explore how the UK may be serving as a testing ground for new levels of behavioral surveillance…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Security models can be one of the most challenging concepts for CISSP can…
  continue reading
 
The Cybersecurity Maturity Model Certification (CMMC) has been years in the making, evolving from draft concepts to the rulemaking stage. With the publication of the interim rule in 48 CFR (which formally embeds CMMC 2.0 into the Defense Federal Acquisition Regulation Supplement, or DFARS), many in the Defense Industrial Base (DIB) are asking the s…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play