New website: RiskCommentary.ca We see a contradiction: increased need for Enterprise Risk Management, while risk managers report low perceived value of their processes. High Quality Risk Assessment addresses uncertainty and helps solve chronic business problems. Join Edward Robertson, successful ERM practitioner, to discover a simple process that delivers clear value.
…
continue reading
Risk Identification Podcasts
Making Data Better is a podcast about data quality and the impact it has on how we protect, manage, and use the digital data critical to our lives. Through conversation and examination, George Peabody and Stephen Wilson look at data's role in risk management, at use cases like identification, lending, age verification, healthcare, and more personal concerns. Privacy and data ownership are topics, as are our data failures.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
This podcast is for multi-unit managers, new and tenured. You're always on the road between stores and cities. Why not put your critical thinking and creativity to work during this time? Let's drive down this road together.
…
continue reading
The ISO Review Podcast is a production of SimplifyISO. In each episode, we share the latest International Standards Development, and is your resource for getting the most out of your management systems. Your podcast hosts are Howard Fox & Jim Moran. Howard is a Business Coach and Host of the Success InSight Podcast. Jim is an ISO Management System Professional, celebrating 30-plus years delivering ISO support.
…
continue reading
The Village Global podcast takes you inside the world of venture capital and technology, featuring enlightening interviews with entrepreneurs, investors and tech industry leaders. Learn more at www.villageglobal.vc.
…
continue reading
The Datamam Podcast explores how public data is transforming modern industries. The show dives into real-world use cases of web scraping, data intelligence, and AI, from market analysis and competitive benchmarking to ethical debates and automation trends. Each episode breaks down complex data topics into engaging conversations for tech leaders, founders, and data professionals looking to stay ahead in a data-driven world.
…
continue reading
Welcome to We Love PMO the ultimate destination for project management enthusiasts seeking clarity and inspiration in the dynamic world of projects, programmes, portfolios, PMOs, and risk management. I'm your host, Sarah, bringing over a decade of hands-on experience across diverse sectors to your ears. In each episode, we demystify the intricacies of project management, breaking down complex concepts without drowning you in jargon. Whether you're a seasoned pro navigating the twists and tur ...
…
continue reading
1
Leveraging AI Tools for Effective ISO 9001 Risk Analysis and Audit Preparation
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33Welcome back to another insightful episode of the ISO Review Podcast, brought to you by Simplify ISO! This week, Jim and Howard dive deeper into the intersection of artificial intelligence and ISO risk management, building on their previous discussion. With Jim sharing wisdom from over three decades in ISO support, and Howard adding his expertise w…
…
continue reading
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
…
continue reading
1
Using Artificial Intelligence to Strengthen Risk Identification in Your ISO Management Systems
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49By Jim Moran, Howard Fox
…
continue reading
1
Sneak Peek at the ISO 9001 Draft Update: Changes, Clarifications, and Industry Impact
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Jim and Howard chat about the upcoming changes to ISO 9001, offering listeners an exclusive sneak peek at the new Draft International Standard set to shape quality management systems worldwide. DISCUSSION 00:00 Global Reach of ISO 900…
…
continue reading
1
Enhancing Information Security Management Systems with AI
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14Click here to learn about our new DIY ISO 9001 program using AI . Welcome back to the ISO Review Podcast. In this episode, hosts Jim Moran and Howard Fox are joined by special guest Dejan Kosutic, CEO of Advisera. Dejan is a renowned cybersecurity expert for ISO 27001. He is passionate about making compliance accessible. Dejan and Jim discuss how t…
…
continue reading
1
How Positive Intention Can Transform Workplace Culture and Management Systems
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02Click here to learn about our new DIY ISO 9001 program using AI Welcome back to the ISO Review Podcast, your trusted source for the latest in international standards development and practical tips on getting the most out of your management systems. In this episode, hosts Jim Moran and Howard Fox are joined by special guest Michael Kent Hart, the fo…
…
continue reading
1
Scraping for Awareness: How Smart Companies Turn Public Data Into Strategic Advantage
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59In this episode of the Datamam Podcast, we explore how companies use web scraping to move beyond dashboards and build real-time market awareness. From detecting competitor moves and monitoring inventory shifts to uncovering regulatory changes and unauthorized sellers, scraping has become a strategic sensor system. We dive into use cases across CPG,…
…
continue reading
1
Turn Root Cause Analysis on its Head...Use Intention and Positive Focus Instead
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Howard and Jim discuss an innovative approach to traditional root cause analysis inspired by the work of Michael Kent Hart. In this approach, there is a shift in focus from traditional root cause analysis and blame to a more positive,…
…
continue reading
1
Build Your ISO 9001 QMS: Practical, DIY Approach Enhanced by AI Technology - Part III
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Howard and Jim continue with a video series designed to help organizations simplify the process of ISO 9001 certification, using a do-it-yourself approach. Jim shares the journey behind creating the Simplify ISO platform—a user-friend…
…
continue reading
1
Episode 71: Continuous Improvement through Post-Incident Reviews and Risk Reassessment
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Mature security programs improve over time. In this final episode, we explain how to lead post-incident reviews, implement lessons learned, and reassess risk in light of new data. This is where governance, program management, and incident handling come full circle—just as ISACA intends for CISM-certified leaders. Ready to start your journey with co…
…
continue reading
1
Episode 70: Supervising Risk Treatment and Continuous Monitoring
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23Managing risk doesn’t stop with one decision. In this episode, we explore how to supervise treatment activities (mitigation, transfer, acceptance) and establish ongoing monitoring to ensure sustained performance. These continuous oversight tasks are key to mastering Domain 2 and real-world risk leadership. Ready to start your journey with confidenc…
…
continue reading
1
Episode 69: Supervising Risk Identification and Assessment
10:57
10:57
Play later
Play later
Lists
Like
Liked
10:57CISM-certified professionals must oversee—not just conduct—risk assessments. This episode covers how to supervise the process, validate results, and ensure assessments align with business priorities. ISACA expects you to understand both tactical execution and leadership-level oversight. Ready to start your journey with confidence? Learn more at Bar…
…
continue reading
1
Episode 68: Managing and Monitoring Security Compliance with External Parties
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42Vendors, suppliers, and partners all affect your risk posture. This episode explores how to define, enforce, and monitor external security requirements. You’ll learn how to handle audits, compliance failures, and communication with third parties—real-world skills with high relevance on the CISM exam. Ready to start your journey with confidence? Lea…
…
continue reading
1
Episode 67: Integrating Security Requirements into Organizational Processes
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42In this episode, we cover how to embed security into core business workflows—from procurement to development and beyond. You’ll learn how to ensure that security requirements become part of how the organization works, not just what it reacts to. Expect exam questions on integration in Domains 1, 3, and 4. Ready to start your journey with confidence…
…
continue reading
1
Episode 66: Aligning Security Programs with Operational Business Objectives
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59Security must support the mission. This episode teaches you how to align your security initiatives with day-to-day business operations, process priorities, and performance expectations. This strategic alignment is central to Domain 3 and may appear in scenario questions about resource conflicts or program goals. Ready to start your journey with con…
…
continue reading
1
Episode 65: Evaluating and Reporting Information Security Metrics
11:37
11:37
Play later
Play later
Lists
Like
Liked
11:37Metrics turn performance into visibility. This episode shows you how to define, collect, and report information security metrics that support governance, justify decisions, and improve outcomes. You’ll also learn how ISACA expects you to evaluate effectiveness—a frequent target in Domain 3 and 4 questions. Ready to start your journey with confidenc…
…
continue reading
1
Episode 64: Compiling and Presenting Effective Security Reports
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56CISM candidates must know how to report program results and risk insights to both executives and operational teams. This episode explains how to compile relevant data, translate it into actionable insights, and tailor the message to your audience. Exam questions will test your ability to do all three well. Ready to start your journey with confidenc…
…
continue reading
1
Episode 63: Defining and Communicating Security Roles and Responsibilities
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39Effective governance depends on clear roles and responsibilities. In this episode, we walk through how to assign, document, and communicate who owns what in your security program. From the board to front-line staff, clarity reduces risk and improves accountability—both on the exam and in real practice. Ready to start your journey with confidence? L…
…
continue reading
1
Episode 62: Gaining Senior Leadership Commitment and Stakeholder Support
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02Security programs rise or fall on leadership support. This episode teaches you how to earn and sustain executive commitment, communicate risk in business terms, and align your initiatives with organizational strategy. These skills show up in both Domain 1 and complex CISM scenario questions. Ready to start your journey with confidence? Learn more a…
…
continue reading
1
Episode 61: Communicating the Business Case and Gaining Stakeholder Buy-In
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09CISM leaders must champion security through influence, not just authority. In this episode, we cover how to build and communicate compelling business cases for security investments. Learn how to present risk, value, and outcomes in language stakeholders understand—an essential Domain 1 and 3 skill for exam day. Ready to start your journey with conf…
…
continue reading
1
Episode 60: Building Effective Security Budgets and ROI Analysis
12:08
12:08
Play later
Play later
Lists
Like
Liked
12:08Budgeting is about more than asking for money—it’s about justifying value. This episode explains how to estimate costs, present return on investment, and align security spending with business priorities. Expect questions on budgeting tradeoffs, prioritization, and executive persuasion on the CISM exam. Ready to start your journey with confidence? L…
…
continue reading
1
Episode 59: Integrating Information Security into Corporate Governance
12:19
12:19
Play later
Play later
Lists
Like
Liked
12:19Security can’t operate in a silo. This episode covers how to embed information security into broader corporate governance, ensuring risk, compliance, and audit processes align with your program. Learn how to advocate for security at the board level—just as ISACA expects of successful CISM candidates. Ready to start your journey with confidence? Lea…
…
continue reading
1
Episode 58: Implementing Information Security Governance Frameworks
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20Frameworks turn strategy into structure. In this episode, we explain how to implement security governance frameworks like COBIT and ISO in ways that support accountability, transparency, and control. If the exam asks you how to operationalize governance, this episode gives you the language to answer it. Ready to start your journey with confidence? …
…
continue reading
1
Episode 57: Establishing Information Security Strategy Aligned with Organizational Goals
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06Security strategy must serve the business. This episode walks you through aligning your security vision, priorities, and investment with what the organization truly values—its mission, objectives, and risk tolerance. This alignment is a core competency for CISM holders and appears frequently in Domain 1 questions. Ready to start your journey with c…
…
continue reading
1
Episode 56: Identifying Internal and External Influences on Security Strategy
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29Domain 1 isn’t just about governance—it’s about understanding what shapes strategy. This episode teaches you how to identify organizational drivers, market forces, regulatory shifts, and threat evolution, and how to reflect these in your security planning. These insights often form the basis of scenario questions. Ready to start your journey with c…
…
continue reading
1
Episode 55: Conducting Meaningful Post-Incident Reviews
11:45
11:45
Play later
Play later
Lists
Like
Liked
11:45CISM professionals must know how to lead structured post-incident reviews. This episode explains how to capture lessons learned, evaluate what went wrong (and right), and recommend improvements. You’ll also learn how to document findings in a way that supports governance and future risk mitigation. Ready to start your journey with confidence? Learn…
…
continue reading
1
Episode 54: Techniques for Secure Recovery and Restoration
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10After eradication comes recovery—and it must be secure. This episode shows you how to safely bring systems back online, validate their integrity, and ensure that no backdoors or residual threats remain. These post-incident steps are essential in both the real world and your CISM Domain 4 study strategy. Ready to start your journey with confidence? …
…
continue reading
1
Episode 53: Techniques for Incident Eradication
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22Eradication is where you eliminate the root cause of an incident. This episode walks you through how to fully remove malware, close exploited vulnerabilities, and validate that threats are no longer active. You’ll also learn how to document these efforts—something ISACA expects you to be able to do on the exam. Ready to start your journey with conf…
…
continue reading
1
Episode 52: Incident Response Communications: Reporting, Notification, and Escalation
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54Incident response is only effective if the right people are informed at the right time. In this episode, we explore how to build a communication plan that includes internal reporting, external notifications, and stakeholder escalation. CISM candidates must understand how to handle communication flow under pressure. Ready to start your journey with …
…
continue reading
1
Episode 51: Effective Incident Containment Methods
11:40
11:40
Play later
Play later
Lists
Like
Liked
11:40Containment is a critical phase in incident response—and a highly tested concept in Domain 4. This episode covers the strategies and decision points for containing incidents, from isolating affected systems to segmenting networks and communicating quickly. Learn how to apply containment while minimizing operational disruption. Ready to start your j…
…
continue reading
1
Episode 50: Digital Forensics and Evidence Collection Basics
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46You don’t have to be a forensic analyst—but you do need to understand the basics. This episode explains how evidence is collected, preserved, and documented during an incident. We also explore the chain of custody, admissibility, and the role of forensic data in investigations—high-value knowledge for the exam. Ready to start your journey with conf…
…
continue reading
1
Episode 49: Incident Investigation Methodologies
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11CISM candidates must understand how to manage an incident investigation. This episode covers how to gather evidence, document timelines, identify root causes, and follow structured investigative methods. You’ll learn how to support legal compliance and continuous improvement—all key areas of Domain 4. Ready to start your journey with confidence? Le…
…
continue reading
1
Episode 48: Incident Management Tools and Techniques
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50Tools can streamline detection, coordination, and resolution during incidents. In this episode, we explore common technologies used in incident management, from SIEM platforms to communication systems. Learn what ISACA wants you to know about selecting, deploying, and using these tools strategically. Ready to start your journey with confidence? Lea…
…
continue reading
1
Episode 47: Training, Testing, and Evaluating Your Incident Management Capabilities
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56Your incident response plan is only as strong as your ability to execute it. This episode covers how to train staff, conduct simulations, and evaluate performance to ensure your organization is prepared for real-world incidents. These lifecycle elements are important for both the exam and maturing your security function. Ready to start your journey…
…
continue reading
1
Episode 46: Incident Classification and Categorization Methods
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13Classifying incidents accurately enables proper response. In this episode, we discuss how to build an incident classification system based on impact, type, and severity—key for escalation and prioritization. These concepts are frequently tested in Domain 4 and appear in both technical and business-aligned scenarios. Ready to start your journey with…
…
continue reading
1
Episode 45: Testing, Maintenance, and Improvement of Your DRP
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55A DRP must be tested, maintained, and improved over time to remain effective. This episode explains how to schedule recovery tests, evaluate outcomes, and implement improvements based on performance data. These lifecycle management concepts show up across multiple CISM domains and often appear in scenario-based questions. Ready to start your journe…
…
continue reading
1
Episode 44: Designing Your Disaster Recovery Plan (DRP)
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21Disaster recovery planning ensures technology and data availability during a crisis. In this episode, we break down how to design and document a DRP that complements your BCP and incident response plan. You'll learn key recovery metrics, backup strategies, and restoration procedures—vital for the exam and real-world execution. Ready to start your j…
…
continue reading
1
Episode 43: Building Your Business Continuity Plan (BCP)
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52Business continuity is broader than disaster recovery—and the CISM exam knows it. This episode explains how to build a BCP that supports organizational resilience, continuity of operations, and stakeholder assurance. Learn the difference between continuity and crisis management and how ISACA frames these within Domain 4. Ready to start your journey…
…
continue reading
1
Episode 42: Conducting Business Impact Analysis (BIA
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23CISM Domain 4 expects you to know how to conduct a business impact analysis. In this episode, we walk through how to identify critical functions, assess downtime impacts, and define recovery objectives like RTO and RPO. BIA supports planning for continuity, disaster recovery, and incident response—all tested areas on the exam. Ready to start your j…
…
continue reading
1
Episode 41: Maintaining and Updating Your Incident Response Plan
9:16
9:16
Play later
Play later
Lists
Like
Liked
9:16An outdated incident response plan is a liability. This episode teaches you how to maintain IR documentation over time, incorporate lessons learned, and update plans to reflect changes in business structure, threat landscape, or regulatory requirements. Expect exam questions that test your ability to keep IR plans relevant and effective. Ready to s…
…
continue reading
1
Episode 40: Designing and Documenting the Incident Response Plan
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07Domain 4 begins here. This episode walks you through how to design a comprehensive incident response plan—from defining roles and escalation paths to documenting procedures for detection, containment, and recovery. These are foundational skills for managing security incidents and passing the exam. Ready to start your journey with confidence? Learn …
…
continue reading
1
Episode 39: Communications and Reporting for the Information Security Program
8:59
8:59
Play later
Play later
Lists
Like
Liked
8:59Strong security programs communicate effectively. In this episode, we explain how to report program performance, risks, and control status to senior leaders, stakeholders, and technical staff. You’ll learn how to tailor your message and present strategic metrics—skills often tested in scenario-based exam questions. Ready to start your journey with …
…
continue reading
1
Episode 38: Contractual Security Requirements and Ongoing Vendor Monitoring
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Once a vendor is onboarded, the work doesn’t stop. This episode covers how to include security clauses in contracts, define SLAs, and monitor vendor compliance over time. We also address continuous assessment techniques and escalation procedures—high-yield content for your exam and real-world leadership. Ready to start your journey with confidence?…
…
continue reading
1
Episode 37: Vendor Risk Assessment and Selection
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35Third-party vendors can expand capabilities—or introduce serious risk. This episode explains how to evaluate vendors before selection by conducting security assessments, verifying compliance, and aligning third-party practices with internal governance. These are must-know processes for Domain 3 and 4 questions. Ready to start your journey with conf…
…
continue reading
1
Episode 36: Developing Engaging Information Security Awareness and Training Programs
9:21
9:21
Play later
Play later
Lists
Like
Liked
9:21Security programs fail without user participation. This episode explores how to build training and awareness initiatives that promote secure behavior and reinforce governance. You’ll learn how to design, deliver, and evaluate training that supports strategic goals and satisfies exam objectives in Domain 3. Ready to start your journey with confidenc…
…
continue reading
1
Episode 35: Techniques for Information Security Control Testing and Evaluation
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Testing controls is how you validate effectiveness—and it’s a must-know area for the exam. In this episode, we walk through test design, performance validation, and how to evaluate controls in both technical and organizational contexts. If you’re studying Domain 3, this is essential listening. Ready to start your journey with confidence? Learn more…
…
continue reading
1
Episode 34: Implementing and Integrating Information Security Controls
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08CISM candidates must know how to implement controls—not just select them. This episode covers how to plan, deploy, and integrate security controls across the enterprise. You’ll also learn about common integration challenges, stakeholder alignment, and performance tracking. This is a high-impact Domain 3 topic. Ready to start your journey with confi…
…
continue reading
1
Episode 33: Designing and Selecting Effective Information Security Controls
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15Controls are at the heart of any security program. This episode shows you how to choose the right controls based on risk assessments, business impact, and regulatory requirements. We also explain how control selection is tested on the exam and how to approach questions with a governance mindset. Ready to start your journey with confidence? Learn mo…
…
continue reading
1
Episode 32: Developing and Using Information Security Program Metrics
9:18
9:18
Play later
Play later
Lists
Like
Liked
9:18If you can’t measure it, you can’t manage it. In this episode, we cover how to create meaningful metrics for tracking the effectiveness of your security program. You’ll learn how to align metrics with strategic goals, define KPIs, and communicate results—critical for demonstrating program value on the CISM exam. Ready to start your journey with con…
…
continue reading
1
Episode 31: Writing Actionable Procedures and Guidelines
9:51
9:51
Play later
Play later
Lists
Like
Liked
9:51Policies set direction—but procedures make things happen. This episode teaches you how to translate security policies into actionable procedures and practical guidelines. You’ll learn what ISACA expects in terms of clarity, accountability, and alignment with business operations—concepts tested heavily in Domain 3. Ready to start your journey with c…
…
continue reading