Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Risk Identification Podcasts

show episodes
 
Artwork

1
Risk Commentary

Edward Robertson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
New website: RiskCommentary.ca We see a contradiction: increased need for Enterprise Risk Management, while risk managers report low perceived value of their processes. High Quality Risk Assessment addresses uncertainty and helps solve chronic business problems. Join Edward Robertson, successful ERM practitioner, to discover a simple process that delivers clear value.
  continue reading
 
Artwork

1
Making Data Better

Lockstep Consulting Pty Ltd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Making Data Better is a podcast about data quality and the impact it has on how we protect, manage, and use the digital data critical to our lives. Through conversation and examination, George Peabody and Stephen Wilson look at data's role in risk management, at use cases like identification, lending, age verification, healthcare, and more personal concerns. Privacy and data ownership are topics, as are our data failures.
  continue reading
 
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
  continue reading
 
Artwork

1
Drive

C-Store Center

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
This podcast is for multi-unit managers, new and tenured. You're always on the road between stores and cities. Why not put your critical thinking and creativity to work during this time? Let's drive down this road together.
  continue reading
 
The ISO Review Podcast is a production of SimplifyISO. In each episode, we share the latest International Standards Development, and is your resource for getting the most out of your management systems. Your podcast hosts are Howard Fox & Jim Moran. Howard is a Business Coach and Host of the Success InSight Podcast. Jim is an ISO Management System Professional, celebrating 30-plus years delivering ISO support.
  continue reading
 
Artwork
 
The Village Global podcast takes you inside the world of venture capital and technology, featuring enlightening interviews with entrepreneurs, investors and tech industry leaders. Learn more at www.villageglobal.vc.
  continue reading
 
The Datamam Podcast explores how public data is transforming modern industries. The show dives into real-world use cases of web scraping, data intelligence, and AI, from market analysis and competitive benchmarking to ethical debates and automation trends. Each episode breaks down complex data topics into engaging conversations for tech leaders, founders, and data professionals looking to stay ahead in a data-driven world.
  continue reading
 
Artwork

1
We Love PMO

Sarah Hawkins

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to We Love PMO the ultimate destination for project management enthusiasts seeking clarity and inspiration in the dynamic world of projects, programmes, portfolios, PMOs, and risk management. I'm your host, Sarah, bringing over a decade of hands-on experience across diverse sectors to your ears. In each episode, we demystify the intricacies of project management, breaking down complex concepts without drowning you in jargon. Whether you're a seasoned pro navigating the twists and tur ...
  continue reading
 
Loading …
show series
 
Welcome back to another insightful episode of the ISO Review Podcast, brought to you by Simplify ISO! This week, Jim and Howard dive deeper into the intersection of artificial intelligence and ISO risk management, building on their previous discussion. With Jim sharing wisdom from over three decades in ISO support, and Howard adding his expertise w…
  continue reading
 
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
  continue reading
 
Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Jim and Howard chat about the upcoming changes to ISO 9001, offering listeners an exclusive sneak peek at the new Draft International Standard set to shape quality management systems worldwide. DISCUSSION 00:00 Global Reach of ISO 900…
  continue reading
 
Click here to learn about our new DIY ISO 9001 program using AI . Welcome back to the ISO Review Podcast. In this episode, hosts Jim Moran and Howard Fox are joined by special guest Dejan Kosutic, CEO of Advisera. Dejan is a renowned cybersecurity expert for ISO 27001. He is passionate about making compliance accessible. Dejan and Jim discuss how t…
  continue reading
 
Click here to learn about our new DIY ISO 9001 program using AI Welcome back to the ISO Review Podcast, your trusted source for the latest in international standards development and practical tips on getting the most out of your management systems. In this episode, hosts Jim Moran and Howard Fox are joined by special guest Michael Kent Hart, the fo…
  continue reading
 
In this episode of the Datamam Podcast, we explore how companies use web scraping to move beyond dashboards and build real-time market awareness. From detecting competitor moves and monitoring inventory shifts to uncovering regulatory changes and unauthorized sellers, scraping has become a strategic sensor system. We dive into use cases across CPG,…
  continue reading
 
Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Howard and Jim discuss an innovative approach to traditional root cause analysis inspired by the work of Michael Kent Hart. In this approach, there is a shift in focus from traditional root cause analysis and blame to a more positive,…
  continue reading
 
Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Howard and Jim continue with a video series designed to help organizations simplify the process of ISO 9001 certification, using a do-it-yourself approach. Jim shares the journey behind creating the Simplify ISO platform—a user-friend…
  continue reading
 
Mature security programs improve over time. In this final episode, we explain how to lead post-incident reviews, implement lessons learned, and reassess risk in light of new data. This is where governance, program management, and incident handling come full circle—just as ISACA intends for CISM-certified leaders. Ready to start your journey with co…
  continue reading
 
Managing risk doesn’t stop with one decision. In this episode, we explore how to supervise treatment activities (mitigation, transfer, acceptance) and establish ongoing monitoring to ensure sustained performance. These continuous oversight tasks are key to mastering Domain 2 and real-world risk leadership. Ready to start your journey with confidenc…
  continue reading
 
CISM-certified professionals must oversee—not just conduct—risk assessments. This episode covers how to supervise the process, validate results, and ensure assessments align with business priorities. ISACA expects you to understand both tactical execution and leadership-level oversight. Ready to start your journey with confidence? Learn more at Bar…
  continue reading
 
Vendors, suppliers, and partners all affect your risk posture. This episode explores how to define, enforce, and monitor external security requirements. You’ll learn how to handle audits, compliance failures, and communication with third parties—real-world skills with high relevance on the CISM exam. Ready to start your journey with confidence? Lea…
  continue reading
 
In this episode, we cover how to embed security into core business workflows—from procurement to development and beyond. You’ll learn how to ensure that security requirements become part of how the organization works, not just what it reacts to. Expect exam questions on integration in Domains 1, 3, and 4. Ready to start your journey with confidence…
  continue reading
 
Security must support the mission. This episode teaches you how to align your security initiatives with day-to-day business operations, process priorities, and performance expectations. This strategic alignment is central to Domain 3 and may appear in scenario questions about resource conflicts or program goals. Ready to start your journey with con…
  continue reading
 
Metrics turn performance into visibility. This episode shows you how to define, collect, and report information security metrics that support governance, justify decisions, and improve outcomes. You’ll also learn how ISACA expects you to evaluate effectiveness—a frequent target in Domain 3 and 4 questions. Ready to start your journey with confidenc…
  continue reading
 
CISM candidates must know how to report program results and risk insights to both executives and operational teams. This episode explains how to compile relevant data, translate it into actionable insights, and tailor the message to your audience. Exam questions will test your ability to do all three well. Ready to start your journey with confidenc…
  continue reading
 
Effective governance depends on clear roles and responsibilities. In this episode, we walk through how to assign, document, and communicate who owns what in your security program. From the board to front-line staff, clarity reduces risk and improves accountability—both on the exam and in real practice. Ready to start your journey with confidence? L…
  continue reading
 
Security programs rise or fall on leadership support. This episode teaches you how to earn and sustain executive commitment, communicate risk in business terms, and align your initiatives with organizational strategy. These skills show up in both Domain 1 and complex CISM scenario questions. Ready to start your journey with confidence? Learn more a…
  continue reading
 
CISM leaders must champion security through influence, not just authority. In this episode, we cover how to build and communicate compelling business cases for security investments. Learn how to present risk, value, and outcomes in language stakeholders understand—an essential Domain 1 and 3 skill for exam day. Ready to start your journey with conf…
  continue reading
 
Budgeting is about more than asking for money—it’s about justifying value. This episode explains how to estimate costs, present return on investment, and align security spending with business priorities. Expect questions on budgeting tradeoffs, prioritization, and executive persuasion on the CISM exam. Ready to start your journey with confidence? L…
  continue reading
 
Security can’t operate in a silo. This episode covers how to embed information security into broader corporate governance, ensuring risk, compliance, and audit processes align with your program. Learn how to advocate for security at the board level—just as ISACA expects of successful CISM candidates. Ready to start your journey with confidence? Lea…
  continue reading
 
Frameworks turn strategy into structure. In this episode, we explain how to implement security governance frameworks like COBIT and ISO in ways that support accountability, transparency, and control. If the exam asks you how to operationalize governance, this episode gives you the language to answer it. Ready to start your journey with confidence? …
  continue reading
 
Security strategy must serve the business. This episode walks you through aligning your security vision, priorities, and investment with what the organization truly values—its mission, objectives, and risk tolerance. This alignment is a core competency for CISM holders and appears frequently in Domain 1 questions. Ready to start your journey with c…
  continue reading
 
Domain 1 isn’t just about governance—it’s about understanding what shapes strategy. This episode teaches you how to identify organizational drivers, market forces, regulatory shifts, and threat evolution, and how to reflect these in your security planning. These insights often form the basis of scenario questions. Ready to start your journey with c…
  continue reading
 
CISM professionals must know how to lead structured post-incident reviews. This episode explains how to capture lessons learned, evaluate what went wrong (and right), and recommend improvements. You’ll also learn how to document findings in a way that supports governance and future risk mitigation. Ready to start your journey with confidence? Learn…
  continue reading
 
After eradication comes recovery—and it must be secure. This episode shows you how to safely bring systems back online, validate their integrity, and ensure that no backdoors or residual threats remain. These post-incident steps are essential in both the real world and your CISM Domain 4 study strategy. Ready to start your journey with confidence? …
  continue reading
 
Eradication is where you eliminate the root cause of an incident. This episode walks you through how to fully remove malware, close exploited vulnerabilities, and validate that threats are no longer active. You’ll also learn how to document these efforts—something ISACA expects you to be able to do on the exam. Ready to start your journey with conf…
  continue reading
 
Incident response is only effective if the right people are informed at the right time. In this episode, we explore how to build a communication plan that includes internal reporting, external notifications, and stakeholder escalation. CISM candidates must understand how to handle communication flow under pressure. Ready to start your journey with …
  continue reading
 
Containment is a critical phase in incident response—and a highly tested concept in Domain 4. This episode covers the strategies and decision points for containing incidents, from isolating affected systems to segmenting networks and communicating quickly. Learn how to apply containment while minimizing operational disruption. Ready to start your j…
  continue reading
 
You don’t have to be a forensic analyst—but you do need to understand the basics. This episode explains how evidence is collected, preserved, and documented during an incident. We also explore the chain of custody, admissibility, and the role of forensic data in investigations—high-value knowledge for the exam. Ready to start your journey with conf…
  continue reading
 
CISM candidates must understand how to manage an incident investigation. This episode covers how to gather evidence, document timelines, identify root causes, and follow structured investigative methods. You’ll learn how to support legal compliance and continuous improvement—all key areas of Domain 4. Ready to start your journey with confidence? Le…
  continue reading
 
Tools can streamline detection, coordination, and resolution during incidents. In this episode, we explore common technologies used in incident management, from SIEM platforms to communication systems. Learn what ISACA wants you to know about selecting, deploying, and using these tools strategically. Ready to start your journey with confidence? Lea…
  continue reading
 
Your incident response plan is only as strong as your ability to execute it. This episode covers how to train staff, conduct simulations, and evaluate performance to ensure your organization is prepared for real-world incidents. These lifecycle elements are important for both the exam and maturing your security function. Ready to start your journey…
  continue reading
 
Classifying incidents accurately enables proper response. In this episode, we discuss how to build an incident classification system based on impact, type, and severity—key for escalation and prioritization. These concepts are frequently tested in Domain 4 and appear in both technical and business-aligned scenarios. Ready to start your journey with…
  continue reading
 
A DRP must be tested, maintained, and improved over time to remain effective. This episode explains how to schedule recovery tests, evaluate outcomes, and implement improvements based on performance data. These lifecycle management concepts show up across multiple CISM domains and often appear in scenario-based questions. Ready to start your journe…
  continue reading
 
Disaster recovery planning ensures technology and data availability during a crisis. In this episode, we break down how to design and document a DRP that complements your BCP and incident response plan. You'll learn key recovery metrics, backup strategies, and restoration procedures—vital for the exam and real-world execution. Ready to start your j…
  continue reading
 
Business continuity is broader than disaster recovery—and the CISM exam knows it. This episode explains how to build a BCP that supports organizational resilience, continuity of operations, and stakeholder assurance. Learn the difference between continuity and crisis management and how ISACA frames these within Domain 4. Ready to start your journey…
  continue reading
 
CISM Domain 4 expects you to know how to conduct a business impact analysis. In this episode, we walk through how to identify critical functions, assess downtime impacts, and define recovery objectives like RTO and RPO. BIA supports planning for continuity, disaster recovery, and incident response—all tested areas on the exam. Ready to start your j…
  continue reading
 
An outdated incident response plan is a liability. This episode teaches you how to maintain IR documentation over time, incorporate lessons learned, and update plans to reflect changes in business structure, threat landscape, or regulatory requirements. Expect exam questions that test your ability to keep IR plans relevant and effective. Ready to s…
  continue reading
 
Domain 4 begins here. This episode walks you through how to design a comprehensive incident response plan—from defining roles and escalation paths to documenting procedures for detection, containment, and recovery. These are foundational skills for managing security incidents and passing the exam. Ready to start your journey with confidence? Learn …
  continue reading
 
Strong security programs communicate effectively. In this episode, we explain how to report program performance, risks, and control status to senior leaders, stakeholders, and technical staff. You’ll learn how to tailor your message and present strategic metrics—skills often tested in scenario-based exam questions. Ready to start your journey with …
  continue reading
 
Once a vendor is onboarded, the work doesn’t stop. This episode covers how to include security clauses in contracts, define SLAs, and monitor vendor compliance over time. We also address continuous assessment techniques and escalation procedures—high-yield content for your exam and real-world leadership. Ready to start your journey with confidence?…
  continue reading
 
Third-party vendors can expand capabilities—or introduce serious risk. This episode explains how to evaluate vendors before selection by conducting security assessments, verifying compliance, and aligning third-party practices with internal governance. These are must-know processes for Domain 3 and 4 questions. Ready to start your journey with conf…
  continue reading
 
Security programs fail without user participation. This episode explores how to build training and awareness initiatives that promote secure behavior and reinforce governance. You’ll learn how to design, deliver, and evaluate training that supports strategic goals and satisfies exam objectives in Domain 3. Ready to start your journey with confidenc…
  continue reading
 
Testing controls is how you validate effectiveness—and it’s a must-know area for the exam. In this episode, we walk through test design, performance validation, and how to evaluate controls in both technical and organizational contexts. If you’re studying Domain 3, this is essential listening. Ready to start your journey with confidence? Learn more…
  continue reading
 
CISM candidates must know how to implement controls—not just select them. This episode covers how to plan, deploy, and integrate security controls across the enterprise. You’ll also learn about common integration challenges, stakeholder alignment, and performance tracking. This is a high-impact Domain 3 topic. Ready to start your journey with confi…
  continue reading
 
Controls are at the heart of any security program. This episode shows you how to choose the right controls based on risk assessments, business impact, and regulatory requirements. We also explain how control selection is tested on the exam and how to approach questions with a governance mindset. Ready to start your journey with confidence? Learn mo…
  continue reading
 
If you can’t measure it, you can’t manage it. In this episode, we cover how to create meaningful metrics for tracking the effectiveness of your security program. You’ll learn how to align metrics with strategic goals, define KPIs, and communicate results—critical for demonstrating program value on the CISM exam. Ready to start your journey with con…
  continue reading
 
Policies set direction—but procedures make things happen. This episode teaches you how to translate security policies into actionable procedures and practical guidelines. You’ll learn what ISACA expects in terms of clarity, accountability, and alignment with business operations—concepts tested heavily in Domain 3. Ready to start your journey with c…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play