Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Vulnerability Management Podcasts
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Where entrepreneurs get real about their stories and turn failures into lessons for success. Hosted by Megan Bruneau, The Failure Factor explores the journey of business owners, entrepreneurs and thought leaders who have faced significant challenges, persevered through adversity, and emerged triumphant providing listeners with insights to navigate their own entrepreneurial paths There's a myth out there that failure is career-ending and that success is achieved without any bumps in the road. ...
…
continue reading
🔊 The Defuse Podcast: Personal Threat Management for High-Risk Lives When the threats are real, the stakes are high — so what actually works?" Hosted by Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management — this podcast lifts the lid on the proven methods used to keep prominent individuals, executives, and private clients safer. Each episode features straight-talking conversations with trusted experts on: Stalking, fixated ...
…
continue reading
Managing Our Minds Where vulnerability isn’t weakness—it’s the spark that ignites growth. Hosted by Dominique Easley, Super Bowl Champion & NFL vet, and Damien Jacobs, NFL vet—this podcast creates a raw, unfiltered space for honest conversations about mental health, resilience, and personal growth. We sit down with high school, college, and professional athletes, as well as entrepreneurs, top execs, and entertainers, to uncover the real stories behind their success. They open up about upbrin ...
…
continue reading
Welcome to The Church of Kreis Podcast - where artistry meets authenticity. Hosted by Tony Award-winner Levi Kreis, this is a space for seekers, misfits, creatives, and old souls who crave deeper conversation. Whether he's unpacking the emotional landscape of a musical theatre tour, reflecting on spiritual growth, or rediscovering his voice after a season of silence, Levi invites you to join him in real-time transformation. Part personal journal, part spiritual companion, part backstage pass ...
…
continue reading
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
…
continue reading
What is your Working Genius? The Working Genius podcast is designed to help people identify their natural gifts and find joy and fulfillment in their work and life. Leadership and teamwork expert Patrick Lencioni and his team explore the Working Genius model and provide practical advice for applying this framework individually, at our jobs and in our homes. What type of work makes you thrive? Are you burning out because your job requires you to work in your areas of frustration? How can team ...
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Rob Fonte is the host of the Leadership Jam Session Podcast, where every other week you'll get to hear leaders at all levels of management share their practical solutions to the management challenges you face every day. On this podcast, Rob shares leadership experiences with listeners by bringing in leaders from all different levels to “Jam” on a variety of leadership topics. Some of the best insights are captured from just listening and learning from each other as they share their experienc ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
A show dedicated to helping accounting professionals confidently and competently offer quality accounting services to get paid what they are worth. Each episode is conversational with tips and tricks to help you apply the principles of M.A.P. as they relate to starting and building a successful accounting business. Topics include Marketing, Lead Generation, Ideal Clients, Pricing, Price Strategies, Accounting Services, Value Added Services, Workflow, Practice Management, Staff Training, Clie ...
…
continue reading
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
…
continue reading
A Podcast About Leadership, Change and Personal Growth to Help You Thrive in Life and Leadership
…
continue reading
Transform your relationships. Speak your truth. Get what you deserve—with Kwame Christian as your guide. This is the #1 negotiation podcast in the world with over 15 million downloads, but it’s about so much more than that. This isn’t about manipulation or domination—it’s about showing up more powerfully, leading with authenticity, and speaking your truth with more clarity. Whether you’re leading a team, parenting through stress, or learning to speak up without fear, the skills you’ll build ...
…
continue reading

4
The Speak Easy Podcast
Jen Estill and Karen Stefl — creative studio entrepreneurs, brand and video experts, boss ladies, moms
Hi. Jen Estill and Karen Stefl here. In The Speak Easy Podcast, we share years of expertise in marketing, branding, video production, strategy—not to mention management, employee development, mentoring, sales, creativity, maintaining life balance, managing money, and.. you get the idea. It takes a lot to keep a couple of creative studios thriving. We developed this podcast after years of "how do you..." boss lady conversations. It was clear that if we were both in such similar places with re ...
…
continue reading
…
continue reading
The podcast centers on the value of Emotional Intelligence, which is both a mindset and an approach to life that regards problems as situations that help you learn and grow; it is a way of being and doing in the world that enables you to develop and sustain a positive relationship with yourself and others, at home, at work, and everywhere in between. Coupled with mental fitness, emotional intelligence is an essential component of Positive Intelligence (PQ) that enables you to leverage your p ...
…
continue reading
In healthcare, burnout rates are higher in women. In fact, forty percent of women physicians have cut back or left medicine within 6 years of completing training. Why? Is it added responsibilities at home? Gender bias at work? Invisible work at work? Mom guilt? Too much self-sacrifice and inability to say no? Poor boundaries, lack of time management skills, lack of self-care? In this podcast, we’ll explore the reasons why women in medicine are struggling—and more importantly, what to do abou ...
…
continue reading
Join psychotherapists Alison Bickers and Ros Peckham as they discuss relatable (and sometimes less relatable) life struggles.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to The Alternatives Mason: Building Alts Knowledge Brick by Brick. Banrion Capital Management uses technology to help independent advisors scale and educate themselves on alternative investments. Since education is such a big piece of the Banrion mission and business, we are excited to kick off this series to dive into the nits and grits of the alternatives space.
…
continue reading
I’ve spent over 20 years studying the emotions and experiences that bring meaning and purpose to our lives, and if there’s one thing I’ve learned it’s this: we are hardwired for connection, and connecting requires courage, vulnerability, and conversation. I want this to be a podcast that’s real, unpolished, honest, and reflects both the magic and the messiness of what it means to be human. Episodes will include conversations with the people who are teaching me, challenging me, confusing me, ...
…
continue reading

1
The Emotional Intelli-Gents Podcast: Navigating Leadership with Emotional intelligence
Ismail Qadry & Sameer Aleem
Welcome to the Emotional Intelli-Gents Podcast. A podcast dedicated to helping leaders understand and hone their emotional intelligence skills. We are Ismail and Sameer, the hosts of the show, and together we have a passion for helping others navigate the complex world of emotions in the workplace. We believe that emotional intelligence is a crucial skill for success in all aspects of leadership, and we are here to share our knowledge and experience with you. So join us as we explore the wor ...
…
continue reading
A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
You've got ideas. You've got ambition. You've got no time. If you're a working mom juggling mom life, work life, fill in the blank life, this podcast is for you. Join host Marisa Lonic, working mom of four, each week as she provides a mix of tips, motivation, and fun, to make whatever you're looking to achieve happen, no matter how busy AF, tired AF, and overwhelmed AF you may feel. This show is all about slaying the day as a working mom, whether that means setting and achieving big goals yo ...
…
continue reading
This is an audio rebroadcast of the QB Power Hour webinar series. QB Power Hour is a free, bi-weekly webinar series for accountant, bookkeepers, and QuickBooks Consultants presented by Michelle Long and Dan DeLong who are very passionate about the industry, QuickBooks, and Apps that integrate with QuickBooks. The Webinars are Live every other Thursday at 12:00 PM EST with the archives posted in the Archives. You can register for upcoming webinars at www.qbpowerhour.comIn the QB Power Hour we ...
…
continue reading
A microdose podcast, ”Exploring the themes of subconsciousness by asking ‘un-asked' questions," says Benzinga. Discussing thoughts about my thoughts...and perhaps your thoughts. Sharing tools and/or reminders from a space of vulnerability and awareness. Let's unlearn together.
…
continue reading
Welcome to The Good Seed Podcast where we believe that through the right mindset and actions, nothing is impossible. Whether you're on a path of self-improvement or self-discovery, this podcast is designed to support and inspire you every step of the way. Our discussions cover a wide range of topics such as success, confidence, abundance, dating, loss, grief, and unlocking your potential. Rachel and Ally bring you genuine, heartfelt advice, ensuring every episode is filled with wisdom, encou ...
…
continue reading
"You Are More, with Emily Cave Boit," is a podcast dedicated to empowering you to embrace their true self, navigate life’s challenges with confidence, and discover your unique path to healing and self-acceptance. This podcast invites you into the intimate journey of Emily Cave Boit, a remarkable woman who has faced unimaginable grief and emerged with a powerful story of resilience, love, and self-discovery. At just 26 years old, Emily found herself unexpectedly widowed before celebrating her ...
…
continue reading
Ever feel lost and alone on your management journey? We've felt that too. Great management is so critical, yet few of us are “taught” how to do it—it seems we're often expected to just learn on the job. Join us on our mission to become the manager that everyone wants to work for. We'll learn from some kickass managers, hear about their mistakes and triumphs, and get their hard-earned tips and tricks. Learn more at: youllmanage.com
…
continue reading
New podcast weblog connecting through conversation and stories. Living life as a practice.
…
continue reading
Are you a young millennial man standing at the crossroads of life, feeling like the outlier in your circle when making smart, healthy choices? Look no further because P.S.A the Mental Health Podcast has got you covered! Hosted by Izzy Baker, Prodigy Sportive Attestations is an interview-based podcast that delivers a raw, masculine take on mental health specifically tailored to young men like you—those who defy the grain yet find themselves isolated in their pursuit of well-being. This podcas ...
…
continue reading
If Product Management and girl talk had a podcast baby, it would be named productmanagHER. After over a decade in Product Management and five years as a Product Management Instructor, your host - Blair Presley - is a full-time Product Management Career Coach who helps professionals to leverage their existing skills into new Product careers. Listen in to learn the secrets of the trade and the experiences of other women in Product to help you navigate your pivot into tech. If you're an existin ...
…
continue reading
An award winning daily podcast, John Lee Dumas interviews the most successful and inspiring Entrepreneurs 7-days a week to bring you the top business strategies. Entrepreneurs On Fire has over 175 million listens and 4500+ episodes. JLD has turned Entrepreneurs On Fire into a media empire that has generated over 7-figures of NET annual revenue 12-years running. For all the resources, visit EOFire.com.
…
continue reading
Value through Vulnerability which is dedicated to helping put the human back into humanity with a particular focus on inclusion, improving voice for all, and designing work to support everybody thriving at work is brought to you by HEXO Change. We catalyse ideas, opinions & challenges around courage, self-awareness, vulnerability, inclusion, listening, trust, values, mindset etc Join Garry Turner with co-host and HumansFirst founder Mike vacanti from Ep 100, as they host conversations where ...
…
continue reading
We are passionate about helping leaders, HR, and ethics professionals build healthy cultures that enable mission success, a thriving workplace and responsible impact. Every other Thursday we post insightful and actionable conversations with leading thinkers, researchers, and practitioners on culture, values, ethics, and transformational change.
…
continue reading
Powerful life stories that motivate and inspire! Intimate conversations with Incredible people. Ryan dives deep into conversations with guests from all walks of life, discussing the moments that have shaped them. Ryan also shares his thoughts & journey along the way. Full episodes & Vlogs on YouTube!
…
continue reading
If you’re looking for a health and fitness show tailored specifically for those living with autism, look no further than The CrazyFitnessGuy® Show! This show is hosted by Jimmy Clare, a Professional Keynote Speaker, Podcaster, Live Stream Host, and Autism Advocate. Jimmy understands the challenges that come with Autism because he is Autistic as well. He provides helpful advice on how to live a healthy and active life. Whether you’re looking to improve your lifestyle, get in shape, or just le ...
…
continue reading
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
…
continue reading
If you have ever felt disconnected, excluded, or that you just didn’t matter at work, then this podcast is for you. Your host, Rhodes Perry, 2x bestselling author of Imagine Belonging and Belonging at Work, introduces you to inclusive leaders, visionaries, and change-makers. This show was created for people like you – people ready to imagine and build belonging at work. In this podcast, we dare to imagine workplace cultures that have yet to exist…until now. It recognizes that leading this ki ...
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
A chat show where we aim to question, challenge and explore the rather wonderfully complex, and often slippery subject of mental health. Join us as we all laugh and cry together over honest frank discussion, true stories and music. Delivered by hosts and guests alike that are prepared to share their stories and are not afraid to show their vulnerability. Your 4 hosts are, Brandon Block: DJ, stress management, goal mapping coach. Chesney Hawkes: Singer, Songwriter, Musician Lynn Ferguson: Wri ...
…
continue reading

1
Episode 122: Metrics and KPIs in Vulnerability Management
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32You can’t improve what you don’t measure. In this episode, we focus on key performance indicators (KPIs) and metrics used to evaluate the effectiveness of vulnerability management programs. You’ll learn how metrics like vulnerability age, remediation time, recurrence rates, and vulnerability density across asset classes are used to benchmark perfor…
…
continue reading

1
Episode 103: Evaluating Threat and Vulnerability Management
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candi…
…
continue reading

1
Fresh Co-Founders on Building From $10,000 to Global Empire, the Soap That Sold Itself, and Resisting Shiny Object Syndrome
34:48
34:48
Play later
Play later
Lists
Like
Liked
34:48Alina Roytberg and Lev Glazman, co-founders of Fresh, built one of the first modern skincare brands rooted in natural ingredients, sensorial experience, and emotional connection—long before “clean beauty” became a trend. In this episode, they share how they turned a personal frustration with conventional products into a business that caught the att…
…
continue reading

1
Curating Community for Business and Personal Success with Darren Darnborough
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Darren Darnborough is a British-born Actor working in Hollywood. His TV & Film work includes hit US shows MacGyver, Magnum PI, 2 Broke Girls & True Blood. He is also the Co-Founder and CEO of WeAudition.com - the global video-chat community for auditions, rehearsals, self tapes & advice. Top 3 Value Bombs 1. Curating a community is an art - curate …
…
continue reading

1
SANS Stormcast Wednesday, July 16th, 2025: ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
…
continue reading
What's happening with Fabric in 2025? While at Build, Richard chatted with Arun Ulag about the fantastic progress Fabric has made in the past year. Arun discusses expanding the product line beyond analytics to include real-time intelligence and hosting primary data workloads. The goal is to make it incredibly easy to get your organization's "data e…
…
continue reading
Brand marketing vs. performance marketing. It's not about picking sides — it's about understanding the dance. Performance marketing drives the clicks and the sales, but brand marketing? That's the reason anyone cares in the first place.Here's what most people miss: these two approaches work better together than apart. Drawing insights from Nielsen …
…
continue reading

1
Embracing Vulnerability: The Path to Self-Commitment
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11Join Deb and Ramona as they dive into a deep and heartfelt conversation about embracing vulnerability in the face of life’s uncertainties. In this episode, they explore the significance of self-commitment, the importance of being present for oneself, and how to navigate the challenges of maintaining faith when the path forward is unclear. Discover …
…
continue reading

1
Justin Bieber, Love Island & Why Young Men Choose the Wrong Type
1:01:11
1:01:11
Play later
Play later
Lists
Like
Liked
1:01:11In this episode, Izzy is rejoined by Jessie Holly of Everyone Can’t Go Podcast for a spicy and surprisingly insightful livestream. They start off with a recap of the latest PSA: The Mental Health Podcast episode about relationship types — diving into the question of whether your “type” is actually your downfall. Jessie and Izzy clash (respectfully)…
…
continue reading

1
"Isaiah Pead: Surviving the Crash that Ended My NFL Career"
1:10:53
1:10:53
Play later
Play later
Lists
Like
Liked
1:10:53In this compelling episode of the @ManagingOurMinds podcast, hosts Dominique Easley and Damien Jacobs welcome former NFL player Isaiah Pead for an in-depth conversation about life's challenges and triumphs. The episode begins with Dominique and Damien setting the stage for a discussion that delves into the importance of mental health and vulnerabil…
…
continue reading

1
Building India's Open Source Security Community: From Developer Nation to Security Champions
18:46
18:46
Play later
Play later
Lists
Like
Liked
18:46Join CRob as he sits down with Ram Iyengar, OpenSSF's India community representative, to explore the unique challenges and opportunities of promoting open source security in one of the world's largest developer communities. Ram shares his journey from computer science professor to developer evangelist, discusses the launch of LF India, and reveals …
…
continue reading

1
CNLP 741 | How To Know When You've Crossed A Moral Line: Max Lucado on Church Leadership, Moral Failure, and How to Tame Your Thoughts
1:09:37
1:09:37
Play later
Play later
Lists
Like
Liked
1:09:37Max Lucado talks about his new role at Gateway Church, how to carry the trauma and disappointment of a congregation after the senior pastor has breached trust, how to know if and when you've crossed... Read the whole entry... »By Carey Nieuwhof
…
continue reading
What makes the Genius of Enablement (“E”) such a crucial part of team implementation? Episode 91 of the Working Genius Podcast dives into the Enablement Genius with guest Tracy Noble, Chief Development Officer at The Table Group. Pat, Cody, and Tracy explore the subtle power of Enablement—how it brings relational glue to implementation and drives t…
…
continue reading

1
Scale Effectively, Build Internal Leaders with Hana Ngo
19:21
19:21
Play later
Play later
Lists
Like
Liked
19:21Hana Ngo is an experienced Executive & High-Performance Team Coach, supporting 300+ global companies and 100+ teams to elevate leadership, boost performance, reduce turnover, and cultivate thriving, resilient, agile teams & leaders. Top 3 Value Bombs 1. Delegate outcomes, not just tasks - true leadership growth happens through thinking transfers. 2…
…
continue reading

1
Universal 2nd Factor (U2F) (noun) [Word Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: https://thecyberwire.com/glossary/u2f Audio reference link: “Rise of…
…
continue reading

1
Episode 130: Root Cause Analysis and Incident Performance Metrics
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59Every incident response process must end with two critical questions: What went wrong? And how do we prevent it next time? In this final episode of Domain 4, we explore the structure and value of root cause analysis (RCA) and the metrics analysts use to evaluate incident response performance. You'll learn techniques for identifying the initial fail…
…
continue reading

1
Episode 129: Regulatory and Law Enforcement Reporting
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59When a breach crosses a legal threshold, reporting to regulators or law enforcement may be required. In this episode, we examine the processes and obligations associated with regulatory reporting under frameworks like GDPR, HIPAA, PCI DSS, and state-level data breach laws. You’ll learn what types of incidents trigger mandatory disclosure, how quick…
…
continue reading

1
Episode 128: Customer and Media Communications
13:31
13:31
Play later
Play later
Lists
Like
Liked
13:31Sometimes the most difficult part of a security incident isn’t stopping the threat—it’s explaining what happened to the people affected. In this episode, we explore how organizations communicate with customers, partners, and the media during and after an incident. You’ll learn what kinds of disclosures are required, what language builds trust, and …
…
continue reading

1
Episode 127: Legal and PR Communications During an Incident
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48Communication during a security incident isn't just internal—it can affect your company’s reputation, legal standing, and customer trust. In this episode, we examine how security teams coordinate with legal departments and public relations professionals to craft official statements and limit liability. You'll learn how analysts contribute to this p…
…
continue reading

1
Episode 126: Writing Effective Incident Response Reports
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48When the incident is over, the reporting begins. In this episode, we explore how security analysts write effective incident response reports that document what happened, how it was discovered, what actions were taken, and what outcomes resulted. You’ll learn how to construct a clear executive summary, provide a precise who-what-when-where-why break…
…
continue reading

1
Episode 125: Incident Declaration and Escalation Procedures
13:30
13:30
Play later
Play later
Lists
Like
Liked
13:30Not every alert becomes an incident—but when one does, it needs to be declared formally and escalated swiftly. In this episode, we walk through the process of incident declaration, including the criteria used to define what qualifies as an incident and the steps analysts take to classify severity. You’ll learn how escalation procedures are triggere…
…
continue reading

1
Episode 124: Stakeholder Communication for Incident Response
13:16
13:16
Play later
Play later
Lists
Like
Liked
13:16During an incident, clear and timely communication becomes a matter of urgency—not just best practice. In this episode, we cover how security analysts coordinate communication across teams and leadership tiers when responding to security events. You’ll learn how to identify the right stakeholders based on the severity and scope of the incident, and…
…
continue reading

1
Episode 123: Identifying Stakeholders for Vulnerability Reporting
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25Not all stakeholders need the same level of technical detail—but all of them need accurate, timely, and actionable reporting. In this episode, we explore how analysts identify and tailor communication for different stakeholder groups during the vulnerability management process. You’ll learn who needs to know what—from system administrators and deve…
…
continue reading
Even when vulnerabilities are known and documented, remediation doesn’t always move forward. In this episode, we examine the most common inhibitors to remediation—technical, procedural, and political obstacles that delay or prevent action. You’ll learn how factors like legacy systems, proprietary dependencies, business process interruptions, organi…
…
continue reading

1
Episode 120: Action Plans and Remediation Communication
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33Once vulnerabilities are identified, the work isn’t done—it’s just beginning. In this episode, we explore how analysts develop and communicate action plans for addressing discovered risks. You’ll learn how patching schedules, configuration changes, user awareness efforts, and compensating controls are communicated clearly to technical teams, projec…
…
continue reading

1
Episode 119: Creating and Understanding Compliance Reports
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50Security isn't just about stopping threats—it's also about proving due diligence. In this episode, we explore how security teams create and interpret compliance reports aligned with frameworks like PCI DSS, HIPAA, NIST 800-53, and ISO 27001. You’ll learn how reports are structured to demonstrate adherence to technical controls, timelines, audit req…
…
continue reading

1
Episode 118: Vulnerability Management Reporting Essentials
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43In this episode, we break down the core components of a vulnerability management report. You’ll learn how to organize and present data on discovered vulnerabilities, affected assets, associated risk scores, remediation efforts, recurrence frequency, and mitigation timelines. We explain how to structure reports for different audiences—whether it's a…
…
continue reading

1
Episode 117: Domain 4 Overview – Reporting and Communication in Cybersecurity
13:10
13:10
Play later
Play later
Lists
Like
Liked
13:10Welcome to Domain 4 of the CySA+ PrepCast. In this episode, we introduce the principles of reporting and communication—critical soft skills that define how technical findings are translated into business decisions. You’ll learn why analysts must be effective communicators, how reporting ties into regulatory requirements, and what makes security met…
…
continue reading

1
Episode 116: Post-Incident Activity and Organizational Learning
13:10
13:10
Play later
Play later
Lists
Like
Liked
13:10Once the smoke clears, the real improvement begins. In this episode, we explore the post-incident phase of the incident response lifecycle. You’ll learn how forensic analysis is conducted to uncover technical root causes, how timeline reconstruction helps validate scope and sequence, and how organizations document lessons learned to avoid repeating…
…
continue reading

1
Episode 115: Incident Preparation – Building a Response Program
13:32
13:32
Play later
Play later
Lists
Like
Liked
13:32The best incident response doesn’t start with detection—it starts with preparation. In this episode, we walk through the preparation phase of the incident response lifecycle, focusing on how organizations create, document, and test their response plans. You’ll learn about IR playbooks, tabletop exercises, escalation matrices, and readiness assessme…
…
continue reading

1
Episode 114: Containment, Eradication, and Recovery Phases
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Detecting an incident is only the beginning. In this episode, we examine the containment, eradication, and recovery phases of incident response—what they are, how they differ, and how they build upon one another to restore a secure state. You’ll learn how containment isolates the threat, eradication removes it from the environment, and recovery bri…
…
continue reading

1
Episode 113: Data and Log Analysis During an Incident
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49Raw data becomes actionable intelligence when it’s properly analyzed. In this episode, we focus on the data and log analysis process during an incident, explaining how analysts sift through event logs, network traffic, system alerts, and application telemetry to reconstruct what happened. You’ll learn how to use timeline creation, correlation engin…
…
continue reading

1
Episode 112: Evidence Acquisition and Chain of Custody
12:55
12:55
Play later
Play later
Lists
Like
Liked
12:55Once an incident is detected, preserving evidence becomes a top priority. In this episode, we walk through the evidence acquisition process—from initial identification to collection, storage, and transfer. You’ll learn what types of evidence are collected during security incidents, including disk images, memory dumps, log files, and email headers, …
…
continue reading

1
Episode 111: Indicators of Compromise (IoCs) – Detection Foundations
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:58Detecting an attack starts with recognizing the signs. In this episode, we explore Indicators of Compromise (IoCs)—artifacts that suggest an organization may have been breached or is under active threat. You’ll learn how IoCs include file hashes, domain names, IP addresses, registry keys, and behavioral anomalies, and how analysts discover them dur…
…
continue reading

1
Episode 110: Open Source Security Testing Methodology Manual (OSSTMM)
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:58The OSSTMM is often overlooked—but it provides a rigorous, standards-based approach to security testing that aligns with the goals of CySA+ and many compliance frameworks. In this episode, we explain what the Open Source Security Testing Methodology Manual is, why it matters, and how it provides structure to everything from reconnaissance and vulne…
…
continue reading

1
Episode 109: MITRE ATT&CK Framework for Analysts
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29In this episode, we explore the MITRE ATT&CK Framework—a living matrix of adversary behaviors that has transformed how cybersecurity professionals track and respond to attacks. You’ll learn how the framework maps tactics (the goals of an attacker) to techniques (the methods they use), and how analysts use ATT&CK to build detection logic, design thr…
…
continue reading

1
Episode 108: The Diamond Model of Intrusion Analysis
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09What happens when we move beyond events and look at the relationships between adversaries, capabilities, victims, and infrastructure? In this episode, we introduce the Diamond Model of Intrusion Analysis—a framework that gives analysts a structured way to examine threats by looking at key attributes and how they interact. You’ll learn how this mode…
…
continue reading

1
Episode 107: Cyber Kill Chains – From Recon to Exploitation
14:26
14:26
Play later
Play later
Lists
Like
Liked
14:26To stop an attack, you must understand its progression. In this episode, we explore the Lockheed Martin Cyber Kill Chain—a widely used framework that maps the stages of a cyberattack from initial reconnaissance through delivery, exploitation, command and control, and beyond. You’ll learn how attackers move through each phase, and how defenders can …
…
continue reading

1
Episode 106: Domain 3 Overview – Mastering Incident Response and Management
14:50
14:50
Play later
Play later
Lists
Like
Liked
14:50Welcome to Domain 3 of the CySA+ PrepCast, where we move from prevention and vulnerability management into response and containment. In this episode, we provide an overview of what incident response means in modern organizations and how it’s structured in the CySA+ exam. You’ll learn how incident response differs from general troubleshooting, and w…
…
continue reading

1
Episode 105: Domain 2 Review – From Scanning to Secure Development
13:38
13:38
Play later
Play later
Lists
Like
Liked
13:38Before moving forward, it’s time to reflect. In this comprehensive recap, we walk through the critical knowledge areas covered in Domain 2: Vulnerability Management. From scanning types and validation workflows to secure coding, asset prioritization, compensating controls, and risk decisions—you’ll get a structured review that reinforces everything…
…
continue reading

1
Episode 104: Threat Modeling for Analysts
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59What if you could anticipate the attacker’s plan before they even launch it? In this episode, we introduce threat modeling as a method for identifying and prioritizing potential threats based on how applications and systems are designed. You’ll learn how threat modeling is performed using techniques like STRIDE, kill chain analysis, and data flow d…
…
continue reading

1
Episode 103: Secure Software Development Lifecycle (SDLC)
14:05
14:05
Play later
Play later
Lists
Like
Liked
14:05Security that begins in production is already behind schedule. In this episode, we take a holistic view of the Secure Software Development Lifecycle (SDLC), explaining how security is integrated into every phase of software creation—from planning and design to development, testing, deployment, and maintenance. You'll learn how threat modeling, secu…
…
continue reading

1
Episode 102: Secure Coding Best Practices for Analysts
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13You don’t need to be a developer to influence secure code—but you do need to understand what secure coding looks like. In this episode, we break down the most important secure development practices that analysts should know when evaluating application risk or reviewing vulnerability reports. Topics include input validation, output encoding, secure …
…
continue reading

1
Episode 101: Attack Surface Management in Action
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45You can't protect what you can't see. In this episode, we explore the evolving discipline of attack surface management (ASM)—a proactive process that helps security teams identify, map, and reduce the ways in which an attacker could compromise an organization. You'll learn how ASM incorporates both internal and external assets, including shadow IT,…
…
continue reading

1
Episode 100: Vulnerability Prioritization and Escalation
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40In a world where thousands of vulnerabilities exist, how do you decide which to address first? In this episode, we break down the art and science of vulnerability prioritization—how analysts combine CVSS scores, asset value, exploitability, and business context to triage effectively. You’ll learn how to identify which issues must be escalated to le…
…
continue reading