Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Vulnerability Management Podcasts

show episodes
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork
 
The CYSA PrepCast is your comprehensive audio training series for the CompTIA Cybersecurity Analyst (CYSA+) certification. Built for learners who are on the move, this podcast breaks down each domain of the CYSA+ exam in structured, digestible episodes. Whether you're studying during your commute or brushing up at the gym, this PrepCast is designed to reinforce critical skills and exam knowledge with clarity and focus.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork
 
Where entrepreneurs get real about their stories and turn failures into lessons for success. Hosted by Megan Bruneau, The Failure Factor explores the journey of business owners, entrepreneurs and thought leaders who have faced significant challenges, persevered through adversity, and emerged triumphant providing listeners with insights to navigate their own entrepreneurial paths There's a myth out there that failure is career-ending and that success is achieved without any bumps in the road. ...
  continue reading
 
🔊 The Defuse Podcast: Personal Threat Management for High-Risk Lives When the threats are real, the stakes are high — so what actually works?" Hosted by Philip Grindell — former Scotland Yard detective, behavioural threat specialist, and author of Personal Threat Management — this podcast lifts the lid on the proven methods used to keep prominent individuals, executives, and private clients safer. Each episode features straight-talking conversations with trusted experts on: Stalking, fixated ...
  continue reading
 
Artwork

1
Managing Our Minds

Dominique Easley & Damien Jacobs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Managing Our Minds Where vulnerability isn’t weakness—it’s the spark that ignites growth. Hosted by Dominique Easley, Super Bowl Champion & NFL vet, and Damien Jacobs, NFL vet—this podcast creates a raw, unfiltered space for honest conversations about mental health, resilience, and personal growth. We sit down with high school, college, and professional athletes, as well as entrepreneurs, top execs, and entertainers, to uncover the real stories behind their success. They open up about upbrin ...
  continue reading
 
Welcome to The Church of Kreis Podcast - where artistry meets authenticity. Hosted by Tony Award-winner Levi Kreis, this is a space for seekers, misfits, creatives, and old souls who crave deeper conversation. Whether he's unpacking the emotional landscape of a musical theatre tour, reflecting on spiritual growth, or rediscovering his voice after a season of silence, Levi invites you to join him in real-time transformation. Part personal journal, part spiritual companion, part backstage pass ...
  continue reading
 
Artwork

1
DrZeroTrust

Dr. Chase Cunningham

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Unlock the future of cybersecurity with the "Dr. Zero Trust Podcast" on all podcasting platforms! Join me as we delve into Zero Trust Security, redefining how we protect data and networks. Explore frameworks, threat prevention, identity management, exclusive interviews, and emerging tech. Whether you're a pro or just curious, trust me– this podcast is where those who value honesty and real insights go for their cybersecurity insights! Tune in on Spotify, Google, or ITunes now. #DrZeroTrustPo ...
  continue reading
 
What is your Working Genius? The Working Genius podcast is designed to help people identify their natural gifts and find joy and fulfillment in their work and life. Leadership and teamwork expert Patrick Lencioni and his team explore the Working Genius model and provide practical advice for applying this framework individually, at our jobs and in our homes. What type of work makes you thrive? Are you burning out because your job requires you to work in your areas of frustration? How can team ...
  continue reading
 
Rob Fonte is the host of the Leadership Jam Session Podcast, where every other week you'll get to hear leaders at all levels of management share their practical solutions to the management challenges you face every day. On this podcast, Rob shares leadership experiences with listeners by bringing in leaders from all different levels to “Jam” on a variety of leadership topics. Some of the best insights are captured from just listening and learning from each other as they share their experienc ...
  continue reading
 
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
  continue reading
 
A show dedicated to helping accounting professionals confidently and competently offer quality accounting services to get paid what they are worth. Each episode is conversational with tips and tricks to help you apply the principles of M.A.P. as they relate to starting and building a successful accounting business. Topics include Marketing, Lead Generation, Ideal Clients, Pricing, Price Strategies, Accounting Services, Value Added Services, Workflow, Practice Management, Staff Training, Clie ...
  continue reading
 
The Bare Metal Cyber CISA Prepcast is a comprehensive, exam-focused podcast designed to help you master every domain of the Certified Information Systems Auditor (CISA) certification. With over 100 tightly structured episodes, this prepcast walks you through key concepts, audit techniques, IT governance, system acquisition, operations, resilience, and information asset protection—all aligned to ISACA’s exam objectives. Whether you're just beginning your study journey or need a high-impact re ...
  continue reading
 
Artwork

1
Negotiate Anything

Kwame Christian Esq., M.A.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Transform your relationships. Speak your truth. Get what you deserve—with Kwame Christian as your guide. This is the #1 negotiation podcast in the world with over 15 million downloads, but it’s about so much more than that. This isn’t about manipulation or domination—it’s about showing up more powerfully, leading with authenticity, and speaking your truth with more clarity. Whether you’re leading a team, parenting through stress, or learning to speak up without fear, the skills you’ll build ...
  continue reading
 
Artwork

4
The Speak Easy Podcast

Jen Estill and Karen Stefl — creative studio entrepreneurs, brand and video experts, boss ladies, moms

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hi. Jen Estill and Karen Stefl here. In The Speak Easy Podcast, we share years of expertise in marketing, branding, video production, strategy—not to mention management, employee development, mentoring, sales, creativity, maintaining life balance, managing money, and.. you get the idea. It takes a lot to keep a couple of creative studios thriving. We developed this podcast after years of "how do you..." boss lady conversations. It was clear that if we were both in such similar places with re ...
  continue reading
 
The podcast centers on the value of Emotional Intelligence, which is both a mindset and an approach to life that regards problems as situations that help you learn and grow; it is a way of being and doing in the world that enables you to develop and sustain a positive relationship with yourself and others, at home, at work, and everywhere in between. Coupled with mental fitness, emotional intelligence is an essential component of Positive Intelligence (PQ) that enables you to leverage your p ...
  continue reading
 
In healthcare, burnout rates are higher in women. In fact, forty percent of women physicians have cut back or left medicine within 6 years of completing training. Why? Is it added responsibilities at home? Gender bias at work? Invisible work at work? Mom guilt? Too much self-sacrifice and inability to say no? Poor boundaries, lack of time management skills, lack of self-care? In this podcast, we’ll explore the reasons why women in medicine are struggling—and more importantly, what to do abou ...
  continue reading
 
Welcome to The Alternatives Mason: Building Alts Knowledge Brick by Brick. Banrion Capital Management uses technology to help independent advisors scale and educate themselves on alternative investments. Since education is such a big piece of the Banrion mission and business, we are excited to kick off this series to dive into the nits and grits of the alternatives space.
  continue reading
 
Artwork

151
Unlocking Us with Brené Brown

Vox Media Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
I’ve spent over 20 years studying the emotions and experiences that bring meaning and purpose to our lives, and if there’s one thing I’ve learned it’s this: we are hardwired for connection, and connecting requires courage, vulnerability, and conversation. I want this to be a podcast that’s real, unpolished, honest, and reflects both the magic and the messiness of what it means to be human. Episodes will include conversations with the people who are teaching me, challenging me, confusing me, ...
  continue reading
 
Welcome to the Emotional Intelli-Gents Podcast. A podcast dedicated to helping leaders understand and hone their emotional intelligence skills. We are Ismail and Sameer, the hosts of the show, and together we have a passion for helping others navigate the complex world of emotions in the workplace. We believe that emotional intelligence is a crucial skill for success in all aspects of leadership, and we are here to share our knowledge and experience with you. So join us as we explore the wor ...
  continue reading
 
Artwork
 
You've got ideas. You've got ambition. You've got no time. If you're a working mom juggling mom life, work life, fill in the blank life, this podcast is for you. Join host Marisa Lonic, working mom of four, each week as she provides a mix of tips, motivation, and fun, to make whatever you're looking to achieve happen, no matter how busy AF, tired AF, and overwhelmed AF you may feel. This show is all about slaying the day as a working mom, whether that means setting and achieving big goals yo ...
  continue reading
 
Artwork

1
QB Power Hour Podcast

Dan DeLong & Michelle Long

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is an audio rebroadcast of the QB Power Hour webinar series. QB Power Hour is a free, bi-weekly webinar series for accountant, bookkeepers, and QuickBooks Consultants presented by Michelle Long and Dan DeLong who are very passionate about the industry, QuickBooks, and Apps that integrate with QuickBooks. The Webinars are Live every other Thursday at 12:00 PM EST with the archives posted in the Archives. You can register for upcoming webinars at www.qbpowerhour.comIn the QB Power Hour we ...
  continue reading
 
A microdose podcast, ”Exploring the themes of subconsciousness by asking ‘un-asked' questions," says Benzinga. Discussing thoughts about my thoughts...and perhaps your thoughts. Sharing tools and/or reminders from a space of vulnerability and awareness. Let's unlearn together.
  continue reading
 
Artwork

1
The Good Seed

Ally Aljure and Rachel Droege

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to The Good Seed Podcast where we believe that through the right mindset and actions, nothing is impossible. Whether you're on a path of self-improvement or self-discovery, this podcast is designed to support and inspire you every step of the way. Our discussions cover a wide range of topics such as success, confidence, abundance, dating, loss, grief, and unlocking your potential. Rachel and Ally bring you genuine, heartfelt advice, ensuring every episode is filled with wisdom, encou ...
  continue reading
 
Artwork

4
You Are More, With Emily Cave Boit

Emily Cave, Stories and Strategies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"You Are More, with Emily Cave Boit," is a podcast dedicated to empowering you to embrace their true self, navigate life’s challenges with confidence, and discover your unique path to healing and self-acceptance. This podcast invites you into the intimate journey of Emily Cave Boit, a remarkable woman who has faced unimaginable grief and emerged with a powerful story of resilience, love, and self-discovery. At just 26 years old, Emily found herself unexpectedly widowed before celebrating her ...
  continue reading
 
Artwork

1
You'll Manage

You'll Manage

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ever feel lost and alone on your management journey? We've felt that too. Great management is so critical, yet few of us are “taught” how to do it—it seems we're often expected to just learn on the job. Join us on our mission to become the manager that everyone wants to work for. We'll learn from some kickass managers, hear about their mistakes and triumphs, and get their hard-earned tips and tricks. Learn more at: youllmanage.com
  continue reading
 
Are you a young millennial man standing at the crossroads of life, feeling like the outlier in your circle when making smart, healthy choices? Look no further because P.S.A the Mental Health Podcast has got you covered! Hosted by Izzy Baker, Prodigy Sportive Attestations is an interview-based podcast that delivers a raw, masculine take on mental health specifically tailored to young men like you—those who defy the grain yet find themselves isolated in their pursuit of well-being. This podcas ...
  continue reading
 
If Product Management and girl talk had a podcast baby, it would be named productmanagHER. After over a decade in Product Management and five years as a Product Management Instructor, your host - Blair Presley - is a full-time Product Management Career Coach who helps professionals to leverage their existing skills into new Product careers. Listen in to learn the secrets of the trade and the experiences of other women in Product to help you navigate your pivot into tech. If you're an existin ...
  continue reading
 
Artwork

1
Entrepreneurs on Fire

John Lee Dumas of EOFire

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
An award winning daily podcast, John Lee Dumas interviews the most successful and inspiring Entrepreneurs 7-days a week to bring you the top business strategies. Entrepreneurs On Fire has over 175 million listens and 4500+ episodes. JLD has turned Entrepreneurs On Fire into a media empire that has generated over 7-figures of NET annual revenue 12-years running. For all the resources, visit EOFire.com.
  continue reading
 
Value through Vulnerability which is dedicated to helping put the human back into humanity with a particular focus on inclusion, improving voice for all, and designing work to support everybody thriving at work is brought to you by HEXO Change. We catalyse ideas, opinions & challenges around courage, self-awareness, vulnerability, inclusion, listening, trust, values, mindset etc Join Garry Turner with co-host and HumansFirst founder Mike vacanti from Ep 100, as they host conversations where ...
  continue reading
 
We are passionate about helping leaders, HR, and ethics professionals build healthy cultures that enable mission success, a thriving workplace and responsible impact. Every other Thursday we post insightful and actionable conversations with leading thinkers, researchers, and practitioners on culture, values, ethics, and transformational change.
  continue reading
 
Artwork
 
Powerful life stories that motivate and inspire! Intimate conversations with Incredible people. Ryan dives deep into conversations with guests from all walks of life, discussing the moments that have shaped them. Ryan also shares his thoughts & journey along the way. Full episodes & Vlogs on YouTube!
  continue reading
 
Artwork
 
If you’re looking for a health and fitness show tailored specifically for those living with autism, look no further than The CrazyFitnessGuy® Show! This show is hosted by Jimmy Clare, a Professional Keynote Speaker, Podcaster, Live Stream Host, and Autism Advocate. Jimmy understands the challenges that come with Autism because he is Autistic as well. He provides helpful advice on how to live a healthy and active life. Whether you’re looking to improve your lifestyle, get in shape, or just le ...
  continue reading
 
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
  continue reading
 
Artwork

1
Imagine Belonging at Work

Rhodes Perry, Bestselling Author & Belonging Strategist

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
If you have ever felt disconnected, excluded, or that you just didn’t matter at work, then this podcast is for you. Your host, Rhodes Perry, 2x bestselling author of Imagine Belonging and Belonging at Work, introduces you to inclusive leaders, visionaries, and change-makers. This show was created for people like you – people ready to imagine and build belonging at work. In this podcast, we dare to imagine workplace cultures that have yet to exist…until now. It recognizes that leading this ki ...
  continue reading
 
Artwork

1
We Are All A Bit Mental

Sauce Productions Ltd

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A chat show where we aim to question, challenge and explore the rather wonderfully complex, and often slippery subject of mental health. Join us as we all laugh and cry together over honest frank discussion, true stories and music. Delivered by hosts and guests alike that are prepared to share their stories and are not afraid to show their vulnerability. Your 4 hosts are, Brandon Block: DJ, stress management, goal mapping coach. Chesney Hawkes: Singer, Songwriter, Musician Lynn Ferguson: Wri ...
  continue reading
 
Loading …
show series
 
You can’t improve what you don’t measure. In this episode, we focus on key performance indicators (KPIs) and metrics used to evaluate the effectiveness of vulnerability management programs. You’ll learn how metrics like vulnerability age, remediation time, recurrence rates, and vulnerability density across asset classes are used to benchmark perfor…
  continue reading
 
Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candi…
  continue reading
 
Alina Roytberg and Lev Glazman, co-founders of Fresh, built one of the first modern skincare brands rooted in natural ingredients, sensorial experience, and emotional connection—long before “clean beauty” became a trend. In this episode, they share how they turned a personal frustration with conventional products into a business that caught the att…
  continue reading
 
Darren Darnborough is a British-born Actor working in Hollywood. His TV & Film work includes hit US shows MacGyver, Magnum PI, 2 Broke Girls & True Blood. He is also the Co-Founder and CEO of WeAudition.com - the global video-chat community for auditions, rehearsals, self tapes & advice. Top 3 Value Bombs 1. Curating a community is an art - curate …
  continue reading
 
Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
  continue reading
 
What's happening with Fabric in 2025? While at Build, Richard chatted with Arun Ulag about the fantastic progress Fabric has made in the past year. Arun discusses expanding the product line beyond analytics to include real-time intelligence and hosting primary data workloads. The goal is to make it incredibly easy to get your organization's "data e…
  continue reading
 
Brand marketing vs. performance marketing. It's not about picking sides — it's about understanding the dance. Performance marketing drives the clicks and the sales, but brand marketing? That's the reason anyone cares in the first place.Here's what most people miss: these two approaches work better together than apart. Drawing insights from Nielsen …
  continue reading
 
Join Deb and Ramona as they dive into a deep and heartfelt conversation about embracing vulnerability in the face of life’s uncertainties. In this episode, they explore the significance of self-commitment, the importance of being present for oneself, and how to navigate the challenges of maintaining faith when the path forward is unclear. Discover …
  continue reading
 
In this episode, Izzy is rejoined by Jessie Holly of Everyone Can’t Go Podcast for a spicy and surprisingly insightful livestream. They start off with a recap of the latest PSA: The Mental Health Podcast episode about relationship types — diving into the question of whether your “type” is actually your downfall. Jessie and Izzy clash (respectfully)…
  continue reading
 
In this compelling episode of the @ManagingOurMinds podcast, hosts Dominique Easley and Damien Jacobs welcome former NFL player Isaiah Pead for an in-depth conversation about life's challenges and triumphs. The episode begins with Dominique and Damien setting the stage for a discussion that delves into the importance of mental health and vulnerabil…
  continue reading
 
Join CRob as he sits down with Ram Iyengar, OpenSSF's India community representative, to explore the unique challenges and opportunities of promoting open source security in one of the world's largest developer communities. Ram shares his journey from computer science professor to developer evangelist, discusses the launch of LF India, and reveals …
  continue reading
 
Max Lucado talks about his new role at Gateway Church, how to carry the trauma and disappointment of a congregation after the senior pastor has breached trust, how to know if and when you've crossed... Read the whole entry... »By Carey Nieuwhof
  continue reading
 
What makes the Genius of Enablement (“E”) such a crucial part of team implementation? Episode 91 of the Working Genius Podcast dives into the Enablement Genius with guest Tracy Noble, Chief Development Officer at The Table Group. Pat, Cody, and Tracy explore the subtle power of Enablement—how it brings relational glue to implementation and drives t…
  continue reading
 
Hana Ngo is an experienced Executive & High-Performance Team Coach, supporting 300+ global companies and 100+ teams to elevate leadership, boost performance, reduce turnover, and cultivate thriving, resilient, agile teams & leaders. Top 3 Value Bombs 1. Delegate outcomes, not just tasks - true leadership growth happens through thinking transfers. 2…
  continue reading
 
Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate one factor in a two-factor authentication exchange. Cyberwire Glossary link: ⁠⁠https://thecyberwire.com/glossary/u2f⁠⁠ Audio reference link: “⁠⁠Rise of…
  continue reading
 
Every incident response process must end with two critical questions: What went wrong? And how do we prevent it next time? In this final episode of Domain 4, we explore the structure and value of root cause analysis (RCA) and the metrics analysts use to evaluate incident response performance. You'll learn techniques for identifying the initial fail…
  continue reading
 
When a breach crosses a legal threshold, reporting to regulators or law enforcement may be required. In this episode, we examine the processes and obligations associated with regulatory reporting under frameworks like GDPR, HIPAA, PCI DSS, and state-level data breach laws. You’ll learn what types of incidents trigger mandatory disclosure, how quick…
  continue reading
 
Sometimes the most difficult part of a security incident isn’t stopping the threat—it’s explaining what happened to the people affected. In this episode, we explore how organizations communicate with customers, partners, and the media during and after an incident. You’ll learn what kinds of disclosures are required, what language builds trust, and …
  continue reading
 
Communication during a security incident isn't just internal—it can affect your company’s reputation, legal standing, and customer trust. In this episode, we examine how security teams coordinate with legal departments and public relations professionals to craft official statements and limit liability. You'll learn how analysts contribute to this p…
  continue reading
 
When the incident is over, the reporting begins. In this episode, we explore how security analysts write effective incident response reports that document what happened, how it was discovered, what actions were taken, and what outcomes resulted. You’ll learn how to construct a clear executive summary, provide a precise who-what-when-where-why break…
  continue reading
 
Not every alert becomes an incident—but when one does, it needs to be declared formally and escalated swiftly. In this episode, we walk through the process of incident declaration, including the criteria used to define what qualifies as an incident and the steps analysts take to classify severity. You’ll learn how escalation procedures are triggere…
  continue reading
 
During an incident, clear and timely communication becomes a matter of urgency—not just best practice. In this episode, we cover how security analysts coordinate communication across teams and leadership tiers when responding to security events. You’ll learn how to identify the right stakeholders based on the severity and scope of the incident, and…
  continue reading
 
Not all stakeholders need the same level of technical detail—but all of them need accurate, timely, and actionable reporting. In this episode, we explore how analysts identify and tailor communication for different stakeholder groups during the vulnerability management process. You’ll learn who needs to know what—from system administrators and deve…
  continue reading
 
Even when vulnerabilities are known and documented, remediation doesn’t always move forward. In this episode, we examine the most common inhibitors to remediation—technical, procedural, and political obstacles that delay or prevent action. You’ll learn how factors like legacy systems, proprietary dependencies, business process interruptions, organi…
  continue reading
 
Once vulnerabilities are identified, the work isn’t done—it’s just beginning. In this episode, we explore how analysts develop and communicate action plans for addressing discovered risks. You’ll learn how patching schedules, configuration changes, user awareness efforts, and compensating controls are communicated clearly to technical teams, projec…
  continue reading
 
Security isn't just about stopping threats—it's also about proving due diligence. In this episode, we explore how security teams create and interpret compliance reports aligned with frameworks like PCI DSS, HIPAA, NIST 800-53, and ISO 27001. You’ll learn how reports are structured to demonstrate adherence to technical controls, timelines, audit req…
  continue reading
 
In this episode, we break down the core components of a vulnerability management report. You’ll learn how to organize and present data on discovered vulnerabilities, affected assets, associated risk scores, remediation efforts, recurrence frequency, and mitigation timelines. We explain how to structure reports for different audiences—whether it's a…
  continue reading
 
Welcome to Domain 4 of the CySA+ PrepCast. In this episode, we introduce the principles of reporting and communication—critical soft skills that define how technical findings are translated into business decisions. You’ll learn why analysts must be effective communicators, how reporting ties into regulatory requirements, and what makes security met…
  continue reading
 
Once the smoke clears, the real improvement begins. In this episode, we explore the post-incident phase of the incident response lifecycle. You’ll learn how forensic analysis is conducted to uncover technical root causes, how timeline reconstruction helps validate scope and sequence, and how organizations document lessons learned to avoid repeating…
  continue reading
 
The best incident response doesn’t start with detection—it starts with preparation. In this episode, we walk through the preparation phase of the incident response lifecycle, focusing on how organizations create, document, and test their response plans. You’ll learn about IR playbooks, tabletop exercises, escalation matrices, and readiness assessme…
  continue reading
 
Detecting an incident is only the beginning. In this episode, we examine the containment, eradication, and recovery phases of incident response—what they are, how they differ, and how they build upon one another to restore a secure state. You’ll learn how containment isolates the threat, eradication removes it from the environment, and recovery bri…
  continue reading
 
Raw data becomes actionable intelligence when it’s properly analyzed. In this episode, we focus on the data and log analysis process during an incident, explaining how analysts sift through event logs, network traffic, system alerts, and application telemetry to reconstruct what happened. You’ll learn how to use timeline creation, correlation engin…
  continue reading
 
Once an incident is detected, preserving evidence becomes a top priority. In this episode, we walk through the evidence acquisition process—from initial identification to collection, storage, and transfer. You’ll learn what types of evidence are collected during security incidents, including disk images, memory dumps, log files, and email headers, …
  continue reading
 
Detecting an attack starts with recognizing the signs. In this episode, we explore Indicators of Compromise (IoCs)—artifacts that suggest an organization may have been breached or is under active threat. You’ll learn how IoCs include file hashes, domain names, IP addresses, registry keys, and behavioral anomalies, and how analysts discover them dur…
  continue reading
 
The OSSTMM is often overlooked—but it provides a rigorous, standards-based approach to security testing that aligns with the goals of CySA+ and many compliance frameworks. In this episode, we explain what the Open Source Security Testing Methodology Manual is, why it matters, and how it provides structure to everything from reconnaissance and vulne…
  continue reading
 
In this episode, we explore the MITRE ATT&CK Framework—a living matrix of adversary behaviors that has transformed how cybersecurity professionals track and respond to attacks. You’ll learn how the framework maps tactics (the goals of an attacker) to techniques (the methods they use), and how analysts use ATT&CK to build detection logic, design thr…
  continue reading
 
What happens when we move beyond events and look at the relationships between adversaries, capabilities, victims, and infrastructure? In this episode, we introduce the Diamond Model of Intrusion Analysis—a framework that gives analysts a structured way to examine threats by looking at key attributes and how they interact. You’ll learn how this mode…
  continue reading
 
To stop an attack, you must understand its progression. In this episode, we explore the Lockheed Martin Cyber Kill Chain—a widely used framework that maps the stages of a cyberattack from initial reconnaissance through delivery, exploitation, command and control, and beyond. You’ll learn how attackers move through each phase, and how defenders can …
  continue reading
 
Welcome to Domain 3 of the CySA+ PrepCast, where we move from prevention and vulnerability management into response and containment. In this episode, we provide an overview of what incident response means in modern organizations and how it’s structured in the CySA+ exam. You’ll learn how incident response differs from general troubleshooting, and w…
  continue reading
 
Before moving forward, it’s time to reflect. In this comprehensive recap, we walk through the critical knowledge areas covered in Domain 2: Vulnerability Management. From scanning types and validation workflows to secure coding, asset prioritization, compensating controls, and risk decisions—you’ll get a structured review that reinforces everything…
  continue reading
 
What if you could anticipate the attacker’s plan before they even launch it? In this episode, we introduce threat modeling as a method for identifying and prioritizing potential threats based on how applications and systems are designed. You’ll learn how threat modeling is performed using techniques like STRIDE, kill chain analysis, and data flow d…
  continue reading
 
Security that begins in production is already behind schedule. In this episode, we take a holistic view of the Secure Software Development Lifecycle (SDLC), explaining how security is integrated into every phase of software creation—from planning and design to development, testing, deployment, and maintenance. You'll learn how threat modeling, secu…
  continue reading
 
You don’t need to be a developer to influence secure code—but you do need to understand what secure coding looks like. In this episode, we break down the most important secure development practices that analysts should know when evaluating application risk or reviewing vulnerability reports. Topics include input validation, output encoding, secure …
  continue reading
 
You can't protect what you can't see. In this episode, we explore the evolving discipline of attack surface management (ASM)—a proactive process that helps security teams identify, map, and reduce the ways in which an attacker could compromise an organization. You'll learn how ASM incorporates both internal and external assets, including shadow IT,…
  continue reading
 
In a world where thousands of vulnerabilities exist, how do you decide which to address first? In this episode, we break down the art and science of vulnerability prioritization—how analysts combine CVSS scores, asset value, exploitability, and business context to triage effectively. You’ll learn how to identify which issues must be escalated to le…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play