ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Incident Response Podcasts
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
…
continue reading
The Bare Metal Cyber CISM Prepcast is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers ...
…
continue reading
"Tune into 'The Firehouse' on WRHU 88.7 FM, a show dedicated to the heartbeat of New York's volunteer fire departments. Experience firsthand stories of bravery, community, and unyielding spirit."
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Discussion about Incident Response topics, Malware, Blue Team, Detection, Logging, Forensics, and catching the bad actors
…
continue reading
Interviews, stories and lessons learned from experienced crisis leaders. Email the show at [email protected]. Being an effective leader in a corporate or public crisis situation requires knowledge, tenacity, and influencing skills. Unfortunately, most of us don't get much training or real experience dealing with crisis situations. On this podcast, we will talk with people who have lived through major crisis events and we will tap their experience and stories from the front lines of cr ...
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
My picks of the month for the happenings in the DFIR community
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
An original podcast series from the Materials Technology Institute, focused on materials in the processing industry and the experts within the community.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
Embark on a riveting journey into the heart of the cybersecurity career with host Lesline Gilzene, as she immerses you in the exploration of data breaches, incident response, and captivating real-world cybercrime narratives, uncovering the thriving stories of those on the front line of digital defense.
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
SRE Prodcast brings Google's experience with Site Reliability Engineering together with special guests and exciting topics to discuss the present and future of reliable production engineering!
…
continue reading
The latest news from Sky News Australia.
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
…
continue reading
SC Media and Snyk are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
The Forensic Lunch! The one hour, mostly, live digital forensics and incident response focused video cast and podcast.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
#critical, #incidents, #war-room, #sos. Every startup creates one at some point: a channel in which, whenever the fecal matter strikes the atmospheric propulsor, an attempt at coordination takes place. It's one of those ubiquitous inevitabilities of working in the tech scene today. Our very own Critical Channel, however, aims to highlight some different inevitabilities. From organisational culture in a high-growth situation, to personal mental health and work-life balance. From manipulating ...
…
continue reading
The FOX News Rundown is the place to find in-depth reporting on the news that impacts you. Each morning, Mike Emanuel, Dave Anthony, Lisa Brady, Jessica Rosenthal, and Chris Foster take a deep dive into the major and controversial stories of the day, tapping into the massive reporting resources of FOX News to provide a full picture of the news. Plus, every night, The FOX News Rundown: Evening Edition brings you even more coverage of the day's biggest stories and on the weekend, you’ll hear e ...
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
Welcome to the Ogletree Deakins podcast page. Here, you can expect to hear timely and conversational discussions on labor and employment law topics covering the latest developments and trending issues impacting employers. We encourage you to subscribe and also rate and review if you find the podcast useful. Contact us with topics you’d like to hear, questions, and feedback at [email protected] or follow us on LinkedIn or Twitter (@OgletreeDeakins).
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
…
continue reading
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
…
continue reading
SC Media and Snyk are proud to present this month’s CISO Stories program, where CISOs share tales from the trenches and unpack leadership lessons learned along the way. Hosted by Jessica Hoffman.
…
continue reading
Preparing Organizations for Managing Crisis
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
The Employee Safety Podcast is for professionals responsible for the safety and well-being of their employees. Today’s world has a wide array of threats: wildfires, hurricanes, civil unrest, acts of violence, a global pandemic. We will discuss how to protect your employees from all of these threats—whether they’re in the office, working remotely, or traveling for business. Each episode features an interview with a leader in employee safety, discussing topics such as emergency preparedness, b ...
…
continue reading
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
…
continue reading
A podcast more focused on industrial fire departments and industrial hazmat response. From discussing interesting calls, to talking about equipment, to touching on distinctly corporate aspects of the job, the Industrial Strength team delves into different aspects of working within an industrial hazmat team. Through these podcasts the team endeavors to shed more light on what’s often an overlooked part of the public safety sector for other industry insiders as well as visitors from municipal ...
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Want a peak behind the curtain into one of the best places to work in cybersecurity and the minds of the innovators behind the industry’s leading security operations platform? Tune in to The Howler podcast! Hosted by Chelsea Lowman, People Experience Specialist, and Mary Newville, People Experience Senior Manager, the culture duo connects with pack leaders on leadership insights, mental health and overall wellbeing, and how they lead their teams to advance our mission of ending cyber risk.
…
continue reading
Welcome to Disasterthon, the podcast where calamity takes center stage. Each episode, we dive deep into the most gripping and heart-wrenching disasters across history and around the globe. From harrowing building collapses to roller coaster tragedies, we uncover the stories behind the headlines. Join us as we explore the tumultuous world of natural disasters, oceanic accidents, and much more. Through expert interviews, survivor stories, and detailed analysis, we offer a unique perspective on ...
…
continue reading
"Smoke Break" is a weekly micro-podcast that delivers essential management strategies for convenience store managers in just 5-10 minutes. Join host Mike as he shares actionable insights on inventory control, staff management, profitability, and operational excellence. Each episode tackles real-world challenges faced by c-store managers, providing practical solutions you can implement immediately to improve store performance and advance your career. Perfect for busy managers who want to stay ...
…
continue reading
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
…
continue reading

1
Episode 52: Incident Response Communications: Reporting, Notification, and Escalation
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54Incident response is only effective if the right people are informed at the right time. In this episode, we explore how to build a communication plan that includes internal reporting, external notifications, and stakeholder escalation. CISM candidates must understand how to handle communication flow under pressure. Ready to start your journey with …
…
continue reading

1
When Things Go Wrong – Incident Response Basics | Securing Water And Wastewater
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21Welcome to episode seven of our water series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/contact-us/ ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefllc for real-time…
…
continue reading

1
Digital Forensics & Incident Response (DFIR) with Surefire Cyber.
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42Cyber threats aren't slowing down—and neither are we. In episode 38 of Cyber Security America, I sit down with two powerhouses from Surefire Cyber—Karla Reffold and Billy Cordio—to pull back the curtain on what’s really happening in today’s incident response and threat intelligence landscape. 💡 What we cover: 📈 Real-world ransomware trends (like lo…
…
continue reading

1
Workplace Strategies Watercooler 2025: A Ransomware Incident Response Simulation, Part 2
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39In part two of our Cybersecurity installment of our Workplace Strategies Watercooler 2025 podcast series, Ben Perry (shareholder, Nashville) and Justin Tarka (partner, London) discuss the steps to take after resolving and containing a ransomware incident. Justin and Ben, who is co-chair of the firm’s Cybersecurity and Privacy Practice Group, highli…
…
continue reading

1
Australian Jewish leaders call for change after antisemitic attacks
2:53
2:53
Play later
Play later
Lists
Like
Liked
2:53Fire at Melbourne business related to Israel, China seeks to boost tech relation with Australia. Plus, the Reserve Bank is expected to cut the cash rates again. See omnystudio.com/listener for privacy information.By Sky News Australia / NZ
…
continue reading

1
Extra: A Supreme Setback For 'Judicial Activism'
21:47
21:47
Play later
Play later
Lists
Like
Liked
21:47President Trump achieved significant victories at the Supreme Court during its most recent term. Perhaps the biggest was when the Court limited the power of federal judges and their use of nationwide injunctions. The Trump administration has argued that lower courts were abusing their power and using injunctions to halt parts of the administration'…
…
continue reading

1
Leaders react to Melbourne antisemitic attacks
3:29
3:29
Play later
Play later
Lists
Like
Liked
3:29Israel’s Prime Minister responds to antisemitic incidents in Melbourne after a man is arrested over a synagogue arson attack. Plus, Australia’s Prime Minister spends Sunday with Fijian leaders at the Wallabies rugby test in Newcastle. See omnystudio.com/listener for privacy information.By Sky News Australia / NZ
…
continue reading

1
From Washington: How American Patriotism Has Transformed Through History
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02This past Friday, the United States celebrated the Fourth of July, commemorating the signing of the Declaration of Independence in 1776. America's history is marked by periods of both hardship and prosperity, which have profoundly influenced our legislation, culture, and perspectives in numerous ways. Presidential historian and author Craig Shirley…
…
continue reading

1
Episode 71: Continuous Improvement through Post-Incident Reviews and Risk Reassessment
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Mature security programs improve over time. In this final episode, we explain how to lead post-incident reviews, implement lessons learned, and reassess risk in light of new data. This is where governance, program management, and incident handling come full circle—just as ISACA intends for CISM-certified leaders. Ready to start your journey with co…
…
continue reading

1
Episode 70: Supervising Risk Treatment and Continuous Monitoring
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23Managing risk doesn’t stop with one decision. In this episode, we explore how to supervise treatment activities (mitigation, transfer, acceptance) and establish ongoing monitoring to ensure sustained performance. These continuous oversight tasks are key to mastering Domain 2 and real-world risk leadership. Ready to start your journey with confidenc…
…
continue reading

1
Episode 69: Supervising Risk Identification and Assessment
10:57
10:57
Play later
Play later
Lists
Like
Liked
10:57CISM-certified professionals must oversee—not just conduct—risk assessments. This episode covers how to supervise the process, validate results, and ensure assessments align with business priorities. ISACA expects you to understand both tactical execution and leadership-level oversight. Ready to start your journey with confidence? Learn more at Bar…
…
continue reading

1
Episode 68: Managing and Monitoring Security Compliance with External Parties
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42Vendors, suppliers, and partners all affect your risk posture. This episode explores how to define, enforce, and monitor external security requirements. You’ll learn how to handle audits, compliance failures, and communication with third parties—real-world skills with high relevance on the CISM exam. Ready to start your journey with confidence? Lea…
…
continue reading

1
Episode 67: Integrating Security Requirements into Organizational Processes
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42In this episode, we cover how to embed security into core business workflows—from procurement to development and beyond. You’ll learn how to ensure that security requirements become part of how the organization works, not just what it reacts to. Expect exam questions on integration in Domains 1, 3, and 4. Ready to start your journey with confidence…
…
continue reading

1
Episode 66: Aligning Security Programs with Operational Business Objectives
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59Security must support the mission. This episode teaches you how to align your security initiatives with day-to-day business operations, process priorities, and performance expectations. This strategic alignment is central to Domain 3 and may appear in scenario questions about resource conflicts or program goals. Ready to start your journey with con…
…
continue reading

1
Episode 65: Evaluating and Reporting Information Security Metrics
11:37
11:37
Play later
Play later
Lists
Like
Liked
11:37Metrics turn performance into visibility. This episode shows you how to define, collect, and report information security metrics that support governance, justify decisions, and improve outcomes. You’ll also learn how ISACA expects you to evaluate effectiveness—a frequent target in Domain 3 and 4 questions. Ready to start your journey with confidenc…
…
continue reading

1
Episode 64: Compiling and Presenting Effective Security Reports
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56CISM candidates must know how to report program results and risk insights to both executives and operational teams. This episode explains how to compile relevant data, translate it into actionable insights, and tailor the message to your audience. Exam questions will test your ability to do all three well. Ready to start your journey with confidenc…
…
continue reading

1
Episode 63: Defining and Communicating Security Roles and Responsibilities
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39Effective governance depends on clear roles and responsibilities. In this episode, we walk through how to assign, document, and communicate who owns what in your security program. From the board to front-line staff, clarity reduces risk and improves accountability—both on the exam and in real practice. Ready to start your journey with confidence? L…
…
continue reading

1
Episode 62: Gaining Senior Leadership Commitment and Stakeholder Support
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02Security programs rise or fall on leadership support. This episode teaches you how to earn and sustain executive commitment, communicate risk in business terms, and align your initiatives with organizational strategy. These skills show up in both Domain 1 and complex CISM scenario questions. Ready to start your journey with confidence? Learn more a…
…
continue reading

1
Episode 61: Communicating the Business Case and Gaining Stakeholder Buy-In
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09CISM leaders must champion security through influence, not just authority. In this episode, we cover how to build and communicate compelling business cases for security investments. Learn how to present risk, value, and outcomes in language stakeholders understand—an essential Domain 1 and 3 skill for exam day. Ready to start your journey with conf…
…
continue reading

1
Episode 60: Building Effective Security Budgets and ROI Analysis
12:08
12:08
Play later
Play later
Lists
Like
Liked
12:08Budgeting is about more than asking for money—it’s about justifying value. This episode explains how to estimate costs, present return on investment, and align security spending with business priorities. Expect questions on budgeting tradeoffs, prioritization, and executive persuasion on the CISM exam. Ready to start your journey with confidence? L…
…
continue reading

1
Episode 59: Integrating Information Security into Corporate Governance
12:19
12:19
Play later
Play later
Lists
Like
Liked
12:19Security can’t operate in a silo. This episode covers how to embed information security into broader corporate governance, ensuring risk, compliance, and audit processes align with your program. Learn how to advocate for security at the board level—just as ISACA expects of successful CISM candidates. Ready to start your journey with confidence? Lea…
…
continue reading

1
Episode 58: Implementing Information Security Governance Frameworks
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20Frameworks turn strategy into structure. In this episode, we explain how to implement security governance frameworks like COBIT and ISO in ways that support accountability, transparency, and control. If the exam asks you how to operationalize governance, this episode gives you the language to answer it. Ready to start your journey with confidence? …
…
continue reading

1
Episode 57: Establishing Information Security Strategy Aligned with Organizational Goals
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06Security strategy must serve the business. This episode walks you through aligning your security vision, priorities, and investment with what the organization truly values—its mission, objectives, and risk tolerance. This alignment is a core competency for CISM holders and appears frequently in Domain 1 questions. Ready to start your journey with c…
…
continue reading

1
Episode 56: Identifying Internal and External Influences on Security Strategy
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29Domain 1 isn’t just about governance—it’s about understanding what shapes strategy. This episode teaches you how to identify organizational drivers, market forces, regulatory shifts, and threat evolution, and how to reflect these in your security planning. These insights often form the basis of scenario questions. Ready to start your journey with c…
…
continue reading

1
Episode 55: Conducting Meaningful Post-Incident Reviews
11:45
11:45
Play later
Play later
Lists
Like
Liked
11:45CISM professionals must know how to lead structured post-incident reviews. This episode explains how to capture lessons learned, evaluate what went wrong (and right), and recommend improvements. You’ll also learn how to document findings in a way that supports governance and future risk mitigation. Ready to start your journey with confidence? Learn…
…
continue reading

1
Episode 54: Techniques for Secure Recovery and Restoration
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10After eradication comes recovery—and it must be secure. This episode shows you how to safely bring systems back online, validate their integrity, and ensure that no backdoors or residual threats remain. These post-incident steps are essential in both the real world and your CISM Domain 4 study strategy. Ready to start your journey with confidence? …
…
continue reading

1
Episode 53: Techniques for Incident Eradication
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22Eradication is where you eliminate the root cause of an incident. This episode walks you through how to fully remove malware, close exploited vulnerabilities, and validate that threats are no longer active. You’ll also learn how to document these efforts—something ISACA expects you to be able to do on the exam. Ready to start your journey with conf…
…
continue reading

1
Episode 51: Effective Incident Containment Methods
11:40
11:40
Play later
Play later
Lists
Like
Liked
11:40Containment is a critical phase in incident response—and a highly tested concept in Domain 4. This episode covers the strategies and decision points for containing incidents, from isolating affected systems to segmenting networks and communicating quickly. Learn how to apply containment while minimizing operational disruption. Ready to start your j…
…
continue reading

1
Episode 50: Digital Forensics and Evidence Collection Basics
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46You don’t have to be a forensic analyst—but you do need to understand the basics. This episode explains how evidence is collected, preserved, and documented during an incident. We also explore the chain of custody, admissibility, and the role of forensic data in investigations—high-value knowledge for the exam. Ready to start your journey with conf…
…
continue reading

1
Episode 49: Incident Investigation Methodologies
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11CISM candidates must understand how to manage an incident investigation. This episode covers how to gather evidence, document timelines, identify root causes, and follow structured investigative methods. You’ll learn how to support legal compliance and continuous improvement—all key areas of Domain 4. Ready to start your journey with confidence? Le…
…
continue reading

1
Episode 48: Incident Management Tools and Techniques
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50Tools can streamline detection, coordination, and resolution during incidents. In this episode, we explore common technologies used in incident management, from SIEM platforms to communication systems. Learn what ISACA wants you to know about selecting, deploying, and using these tools strategically. Ready to start your journey with confidence? Lea…
…
continue reading

1
Episode 47: Training, Testing, and Evaluating Your Incident Management Capabilities
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56Your incident response plan is only as strong as your ability to execute it. This episode covers how to train staff, conduct simulations, and evaluate performance to ensure your organization is prepared for real-world incidents. These lifecycle elements are important for both the exam and maturing your security function. Ready to start your journey…
…
continue reading

1
Episode 46: Incident Classification and Categorization Methods
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13Classifying incidents accurately enables proper response. In this episode, we discuss how to build an incident classification system based on impact, type, and severity—key for escalation and prioritization. These concepts are frequently tested in Domain 4 and appear in both technical and business-aligned scenarios. Ready to start your journey with…
…
continue reading

1
Episode 45: Testing, Maintenance, and Improvement of Your DRP
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55A DRP must be tested, maintained, and improved over time to remain effective. This episode explains how to schedule recovery tests, evaluate outcomes, and implement improvements based on performance data. These lifecycle management concepts show up across multiple CISM domains and often appear in scenario-based questions. Ready to start your journe…
…
continue reading

1
Episode 44: Designing Your Disaster Recovery Plan (DRP)
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21Disaster recovery planning ensures technology and data availability during a crisis. In this episode, we break down how to design and document a DRP that complements your BCP and incident response plan. You'll learn key recovery metrics, backup strategies, and restoration procedures—vital for the exam and real-world execution. Ready to start your j…
…
continue reading

1
Episode 43: Building Your Business Continuity Plan (BCP)
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52Business continuity is broader than disaster recovery—and the CISM exam knows it. This episode explains how to build a BCP that supports organizational resilience, continuity of operations, and stakeholder assurance. Learn the difference between continuity and crisis management and how ISACA frames these within Domain 4. Ready to start your journey…
…
continue reading

1
Episode 42: Conducting Business Impact Analysis (BIA
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23CISM Domain 4 expects you to know how to conduct a business impact analysis. In this episode, we walk through how to identify critical functions, assess downtime impacts, and define recovery objectives like RTO and RPO. BIA supports planning for continuity, disaster recovery, and incident response—all tested areas on the exam. Ready to start your j…
…
continue reading

1
Episode 41: Maintaining and Updating Your Incident Response Plan
9:16
9:16
Play later
Play later
Lists
Like
Liked
9:16An outdated incident response plan is a liability. This episode teaches you how to maintain IR documentation over time, incorporate lessons learned, and update plans to reflect changes in business structure, threat landscape, or regulatory requirements. Expect exam questions that test your ability to keep IR plans relevant and effective. Ready to s…
…
continue reading

1
Episode 40: Designing and Documenting the Incident Response Plan
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07Domain 4 begins here. This episode walks you through how to design a comprehensive incident response plan—from defining roles and escalation paths to documenting procedures for detection, containment, and recovery. These are foundational skills for managing security incidents and passing the exam. Ready to start your journey with confidence? Learn …
…
continue reading

1
Episode 39: Communications and Reporting for the Information Security Program
8:59
8:59
Play later
Play later
Lists
Like
Liked
8:59Strong security programs communicate effectively. In this episode, we explain how to report program performance, risks, and control status to senior leaders, stakeholders, and technical staff. You’ll learn how to tailor your message and present strategic metrics—skills often tested in scenario-based exam questions. Ready to start your journey with …
…
continue reading

1
Episode 38: Contractual Security Requirements and Ongoing Vendor Monitoring
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Once a vendor is onboarded, the work doesn’t stop. This episode covers how to include security clauses in contracts, define SLAs, and monitor vendor compliance over time. We also address continuous assessment techniques and escalation procedures—high-yield content for your exam and real-world leadership. Ready to start your journey with confidence?…
…
continue reading

1
Episode 37: Vendor Risk Assessment and Selection
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35Third-party vendors can expand capabilities—or introduce serious risk. This episode explains how to evaluate vendors before selection by conducting security assessments, verifying compliance, and aligning third-party practices with internal governance. These are must-know processes for Domain 3 and 4 questions. Ready to start your journey with conf…
…
continue reading

1
Episode 36: Developing Engaging Information Security Awareness and Training Programs
9:21
9:21
Play later
Play later
Lists
Like
Liked
9:21Security programs fail without user participation. This episode explores how to build training and awareness initiatives that promote secure behavior and reinforce governance. You’ll learn how to design, deliver, and evaluate training that supports strategic goals and satisfies exam objectives in Domain 3. Ready to start your journey with confidenc…
…
continue reading

1
Episode 35: Techniques for Information Security Control Testing and Evaluation
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Testing controls is how you validate effectiveness—and it’s a must-know area for the exam. In this episode, we walk through test design, performance validation, and how to evaluate controls in both technical and organizational contexts. If you’re studying Domain 3, this is essential listening. Ready to start your journey with confidence? Learn more…
…
continue reading

1
Episode 34: Implementing and Integrating Information Security Controls
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08CISM candidates must know how to implement controls—not just select them. This episode covers how to plan, deploy, and integrate security controls across the enterprise. You’ll also learn about common integration challenges, stakeholder alignment, and performance tracking. This is a high-impact Domain 3 topic. Ready to start your journey with confi…
…
continue reading

1
Episode 33: Designing and Selecting Effective Information Security Controls
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15Controls are at the heart of any security program. This episode shows you how to choose the right controls based on risk assessments, business impact, and regulatory requirements. We also explain how control selection is tested on the exam and how to approach questions with a governance mindset. Ready to start your journey with confidence? Learn mo…
…
continue reading

1
Episode 32: Developing and Using Information Security Program Metrics
9:18
9:18
Play later
Play later
Lists
Like
Liked
9:18If you can’t measure it, you can’t manage it. In this episode, we cover how to create meaningful metrics for tracking the effectiveness of your security program. You’ll learn how to align metrics with strategic goals, define KPIs, and communicate results—critical for demonstrating program value on the CISM exam. Ready to start your journey with con…
…
continue reading

1
Episode 31: Writing Actionable Procedures and Guidelines
9:51
9:51
Play later
Play later
Lists
Like
Liked
9:51Policies set direction—but procedures make things happen. This episode teaches you how to translate security policies into actionable procedures and practical guidelines. You’ll learn what ISACA expects in terms of clarity, accountability, and alignment with business operations—concepts tested heavily in Domain 3. Ready to start your journey with c…
…
continue reading

1
Episode 30: Developing Effective Security Policies
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01Every security program is built on policy. In this episode, we cover how to draft policies that support governance, define behavior, and reflect organizational risk appetite. We also walk through policy lifecycle management—creation, approval, communication, and revision—exactly what Domain 3 tests. Ready to start your journey with confidence? Lear…
…
continue reading

1
Episode 29: Applying Industry Standards and Frameworks to Your Security Program
10:16
10:16
Play later
Play later
Lists
Like
Liked
10:16Domain 3 expects you to apply security frameworks—not just memorize them. In this episode, we explain how to align your program with standards like ISO 27001, NIST SP 800-53, and COBIT. Learn how to tailor controls, document decisions, and pass audits while staying focused on business needs. Ready to start your journey with confidence? Learn more a…
…
continue reading