Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Incident Response Podcasts

show episodes
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork
 
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork

1
Forensic Focus

Forensic Focus: Digital Forensics, Incident Response, DFIR

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
  continue reading
 
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
  continue reading
 
The Bare Metal Cyber CISM Prepcast is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers ...
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Interviews, stories and lessons learned from experienced crisis leaders. Email the show at [email protected]. Being an effective leader in a corporate or public crisis situation requires knowledge, tenacity, and influencing skills. Unfortunately, most of us don't get much training or real experience dealing with crisis situations. On this podcast, we will talk with people who have lived through major crisis events and we will tap their experience and stories from the front lines of cr ...
  continue reading
 
Artwork

1
The Digital Forensics Files Podcast

Tyler Hatch, B.A., LL.B.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
  continue reading
 
Artwork

1
SOCTales

Matt Ford

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
  continue reading
 
Artwork
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork

1
Cyber Cafe

Lesline Gilzene

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Embark on a riveting journey into the heart of the cybersecurity career with host Lesline Gilzene, as she immerses you in the exploration of data breaches, incident response, and captivating real-world cybercrime narratives, uncovering the thriving stories of those on the front line of digital defense.
  continue reading
 
Artwork

51
Cyber Defense Indonesia

Cyber Defense Indonesia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
  continue reading
 
Artwork
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
SRE Prodcast brings Google's experience with Site Reliability Engineering together with special guests and exciting topics to discuss the present and future of reliable production engineering!
  continue reading
 
Artwork

1
The Breach Report

Robert Wortmann, Rense Buijen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
  continue reading
 
Artwork

1
C.S. Cyber

Shawn Waldman and Chad Robinson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
  continue reading
 
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Artwork

1
The Critical Channel

criticalchannel.io

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
#critical, #incidents, #war-room, #sos. Every startup creates one at some point: a channel in which, whenever the fecal matter strikes the atmospheric propulsor, an attempt at coordination takes place. It's one of those ubiquitous inevitabilities of working in the tech scene today. Our very own Critical Channel, however, aims to highlight some different inevitabilities. From organisational culture in a high-growth situation, to personal mental health and work-life balance. From manipulating ...
  continue reading
 
Artwork
 
The FOX News Rundown is the place to find in-depth reporting on the news that impacts you. Each morning, Mike Emanuel, Dave Anthony, Lisa Brady, Jessica Rosenthal, and Chris Foster take a deep dive into the major and controversial stories of the day, tapping into the massive reporting resources of FOX News to provide a full picture of the news. Plus, every night, The FOX News Rundown: Evening Edition brings you even more coverage of the day's biggest stories and on the weekend, you’ll hear e ...
  continue reading
 
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
  continue reading
 
Artwork
 
Welcome to the Ogletree Deakins podcast page. Here, you can expect to hear timely and conversational discussions on labor and employment law topics covering the latest developments and trending issues impacting employers. We encourage you to subscribe and also rate and review if you find the podcast useful. Contact us with topics you’d like to hear, questions, and feedback at [email protected] or follow us on LinkedIn or Twitter (@OgletreeDeakins).
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
Artwork

1
Security Cocktail Hour

Joe Patti and Adam Roth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
  continue reading
 
Artwork

1
Digital Detectives

Legal Talk Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Digital Detectives. We'll discuss computer forensics, electronic discovery and information security issues and what's really happening in the trenches. It's not theory, but practical information that you can use in your law practice on the Legal Talk Network.
  continue reading
 
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
  continue reading
 
The Employee Safety Podcast is for professionals responsible for the safety and well-being of their employees. Today’s world has a wide array of threats: wildfires, hurricanes, civil unrest, acts of violence, a global pandemic. We will discuss how to protect your employees from all of these threats—whether they’re in the office, working remotely, or traveling for business. Each episode features an interview with a leader in employee safety, discussing topics such as emergency preparedness, b ...
  continue reading
 
Artwork

1
The DevSecOps Talks Podcast

Mattias Hemmingsson, Julien Bisconti and Andrey Devyatkin

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is the show by and for DevSecOps practitioners who are trying to survive information overload, get through marketing nonsense, do the right technology bets, help their organizations to deliver value, and last but not the least to have some fun. Tune in for talks about technology, ways of working, and news from DevSecOps. This show is not sponsored by any technology vendor and trying to be as unbiased as possible. We talk like no one is listening! For good or bad :) For more info, show n ...
  continue reading
 
Artwork

1
Industrial Strength Podcast

Industrial Strength Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A podcast more focused on industrial fire departments and industrial hazmat response. From discussing interesting calls, to talking about equipment, to touching on distinctly corporate aspects of the job, the Industrial Strength team delves into different aspects of working within an industrial hazmat team. Through these podcasts the team endeavors to shed more light on what’s often an overlooked part of the public safety sector for other industry insiders as well as visitors from municipal ...
  continue reading
 
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives​. Skills Gap: List ...
  continue reading
 
Artwork
 
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
  continue reading
 
Want a peak behind the curtain into one of the best places to work in cybersecurity and the minds of the innovators behind the industry’s leading security operations platform? Tune in to The Howler podcast! Hosted by Chelsea Lowman, People Experience Specialist, and Mary Newville, People Experience Senior Manager, the culture duo connects with pack leaders on leadership insights, mental health and overall wellbeing, and how they lead their teams to advance our mission of ending cyber risk.
  continue reading
 
Artwork

1
Disasterthon

Jonny Llama

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Disasterthon, the podcast where calamity takes center stage. Each episode, we dive deep into the most gripping and heart-wrenching disasters across history and around the globe. From harrowing building collapses to roller coaster tragedies, we uncover the stories behind the headlines. Join us as we explore the tumultuous world of natural disasters, oceanic accidents, and much more. Through expert interviews, survivor stories, and detailed analysis, we offer a unique perspective on ...
  continue reading
 
"Smoke Break" is a weekly micro-podcast that delivers essential management strategies for convenience store managers in just 5-10 minutes. Join host Mike as he shares actionable insights on inventory control, staff management, profitability, and operational excellence. Each episode tackles real-world challenges faced by c-store managers, providing practical solutions you can implement immediately to improve store performance and advance your career. Perfect for busy managers who want to stay ...
  continue reading
 
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
  continue reading
 
Loading …
show series
 
Incident response is only effective if the right people are informed at the right time. In this episode, we explore how to build a communication plan that includes internal reporting, external notifications, and stakeholder escalation. CISM candidates must understand how to handle communication flow under pressure. Ready to start your journey with …
  continue reading
 
Welcome to episode seven of our water series ✅ Want to join our newsletter and receive real-time alerts and cybersecurity news in your inbox? https://securecyberdefense.com/contact-us/ ✅ Like and Subscribe to our YouTube channel to spread critical cybersecurity news and insights. / @securecyberdefense ✅ Follow us on Twitter @secdefllc for real-time…
  continue reading
 
Cyber threats aren't slowing down—and neither are we. In episode 38 of Cyber Security America, I sit down with two powerhouses from Surefire Cyber—Karla Reffold and Billy Cordio—to pull back the curtain on what’s really happening in today’s incident response and threat intelligence landscape. 💡 What we cover: 📈 Real-world ransomware trends (like lo…
  continue reading
 
In part two of our Cybersecurity installment of our Workplace Strategies Watercooler 2025 podcast series, Ben Perry (shareholder, Nashville) and Justin Tarka (partner, London) discuss the steps to take after resolving and containing a ransomware incident. Justin and Ben, who is co-chair of the firm’s Cybersecurity and Privacy Practice Group, highli…
  continue reading
 
President Trump achieved significant victories at the Supreme Court during its most recent term. Perhaps the biggest was when the Court limited the power of federal judges and their use of nationwide injunctions. The Trump administration has argued that lower courts were abusing their power and using injunctions to halt parts of the administration'…
  continue reading
 
This past Friday, the United States celebrated the Fourth of July, commemorating the signing of the Declaration of Independence in 1776. America's history is marked by periods of both hardship and prosperity, which have profoundly influenced our legislation, culture, and perspectives in numerous ways. Presidential historian and author Craig Shirley…
  continue reading
 
Mature security programs improve over time. In this final episode, we explain how to lead post-incident reviews, implement lessons learned, and reassess risk in light of new data. This is where governance, program management, and incident handling come full circle—just as ISACA intends for CISM-certified leaders. Ready to start your journey with co…
  continue reading
 
Managing risk doesn’t stop with one decision. In this episode, we explore how to supervise treatment activities (mitigation, transfer, acceptance) and establish ongoing monitoring to ensure sustained performance. These continuous oversight tasks are key to mastering Domain 2 and real-world risk leadership. Ready to start your journey with confidenc…
  continue reading
 
CISM-certified professionals must oversee—not just conduct—risk assessments. This episode covers how to supervise the process, validate results, and ensure assessments align with business priorities. ISACA expects you to understand both tactical execution and leadership-level oversight. Ready to start your journey with confidence? Learn more at Bar…
  continue reading
 
Vendors, suppliers, and partners all affect your risk posture. This episode explores how to define, enforce, and monitor external security requirements. You’ll learn how to handle audits, compliance failures, and communication with third parties—real-world skills with high relevance on the CISM exam. Ready to start your journey with confidence? Lea…
  continue reading
 
In this episode, we cover how to embed security into core business workflows—from procurement to development and beyond. You’ll learn how to ensure that security requirements become part of how the organization works, not just what it reacts to. Expect exam questions on integration in Domains 1, 3, and 4. Ready to start your journey with confidence…
  continue reading
 
Security must support the mission. This episode teaches you how to align your security initiatives with day-to-day business operations, process priorities, and performance expectations. This strategic alignment is central to Domain 3 and may appear in scenario questions about resource conflicts or program goals. Ready to start your journey with con…
  continue reading
 
Metrics turn performance into visibility. This episode shows you how to define, collect, and report information security metrics that support governance, justify decisions, and improve outcomes. You’ll also learn how ISACA expects you to evaluate effectiveness—a frequent target in Domain 3 and 4 questions. Ready to start your journey with confidenc…
  continue reading
 
CISM candidates must know how to report program results and risk insights to both executives and operational teams. This episode explains how to compile relevant data, translate it into actionable insights, and tailor the message to your audience. Exam questions will test your ability to do all three well. Ready to start your journey with confidenc…
  continue reading
 
Effective governance depends on clear roles and responsibilities. In this episode, we walk through how to assign, document, and communicate who owns what in your security program. From the board to front-line staff, clarity reduces risk and improves accountability—both on the exam and in real practice. Ready to start your journey with confidence? L…
  continue reading
 
Security programs rise or fall on leadership support. This episode teaches you how to earn and sustain executive commitment, communicate risk in business terms, and align your initiatives with organizational strategy. These skills show up in both Domain 1 and complex CISM scenario questions. Ready to start your journey with confidence? Learn more a…
  continue reading
 
CISM leaders must champion security through influence, not just authority. In this episode, we cover how to build and communicate compelling business cases for security investments. Learn how to present risk, value, and outcomes in language stakeholders understand—an essential Domain 1 and 3 skill for exam day. Ready to start your journey with conf…
  continue reading
 
Budgeting is about more than asking for money—it’s about justifying value. This episode explains how to estimate costs, present return on investment, and align security spending with business priorities. Expect questions on budgeting tradeoffs, prioritization, and executive persuasion on the CISM exam. Ready to start your journey with confidence? L…
  continue reading
 
Security can’t operate in a silo. This episode covers how to embed information security into broader corporate governance, ensuring risk, compliance, and audit processes align with your program. Learn how to advocate for security at the board level—just as ISACA expects of successful CISM candidates. Ready to start your journey with confidence? Lea…
  continue reading
 
Frameworks turn strategy into structure. In this episode, we explain how to implement security governance frameworks like COBIT and ISO in ways that support accountability, transparency, and control. If the exam asks you how to operationalize governance, this episode gives you the language to answer it. Ready to start your journey with confidence? …
  continue reading
 
Security strategy must serve the business. This episode walks you through aligning your security vision, priorities, and investment with what the organization truly values—its mission, objectives, and risk tolerance. This alignment is a core competency for CISM holders and appears frequently in Domain 1 questions. Ready to start your journey with c…
  continue reading
 
Domain 1 isn’t just about governance—it’s about understanding what shapes strategy. This episode teaches you how to identify organizational drivers, market forces, regulatory shifts, and threat evolution, and how to reflect these in your security planning. These insights often form the basis of scenario questions. Ready to start your journey with c…
  continue reading
 
CISM professionals must know how to lead structured post-incident reviews. This episode explains how to capture lessons learned, evaluate what went wrong (and right), and recommend improvements. You’ll also learn how to document findings in a way that supports governance and future risk mitigation. Ready to start your journey with confidence? Learn…
  continue reading
 
After eradication comes recovery—and it must be secure. This episode shows you how to safely bring systems back online, validate their integrity, and ensure that no backdoors or residual threats remain. These post-incident steps are essential in both the real world and your CISM Domain 4 study strategy. Ready to start your journey with confidence? …
  continue reading
 
Eradication is where you eliminate the root cause of an incident. This episode walks you through how to fully remove malware, close exploited vulnerabilities, and validate that threats are no longer active. You’ll also learn how to document these efforts—something ISACA expects you to be able to do on the exam. Ready to start your journey with conf…
  continue reading
 
Containment is a critical phase in incident response—and a highly tested concept in Domain 4. This episode covers the strategies and decision points for containing incidents, from isolating affected systems to segmenting networks and communicating quickly. Learn how to apply containment while minimizing operational disruption. Ready to start your j…
  continue reading
 
You don’t have to be a forensic analyst—but you do need to understand the basics. This episode explains how evidence is collected, preserved, and documented during an incident. We also explore the chain of custody, admissibility, and the role of forensic data in investigations—high-value knowledge for the exam. Ready to start your journey with conf…
  continue reading
 
CISM candidates must understand how to manage an incident investigation. This episode covers how to gather evidence, document timelines, identify root causes, and follow structured investigative methods. You’ll learn how to support legal compliance and continuous improvement—all key areas of Domain 4. Ready to start your journey with confidence? Le…
  continue reading
 
Tools can streamline detection, coordination, and resolution during incidents. In this episode, we explore common technologies used in incident management, from SIEM platforms to communication systems. Learn what ISACA wants you to know about selecting, deploying, and using these tools strategically. Ready to start your journey with confidence? Lea…
  continue reading
 
Your incident response plan is only as strong as your ability to execute it. This episode covers how to train staff, conduct simulations, and evaluate performance to ensure your organization is prepared for real-world incidents. These lifecycle elements are important for both the exam and maturing your security function. Ready to start your journey…
  continue reading
 
Classifying incidents accurately enables proper response. In this episode, we discuss how to build an incident classification system based on impact, type, and severity—key for escalation and prioritization. These concepts are frequently tested in Domain 4 and appear in both technical and business-aligned scenarios. Ready to start your journey with…
  continue reading
 
A DRP must be tested, maintained, and improved over time to remain effective. This episode explains how to schedule recovery tests, evaluate outcomes, and implement improvements based on performance data. These lifecycle management concepts show up across multiple CISM domains and often appear in scenario-based questions. Ready to start your journe…
  continue reading
 
Disaster recovery planning ensures technology and data availability during a crisis. In this episode, we break down how to design and document a DRP that complements your BCP and incident response plan. You'll learn key recovery metrics, backup strategies, and restoration procedures—vital for the exam and real-world execution. Ready to start your j…
  continue reading
 
Business continuity is broader than disaster recovery—and the CISM exam knows it. This episode explains how to build a BCP that supports organizational resilience, continuity of operations, and stakeholder assurance. Learn the difference between continuity and crisis management and how ISACA frames these within Domain 4. Ready to start your journey…
  continue reading
 
CISM Domain 4 expects you to know how to conduct a business impact analysis. In this episode, we walk through how to identify critical functions, assess downtime impacts, and define recovery objectives like RTO and RPO. BIA supports planning for continuity, disaster recovery, and incident response—all tested areas on the exam. Ready to start your j…
  continue reading
 
An outdated incident response plan is a liability. This episode teaches you how to maintain IR documentation over time, incorporate lessons learned, and update plans to reflect changes in business structure, threat landscape, or regulatory requirements. Expect exam questions that test your ability to keep IR plans relevant and effective. Ready to s…
  continue reading
 
Domain 4 begins here. This episode walks you through how to design a comprehensive incident response plan—from defining roles and escalation paths to documenting procedures for detection, containment, and recovery. These are foundational skills for managing security incidents and passing the exam. Ready to start your journey with confidence? Learn …
  continue reading
 
Strong security programs communicate effectively. In this episode, we explain how to report program performance, risks, and control status to senior leaders, stakeholders, and technical staff. You’ll learn how to tailor your message and present strategic metrics—skills often tested in scenario-based exam questions. Ready to start your journey with …
  continue reading
 
Once a vendor is onboarded, the work doesn’t stop. This episode covers how to include security clauses in contracts, define SLAs, and monitor vendor compliance over time. We also address continuous assessment techniques and escalation procedures—high-yield content for your exam and real-world leadership. Ready to start your journey with confidence?…
  continue reading
 
Third-party vendors can expand capabilities—or introduce serious risk. This episode explains how to evaluate vendors before selection by conducting security assessments, verifying compliance, and aligning third-party practices with internal governance. These are must-know processes for Domain 3 and 4 questions. Ready to start your journey with conf…
  continue reading
 
Security programs fail without user participation. This episode explores how to build training and awareness initiatives that promote secure behavior and reinforce governance. You’ll learn how to design, deliver, and evaluate training that supports strategic goals and satisfies exam objectives in Domain 3. Ready to start your journey with confidenc…
  continue reading
 
Testing controls is how you validate effectiveness—and it’s a must-know area for the exam. In this episode, we walk through test design, performance validation, and how to evaluate controls in both technical and organizational contexts. If you’re studying Domain 3, this is essential listening. Ready to start your journey with confidence? Learn more…
  continue reading
 
CISM candidates must know how to implement controls—not just select them. This episode covers how to plan, deploy, and integrate security controls across the enterprise. You’ll also learn about common integration challenges, stakeholder alignment, and performance tracking. This is a high-impact Domain 3 topic. Ready to start your journey with confi…
  continue reading
 
Controls are at the heart of any security program. This episode shows you how to choose the right controls based on risk assessments, business impact, and regulatory requirements. We also explain how control selection is tested on the exam and how to approach questions with a governance mindset. Ready to start your journey with confidence? Learn mo…
  continue reading
 
If you can’t measure it, you can’t manage it. In this episode, we cover how to create meaningful metrics for tracking the effectiveness of your security program. You’ll learn how to align metrics with strategic goals, define KPIs, and communicate results—critical for demonstrating program value on the CISM exam. Ready to start your journey with con…
  continue reading
 
Policies set direction—but procedures make things happen. This episode teaches you how to translate security policies into actionable procedures and practical guidelines. You’ll learn what ISACA expects in terms of clarity, accountability, and alignment with business operations—concepts tested heavily in Domain 3. Ready to start your journey with c…
  continue reading
 
Every security program is built on policy. In this episode, we cover how to draft policies that support governance, define behavior, and reflect organizational risk appetite. We also walk through policy lifecycle management—creation, approval, communication, and revision—exactly what Domain 3 tests. Ready to start your journey with confidence? Lear…
  continue reading
 
Domain 3 expects you to apply security frameworks—not just memorize them. In this episode, we explain how to align your program with standards like ISO 27001, NIST SP 800-53, and COBIT. Learn how to tailor controls, document decisions, and pass audits while staying focused on business needs. Ready to start your journey with confidence? Learn more a…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play