All Episodes

Displaying 1 - 30 of 70 in total

Episode 1: Welcome to the CISA Certification

In this opening episode of The Bare Metal Cyber CCISO Prepcast, we lay the foundation for your journey to becoming a Certified Chief Information Security Officer. The ...

Episode 2: CCISO Exam Structure, Domains, and Cognitive Levels

This episode takes a deep dive into the anatomy of the CCISO exam itself. We explain how the exam is structured, how many questions you’ll encounter, what format those...

Episode 3: CCISO Exam Eligibility and Experience Requirements

Before registering for the CCISO exam, it’s crucial to understand EC-Council’s eligibility rules—and in this episode, we walk you through every requirement. The CCISO ...

Episode 4: CCISO Exam Registration, Scheduling, and Costs

In this logistical but essential episode, we walk you through the full process of registering for the CCISO exam. From choosing your exam track and submitting your eli...

Episode 5: Key Acronyms and Terminology for the CCISO Exam

Before diving into heavy strategy and technical content, this episode gives you a valuable head start by covering the most critical acronyms, standards, and terms that...

Episode 6: Proven Exam-Day Tips and Time Management Strategies

In this high-impact episode, we focus on strategies that can make or break your CCISO exam performance. It’s not just about what you know—it’s about how you manage you...

Episode 7: Information Security Governance Basics

This episode marks the beginning of Domain 1, and we start with the fundamental principles of information security governance. You’ll learn what governance actually me...

Episode 8: Organizational Structures in Information Security

In this episode, we analyze how information security is positioned within different organizational structures and why that matters to the CCISO role. We discuss the va...

Episode 9: Information Security Roles and Responsibilities

Who does what in the security hierarchy—and how do those roles contribute to governance, risk, and compliance outcomes? This episode answers that question by mapping t...

Episode 10: Risk Management Fundamentals

Episode 11: ISO 27005 Risk Assessment Essentials

In this episode, we explore ISO/IEC 27005, the international standard that provides guidelines for information security risk management. You'll learn how ISO 27005 com...

Episode 12: NIST RMF Essentials for Executives

This episode introduces the NIST Risk Management Framework (RMF) from an executive perspective, highlighting how it applies to both federal and private sector environm...

Episode 13: FAIR Quantitative Risk Management Overview

Quantifying risk in financial terms is a vital executive skill, and this episode introduces the FAIR (Factor Analysis of Information Risk) framework to help you build ...

Episode 14: Compliance Essentials for CISOs

Compliance is more than just following rules—it’s about designing sustainable programs that meet regulatory expectations while supporting business objectives. In this ...

Episode 15: Legal and Regulatory Requirements

In this episode, we explore the legal landscape that CISOs must navigate when managing information security programs. You’ll learn about the growing body of national a...

Episode 16: GDPR Essentials for CISOs

This episode focuses on the General Data Protection Regulation (GDPR) and what CISOs must understand about it to lead global privacy programs effectively. We explore t...

Episode 17: Information Security Policy Development

Effective policy is the backbone of a sound security governance program. In this episode, we break down the entire lifecycle of policy development—from initial scoping...

Episode 18: Framework Alignment Strategies

In this strategy-focused episode, we guide you through aligning your security program with one or more established control frameworks. Whether your organization uses N...

Episode 19: Auditing Security Governance

Audit plays a vital role in validating that security governance structures are functioning as intended—and this episode teaches you how to prepare for, support, and le...

Episode 20: Third-Party and Vendor Risk Management

Vendors can introduce significant security risks into your organization—and in this episode, we explain how CISOs assess, monitor, and manage those risks at scale. You...

Episode 21: Introduction to Security Controls

This episode introduces the foundational concept of security controls and explains their critical role in any enterprise cybersecurity program. You’ll learn how contro...

Episode 22: Designing Effective Security Controls

Designing security controls isn’t just about selecting tools—it’s about architecting defenses that support business operations while addressing real threats. In this e...

Episode 23: Implementing Security Controls

Once controls are designed, the implementation phase is where strategy meets execution—and where leadership challenges often emerge. In this episode, we examine what i...

Episode 24: Measuring and Evaluating Control Effectiveness

After implementation, CISOs must continuously assess whether security controls are actually doing their job. This episode dives into the methodologies and metrics used...

Episode 25: Compliance Auditing Standards and Frameworks

In this episode, we take a comprehensive look at the major compliance standards and audit frameworks that govern information security practices across industries and g...

Episode 26: Internal Audit Process Fundamentals

This episode breaks down the internal audit process from the perspective of a security executive. You’ll learn how internal audits are used to evaluate control effecti...

Episode 27: External Audit Preparation

Unlike internal audits, external audits are driven by third parties, regulators, or clients—and come with heightened stakes and external visibility. In this episode, w...

Episode 28: Responding to and Managing Audit Findings

Once an audit is complete, the focus shifts to interpreting and responding to findings—a process that can significantly impact your credibility and the organization’s ...

Episode 29: Reporting Audit Outcomes

Audit outcomes aren’t just internal affairs—they often need to be communicated to boards, regulators, and third-party partners. This episode focuses on how CISOs summa...

Episode 30: Metrics and KPIs for Security Controls

Security metrics and key performance indicators (KPIs) are critical tools for evaluating the effectiveness of your security program. In this episode, we explain how to...

Broadcast by