All Episodes

Displaying 31 - 60 of 70 in total

Episode 31: Security Controls Lifecycle Management

Security controls are not set-and-forget tools—they require ongoing oversight to remain effective. In this episode, we guide you through the lifecycle of a control, fr...

Episode 32: Continuous Monitoring of Security Controls

Continuous monitoring is the mechanism by which CISOs stay ahead of threats, vulnerabilities, and operational failures. In this episode, we unpack what it means to imp...

Episode 33: Executive Audit Management

Executive engagement in audits requires more than just approvals—it involves setting expectations, directing focus, and shaping outcomes. In this episode, we explore h...

Episode 34: Crafting an Effective Security Program Charter

Every successful security program begins with a strong charter—a formal document that defines the mission, scope, authority, and governance model for your cybersecurit...

Episode 35: Creating a Security Roadmap

Once your charter is established, the next step is creating a security roadmap that charts a clear path forward. In this episode, we explain how CISOs build strategic ...

Episode 36: Budgeting Fundamentals: Planning and Strategy

In this episode, we explore the financial planning responsibilities that fall on every CCISO, starting with the fundamentals of budgeting. You’ll learn how to create a...

Episode 37: Resource Allocation Strategies for Security Leaders

Security leaders must do more than secure funding—they must make smart, defensible decisions about how to allocate people, tools, and time. In this episode, we dive in...

Episode 38: Building Effective Security Teams

No security program can succeed without a well-structured, skilled, and motivated team. In this episode, we cover how CISOs build and lead security teams that are alig...

Episode 39: Incident Management Basics

Every security leader must be prepared to lead during a crisis—and that begins with mastering the fundamentals of incident management. In this episode, we walk through...

Episode 40: Advanced Incident Response Techniques

Once the basics of incident management are in place, advanced techniques are needed to handle complex, multi-phase, or high-stakes threats. This episode dives deeper i...

Episode 41: Digital Forensics Essentials for Executives

Digital forensics is no longer just a technical specialty—it’s an executive concern that intersects with legal risk, regulatory obligations, and organizational reputat...

Episode 42: Business Continuity Planning Fundamentals

Business continuity planning (BCP) ensures that critical operations can continue even in the face of major disruptions—and CISOs play a central role in shaping those p...

Episode 43: Disaster Recovery Strategy Essentials

Disaster recovery (DR) is the technical counterpart to business continuity—and this episode explores how CISOs ensure the restoration of systems, services, and data af...

Episode 44: Security Operations Center (SOC) Basics

The Security Operations Center, or SOC, is the front line of defense against cyber threats. In this episode, we explain how SOCs operate, what core functions they perf...

Episode 45: Leveraging SIEM Solutions Strategically

Security Information and Event Management (SIEM) platforms are powerful tools for correlation, alerting, and visibility—but they can also become operational burdens if...

Episode 46: Vulnerability Management Essentials

Vulnerability management is the process of identifying, evaluating, and remediating weaknesses in systems, applications, and configurations before they can be exploite...

Episode 48: Threat Hunting Basics for Executives

Threat hunting goes beyond traditional alert-driven detection by proactively searching for indicators of compromise within the environment. In this episode, we explore...

Episode 49: Advanced Threat Hunting Concepts

Building on the previous episode, we now explore more advanced threat hunting concepts that CISOs must understand to support elite detection capabilities. You'll learn...

Episode 50: Access Control Models Overview

Access control is foundational to every security program, and this episode introduces the core models used to govern who can access what, when, and under what conditio...

Episode 51: Best Practices for Access Control

Once you've selected the right access control model, the challenge shifts to enforcing it consistently across systems, users, and environments. In this episode, we wal...

Episode 52: Endpoint Security Essentials

Endpoints represent one of the largest attack surfaces in modern organizations, making endpoint protection a critical priority. In this episode, we cover the foundatio...

Episode 53: Network Security for Executives

Network security remains a foundational element of cybersecurity architecture, even as perimeter boundaries blur in cloud-first and remote-enabled environments. In thi...

Episode 54: Cloud Security Fundamentals

As organizations migrate more infrastructure and services to the cloud, CISOs must adapt their strategies to manage risk in cloud environments. This episode introduces...

Episode 55: Data Security and Privacy Basics

Data is the crown jewel of most organizations—and protecting it is a central responsibility of the CISO. In this episode, we explore the foundational practices for sec...

Episode 56: Encryption Principles and Practices

Encryption is a cornerstone of data protection, and in this episode, we break down its role in securing data both at rest and in transit. You’ll learn about the key en...

Episode 57: Physical Security Management

While cybersecurity often dominates the conversation, physical security remains an essential component of any comprehensive security program. In this episode, we explo...

Episode 58: Mobile Device Security Essentials

With mobile devices becoming core tools for business productivity, they also represent a growing attack surface that CISOs must manage. In this episode, we examine the...

Episode 59: Virtualization Security Overview

Virtualized environments introduce a unique set of security concerns that CISOs must understand and manage. In this episode, we break down how hypervisors, virtual mac...

Episode 60: Emerging Tech in Security: AI and Machine Learning

Artificial intelligence and machine learning are rapidly reshaping the cybersecurity landscape—and CISOs must understand both their potential and their limitations. In...

Broadcast by