Episode 221: Developing and Executing Security Awareness Programs (Domain 5)
16 Jun 2025
Contributed by Lukas
Security awareness programs don’t happen by accident—they’re built with intent, tested with fe...
Episode 220: Security Reporting and Monitoring (Domain 5)
16 Jun 2025
Contributed by Lukas
A well-informed workforce should be empowered not just to avoid risk—but to report it. In this epi...
Episode 219: Hybrid and Remote Work Security Awareness (Domain 5)
16 Jun 2025
Contributed by Lukas
Remote and hybrid work models create new layers of security complexity—blending corporate environm...
Episode 218: User Guidance and Training (Part 3) (Domain 5)
16 Jun 2025
Contributed by Lukas
Security training must evolve with the threat landscape—and that means addressing common but high-...
Episode 217: User Guidance and Training (Part 2) (Domain 5)
16 Jun 2025
Contributed by Lukas
Beyond basic policy understanding, users need targeted training in key risk areas that attackers fre...
Episode 216: User Guidance and Training (Part 1) (Domain 5)
16 Jun 2025
Contributed by Lukas
Users are often the first and last line of defense in cybersecurity, and their success depends on cl...
Episode 215: Anomalous Behavior Recognition (Domain 5)
16 Jun 2025
Contributed by Lukas
Cyber threats often hide in plain sight, masquerading as normal user activity until they trigger som...
Episode 214: Effective Phishing Awareness (Domain 5)
16 Jun 2025
Contributed by Lukas
Phishing remains one of the most effective—and dangerous—forms of cyberattack because it targets...
Episode 213: Reconnaissance Techniques (Domain 5)
16 Jun 2025
Contributed by Lukas
Reconnaissance is the first phase of any attack—and the first opportunity for defenders to detect ...
Episode 212: Penetration Testing Environments (Domain 5)
16 Jun 2025
Contributed by Lukas
The value of a penetration test is closely tied to how realistic the environment is—and in this ep...
Episode 211: Fundamentals of Penetration Testing (Domain 5)
16 Jun 2025
Contributed by Lukas
Penetration testing goes beyond identifying vulnerabilities—it simulates real-world attacks to see...
Episode 210: External Audits and Assessments (Domain 5)
16 Jun 2025
Contributed by Lukas
External audits provide an independent review of an organization’s security and compliance posture...
Episode 209: Internal Audit Structures (Domain 5)
16 Jun 2025
Contributed by Lukas
The effectiveness of internal audits depends not just on what’s reviewed, but on how the audit fun...
Episode 208: Attestation and Internal Audits (Domain 5)
16 Jun 2025
Contributed by Lukas
Attestation and internal audits are two of the most powerful tools for ensuring your security progra...
Episode 207: Data Management and Compliance (Domain 5)
16 Jun 2025
Contributed by Lukas
Effective data management is critical for both operational success and regulatory compliance, and in...
Episode 206: Privacy and Legal Implications of Compliance (Domain 5)
16 Jun 2025
Contributed by Lukas
Privacy and compliance are deeply intertwined, especially as global regulations push organizations t...
Episode 205: Data Inventory, Retention, and the Right to Be Forgotten (Domain 5)
16 Jun 2025
Contributed by Lukas
Managing personal data effectively starts with knowing exactly what you have, where it lives, how lo...
Episode 204: Privacy Laws and Global Compliance (Domain 5)
16 Jun 2025
Contributed by Lukas
Data privacy is no longer just a legal issue—it’s a global business imperative, and this episode...
Episode 203: Attestation and Acknowledgement in Compliance (Domain 5)
16 Jun 2025
Contributed by Lukas
Attestation and acknowledgement are critical for ensuring that individuals and third parties formall...
Episode 202: Consequences of Non-Compliance (Domain 5)
16 Jun 2025
Contributed by Lukas
Failing to meet regulatory or contractual obligations can carry severe consequences, both financiall...
Episode 201: Effective Compliance Reporting (Domain 5)
16 Jun 2025
Contributed by Lukas
Compliance reporting ensures that an organization can demonstrate adherence to regulatory, contractu...
Episode 200: Ongoing Vendor Monitoring and Engagement (Domain 5)
16 Jun 2025
Contributed by Lukas
Vendor risk doesn’t stop after the contract is signed—ongoing monitoring and relationship manage...
Episode 199: Agreement Types and Contractual Security (Domain 5)
16 Jun 2025
Contributed by Lukas
Contracts are one of the most powerful tools in managing cybersecurity obligations, and in this epis...
Episode 198: Vendor Risk and Supply Chain Considerations (Domain 5)
16 Jun 2025
Contributed by Lukas
A growing portion of cybersecurity risk now comes from outside the organization—specifically, thro...
Episode 197: Mean Time Metrics and System Resilience (Domain 5)
16 Jun 2025
Contributed by Lukas
System resilience depends not only on planning but on measurable performance—and in this episode, ...
Episode 196: Understanding Recovery Objectives (Domain 5)
16 Jun 2025
Contributed by Lukas
Recovery objectives define how quickly and how completely a system must return to functionality afte...
Episode 195: Business Impact Analysis (Domain 5)
16 Jun 2025
Contributed by Lukas
Business Impact Analysis (BIA) is the foundation of business continuity and disaster recovery planni...
Episode 194: Risk Reporting and Communication (Domain 5)
16 Jun 2025
Contributed by Lukas
Risk is meaningless if it isn’t communicated effectively—and in this episode, we focus on how ri...
Episode 193: Risk Management Strategies (Domain 5)
16 Jun 2025
Contributed by Lukas
Once risks are identified and analyzed, organizations must decide how to respond—and in this episo...
Episode 192: Risk Appetite, Tolerance, and Thresholds (Domain 5)
16 Jun 2025
Contributed by Lukas
Every organization must decide how much risk it is willing to accept in pursuit of its goals—and t...
Episode 191: Risk Registers and Key Risk Indicators (Domain 5)
16 Jun 2025
Contributed by Lukas
Managing risk at scale requires tools that provide structure and visibility, and in this episode, we...
Episode 190: Risk Analysis and Scoring (Domain 5)
16 Jun 2025
Contributed by Lukas
After risks are identified, they need to be analyzed and prioritized—and that’s where risk scori...
Episode 189: Conducting Risk Assessments (Domain 5)
16 Jun 2025
Contributed by Lukas
Risk assessments provide the data organizations need to make informed security decisions, and in thi...
Episode 188: Risk Management Fundamentals (Domain 5)
16 Jun 2025
Contributed by Lukas
Risk management is the engine that drives strategic decision-making in security, helping organizatio...
Episode 187: Governance Structures and Roles (Part 2) (Domain 5)
16 Jun 2025
Contributed by Lukas
Having a governance structure is only the beginning—the real value comes from clearly defining rol...
Episode 186: Governance Structures and Roles (Part 1) (Domain 5)
16 Jun 2025
Contributed by Lukas
Security governance relies on a clear structure that defines how decisions are made, who enforces th...
Episode 185: Monitoring and Revising Governance Policies (Domain 5)
16 Jun 2025
Contributed by Lukas
Security policies must evolve with technology, threat landscapes, and business goals—and that’s ...
Episode 184: External Security Governance Considerations (Domain 5)
16 Jun 2025
Contributed by Lukas
Security doesn't operate in a vacuum—organizations must navigate a complex web of external conside...
Episode 183: Procedures and Playbooks (Domain 5)
16 Jun 2025
Contributed by Lukas
Procedures and playbooks are the operational backbone of a mature security program—translating pol...
Episode 182: Security Standards and Physical Controls (Domain 5)
16 Jun 2025
Contributed by Lukas
Standards and controls turn high-level policy into actionable, enforceable security, and in this epi...
Episode 181: Incident Response Policies and Procedures (Domain 5)
16 Jun 2025
Contributed by Lukas
An effective incident response program starts with well-defined policies and procedures that guide e...
Episode 180: Key Security Policies and Standards (Domain 5)
16 Jun 2025
Contributed by Lukas
Policies and standards are the written expression of an organization’s security expectations—and...
Episode 179: Introduction to Security Governance (Domain 5)
16 Jun 2025
Contributed by Lukas
Security governance is the blueprint for how an organization manages its security strategy, aligns i...
Episode 178: Introduction to Domain Five — Security Program Management and Oversight
16 Jun 2025
Contributed by Lukas
Cybersecurity isn’t just about blocking attacks and managing firewalls. It’s also about building...
Episode 177: Packet Captures in Investigations (Domain 4)
16 Jun 2025
Contributed by Lukas
Packet captures are the most detailed and revealing form of network data available to defenders—sh...
Episode 176: Dashboards and Visualization Tools (Domain 4)
16 Jun 2025
Contributed by Lukas
A well-designed dashboard can turn complex security data into fast, actionable insight—and in this...
Episode 175: Vulnerability Scan Data and Automated Reporting (Domain 4)
16 Jun 2025
Contributed by Lukas
Vulnerability scan data is only useful when it’s collected, organized, and presented in a way that...
Episode 174: Leveraging Log Data (Part 2) (Domain 4)
16 Jun 2025
Contributed by Lukas
In this continuation of our log analysis discussion, we shift from collection to interpretation—ex...
Episode 173: Leveraging Log Data (Part 1) (Domain 4)
16 Jun 2025
Contributed by Lukas
Logs are the record books of your infrastructure, capturing who did what, when, and where—and in t...
Episode 172: Forensic Evidence Preservation and E-Discovery (Domain 4)
16 Jun 2025
Contributed by Lukas
Once digital evidence is collected, preserving it and producing it responsibly are the next critical...
Episode 171: Forensics – Data Acquisition and Reporting (Domain 4)
16 Jun 2025
Contributed by Lukas
Capturing and reporting digital evidence is a delicate process that must be repeatable, verifiable, ...
Episode 170: Digital Forensics Foundations (Domain 4)
16 Jun 2025
Contributed by Lukas
When a security incident occurs, understanding what happened—and proving it—requires digital for...
Episode 169: Root Cause Analysis and Threat Hunting (Domain 4)
16 Jun 2025
Contributed by Lukas
Stopping an incident isn’t enough—you have to understand how it happened and whether something d...
Episode 168: Incident Response Training and Testing (Domain 4)
16 Jun 2025
Contributed by Lukas
A well-written incident response plan is only useful if your team knows how to execute it—and the ...
Episode 167: Incident Response – Lessons Learned (Domain 4)
16 Jun 2025
Contributed by Lukas
Every incident is a learning opportunity, and the final step of the response lifecycle—lessons lea...
Episode 166: Incident Response Process (Part 2) (Domain 4)
16 Jun 2025
Contributed by Lukas
Following detection and analysis, the next phases in an incident response plan are containment, erad...
Episode 165: Incident Response Process (Part 1) (Domain 4)
16 Jun 2025
Contributed by Lukas
A strong incident response process can mean the difference between a contained event and a catastrop...
Episode 164: Considerations for Security Automation (Part 2) (Domain 4)
16 Jun 2025
Contributed by Lukas
Continuing our discussion on automation pitfalls, this episode focuses on the risk of single points ...
Episode 163: Considerations for Security Automation (Part 1) (Domain 4)
16 Jun 2025
Contributed by Lukas
As powerful as automation is, it’s not without challenges—and in this episode, we dive into the ...
Episode 162: Benefits of Security Automation (Part 2) (Domain 4)
16 Jun 2025
Contributed by Lukas
Building on the first part of our automation series, this episode explores how security automation i...
Episode 161: Benefits of Security Automation (Part 1) (Domain 4)
16 Jun 2025
Contributed by Lukas
Security automation offers more than just saved time—it fundamentally transforms how teams operate...
Episode 160: Continuous Integration and API Automation (Domain 4)
16 Jun 2025
Contributed by Lukas
Security needs to move at the speed of development, and that’s where continuous integration (CI) a...
Episode 159: Technical Debt in Automation (Domain 4)
16 Jun 2025
Contributed by Lukas
As security teams automate more of their operations, they often accumulate technical debt—shortcut...
Episode 158: Automation and Scripting in Security (Domain 4)
16 Jun 2025
Contributed by Lukas
In modern cybersecurity, manual processes can’t keep up with the scale and speed of threats—maki...
Episode 157: Privileged Access Management (PAM) (Domain 4)
16 Jun 2025
Contributed by Lukas
Privileged accounts are the crown jewels of any IT environment, and their misuse—whether accidenta...
Episode 156: Secure Password Management (Domain 4)
16 Jun 2025
Contributed by Lukas
Passwords continue to serve as a primary access method for many systems, and in this episode, we exa...
Episode 155: MFA Authentication Factors (Domain 4)
16 Jun 2025
Contributed by Lukas
Multifactor authentication is only as strong as the diversity and reliability of the factors it uses...
Episode 154: Multifactor Authentication (MFA) Implementations (Domain 4)
16 Jun 2025
Contributed by Lukas
Multifactor Authentication (MFA) is one of the most effective ways to prevent unauthorized access, a...
Episode 153: Advanced Access Controls and Least Privilege (Domain 4)
16 Jun 2025
Contributed by Lukas
Access controls must go beyond static roles to enforce the principle of least privilege in real time...
Episode 152: Access Control Models (Part 2) (Domain 4)
16 Jun 2025
Contributed by Lukas
In this second installment on access control models, we focus on more adaptive and scalable approach...
Episode 151: Access Control Models (Part 1) (Domain 4)
16 Jun 2025
Contributed by Lukas
Access control models define who can access what, under which conditions—and in this episode, we b...
Episode 150: Interoperability and Attestation (Domain 4)
16 Jun 2025
Contributed by Lukas
As organizations adopt more diverse platforms, cloud services, and third-party integrations, the abi...
Episode 149: Single Sign-On (SSO) and Protocols (Domain 4)
16 Jun 2025
Contributed by Lukas
Single Sign-On (SSO) allows users to access multiple systems with a single set of credentials, enhan...
Episode 148: Identity Proofing and Federation (Domain 4)
16 Jun 2025
Contributed by Lukas
Before you can secure access, you have to know who’s requesting it—and identity proofing ensures...
Episode 147: User Account Provisioning and Permission Management (Domain 4)
16 Jun 2025
Contributed by Lukas
Creating, modifying, and revoking user accounts may sound like routine IT work—but it’s a fundam...
Episode 146: User Behavior Analytics (Domain 4)
16 Jun 2025
Contributed by Lukas
User Behavior Analytics (UBA) shifts the security paradigm from rules-based alerts to behavioral bas...
Episode 145: Network Access Control and Endpoint Protection (Domain 4)
16 Jun 2025
Contributed by Lukas
Controlling access at the point of connection is one of the most effective ways to prevent unauthori...
Episode 144: File Integrity Monitoring and Data Loss Prevention (Domain 4)
16 Jun 2025
Contributed by Lukas
File Integrity Monitoring (FIM) and Data Loss Prevention (DLP) tools are essential for detecting tam...
Episode 143: DNS Filtering and Email Security Enhancements (Domain 4)
16 Jun 2025
Contributed by Lukas
DNS and email are two of the most commonly exploited services in cyberattacks—and securing them re...
Episode 142: Secure Protocol Implementation (Domain 4)
16 Jun 2025
Contributed by Lukas
Not all protocols are created equal—and using the wrong one can open a serious security hole in yo...
Episode 141: Operating System Security Enhancements (Domain 4)
16 Jun 2025
Contributed by Lukas
The operating system is the beating heart of any computing device—and securing it properly lays th...
Episode 140: Web Filtering and Content Security (Domain 4)
16 Jun 2025
Contributed by Lukas
Web filtering and content security are essential for managing user behavior and blocking malicious o...
Episode 139: Enhancing IDS/IPS Effectiveness (Domain 4)
16 Jun 2025
Contributed by Lukas
Intrusion Detection and Prevention Systems (IDS/IPS) are powerful tools—but their effectiveness de...
Episode 138: Enhancing Firewall Capabilities (Domain 4)
16 Jun 2025
Contributed by Lukas
Firewalls are often the first line of defense—but they’re only as effective as the rules, archit...
Episode 137: Vulnerability Scanning Tools and Practices (Domain 4)
16 Jun 2025
Contributed by Lukas
Proactive security means finding and fixing weaknesses before attackers do, and vulnerability scanni...
Episode 136: Network-Based Monitoring Tools (Domain 4)
16 Jun 2025
Contributed by Lukas
The network is where everything intersects—making it one of the most important vantage points for ...
Episode 135: Endpoint and Data Security Monitoring Tools (Domain 4)
16 Jun 2025
Contributed by Lukas
Endpoints—laptops, desktops, mobile devices—are where most cyberattacks begin, making endpoint s...
Episode 134: Security Monitoring Tools (Part 2) (Domain 4)
16 Jun 2025
Contributed by Lukas
Building on our previous discussion, this episode explores more advanced and specialized monitoring ...
Episode 133: Security Monitoring Tools (Part 1) (Domain 4)
16 Jun 2025
Contributed by Lukas
Choosing the right tools shapes how effectively you can detect, understand, and respond to threats. ...
Episode 132: Alert Response and Validation (Domain 4)
16 Jun 2025
Contributed by Lukas
Alerts are only effective when they result in meaningful, timely responses—and this episode explor...
Episode 131: Key Security Monitoring Activities (Part 2) (Domain 4)
16 Jun 2025
Contributed by Lukas
Beyond real-time alerting, monitoring supports long-term visibility, compliance, and forensics throu...
Episode 130: Key Security Monitoring Activities (Part 1) (Domain 4)
16 Jun 2025
Contributed by Lukas
Monitoring is most valuable when it drives action, and in this episode, we explore foundational acti...
Episode 129: Monitoring Computing Resources (Domain 4)
16 Jun 2025
Contributed by Lukas
Monitoring is the heartbeat of any modern security operation, providing real-time visibility into sy...
Episode 128: Effective Vulnerability Reporting (Domain 4)
16 Jun 2025
Contributed by Lukas
Clear, actionable reporting is the bridge between technical discovery and organizational response, a...
Episode 127: Validation of Remediation Efforts (Domain 4)
15 Jun 2025
Contributed by Lukas
Fixing a vulnerability doesn’t mean it’s gone—it means it needs to be verified. In this episod...
Episode 126: Vulnerability Response and Remediation (Part 2) (Domain 4)
15 Jun 2025
Contributed by Lukas
Not all vulnerabilities can be patched right away, and in these cases, compensating controls, segmen...
Episode 125: Vulnerability Response and Remediation (Part 1) (Domain 4)
15 Jun 2025
Contributed by Lukas
Finding vulnerabilities is only useful if you have a plan to fix them—and this episode dives into ...
Episode 124: Vulnerability Analysis and Prioritization (Part 2) (Domain 4)
15 Jun 2025
Contributed by Lukas
Expanding on the concepts of vulnerability prioritization, this episode introduces industry-standard...
Episode 123: Vulnerability Analysis and Prioritization (Part 1) (Domain 4)
15 Jun 2025
Contributed by Lukas
Once vulnerabilities are identified, the next challenge is determining which ones require immediate ...
Episode 122: System and Process Auditing (Domain 4)
15 Jun 2025
Contributed by Lukas
Auditing is how security teams verify that controls are working, policies are being followed, and no...