All Episodes

Displaying 81 - 100 of 101 in total

Episode 81 — Virtualization and Container Security Basics

Virtualization and containers have revolutionized how systems are deployed, but they’ve also redefined the attack surface. This episode explains how hypervisors, virtu...

Episode 82 — Secrets Management and Key Handling

Every system depends on secrets—API tokens, encryption keys, and credentials—and this episode focuses on how to protect them. You’ll learn the difference between stori...

Episode 83 — Data Classification and Handling Requirements

Not all data is created equal, and this episode explains how classification brings order and protection to information assets. You’ll learn how organizations categoriz...

Episode 84 — Data Loss Prevention: Endpoints, Network, and Cloud

Data Loss Prevention (DLP) combines technology and policy to stop sensitive information from leaving where it belongs. This episode introduces the core DLP models—endp...

Episode 85 — Email Security: SPF, DKIM, DMARC, and Gateways

Email remains the top vector for phishing, fraud, and malware, and this episode explains how layered defenses counter those risks. You’ll learn how Sender Policy Frame...

Episode 86 — Secure File Transfer and Collaboration Patterns

As organizations share data across teams, vendors, and regions, secure file transfer becomes essential to maintaining trust. This episode explains the difference betwe...

Episode 87 — Supply Chain and Third-Party Risk

Every organization depends on vendors and partners, and this episode examines how that dependency creates new exposure. You’ll learn how software and hardware supply c...

Episode 88 — Physical Security and Environmental Controls

Cybersecurity may dominate headlines, but physical safeguards remain just as vital. This episode explores how physical and environmental controls protect systems from ...

Episode 89 — Legal, Privacy, and Ethics for Practitioners

Cybersecurity is as much about responsibility as it is about technology, and this episode explores the legal and ethical framework professionals must navigate. You’ll ...

Episode 90 — Metrics and Reporting: Turning Data into Decisions

Metrics are how security proves its value, and this episode teaches you how to turn measurements into meaningful management insight. You’ll learn how to distinguish be...

Episode 91 — Detection Engineering Basics: From Hypothesis to Rule

Detection engineering bridges the gap between raw telemetry and actionable alerts, and this episode explores how the process works. You’ll learn how analysts form hypo...

Episode 92 — Playbooks and Runbooks: Standardizing Response

Consistency under pressure saves time, and this episode explains how playbooks and runbooks make that possible. You’ll learn the difference between the two: playbooks ...

Episode 93 — Incident Response I: Preparation and Detection

Incident response begins long before an alert fires, and this episode focuses on the first two phases—preparation and detection. You’ll learn how preparation includes ...

Episode 94 — Incident Response II: Containment, Eradication, and Recovery

Once an incident is confirmed, response shifts from analysis to action. This episode explores containment strategies—isolating infected hosts, blocking malicious domai...

Episode 95 — Post-Incident Activities: Lessons, RCA, and Controls

Every incident ends with questions: what happened, why, and how to prevent it next time. This episode explains how post-incident reviews turn disruption into progress....

Episode 96 — Frameworks Overview: CIS, NIST CSF, and ATT&CK

Security frameworks turn best practices into organized action, and this episode introduces three of the most widely used: the Center for Internet Security (CIS) Contro...

Episode 97 — Mapping Controls to Risks and Threats

A control has no value unless it addresses a real risk, and this episode explores how to build that connection intentionally. You’ll learn how risk assessments identif...

Episode 98 — Building a Security Program: Roadmaps and Maturity

A strong security program doesn’t happen by chance—it’s built through deliberate planning and continuous growth. This episode walks through how to design, implement, a...

Episode 99 — Continuous Improvement: Audits, Drills, and Reviews

Improvement only happens when you measure and test what you’ve built. This episode focuses on how audits, exercises, and management reviews sustain progress after cont...

Episode 100 — Final Exam-Day Readiness: Calm, Confident Execution

Every hour of study leads to this moment, and this closing episode focuses on how to perform at your best when it counts. You’ll learn strategies for managing nerves, ...

Broadcast by