CCT 141: Practice CISSP Questions - Business Impact Analysis (D1.8.1)

CCT 141: Practice CISSP Questions - Business Impact Analysis (D1.8.1)

Send us Fan Mail Fend off cyber extortionists with cutting-edge insights from our latest cyber training podcast, where Sean Gerber and I dissect the sophisticated methods to recover data from ransomware's icy grip. Inspired by a Sophos News article, we navigate through six data retrieval strategies that could save your business in a pinch, emphasizing that while there's no magic bullet, prioritizing certain file types could make all the difference in your recovery efforts. And because we know...

Episoder(341)

CCT 338: LinkedIn Monitoring - Support for Patch and Vulnerability Management (Domain 7)

CCT 338: LinkedIn Monitoring - Support for Patch and Vulnerability Management (Domain 7)

Send us Fan Mail LinkedIn might be doing more in your browser than you think. We start with a report dubbing it “BrowserGate” a claim that LinkedIn quietly checks for installed Chrome extensions using...

6 Apr 23min

CCT 337: UK Manufacture Attacks - CISSP Deep Dive (Domain 4)

CCT 337: UK Manufacture Attacks - CISSP Deep Dive (Domain 4)

Send us Fan Mail A ransomware headline is easy to ignore until you realize it can shut down a factory line, break supplier networks, and trigger contract penalties that dwarf the original IT cleanup. ...

2 Apr 32min

CCT 336 - Cyber Niche's and Submitting CPEs

CCT 336 - Cyber Niche's and Submitting CPEs

Send us Fan Mail Passing the CISSP is a huge win, but the part that quietly ends careers is what comes after: keeping the certification active. I walk you through how to submit ISC2 CPEs in a way that...

30 Mar 25min

CCT 335: Indian CCTV and CISSP Question Deep Dive (Domain 3)

CCT 335: Indian CCTV and CISSP Question Deep Dive (Domain 3)

Send us Fan Mail A cheap camera on a pole can become a surveillance pipeline, and that’s not a movie plot, it’s a real security problem. I start with a news-driven look at alleged CCTV espionage tied ...

26 Mar 21min

CCT 334: CISA and Stryker Attack and AI GRC Foundational Concepts

CCT 334: CISA and Stryker Attack and AI GRC Foundational Concepts

Send us Fan Mail The fastest way to lose control of your security program is to ignore the systems that control everything else. I start with a timely CISA warning: attackers went after an endpoint ma...

23 Mar 29min

CCT 333: Patch Or Get Hacked (iPhones) - CISSP Questions Deep Dive (Domain 2)

CCT 333: Patch Or Get Hacked (iPhones) - CISSP Questions Deep Dive (Domain 2)

Send us Fan Mail A “just visiting a website” iPhone hack is the kind of story that snaps you out of autopilot, and that’s where we start. Dark Sword shows how sophisticated mobile malware can ride on ...

19 Mar 30min

CCT 332: A Winning CISO/CSO and AI Changing Cyber Forever (Career Planning)

CCT 332: A Winning CISO/CSO and AI Changing Cyber Forever (Career Planning)

Send us Fan Mail AI is not a future cybersecurity problem. It is a right now career problem, and it is also a massive opportunity if you prepare the right way. I walk through how AI is changing cybers...

16 Mar 34min

CCT 331: AI And Cyber Insurance Risk & CISSP Deep Dive Questions (Domain 1)

CCT 331: AI And Cyber Insurance Risk & CISSP Deep Dive Questions (Domain 1)

Send us Fan Mail AI is starting to change cybersecurity budgets in a surprising place: cyber insurance premiums. We dig into why insurers now care about how you use AI, how “more automation” can still...

12 Mar 27min

Populært innen Fakta

mikkels-paskenotter
fastlegen
dine-penger-pengeradet
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
foreldreradet
treningspodden
rss-strid-de-norske-borgerkrigene
jakt-og-fiskepodden
rss-bisarr-historie
hverdagspsyken
sinnsyn
rss-kull
gravid-uke-for-uke
fryktlos
level-up-med-anniken-binz
rss-kunsten-a-leve
tomprat-med-gunnar-tjomlid
hagespiren-podcast
uroskolen
hva-er-greia-med