All Episodes

Displaying 91 - 120 of 221 in total

Methods to Secure Data (Part 1) (Domain 3)

Protecting data effectively starts with strong core methods that control access and visibility, and in this episode, we focus on geographic restrictions and encryption...

Methods to Secure Data (Part 2) (Domain 3)

Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In th...

Methods to Secure Data (Part 2) (Domain 3)

Beyond encryption, organizations have additional tools to secure data in contexts where usability, compliance, or performance requirements call for alternatives. In th...

Methods to Secure Data (Part 3) (Domain 3)

In this final installment on data protection methods, we focus on segmentation and permission restrictions—two strategic approaches that limit both exposure and access...

High Availability and System Resilience (Domain 3)

Security isn’t just about keeping attackers out—it’s also about keeping services running when they try to bring you down. In this episode, we examine high availability...

Disaster Recovery Site Considerations (Domain 3)

Disaster recovery planning ensures that when critical infrastructure goes offline—whether due to cyberattack, natural disaster, or hardware failure—business operations...

Platform Diversity and Multi-cloud Architecture (Domain 3)

Relying on a single technology stack or vendor can introduce systemic risk, and in this episode, we explore how platform diversity and multi-cloud strategies enhance b...

Continuity of Operations and Capacity Planning (Domain 3)

Even the most secure systems are useless if they can’t operate under pressure, and this episode explores the intersection of cybersecurity with business resilience thr...

Comprehensive Testing for Resilience (Domain 3)

Preparation is only as good as its ability to withstand the unexpected, and resilience testing is how you find out whether your systems, processes, and people are trul...

Backup Strategies and Best Practices (Part 1) (Domain 3)

Backups form the last line of defense when everything else fails, and a good strategy turns potential disaster into a recoverable event. In this episode, we discuss co...

Backup Strategies and Best Practices (Part 2) (Domain 3)

Continuing our discussion on backups, this episode explores encryption, snapshots, and backup lifecycle management—three critical components of a secure, efficient, an...

Data Recovery Techniques (Domain 3)

Backups are only half of the story—the other half is how effectively you can recover from them. In this episode, we focus on data recovery techniques that turn dormant...

Power Resilience and Continuity (Domain 3)

Without reliable power, even the most secure systems are at risk of failure—and in many environments, loss of power is both a security and safety issue. In this episod...

Introduction to Domain Four — Security Operations

If Domains One through Three are about understanding the principles and design of cybersecurity, then Domain Four is about the actual day-to-day work that keeps system...

Secure Baselines and System Management (Domain 4)

Establishing a secure baseline is one of the most fundamental—and often overlooked—steps in managing system security. In this episode, we explain how baselines define ...

Hardening Computing Resources (Part 1) (Domain 4)

Hardening is the practice of stripping down systems to only what they need to function securely, and this episode focuses on doing just that for mobile devices, workst...

Hardening Computing Resources (Part 2) (Domain 4)

Continuing our discussion on hardening, this episode shifts focus to cloud infrastructure, servers, and industrial systems—each of which requires a tailored approach b...

Hardening Embedded Systems and IoT Devices (Domain 4)

Embedded systems and IoT devices often operate in environments where security is either underprioritized or extremely difficult to implement, making them prime targets...

Securing Wireless Networks (Part 1) (Domain 4)

Wireless networks offer convenience, but they also expand the attack surface by broadcasting connectivity beyond physical boundaries, making them inherently riskier th...

Securing Mobile Solutions (Domain 4)

Mobile devices have become indispensable for productivity, but they also introduce unique security challenges due to their portability, connectivity, and often persona...

Securing Mobile Connectivity (Domain 4)

Mobile devices connect through a variety of channels—cellular networks, Wi-Fi, and Bluetooth—each with its own risks and requirements for secure operation. In this epi...

Advanced Wireless Security Techniques (Domain 4)

As wireless threats become more sophisticated, organizations must move beyond basic security measures and implement advanced techniques to protect access points and us...

Application Security Essentials (Domain 4)

Applications are often the most exposed layer of an organization’s attack surface, and defending them requires both proactive development practices and reactive protec...

Isolation and Monitoring Techniques (Domain 4)

Isolation and monitoring form a defensive pairing that not only limits the spread of threats but enables rapid detection and response. In this episode, we discuss isol...

Acquisition and Procurement Security (Domain 4)

Security doesn’t start when a system is installed—it begins during the procurement process. In this episode, we examine how secure acquisition strategies reduce long-t...

Assignment, Ownership, and Classification (Domain 4)

To manage risk effectively, organizations must know what they own, who is responsible for it, and how critical it is—this is the basis of asset assignment, ownership, ...

Asset Monitoring and Tracking (Domain 4)

Security begins with visibility, and that means knowing what devices, systems, and software exist within your environment at all times. In this episode, we dive into a...

Secure Asset Disposal and Decommissioning (Domain 4)

When assets reach the end of their lifecycle, they don’t just disappear—they become potential liabilities if not securely decommissioned. In this episode, we explore t...

Data Retention and Secure Management Practices (Domain 4)

Data retention policies define what data must be kept, for how long, and under what security controls—and when they’re done right, they strike a balance between legal ...

Vulnerability Identification Methods (Part 1) (Domain 4)

Finding vulnerabilities before attackers do is a core function of modern cybersecurity, and this episode explores the technical methods used to identify them early and...

Broadcast by