All Episodes

Displaying 41 - 60 of 60 in total

Episode 40 — Explain Symmetric Asymmetric Hashing and Quantum Resistant Cryptography Clearly

This episode introduces key cryptographic concepts by explaining the differences between symmetric encryption, asymmetric encryption, hashing, and the growing discussi...

Episode 41 — Monitor Logs and Security Events Without Missing Important Signals

This episode explains how logs and security events provide the visibility needed to detect misuse, investigate anomalies, and support timely response before small issu...

Episode 42 — Triage Security Events with Use Cases Prioritization and Correlation

This episode focuses on event triage by showing how security teams prioritize alerts, apply use cases, and correlate related activity so that attention is directed tow...

Episode 43 — Triage AI Assisted SIEM Outputs and Prevent LLM Workspace Data Leakage

This episode examines how AI-assisted security information and event management outputs can help analysts work faster while also introducing new risks if summaries, pr...

Episode 44 — Profile Threat Actors by Type Motivation and Likely Behavior

This episode explains how security professionals profile threat actors by considering who they are, what motivates them, and how those motivations influence the behavi...

Episode 45 — Turn Cyber Threat Intelligence into Stronger Security Operations Decisions

This episode focuses on cyber threat intelligence as a way to improve operational judgment by turning outside information about adversaries, tools, methods, and campai...

Episode 46 — Organize Adversary Behavior with Threat Frameworks and Repeatable Thinking

This episode explains how threat frameworks help defenders organize adversary behavior into patterns that make detection, analysis, and communication more consistent. ...

Episode 47 — Implement Incident Response Plans Through Data Handling Policy Decisions

This episode connects incident response planning with data handling decisions by showing that many response actions depend on knowing what information is involved, how...

Episode 48 — Rehearse Incident Response Exercises with Testing and Tabletop Thinking

This episode focuses on incident response exercises as a practical way to test whether plans, roles, tools, and communication paths will actually work under pressure. ...

Episode 49 — Manage Asset Lifecycles Across End Of Life Software and Devices

This episode explains asset lifecycle management by emphasizing that security risk changes as software, hardware, and connected devices move from acquisition to deploy...

Episode 50 — Control Configuration and Change Management Without Creating New Risk

This episode focuses on configuration and change management as the discipline that keeps systems stable, secure, and understandable as updates, fixes, and new business...

Episode 51 — Validate Readiness Using Blue Teaming Purple Teaming and Red Teaming

This episode explains how blue teaming, purple teaming, and red teaming help organizations validate whether their controls, detections, and response processes work as ...

Episode 52 — Assess Applications with Vulnerability Scanning Static and Dynamic Analysis

This episode focuses on application assessment methods that help teams find weaknesses before they become exploited in production systems or business processes. On the...

Episode 53 — Model Application Threats Before Weaknesses Become Security Events

This episode explains threat modeling as a proactive way to think through how an application could be misused, exposed, or broken before those weaknesses turn into inc...

Episode 54 — Recognize Physical Penetration Testing Through Phishing Tailgating and Impersonation

This episode examines physical penetration testing techniques that assess whether people, facilities, and procedures can resist manipulation as effectively as technica...

Episode 55 — Strengthen Operations and Incident Response Through Full Lifecycle Scenarios

This episode brings operations and incident response together by using full lifecycle scenarios to show how preparation, detection, triage, containment, recovery, and ...

Episode 56 — Essential Terms Plain Language Glossary for Core Cybersecurity Vocabulary

This episode reviews essential cybersecurity vocabulary in plain language so that common exam terms become easier to recognize, compare, and apply in context. On the c...

Episode 57 — Integrate Data Identity Network Cloud and Governance Decisions Together

This episode shows how effective cybersecurity depends on integrating decisions across data protection, identity management, network design, cloud responsibility, and ...

Episode 58 — Build Scenario Chains Across Security Principles Governance IAM Cloud and Operations

This episode develops the ability to follow scenario chains that span security principles, governance, identity and access management, cloud responsibilities, and day-...

Episode 59 — Connect Controls Metrics Threats and Response into One Security Story

This is the last episode in the attached list, and it brings the series together by showing how controls, metrics, threat understanding, and incident response form one...

Broadcast by