Episode 16 — Manage Implementation of Security Strategies Across People, Process, Technology

This episode focuses on executing security strategy across people, process, and technology, which ISSMP tests because success depends on coordinated change management, clear accountability, and operational adoption, not just selecting controls. You will learn how to break strategy into implementable initiatives, define owners and decision points, and coordinate delivery across IT, development, operations, legal, procurement, and business units. Scenarios include deploying a new access management approach, rolling out security baselines, or formalizing third-party assurance, where sequencing and stakeholder engagement determine whether the program sticks. Best practices include setting milestones, defining acceptance criteria, managing dependencies, and maintaining traceable evidence for audits and leadership reporting. Troubleshooting addresses resistance, inconsistent implementation, tool sprawl, and process bypasses, with techniques like standard patterns, exception workflows, targeted training, and feedback loops that surface issues before they become program failures. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 16 — Manage Implementation of Security Strategies Across People, Process, Technology
Broadcast by