All Episodes

Displaying 61 - 80 of 120 in total

Episode 60 — Define Risk Program Objectives With Owners, Stakeholders, and Clear Scope

This episode teaches how to define risk program objectives with clear owners, stakeholders, scope boundaries, and success measures, because ISSMP questions often test ...

Episode 61 — Identify Risk Tolerance and Appetite and Translate It Into Real Decisions

This episode explains how to identify organizational risk tolerance and risk appetite and then translate those concepts into concrete security decisions, because ISSMP...

Episode 62 — Build and Verify Asset Inventory Inputs That Make Risk Analysis Reliable

This episode teaches how to build and verify the asset inventory inputs that make risk analysis reliable, because ISSMP scenarios routinely fail candidates who assume ...

Episode 63 — Analyze Organizational Risks and Select Countermeasures and Compensating Controls

This episode explains how to analyze organizational risks and select countermeasures and compensating controls that fit real constraints, because ISSMP expects leaders...

Episode 64 — Choose Risk Treatment Options and Perform Cost-Benefit Analysis That Persuades

This episode teaches how to choose among risk treatment options—mitigate, transfer, avoid, or accept—and perform cost-benefit analysis that persuades leadership, which...

Episode 65 — Document and Manage Agreed Risks, Issues, Treatments, and Accountability

This episode focuses on documenting and managing agreed risks, issues, treatments, and accountability so decisions remain traceable and enforceable, because ISSMP ques...

Episode 66 — Test, Monitor, and Report Risks and Issues With Operational Follow-Through

This episode explains how to test, monitor, and report risks and issues with operational follow-through, because ISSMP expects risk management to produce measurable ac...

Episode 67 — Manage Supply Chain Risk Objectives Across Vendors, Suppliers, and Partners

This episode teaches how to manage supply chain risk objectives across vendors, suppliers, and partners, because ISSMP scenarios often test whether you can extend gove...

Episode 68 — Integrate Third-Party Risks Into Enterprise Risk Management End to End

This episode explains how to integrate third-party risks into enterprise risk management end to end, which matters for ISSMP because vendor risks must be expressed, tr...

Episode 69 — Verify and Validate Supply Chain Controls and Confirm They Actually Work

This episode focuses on verifying and validating supply chain controls and confirming they actually work, because ISSMP questions often hinge on the difference between...

Episode 70 — Monitor and Review Supply Chain Risks as Dependencies and Threats Change

This episode teaches how to monitor and review supply chain risks as dependencies and threats change, because ISSMP expects leaders to manage supply chain risk as a li...

Episode 71 — Identify Risk Factors and Pick the Right Risk Assessment Approach

This episode explains how to identify meaningful risk factors and select the right risk assessment approach for the situation, because the ISSMP exam regularly tests w...

Episode 72 — Perform Risk Analysis With Repeatable Methods and Defensible Results

This episode teaches how to perform risk analysis using repeatable methods that produce defensible results, which is essential for ISSMP because governance bodies, aud...

Episode 73 — Identify Risk Controls and Determine Control Effectiveness With Evidence

This episode focuses on identifying risk controls and determining control effectiveness using evidence, because ISSMP expects you to manage security by verifying what ...

Episode 74 — Evaluate Control Coverage, Gaps, and Overlap Across the Control Portfolio

This episode explains how to evaluate control coverage, gaps, and overlap across the control portfolio, a common ISSMP competency because mature programs avoid both bl...

Episode 75 — Monitor and Report Control Effectiveness and Coverage for Decision-Makers

This episode teaches how to monitor and report control effectiveness and coverage in a way that supports decision-makers, because ISSMP questions often test whether yo...

Episode 76 — Establish and Maintain a Security Operations Center With Essential Documentation

This episode explains how to establish and maintain a security operations center with essential documentation, because ISSMP expects security managers to deliver consi...

Episode 77 — Aggregate Threat Intelligence From Multiple Sources Into Usable Context

This episode teaches how to aggregate threat intelligence from multiple sources and convert it into usable context, which matters for ISSMP because the exam tests whet...

Episode 78 — Baseline Network, Data, and User Behavior to Make Detection Credible

This episode focuses on baselining network, data, and user behavior so detection is credible, because ISSMP scenarios often hinge on distinguishing real anomalies from...

Episode 79 — Detect and Analyze Anomalous Behavior Patterns for Actionable Security Triage

This episode teaches how to detect and analyze anomalous behavior patterns so security triage becomes actionable rather than chaotic, which is critical for ISSMP becau...

Broadcast by