CISSP Cyber Training Podcast - CISSP Training Program Titelbild

CISSP Cyber Training Podcast - CISSP Training Program

CISSP Cyber Training Podcast - CISSP Training Program

Von: Shon Gerber vCISO CISSP Cybersecurity Consultant and Entrepreneur
Jetzt kostenlos hören, ohne Abo

Nur 0,99 € pro Monat für die ersten 3 Monate

Danach 9.95 € pro Monat. Bedingungen gelten.

Über diesen Titel

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀

© 2026 CISSP Cyber Training Podcast - CISSP Training Program
Bildung
  • CCT 317: Local Cybersecurity Funding - CISSP Practice Questions (Domain 1.8)
    Jan 22 2026

    Send us a text

    Check us out at: https://www.cisspcybertraining.com/

    Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

    Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv

    Podcast Link(s): https://www.cisa.gov/news-events/news/dhs-launches-over-100-million-funding-strengthen-communities-cyber-defenses

    Cyber attacks don’t skip small towns, and today we dig into how local governments can turn policy into protection. We start with the new funding landscape for state, local, tribal, and territorial agencies—what’s approved, where the dollars flow, and why alignment with CISA and the NIST Cybersecurity Framework is the difference between good intentions and measurable risk reduction. From staffing gaps to critical infrastructure dependencies, we break down a practical way to prioritize controls, track progress, and build lightweight governance that keeps projects moving and leaders informed.

    Then we pivot into CISSP Domain 1.8 with real scenarios that security teams face every week. What do you do when phishing simulations stall at a 40% click rate? We outline how to redesign awareness with role-based content, immediate coaching, and the right technical controls to lower human-driven risk. What’s the right response when a new admin refuses to sign an NDA? Bring legal in, set the standard, and be ready to stand firm on conditions for sensitive access. We also unpack training repayment disputes during offboarding and why access revocation, asset return, and exfiltration monitoring must come before chasing dollars.

    We don’t stop there. An employee’s personal cybersecurity blog can be a liability or an asset—depending on how you set guidelines and review content. And when insider risk hits hard—a soon-to-be-terminated analyst copying files to a USB drive—the immediate play is decisive: disable access, secure devices, preserve evidence, and coordinate with HR and legal. Throughout, we keep the focus on clear policy, consistent enforcement, and actionable steps that work for resource-constrained teams as well as larger enterprises.

    If you’re a security leader, an aspiring CISSP, or the de facto defender for a small community, you’ll leave with concrete actions to raise your defenses, educate your people, and respond fast when signals turn red. Subscribe, share this with a teammate who needs a sharper playbook, and leave a review to help more practitioners find the show.

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Mehr anzeigen Weniger anzeigen
    28 Min.
  • CCT 316: CrowdStrike, Signal, And Identify, Analyze, and Prioritize Business Continuity (CISSP Domain 1.8) - Part 2
    Jan 19 2026

    Send us a text

    Check us out at: https://www.cisspcybertraining.com/

    Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

    Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv

    A quiet identity revolution is underway, and it’s not about people. CrowdStrike’s move to acquire Signal shines a light on the fastest‑growing attack surface in modern environments: non‑human identities. From AI agents and APIs to service and machine accounts, these credentials outnumber employees, hold powerful permissions, and often live outside traditional IAM hygiene. We unpack why this matters now, how it reshapes identity security strategy, and what it means for your Business Impact Analysis and continuity planning.

    We walk through a clear, exam‑ready BIA flow that translates risk into action. You’ll learn how to frame impact categories, build time‑based escalation paths, and set realistic RTO, RPO, and maximum tolerable downtime in partnership with the business. We dig into prioritization drivers—safety of life, legal mandates, revenue exposure, and customer obligations—and show how to avoid the trap of “non‑essential” processes that quietly block recovery. Along the way, we map threats, vulnerabilities, and controls, then score risk with likelihood and impact using real sources like historical incidents and threat intelligence.

    From there, we get practical: process workarounds, technology redundancy, workforce continuity, and supply chain resilience with alternate vendors and stockpiles. We compare hot, warm, and cold sites to cloud‑based recovery, and we stress selection criteria like cost, risk tolerance, and whether strategies actually hit your recovery targets. Finally, we cover governance and communication: executive approvals, confidentiality of plans, testing from tabletop to full interruption, vital records protection, and smooth transitions from life safety to business operations. The throughline is simple and powerful: business impact drives recovery priorities, not technology. Subscribe, share with a teammate who owns service accounts, and leave a quick review to help others find the show.

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Mehr anzeigen Weniger anzeigen
    29 Min.
  • CCT 315: Cybercrime Inc and Practice CISSP Questions (Domain 1.8)
    Jan 15 2026

    Send us a text

    Check us out at: https://www.cisspcybertraining.com/

    Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout

    Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv

    Cybercrime now runs like a tech startup—with roles, KPIs, and customer support—while most defenders are stuck in annual review cycles. We dive into how this underground economy operates as a service chain, why ransomware-as-a-service lowers the barrier to entry, and what leaders can do to close the agility gap. From faster iteration to data-driven decisions, we map out a defense that keeps pace with attackers rather than reacting months later.

    We also shift into CISSP Domain 1.8 with scenario-driven insights you can apply today. You’ll hear how to design an insider threat program that respects privacy while delivering real defense in depth, including behavior analytics, transparent monitoring policies, and legal and HR oversight. We break down the executive-level risk when background checks slip during mergers, the right first move when a senior developer with admin access gives notice to join a competitor, and how to navigate employment gaps without crossing legal or ethical lines. Then we take on a thorny integrity case: a cloud security architect who lied about a required certification. Policy clarity, culture, and legal risk all collide—and we walk through the reasoning.

    Throughout, we connect the AI arms race to practical security outcomes. Attackers are using AI to craft better phishing and faster exploits; defenders need AI for correlation, anomaly detection, and automation—without sacrificing governance. The throughline is speed with discipline: shorten feedback loops, harden the human layer, and align security operations to measurable risk reduction.

    If you’re preparing for the CISSP or leveling up your security leadership, this episode blends strategy with concrete steps you can implement now. Subscribe, share with your team, and leave a review to tell us which scenario challenged your thinking most.

    Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

    Join now and start your journey toward CISSP mastery today!

    Mehr anzeigen Weniger anzeigen
    32 Min.
Noch keine Rezensionen vorhanden