Powered by RND
PodcastsTechnologyCISSP Cyber Training Podcast - CISSP Training Program
Listen to CISSP Cyber Training Podcast - CISSP Training Program in the App
Listen to CISSP Cyber Training Podcast - CISSP Training Program in the App
(398)(247,963)
Save favourites
Alarm
Sleep timer

CISSP Cyber Training Podcast - CISSP Training Program

Podcast CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spannin...

Available Episodes

5 of 205
  • CCT 205: Practice CISSP Questions - Apply Foundational Security Operations Concepts (Domain 7.4)
    Send us a textUnlock the secrets of cybersecurity mastery with me, Sean Gerber, on this week's episode of the CISSP Cyber Training Podcast. Discover why the U.S. government is investing a staggering $3 billion to replace TP-Link routers and the strategic implications for telecom companies nationwide. We'll also dissect the National Defense Authorization Act, which aims to fortify AI adoption and tackle emerging threats through an AI Security Center. This isn't just a glimpse into current events—it's your roadmap to staying ahead in the ever-evolving world of cybersecurity. Explore critical security practices, like the nuances of service level agreements and the essentials of privileged access management, tailored to elevate your cybersecurity strategies. Learn how to balance regulatory compliance with productivity by refining need-to-know policies and harness the power of data classification. Additionally, consider the wide array of consulting services from ReduceCyberRisk.com, including penetration testing and virtual CISO services, for those seeking to deepen their expertise or find mentorship. As we close, I extend warm holiday wishes and share enthusiasm for the opportunities ahead in 2025. Don’t miss out on these valuable insights—your future in cybersecurity starts here.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
    --------  
    23:27
  • CCT 204: Need to Know, Least Privilege, Job Rotation and Other Options in Security Operations (Domain 7.4)
    Send us a textUnlock the secrets to a more secure digital environment as we dissect the potential impact of a TP-Link router ban in the U.S., spurred by security vulnerabilities and foreign influence concerns. How will this affect consumers, businesses, and ISPs reliant on these budget-friendly devices? Tune in to discover the broader implications of a shift towards U.S.-manufactured electronics and what it means for cybersecurity practices nationwide.Explore the intricate balance of power and security through the principle of least privilege (POLP) and the need-to-know principle. We decode the strategies to implement POLP successfully, reducing attack surfaces while maintaining efficiency, and align these techniques with essential regulatory standards such as GDPR and HIPAA. Discover how the military's compartmentalization tactics can be mirrored in the corporate world to safeguard sensitive information.Finally, we unravel the complexities of insider threats and privileged account management. From job rotations to mandatory vacations, learn how these innovative strategies can help mitigate fraudulent activities and insider risks. We emphasize the crucial role of Privileged Account Management systems in enhancing security, despite their setup complexities and costs, providing invaluable tools for IT professionals seeking to bolster their cybersecurity measures. Don't miss this comprehensive guide designed to fortify your cybersecurity defenses.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
    --------  
    36:45
  • CCT 203: Practice CISSP Questions - Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4)
    Send us a textCan AI-driven technologies reshape the way we secure our digital world? Join me, Sean Gerber, as we navigate the fascinating landscape of cybersecurity challenges anticipated by 2025. Our latest podcast episode promises to shed light on the emerging threats posed by AI, particularly within the finance and e-commerce sectors. We explore the necessity of incorporating AI into security frameworks and examine the shifting dynamics of cybersecurity insurance powered by AI-driven risk assessments. The conversation takes a thought-provoking turn with the exploration of quantum-resilient encryption's impact on global privacy laws and an increased focus on DevOps security, zero trust models, and the ever-looming threat of nation-state cyber warfare. What strategies are essential when dealing with stubborn vendors and critical vulnerabilities? We'll tackle this and more in a segment dedicated to vulnerability management and its ethical considerations. Learn the significance of documenting exceptions, deploying compensating controls, and the vital role of private collaboration and escalation in managing vendor reluctance. We also provide insights into handling false positives from vulnerability scans and the art of communicating risks to stakeholders under budget constraints. This discussion places a spotlight on strategic communication and ethical decision-making as cornerstones of effective cybersecurity risk management.Uncover the secrets to mastering vulnerability management with a strategic flair. We'll guide you through scenarios where high-severity issues persist despite a reduction in overall vulnerabilities, emphasizing coordinated efforts within multi-cloud settings. You'll gain insights into best practices for risk mitigation when immediate patching isn't feasible and the ethical and legal intricacies of vulnerability disclosure. In addition, there's a focus on presenting a risk management approach that balances cost with potential impact to senior leaders. As a bonus, we offer resources for those gearing up for the CISSP exam and seeking cybersecurity consulting, equipping you with the knowledge to fortify your defense against cyber threats.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
    --------  
    28:20
  • CCT 202: Understanding Vulnerability Scans, Risk Management, and Cyber Threat Mitigation Strategies (Domain 6.4)
    Send us a textUnlock the secrets to safeguarding your organization against cyber threats as we explore critical components of cybersecurity. Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we dissect domain 6.4 of the CISSP exam. Discover the latest insights into cyber threats that target U.S. critical infrastructure, with a particular focus on an Iranian-linked group's custom cyber weapon. Learn how understanding your organization's technology, both hardware and software, can be pivotal in mitigating potential threats, especially in industries like oil and gas.Navigate the labyrinth of vulnerability scan reporting and analysis as we dive into the challenging yet rewarding art of communicating security assessment findings. Whether done internally or through third-party services, the objective is to translate technical data into actionable insights for technical teams. We tackle the complexities of overwhelming scan results and highlight the value of automated reporting, ensuring an efficient and effective approach to vulnerability management. Learn how to prioritize risks, provide clear remediation recommendations, and utilize trend analysis to track progress and tackle recurring vulnerabilities.Finally, explore the strategies needed for executing effective internal and external security scans. Discover the importance of thorough preparation and strategic planning, managing insider threats, and safeguarding public-facing assets. We delve into the complexities of third-party scans, emphasizing the need to understand and manage network connections to prevent unauthorized access. Throughout this episode, we stress the critical role of alignment and collaboration in cybersecurity efforts, providing you with the tools and guidance needed to enhance your security posture in today's complex landscape.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
    --------  
    41:54
  • CCT 201: Practice CISSP Questions - Hardware and Firmware Knowledge Gap and Access Controls (Domain 5)
    Send us a textCould the lack of hardware and firmware knowledge be the Achilles' heel of today's cybersecurity efforts? Join me, Sean Gerber, on the CISSP Cyber Training Podcast as we unpack the critical challenges faced by IT and security leaders, particularly in hardware-intensive sectors like manufacturing. We expose the concerning gaps in understanding that are leaving organizations vulnerable, and propose actionable solutions like fostering stronger collaboration between IT teams, security personnel, and suppliers. Tackling the prevalent issue of BIOS password sharing, we recommend secure password management tools, like CyberArk, and advocate for a shift from the culture of replacing devices to one of repair and repurposing, all while ensuring data is securely erased to prevent breaches.Shifting focus to authentication and password security, this episode dives into the essentials of Role-Based Access Control (RBAC), two-factor authentication, and the power of identity federation with protocols like SAML or OAuth. We dissect the benefits of Single Sign-On (SSO) for seamless multi-application access, while highlighting the necessity of identity proofing during onboarding. Finally, we take a hard look at common password pitfalls, stressing the importance of robust security practices. Our mission? To empower listeners with the knowledge and resources they need to bolster their cybersecurity measures—visit CISSP Cyber Training and ReduceCyberRisk.com for a deeper dive into fortifying your defenses.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
    --------  
    23:08

More Technology podcasts

About CISSP Cyber Training Podcast - CISSP Training Program

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀
Podcast website

Listen to CISSP Cyber Training Podcast - CISSP Training Program, Jesse Michels and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v7.1.1 | © 2007-2024 radio.de GmbH
Generated: 12/26/2024 - 1:10:29 PM