1. EachPod
EachPod
Certified: The CCISO Audio Course - Podcast

Certified: The CCISO Audio Course

The Bare Metal Cyber CCISO Audio Course is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 27005, NIST RMF, FAIR, and TOGAF, alongside practical insights on budgeting, auditing, compliance, and threat intelligence. Whether you're charting a course toward CISO leadership or strengthening your grasp of enterprise security strategy, this series delivers exam-aligned clarity and precision in every episode

Education Technology Courses
Update frequency
every day
Average duration
11 minutes
Episodes
71
Years Active
2025
Share to:
Episode 31: Security Controls Lifecycle Management

Episode 31: Security Controls Lifecycle Management

Security controls are not set-and-forget tools—they require ongoing oversight to remain effective. In this episode, we guide you through the lifecycle of a control, from initial requirement analysis …

00:11:37  |   Mon 07 Jul 2025
Episode 30: Metrics and KPIs for Security Controls

Episode 30: Metrics and KPIs for Security Controls

Security metrics and key performance indicators (KPIs) are critical tools for evaluating the effectiveness of your security program. In this episode, we explain how to design, collect, and interpret …

00:10:48  |   Mon 07 Jul 2025
Episode 29: Reporting Audit Outcomes

Episode 29: Reporting Audit Outcomes

Audit outcomes aren’t just internal affairs—they often need to be communicated to boards, regulators, and third-party partners. This episode focuses on how CISOs summarize and report audit results in…

00:10:47  |   Sun 06 Jul 2025
Episode 28: Responding to and Managing Audit Findings

Episode 28: Responding to and Managing Audit Findings

Once an audit is complete, the focus shifts to interpreting and responding to findings—a process that can significantly impact your credibility and the organization’s risk exposure. In this episode, …

00:10:25  |   Sun 06 Jul 2025
Episode 27: External Audit Preparation

Episode 27: External Audit Preparation

Unlike internal audits, external audits are driven by third parties, regulators, or clients—and come with heightened stakes and external visibility. In this episode, we explore the distinct challenge…

00:11:08  |   Sun 06 Jul 2025
Episode 26: Internal Audit Process Fundamentals

Episode 26: Internal Audit Process Fundamentals

This episode breaks down the internal audit process from the perspective of a security executive. You’ll learn how internal audits are used to evaluate control effectiveness, assess risk posture, and…

00:12:03  |   Sun 06 Jul 2025
Episode 25: Compliance Auditing Standards and Frameworks

Episode 25: Compliance Auditing Standards and Frameworks

In this episode, we take a comprehensive look at the major compliance standards and audit frameworks that govern information security practices across industries and geographies. You’ll gain insight …

00:11:57  |   Sun 06 Jul 2025
Episode 24: Measuring and Evaluating Control Effectiveness

Episode 24: Measuring and Evaluating Control Effectiveness

After implementation, CISOs must continuously assess whether security controls are actually doing their job. This episode dives into the methodologies and metrics used to evaluate control effectivene…

00:12:04  |   Sun 06 Jul 2025
Episode 23: Implementing Security Controls

Episode 23: Implementing Security Controls

Once controls are designed, the implementation phase is where strategy meets execution—and where leadership challenges often emerge. In this episode, we examine what it takes to operationalize contro…

00:12:21  |   Sun 06 Jul 2025
Episode 22: Designing Effective Security Controls

Episode 22: Designing Effective Security Controls

Designing security controls isn’t just about selecting tools—it’s about architecting defenses that support business operations while addressing real threats. In this episode, we explore how CISOs app…

00:11:53  |   Sun 06 Jul 2025
Episode 21: Introduction to Security Controls

Episode 21: Introduction to Security Controls

This episode introduces the foundational concept of security controls and explains their critical role in any enterprise cybersecurity program. You’ll learn how controls are used to mitigate risk, en…

00:12:08  |   Sun 06 Jul 2025
Episode 20: Third-Party and Vendor Risk Management

Episode 20: Third-Party and Vendor Risk Management

Vendors can introduce significant security risks into your organization—and in this episode, we explain how CISOs assess, monitor, and manage those risks at scale. You’ll learn about the due diligenc…

00:11:29  |   Sun 06 Jul 2025
Episode 19: Auditing Security Governance

Episode 19: Auditing Security Governance

Audit plays a vital role in validating that security governance structures are functioning as intended—and this episode teaches you how to prepare for, support, and learn from internal and external a…

00:11:21  |   Sun 06 Jul 2025
Episode 18: Framework Alignment Strategies

Episode 18: Framework Alignment Strategies

In this strategy-focused episode, we guide you through aligning your security program with one or more established control frameworks. Whether your organization uses NIST CSF, ISO 27001, COBIT, CIS C…

00:11:59  |   Sun 06 Jul 2025
Episode 17: Information Security Policy Development

Episode 17: Information Security Policy Development

Effective policy is the backbone of a sound security governance program. In this episode, we break down the entire lifecycle of policy development—from initial scoping and stakeholder input to review…

00:12:18  |   Sun 06 Jul 2025
Episode 16: GDPR Essentials for CISOs

Episode 16: GDPR Essentials for CISOs

This episode focuses on the General Data Protection Regulation (GDPR) and what CISOs must understand about it to lead global privacy programs effectively. We explore the regulation’s core principles—…

00:12:38  |   Sun 06 Jul 2025
Episode 15: Legal and Regulatory Requirements

Episode 15: Legal and Regulatory Requirements

In this episode, we explore the legal landscape that CISOs must navigate when managing information security programs. You’ll learn about the growing body of national and international laws that shape…

00:11:52  |   Sun 06 Jul 2025
Episode 14: Compliance Essentials for CISOs

Episode 14: Compliance Essentials for CISOs

Compliance is more than just following rules—it’s about designing sustainable programs that meet regulatory expectations while supporting business objectives. In this episode, we break down the core …

00:12:08  |   Sun 06 Jul 2025
Episode 13: FAIR Quantitative Risk Management Overview

Episode 13: FAIR Quantitative Risk Management Overview

Quantifying risk in financial terms is a vital executive skill, and this episode introduces the FAIR (Factor Analysis of Information Risk) framework to help you build that capability. We explain how …

00:11:24  |   Sun 06 Jul 2025
Episode 12: NIST RMF Essentials for Executives

Episode 12: NIST RMF Essentials for Executives

This episode introduces the NIST Risk Management Framework (RMF) from an executive perspective, highlighting how it applies to both federal and private sector environments. We walk through the six co…

00:12:16  |   Sun 06 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.