1. EachPod
EachPod
Certified: The CISM Audio Course - Podcast

Certified: The CISM Audio Course

The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers over 70 expertly crafted sessions to reinforce key principles, strengthen exam readiness, and accelerate your journey to certification. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.

Education Technology Courses
Update frequency
every day
Average duration
11 minutes
Episodes
71
Years Active
2025
Share to:
Episode 71: Continuous Improvement through Post-Incident Reviews and Risk Reassessment

Episode 71: Continuous Improvement through Post-Incident Reviews and Risk Reassessment

Mature security programs improve over time. In this final episode, we explain how to lead post-incident reviews, implement lessons learned, and reassess risk in light of new data. This is where gover…

00:11:27  |   Sun 06 Jul 2025
Episode 70: Supervising Risk Treatment and Continuous Monitoring

Episode 70: Supervising Risk Treatment and Continuous Monitoring

Managing risk doesn’t stop with one decision. In this episode, we explore how to supervise treatment activities (mitigation, transfer, acceptance) and establish ongoing monitoring to ensure sustained…

00:11:23  |   Sun 06 Jul 2025
Episode 69: Supervising Risk Identification and Assessment

Episode 69: Supervising Risk Identification and Assessment

CISM-certified professionals must oversee—not just conduct—risk assessments. This episode covers how to supervise the process, validate results, and ensure assessments align with business priorities.…

00:10:57  |   Sun 06 Jul 2025
Episode 68: Managing and Monitoring Security Compliance with External Parties

Episode 68: Managing and Monitoring Security Compliance with External Parties

Vendors, suppliers, and partners all affect your risk posture. This episode explores how to define, enforce, and monitor external security requirements. You’ll learn how to handle audits, compliance …

00:10:42  |   Sun 06 Jul 2025
Episode 67: Integrating Security Requirements into Organizational Processes

Episode 67: Integrating Security Requirements into Organizational Processes

In this episode, we cover how to embed security into core business workflows—from procurement to development and beyond. You’ll learn how to ensure that security requirements become part of how the o…

00:11:42  |   Sun 06 Jul 2025
Episode 66: Aligning Security Programs with Operational Business Objectives

Episode 66: Aligning Security Programs with Operational Business Objectives

Security must support the mission. This episode teaches you how to align your security initiatives with day-to-day business operations, process priorities, and performance expectations. This strategi…

00:10:59  |   Sun 06 Jul 2025
Episode 65: Evaluating and Reporting Information Security Metrics

Episode 65: Evaluating and Reporting Information Security Metrics

Metrics turn performance into visibility. This episode shows you how to define, collect, and report information security metrics that support governance, justify decisions, and improve outcomes. You’…

00:11:37  |   Sun 06 Jul 2025
Episode 64: Compiling and Presenting Effective Security Reports

Episode 64: Compiling and Presenting Effective Security Reports

CISM candidates must know how to report program results and risk insights to both executives and operational teams. This episode explains how to compile relevant data, translate it into actionable in…

00:10:56  |   Sun 06 Jul 2025
Episode 63: Defining and Communicating Security Roles and Responsibilities

Episode 63: Defining and Communicating Security Roles and Responsibilities

Effective governance depends on clear roles and responsibilities. In this episode, we walk through how to assign, document, and communicate who owns what in your security program. From the board to f…

00:11:39  |   Sun 06 Jul 2025
Episode 62: Gaining Senior Leadership Commitment and Stakeholder Support

Episode 62: Gaining Senior Leadership Commitment and Stakeholder Support

Security programs rise or fall on leadership support. This episode teaches you how to earn and sustain executive commitment, communicate risk in business terms, and align your initiatives with organi…

00:11:02  |   Sun 06 Jul 2025
Episode 61: Communicating the Business Case and Gaining Stakeholder Buy-In

Episode 61: Communicating the Business Case and Gaining Stakeholder Buy-In

CISM leaders must champion security through influence, not just authority. In this episode, we cover how to build and communicate compelling business cases for security investments. Learn how to pres…

00:10:09  |   Sun 06 Jul 2025
Episode 60: Building Effective Security Budgets and ROI Analysis

Episode 60: Building Effective Security Budgets and ROI Analysis

Budgeting is about more than asking for money—it’s about justifying value. This episode explains how to estimate costs, present return on investment, and align security spending with business priorit…

00:12:08  |   Sun 06 Jul 2025
Episode 59: Integrating Information Security into Corporate Governance

Episode 59: Integrating Information Security into Corporate Governance

Security can’t operate in a silo. This episode covers how to embed information security into broader corporate governance, ensuring risk, compliance, and audit processes align with your program. Lear…

00:12:19  |   Sun 06 Jul 2025
Episode 58: Implementing Information Security Governance Frameworks

Episode 58: Implementing Information Security Governance Frameworks

Frameworks turn strategy into structure. In this episode, we explain how to implement security governance frameworks like COBIT and ISO in ways that support accountability, transparency, and control.…

00:12:20  |   Sun 06 Jul 2025
Episode 57: Establishing Information Security Strategy Aligned with Organizational Goals

Episode 57: Establishing Information Security Strategy Aligned with Organizational Goals

Security strategy must serve the business. This episode walks you through aligning your security vision, priorities, and investment with what the organization truly values—its mission, objectives, an…

00:12:06  |   Sun 06 Jul 2025
Episode 56: Identifying Internal and External Influences on Security Strategy

Episode 56: Identifying Internal and External Influences on Security Strategy

Domain 1 isn’t just about governance—it’s about understanding what shapes strategy. This episode teaches you how to identify organizational drivers, market forces, regulatory shifts, and threat evolu…

00:11:29  |   Sun 06 Jul 2025
Episode 55: Conducting Meaningful Post-Incident Reviews

Episode 55: Conducting Meaningful Post-Incident Reviews

CISM professionals must know how to lead structured post-incident reviews. This episode explains how to capture lessons learned, evaluate what went wrong (and right), and recommend improvements. You’…

00:11:45  |   Sun 06 Jul 2025
Episode 54: Techniques for Secure Recovery and Restoration

Episode 54: Techniques for Secure Recovery and Restoration

After eradication comes recovery—and it must be secure. This episode shows you how to safely bring systems back online, validate their integrity, and ensure that no backdoors or residual threats rema…

00:12:10  |   Sun 06 Jul 2025
Episode 53: Techniques for Incident Eradication

Episode 53: Techniques for Incident Eradication

Eradication is where you eliminate the root cause of an incident. This episode walks you through how to fully remove malware, close exploited vulnerabilities, and validate that threats are no longer …

00:12:22  |   Sun 06 Jul 2025
Episode 52: Incident Response Communications: Reporting, Notification, and Escalation

Episode 52: Incident Response Communications: Reporting, Notification, and Escalation

Incident response is only effective if the right people are informed at the right time. In this episode, we explore how to build a communication plan that includes internal reporting, external notifi…

00:11:54  |   Sun 06 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.