1. EachPod
EachPod
Certified: The CISM Audio Course - Podcast

Certified: The CISM Audio Course

The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series offers over 70 expertly crafted sessions to reinforce key principles, strengthen exam readiness, and accelerate your journey to certification. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.

Education Technology Courses
Update frequency
every day
Average duration
11 minutes
Episodes
71
Years Active
2025
Share to:
Episode 51: Effective Incident Containment Methods

Episode 51: Effective Incident Containment Methods

Containment is a critical phase in incident response—and a highly tested concept in Domain 4. This episode covers the strategies and decision points for containing incidents, from isolating affected …

00:11:40  |   Sun 06 Jul 2025
Episode 50: Digital Forensics and Evidence Collection Basics

Episode 50: Digital Forensics and Evidence Collection Basics

You don’t have to be a forensic analyst—but you do need to understand the basics. This episode explains how evidence is collected, preserved, and documented during an incident. We also explore the ch…

00:11:46  |   Sun 06 Jul 2025
Episode 49: Incident Investigation Methodologies

Episode 49: Incident Investigation Methodologies

CISM candidates must understand how to manage an incident investigation. This episode covers how to gather evidence, document timelines, identify root causes, and follow structured investigative meth…

00:12:11  |   Sun 06 Jul 2025
Episode 48: Incident Management Tools and Techniques

Episode 48: Incident Management Tools and Techniques

Tools can streamline detection, coordination, and resolution during incidents. In this episode, we explore common technologies used in incident management, from SIEM platforms to communication system…

00:12:50  |   Sun 06 Jul 2025
Episode 47: Training, Testing, and Evaluating Your Incident Management Capabilities

Episode 47: Training, Testing, and Evaluating Your Incident Management Capabilities

Your incident response plan is only as strong as your ability to execute it. This episode covers how to train staff, conduct simulations, and evaluate performance to ensure your organization is prepa…

00:11:56  |   Sun 06 Jul 2025
Episode 46: Incident Classification and Categorization Methods

Episode 46: Incident Classification and Categorization Methods

Classifying incidents accurately enables proper response. In this episode, we discuss how to build an incident classification system based on impact, type, and severity—key for escalation and priorit…

00:12:13  |   Sun 06 Jul 2025
Episode 45: Testing, Maintenance, and Improvement of Your DRP

Episode 45: Testing, Maintenance, and Improvement of Your DRP

A DRP must be tested, maintained, and improved over time to remain effective. This episode explains how to schedule recovery tests, evaluate outcomes, and implement improvements based on performance …

00:11:55  |   Sun 06 Jul 2025
Episode 44: Designing Your Disaster Recovery Plan (DRP)

Episode 44: Designing Your Disaster Recovery Plan (DRP)

Disaster recovery planning ensures technology and data availability during a crisis. In this episode, we break down how to design and document a DRP that complements your BCP and incident response pl…

00:12:21  |   Sun 06 Jul 2025
Episode 43: Building Your Business Continuity Plan (BCP)

Episode 43: Building Your Business Continuity Plan (BCP)

Business continuity is broader than disaster recovery—and the CISM exam knows it. This episode explains how to build a BCP that supports organizational resilience, continuity of operations, and stake…

00:08:52  |   Sun 06 Jul 2025
Episode 42: Conducting Business Impact Analysis (BIA

Episode 42: Conducting Business Impact Analysis (BIA

CISM Domain 4 expects you to know how to conduct a business impact analysis. In this episode, we walk through how to identify critical functions, assess downtime impacts, and define recovery objectiv…

00:09:23  |   Sun 06 Jul 2025
Episode 41: Maintaining and Updating Your Incident Response Plan

Episode 41: Maintaining and Updating Your Incident Response Plan

An outdated incident response plan is a liability. This episode teaches you how to maintain IR documentation over time, incorporate lessons learned, and update plans to reflect changes in business st…

00:09:16  |   Sun 06 Jul 2025
Episode 40: Designing and Documenting the Incident Response Plan

Episode 40: Designing and Documenting the Incident Response Plan

Domain 4 begins here. This episode walks you through how to design a comprehensive incident response plan—from defining roles and escalation paths to documenting procedures for detection, containment…

00:09:07  |   Sun 06 Jul 2025
Episode 39: Communications and Reporting for the Information Security Program

Episode 39: Communications and Reporting for the Information Security Program

Strong security programs communicate effectively. In this episode, we explain how to report program performance, risks, and control status to senior leaders, stakeholders, and technical staff. You’ll…

00:08:59  |   Sun 06 Jul 2025
Episode 38: Contractual Security Requirements and Ongoing Vendor Monitoring

Episode 38: Contractual Security Requirements and Ongoing Vendor Monitoring

Once a vendor is onboarded, the work doesn’t stop. This episode covers how to include security clauses in contracts, define SLAs, and monitor vendor compliance over time. We also address continuous a…

00:09:01  |   Sun 06 Jul 2025
Episode 37: Vendor Risk Assessment and Selection

Episode 37: Vendor Risk Assessment and Selection

Third-party vendors can expand capabilities—or introduce serious risk. This episode explains how to evaluate vendors before selection by conducting security assessments, verifying compliance, and ali…

00:09:35  |   Sun 06 Jul 2025
Episode 36: Developing Engaging Information Security Awareness and Training Programs

Episode 36: Developing Engaging Information Security Awareness and Training Programs

Security programs fail without user participation. This episode explores how to build training and awareness initiatives that promote secure behavior and reinforce governance. You’ll learn how to des…

00:09:21  |   Sun 06 Jul 2025
Episode 35: Techniques for Information Security Control Testing and Evaluation

Episode 35: Techniques for Information Security Control Testing and Evaluation

Testing controls is how you validate effectiveness—and it’s a must-know area for the exam. In this episode, we walk through test design, performance validation, and how to evaluate controls in both t…

00:09:01  |   Sun 06 Jul 2025
Episode 34: Implementing and Integrating Information Security Controls

Episode 34: Implementing and Integrating Information Security Controls

CISM candidates must know how to implement controls—not just select them. This episode covers how to plan, deploy, and integrate security controls across the enterprise. You’ll also learn about commo…

00:09:08  |   Sun 06 Jul 2025
Episode 33: Designing and Selecting Effective Information Security Controls

Episode 33: Designing and Selecting Effective Information Security Controls

Controls are at the heart of any security program. This episode shows you how to choose the right controls based on risk assessments, business impact, and regulatory requirements. We also explain how…

00:10:15  |   Sun 06 Jul 2025
Episode 32: Developing and Using Information Security Program Metrics

Episode 32: Developing and Using Information Security Program Metrics

If you can’t measure it, you can’t manage it. In this episode, we cover how to create meaningful metrics for tracking the effectiveness of your security program. You’ll learn how to align metrics wit…

00:09:18  |   Sun 06 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.