1. EachPod
EachPod
Certified: The CRISC Audio Course - Podcast

Certified: The CRISC Audio Course

The Bare Metal Cyber CRISC Audio Course is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.

Education Technology Courses
Update frequency
every day
Average duration
11 minutes
Episodes
93
Years Active
2025
Share to:
Episode 73: Evaluating Threats, Vulnerabilities, and Risks to Develop IT Risk Scenarios

Episode 73: Evaluating Threats, Vulnerabilities, and Risks to Develop IT Risk Scenarios

Risk scenarios make risks measurable and actionable. This episode explains how to build effective scenarios using threat and vulnerability information, asset dependencies, and business objectives. Yo…

00:09:48  |   Sat 05 Jul 2025
Episode 72: Identifying Threats and Vulnerabilities to People, Processes, and Technology

Episode 72: Identifying Threats and Vulnerabilities to People, Processes, and Technology

Threats and vulnerabilities are the building blocks of risk—and CRISC candidates must assess all three layers: people, processes, and technology. This episode walks through methods to identify common…

00:10:05  |   Sat 05 Jul 2025
Episode 71: Identifying Potential or Realized Impacts of IT Risk

Episode 71: Identifying Potential or Realized Impacts of IT Risk

Understanding how IT risks impact business objectives is central to the CRISC exam. In this episode, we explore how to recognize both potential and actual consequences of risk events. You’ll learn to…

00:10:40  |   Sat 05 Jul 2025
Episode 70: Collecting and Reviewing Organization’s Business and IT Information

Episode 70: Collecting and Reviewing Organization’s Business and IT Information

This supporting task is foundational: you can’t manage risk without understanding your environment. In this episode, you’ll learn how to gather and evaluate information about business processes, IT s…

00:10:45  |   Sat 05 Jul 2025
Episode 69: Domain 4 Review: Key Takeaways and Exam Tips

Episode 69: Domain 4 Review: Key Takeaways and Exam Tips

Domain 4 brings together technical and organizational elements of risk—this review episode ties them all together. We recap core topics including IT operations, system development, security, continui…

00:10:04  |   Sat 05 Jul 2025
Episode 68: Data Privacy and Protection Principles

Episode 68: Data Privacy and Protection Principles

Privacy is no longer optional—it’s a regulatory and reputational imperative. This episode explores core privacy concepts, including data subject rights, lawful processing, and protection controls. Yo…

00:11:21  |   Sat 05 Jul 2025
Episode 67: Business Continuity Management Concepts and Practices

Episode 67: Business Continuity Management Concepts and Practices

Business Continuity Management (BCM) ensures critical operations continue under adverse conditions. This episode breaks down BCM elements such as continuity planning, recovery strategies, and busines…

00:10:53  |   Sat 05 Jul 2025
Episode 66: Information Security Awareness Training

Episode 66: Information Security Awareness Training

People are often the weakest link in risk management. In this episode, we cover how security awareness training programs reduce human error and increase risk resilience. You’ll learn how CRISC profes…

00:10:36  |   Sat 05 Jul 2025
Episode 65: Information Security Concepts, Frameworks, and Standards

Episode 65: Information Security Concepts, Frameworks, and Standards

A solid grasp of security frameworks is essential for risk alignment. This episode introduces key information security concepts—confidentiality, integrity, availability—and reviews common frameworks …

00:10:55  |   Sat 05 Jul 2025
Episode 64: Emerging Technologies and Associated Risks

Episode 64: Emerging Technologies and Associated Risks

New technologies can bring competitive advantage—but also new risk. This episode discusses emerging trends such as cloud computing, AI, blockchain, and IoT, and how each introduces unique threats and…

00:12:03  |   Sat 05 Jul 2025
Episode 63: System Development Life Cycle (SDLC) Essentials

Episode 63: System Development Life Cycle (SDLC) Essentials

CRISC candidates must understand how security and risk controls integrate with the SDLC. In this episode, we walk through the major phases of system development—planning, design, testing, deployment,…

00:10:56  |   Sat 05 Jul 2025
Episode 62: Data Lifecycle Management Principles

Episode 62: Data Lifecycle Management Principles

Data carries risk throughout its entire lifecycle—from creation to deletion. This episode explains the stages of data lifecycle management, how retention and disposal policies mitigate risk, and the …

00:12:31  |   Sat 05 Jul 2025
Episode 61: Disaster Recovery Management (DRM)

Episode 61: Disaster Recovery Management (DRM)

Disaster Recovery Management is critical to ensuring operational continuity during and after unexpected events. This episode explores the components of a DRM strategy, including recovery time objecti…

00:10:39  |   Sat 05 Jul 2025
Episode 60: Project Management in the IT Environment

Episode 60: Project Management in the IT Environment

Every IT project introduces risk—and every CRISC candidate must be prepared to assess it. This episode covers how project management methodologies like Agile and Waterfall affect risk posture, and ho…

00:10:47  |   Sat 05 Jul 2025
Episode 59: IT Operations: Problem and Incident Management

Episode 59: IT Operations: Problem and Incident Management

Problem and incident management are essential components of operational resilience. This episode explains how organizations detect, document, and resolve IT issues while minimizing business impact. Y…

00:10:20  |   Sat 05 Jul 2025
Episode 58: IT Operations: Change and Asset Management

Episode 58: IT Operations: Change and Asset Management

Change and asset management processes are central to minimizing IT risk. In this episode, we examine how structured change control reduces service disruption, and how asset inventories support effect…

00:09:47  |   Sat 05 Jul 2025
Episode 57: Enterprise Architecture Principles

Episode 57: Enterprise Architecture Principles

A strong enterprise architecture provides structure and clarity for risk-informed IT decisions. This episode explores the foundational components of enterprise architecture, how it aligns with busine…

00:10:13  |   Sat 05 Jul 2025
Episode 56: CRISC Domain 4 Overview: Information Technology and Security Alignment

Episode 56: CRISC Domain 4 Overview: Information Technology and Security Alignment

Domain 4 focuses on the integration of IT and security into enterprise risk management. This episode introduces you to the key topics within this domain, from enterprise architecture to information s…

00:10:45  |   Sat 05 Jul 2025
Episode 55: Domain 3 Review: Key Takeaways and Exam Tips

Episode 55: Domain 3 Review: Key Takeaways and Exam Tips

Domain 3 brings together risk response, control management, and stakeholder reporting—and this review episode reinforces the most tested concepts across all those topics. We recap treatment options, …

00:10:03  |   Sat 05 Jul 2025
Episode 54: Defining and Utilizing Key Risk Indicators (KRIs) and Key Control Indicators (KCIs)

Episode 54: Defining and Utilizing Key Risk Indicators (KRIs) and Key Control Indicators (KCIs)

KRIs and KCIs are essential tools for proactive risk and control management. In this episode, we examine how to define, track, and apply these indicators to detect rising threats or control degradati…

00:10:53  |   Sat 05 Jul 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Jason Edwards. This content is not affiliated with or endorsed by eachpod.com.