1. EachPod
EachPod
Cybersecurity Risk - Podcast

Cybersecurity Risk

Feeling overwhelmed by cyber risk? You're not alone. In today's digital world, cyber threats are a complex issue and a strategic opportunity to strengthen your organization's resilience.

This podcast dives deep into the world of cyber governance and risk management. We'll have open conversations with experts to help you take your organization's cybersecurity posture from "as-is" to the next level.

Here's what you'll learn:

  • Program and control assessments: Identify weaknesses in your current defenses.
  • Risk identification and mitigation: Proactively address threats before they strike.
  • Building a risk register: Track and prioritize your organization's vulnerabilities.
  • Crafting effective mitigation plans: Develop strategies to minimize cyber risk.
  • And much more!


Join us and learn how to navigate the ever-evolving cyber landscape with confidence.

Education Management Technology Business Courses
Update frequency
every 6 days
Average duration
7 minutes
Episodes
108
Years Active
2019 - 2025
Share to:
Upskilling and Reskilling in Cybersecurity

Upskilling and Reskilling in Cybersecurity

Send us a text

With increasingly sophisticated cyber threats, organizations must prioritize protecting their sensitive data and networks. As a result, the demand for skilled cybersecurity prof…

00:05:04  |   Fri 09 Jun 2023
ChatGPT

ChatGPT

Send us a text

Have you heard? ChatGPT 4.0 is here, so what is your corporate strategy? Let me give you a few pointers to think about.

00:07:39  |   Thu 27 Apr 2023
5 Cybersecurity Controls - Reduce 85% of Cyber Risk

5 Cybersecurity Controls - Reduce 85% of Cyber Risk

Send us a text

5 Cybersecurity Controls - Reduce 85% of Cyber Risk

00:04:51  |   Thu 20 Apr 2023
A Hard Look

A Hard Look

Send us a text

A Hard Look Honest communication between board members and information officers is critical to good cybersecurity. Cyber experts must relay their insights through non-technical …

00:06:19  |   Thu 13 Apr 2023
Threat Modeling

Threat Modeling

Send us a text

Is your organization using threat intelligence to run threat modeling?

If not, that’s a miss-opportunity. Your organization should establish desktop exercises or an informal cros…

00:04:51  |   Thu 06 Apr 2023
Neglected NIST Concepts

Neglected NIST Concepts

Send us a text

The Neglected Pages of NIST

When you download a NIST document, whether NIST 800-53, NIST 800-39, NIST 800-37, or the NIST Cybersecurity Framework, what page do you start reading …

00:05:30  |   Thu 30 Mar 2023
Financial Institutions - Theft of Funds

Financial Institutions - Theft of Funds

Send us a text

How a vCISO can help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. …

00:03:41  |   Thu 23 Mar 2023
Financial Institutions - Theft of Information

Financial Institutions - Theft of Information

Send us a text

Theft of Information is present in every organization and varies widely concerning value. The value of information is directly related to its criticality to the business. Howeve…

00:03:41  |   Thu 16 Mar 2023
Operational and Strategic Perspective

Operational and Strategic Perspective

Send us a text

Do you have an operational or strategic view when protecting your organization's systems?

==========
How can a vCISO help your organization?

The CISO role is all about the strategy…

00:03:12  |   Thu 09 Mar 2023
Acronyms, Jargons, and Idioms

Acronyms, Jargons, and Idioms

Send us a text

Acronyms, Jargons & Idioms Impacting Communication Between Board, C-Suite, and Specialists. Communication is a two-way street, and company executives must be prepared to ask the…

00:03:54  |   Thu 02 Mar 2023
Mission-Centric Risk Metrics

Mission-Centric Risk Metrics

Send us a text

Mission-Centric Cyber Risk Metrics Understanding what to measure in a mission-critical risk program is important, so today, I'll discuss a framework you can use.

1. Identify the …

00:04:32  |   Thu 23 Feb 2023
Expanding Cyber Risk Beyond IT

Expanding Cyber Risk Beyond IT

Send us a text

Retail banking takes care of regular daily banking, for which most people know banks. This includes providing checking and saving services and issuing credit cards. Retail banki…

00:04:15  |   Thu 16 Feb 2023
Three Cybersecurity Checkups

Three Cybersecurity Checkups

Send us a text

Technologies and the methods used to hack into them continuously evolve. If you’re looking for an effective and efficient way to check the cybersecurity health of your organizat…

00:06:25  |   Thu 09 Feb 2023
Cybersecurity - A Core Business Risk

Cybersecurity - A Core Business Risk

Send us a text


Do you believe these are business challenges?

  • Upskilling
  • Low morale or quiet quitting
  • Hiring and talent retention
  • Keeping up with technology and tools

If so, why aren’t you consideri…

00:05:33  |   Thu 02 Feb 2023
A Worthy Mention - Antivirus Software

A Worthy Mention - Antivirus Software

Send us a text

Antivirus has become a necessary tool for preventing cyber incidents; while the market is crowded, you need to look for antivirus software that fits your organization’s needs. N…

00:04:00  |   Thu 26 Jan 2023
Greater than Cybersecurity

Greater than Cybersecurity

Send us a text

Greater than Cybersecurity

When we realize that our cybersecurity challenges are complex and intertwined with conscious living people who view their actions in light of stories w…

00:03:02  |   Thu 19 Jan 2023
Protective Techology

Protective Techology

Send us a text

Protective Technology
The last item I want to mention under the Protect function that supports the  attack surface reduction and limits the cyber events' impact on your systems i…

00:04:36  |   Thu 12 Jan 2023
Information Protection - Processes & Procedures

Information Protection - Processes & Procedures

Send us a text

Ideally and preferably, your cybersecurity program should follow established policies, standards, and procedures. These documents will govern all organization members, including…

00:06:13  |   Thu 05 Jan 2023
Protect - Data Security

Protect - Data Security

Send us a text

Data Security
The third of the six critical cybersecurity categories I presented previously is “data security.” An organization's most valuable asset is data; hackers seek data s…

00:07:23  |   Thu 29 Dec 2022
Protect - Awareness and Training

Protect - Awareness and Training

Send us a text

Securing and protecting your organization also takes a village to make happen, so cybersecurity awareness and training become very important; there’s so much technology can do t…

00:05:08  |   Thu 22 Dec 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Bill Souza. This content is not affiliated with or endorsed by eachpod.com.