1. EachPod
EachPod
Cybersecurity Risk - Podcast

Cybersecurity Risk

Feeling overwhelmed by cyber risk? You're not alone. In today's digital world, cyber threats are a complex issue and a strategic opportunity to strengthen your organization's resilience.

This podcast dives deep into the world of cyber governance and risk management. We'll have open conversations with experts to help you take your organization's cybersecurity posture from "as-is" to the next level.

Here's what you'll learn:

  • Program and control assessments: Identify weaknesses in your current defenses.
  • Risk identification and mitigation: Proactively address threats before they strike.
  • Building a risk register: Track and prioritize your organization's vulnerabilities.
  • Crafting effective mitigation plans: Develop strategies to minimize cyber risk.
  • And much more!


Join us and learn how to navigate the ever-evolving cyber landscape with confidence.

Education Management Technology Business Courses
Update frequency
every 6 days
Average duration
7 minutes
Episodes
108
Years Active
2019 - 2025
Share to:
Education

Education

Send us a text

The problem educational narrative about “college” has created a false dichotomy between the two well-discussed college purposes. Some say college is about preparing a person for…

00:05:32  |   Thu 15 Dec 2022
Addressing the Highest Risks Podcast

Addressing the Highest Risks Podcast

Send us a text

Addressing the Highest Risks

As we conclude the risk assessment and governance process, the last part will deal with the organization's highest risks, not the highest vulnerabili…

00:05:20  |   Thu 08 Dec 2022
Cybersecurity Risk Assessment

Cybersecurity Risk Assessment

Send us a text

Cybersecurity Risk Assessment

Risk assessment is not necessarily scanning your network aimlessly; what should you expect from your team? First and foremost, adopt a risk assessme…

00:05:51  |   Thu 01 Dec 2022
Cybersecurity Governance

Cybersecurity Governance

Send us a text

Cybersecurity Governance

Once you have your hardware and software inventories, the next step might not be obvious. Still, before performing a risk assessment, you’ll need to esta…

00:03:26  |   Thu 24 Nov 2022
Cybersecurity Risk Management - Software Platforms

Cybersecurity Risk Management - Software Platforms

Send us a text

The NIST CSF subcategory ID.AM-2 deals with the inventory of software platforms and applications used in your organization. Most organizations will that creating an inventory of…

00:03:55  |   Thu 17 Nov 2022
Cybersecurity Risk Management - Physical Devices

Cybersecurity Risk Management - Physical Devices

Send us a text

Cybersecurity Risk Management - Physical Devices

The risk management process entails four fundamental concepts, which can be further broken down; however, the fundamental concept…

00:06:44  |   Thu 10 Nov 2022
Questions Boards Should Ask

Questions Boards Should Ask

Send us a text

Questions Boards Should Ask
The challenge for directors or investors is determining the organizational overall cybersecurity maturity relative to the risk. The board of directors…

00:05:12  |   Thu 03 Nov 2022
Cybersecurity Confidence vs Performance

Cybersecurity Confidence vs Performance

Send us a text

Cybersecurity Confidence vs. Performance

Several studies conducted in other fields showed how spending effort on analysis improved confidence even when the actual performance was…

00:03:30  |   Thu 27 Oct 2022
The MOST Important Cybersecurity Principle

The MOST Important Cybersecurity Principle

Send us a text

Asset management is most commonly associated with cybersecurity hygiene, which is associated with patching, anti-virus, access control, and other asset-specific protections. How…

00:06:43  |   Thu 20 Oct 2022
5 Focus Areas - Third-Party Risk Measurements

5 Focus Areas - Third-Party Risk Measurements

Send us a text

There are two types of third-party risk: product vendors and service providers. Product vendors outsource software, platform, and infrastructure, known as SaaS, PaaS, and IaaS. …

00:04:43  |   Thu 13 Oct 2022
5 Must-Have Cybersecurity Strategies for Small Businesses

5 Must-Have Cybersecurity Strategies for Small Businesses

Send us a text

Cyber attacks targetting small businesses that often do not have the resources to defend against devastating attacks like ransomware have grown. As a small business CEO or CIO, …

00:04:24  |   Thu 06 Oct 2022
Third-Party Risk Management

Third-Party Risk Management

Send us a text

Third-Party Risk Management

The third-party outsourcing trend will continue to grow in the coming years, which places third-party risk as a significant concern for organizations,…

00:06:28  |   Thu 29 Sep 2022
Chasing Perfection

Chasing Perfection

Send us a text

Chasing Perfection


Pursuing perfection takes a lot of resources, financially and people. In Cybersecurity risk management, there are two key questions: 

  • When will enough be enough…
00:04:36  |   Thu 22 Sep 2022
Cybersecurity Risk & Budget Challenges

Cybersecurity Risk & Budget Challenges

Send us a text

Amid a global financial crisis and potentially facing cybersecurity budget challenges, you are now facing a tough decision; how to do more with less. What if I told you that you…

00:02:51  |   Thu 15 Sep 2022
5 Rules for Cybersecurity Risk Metrics

5 Rules for Cybersecurity Risk Metrics

Send us a text

Rules for Effective Cybersecurity Metrics

First, you must establish agreement among your leadership on the actual risk(s) to measure, then select which data will provide the most…

00:05:23  |   Thu 08 Sep 2022
Mission-Centric Risk Assessment - Preparation

Mission-Centric Risk Assessment - Preparation

Send us a text

Mission Centric Risk Assessment

In a mission-based risk assessment, the question is, how do you perform one? 

A four-layer approach will be a good start: 

  1. Mission layer
  2. Operational …
00:07:00  |   Thu 01 Sep 2022
Top 2 Measurement Challenges

Top 2 Measurement Challenges

Send us a text

When measuring risk in your organization, you’ll typically discover two challenges: First, top key risk measures that do not have supporting data (aspirational). Second, you’ll …

00:03:47  |   Thu 25 Aug 2022
Cybersecurity Report BoD

Cybersecurity Report BoD

Send us a text

Cybersecurity Report Framework to the Board of Directors


There is a three-point framework to keep in mind when preparing a report to the Board, especially if you are a small to m…

00:02:08  |   Thu 18 Aug 2022
Business Value

Business Value

Send us a text

How do you understand a digital asset's business value?

First, let’s define what a digital asset is; a digital asset is a system, process, data, and technology that is used. A cy…

00:03:03  |   Thu 11 Aug 2022
SMB 4 Risk Management Pillars

SMB 4 Risk Management Pillars

Send us a text

NIST has developed a cybersecurity risk management framework that addresses the issue as a comprehensive process that requires organizations to:

  1. Frame risk
  2. Assess the vulnerabilit…
00:03:01  |   Thu 04 Aug 2022
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Bill Souza. This content is not affiliated with or endorsed by eachpod.com.