1. EachPod
EachPod
Cybersecurity Risk - Podcast

Cybersecurity Risk

Feeling overwhelmed by cyber risk? You're not alone. In today's digital world, cyber threats are a complex issue and a strategic opportunity to strengthen your organization's resilience.

This podcast dives deep into the world of cyber governance and risk management. We'll have open conversations with experts to help you take your organization's cybersecurity posture from "as-is" to the next level.

Here's what you'll learn:

  • Program and control assessments: Identify weaknesses in your current defenses.
  • Risk identification and mitigation: Proactively address threats before they strike.
  • Building a risk register: Track and prioritize your organization's vulnerabilities.
  • Crafting effective mitigation plans: Develop strategies to minimize cyber risk.
  • And much more!


Join us and learn how to navigate the ever-evolving cyber landscape with confidence.

Education Management Technology Business Courses
Update frequency
every 6 days
Average duration
7 minutes
Episodes
108
Years Active
2019 - 2025
Share to:
Risk Owners

Risk Owners

Send us a text

There are many stakeholders in cybersecurity, and it makes sense to outline roles and responsibilities in terms of how each role impacts cyber resiliency.

  1. The board of directors
    1. F…
00:05:09  |   Thu 28 Jul 2022
NISTIR 8286D

NISTIR 8286D

Send us a text

The initial public draft of NIST IR 8286D provides comprehensive asset confidentiality and integrity impact analyses to accurately identify and manage asset risk propagation fro…

00:04:58  |   Thu 21 Jul 2022
Cyber Frameworks - 3 Common Pitfalls

Cyber Frameworks - 3 Common Pitfalls

Send us a text

Choosing a Cybersecurity Framework

Three common pitfalls of cybersecurity or risk frameworks:

  1. Finding the “perfect” framework. No single framework fits an organization’s risk prof…
00:03:01  |   Thu 14 Jul 2022
Cybersecurity - 5 Measures & Metrics

Cybersecurity - 5 Measures & Metrics

Send us a text

There are several measurements or metrics an organization can put in place to monitor; some of them can be turned into Key Risk Indicators (KRIs) and Key Performance Indicators …

00:05:53  |   Thu 07 Jul 2022
Risk Assessment - What to Assess

Risk Assessment - What to Assess

Send us a text

These 3 steps you can take to perform a risk assessment:

  1. Identify and document the scope and assets to be assessed. I suggest starting with your critical assets.
  2. Identify and coll…
00:04:04  |   Tue 28 Jun 2022
What to Focus First

What to Focus First

Send us a text

What to Focus on FIRST
Mission-based cybersecurity

  • Systems supporting the mission, vision, and services
  • Regulatory systems - PCI, HIPAA, SOX, GDPR

Prioritizing remediation is based …

00:02:58  |   Mon 27 Jun 2022
Improving Risk Program - 5 Tips

Improving Risk Program - 5 Tips

Send us a text

There are some simple rules that you can start today to ensure improvements to your cyber risk program.

  1. Define the problem
  2. Define risk
  3. Define critical
  4. Identify and inventory critica…
00:03:18  |   Mon 27 Jun 2022
Tackling Risk Probability and Impact

Tackling Risk Probability and Impact

Send us a text

Today I’ll discuss risk probability and impact and give you some examples to build your own impact and probability table.

  • Probability
  • Impact

Thanks.
Dr. Bill Souza
CEO/Founder
E|CE - …

00:08:09  |   Thu 14 Oct 2021
5 Cybersecurity Challenges

5 Cybersecurity Challenges

Send us a text

Today I’ll touch on the topic of Cyber Risk & Cyber Investment challenges.

  • Improving
  • Exploits
  • Attack paths
  • Attacker behavior
  • Investment

Thanks.
Dr. Bill Souza
CEO/Founder
E|CE - Executiv…

00:07:30  |   Sun 26 Sep 2021
Lacking Basic Cybersecurity Practices

Lacking Basic Cybersecurity Practices

Send us a text

The show today is based on an article titled, “Global utilities lacking basic cybersecurity practices.” Although the article was focused on utilities, the guidance is applicable…

00:07:26  |   Thu 09 Sep 2021
Cybersecurity Basics - What you Need to Know

Cybersecurity Basics - What you Need to Know

Send us a text

We are so focused on the threats and the vulnerabilities that allowed a hack to occur, that we forget the basics. The protection necessary to prevent or slow down these attacks …

00:10:53  |   Thu 26 Aug 2021
Cybersecurity Exceptions - Part 3 (FINAL)

Cybersecurity Exceptions - Part 3 (FINAL)

Send us a text

In today's episode, I will discuss exceptions tracking and expirations. This is the last episode in a three-part series on cybersecurity standard exceptions.

Thanks.
Dr. Bill Souz…

00:05:52  |   Thu 19 Aug 2021
Cybersecurity Exceptions - Part 2

Cybersecurity Exceptions - Part 2

Send us a text

As I mentioned in my previous episode, there’s much more to discuss on cybersecurity exceptions, such as the risk they pose to the organization and the hidden dangers of cumulat…

00:05:44  |   Thu 12 Aug 2021
Cybersecurity Exceptions - Part 1

Cybersecurity Exceptions - Part 1

Send us a text

If your cybersecurity standards were written to protect the organization, why do you have security exceptions? Your standard development team writes an excellent standard; it fo…

00:05:40  |   Thu 05 Aug 2021
Cybersecurity - Asset Classification

Cybersecurity - Asset Classification

Send us a text

Asset classification is the foundation of everything else to come in cybersecurity; it will help your organization, for example, small or large, to better understand, manage, id…

00:06:16  |   Fri 30 Jul 2021
Zero-Sum Game

Zero-Sum Game

Send us a text

In this episode, I will discuss three challenging areas where cybersecurity education is falling short in preparing students and professionals to succeed in the field.

00:09:45  |   Thu 31 Dec 2020
Cybersecurity Investment & Risk Strategy

Cybersecurity Investment & Risk Strategy

Send us a text

In this episode, I discuss how to leverage your risk framework to make sound cybersecurity investment decisions. I addressed two critical questions that you will need to know th…

00:09:51  |   Wed 05 Aug 2020
Critical Systems: Asking the Right Questions

Critical Systems: Asking the Right Questions

Send us a text

To get results you need to ask the right question, collect the data, analyze, and develop a robust and factual interpretation. This episode will guide you through the thought pr…

00:16:04  |   Sun 14 Jun 2020
Cyber Risk Identification

Cyber Risk Identification

Send us a text

Today’s episode I will discuss a strategy to identify critical systems in your organization. The steps I will discuss today will make sure your program is objective and repeatab…

00:16:00  |   Tue 09 Jun 2020
Key Risk Indicators

Key Risk Indicators

Send us a text

Today’s episode we will discuss how to identify KRIs (key risk indicators). I’ll discuss a simple and effective way to do it; there seems to be a lot of confusion on what to mea…

00:13:03  |   Sun 26 Apr 2020
Disclaimer: The podcast and artwork embedded on this page are the property of Dr. Bill Souza. This content is not affiliated with or endorsed by eachpod.com.