CISSP Cyber Training Podcast - CISSP Training Program

By: Shon Gerber vCISO CISSP Cybersecurity Consultant and Entrepreneur
  • Summary

  • Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀

    © 2024 CISSP Cyber Training Podcast - CISSP Training Program
    Show more Show less
activate_Holiday_promo_in_buybox_DT_T2
Episodes
  • CCT 189: Practice CISSP Questions - Applying Various Resource Protections for the CISSP Exam (Domain 7.5)
    Oct 31 2024

    Send us a text

    Unlock the keys to safeguarding the future of our global supply chains as we tackle the formidable intersection of IT and OT environments in cybersecurity. Imagine the chaos if operational technology systems on ships and cranes were compromised. Discover how the notorious Maersk hack serves as a cautionary tale illustrating the potential for worldwide disruption. We introduce PrivX OT Edition, a game-changing platform ensuring secure remote access to vital systems on container ships, emphasizing the delicate balance between operational integrity and cybersecurity. Your systems' resilience against cyber-threats starts with understanding the vital distinctions between IT and OT networks.

    In our exploration of incident response, we highlight the paramount importance of learning from each security breach. Unusual outbound network traffic is a red flag not to be ignored, and the role of a well-prepared Computer Security Incident Response Team (CSIRT) cannot be overstated. We delve into proactive measures that keep your systems one step ahead, from regular software updates to rigorous incident response planning. Emphasizing documentation and the chain of custody, this episode equips you with the foresight and strategies needed to maintain a secure and reliable cybersecurity posture. Join us in this essential discussion as we pave the way to a more secure future.

    Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

    Show more Show less
    21 mins
  • CCT 188: Applying Various Resource Protections for the CISSP Exam (Domain 7.5)
    Oct 28 2024

    Send us a text

    Ready to elevate your cybersecurity acumen and conquer the CISSP exam? Tune in to our latest episode, where we unravel the intricacies of a significant ransomware attack that exploited a supply chain vulnerability, impacting 60 US credit unions via the Citrix bleed vulnerability. This real-world scenario stresses the necessity of securing third-party relationships and maintaining a robust security posture. We shift gears to dissect Domain 7.5 of the CISSP, offering insights into effective resource management and safeguarding a variety of media within an organization. From defining stringent policies for handling CDs, DVDs, USBs, and mobile phones to deploying physical security measures, we cover it all to ensure data integrity.

    Our journey continues into the world of tape backup security and management, often considered a last-resort data storage solution. We spotlight the importance of implementing check-in/check-out policies and using climate-controlled environments, such as salt mines, to preserve these backups. Secure transport is another key focus, with encryption and regular inspections recommended to safeguard your data. As we navigate the lifecycle of different media types, from acquisition to disposal, you'll learn about tailored security measures for each stage. We wrap up this segment by stressing compliant disposal methods, where professional shredding services take center stage to guarantee data destruction.

    Finally, we pivot to exploring the critical aspects of data disposal and hardware reliability. Discover why shredding is preferred over degaussing, particularly for SSDs, and the importance of comprehensive staff training to avert data leaks during site closures. We delve into the metrics of Mean Time to Failure (MTTF) and Mean Time Between Failures (MTBF), essential for planning hardware reliability and lifecycle management. These metrics are not just numbers; they play a pivotal role in risk management and business continuity planning. As we prepare you for success, stay tuned for our upcoming episode, where CISSP exam questions take the spotlight, and hear a success story that illustrates the power of commitment and the right resources.

    Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

    Show more Show less
    28 mins
  • CCT 187: Cybersecurity Audits and Compliance - Mitigating AI and Hardware Vulnerabilities for a Robust Security Posture (Domain 6.5)
    Oct 24 2024

    Send us a text

    Can cheaply made smart devices compromise your security? Uncover the hidden risks of AI and hardware hacking as we explore the vulnerabilities in these devices that make them prime targets for cybercriminals. Learn how secure coding practices and proper device isolation can serve as critical defenses, and consider the implications of AI misconfigurations that could lead to remote code execution. Through engaging discussions, we shed light on the growing threat landscape and the necessity of protecting both personal and business environments from these emerging challenges.

    We dig into the world of audits and compliance, dissecting internal, external, and third-party audits to reveal their unique roles and shortcomings. Discover the dangers of leaning solely on internal audits and why third-party assessments are vital in evaluating vendor and partner security controls. This understanding is key for organizations to effectively manage risks and enhance supply chain security. Our insights will arm you with knowledge on how to navigate these audits and make informed decisions that bolster your cybersecurity posture.

    Lastly, we navigate through the essential elements of cybersecurity audits, from security policies to incident response plans. Learn about the auditor's role in ensuring compliance and the importance of follow-up audits to verify the implementation of recommendations. We emphasize the critical nature of documented incident response procedures in maintaining business resilience, underlining regulations like HIPAA that protect sensitive health information. Tap into our rich resources and elevate your understanding of cybersecurity to safeguard your operations against an evolving threat landscape.

    Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

    Show more Show less
    24 mins

What listeners say about CISSP Cyber Training Podcast - CISSP Training Program

Average customer ratings
Overall
  • 5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Performance
  • 5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 5 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    0
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Great Information

Shon delivers high level knowledge in a way that makes you feel like you’re just listening to a buddy explain it to you.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!