Send us a text Ready to step deep into the trenches of cyber security? This episode promises a riveting examination of pertinent cyber security concepts, backed by real-life case studies. First up: a chilling real-world scenario of a Nigerian individual making waves in the news for their involvement in a multi-million dollar business email compromise scheme - an in-depth look at this will make you rethink your transactions! In addition, we shed light on the nitty-gritty of disaster recovery conc...
Oct 06, 2023•19 min•Season 1Ep. 77
Send us a text Are you armed with the knowledge to interpret the health of an organization's operations? Can you differentiate between performance indicators (KPIs), operational performance indicators (OPIs), and risk indicators (KRIs)? This episode of CISSP Cyber Training Podcast is your key to unlocking these concepts. We dissect the purpose and applications of these metrics, laying bare their role in assessing operational efficiency and effectiveness. Additionally, we emphasize the impor...
Oct 02, 2023•32 min•Season 1Ep. 76
Send us a text Are you ready to unlock the secrets of cybersecurity? Buckle up as we journey into the intriguing world of CISSP Cyber Training. Imagine the shock when Microsoft AI researchers accidentally leaked up to 38 terabytes of data due to a slip-up in their Azure environment! We're diving deep into this incident, unpacking all its layers. But that's not all. We’re shedding light on the complexities of Multi-Factor Authentication (MFA) and the unique challenges of Single Sign-On ...
Sep 28, 2023•23 min•Season 1Ep. 75
Send us a text How prepared are you for a ransomware attack? Buckle up as we navigate through a thrilling ride into the world of cybersecurity, drawing lessons from the recent ransomware attacks on Caesar's Palace and MGM casinos. We'll walk you through the importance of having a robust disaster recovery and business continuity plan, as evidenced by these high-profile breaches. But that's not all - we're also diving into the future of identity and access management, touching ...
Sep 26, 2023•43 min•Season 1Ep. 74
Send us a text Have you ever wondered what it takes to crack the CISSP exam? Dreamt of enhancing your cybersecurity expertise? Welcome to an action-packed episode that pulls back the curtain on your path to success. With a focus on CISSP questions and key testing strategies, this episode aims to make you a proficient test taker. We dig into intriguing topics like hypervisor technology, the CIA triad, encryption types, and the main role of CASBs. To spice things up, we also throw in the main secu...
Sep 21, 2023•19 min•Season 1Ep. 73
Send us a text Eager to demystify the cloud environment and its cost-effectiveness compared to an on-premise setup? Well, gear up, because today, we're taking you on an enlightening journey through the world of cloud networking. We will be tackling everything from cloud security and its various models to the critical role of cloud security posture management (CSPM) in AWS deployment. So, whether you're a budding IT professional or an established one looking to enhance your CISSP knowle...
Sep 18, 2023•42 min•Season 1Ep. 72
Send us a text Ever wonder how safe your passwords really are? Brace yourself as we unravel the shocking details of the LastPass breach from August 2020, where countless customer credentials were stolen. We'll expose the vulnerabilities that allowed this to happen and advise on the necessary steps to preserve your digital security. You'll gain insights into reliable security measures, like the Harrison-Ruzel-Ohlmann model and Trusted Computing Base, and grasp how they can prevent data ...
Sep 14, 2023•17 min•Season 1Ep. 71
Send us a text Bold Statement: "Your company's security depends on more than just your own vigilance. It also hinges heavily on third parties. In today's episode, we tackle that reality head-on, using a case study of a Windows 7 PC from a high-security fencing company that was hacked to infiltrate sensitive military and research sites. This real-life example serves as a stark reminder of the need for constant assessment and monitoring of third parties to safeguard your firm. Addit...
Sep 11, 2023•32 min•Season 1Ep. 70
Send us a text Imagine a world where a simple radio command halts an entire railway system. That's exactly what happened in Poland recently, and we're here to break down the intricate details of this cyber-attack. We'll reveal how the Polish radio stop command system was exploited, unraveling the mystery behind this major disruption. From there, we'll navigate the tricky waters of personal identifiable information (PII), data destruction, and data sovereignty, arming you with...
Sep 07, 2023•19 min•Season 1Ep. 69
Send us a text Ready to decode the mystery of AI in digital forensics? I'm your host, Sean Gerber, and in this stimulating conversation, we're peeling back the layers on how AI is revolutionizing the digital forensics landscape. From automating log analysis and malware detection to reshaping image and video analysis, we're talking about it all. So, buckle up as we navigate the potential legal implications of this rapid technological evolution. Dive deeper into the tangled web of d...
Sep 04, 2023•44 min•Season 1Ep. 68
Send us a text Take a journey into the heart of cybersecurity with us as we unravel Gmail's latest recommendation for multi-factor authentication. Can you guess the three key aspects they propose for heightened security? Stay tuned as we also tackle a pertinent CISSP question on security governance, illuminating the primary purpose of an organization's security governance program. Learn how a balanced scorecard can effortlessly align security controls with business goals, pivotal to an...
Aug 31, 2023•19 min•Season 1Ep. 67
Send us a text Ready to fortify your organizational security? We promise to equip you with a deeper understanding of security governance principles - the backbone of any effective information security program. We highlight the pressing need for strategies that align with the mission and vision of the organization, especially in the face of the growing threat of ransomware attacks. We dissect a recent news piece that underscores the importance of safeguarding critical infrastructure. But that&apo...
Aug 28, 2023•37 min•Season 1Ep. 66
Send us a text Ready to turbocharge your cybersecurity prowess? Then buckle up for a thrilling journey through the maze of software development methodologies - Agile, Waterfall, DevOps, Scrum, and Kanban. I, your tour guide Sean Gerber, will dissect each methodology, spotlighting their unique principles, benefits, and potential pitfalls. Get set to grasp the iterative pulse of Agile, the rigid skeleton of the Waterfall model, and the risk-focused heart of the Spiral model. We're not just ab...
Aug 24, 2023•16 min•Season 1Ep. 65
Send us a text Are you ready to navigate the maze of software development methodologies and their security implications? Well, that's exactly what we're about to do! We're unpacking everything from the waterfall development model, with its linear steps, to the agile model's flexible and adaptable nature, perfect for managing complex projects in an evolving landscape of threats and challenges. In this captivating cyber training episode, we also dissect the scrum methodology, p...
Aug 21, 2023•36 min•Season 1Ep. 64
Send us a text Ever wonder which types of evidence are considered most reliable in court? Or why using a write blocker is crucial during a forensic analysis? Well, you're in for a treat! Join me, Sean Gerber, as we unravel the intricacies of the CISSP exam. We'll shed light on concepts like digital forensics, chain of custody, and the crucial role of data acquisition. Not just that, we'll also demystify the workings of a honeypot and its role in diverting attackers from critical s...
Aug 17, 2023•17 min•Season 1Ep. 63
Send us a text Ready to demystify the world of digital evidence in cybersecurity? What if you could easily navigate the complex protocols that safeguard system logs, network logs, and files? This episode promises to enhance your understanding of digital evidence, and its undeniable fragility. We deep-dive into why maintaining the chain of custody matters and the key to ensuring the integrity of these critical pieces of information. Ever thought about the art and science of digital forensics? We ...
Aug 14, 2023•47 min•Season 1Ep. 62
Send us a text What if you had the power to spot vulnerabilities before they become a major security threat? That's exactly what we are offering in this insightful episode of the CISSP Cyber Training Podcast. Your host, Sean Gerber, unzips the world of security assessments and testing, exploring the nuances of data confidentiality during the process. He delves into the role of external auditors and discusses why continuous improvement is the key to successful assessment processes. For those...
Aug 10, 2023•16 min•Season 1Ep. 61
Send us a text Ever feel like you're walking in a cyber labyrinth, trying to protect your data but unsure where the vulnerabilities lurk? Our latest CISSP Cyber Training Podcast is the compass you need. We dissect the essentials of security assessments and auditing strategies, illuminating how these risk-busting practices can fortify your systems, reassure your customers, and fulfill due diligence requirements. All of this while also priming you for the powerhouse CISSP exam! Immerse yourse...
Aug 07, 2023•35 min•Season 1Ep. 60
Send us a text What if you could confidently face the CISSP exam knowing you've got a strong grasp of crucial topics like SAML and Identity and Access Management? Join me, Sean Gerber, your guide through the maze of CISSP exam preparation, as I tackle a series of exam-related questions that will significantly bolster your study routine. Together, we'll unpack concepts like the primary purpose of SAML, OAuth2's main function, and the characteristics of multi-factor and biometric au...
Aug 03, 2023•16 min•Season 1Ep. 59
Send us a text Ever get tangled up in the complexities of identity and access management? Tired of letting confusion rob you of effective cybersecurity strategies? Well, it's time to tune in and simplify it all! As your resident cybersecurity expert, Sean Gerber, I'll be taking the reins in this exciting journey into the heart of identity and access management. We'll tackle the big three – identity management, federated identity management, and credential management systems. Belie...
Jul 31, 2023•39 min•Season 1Ep. 58
Send us a text Ever wondered how to ace the CISSP Cyber exam's domain four? Or, perhaps, you're merely intrigued by the intricate world of Voiceover IP (VOIP)? Either way, this episode is packed with the insights you've been seeking! Join me, Sean Gerber, as we dissect the key protocols that VOIP uses for multimedia transmissions. Together, we'll unravel the complex intricacies of Session Initiation Protocol (SIP) messages and how sessions kick off in a VOIP implementation. Y...
Jul 27, 2023•12 min•Season 1Ep. 57
Send us a text Ever wish you could decrypt the mysteries of cybersecurity and ace your CISSP exam? This episode is your treasure map to success, guiding you through the labyrinthine layers of the OSI model, starting with the physical transmission of data and the crucial role of physical access controls. We also enlighten you about MAC address filtering and how it fortifies network security. As we move deeper, we unlock the secrets of encryption, digital signatures, and secure coding practices. W...
Jul 24, 2023•40 min•Season 1Ep. 56
Send us a text Ready to conquer the CISSP exam? Join me, Sean Gerber, as I break down complex concepts and guide you through an in-depth exploration of threat models, including their components and the crucial role they play in identifying and mitigating potential threats. You'll not only get an understanding of the TRITE methodology and when to use STRIDE or DREAD, but also learn to pinpoint which threats in STRIDE refer to an act that modifies data or system configurations. We'll unr...
Jul 20, 2023•12 min•Season 1Ep. 55
Send us a text Are you prepared to defend your organization from cybersecurity threats? I'm Sean Gerber, and this week I'm unraveling the intimidating world of threat modeling. Get ready to supercharge your cybersecurity knowledge as we dissect threat identification, risk assessment, and mitigation strategies. This isn't just for acing your CISSP exam, it's for becoming an indispensable security professional who can effectively safeguard your organization. We'll embark o...
Jul 17, 2023•43 min•Season 1Ep. 54
Send us a text Are you ready to unlock the secrets of data classification and pass your CISSP exam in one go? That's right! Your host, Sean Gerber, is here to guide you through an insightful exploration into the world of data classification. From the intricacies of content-based and context-based data classification to the various stages of the information life cycle, this episode promises to be a goldmine of information. We'll dissect the appropriate levels of data classification suit...
Jul 13, 2023•10 min•Season 1Ep. 53
Send us a text Are you ready to make your digital assets and information impenetrable? Well, we're here to navigate you through the maze of understanding and protecting your most valued digital treasures. This episode is packed with a wealth of knowledge, as we discuss the intricacies of information and asset protection. We highlight the vitality of data classification, and the importance of effectively training your team to attach the right labels. Your senior team needs to be on the same ...
Jul 10, 2023•36 min•Season 1Ep. 52
Send us a text Are you charged with navigating the precarious terrain of supply chain risk management? Then, prepare to sharpen your skills in this action-packed episode! I'm Sean Gerber, and I'll be guiding you through the labyrinth of supplier audits and evaluations, discussing the delicate balance between the two. We'll also delve into strategies for mitigating risk, including the benefits of outsourcing to multiple vendors and having redundant suppliers for those all-important...
Jul 06, 2023•13 min•Season 1Ep. 51
Send us a text Prepare to unravel the complexities of supply chain risk management (SCRM) and gain invaluable insights that could safeguard your business from massive disruptions. We're diving into the nerve-wracking challenges of SCRM, emphasizing just how crucial it is for every business in our hyper-connected age. Learn about the nuances of this formidable task as we explore real-life scenarios that underline the dire need for security professionals to lend their expertise to those who f...
Jul 03, 2023•35 min•Season 1Ep. 50
Send us a text Ready to conquer the CISSP exam with confidence? Join me, Shon Gerber, in this week's CISSP Cyber Training Podcast as we tackle questions from all eight domains to give you the insights and knowledge you need for success. From understanding the purpose of a risk register to exploring the primary security concerns in a microservices architecture, this episode covers a wide range of topics to sharpen your cybersecurity prowess. We'll dive into essential concepts like data ...
Jun 29, 2023•10 min•Season 1Ep. 49
Send us a text Ready to level up your cybersecurity career? Wondering which certifications are worth your time and investment? We've got you covered in today's episode, where we break down everything from the entry-level CompTIA A+ certification to the more advanced CISSP. Get an insider's look at the costs, study time, and areas of concentration for each of these valuable certifications. We don't just stop at CompTIA A+ - we also dive into the Networks Plus and Security Plus...
Jun 26, 2023•20 min•Season 1Ep. 48