All Episodes

Displaying 21 - 40 of 71 in total

Episode 21: Conducting Effective Risk Analysis Workshops

CISM candidates must know how to facilitate cross-functional risk workshops. In this episode, we walk through the process—from identifying participants and setting obj...

Episode 22: Risk Mitigation and Acceptance Strategies

When risks can't be eliminated, they must be managed. This episode covers the two most frequently used risk treatment options: mitigation and acceptance. Learn how to ...

Episode 23: Risk Transfer and Avoidance Strategies

Sometimes the best risk response is walking away—or handing it off. This episode focuses on transferring and avoiding risk, from insurance and outsourcing to project t...

Episode 24: Establishing Risk and Control Ownership

Ownership is essential to accountability. In this episode, we explain how to assign ownership for risks and controls, and how to ensure those responsibilities are clea...

Episode 25: Best Practices in Risk Monitoring and Reporting

CISM exam scenarios often involve risk communication. This episode covers how to monitor risks over time and report findings in ways that drive decision-making. You'll...

Episode 26: Staffing and Managing Security Teams

Domain 3 covers security program development—and that includes managing people. In this episode, we examine how to build and lead an effective security team, define ro...

Episode 27: Selecting and Implementing Security Tools and Technologies

Technology supports security—but strategy drives selection. This episode helps you evaluate tools based on business needs, risk reduction, and operational fit. You’ll ...

Episode 28: Information Asset Identification and Classification Fundamentals

CISM professionals must protect what matters most. This episode covers how to identify, categorize, and classify information assets, including systems, data, and servi...

Episode 29: Applying Industry Standards and Frameworks to Your Security Program

Domain 3 expects you to apply security frameworks—not just memorize them. In this episode, we explain how to align your program with standards like ISO 27001, NIST SP ...

Episode 30: Developing Effective Security Policies

Every security program is built on policy. In this episode, we cover how to draft policies that support governance, define behavior, and reflect organizational risk ap...

Episode 31: Writing Actionable Procedures and Guidelines

Policies set direction—but procedures make things happen. This episode teaches you how to translate security policies into actionable procedures and practical guidelin...

Episode 32: Developing and Using Information Security Program Metrics

If you can’t measure it, you can’t manage it. In this episode, we cover how to create meaningful metrics for tracking the effectiveness of your security program. You’l...

Episode 33: Designing and Selecting Effective Information Security Controls

Controls are at the heart of any security program. This episode shows you how to choose the right controls based on risk assessments, business impact, and regulatory r...

Episode 34: Implementing and Integrating Information Security Controls

CISM candidates must know how to implement controls—not just select them. This episode covers how to plan, deploy, and integrate security controls across the enterpris...

Episode 35: Techniques for Information Security Control Testing and Evaluation

Testing controls is how you validate effectiveness—and it’s a must-know area for the exam. In this episode, we walk through test design, performance validation, and ho...

Episode 36: Developing Engaging Information Security Awareness and Training Programs

Security programs fail without user participation. This episode explores how to build training and awareness initiatives that promote secure behavior and reinforce gov...

Episode 37: Vendor Risk Assessment and Selection

Third-party vendors can expand capabilities—or introduce serious risk. This episode explains how to evaluate vendors before selection by conducting security assessment...

Episode 38: Contractual Security Requirements and Ongoing Vendor Monitoring

Once a vendor is onboarded, the work doesn’t stop. This episode covers how to include security clauses in contracts, define SLAs, and monitor vendor compliance over ti...

Episode 39: Communications and Reporting for the Information Security Program

Strong security programs communicate effectively. In this episode, we explain how to report program performance, risks, and control status to senior leaders, stakehold...

Episode 40: Designing and Documenting the Incident Response Plan

Domain 4 begins here. This episode walks you through how to design a comprehensive incident response plan—from defining roles and escalation paths to documenting proce...

Broadcast by