エピソード

  • CGRC - Domain 3 - Selecting and Tailoring NIST Security Control
    2026/02/14

    These sources detail the essential frameworks and training resources used to maintain robust cybersecurity and privacy standards within modern organizations. One document serves as a comprehensive catalog of technical controls, such as NIST SP 800-53, which outlines specific requirements for access management, incident response, and system integrity. Complementing these technical guidelines, the other source highlights professional certification and exam preparation programs for various IT and security roles. Together, they emphasize the importance of systematic risk management through both automated technical safeguards and the formal education of personnel. By integrating these protocols, entities can better protect personally identifiable information and defend against evolving digital threats. High-level strategies like continuous monitoring and supply chain security are also identified as vital components of a resilient infrastructure.

    続きを読む 一部表示
    17 分
  • CGRC - Domain 2 - Mastering CGRC Domain 2 Scope & Categorization
    2026/02/13

    These materials collectively outline the Risk Management Framework (RMF) and its critical role in securing federal information systems. The documentation, which includes ISC2 training guides and NIST special publications, focuses heavily on the initial stages of the RMF, specifically the categorization of information systems based on security objectives like confidentiality, integrity, and availability. Detailed guidance is provided on establishing authorization boundaries, developing system security plans, and assigning impact levels to various information types. The sources also emphasize the importance of the System Development Life Cycle (SDLC) and the collaboration required between officials to manage organizational risk. Additionally, community discussions reflect the practical application of these standards for professionals pursuing CGRC certification. Together, these texts serve as a comprehensive manual for implementing structured cybersecurity governancewithin government and supporting organizations.

    続きを読む 一部表示
    17 分
  • CGRC - Domain 1 - Mastering CGRC Domain 1 Governance and Risk
    2026/02/13

    This instructor guide provides a foundational look at the Risk Management Framework (RMF) and the federal mandates that govern it. The material focuses on essential legislation like FISMA and the Privacy Act, while outlining how NIST standards and OMB circulars direct the protection of strategic information. To help candidates understand practical execution, the text details various organizational roles, ranging from the Head of Agency to the Security Control Assessor. It also explores risk assessment methodologies, emphasizing the process of framing, responding to, and monitoring threats. Finally, the source uses real-world examples, such as flight simulators and healthcare systems, to demonstrate how to apply these security and compliance requirements in specialized environments.

    続きを読む 一部表示
    16 分
  • NIST Risk Management Framework (RMF)
    2026/02/13

    The provided documents outline the National Institute of Standards and Technology (NIST) guidelines for managing security and privacy risks within federal information systems and private organizations. Central to these sources is Special Publication 800-53, which provides an extensive catalog of security controlsdesigned to protect the integrity, confidentiality, and availability of data. This framework encourages a collaborative risk management approach involving multiple government agencies to ensure that safeguards are both flexible and cost-effective. Furthermore, the texts explain how organizational risk tolerance dictates whether a threat should be mitigated or accepted based on mission priorities. Technical details regarding configuration management, incident response, and supply chain protections are also highlighted to facilitate continuous system monitoring. Ultimately, these resources serve as a comprehensive roadmap for achieving system trustworthiness in an increasingly complex threat environment.

    続きを読む 一部表示
    34 分
  • Ethics & Privacy - Podcast 05 - Mob Justice, Deepfakes, & Industrialized Crime
    2026/02/13

    These sources examine the intricate relationship between individual freedom, technological disruption, and the legal frameworks that govern modern expression. One perspective focuses on the philosophical balance between personal liberty and the weight of moral responsibility, highlighting the importance of these values in maintaining a stable society. This theoretical foundation is challenged by the rise of synthetic media and deepfakes, which use artificial intelligence to create hyper-realistic but fraudulent content that threatens public trust. The materials further explore how powerful entities use SLAPP suits to silence criticism, turning the legal system into a tool for harassment and censorship. Ultimately, the collection warns that as digital tools make disinformation easier to produce, society must struggle to distinguish between protected free speech and malicious manipulation.

    続きを読む 一部表示
    14 分
  • CISSP - Passing CISSP - Think Like a Manager
    2026/02/09

    The CISSP exam focuses on risk management, requiring a managerial mindset to align security with business goals. Key concepts include Due Care (action) versus Due Diligence (research), the CIA triad, and the OSI model. Human life is always the top priority. This podcast focuses on passing the CISSP through proper thinking and approaches.

    続きを読む 一部表示
    17 分
  • CISSP - CISSP Mastery - A Manager Mindset
    2026/02/09

    The CISSP exam focuses on risk management, requiring a managerial mindset to align security with business goals. Key concepts include Due Care (action) versus Due Diligence (research), the CIA triad, and the OSI model. Human life is always the top priority. This podcast focuses on how to think like a manager to master the CISSP.

    続きを読む 一部表示
    50 分
  • CISSP - Domain 8 - Secure SDLC, Database Models, and Malware
    2026/02/09

    The CISSP exam focuses on risk management, requiring a managerial mindset to align security with business goals. Key concepts include Due Care (action) versus Due Diligence (research), the CIA triad, and the OSI model. Human life is always the top priority. This podcast focuses on Domain 8, Secure SDLC, Database Models, and Malware.

    続きを読む 一部表示
    19 分