Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CRISC Podcasts

show episodes
 
The Bare Metal Cyber CRISC Prepcast is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
  continue reading
 
Artwork

1
Bite Size Security

Mike Fitzpatrick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
  continue reading
 
Loading …
show series
 
Alignment is the final step toward risk maturity. In this capstone episode, we explore how to evaluate whether business practices support or undermine formal risk management and information security frameworks. You’ll learn how to detect misalignments, recommend improvements, and support compliance initiatives. This topic is a favorite for comprehe…
  continue reading
 
Controls are only valuable if their performance is understood. This episode focuses on how to report control-related data—such as testing results, KCI trends, and implementation updates—to support decision-making. You’ll learn how to interpret control reporting in context and how it influences risk posture and treatment adjustments. Expect to apply…
  continue reading
 
Clear, timely risk reporting supports informed decision-making at every level. In this episode, we explain how to tailor risk reports for different audiences, from executive boards to process owners. You’ll learn best practices for content clarity, escalation protocols, and aligning reports with organizational priorities. These skills are often tes…
  continue reading
 
Mature organizations regularly review their control environment. In this episode, we cover how CRISC professionals assess whether controls are effective, scalable, and aligned with enterprise goals. You’ll learn about assessment techniques, maturity models, and reporting strategies. This material directly supports your ability to analyze real-world…
  continue reading
 
Once performance and control indicators are established, continuous monitoring is essential. This episode explains how to track KPI and KCI trends, detect anomalies, and report on performance across business units. You’ll also learn how these metrics support strategic decision-making. Expect to use this material when answering questions that focus …
  continue reading
 
Key Performance Indicators and Key Control Indicators help measure the health of processes and controls. In this episode, we discuss how CRISC professionals work with control owners to define metrics that reflect performance, resilience, and reliability. These indicators are often referenced in exam questions that test your ability to select approp…
  continue reading
 
KRIs are only useful when monitored and interpreted correctly. This episode walks through how to track, evaluate, and act on risk indicator trends. You’ll also learn how to detect deviations from risk appetite and escalate appropriately. Mastering KRI interpretation is essential for Domain 3 and 4 questions that test your ability to manage emerging…
  continue reading
 
Key Risk Indicators help detect emerging risks before they escalate. In this episode, you’ll learn how to define KRIs that are specific, measurable, and aligned to business impact. We’ll explore how to select thresholds, determine data sources, and connect KRIs to strategic objectives. Expect to use this knowledge in CRISC exam questions that test …
  continue reading
 
Risk response without verification is a recipe for gaps. This episode teaches you how to validate that risk treatment plans have been carried out as intended. You’ll explore evidence-gathering techniques, stakeholder coordination, and response monitoring—skills needed to close the loop between risk identification and risk mitigation. This topic is …
  continue reading
 
A strong design isn’t enough—controls must be implemented and sustained. This episode shows how to support control owners through implementation, ongoing operations, documentation, and updates. You'll also learn how to monitor control lifecycles and assess when adjustments are needed. This is essential for mastering questions related to control mat…
  continue reading
 
Designing effective controls is a team effort. In this episode, we focus on how to work with control owners to select appropriate control types and design them to fit operational needs. You’ll learn how business context, system complexity, and risk level influence control design—an area frequently tested in Domain 3 and 4 questions involving techni…
  continue reading
 
Risk treatment plans must reflect ownership, accountability, and alignment with the organization's overall strategy. This episode walks through how CRISC professionals collaborate with risk owners to define actions, timelines, and success metrics. You’ll learn how treatment plans transition from planning to execution—an essential skill tested in qu…
  continue reading
 
Stakeholder engagement is critical when selecting the most appropriate response to a risk. In this episode, we explore how CRISC professionals guide decision-makers through treatment options, balancing risk appetite, resource constraints, and business goals. You’ll learn how to structure these conversations and document decisions. This topic suppor…
  continue reading
 
After controls and risks have been analyzed, gaps become clear. This episode focuses on reviewing results to identify missing safeguards, ineffective responses, and misalignments with business needs. You’ll learn how to translate analysis into practical insights, and how CRISC expects you to use this knowledge to recommend action or escalate issues…
  continue reading
 
Controls are only valuable if they work. In this episode, we explain how to identify current controls across systems and processes and how to evaluate their design and operational effectiveness. You'll also learn techniques to identify gaps, overlaps, and redundancies—skills you'll need to analyze real-world scenarios and propose improvements. This…
  continue reading
 
Risk assessments must be structured, repeatable, and aligned with business needs. This episode walks through how to conduct a comprehensive assessment, including risk identification, impact analysis, likelihood estimation, and prioritization. You’ll learn how to connect all the components into a cohesive evaluation that feeds into treatment plannin…
  continue reading
 
Culture shapes risk behavior. In this episode, we look at how CRISC professionals help promote a risk-aware culture by supporting training programs and awareness campaigns. You'll learn how these efforts reduce human error, improve policy compliance, and reinforce security behaviors. This topic supports both Domain 1 and 4 content and is often test…
  continue reading
 
This episode focuses on helping stakeholders define and document risk appetite and tolerance—core elements of strategic alignment. You’ll learn how to facilitate discussions that clarify how much risk the organization is willing to accept and under what conditions. These concepts appear frequently in questions that test your ability to translate st…
  continue reading
 
The risk register is a living document that tracks an organization’s risk exposure. In this episode, we explore how to build and maintain a complete, dynamic risk register. You’ll learn to define attributes like likelihood, impact, ownership, and treatment status—and how CRISC uses the register to tie together governance, assessment, and reporting …
  continue reading
 
Without clear ownership, risk management breaks down. This episode shows you how to assign responsibility for risks and controls within the organization, ensuring accountability and follow-through. You'll learn how ownership affects governance, reporting, and response—and how ISACA expects you to spot accountability gaps in exam scenarios. This top…
  continue reading
 
Risk scenarios make risks measurable and actionable. This episode explains how to build effective scenarios using threat and vulnerability information, asset dependencies, and business objectives. You’ll learn the structure of a strong risk scenario, and how CRISC expects you to apply them to risk registers and assessments. Expect to see this teste…
  continue reading
 
Threats and vulnerabilities are the building blocks of risk—and CRISC candidates must assess all three layers: people, processes, and technology. This episode walks through methods to identify common risk sources and how to prioritize them. You'll gain the skills to interpret threat vectors and weak points within the organization, essential for sce…
  continue reading
 
Understanding how IT risks impact business objectives is central to the CRISC exam. In this episode, we explore how to recognize both potential and actual consequences of risk events. You’ll learn to evaluate impacts across financial, operational, reputational, and compliance dimensions. This topic shows up frequently in questions that require inte…
  continue reading
 
This supporting task is foundational: you can’t manage risk without understanding your environment. In this episode, you’ll learn how to gather and evaluate information about business processes, IT systems, and organizational context. We walk through techniques for mapping assets, identifying dependencies, and building a full picture of the risk la…
  continue reading
 
Domain 4 brings together technical and organizational elements of risk—this review episode ties them all together. We recap core topics including IT operations, system development, security, continuity, and privacy, and offer targeted study tips for exam success. Use this episode to clarify technical terms, strengthen connections between IT and ris…
  continue reading
 
Privacy is no longer optional—it’s a regulatory and reputational imperative. This episode explores core privacy concepts, including data subject rights, lawful processing, and protection controls. You’ll also review laws such as GDPR and how CRISC professionals incorporate privacy into risk assessments and control selection. Expect these principles…
  continue reading
 
Business Continuity Management (BCM) ensures critical operations continue under adverse conditions. This episode breaks down BCM elements such as continuity planning, recovery strategies, and business impact alignment. You’ll learn how to evaluate the maturity of BCM programs and prepare for CRISC questions that test resilience across business func…
  continue reading
 
People are often the weakest link in risk management. In this episode, we cover how security awareness training programs reduce human error and increase risk resilience. You’ll learn how CRISC professionals evaluate training effectiveness, integrate messaging with controls, and assess cultural readiness—concepts that appear often in Domain 4 scenar…
  continue reading
 
A solid grasp of security frameworks is essential for risk alignment. This episode introduces key information security concepts—confidentiality, integrity, availability—and reviews common frameworks like ISO 27001, NIST CSF, and COBIT. You’ll learn how to evaluate security posture using structured approaches and anticipate CRISC questions that test…
  continue reading
 
New technologies can bring competitive advantage—but also new risk. This episode discusses emerging trends such as cloud computing, AI, blockchain, and IoT, and how each introduces unique threats and control considerations. You’ll learn how CRISC professionals evaluate innovation through a risk lens and anticipate exam questions that challenge you …
  continue reading
 
CRISC candidates must understand how security and risk controls integrate with the SDLC. In this episode, we walk through the major phases of system development—planning, design, testing, deployment, and maintenance—and explore how risks emerge at each step. You’ll gain clarity on how to embed controls into projects and spot exam questions that tes…
  continue reading
 
Data carries risk throughout its entire lifecycle—from creation to deletion. This episode explains the stages of data lifecycle management, how retention and disposal policies mitigate risk, and the importance of classification. You’ll learn how to evaluate data-related controls and align them with compliance and privacy frameworks, a vital topic f…
  continue reading
 
Disaster Recovery Management is critical to ensuring operational continuity during and after unexpected events. This episode explores the components of a DRM strategy, including recovery time objectives (RTOs), recovery point objectives (RPOs), and alternate site arrangements. You’ll also learn how CRISC professionals evaluate recovery controls as …
  continue reading
 
Every IT project introduces risk—and every CRISC candidate must be prepared to assess it. This episode covers how project management methodologies like Agile and Waterfall affect risk posture, and how scope, budget, and resource decisions influence exposure. You’ll learn to identify risk at each stage of the project lifecycle and align it with ente…
  continue reading
 
Problem and incident management are essential components of operational resilience. This episode explains how organizations detect, document, and resolve IT issues while minimizing business impact. You’ll explore how these processes fit into the broader risk lifecycle and why CRISC professionals must evaluate their maturity and integration with con…
  continue reading
 
Change and asset management processes are central to minimizing IT risk. In this episode, we examine how structured change control reduces service disruption, and how asset inventories support effective risk assessments. You’ll also learn how failures in these areas contribute to vulnerabilities—a critical concept for both Domain 4 understanding an…
  continue reading
 
A strong enterprise architecture provides structure and clarity for risk-informed IT decisions. This episode explores the foundational components of enterprise architecture, how it aligns with business strategy, and how it supports secure, resilient design. You’ll learn how to analyze architecture from a risk perspective—important for answering CRI…
  continue reading
 
Domain 4 focuses on the integration of IT and security into enterprise risk management. This episode introduces you to the key topics within this domain, from enterprise architecture to information security awareness. You’ll understand how CRISC expects you to evaluate IT operations, projects, and systems as risk contributors. This overview prepare…
  continue reading
 
Domain 3 brings together risk response, control management, and stakeholder reporting—and this review episode reinforces the most tested concepts across all those topics. We recap treatment options, ownership, monitoring tools, and effectiveness techniques, and offer strategic tips for recognizing Domain 3 question patterns. Use this episode to boo…
  continue reading
 
KRIs and KCIs are essential tools for proactive risk and control management. In this episode, we examine how to define, track, and apply these indicators to detect rising threats or control degradation. You’ll also learn how to communicate their meaning to stakeholders and use them for decision-making. These indicators are a high-value topic on the…
  continue reading
 
Key Performance Indicators help organizations measure the success of their processes, including risk and control functions. This episode dives into KPI design, interpretation, and alignment with strategic goals. You’ll learn how KPIs differ from KRIs and KCIs, and how to use them to assess operational efficiency. CRISC questions frequently test whe…
  continue reading
 
Visual reporting tools turn data into decisions. This episode explains how heatmaps, scorecards, and dashboards are used to present risk and control information to stakeholders. You’ll learn the strengths and limitations of each technique and how to tailor reporting based on audience needs. These visual tools are commonly referenced in CRISC scenar…
  continue reading
 
Effective risk professionals don’t just implement controls—they monitor and refine them continuously. This episode explores how organizations use control monitoring techniques like metrics tracking, control self-assessments, and automated alerts to ensure effectiveness over time. You’ll also learn how continuous improvement cycles align with evolvi…
  continue reading
 
Monitoring keeps risk management alive and responsive. This episode walks you through key techniques for tracking risk levels, validating changes in threat exposure, and detecting breakdowns in response strategies. We also discuss how automated tools and human oversight work together to maintain an accurate risk picture—concepts tested regularly on…
  continue reading
 
Effective risk reporting begins with the right data. In this episode, we explain how to collect, organize, and validate risk and control data from across the enterprise. You'll learn how strong data practices support risk transparency, stakeholder trust, and decision-making accuracy. Mastering this topic is essential for Domain 3 questions that ass…
  continue reading
 
Once risk response decisions are made, treatment plans bring them to life. This episode shows you how to create actionable plans that assign ownership, define timelines, and align with strategy. We also walk through execution, monitoring, and revision cycles to help you prepare for exam items that test your ability to move from strategy to successf…
  continue reading
 
Testing is how we know a control works. In this episode, you’ll learn the methodologies used to validate control effectiveness—from walkthroughs and testing procedures to control maturity assessments. You’ll also discover how test results feed into broader risk reporting and treatment adjustments. These evaluation steps are critical for Domain 3 su…
  continue reading
 
A well-designed control must be implemented carefully to succeed. This episode outlines how to roll out controls across people, processes, and technology with minimal disruption. You’ll explore real-world best practices for securing adoption, documenting implementation, and verifying alignment with risk response objectives. Expect to see these topi…
  continue reading
 
A poorly chosen or badly designed control can create more risk than it mitigates. This episode focuses on selecting controls that align with business objectives and designing them to function effectively within operational realities. You’ll also learn how to evaluate control design during risk treatment planning—a key part of Domain 3 mastery and a…
  continue reading
 
Understanding the full landscape of control types is critical for treatment planning. This episode introduces preventive, detective, corrective, and compensating controls, as well as major control frameworks like NIST, COBIT, and ISO 27001. You’ll learn how to match the right control types to risk scenarios—a skill often tested in complex CRISC mul…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play