The Bare Metal Cyber CRISC Prepcast is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
…
continue reading
CRISC Podcasts
Experiments in Risk Science
…
continue reading
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
…
continue reading

1
Episode 93: Evaluating Business Practices Alignment with Risk Management and Security Frameworks
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10Alignment is the final step toward risk maturity. In this capstone episode, we explore how to evaluate whether business practices support or undermine formal risk management and information security frameworks. You’ll learn how to detect misalignments, recommend improvements, and support compliance initiatives. This topic is a favorite for comprehe…
…
continue reading

1
Episode 92: Reporting Control Information and Supporting Risk-Based Decisions
9:46
9:46
Play later
Play later
Lists
Like
Liked
9:46Controls are only valuable if their performance is understood. This episode focuses on how to report control-related data—such as testing results, KCI trends, and implementation updates—to support decision-making. You’ll learn how to interpret control reporting in context and how it influences risk posture and treatment adjustments. Expect to apply…
…
continue reading

1
Episode 91: Reporting Risk Information to Stakeholders
9:46
9:46
Play later
Play later
Lists
Like
Liked
9:46Clear, timely risk reporting supports informed decision-making at every level. In this episode, we explain how to tailor risk reports for different audiences, from executive boards to process owners. You’ll learn best practices for content clarity, escalation protocols, and aligning reports with organizational priorities. These skills are often tes…
…
continue reading

1
Episode 90: Reviewing Control Assessments for Effectiveness and Maturity
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Mature organizations regularly review their control environment. In this episode, we cover how CRISC professionals assess whether controls are effective, scalable, and aligned with enterprise goals. You’ll learn about assessment techniques, maturity models, and reporting strategies. This material directly supports your ability to analyze real-world…
…
continue reading

1
Episode 89: Monitoring and Analyzing KPIs and KCIs
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19Once performance and control indicators are established, continuous monitoring is essential. This episode explains how to track KPI and KCI trends, detect anomalies, and report on performance across business units. You’ll also learn how these metrics support strategic decision-making. Expect to use this material when answering questions that focus …
…
continue reading

1
Episode 88: Collaborating with Control Owners on KPIs and KCIs Identification
10:57
10:57
Play later
Play later
Lists
Like
Liked
10:57Key Performance Indicators and Key Control Indicators help measure the health of processes and controls. In this episode, we discuss how CRISC professionals work with control owners to define metrics that reflect performance, resilience, and reliability. These indicators are often referenced in exam questions that test your ability to select approp…
…
continue reading

1
Episode 87: Monitoring and Analyzing Key Risk Indicators (KRIs)
10:04
10:04
Play later
Play later
Lists
Like
Liked
10:04KRIs are only useful when monitored and interpreted correctly. This episode walks through how to track, evaluate, and act on risk indicator trends. You’ll also learn how to detect deviations from risk appetite and escalate appropriately. Mastering KRI interpretation is essential for Domain 3 and 4 questions that test your ability to manage emerging…
…
continue reading

1
Episode 86: Defining and Establishing Key Risk Indicators (KRIs)
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38Key Risk Indicators help detect emerging risks before they escalate. In this episode, you’ll learn how to define KRIs that are specific, measurable, and aligned to business impact. We’ll explore how to select thresholds, determine data sources, and connect KRIs to strategic objectives. Expect to use this knowledge in CRISC exam questions that test …
…
continue reading

1
Episode 85: Validating Execution of Risk Responses Against Risk Treatment Plans
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Risk response without verification is a recipe for gaps. This episode teaches you how to validate that risk treatment plans have been carried out as intended. You’ll explore evidence-gathering techniques, stakeholder coordination, and response monitoring—skills needed to close the loop between risk identification and risk mitigation. This topic is …
…
continue reading

1
Episode 84: Collaborating with Control Owners: Control Implementation and Maintenance
10:17
10:17
Play later
Play later
Lists
Like
Liked
10:17A strong design isn’t enough—controls must be implemented and sustained. This episode shows how to support control owners through implementation, ongoing operations, documentation, and updates. You'll also learn how to monitor control lifecycles and assess when adjustments are needed. This is essential for mastering questions related to control mat…
…
continue reading

1
Episode 83: Collaborating with Control Owners: Control Selection and Design
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51Designing effective controls is a team effort. In this episode, we focus on how to work with control owners to select appropriate control types and design them to fit operational needs. You’ll learn how business context, system complexity, and risk level influence control design—an area frequently tested in Domain 3 and 4 questions involving techni…
…
continue reading

1
Episode 82: Collaborating with Risk Owners: Developing Risk Treatment Plans
11:07
11:07
Play later
Play later
Lists
Like
Liked
11:07Risk treatment plans must reflect ownership, accountability, and alignment with the organization's overall strategy. This episode walks through how CRISC professionals collaborate with risk owners to define actions, timelines, and success metrics. You’ll learn how treatment plans transition from planning to execution—an essential skill tested in qu…
…
continue reading

1
Episode 81: Facilitating Stakeholder Selection of Recommended Risk Responses
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47Stakeholder engagement is critical when selecting the most appropriate response to a risk. In this episode, we explore how CRISC professionals guide decision-makers through treatment options, balancing risk appetite, resource constraints, and business goals. You’ll learn how to structure these conversations and document decisions. This topic suppor…
…
continue reading

1
Episode 80: Reviewing Risk and Control Analysis for Gaps Assessment
10:51
10:51
Play later
Play later
Lists
Like
Liked
10:51After controls and risks have been analyzed, gaps become clear. This episode focuses on reviewing results to identify missing safeguards, ineffective responses, and misalignments with business needs. You’ll learn how to translate analysis into practical insights, and how CRISC expects you to use this knowledge to recommend action or escalate issues…
…
continue reading

1
Episode 79: Identifying and Evaluating Effectiveness of Existing Controls
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48Controls are only valuable if they work. In this episode, we explain how to identify current controls across systems and processes and how to evaluate their design and operational effectiveness. You'll also learn techniques to identify gaps, overlaps, and redundancies—skills you'll need to analyze real-world scenarios and propose improvements. This…
…
continue reading

1
Episode 78: Conducting a Comprehensive IT Risk Assessment
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55Risk assessments must be structured, repeatable, and aligned with business needs. This episode walks through how to conduct a comprehensive assessment, including risk identification, impact analysis, likelihood estimation, and prioritization. You’ll learn how to connect all the components into a cohesive evaluation that feeds into treatment plannin…
…
continue reading

1
Episode 77: Promoting a Risk-Aware Culture through Security Awareness Training
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Culture shapes risk behavior. In this episode, we look at how CRISC professionals help promote a risk-aware culture by supporting training programs and awareness campaigns. You'll learn how these efforts reduce human error, improve policy compliance, and reinforce security behaviors. This topic supports both Domain 1 and 4 content and is often test…
…
continue reading

1
Episode 76: Facilitating Identification of Risk Appetite and Tolerance
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50This episode focuses on helping stakeholders define and document risk appetite and tolerance—core elements of strategic alignment. You’ll learn how to facilitate discussions that clarify how much risk the organization is willing to accept and under what conditions. These concepts appear frequently in questions that test your ability to translate st…
…
continue reading

1
Episode 75: Establishing and Maintaining the IT Risk Register
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07The risk register is a living document that tracks an organization’s risk exposure. In this episode, we explore how to build and maintain a complete, dynamic risk register. You’ll learn to define attributes like likelihood, impact, ownership, and treatment status—and how CRISC uses the register to tie together governance, assessment, and reporting …
…
continue reading

1
Episode 74: Establishing Accountability Through Risk and Control Ownership
10:02
10:02
Play later
Play later
Lists
Like
Liked
10:02Without clear ownership, risk management breaks down. This episode shows you how to assign responsibility for risks and controls within the organization, ensuring accountability and follow-through. You'll learn how ownership affects governance, reporting, and response—and how ISACA expects you to spot accountability gaps in exam scenarios. This top…
…
continue reading

1
Episode 73: Evaluating Threats, Vulnerabilities, and Risks to Develop IT Risk Scenarios
9:48
9:48
Play later
Play later
Lists
Like
Liked
9:48Risk scenarios make risks measurable and actionable. This episode explains how to build effective scenarios using threat and vulnerability information, asset dependencies, and business objectives. You’ll learn the structure of a strong risk scenario, and how CRISC expects you to apply them to risk registers and assessments. Expect to see this teste…
…
continue reading

1
Episode 72: Identifying Threats and Vulnerabilities to People, Processes, and Technology
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Threats and vulnerabilities are the building blocks of risk—and CRISC candidates must assess all three layers: people, processes, and technology. This episode walks through methods to identify common risk sources and how to prioritize them. You'll gain the skills to interpret threat vectors and weak points within the organization, essential for sce…
…
continue reading

1
Episode 71: Identifying Potential or Realized Impacts of IT Risk
10:40
10:40
Play later
Play later
Lists
Like
Liked
10:40Understanding how IT risks impact business objectives is central to the CRISC exam. In this episode, we explore how to recognize both potential and actual consequences of risk events. You’ll learn to evaluate impacts across financial, operational, reputational, and compliance dimensions. This topic shows up frequently in questions that require inte…
…
continue reading

1
Episode 70: Collecting and Reviewing Organization’s Business and IT Information
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45This supporting task is foundational: you can’t manage risk without understanding your environment. In this episode, you’ll learn how to gather and evaluate information about business processes, IT systems, and organizational context. We walk through techniques for mapping assets, identifying dependencies, and building a full picture of the risk la…
…
continue reading

1
Episode 69: Domain 4 Review: Key Takeaways and Exam Tips
10:04
10:04
Play later
Play later
Lists
Like
Liked
10:04Domain 4 brings together technical and organizational elements of risk—this review episode ties them all together. We recap core topics including IT operations, system development, security, continuity, and privacy, and offer targeted study tips for exam success. Use this episode to clarify technical terms, strengthen connections between IT and ris…
…
continue reading

1
Episode 68: Data Privacy and Protection Principles
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Privacy is no longer optional—it’s a regulatory and reputational imperative. This episode explores core privacy concepts, including data subject rights, lawful processing, and protection controls. You’ll also review laws such as GDPR and how CRISC professionals incorporate privacy into risk assessments and control selection. Expect these principles…
…
continue reading

1
Episode 67: Business Continuity Management Concepts and Practices
10:53
10:53
Play later
Play later
Lists
Like
Liked
10:53Business Continuity Management (BCM) ensures critical operations continue under adverse conditions. This episode breaks down BCM elements such as continuity planning, recovery strategies, and business impact alignment. You’ll learn how to evaluate the maturity of BCM programs and prepare for CRISC questions that test resilience across business func…
…
continue reading

1
Episode 66: Information Security Awareness Training
10:36
10:36
Play later
Play later
Lists
Like
Liked
10:36People are often the weakest link in risk management. In this episode, we cover how security awareness training programs reduce human error and increase risk resilience. You’ll learn how CRISC professionals evaluate training effectiveness, integrate messaging with controls, and assess cultural readiness—concepts that appear often in Domain 4 scenar…
…
continue reading

1
Episode 65: Information Security Concepts, Frameworks, and Standards
10:55
10:55
Play later
Play later
Lists
Like
Liked
10:55A solid grasp of security frameworks is essential for risk alignment. This episode introduces key information security concepts—confidentiality, integrity, availability—and reviews common frameworks like ISO 27001, NIST CSF, and COBIT. You’ll learn how to evaluate security posture using structured approaches and anticipate CRISC questions that test…
…
continue reading

1
Episode 64: Emerging Technologies and Associated Risks
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03New technologies can bring competitive advantage—but also new risk. This episode discusses emerging trends such as cloud computing, AI, blockchain, and IoT, and how each introduces unique threats and control considerations. You’ll learn how CRISC professionals evaluate innovation through a risk lens and anticipate exam questions that challenge you …
…
continue reading

1
Episode 63: System Development Life Cycle (SDLC) Essentials
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56CRISC candidates must understand how security and risk controls integrate with the SDLC. In this episode, we walk through the major phases of system development—planning, design, testing, deployment, and maintenance—and explore how risks emerge at each step. You’ll gain clarity on how to embed controls into projects and spot exam questions that tes…
…
continue reading

1
Episode 62: Data Lifecycle Management Principles
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31Data carries risk throughout its entire lifecycle—from creation to deletion. This episode explains the stages of data lifecycle management, how retention and disposal policies mitigate risk, and the importance of classification. You’ll learn how to evaluate data-related controls and align them with compliance and privacy frameworks, a vital topic f…
…
continue reading

1
Episode 61: Disaster Recovery Management (DRM)
10:39
10:39
Play later
Play later
Lists
Like
Liked
10:39Disaster Recovery Management is critical to ensuring operational continuity during and after unexpected events. This episode explores the components of a DRM strategy, including recovery time objectives (RTOs), recovery point objectives (RPOs), and alternate site arrangements. You’ll also learn how CRISC professionals evaluate recovery controls as …
…
continue reading

1
Episode 60: Project Management in the IT Environment
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47Every IT project introduces risk—and every CRISC candidate must be prepared to assess it. This episode covers how project management methodologies like Agile and Waterfall affect risk posture, and how scope, budget, and resource decisions influence exposure. You’ll learn to identify risk at each stage of the project lifecycle and align it with ente…
…
continue reading

1
Episode 59: IT Operations: Problem and Incident Management
10:20
10:20
Play later
Play later
Lists
Like
Liked
10:20Problem and incident management are essential components of operational resilience. This episode explains how organizations detect, document, and resolve IT issues while minimizing business impact. You’ll explore how these processes fit into the broader risk lifecycle and why CRISC professionals must evaluate their maturity and integration with con…
…
continue reading

1
Episode 58: IT Operations: Change and Asset Management
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47Change and asset management processes are central to minimizing IT risk. In this episode, we examine how structured change control reduces service disruption, and how asset inventories support effective risk assessments. You’ll also learn how failures in these areas contribute to vulnerabilities—a critical concept for both Domain 4 understanding an…
…
continue reading

1
Episode 57: Enterprise Architecture Principles
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13A strong enterprise architecture provides structure and clarity for risk-informed IT decisions. This episode explores the foundational components of enterprise architecture, how it aligns with business strategy, and how it supports secure, resilient design. You’ll learn how to analyze architecture from a risk perspective—important for answering CRI…
…
continue reading

1
Episode 56: CRISC Domain 4 Overview: Information Technology and Security Alignment
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45Domain 4 focuses on the integration of IT and security into enterprise risk management. This episode introduces you to the key topics within this domain, from enterprise architecture to information security awareness. You’ll understand how CRISC expects you to evaluate IT operations, projects, and systems as risk contributors. This overview prepare…
…
continue reading

1
Episode 55: Domain 3 Review: Key Takeaways and Exam Tips
10:03
10:03
Play later
Play later
Lists
Like
Liked
10:03Domain 3 brings together risk response, control management, and stakeholder reporting—and this review episode reinforces the most tested concepts across all those topics. We recap treatment options, ownership, monitoring tools, and effectiveness techniques, and offer strategic tips for recognizing Domain 3 question patterns. Use this episode to boo…
…
continue reading

1
Episode 54: Defining and Utilizing Key Risk Indicators (KRIs) and Key Control Indicators (KCIs)
10:53
10:53
Play later
Play later
Lists
Like
Liked
10:53KRIs and KCIs are essential tools for proactive risk and control management. In this episode, we examine how to define, track, and apply these indicators to detect rising threats or control degradation. You’ll also learn how to communicate their meaning to stakeholders and use them for decision-making. These indicators are a high-value topic on the…
…
continue reading

1
Episode 53: Understanding Key Performance Indicators (KPIs)
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46Key Performance Indicators help organizations measure the success of their processes, including risk and control functions. This episode dives into KPI design, interpretation, and alignment with strategic goals. You’ll learn how KPIs differ from KRIs and KCIs, and how to use them to assess operational efficiency. CRISC questions frequently test whe…
…
continue reading

1
Episode 52: Risk and Control Reporting Techniques: Heatmaps, Scorecards, and Dashboards
11:08
11:08
Play later
Play later
Lists
Like
Liked
11:08Visual reporting tools turn data into decisions. This episode explains how heatmaps, scorecards, and dashboards are used to present risk and control information to stakeholders. You’ll learn the strengths and limitations of each technique and how to tailor reporting based on audience needs. These visual tools are commonly referenced in CRISC scenar…
…
continue reading

1
Episode 51: Techniques for Control Monitoring and Continuous Improvement
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58Effective risk professionals don’t just implement controls—they monitor and refine them continuously. This episode explores how organizations use control monitoring techniques like metrics tracking, control self-assessments, and automated alerts to ensure effectiveness over time. You’ll also learn how continuous improvement cycles align with evolvi…
…
continue reading

1
Episode 50: Techniques for Risk Monitoring and Validation
9:09
9:09
Play later
Play later
Lists
Like
Liked
9:09Monitoring keeps risk management alive and responsive. This episode walks you through key techniques for tracking risk levels, validating changes in threat exposure, and detecting breakdowns in response strategies. We also discuss how automated tools and human oversight work together to maintain an accurate risk picture—concepts tested regularly on…
…
continue reading

1
Episode 49: Data Collection, Aggregation, Analysis, and Validation
10:57
10:57
Play later
Play later
Lists
Like
Liked
10:57Effective risk reporting begins with the right data. In this episode, we explain how to collect, organize, and validate risk and control data from across the enterprise. You'll learn how strong data practices support risk transparency, stakeholder trust, and decision-making accuracy. Mastering this topic is essential for Domain 3 questions that ass…
…
continue reading

1
Episode 48: Developing and Executing Risk Treatment Plans
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39Once risk response decisions are made, treatment plans bring them to life. This episode shows you how to create actionable plans that assign ownership, define timelines, and align with strategy. We also walk through execution, monitoring, and revision cycles to help you prepare for exam items that test your ability to move from strategy to successf…
…
continue reading

1
Episode 47: Control Testing and Effectiveness Evaluation
11:33
11:33
Play later
Play later
Lists
Like
Liked
11:33Testing is how we know a control works. In this episode, you’ll learn the methodologies used to validate control effectiveness—from walkthroughs and testing procedures to control maturity assessments. You’ll also discover how test results feed into broader risk reporting and treatment adjustments. These evaluation steps are critical for Domain 3 su…
…
continue reading

1
Episode 46: Control Implementation Best Practices
12:48
12:48
Play later
Play later
Lists
Like
Liked
12:48A well-designed control must be implemented carefully to succeed. This episode outlines how to roll out controls across people, processes, and technology with minimal disruption. You’ll explore real-world best practices for securing adoption, documenting implementation, and verifying alignment with risk response objectives. Expect to see these topi…
…
continue reading

1
Episode 45: Control Design, Selection, and Analysis
11:22
11:22
Play later
Play later
Lists
Like
Liked
11:22A poorly chosen or badly designed control can create more risk than it mitigates. This episode focuses on selecting controls that align with business objectives and designing them to function effectively within operational realities. You’ll also learn how to evaluate control design during risk treatment planning—a key part of Domain 3 mastery and a…
…
continue reading

1
Episode 44: Control Types, Standards, and Frameworks
12:28
12:28
Play later
Play later
Lists
Like
Liked
12:28Understanding the full landscape of control types is critical for treatment planning. This episode introduces preventive, detective, corrective, and compensating controls, as well as major control frameworks like NIST, COBIT, and ISO 27001. You’ll learn how to match the right control types to risk scenarios—a skill often tested in complex CRISC mul…
…
continue reading