Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Bare Metal Cyber Presents: Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF). Hosted by Dr. Jason Edwards, this series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Wh ...
  continue reading
 
Artwork

1
Christian Student Fellowship

Christian Student Fellowship

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Every now and then it's just hard to make it for Monday Night Worship. Each week, hear what was shared from God's Word so that you can continue to grow with the rest of the CSF community. Whether you were sick, had class, or are just wanting to review what you heard on Monday night, this podcast is for you!
  continue reading
 
Certified in Ayurveda and Functional Medicine, Nurse Practitioner Gillian Ehrlich, DNP, ARNP, IFMCP interviews guests who dive deeply into the nuances of medicine with the goal of inspiring you to persistently heal in the face of inevitable challenge across the lifespan. This is about ancient & cutting-edge understanding of disease processes and treatments just as much as it is about food, lifestyle, nature, culture, and politics.
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
Artwork

1
Heads Up

National Migraine Centre

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Headache Specialists from the UK charity National Migraine Centre discuss everything migraine and headache related. This podcast is set up to help give support and advice to those suffering with this largely misunderstood condition. Throughout this podcast you will hear from guest speakers and experts in the medical field, as well as from migraineurs themselves sharing their experiences. Send us your questions or any comments to [email protected]. The Heads Up podcast is pro ...
  continue reading
 
Loading …
show series
 
Today we discuss: Cerebrospinal Fluid (CSF) leaks Agenda: 1. Dr. Cardenas: Tell us your story! 2. So, what is a CSF leak? a. What is leaking? From where? Why do leaks happen? b. Common symptoms? Uncommon symptoms? c. Why don’t more people know about this? 3. Okay, so let’s go back to basic anatomy & let’s go from general to specific- talk to us abo…
  continue reading
 
Dr. Aly Cohen is a board-certified physician practicing in rheumatology and integrative medicine, as well as an environmental health expert in Princeton, New Jersey. Her new book, DETOXIFY: The Everyday Toxins Harming Your Immune System and How to Defend Against Them, available now for pre-order, connects the dots between everyday chemicals and the…
  continue reading
 
We're thrilled to announce that our podcasts now qualify for Nursing Continuing Education (CE) credits through RNegade.pro! Nurses can now not only gain valuable insights and practical knowledge from our episodes but also earn CE credits while listening. RNegade is not your typical nursing CE provider. RNegade believes that nurses are more than jus…
  continue reading
 
In this episode of the Neuroveda podcast, Dr Gillian Ehrlich and Dr. Julianna Giles explore the immune system from both Ayurvedic and Western perspectives. They discuss the complexities of cancer, autoimmunity, and chronic infections, emphasizing the importance of understanding the underlying factors that contribute to these conditions. The convers…
  continue reading
 
Professor Prita Lal Bio: Bio: Raised as a child of South Asian immigrants in theAmerican South, Professor Prita Lal became interested in social justice issues at a young age and now teaches at Evergreen State College at the intersectionsof food and environmental justice, social movements, Black studies, solidarity economics, cooperative education, …
  continue reading
 
Thomas Mandel Clausen completed his PhD in Clinical Cancer Research at the University of Copenhagen and postdoc at the University of California in San Diego and has spent the bulk of his career thus far focused on cancer biology, malariavaccine development, and more recently COVID-19. His special focus was & remains cell & glycobiology which will b…
  continue reading
 
RC.CO-04 involves sharing public updates on incident recovery using approved channels and messaging, such as breach notifications or preventative steps, to inform affected parties or the broader community. This ensures transparency about recovery efforts and future safeguards, maintaining public trust. It addresses external expectations post-incide…
  continue reading
 
RC.CO-03 ensures recovery activities and progress are shared with designated stakeholders—like leadership and suppliers—consistent with response plans and agreements. This includes regular updates on restoration status, adhering to contractual protocols for information sharing. It keeps all parties informed and aligned during recovery. This subcate…
  continue reading
 
RC.RP-06 declares the end of recovery once predefined criteria are met, finalizing the process with a comprehensive after-action report detailing the incident, actions, and lessons learned. This formal closure ensures all steps are documented for review and improvement. It marks the return to full normalcy. This subcategory aligns with risk managem…
  continue reading
 
RC.RP-05 verifies the integrity of restored assets—checking for lingering threats or root causes—before returning systems to production, confirming normal operations. This involves testing restoration adequacy to ensure functionality and security are fully restored. It finalizes recovery with assurance. This subcategory aligns with risk goals by en…
  continue reading
 
RC.RP-04 considers critical mission functions and cybersecurity risks to define post-incident operational norms, using impact records to prioritize restoration order. This involves collaboration with system owners to confirm successful recovery and monitor performance for adequacy. It ensures recovery aligns with strategic goals. This subcategory a…
  continue reading
 
RC.RP-03 ensures backups and restoration assets are checked for integrity—free of compromise or corruption—before use in recovery efforts. This verification prevents reintroducing threats or using unreliable data, safeguarding the restoration process. It guarantees a clean starting point for recovery. This subcategory aligns with risk management by…
  continue reading
 
RC.RP-02 involves selecting, scoping, and prioritizing recovery actions based on incident response plan criteria and available resources, adapting as needs shift. This ensures efforts focus on critical systems first, balancing speed with effectiveness in execution. It operationalizes recovery with precision. This subcategory aligns actions with ris…
  continue reading
 
RC.RP-01 initiates the recovery phase of the incident response plan once triggered, ensuring all responsible parties are aware of their roles and required authorizations. This begins during or after containment, focusing on restoring affected systems and services systematically. It transitions the organization from response to recovery. This subcat…
  continue reading
 
RS.MI-02 ensures incidents are fully eradicated, removing threats like malware or unauthorized access through automated system features or manual responder actions. This can involve third-party support, such as MSSPs, to eliminate root causes and residual risks. It restores systems to a secure state. This subcategory aligns eradication with risk go…
  continue reading
 
RS.MI-01 focuses on containing incidents to prevent their expansion, using automated tools like antivirus or manual actions by responders to isolate threats. This can involve third-party assistance (e.g., ISPs) or redirecting compromised endpoints to remediation VLANs, limiting damage. It stops incidents from spreading further. This subcategory ali…
  continue reading
 
RS.CO-03 involves sharing incident information with designated stakeholders—both internal, like leadership, and external, like ISACs—consistent with response plans and agreements. This includes voluntary sharing of anonymized attack data or updates on insider threats with HR, enhancing situational awareness. It ensures relevant parties stay informe…
  continue reading
 
RS.CO-02 ensures timely notification of internal and external stakeholders—like customers, partners, or regulators—about incidents, following breach procedures or contractual obligations. This includes notifying law enforcement when criteria and approvals dictate, maintaining transparency and compliance. It keeps affected parties informed and engag…
  continue reading
 
RS.AN-08 estimates and validates an incident’s magnitude by assessing its scope and impact, searching other targets for indicators of compromise or persistence. This involves manual reviews or automated tools to confirm the extent of damage or spread, refining initial assessments. It quantifies the incident’s true reach. This subcategory aligns ana…
  continue reading
 
RS.AN-07 focuses on collecting and preserving incident data and metadata—such as source and timestamps—using chain-of-custody procedures to ensure integrity. This comprehensive gathering supports forensic analysis and compliance, protecting evidence from alteration. It ensures data remains a trustworthy resource for investigation. This subcategory …
  continue reading
 
RS.AN-06 ensures that all investigative actions during an incident—like system checks or containment steps—are meticulously recorded, with integrity and provenance preserved. This involves immutable logs by responders and detailed documentation by the incident lead, safeguarding evidence for legal or audit purposes. It maintains a reliable investig…
  continue reading
 
RS.AN-03 conducts detailed analysis to reconstruct incident events, identify involved assets, and pinpoint root causes, such as exploited vulnerabilities or threat actors. This includes examining deception technologies for attacker behavior insights, aiming to understand both immediate triggers and systemic issues. It provides the foundation for ef…
  continue reading
 
RS.MA-05 applies predefined criteria to determine when to shift from response to recovery, based on incident characteristics and operational considerations. This decision balances containment success with potential disruptions from recovery actions, ensuring a smooth transition. It marks the pivot to restoring normalcy. This subcategory aligns reco…
  continue reading
 
RS.MA-04 ensures incidents are escalated or elevated to higher levels of authority or expertise when their complexity or impact exceeds initial handling capabilities. This involves tracking incident status and coordinating with designated stakeholders, both internal and external, for additional support. It maintains control over evolving incidents.…
  continue reading
 
RS.MA-03 categorizes incidents—such as ransomware or data breaches—and prioritizes them based on scope, impact, and urgency, balancing rapid recovery with investigation needs. This detailed review assigns incidents to specific response strategies, ensuring appropriate resource allocation. It organizes chaos into actionable steps. This subcategory a…
  continue reading
 
RS.MA-02 involves triaging and validating incident reports to confirm their cybersecurity relevance and need for response, applying severity criteria to prioritize action. This preliminary review filters out non-issues, ensuring resources focus on genuine threats like breaches or malware. It streamlines the initial handling of reported events. This…
  continue reading
 
RS.MA-01 initiates the execution of the incident response plan in coordination with third parties—like outsourcers or suppliers—once an incident is confirmed. This includes designating an incident lead and activating additional plans (e.g., business continuity) as needed to support response efforts. It ensures a structured, collaborative approach t…
  continue reading
 
DE.AE-08 involves declaring incidents when adverse events meet predefined criteria, such as severity or scope, ensuring a formal response is triggered. This process accounts for known false positives to avoid unnecessary escalation, applying criteria to event characteristics systematically. It marks the transition from detection to response. This s…
  continue reading
 
DE.AE-07 integrates cyber threat intelligence and contextual data—like asset inventories or vulnerability disclosures—into adverse event analysis to enhance accuracy and relevance. This involves securely feeding intelligence to detection technologies and personnel, enabling rapid analysis of supplier or third-party advisories. It enriches understan…
  continue reading
 
DE.AE-06 ensures that information about adverse events is promptly shared with authorized staff—such as SOC teams and incident responders—and integrated into response tools. This includes generating alerts, assigning tickets in ticketing systems, and providing access to analysis findings at all times. It enables swift, coordinated action against de…
  continue reading
 
DE.AE-04 estimates the impact and scope of adverse events to gauge their potential harm, using tools like SIEMs or manual analysis to assess affected assets and severity. This process refines initial estimates through review, ensuring a clear understanding of consequences like data loss or downtime. It informs prioritization of response efforts. Th…
  continue reading
 
DE.AE-03 correlates information from diverse sources—like logs, sensors, and threat intelligence—to build a unified picture of potential adverse events. This involves consolidating log data into centralized servers and using event correlation tools (e.g., SIEM) to identify patterns or connections. It enhances detection by linking disparate clues in…
  continue reading
 
DE.AE-02 focuses on analyzing potentially adverse events to understand their nature, using tools like SIEM systems to examine log events for malicious or suspicious activity. This includes leveraging cyber threat intelligence to characterize threat actors, tactics, and indicators of compromise, supplemented by manual reviews where automation falls …
  continue reading
 
DE.CM-09 involves monitoring hardware, software, runtime environments, and associated data to detect adverse events like malware, phishing, or tampering. This includes tracking authentication attempts, configuration changes, and endpoint health to identify risks such as unauthorized software or credential attacks. It ensures a deep, system-level vi…
  continue reading
 
DE.CM-06 requires monitoring the activities and services of external providers—like cloud platforms or ISPs—to detect adverse events that could impact the organization. This includes tracking remote administration or onsite maintenance by third parties for deviations from expected behavior. It ensures external dependencies don’t become blind spots.…
  continue reading
 
DE.CM-03 monitors personnel activity and technology usage to identify potentially adverse events, such as insider threats or policy violations, using tools like behavior analytics and access logs. This includes tracking unusual access patterns or interactions with deception technologies, like honeypot accounts, to detect malicious intent. It focuse…
  continue reading
 
DE.CM-02 involves monitoring the physical environment housing technology assets to detect adverse events, such as unauthorized access or tampering with controls like locks and alarms. This includes reviewing logs from badge readers and visitor records for unusual patterns, supplemented by tools like cameras and security guards. It protects the phys…
  continue reading
 
DE.CM-01 focuses on continuously monitoring networks and network services, such as DNS and BGP, to detect potentially adverse events like unauthorized connections or traffic anomalies. This involves comparing real-time network flows against established baselines to identify deviations that could signal a security threat. It ensures visibility into …
  continue reading
 
PR.IR-04 maintains sufficient resource capacity—storage, compute, power, and bandwidth—to ensure system availability, monitoring usage and forecasting needs. This proactive scaling prevents performance bottlenecks or failures that could disrupt operations. It aligns capacity planning with risk and resilience objectives. This subcategory supports un…
  continue reading
 
PR.IR-03 implements mechanisms like redundant storage, load balancing, and high-availability components to meet resilience requirements under both normal and adverse conditions. This avoids single points of failure, ensuring systems remain operational during disruptions. It supports continuous service delivery aligned with risk goals. This subcateg…
  continue reading
 
PR.IR-02 safeguards technology assets from environmental threats like flooding, fire, or excessive heat, using physical protections and resilient infrastructure. This includes requiring service providers to mitigate such risks in their operations, ensuring consistent protection across owned and outsourced systems. It maintains asset availability un…
  continue reading
 
PR.IR-01 protects networks and environments from unauthorized logical access by segmenting them based on trust boundaries (e.g., IT, IoT, OT) and restricting communications to essentials. This includes zero trust architectures and endpoint health checks to limit access to verified devices only. It prevents intruders from moving freely within system…
  continue reading
 
PR.PS-06 integrates secure development practices into the software lifecycle, protecting code from tampering and ensuring releases have minimal vulnerabilities. This includes monitoring performance to maintain security in production and securely disposing of software when obsolete. It ensures organization-developed software meets high security stan…
  continue reading
 
PR.PS-05 prevents the installation and execution of unauthorized software by restricting platforms to approved applications and verifying software integrity before use. This includes using approved DNS services to block malicious domains and limiting execution to permitted products where risk warrants. It reduces the risk of malware or unvetted sof…
  continue reading
 
PR.PS-04 requires configuring systems, applications, and services to generate log records that support continuous monitoring, ensuring visibility into activities and events. This includes securely sharing logs with centralized infrastructure for analysis, tailored to needs like zero trust architectures. It provides the data needed to detect and res…
  continue reading
 
PR.PS-03 ensures hardware is maintained, replaced, or securely removed based on its security capabilities and risk profile, such as replacing devices unable to support modern software protections. This includes planning for end-of-life support and disposing of hardware responsibly to prevent data leakage. It keeps the physical infrastructure secure…
  continue reading
 
PR.PS-02 focuses on maintaining, replacing, or removing software based on risk, including timely patching, updating container images, and phasing out end-of-life versions. This ensures software remains supported and secure, reducing vulnerabilities from outdated or unauthorized applications. It includes plans for obsolescence to manage lifecycle ri…
  continue reading
 
PR.PS-01 establishes and applies configuration management practices to maintain secure baselines for hardware, software, and services, adhering to the principle of least functionality. This involves testing and deploying hardened configurations while reviewing defaults for potential risks during installations or upgrades. It ensures platforms are s…
  continue reading
 
PR.DS-11 ensures that data backups are regularly created, securely stored, and tested to maintain availability and integrity for recovery purposes. This includes near-real-time backups for critical data, offline storage to protect against incidents, and annual testing to verify restorability. It supports resilience by enabling rapid restoration aft…
  continue reading
 
Loading …
Listen to this show while you explore
Play