CSF is a non-denominational ministry located at the University of Kentucky. http://ukcsf.org.
…
continue reading
CSF is a non-denominational ministry located at the University of Kentucky. http://ukcsf.org.
…
continue reading
CSF is a non-denominational ministry located at the University of Kentucky. http://ukcsf.org.
…
continue reading
CSF is a non-denominational ministry located at the University of Kentucky. http://ukcsf.org.
…
continue reading
KPI and CSF with the University of Phoenix Cover art photo provided by Andrew Ridley on Unsplash: https://unsplash.com/@aridley88
…
continue reading
Bare Metal Cyber Presents: Framework is your go-to podcast for mastering cybersecurity frameworks, with a special focus on the NIST Cybersecurity Framework (CSF). Hosted by Dr. Jason Edwards, this series breaks down each function, category, and subcategory to help professionals, educators, and organizations understand their structure and real-world applications. Each episode delivers clear, practical insights with examples that make cybersecurity frameworks more accessible and actionable. Wh ...
…
continue reading
Every now and then it's just hard to make it for Monday Night Worship. Each week, hear what was shared from God's Word so that you can continue to grow with the rest of the CSF community. Whether you were sick, had class, or are just wanting to review what you heard on Monday night, this podcast is for you!
…
continue reading
Certified in Ayurveda and Functional Medicine, Nurse Practitioner Gillian Ehrlich, DNP, ARNP, IFMCP interviews guests who dive deeply into the nuances of medicine with the goal of inspiring you to persistently heal in the face of inevitable challenge across the lifespan. This is about ancient & cutting-edge understanding of disease processes and treatments just as much as it is about food, lifestyle, nature, culture, and politics.
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
UW Sustainability's "In Our Nature" podcast features the people working to make the University of Washington a leader in sustainability.
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).
…
continue reading
Headache Specialists from the UK charity National Migraine Centre discuss everything migraine and headache related. This podcast is set up to help give support and advice to those suffering with this largely misunderstood condition. Throughout this podcast you will hear from guest speakers and experts in the medical field, as well as from migraineurs themselves sharing their experiences. Send us your questions or any comments to [email protected]. The Heads Up podcast is pro ...
…
continue reading

1
#84 Dr Brianna Cardenas & Dr. Andrew Maxwell discuss Cerebrospinal Fluid (CSF) leaks
1:22:26
1:22:26
Play later
Play later
Lists
Like
Liked
1:22:26Today we discuss: Cerebrospinal Fluid (CSF) leaks Agenda: 1. Dr. Cardenas: Tell us your story! 2. So, what is a CSF leak? a. What is leaking? From where? Why do leaks happen? b. Common symptoms? Uncommon symptoms? c. Why don’t more people know about this? 3. Okay, so let’s go back to basic anatomy & let’s go from general to specific- talk to us abo…
…
continue reading

1
#86 Dr. Aly Cohen talks about her new book; DETOXIFY: The Everyday Toxins Harming Your Immune System and How to Defend Against Them.
57:27
57:27
Play later
Play later
Lists
Like
Liked
57:27Dr. Aly Cohen is a board-certified physician practicing in rheumatology and integrative medicine, as well as an environmental health expert in Princeton, New Jersey. Her new book, DETOXIFY: The Everyday Toxins Harming Your Immune System and How to Defend Against Them, available now for pre-order, connects the dots between everyday chemicals and the…
…
continue reading

1
You can now earn continuing Education Credits
2:20
2:20
Play later
Play later
Lists
Like
Liked
2:20We're thrilled to announce that our podcasts now qualify for Nursing Continuing Education (CE) credits through RNegade.pro! Nurses can now not only gain valuable insights and practical knowledge from our episodes but also earn CE credits while listening. RNegade is not your typical nursing CE provider. RNegade believes that nurses are more than jus…
…
continue reading

1
#85 Dr Ehrlich and Dr Giles discuss immunity from and Ayurvedic and Western perspective
47:13
47:13
Play later
Play later
Lists
Like
Liked
47:13In this episode of the Neuroveda podcast, Dr Gillian Ehrlich and Dr. Julianna Giles explore the immune system from both Ayurvedic and Western perspectives. They discuss the complexities of cancer, autoimmunity, and chronic infections, emphasizing the importance of understanding the underlying factors that contribute to these conditions. The convers…
…
continue reading

1
#83 Professor Prita Lal: Exploring the intersection Between Wellness & Justice
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41Professor Prita Lal Bio: Bio: Raised as a child of South Asian immigrants in theAmerican South, Professor Prita Lal became interested in social justice issues at a young age and now teaches at Evergreen State College at the intersectionsof food and environmental justice, social movements, Black studies, solidarity economics, cooperative education, …
…
continue reading

1
# 82 Dr Thomas Clausen: Understanding the new science of the glycocalyx
59:06
59:06
Play later
Play later
Lists
Like
Liked
59:06Thomas Mandel Clausen completed his PhD in Clinical Cancer Research at the University of Copenhagen and postdoc at the University of California in San Diego and has spent the bulk of his career thus far focused on cancer biology, malariavaccine development, and more recently COVID-19. His special focus was & remains cell & glycobiology which will b…
…
continue reading
In this one, we talk about how the NIST Cybersecurity Framework 2.0 can be used as a way to learn governance, risk management, and compliance.By Bruce Brown
…
continue reading

1
RC.CO-04 - Sharing Public Recovery Updates
15:03
15:03
Play later
Play later
Lists
Like
Liked
15:03RC.CO-04 involves sharing public updates on incident recovery using approved channels and messaging, such as breach notifications or preventative steps, to inform affected parties or the broader community. This ensures transparency about recovery efforts and future safeguards, maintaining public trust. It addresses external expectations post-incide…
…
continue reading

1
RC.CO-03 - Communicating Recovery Progress
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09RC.CO-03 ensures recovery activities and progress are shared with designated stakeholders—like leadership and suppliers—consistent with response plans and agreements. This includes regular updates on restoration status, adhering to contractual protocols for information sharing. It keeps all parties informed and aligned during recovery. This subcate…
…
continue reading
RC.RP-06 declares the end of recovery once predefined criteria are met, finalizing the process with a comprehensive after-action report detailing the incident, actions, and lessons learned. This formal closure ensures all steps are documented for review and improvement. It marks the return to full normalcy. This subcategory aligns with risk managem…
…
continue reading
RC.RP-05 verifies the integrity of restored assets—checking for lingering threats or root causes—before returning systems to production, confirming normal operations. This involves testing restoration adequacy to ensure functionality and security are fully restored. It finalizes recovery with assurance. This subcategory aligns with risk goals by en…
…
continue reading

1
RC.RP-04 - Restoring Critical Functions Post-Incident
17:54
17:54
Play later
Play later
Lists
Like
Liked
17:54RC.RP-04 considers critical mission functions and cybersecurity risks to define post-incident operational norms, using impact records to prioritize restoration order. This involves collaboration with system owners to confirm successful recovery and monitor performance for adequacy. It ensures recovery aligns with strategic goals. This subcategory a…
…
continue reading
RC.RP-03 ensures backups and restoration assets are checked for integrity—free of compromise or corruption—before use in recovery efforts. This verification prevents reintroducing threats or using unreliable data, safeguarding the restoration process. It guarantees a clean starting point for recovery. This subcategory aligns with risk management by…
…
continue reading
RC.RP-02 involves selecting, scoping, and prioritizing recovery actions based on incident response plan criteria and available resources, adapting as needs shift. This ensures efforts focus on critical systems first, balancing speed with effectiveness in execution. It operationalizes recovery with precision. This subcategory aligns actions with ris…
…
continue reading

1
RC.RP-01 - Launching Incident Recovery Efforts
19:11
19:11
Play later
Play later
Lists
Like
Liked
19:11RC.RP-01 initiates the recovery phase of the incident response plan once triggered, ensuring all responsible parties are aware of their roles and required authorizations. This begins during or after containment, focusing on restoring affected systems and services systematically. It transitions the organization from response to recovery. This subcat…
…
continue reading
RS.MI-02 ensures incidents are fully eradicated, removing threats like malware or unauthorized access through automated system features or manual responder actions. This can involve third-party support, such as MSSPs, to eliminate root causes and residual risks. It restores systems to a secure state. This subcategory aligns eradication with risk go…
…
continue reading

1
RS.MI-01 - Containing Cybersecurity Incidents
13:19
13:19
Play later
Play later
Lists
Like
Liked
13:19RS.MI-01 focuses on containing incidents to prevent their expansion, using automated tools like antivirus or manual actions by responders to isolate threats. This can involve third-party assistance (e.g., ISPs) or redirecting compromised endpoints to remediation VLANs, limiting damage. It stops incidents from spreading further. This subcategory ali…
…
continue reading

1
RS.CO-03 - Sharing Information with Stakeholders
16:07
16:07
Play later
Play later
Lists
Like
Liked
16:07RS.CO-03 involves sharing incident information with designated stakeholders—both internal, like leadership, and external, like ISACs—consistent with response plans and agreements. This includes voluntary sharing of anonymized attack data or updates on insider threats with HR, enhancing situational awareness. It ensures relevant parties stay informe…
…
continue reading

1
RS.CO-02 - Notifying Stakeholders of Incidents
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42RS.CO-02 ensures timely notification of internal and external stakeholders—like customers, partners, or regulators—about incidents, following breach procedures or contractual obligations. This includes notifying law enforcement when criteria and approvals dictate, maintaining transparency and compliance. It keeps affected parties informed and engag…
…
continue reading
RS.AN-08 estimates and validates an incident’s magnitude by assessing its scope and impact, searching other targets for indicators of compromise or persistence. This involves manual reviews or automated tools to confirm the extent of damage or spread, refining initial assessments. It quantifies the incident’s true reach. This subcategory aligns ana…
…
continue reading

1
RS.AN-07 - Preserving Incident Data Integrity
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50RS.AN-07 focuses on collecting and preserving incident data and metadata—such as source and timestamps—using chain-of-custody procedures to ensure integrity. This comprehensive gathering supports forensic analysis and compliance, protecting evidence from alteration. It ensures data remains a trustworthy resource for investigation. This subcategory …
…
continue reading

1
RS.AN-06 - Recording Investigation Actions
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13RS.AN-06 ensures that all investigative actions during an incident—like system checks or containment steps—are meticulously recorded, with integrity and provenance preserved. This involves immutable logs by responders and detailed documentation by the incident lead, safeguarding evidence for legal or audit purposes. It maintains a reliable investig…
…
continue reading
RS.AN-03 conducts detailed analysis to reconstruct incident events, identify involved assets, and pinpoint root causes, such as exploited vulnerabilities or threat actors. This includes examining deception technologies for attacker behavior insights, aiming to understand both immediate triggers and systemic issues. It provides the foundation for ef…
…
continue reading
RS.MA-05 applies predefined criteria to determine when to shift from response to recovery, based on incident characteristics and operational considerations. This decision balances containment success with potential disruptions from recovery actions, ensuring a smooth transition. It marks the pivot to restoring normalcy. This subcategory aligns reco…
…
continue reading

1
RS.MA-04 - Escalating Incidents When Needed
16:14
16:14
Play later
Play later
Lists
Like
Liked
16:14RS.MA-04 ensures incidents are escalated or elevated to higher levels of authority or expertise when their complexity or impact exceeds initial handling capabilities. This involves tracking incident status and coordinating with designated stakeholders, both internal and external, for additional support. It maintains control over evolving incidents.…
…
continue reading

1
RS.MA-03 - Categorizing and Prioritizing Incidents
16:36
16:36
Play later
Play later
Lists
Like
Liked
16:36RS.MA-03 categorizes incidents—such as ransomware or data breaches—and prioritizes them based on scope, impact, and urgency, balancing rapid recovery with investigation needs. This detailed review assigns incidents to specific response strategies, ensuring appropriate resource allocation. It organizes chaos into actionable steps. This subcategory a…
…
continue reading

1
RS.MA-02 - Triaging and Validating Incident Reports
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29RS.MA-02 involves triaging and validating incident reports to confirm their cybersecurity relevance and need for response, applying severity criteria to prioritize action. This preliminary review filters out non-issues, ensuring resources focus on genuine threats like breaches or malware. It streamlines the initial handling of reported events. This…
…
continue reading

1
RS.MA-01 - Executing the Incident Response Plan
16:15
16:15
Play later
Play later
Lists
Like
Liked
16:15RS.MA-01 initiates the execution of the incident response plan in coordination with third parties—like outsourcers or suppliers—once an incident is confirmed. This includes designating an incident lead and activating additional plans (e.g., business continuity) as needed to support response efforts. It ensures a structured, collaborative approach t…
…
continue reading

1
DE.AE-08 - Declaring Incidents Based on Criteria
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50DE.AE-08 involves declaring incidents when adverse events meet predefined criteria, such as severity or scope, ensuring a formal response is triggered. This process accounts for known false positives to avoid unnecessary escalation, applying criteria to event characteristics systematically. It marks the transition from detection to response. This s…
…
continue reading

1
DE.AE-07 - Enhancing Analysis with Threat Intelligence
16:58
16:58
Play later
Play later
Lists
Like
Liked
16:58DE.AE-07 integrates cyber threat intelligence and contextual data—like asset inventories or vulnerability disclosures—into adverse event analysis to enhance accuracy and relevance. This involves securely feeding intelligence to detection technologies and personnel, enabling rapid analysis of supplier or third-party advisories. It enriches understan…
…
continue reading

1
DE.AE-06 - Sharing Adverse Event Information
16:40
16:40
Play later
Play later
Lists
Like
Liked
16:40DE.AE-06 ensures that information about adverse events is promptly shared with authorized staff—such as SOC teams and incident responders—and integrated into response tools. This includes generating alerts, assigning tickets in ticketing systems, and providing access to analysis findings at all times. It enables swift, coordinated action against de…
…
continue reading

1
DE.AE-04 - Estimating the Impact of Adverse Events
16:52
16:52
Play later
Play later
Lists
Like
Liked
16:52DE.AE-04 estimates the impact and scope of adverse events to gauge their potential harm, using tools like SIEMs or manual analysis to assess affected assets and severity. This process refines initial estimates through review, ensuring a clear understanding of consequences like data loss or downtime. It informs prioritization of response efforts. Th…
…
continue reading

1
DE.AE-03 - Correlating Data from Multiple Sources
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34DE.AE-03 correlates information from diverse sources—like logs, sensors, and threat intelligence—to build a unified picture of potential adverse events. This involves consolidating log data into centralized servers and using event correlation tools (e.g., SIEM) to identify patterns or connections. It enhances detection by linking disparate clues in…
…
continue reading

1
DE.AE-02 - Analyzing Adverse Events for Insights
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19DE.AE-02 focuses on analyzing potentially adverse events to understand their nature, using tools like SIEM systems to examine log events for malicious or suspicious activity. This includes leveraging cyber threat intelligence to characterize threat actors, tactics, and indicators of compromise, supplemented by manual reviews where automation falls …
…
continue reading

1
DE.CM-09 - Detecting Threats Across Technology Stacks
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47DE.CM-09 involves monitoring hardware, software, runtime environments, and associated data to detect adverse events like malware, phishing, or tampering. This includes tracking authentication attempts, configuration changes, and endpoint health to identify risks such as unauthorized software or credential attacks. It ensures a deep, system-level vi…
…
continue reading

1
DE.CM-06 - Monitoring External Service Providers
17:33
17:33
Play later
Play later
Lists
Like
Liked
17:33DE.CM-06 requires monitoring the activities and services of external providers—like cloud platforms or ISPs—to detect adverse events that could impact the organization. This includes tracking remote administration or onsite maintenance by third parties for deviations from expected behavior. It ensures external dependencies don’t become blind spots.…
…
continue reading

1
DE.CM-03 - Tracking Personnel and Technology Usage
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39DE.CM-03 monitors personnel activity and technology usage to identify potentially adverse events, such as insider threats or policy violations, using tools like behavior analytics and access logs. This includes tracking unusual access patterns or interactions with deception technologies, like honeypot accounts, to detect malicious intent. It focuse…
…
continue reading

1
DE.CM-02 - Watching the Physical Environment for Threats
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25DE.CM-02 involves monitoring the physical environment housing technology assets to detect adverse events, such as unauthorized access or tampering with controls like locks and alarms. This includes reviewing logs from badge readers and visitor records for unusual patterns, supplemented by tools like cameras and security guards. It protects the phys…
…
continue reading

1
DE.CM-01 - Monitoring Networks for Adverse Events
18:17
18:17
Play later
Play later
Lists
Like
Liked
18:17DE.CM-01 focuses on continuously monitoring networks and network services, such as DNS and BGP, to detect potentially adverse events like unauthorized connections or traffic anomalies. This involves comparing real-time network flows against established baselines to identify deviations that could signal a security threat. It ensures visibility into …
…
continue reading

1
PR.IR-04 - Maintaining Resource Capacity for Availability
17:20
17:20
Play later
Play later
Lists
Like
Liked
17:20PR.IR-04 maintains sufficient resource capacity—storage, compute, power, and bandwidth—to ensure system availability, monitoring usage and forecasting needs. This proactive scaling prevents performance bottlenecks or failures that could disrupt operations. It aligns capacity planning with risk and resilience objectives. This subcategory supports un…
…
continue reading

1
PR.IR-03 - Building Resilient Technology Systems
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01PR.IR-03 implements mechanisms like redundant storage, load balancing, and high-availability components to meet resilience requirements under both normal and adverse conditions. This avoids single points of failure, ensuring systems remain operational during disruptions. It supports continuous service delivery aligned with risk goals. This subcateg…
…
continue reading

1
PR.IR-02 - Shielding Assets from Environmental Threats
18:32
18:32
Play later
Play later
Lists
Like
Liked
18:32PR.IR-02 safeguards technology assets from environmental threats like flooding, fire, or excessive heat, using physical protections and resilient infrastructure. This includes requiring service providers to mitigate such risks in their operations, ensuring consistent protection across owned and outsourced systems. It maintains asset availability un…
…
continue reading

1
PR.IR-01 - Protecting Against Unauthorized Network Access
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30PR.IR-01 protects networks and environments from unauthorized logical access by segmenting them based on trust boundaries (e.g., IT, IoT, OT) and restricting communications to essentials. This includes zero trust architectures and endpoint health checks to limit access to verified devices only. It prevents intruders from moving freely within system…
…
continue reading

1
PR.PS-06 - Securing the Software Development Process
13:49
13:49
Play later
Play later
Lists
Like
Liked
13:49PR.PS-06 integrates secure development practices into the software lifecycle, protecting code from tampering and ensuring releases have minimal vulnerabilities. This includes monitoring performance to maintain security in production and securely disposing of software when obsolete. It ensures organization-developed software meets high security stan…
…
continue reading

1
PR.PS-05 - Preventing Unauthorized Software Use
13:11
13:11
Play later
Play later
Lists
Like
Liked
13:11PR.PS-05 prevents the installation and execution of unauthorized software by restricting platforms to approved applications and verifying software integrity before use. This includes using approved DNS services to block malicious domains and limiting execution to permitted products where risk warrants. It reduces the risk of malware or unvetted sof…
…
continue reading

1
PR.PS-04 - Enabling Continuous Monitoring with Logs
12:55
12:55
Play later
Play later
Lists
Like
Liked
12:55PR.PS-04 requires configuring systems, applications, and services to generate log records that support continuous monitoring, ensuring visibility into activities and events. This includes securely sharing logs with centralized infrastructure for analysis, tailored to needs like zero trust architectures. It provides the data needed to detect and res…
…
continue reading
PR.PS-03 ensures hardware is maintained, replaced, or securely removed based on its security capabilities and risk profile, such as replacing devices unable to support modern software protections. This includes planning for end-of-life support and disposing of hardware responsibly to prevent data leakage. It keeps the physical infrastructure secure…
…
continue reading
PR.PS-02 focuses on maintaining, replacing, or removing software based on risk, including timely patching, updating container images, and phasing out end-of-life versions. This ensures software remains supported and secure, reducing vulnerabilities from outdated or unauthorized applications. It includes plans for obsolescence to manage lifecycle ri…
…
continue reading

1
PR.PS-01 - Implementing Configuration Management
18:26
18:26
Play later
Play later
Lists
Like
Liked
18:26PR.PS-01 establishes and applies configuration management practices to maintain secure baselines for hardware, software, and services, adhering to the principle of least functionality. This involves testing and deploying hardened configurations while reviewing defaults for potential risks during installations or upgrades. It ensures platforms are s…
…
continue reading

1
PR.DS-11 - Ensuring Reliable Data Backups
18:14
18:14
Play later
Play later
Lists
Like
Liked
18:14PR.DS-11 ensures that data backups are regularly created, securely stored, and tested to maintain availability and integrity for recovery purposes. This includes near-real-time backups for critical data, offline storage to protect against incidents, and annual testing to verify restorability. It supports resilience by enabling rapid restoration aft…
…
continue reading