Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Enterprise Risk Management Framework Podcasts

show episodes
 
Artwork

1
Risk Commentary

Edward Robertson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
New website: RiskCommentary.ca We see a contradiction: increased need for Enterprise Risk Management, while risk managers report low perceived value of their processes. High Quality Risk Assessment addresses uncertainty and helps solve chronic business problems. Join Edward Robertson, successful ERM practitioner, to discover a simple process that delivers clear value.
  continue reading
 
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
  continue reading
 
The Employee Safety Podcast is for professionals responsible for the safety and well-being of their employees. Today’s world has a wide array of threats: wildfires, hurricanes, civil unrest, acts of violence, a global pandemic. We will discuss how to protect your employees from all of these threats—whether they’re in the office, working remotely, or traveling for business. Each episode features an interview with a leader in employee safety, discussing topics such as emergency preparedness, b ...
  continue reading
 
Artwork

1
Lights On Data Show

George Firican

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Each episode puts the lights on various data topics with renowned industry experts. We cover the following topics in a fun and informative interview format: data science, data analytics, machine learning, artificial intelligence, data visualization, data storytelling, data governance, data management, data quality, data strategy, and much more.
  continue reading
 
I'm a work in progress. This podcast documents my ongoing quest for wealth, wisdom and enlightenment. The episodes are of variable length: When I find an interesting person to talk to - who is willing to have the conversation recorded, I put it up. But I have also found that it is useful to record my own thoughts - in short snippets.
  continue reading
 
Loading …
show series
 
Corporate security risks are evolving in ways that demand new mitigation strategies. Ryan Schonfeld, Co-founder and CEO of HiveWatch, an AI-driven physical security software platform, draws on his background in law enforcement and global enterprise security to offer a new perspective on how organizations can better manage today’s challenges. From t…
  continue reading
 
When David Fortino joined New York Blood Center Enterprises—one of the largest nonprofit blood collection and distribution organizations in the U.S.—as Head of Corporate Security, he was tasked with building the company’s first enterprise-wide security program. With 2,300 employees spread across more than 70 locations in 17 states, and a constantly…
  continue reading
 
In this episode of The Lights On Data Show, George Firican speaks with Vinay Samuel, CEO and Founder of Zetaris, about how organizations can build AI systems that are cost-efficient, sovereign, and trusted.They explore what it really means to own your AI: from keeping intellectual property and data within your control, to reducing cloud and lakehou…
  continue reading
 
In today’s complex global risk landscape, enterprise leadership teams must have a complete understanding of their risk profiles to make informed decisions on how to protect their people and assets. Daniel Devery, Director of Enterprise Crisis Management at Assurant, shares how his team turns geopolitical risks into early warnings by contextualizing…
  continue reading
 
Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes…
  continue reading
 
Construction sites are unpredictable by nature, with changing crews, high-risk hazards, and exposure to the elements. Eddie Barry, Director of Risk and Threat Intelligence at Turner Construction, shares how the international construction services company builds safety into every project from the ground up. Eddie also discusses how Turner’s culture …
  continue reading
 
Many corporate security teams struggle to keep pace with today’s rapidly evolving risk landscape. Most rely on a patchwork of disconnected tools for intelligence, response, and communication, which leads to duplicative work, slower detection, and inefficient threat resolution. To directly address these challenges, AlertMedia recently released a maj…
  continue reading
 
September is National Preparedness Month and Rail Safety Month, two annual efforts spotlighting emergency readiness and rail-related hazards. With trains running through communities nationwide, we turn to Amtrak, the National Railroad Passenger Corporation, to see how these initiatives come to life. Amtrak’s Vice President of Operational Safety, Ju…
  continue reading
 
This month marks the 20th anniversary of Hurricane Katrina—one of the most devastating natural disasters in U.S. history. When the storm struck the Gulf Coast in August 2005, Bonnie Canal was among the many New Orleanians forced to make an impossible decision: stay or evacuate. In this deeply personal episode, Bonnie reflects on the chaos of evacua…
  continue reading
 
At Capital One, operational resilience is a long-term, companywide investment that prioritizes customer needs. Theresa Reynolds, Senior Director of Operational Risk Management, shares how her team ensures the company can deliver on its promises, even amid disruption. From mapping essential services to tackling third-party risk, she breaks down the …
  continue reading
 
In this episode, Guy Spier speaks with Ritavan and Paaras about how businesses can unlock real value through data—not by chasing trends like AI or cloud, but by leveraging data purposefully. Ritavan shares insights from his book Data Impact, discussing how legacy companies often fall into the trap of tech commoditization. Learn how to: Use data lev…
  continue reading
 
Business resilience isn’t built overnight; Joel Navarro knows that better than most. As Vice President of Global Business Resiliency at East West Bank and President of the North Texas Chapter of ACP, Joel is widely recognized as a go-to expert in business continuity. In this episode, Joel explains how close collaboration with business units leads t…
  continue reading
 
Join George Firican as he discusses with Emily Chase Coleman, CEO of HAI Analytics, about the convergence of EdTech and AI in transforming higher education. Learn how predictive modeling and AI are enhancing recruitment and retention strategies, identifying at-risk students, and optimizing financial aid packages. Discover the importance of human ov…
  continue reading
 
“Culture is a series of intentional actions that show care”—and for Jenna Eichberg, those actions begin with safety. As Chief People Officer at AlertMedia, she fosters a work environment where duty of care is a daily commitment, not just a concept. In the 200th episode of the show, Jenna discusses why creating a foundation of physical and psycholog…
  continue reading
 
In this episode of the Lights On Data Show, George Firican interviews Ollie Hughes, CEO and co-founder of Count, to explore the challenge every data team faces: showing real Return on Investment (ROI). Ollie shares a clear framework built on four principles that help data teams break free from the 'service trap' and make a measurable business impac…
  continue reading
 
In this final episode of the prepcast, we shift focus from content to performance. You’ve learned the material—now it's time to master the test. We walk through proven strategies for final review, including how to prioritize domains, balance study time, and simulate test conditions. You’ll get tips on memory recall, cognitive pacing, and avoiding e…
  continue reading
 
Vendor relationships introduce risk far beyond basic performance metrics—and in this episode, we dive into the executive oversight practices required to manage those risks. You’ll learn how to assess third-party risk using tiered models, risk questionnaires, and onsite audits. We also discuss how to require evidence of compliance, conduct assessmen…
  continue reading
 
Securing a vendor is only the beginning—the real work lies in managing performance, risk, and accountability. This episode focuses on the contractual elements that govern third-party relationships, including service level agreements (SLAs), key performance indicators (KPIs), penalties for non-compliance, and confidentiality clauses. You’ll learn ho…
  continue reading
 
Procurement is more than just purchasing tools—it’s a strategic process that shapes your organization's security ecosystem. In this episode, we walk you through the essentials of security procurement, including how to develop Requests for Proposals (RFPs) and Requests for Information (RFIs), establish evaluation criteria, and conduct vendor due dil…
  continue reading
 
As cybersecurity budgets grow, so does the need to justify investments with clear, measurable value. In this episode, we explore how CISOs evaluate the return on investment (ROI) of security initiatives, technologies, and services. You’ll learn how to calculate ROI using both quantitative and qualitative factors, including risk reduction, productiv…
  continue reading
 
Security budgeting doesn’t end once funding is approved—CISOs must continuously manage, adjust, and defend their budgets in the face of shifting priorities and evolving threats. In this episode, we explore the fundamentals of dynamic budget management, including tracking expenditures, reallocating resources, and responding to unexpected events such…
  continue reading
 
Financial fluency is essential for every CISO—and in this episode, we break down the core principles of financial management in the context of enterprise cybersecurity. You’ll learn how to interpret balance sheets, manage operational and capital expenditures, and build forecasts that align with multi-year strategic plans. We explain how to calculat…
  continue reading
 
Effective security leaders think in frameworks—and in this episode, we explore two of the most influential planning models for enterprise architecture: TOGAF (The Open Group Architecture Framework) and SABSA (Sherwood Applied Business Security Architecture). You’ll learn how these frameworks guide long-term security strategy by aligning governance,…
  continue reading
 
Security is no longer a siloed function—it must be embedded in business strategy. In this episode, we examine how CISOs align cybersecurity initiatives with overarching organizational goals. You’ll learn how to interpret business drivers, engage with other executive leaders, and shape security programs that enable growth, agility, and competitive a…
  continue reading
 
As security operations evolve, the idea of the autonomous SOC is moving from concept to implementation. In this episode, we explore what defines an autonomous Security Operations Center and how automation, AI, machine learning, and orchestration platforms are converging to reduce human intervention. You’ll learn about the architectural components o…
  continue reading
 
Artificial intelligence and machine learning are rapidly reshaping the cybersecurity landscape—and CISOs must understand both their potential and their limitations. In this episode, we explore how AI and ML are used in security solutions, from behavioral analytics and anomaly detection to automated threat hunting and decision support. You’ll learn …
  continue reading
 
Virtualized environments introduce a unique set of security concerns that CISOs must understand and manage. In this episode, we break down how hypervisors, virtual machines, and containers work—and how these technologies change the security landscape. You’ll learn about hypervisor attacks, inter-VM threats, virtual network segmentation, and the imp…
  continue reading
 
With mobile devices becoming core tools for business productivity, they also represent a growing attack surface that CISOs must manage. In this episode, we examine the risks posed by smartphones, tablets, and other portable devices, and the controls needed to secure them. You’ll learn how to implement mobile device management (MDM), containerizatio…
  continue reading
 
While cybersecurity often dominates the conversation, physical security remains an essential component of any comprehensive security program. In this episode, we explore how physical controls—like access badges, surveillance systems, security guards, and biometrics—support the protection of data centers, executive offices, and other sensitive facil…
  continue reading
 
Encryption is a cornerstone of data protection, and in this episode, we break down its role in securing data both at rest and in transit. You’ll learn about the key encryption types—symmetric, asymmetric, and hashing—and how each serves a distinct purpose in confidentiality, integrity, and authentication strategies. We explore how encryption is app…
  continue reading
 
Data is the crown jewel of most organizations—and protecting it is a central responsibility of the CISO. In this episode, we explore the foundational practices for securing sensitive and regulated data, including classification, labeling, access controls, encryption, and secure disposal. You’ll learn how to define data handling requirements by type…
  continue reading
 
As organizations migrate more infrastructure and services to the cloud, CISOs must adapt their strategies to manage risk in cloud environments. This episode introduces the core principles of cloud security, including shared responsibility models, identity federation, encryption of data at rest and in transit, and secure API design. You'll learn abo…
  continue reading
 
Network security remains a foundational element of cybersecurity architecture, even as perimeter boundaries blur in cloud-first and remote-enabled environments. In this episode, we provide a comprehensive overview of modern network security strategies, including segmentation, firewall deployment, IDS/IPS, secure tunneling, and zero trust network ac…
  continue reading
 
Endpoints represent one of the largest attack surfaces in modern organizations, making endpoint protection a critical priority. In this episode, we cover the foundational components of endpoint security—including antivirus, EDR (Endpoint Detection and Response), application whitelisting, configuration hardening, and data loss prevention (DLP). You’…
  continue reading
 
Once you've selected the right access control model, the challenge shifts to enforcing it consistently across systems, users, and environments. In this episode, we walk through best practices for implementing, maintaining, and auditing access control systems in complex enterprises. You'll learn how to enforce least privilege, manage role creep, and…
  continue reading
 
Access control is foundational to every security program, and this episode introduces the core models used to govern who can access what, when, and under what conditions. We examine the primary access control models—Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (…
  continue reading
 
Building on the previous episode, we now explore more advanced threat hunting concepts that CISOs must understand to support elite detection capabilities. You'll learn how mature organizations move beyond one-off hunts to establish sustained, repeatable hunting programs with custom detection logic, automation pipelines, and continuous telemetry tun…
  continue reading
 
Threat hunting goes beyond traditional alert-driven detection by proactively searching for indicators of compromise within the environment. In this episode, we explore what threat hunting is, why it's becoming a critical capability, and how CISOs support and guide hunting programs. You’ll learn about the use of hypotheses, the importance of telemet…
  continue reading
 
Vulnerability management is the process of identifying, evaluating, and remediating weaknesses in systems, applications, and configurations before they can be exploited. In this episode, we break down the key stages of an effective vulnerability management program, from scanning and prioritization to patching and verification. You’ll learn how to c…
  continue reading
 
Security Information and Event Management (SIEM) platforms are powerful tools for correlation, alerting, and visibility—but they can also become operational burdens if poorly managed. In this episode, we explore how CISOs select, configure, and govern SIEM solutions to drive meaningful insights without overwhelming analysts. You'll learn what data …
  continue reading
 
The Security Operations Center, or SOC, is the front line of defense against cyber threats. In this episode, we explain how SOCs operate, what core functions they perform, and how they fit into an enterprise security architecture. You’ll learn about SOC tiers, key analyst roles, common tools such as SIEMs, SOAR platforms, and EDR systems, and how S…
  continue reading
 
Disaster recovery (DR) is the technical counterpart to business continuity—and this episode explores how CISOs ensure the restoration of systems, services, and data after catastrophic disruptions. You’ll learn about the core elements of DR planning, including backup strategies, failover procedures, DR site selection, data replication models, and sy…
  continue reading
 
Business continuity planning (BCP) ensures that critical operations can continue even in the face of major disruptions—and CISOs play a central role in shaping those plans. In this episode, we break down the key components of a business continuity strategy, including business impact analysis (BIA), recovery objectives (RTOs and RPOs), critical syst…
  continue reading
 
Digital forensics is no longer just a technical specialty—it’s an executive concern that intersects with legal risk, regulatory obligations, and organizational reputation. In this episode, we introduce the fundamentals of digital forensics from a CCISO lens. You’ll learn what forensics is, when it should be triggered, and how it integrates with inc…
  continue reading
 
Once the basics of incident management are in place, advanced techniques are needed to handle complex, multi-phase, or high-stakes threats. This episode dives deeper into advanced incident response strategies, such as threat containment across hybrid environments, cross-border coordination for global enterprises, and legal evidence handling during …
  continue reading
 
Every security leader must be prepared to lead during a crisis—and that begins with mastering the fundamentals of incident management. In this episode, we walk through the full lifecycle of incident handling, from detection and triage to containment, eradication, and recovery. You’ll learn how to build incident response plans, define escalation pat…
  continue reading
 
No security program can succeed without a well-structured, skilled, and motivated team. In this episode, we cover how CISOs build and lead security teams that are aligned to both technical and organizational goals. You’ll learn about the key roles within a mature security organization—from analysts and engineers to architects and governance leads—a…
  continue reading
 
Security leaders must do more than secure funding—they must make smart, defensible decisions about how to allocate people, tools, and time. In this episode, we dive into the principles of resource allocation from a CCISO perspective, examining how to prioritize competing initiatives, assign responsibilities based on skillsets, and make tradeoffs be…
  continue reading
 
In this episode, we explore the financial planning responsibilities that fall on every CCISO, starting with the fundamentals of budgeting. You’ll learn how to create a budget that aligns with strategic objectives, anticipates emerging risks, and reflects the true cost of implementing and maintaining effective controls. We discuss how to differentia…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play