New website: RiskCommentary.ca We see a contradiction: increased need for Enterprise Risk Management, while risk managers report low perceived value of their processes. High Quality Risk Assessment addresses uncertainty and helps solve chronic business problems. Join Edward Robertson, successful ERM practitioner, to discover a simple process that delivers clear value.
…
continue reading
Risk Identification Podcasts
Making Data Better is a podcast about data quality and the impact it has on how we protect, manage, and use the digital data critical to our lives. Through conversation and examination, George Peabody and Stephen Wilson look at data's role in risk management, at use cases like identification, lending, age verification, healthcare, and more personal concerns. Privacy and data ownership are topics, as are our data failures.
…
continue reading
Terminals Talk is a podcast exploring the topics that matter the most to the terminals industry. In every episode, we cover a big question in 45 minutes or less, from bulk storage and energy infrastructure trends, to technology, skills and pathways for tomorrow.
…
continue reading
The ISO Review Podcast is a production of SimplifyISO. In each episode, we share the latest International Standards Development, and is your resource for getting the most out of your management systems. Your podcast hosts are Howard Fox & Jim Moran. Howard is a Business Coach and Host of the Success InSight Podcast. Jim is an ISO Management System Professional, celebrating 30-plus years delivering ISO support.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
This podcast is for multi-unit managers, new and tenured. You're always on the road between stores and cities. Why not put your critical thinking and creativity to work during this time? Let's drive down this road together.
…
continue reading
An improved audio format version of our written content. Get your defence and security perspectives now through this podcast.
…
continue reading
The Village Global podcast takes you inside the world of venture capital and technology, featuring enlightening interviews with entrepreneurs, investors and tech industry leaders. Learn more at www.villageglobal.vc.
…
continue reading
The Datamam Podcast explores how public data is transforming modern industries. The show dives into real-world use cases of web scraping, data intelligence, and AI, from market analysis and competitive benchmarking to ethical debates and automation trends. Each episode breaks down complex data topics into engaging conversations for tech leaders, founders, and data professionals looking to stay ahead in a data-driven world.
…
continue reading
Welcome to We Love PMO the ultimate destination for project management enthusiasts seeking clarity and inspiration in the dynamic world of projects, programmes, portfolios, PMOs, and risk management. I'm your host, Sarah, bringing over a decade of hands-on experience across diverse sectors to your ears. In each episode, we demystify the intricacies of project management, breaking down complex concepts without drowning you in jargon. Whether you're a seasoned pro navigating the twists and tur ...
…
continue reading

1
Using Artificial Intelligence to Strengthen Risk Identification in Your ISO Management Systems
29:49
29:49
Play later
Play later
Lists
Like
Liked
29:49By Jim Moran, Howard Fox
…
continue reading

1
What Makes a Good Military Coalition Partner?
11:06
11:06
Play later
Play later
Lists
Like
Liked
11:06The United States Defence Secretary, Pete Hegseth, recently commented that the International Security Assistance Force (ISAF) in Afghanistan, which existed between 2001-2014, colloquially stood for 'I saw Americans fighting' at a recent Capitol hearing.1 Hegseth was giving evidence in front of the Senate Appropriations Committee when he made the co…
…
continue reading
By Mavs (WR Editor)
…
continue reading

1
Bullshit & Botshit: Digital Sycophancy & Analogue Deference in Defence
15:15
15:15
Play later
Play later
Lists
Like
Liked
15:15The recently published Strategic Defence Review (SDR)1 and National Security Strategy (NSS)2 both place accelerating development and adoption of automation and Artificial Intelligence (AI) at the heart of their bold new vision for Defence. I've written elsewhere3 about the broader ethical implications,4 but want here to turn attention to the 'so wh…
…
continue reading

1
Fuelling the future: the role of storage and distribution infrastructure in the energy transition
22:43
22:43
Play later
Play later
Lists
Like
Liked
22:43In this episode, we explore with Gorka Penalva, Commercial Director, Northwest Europe, at Exolum, the key role of storage and distribution infrastructure in the energy transition and in supporting the provision of low emissions fuels, including sustainable aviation fuels.
…
continue reading

1
What a British-Led Military Contingent in Ukraine Could Look Like
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12The Russian invasion of Ukraine, in its full-scale war for the third year with level overall years of conflict, is reaching a critical moment where both Kyiv's and Moscow's will to fight comes down to attrition. Under the second Trump Administration, peace talks and proposals of frozen lines have taken place with NATO members, Ukrainian President V…
…
continue reading
The recently reported move by the RAF to manage supply of vegan alternative uniforms on request, whilst not necessarily quite as new as it may seem, may initially appear to challenge military identity, organisational culture, and the nature and Operational Effectiveness of a modern fighting force. But whilst I'm not vegan myself and therefore won't…
…
continue reading

1
Identification/Mission First in the Digital Age
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13This brief presents a strategic imperative. The development of the IMF is consistently bound by a very complex set of messaging - not just within the MoD but also across its supplier base - whereby interlinking technology, organisational and institutional change is hindering scalability across 'The Stack'. Increasingly, the three components of tech…
…
continue reading
"I like the word lethal. It is reminiscent [. . .] of pretty women and muscular men in classy hotels. Of secret negotiations and ice cubes in 25-year-old scotch glasses. [. . .]." Commentator in a study by Ofra Ben Ishai In this brief article, I will propose that the concept of lethality, aside from being poorly defined, has become a bleak commodit…
…
continue reading

1
Sneak Peek at the ISO 9001 Draft Update: Changes, Clarifications, and Industry Impact
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Jim and Howard chat about the upcoming changes to ISO 9001, offering listeners an exclusive sneak peek at the new Draft International Standard set to shape quality management systems worldwide. DISCUSSION 00:00 Global Reach of ISO 900…
…
continue reading

1
Wavell Reviews: Euclid's Army by William F. Owen
4:49
4:49
Play later
Play later
Lists
Like
Liked
4:49Modern military debate often gets lost in technology, jargon, and expensive promises about the "next war." In Euclid's Army: Preparing Land Forces for Warfare Today, William F. Owen cuts through the fog with a sharp and uncompromising thesis: armies must be simpler, cheaper, and better at the basics. This is not a comfortable read for those investe…
…
continue reading
Introduction This year marked the 80th anniversary of the atomic bombing of Hiroshima and Nagasaki. Since then, the non-use of nuclear weapons has remained the single most significant phenomenon of the nuclear age. Central to any discussion of global nuclear politics is the term nuclear taboo, which refers to a de facto prohibition against the firs…
…
continue reading

1
#Wavell Reviews A Risk Too Far: A Psychological Autopsy of the Planning for Arnhem by Gary Buck
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04You may have thought that another book on Arnhem was not necessary or that it could not possibly tell you anything you did not already know about this iconic battle from World War Two. However, Gary Buck's new book, A Risk Too Far, takes a new and novel approach to the subject that has you reappraising the commonly held views and your own long-held…
…
continue reading

1
Ancient Arts, Modern Ethics, and the New Battlefield
12:26
12:26
Play later
Play later
Lists
Like
Liked
12:26The recent Defence Committee report, Defence in the Grey Zone, brings renewed focus to the challenge of hostile activity below the threshold of conventional war. The term 'Grey Zone' suggests a novel ambiguity, a modern strategic dilemma born of new technologies; this ambiguous environment challenges not only our strategic doctrines but also our cl…
…
continue reading

1
Integrated strategy and Human Security outcomes: The British Army's engineering surveys in Albania
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06Aligned to His Majesty's Government (HMG) priorities of curtailing irregular migration and associated connections to human trafficking from Albania, efforts to address the drivers of migration and organised crime at source are underway. The British Army's ongoing specialist survey work in Albania's Kukës Subterranean Complex (KSC) may lead to livel…
…
continue reading

1
Enhancing Information Security Management Systems with AI
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14Click here to learn about our new DIY ISO 9001 program using AI . Welcome back to the ISO Review Podcast. In this episode, hosts Jim Moran and Howard Fox are joined by special guest Dejan Kosutic, CEO of Advisera. Dejan is a renowned cybersecurity expert for ISO 27001. He is passionate about making compliance accessible. Dejan and Jim discuss how t…
…
continue reading

1
NATO's Early Cold War Lessons Show What US, Japan, and South Korea Must Do Now
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58In the not-so-distant future, a U.S. military commander in the Indo-Pacific could be forced to fight two major wars at once - one against a Chinese assault on Taiwan, the other against a North Korean attack on the Korean Peninsula. This dual-front crisis scenario, long considered unlikely, is now routinely modeled in wargames and quietly debated in…
…
continue reading

1
Integrated Recce: Enhancing Cavalry Operations through technology on the CV90 Platform
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09The rapid advancement of military technology continues to transform the operational landscape of modern warfare. Cavalry operations (CavOps), traditionally focused on reconnaissance and rapid manoeuvre, now increasingly rely on sophisticated sensor systems and unmanned aerial vehicles (UAVs) to maintain battlefield superiority. This article explore…
…
continue reading
Introduction Like many of us, I love listening to our veterans' tales, exploits and adventures. They regale stories from their long careers, dits about the changes in warfare and the disruptions following the digital transformation of our armed forces. Suddenly, I feel my age as they talk about some of the equipment I worked on, but in the past ten…
…
continue reading

1
Restructuring the British Army: A Two-Division Model
20:09
20:09
Play later
Play later
Lists
Like
Liked
20:09The British Army faces a pivotal moment as it navigates the evolving demands of modern warfare within the framework of the Strategic Defence Review (SDR) expected in spring 2025. The SDR places NATO at the core of the UK's defence posture, requiring the Army to maintain credible, deployable forces capable of deterring peer adversaries, particularly…
…
continue reading
Following the Buncefield explosions and fires in 2005, broad improvements were introduced within the petroleum storage sector and across other major hazard industries. In this episode, we explore with Ian Travers, a world expert on process safety management and leadership, the progress made over the past 20 years, and why the principles of process …
…
continue reading

1
How India-Pakistan conflict Inform China's Operational Playbook
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09The four-day India-Pakistan military crisis showcased a real-world glimpse of how near-peer militaries will face each other on the future battlefield. This high-tech military showdown was of immense significance for the People Liberation Army (PLA), which has been monitoring the global conflicts, Russia-Ukraine war, Nagorno-Karabakh and Syrian civi…
…
continue reading

1
#WavellReviews Lawrence of Arabia by Ranulph Fiennes
3:53
3:53
Play later
Play later
Lists
Like
Liked
3:53I first discussed Lawrence of Arabia by Ranulph Fiennes over an evening mezze in Jordan with a senior civil servant. With myself stationed in Jordan - Lawrence's old backyard - and him working on Middle Eastern defence policy from the UK, we find ourselves, somewhat sheepishly, admitting a shared disappointment. We both expected more. What we encou…
…
continue reading

1
How Positive Intention Can Transform Workplace Culture and Management Systems
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02Click here to learn about our new DIY ISO 9001 program using AI Welcome back to the ISO Review Podcast, your trusted source for the latest in international standards development and practical tips on getting the most out of your management systems. In this episode, hosts Jim Moran and Howard Fox are joined by special guest Michael Kent Hart, the fo…
…
continue reading
The U.S. Navy faced multiple threats in an emerging technology environment. The past two years have offered many lessons about the efficacy of anti-ship ballistic missiles and unmanned platforms and we must identify and learn them. The lessons from Ukraine and Yemen are shaping fleet design for the next generation. Understanding the context of the …
…
continue reading

1
Scraping for Awareness: How Smart Companies Turn Public Data Into Strategic Advantage
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59In this episode of the Datamam Podcast, we explore how companies use web scraping to move beyond dashboards and build real-time market awareness. From detecting competitor moves and monitoring inventory shifts to uncovering regulatory changes and unauthorized sellers, scraping has become a strategic sensor system. We dive into use cases across CPG,…
…
continue reading
It was our own fault, and our very grave fault, and now we must turn it to use, We have forty million reasons for failure, but not a single excuse!" Rudyard Kipling Context This short story aims to bring tactical lessons from contemporary conflicts to life for junior commanders. Inspired by Captain (later Major General) Ernest Swinton's classic wor…
…
continue reading

1
Drones Take Centre Stage: The New Face of Modern Warfare
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55On June 1st 2025, Ukraine carried out well-coordinated drone attacks on four airbases deep inside Russia. In the operation codenamed 'Spider's Web', 117 drones were utilized to allegedly hit over 40 Russian strategic bombers inflicting a damage of around seven billion dollars. As part of the operation, drones were first smuggled into Russia, hidden…
…
continue reading

1
Turn Root Cause Analysis on its Head...Use Intention and Positive Focus Instead
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Howard and Jim discuss an innovative approach to traditional root cause analysis inspired by the work of Michael Kent Hart. In this approach, there is a shift in focus from traditional root cause analysis and blame to a more positive,…
…
continue reading

1
Who wants to be a millionaire? Life in occupied Ukraine
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36President Putin has only been able to sustain his war by bribing the poor, desperate and marginalised. The deal has been straightforward: sign up and you will be paid a fabulous lump sum and generous salary. You will receive benefits and a veteran's pension. In the event of your death your family will be compensated. A surprising majority believe t…
…
continue reading

1
Military Human Augmentation: Still Some Way Off
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45The publication of Human Augmentation - The Dawn of a New Paradigm by the Defence Concepts and Doctrine Centre (DCDC) in 2021 demonstrated the importance of this topic within UK defence.1 Human Augmentation (HA) is also referenced in the recent Defence Command Paper (Defence's response to a more contested and volatile world)3 relative perceived eff…
…
continue reading
At around the same time the video headlining this article was recorded, President Putin was hosting Russian Language, or Pushkin Day. This precedes Russia Day which is celebrated on 12 June. Putin spoke virtually from Novo Ogaryovo, his favoured residence on the outskirts of Moscow which boasts a heated, indoor, Olympic-sized swimming pool. Russian…
…
continue reading

1
Creating internal dilemmas: The Gendering of Grey-Zone Warfare
9:11
9:11
Play later
Play later
Lists
Like
Liked
9:11"Russia's hybrid attacks against NATO look like war", writes Deborah Haynes for Sky News. She is referring to grey-zone warfare, attacks that sit under the threshold of conventional war and include sabotage, cyber hacks, and assassination plots. Significantly, this is not the first caution published in the recent media of Russia's employment of thi…
…
continue reading

1
Build Your ISO 9001 QMS: Practical, DIY Approach Enhanced by AI Technology - Part III
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42Click here to learn about our new DIY ISO 9001 program using AI Welcome to the ISO Review Podcast. In this episode, Howard and Jim continue with a video series designed to help organizations simplify the process of ISO 9001 certification, using a do-it-yourself approach. Jim shares the journey behind creating the Simplify ISO platform—a user-friend…
…
continue reading

1
Episode 71: Continuous Improvement through Post-Incident Reviews and Risk Reassessment
11:27
11:27
Play later
Play later
Lists
Like
Liked
11:27Mature security programs improve over time. In this final episode, we explain how to lead post-incident reviews, implement lessons learned, and reassess risk in light of new data. This is where governance, program management, and incident handling come full circle—just as ISACA intends for CISM-certified leaders. Ready to start your journey with co…
…
continue reading

1
Episode 70: Supervising Risk Treatment and Continuous Monitoring
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23Managing risk doesn’t stop with one decision. In this episode, we explore how to supervise treatment activities (mitigation, transfer, acceptance) and establish ongoing monitoring to ensure sustained performance. These continuous oversight tasks are key to mastering Domain 2 and real-world risk leadership. Ready to start your journey with confidenc…
…
continue reading

1
Episode 69: Supervising Risk Identification and Assessment
10:57
10:57
Play later
Play later
Lists
Like
Liked
10:57CISM-certified professionals must oversee—not just conduct—risk assessments. This episode covers how to supervise the process, validate results, and ensure assessments align with business priorities. ISACA expects you to understand both tactical execution and leadership-level oversight. Ready to start your journey with confidence? Learn more at Bar…
…
continue reading

1
Episode 68: Managing and Monitoring Security Compliance with External Parties
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42Vendors, suppliers, and partners all affect your risk posture. This episode explores how to define, enforce, and monitor external security requirements. You’ll learn how to handle audits, compliance failures, and communication with third parties—real-world skills with high relevance on the CISM exam. Ready to start your journey with confidence? Lea…
…
continue reading

1
Episode 67: Integrating Security Requirements into Organizational Processes
11:42
11:42
Play later
Play later
Lists
Like
Liked
11:42In this episode, we cover how to embed security into core business workflows—from procurement to development and beyond. You’ll learn how to ensure that security requirements become part of how the organization works, not just what it reacts to. Expect exam questions on integration in Domains 1, 3, and 4. Ready to start your journey with confidence…
…
continue reading

1
Episode 66: Aligning Security Programs with Operational Business Objectives
10:59
10:59
Play later
Play later
Lists
Like
Liked
10:59Security must support the mission. This episode teaches you how to align your security initiatives with day-to-day business operations, process priorities, and performance expectations. This strategic alignment is central to Domain 3 and may appear in scenario questions about resource conflicts or program goals. Ready to start your journey with con…
…
continue reading

1
Episode 65: Evaluating and Reporting Information Security Metrics
11:37
11:37
Play later
Play later
Lists
Like
Liked
11:37Metrics turn performance into visibility. This episode shows you how to define, collect, and report information security metrics that support governance, justify decisions, and improve outcomes. You’ll also learn how ISACA expects you to evaluate effectiveness—a frequent target in Domain 3 and 4 questions. Ready to start your journey with confidenc…
…
continue reading

1
Episode 64: Compiling and Presenting Effective Security Reports
10:56
10:56
Play later
Play later
Lists
Like
Liked
10:56CISM candidates must know how to report program results and risk insights to both executives and operational teams. This episode explains how to compile relevant data, translate it into actionable insights, and tailor the message to your audience. Exam questions will test your ability to do all three well. Ready to start your journey with confidenc…
…
continue reading

1
Episode 63: Defining and Communicating Security Roles and Responsibilities
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39Effective governance depends on clear roles and responsibilities. In this episode, we walk through how to assign, document, and communicate who owns what in your security program. From the board to front-line staff, clarity reduces risk and improves accountability—both on the exam and in real practice. Ready to start your journey with confidence? L…
…
continue reading

1
Episode 62: Gaining Senior Leadership Commitment and Stakeholder Support
11:02
11:02
Play later
Play later
Lists
Like
Liked
11:02Security programs rise or fall on leadership support. This episode teaches you how to earn and sustain executive commitment, communicate risk in business terms, and align your initiatives with organizational strategy. These skills show up in both Domain 1 and complex CISM scenario questions. Ready to start your journey with confidence? Learn more a…
…
continue reading

1
Episode 61: Communicating the Business Case and Gaining Stakeholder Buy-In
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09CISM leaders must champion security through influence, not just authority. In this episode, we cover how to build and communicate compelling business cases for security investments. Learn how to present risk, value, and outcomes in language stakeholders understand—an essential Domain 1 and 3 skill for exam day. Ready to start your journey with conf…
…
continue reading

1
Episode 60: Building Effective Security Budgets and ROI Analysis
12:08
12:08
Play later
Play later
Lists
Like
Liked
12:08Budgeting is about more than asking for money—it’s about justifying value. This episode explains how to estimate costs, present return on investment, and align security spending with business priorities. Expect questions on budgeting tradeoffs, prioritization, and executive persuasion on the CISM exam. Ready to start your journey with confidence? L…
…
continue reading

1
Episode 59: Integrating Information Security into Corporate Governance
12:19
12:19
Play later
Play later
Lists
Like
Liked
12:19Security can’t operate in a silo. This episode covers how to embed information security into broader corporate governance, ensuring risk, compliance, and audit processes align with your program. Learn how to advocate for security at the board level—just as ISACA expects of successful CISM candidates. Ready to start your journey with confidence? Lea…
…
continue reading

1
Episode 58: Implementing Information Security Governance Frameworks
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20Frameworks turn strategy into structure. In this episode, we explain how to implement security governance frameworks like COBIT and ISO in ways that support accountability, transparency, and control. If the exam asks you how to operationalize governance, this episode gives you the language to answer it. Ready to start your journey with confidence? …
…
continue reading

1
Episode 57: Establishing Information Security Strategy Aligned with Organizational Goals
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06Security strategy must serve the business. This episode walks you through aligning your security vision, priorities, and investment with what the organization truly values—its mission, objectives, and risk tolerance. This alignment is a core competency for CISM holders and appears frequently in Domain 1 questions. Ready to start your journey with c…
…
continue reading

1
Episode 56: Identifying Internal and External Influences on Security Strategy
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29Domain 1 isn’t just about governance—it’s about understanding what shapes strategy. This episode teaches you how to identify organizational drivers, market forces, regulatory shifts, and threat evolution, and how to reflect these in your security planning. These insights often form the basis of scenario questions. Ready to start your journey with c…
…
continue reading