<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/bare-metal-cyber-presents-framework" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Framework: The NIST Cybersecurity Framework (CSF)</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/bare-metal-cyber-presents-framework</itunes:new-feed-url>
    <description>**Framework** is your go-to podcast for mastering the **NIST Cybersecurity Framework (CSF)**—the foundational model for building and improving organizational security programs. This series breaks down every function, category, and subcategory within the CSF, helping professionals, educators, and leaders understand how to apply the framework in real-world environments. Each episode delivers clear, practical explanations that connect framework concepts to daily security operations, governance, and risk management practices. Whether you’re new to cybersecurity or refining an established program, Framework gives you the tools and understanding to align your organization with one of the most trusted security models in the world.

Listeners will gain insight into how the CSF’s five core functions—Identify, Protect, Detect, Respond, and Recover—work together to strengthen resilience and reduce cyber risk. The series also explores how organizations can tailor the CSF to their size, sector, and maturity level, integrate it with other standards, and measure progress through profiles and implementation tiers. With practical examples and step-by-step explanations, Framework helps you turn the structure of the CSF into a living, operational roadmap for security success.

Developed by **BareMetalCyber.com**, Framework is designed to make cybersecurity standards understandable, actionable, and relevant. Tune in on your favorite platform and build the clarity, confidence, and competence to apply the NIST Cybersecurity Framework in your organization.
</description>
    <copyright>© 2026 Jason Edwards</copyright>
    <podcast:guid>9a42f4e8-efe3-507c-ba2f-e2d2d4db8bdf</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="d97377c1-7035-525f-9ab3-8bdfa2c3a586" feedUrl="https://feeds.transistor.fm/framework-the-center-for-internet-security-cis-top-18-controls"/>
      <podcast:remoteItem feedGuid="12ba6b47-50a9-5caa-aebe-16bae40dbbc5" feedUrl="https://feeds.transistor.fm/cism"/>
      <podcast:remoteItem feedGuid="3a5eeb4b-2c10-54fd-941a-e7190309122b" feedUrl="https://feeds.transistor.fm/framework-nist-800-53-audio-course"/>
      <podcast:remoteItem feedGuid="a0397309-9940-5e31-a4f8-b9c822b9212a" feedUrl="https://feeds.transistor.fm/framework-nist-800-53-audio-course-05bccba8-c74c-4b5e-a5eb-93af7b049a3b"/>
      <podcast:remoteItem feedGuid="7b53f1c0-366a-5728-826b-5b1c0d45ecac" feedUrl="https://feeds.transistor.fm/framework-soc-2-compliance-course"/>
      <podcast:remoteItem feedGuid="1e81ed4d-b3a7-5035-b12a-5171bdd497b8" feedUrl="https://feeds.transistor.fm/certified-the-crisc-prepcast"/>
      <podcast:remoteItem feedGuid="143fc9c4-74e3-506c-8f6a-319fe2cb366d" feedUrl="https://feeds.transistor.fm/certified-the-cissp-prepcast"/>
      <podcast:remoteItem feedGuid="47161bf6-f6a3-5475-a66b-f153a62fcdea" feedUrl="https://feeds.transistor.fm/framework-iso-27001-cyber"/>
    </podcast:podroll>
    <podcast:locked owner="baremetalcyber@outlook.com">no</podcast:locked>
    <podcast:trailer pubdate="Mon, 13 Oct 2025 22:27:59 -0500" url="https://media.transistor.fm/bae8bae4/b8fa021f.mp3" length="4133615" type="audio/mpeg">Welcome to Framework: The NIST CSF</podcast:trailer>
    <language>en</language>
    <pubDate>Mon, 30 Mar 2026 09:40:02 -0500</pubDate>
    <lastBuildDate>Sun, 12 Apr 2026 00:03:54 -0500</lastBuildDate>
    <link>https://baremetalcyber.com/framework-the-nist-cybersecurity-framework-csf</link>
    <image>
      <url>https://img.transistorcdn.com/DmHvLWMtQwbVOnLWAy8_4ICWiR2ZTyNus_F12SDU5Ew/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZGZh/N2NkOTZjOTRhM2Y3/MjVhMjlkZDVhM2My/MTAxMS5wbmc.jpg</url>
      <title>Framework: The NIST Cybersecurity Framework (CSF)</title>
      <link>https://baremetalcyber.com/framework-the-nist-cybersecurity-framework-csf</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education"/>
    <itunes:type>serial</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/DmHvLWMtQwbVOnLWAy8_4ICWiR2ZTyNus_F12SDU5Ew/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZGZh/N2NkOTZjOTRhM2Y3/MjVhMjlkZDVhM2My/MTAxMS5wbmc.jpg"/>
    <itunes:summary>**Framework** is your go-to podcast for mastering the **NIST Cybersecurity Framework (CSF)**—the foundational model for building and improving organizational security programs. This series breaks down every function, category, and subcategory within the CSF, helping professionals, educators, and leaders understand how to apply the framework in real-world environments. Each episode delivers clear, practical explanations that connect framework concepts to daily security operations, governance, and risk management practices. Whether you’re new to cybersecurity or refining an established program, Framework gives you the tools and understanding to align your organization with one of the most trusted security models in the world.

Listeners will gain insight into how the CSF’s five core functions—Identify, Protect, Detect, Respond, and Recover—work together to strengthen resilience and reduce cyber risk. The series also explores how organizations can tailor the CSF to their size, sector, and maturity level, integrate it with other standards, and measure progress through profiles and implementation tiers. With practical examples and step-by-step explanations, Framework helps you turn the structure of the CSF into a living, operational roadmap for security success.

Developed by **BareMetalCyber.com**, Framework is designed to make cybersecurity standards understandable, actionable, and relevant. Tune in on your favorite platform and build the clarity, confidence, and competence to apply the NIST Cybersecurity Framework in your organization.
</itunes:summary>
    <itunes:subtitle>**Framework** is your go-to podcast for mastering the **NIST Cybersecurity Framework (CSF)**—the foundational model for building and improving organizational security programs.</itunes:subtitle>
    <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Introduction to the NIST CSF</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Introduction to the NIST CSF</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">27bee1b1-df8b-4504-996b-7315fed2fd60</guid>
      <link>https://share.transistor.fm/s/016b6c7a</link>
      <description>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we introduce the National Institute of Standards and Technology (NIST) and its groundbreaking Cybersecurity Framework 2.0 (CSF 2.0). NIST plays a vital role in shaping cybersecurity standards, providing voluntary guidance to organizations looking to strengthen their security posture. CSF 2.0 expands upon previous versions by refining risk management principles, introducing governance as a core function, and offering a flexible approach that applies across industries. We break down how this updated framework helps businesses of all sizes assess cybersecurity maturity, implement structured controls, and align security efforts with best practices.</p><p>From financial institutions securing transactions to healthcare organizations protecting patient data, CSF 2.0 has become an essential tool in managing cyber risks. We explore the six core functions—Govern, Identify, Protect, Detect, Respond, and Recover—and discuss how organizations can integrate them into their cybersecurity strategies. Whether you’re building a security program from scratch or refining an existing approach, this episode provides key insights into why CSF 2.0 is a game-changer for modern cyber defense. Tune in to learn how this framework can help your organization stay resilient in an evolving digital landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we introduce the National Institute of Standards and Technology (NIST) and its groundbreaking Cybersecurity Framework 2.0 (CSF 2.0). NIST plays a vital role in shaping cybersecurity standards, providing voluntary guidance to organizations looking to strengthen their security posture. CSF 2.0 expands upon previous versions by refining risk management principles, introducing governance as a core function, and offering a flexible approach that applies across industries. We break down how this updated framework helps businesses of all sizes assess cybersecurity maturity, implement structured controls, and align security efforts with best practices.</p><p>From financial institutions securing transactions to healthcare organizations protecting patient data, CSF 2.0 has become an essential tool in managing cyber risks. We explore the six core functions—Govern, Identify, Protect, Detect, Respond, and Recover—and discuss how organizations can integrate them into their cybersecurity strategies. Whether you’re building a security program from scratch or refining an existing approach, this episode provides key insights into why CSF 2.0 is a game-changer for modern cyber defense. Tune in to learn how this framework can help your organization stay resilient in an evolving digital landscape.</p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Feb 2025 21:25:22 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/016b6c7a/4ad3da84.mp3" length="26315881" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1639</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we introduce the National Institute of Standards and Technology (NIST) and its groundbreaking Cybersecurity Framework 2.0 (CSF 2.0). NIST plays a vital role in shaping cybersecurity standards, providing voluntary guidance to organizations looking to strengthen their security posture. CSF 2.0 expands upon previous versions by refining risk management principles, introducing governance as a core function, and offering a flexible approach that applies across industries. We break down how this updated framework helps businesses of all sizes assess cybersecurity maturity, implement structured controls, and align security efforts with best practices.</p><p>From financial institutions securing transactions to healthcare organizations protecting patient data, CSF 2.0 has become an essential tool in managing cyber risks. We explore the six core functions—Govern, Identify, Protect, Detect, Respond, and Recover—and discuss how organizations can integrate them into their cybersecurity strategies. Whether you’re building a security program from scratch or refining an existing approach, this episode provides key insights into why CSF 2.0 is a game-changer for modern cyber defense. Tune in to learn how this framework can help your organization stay resilient in an evolving digital landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/016b6c7a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Introduction to Gap Assessments</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Introduction to Gap Assessments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">66bed3fb-0185-41d4-9a9f-c3056e124576</guid>
      <link>https://share.transistor.fm/s/c888d972</link>
      <description>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we dive into the importance of cybersecurity gap assessments—an essential process for identifying weaknesses, misconfigurations, and areas for improvement within an organization's security controls. We explore how gap assessments align cybersecurity efforts with industry frameworks such as NIST Cybersecurity Framework 2.0, NIST 800-53, and ISO 27001, providing organizations with a structured approach to risk management. From regulatory compliance to proactive threat mitigation, we break down the steps of conducting a gap assessment, highlighting how organizations can prioritize security improvements, allocate resources effectively, and enhance resilience against evolving cyber threats.</p><p>Beyond identifying vulnerabilities, gap assessments play a crucial role in strengthening an organization’s overall cybersecurity maturity. We discuss common security gaps, including weaknesses in preventive, detective, and corrective controls, and outline practical strategies for remediation. Whether your organization is preparing for a compliance audit, enhancing security policies, or refining risk management strategies, this episode provides actionable insights on how to leverage gap assessments for long-term cybersecurity success. Tune in to learn how structured assessments can help you close security gaps, improve regulatory alignment, and build a more resilient cybersecurity program.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we dive into the importance of cybersecurity gap assessments—an essential process for identifying weaknesses, misconfigurations, and areas for improvement within an organization's security controls. We explore how gap assessments align cybersecurity efforts with industry frameworks such as NIST Cybersecurity Framework 2.0, NIST 800-53, and ISO 27001, providing organizations with a structured approach to risk management. From regulatory compliance to proactive threat mitigation, we break down the steps of conducting a gap assessment, highlighting how organizations can prioritize security improvements, allocate resources effectively, and enhance resilience against evolving cyber threats.</p><p>Beyond identifying vulnerabilities, gap assessments play a crucial role in strengthening an organization’s overall cybersecurity maturity. We discuss common security gaps, including weaknesses in preventive, detective, and corrective controls, and outline practical strategies for remediation. Whether your organization is preparing for a compliance audit, enhancing security policies, or refining risk management strategies, this episode provides actionable insights on how to leverage gap assessments for long-term cybersecurity success. Tune in to learn how structured assessments can help you close security gaps, improve regulatory alignment, and build a more resilient cybersecurity program.</p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Feb 2025 21:31:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c888d972/7f6ad127.mp3" length="27138010" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1690</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we dive into the importance of cybersecurity gap assessments—an essential process for identifying weaknesses, misconfigurations, and areas for improvement within an organization's security controls. We explore how gap assessments align cybersecurity efforts with industry frameworks such as NIST Cybersecurity Framework 2.0, NIST 800-53, and ISO 27001, providing organizations with a structured approach to risk management. From regulatory compliance to proactive threat mitigation, we break down the steps of conducting a gap assessment, highlighting how organizations can prioritize security improvements, allocate resources effectively, and enhance resilience against evolving cyber threats.</p><p>Beyond identifying vulnerabilities, gap assessments play a crucial role in strengthening an organization’s overall cybersecurity maturity. We discuss common security gaps, including weaknesses in preventive, detective, and corrective controls, and outline practical strategies for remediation. Whether your organization is preparing for a compliance audit, enhancing security policies, or refining risk management strategies, this episode provides actionable insights on how to leverage gap assessments for long-term cybersecurity success. Tune in to learn how structured assessments can help you close security gaps, improve regulatory alignment, and build a more resilient cybersecurity program.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c888d972/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>The Fundamentals of Cybersecurity Controls</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>The Fundamentals of Cybersecurity Controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21bd5a97-c823-4bd9-a8cb-2512f22a9296</guid>
      <link>https://share.transistor.fm/s/3402212a</link>
      <description>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we take a deep dive into cybersecurity controls—the fundamental safeguards that protect organizations from cyber threats. Cybersecurity controls are essential for maintaining the confidentiality, integrity, and availability of critical assets, reducing the impact of cyberattacks, and ensuring regulatory compliance. We explore how controls align with the NIST Cybersecurity Framework 2.0 (CSF 2.0), focusing on its six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. From technical defenses like firewalls and encryption to administrative policies and incident response strategies, cybersecurity controls create a layered security approach that helps organizations mitigate risks in an ever-evolving threat landscape.</p><p>Beyond the basics, we break down the three primary categories of cybersecurity controls—preventive, detective, and corrective—highlighting their roles in a comprehensive security strategy. We also discuss the importance of testing and validating these controls through penetration testing, continuous monitoring, and compliance audits. Whether you're securing a small business or a large enterprise, understanding how to implement and maintain effective cybersecurity controls is critical for resilience against cyber threats. Tune in to learn how aligning security controls with CSF 2.0 can strengthen your organization's defenses and prepare you for the challenges of modern cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we take a deep dive into cybersecurity controls—the fundamental safeguards that protect organizations from cyber threats. Cybersecurity controls are essential for maintaining the confidentiality, integrity, and availability of critical assets, reducing the impact of cyberattacks, and ensuring regulatory compliance. We explore how controls align with the NIST Cybersecurity Framework 2.0 (CSF 2.0), focusing on its six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. From technical defenses like firewalls and encryption to administrative policies and incident response strategies, cybersecurity controls create a layered security approach that helps organizations mitigate risks in an ever-evolving threat landscape.</p><p>Beyond the basics, we break down the three primary categories of cybersecurity controls—preventive, detective, and corrective—highlighting their roles in a comprehensive security strategy. We also discuss the importance of testing and validating these controls through penetration testing, continuous monitoring, and compliance audits. Whether you're securing a small business or a large enterprise, understanding how to implement and maintain effective cybersecurity controls is critical for resilience against cyber threats. Tune in to learn how aligning security controls with CSF 2.0 can strengthen your organization's defenses and prepare you for the challenges of modern cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Feb 2025 21:41:04 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3402212a/8aaa66f2.mp3" length="27375840" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1705</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we take a deep dive into cybersecurity controls—the fundamental safeguards that protect organizations from cyber threats. Cybersecurity controls are essential for maintaining the confidentiality, integrity, and availability of critical assets, reducing the impact of cyberattacks, and ensuring regulatory compliance. We explore how controls align with the NIST Cybersecurity Framework 2.0 (CSF 2.0), focusing on its six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. From technical defenses like firewalls and encryption to administrative policies and incident response strategies, cybersecurity controls create a layered security approach that helps organizations mitigate risks in an ever-evolving threat landscape.</p><p>Beyond the basics, we break down the three primary categories of cybersecurity controls—preventive, detective, and corrective—highlighting their roles in a comprehensive security strategy. We also discuss the importance of testing and validating these controls through penetration testing, continuous monitoring, and compliance audits. Whether you're securing a small business or a large enterprise, understanding how to implement and maintain effective cybersecurity controls is critical for resilience against cyber threats. Tune in to learn how aligning security controls with CSF 2.0 can strengthen your organization's defenses and prepare you for the challenges of modern cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3402212a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Cybersecurity Maturity</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Cybersecurity Maturity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0c7b28cd-3be2-4d1b-a7dd-5c7f1af88821</guid>
      <link>https://share.transistor.fm/s/77f87a3b</link>
      <description>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we break down the cybersecurity maturity tiers in NIST Cybersecurity Framework 2.0 (CSF 2.0) and how organizations can progress from reactive security practices to fully integrated, adaptive cybersecurity operations. The four tiers—Partial, Risk-Informed, Repeatable, and Adaptive—provide a structured approach to assessing cybersecurity effectiveness and guiding improvement. We explore how each tier reflects an organization's ability to integrate cybersecurity into business operations, manage risks effectively, and respond to emerging threats. Whether your organization is just starting its security journey or striving for real-time, intelligence-driven cyber resilience, understanding these maturity levels is key to building a scalable and effective cybersecurity program.</p><p>Advancing through the maturity tiers requires more than just implementing security tools—it demands executive support, continuous risk assessments, and a culture of proactive cybersecurity. We discuss the common challenges organizations face when progressing through the tiers, from securing leadership buy-in to automating security operations. We also provide practical strategies for moving toward an Adaptive security posture, where cybersecurity is seamlessly embedded into business processes and dynamically evolves with new threats. Tune in to learn how to assess your organization’s cybersecurity maturity, prioritize improvements, and create a resilient, future-ready security strategy.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we break down the cybersecurity maturity tiers in NIST Cybersecurity Framework 2.0 (CSF 2.0) and how organizations can progress from reactive security practices to fully integrated, adaptive cybersecurity operations. The four tiers—Partial, Risk-Informed, Repeatable, and Adaptive—provide a structured approach to assessing cybersecurity effectiveness and guiding improvement. We explore how each tier reflects an organization's ability to integrate cybersecurity into business operations, manage risks effectively, and respond to emerging threats. Whether your organization is just starting its security journey or striving for real-time, intelligence-driven cyber resilience, understanding these maturity levels is key to building a scalable and effective cybersecurity program.</p><p>Advancing through the maturity tiers requires more than just implementing security tools—it demands executive support, continuous risk assessments, and a culture of proactive cybersecurity. We discuss the common challenges organizations face when progressing through the tiers, from securing leadership buy-in to automating security operations. We also provide practical strategies for moving toward an Adaptive security posture, where cybersecurity is seamlessly embedded into business processes and dynamically evolves with new threats. Tune in to learn how to assess your organization’s cybersecurity maturity, prioritize improvements, and create a resilient, future-ready security strategy.</p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Feb 2025 21:45:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/77f87a3b/5bea0183.mp3" length="18776727" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1168</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we break down the cybersecurity maturity tiers in NIST Cybersecurity Framework 2.0 (CSF 2.0) and how organizations can progress from reactive security practices to fully integrated, adaptive cybersecurity operations. The four tiers—Partial, Risk-Informed, Repeatable, and Adaptive—provide a structured approach to assessing cybersecurity effectiveness and guiding improvement. We explore how each tier reflects an organization's ability to integrate cybersecurity into business operations, manage risks effectively, and respond to emerging threats. Whether your organization is just starting its security journey or striving for real-time, intelligence-driven cyber resilience, understanding these maturity levels is key to building a scalable and effective cybersecurity program.</p><p>Advancing through the maturity tiers requires more than just implementing security tools—it demands executive support, continuous risk assessments, and a culture of proactive cybersecurity. We discuss the common challenges organizations face when progressing through the tiers, from securing leadership buy-in to automating security operations. We also provide practical strategies for moving toward an Adaptive security posture, where cybersecurity is seamlessly embedded into business processes and dynamically evolves with new threats. Tune in to learn how to assess your organization’s cybersecurity maturity, prioritize improvements, and create a resilient, future-ready security strategy.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/77f87a3b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Cybersecurity Risk Management</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Cybersecurity Risk Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dfb3cad7-5b34-457c-a547-b2276922d89c</guid>
      <link>https://share.transistor.fm/s/0dbcd923</link>
      <description>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we explore the critical role of risk management in the NIST Cybersecurity Framework 2.0 (CSF 2.0). Cyber threats evolve rapidly, and organizations must adopt a proactive, risk-informed approach to cybersecurity rather than relying on outdated compliance checklists. We break down how CSF 2.0 integrates risk management into its six core functions—Govern, Identify, Protect, Detect, Respond, and Recover—providing a structured methodology for assessing, prioritizing, and mitigating cyber risks. From evaluating threats and vulnerabilities to implementing effective risk treatment strategies, this episode highlights how businesses can enhance resilience while optimizing cybersecurity investments.</p><p>Beyond assessments, we discuss the importance of continuous risk monitoring, reassessment, and improvement to ensure security controls remain effective against emerging threats. We explore real-world examples of risk-based cybersecurity, such as access control measures, encryption strategies, and proactive incident response planning. Whether you’re refining your risk management program or looking to align cybersecurity efforts with business objectives, this episode provides actionable insights on strengthening your organization’s defenses through strategic, data-driven risk management. Tune in to learn how to anticipate, withstand, and recover from cyber threats with CSF 2.0’s risk-based approach.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we explore the critical role of risk management in the NIST Cybersecurity Framework 2.0 (CSF 2.0). Cyber threats evolve rapidly, and organizations must adopt a proactive, risk-informed approach to cybersecurity rather than relying on outdated compliance checklists. We break down how CSF 2.0 integrates risk management into its six core functions—Govern, Identify, Protect, Detect, Respond, and Recover—providing a structured methodology for assessing, prioritizing, and mitigating cyber risks. From evaluating threats and vulnerabilities to implementing effective risk treatment strategies, this episode highlights how businesses can enhance resilience while optimizing cybersecurity investments.</p><p>Beyond assessments, we discuss the importance of continuous risk monitoring, reassessment, and improvement to ensure security controls remain effective against emerging threats. We explore real-world examples of risk-based cybersecurity, such as access control measures, encryption strategies, and proactive incident response planning. Whether you’re refining your risk management program or looking to align cybersecurity efforts with business objectives, this episode provides actionable insights on strengthening your organization’s defenses through strategic, data-driven risk management. Tune in to learn how to anticipate, withstand, and recover from cyber threats with CSF 2.0’s risk-based approach.</p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Feb 2025 21:48:50 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0dbcd923/d55e5827.mp3" length="24550423" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1529</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we explore the critical role of risk management in the NIST Cybersecurity Framework 2.0 (CSF 2.0). Cyber threats evolve rapidly, and organizations must adopt a proactive, risk-informed approach to cybersecurity rather than relying on outdated compliance checklists. We break down how CSF 2.0 integrates risk management into its six core functions—Govern, Identify, Protect, Detect, Respond, and Recover—providing a structured methodology for assessing, prioritizing, and mitigating cyber risks. From evaluating threats and vulnerabilities to implementing effective risk treatment strategies, this episode highlights how businesses can enhance resilience while optimizing cybersecurity investments.</p><p>Beyond assessments, we discuss the importance of continuous risk monitoring, reassessment, and improvement to ensure security controls remain effective against emerging threats. We explore real-world examples of risk-based cybersecurity, such as access control measures, encryption strategies, and proactive incident response planning. Whether you’re refining your risk management program or looking to align cybersecurity efforts with business objectives, this episode provides actionable insights on strengthening your organization’s defenses through strategic, data-driven risk management. Tune in to learn how to anticipate, withstand, and recover from cyber threats with CSF 2.0’s risk-based approach.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0dbcd923/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Introduction to NIST 800-53</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Introduction to NIST 800-53</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fb66562b-5654-4e46-9b18-045f8e423f27</guid>
      <link>https://share.transistor.fm/s/3ea1281e</link>
      <description>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we take a deep dive into NIST 800-53, one of the most comprehensive security frameworks for implementing structured security and privacy controls. Originally developed for federal agencies and contractors, NIST 800-53 has evolved into a widely adopted framework for organizations seeking to build a resilient cybersecurity strategy. We break down how this framework provides a detailed catalog of controls across access management, risk assessment, incident response, and continuous monitoring—offering technical, operational, and administrative safeguards to strengthen cybersecurity defenses.</p><p>We also explore how NIST 800-53 aligns with risk management frameworks like NIST CSF and regulatory requirements such as FISMA, ISO 27001, and CMMC. By understanding its 20 control families, organizations can tailor security measures to meet compliance mandates while proactively mitigating cyber risks. Whether you're looking to enhance security governance, streamline compliance, or implement best-in-class security controls, this episode provides actionable insights into how NIST 800-53 can be leveraged for a scalable and adaptive cybersecurity program. Tune in to learn how to strengthen your security posture with one of the most widely recognized cybersecurity frameworks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we take a deep dive into NIST 800-53, one of the most comprehensive security frameworks for implementing structured security and privacy controls. Originally developed for federal agencies and contractors, NIST 800-53 has evolved into a widely adopted framework for organizations seeking to build a resilient cybersecurity strategy. We break down how this framework provides a detailed catalog of controls across access management, risk assessment, incident response, and continuous monitoring—offering technical, operational, and administrative safeguards to strengthen cybersecurity defenses.</p><p>We also explore how NIST 800-53 aligns with risk management frameworks like NIST CSF and regulatory requirements such as FISMA, ISO 27001, and CMMC. By understanding its 20 control families, organizations can tailor security measures to meet compliance mandates while proactively mitigating cyber risks. Whether you're looking to enhance security governance, streamline compliance, or implement best-in-class security controls, this episode provides actionable insights into how NIST 800-53 can be leveraged for a scalable and adaptive cybersecurity program. Tune in to learn how to strengthen your security posture with one of the most widely recognized cybersecurity frameworks.</p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Feb 2025 21:52:24 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ea1281e/2ddd9572.mp3" length="26249843" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1635</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Bare Metal Cyber Presents: Framework</em>, we take a deep dive into NIST 800-53, one of the most comprehensive security frameworks for implementing structured security and privacy controls. Originally developed for federal agencies and contractors, NIST 800-53 has evolved into a widely adopted framework for organizations seeking to build a resilient cybersecurity strategy. We break down how this framework provides a detailed catalog of controls across access management, risk assessment, incident response, and continuous monitoring—offering technical, operational, and administrative safeguards to strengthen cybersecurity defenses.</p><p>We also explore how NIST 800-53 aligns with risk management frameworks like NIST CSF and regulatory requirements such as FISMA, ISO 27001, and CMMC. By understanding its 20 control families, organizations can tailor security measures to meet compliance mandates while proactively mitigating cyber risks. Whether you're looking to enhance security governance, streamline compliance, or implement best-in-class security controls, this episode provides actionable insights into how NIST 800-53 can be leveraged for a scalable and adaptive cybersecurity program. Tune in to learn how to strengthen your security posture with one of the most widely recognized cybersecurity frameworks.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ea1281e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Introduction to NIST CSF Profiles</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Introduction to NIST CSF Profiles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b6c6cbfa-1fcb-48fa-8e0c-551e22e9a859</guid>
      <link>https://share.transistor.fm/s/330863f9</link>
      <description>
        <![CDATA[<p>Cybersecurity is not a one-size-fits-all approach, and that’s where N I S T C S F Profiles come in. In this episode, we break down how organizations can customize the N I S T Cybersecurity Framework to align with their unique security risks, industry regulations, and business priorities. We explore the role of Profiles in bridging the gap between cybersecurity best practices and operational realities, ensuring that organizations focus on security measures that deliver the greatest impact. Whether you’re in healthcare, finance, manufacturing, or small business operations, a tailored Profile provides a structured approach to cybersecurity that evolves with your business needs and emerging threats.</p><p>We’ll walk through the steps to developing and implementing a N I S T C S F Profile, highlighting real-world examples of how different industries apply the framework to protect assets, improve resilience, and meet compliance mandates. You’ll learn how organizations use Profiles to prioritize security controls, integrate cybersecurity into risk management workflows, and continuously refine their security strategies. Whether you’re building a cybersecurity program from scratch or looking to enhance your existing framework, this episode will provide actionable insights on how to create a security strategy that is both scalable and adaptable.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity is not a one-size-fits-all approach, and that’s where N I S T C S F Profiles come in. In this episode, we break down how organizations can customize the N I S T Cybersecurity Framework to align with their unique security risks, industry regulations, and business priorities. We explore the role of Profiles in bridging the gap between cybersecurity best practices and operational realities, ensuring that organizations focus on security measures that deliver the greatest impact. Whether you’re in healthcare, finance, manufacturing, or small business operations, a tailored Profile provides a structured approach to cybersecurity that evolves with your business needs and emerging threats.</p><p>We’ll walk through the steps to developing and implementing a N I S T C S F Profile, highlighting real-world examples of how different industries apply the framework to protect assets, improve resilience, and meet compliance mandates. You’ll learn how organizations use Profiles to prioritize security controls, integrate cybersecurity into risk management workflows, and continuously refine their security strategies. Whether you’re building a cybersecurity program from scratch or looking to enhance your existing framework, this episode will provide actionable insights on how to create a security strategy that is both scalable and adaptable.</p>]]>
      </content:encoded>
      <pubDate>Sun, 23 Feb 2025 23:03:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/330863f9/417d9aa6.mp3" length="21641431" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1347</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity is not a one-size-fits-all approach, and that’s where N I S T C S F Profiles come in. In this episode, we break down how organizations can customize the N I S T Cybersecurity Framework to align with their unique security risks, industry regulations, and business priorities. We explore the role of Profiles in bridging the gap between cybersecurity best practices and operational realities, ensuring that organizations focus on security measures that deliver the greatest impact. Whether you’re in healthcare, finance, manufacturing, or small business operations, a tailored Profile provides a structured approach to cybersecurity that evolves with your business needs and emerging threats.</p><p>We’ll walk through the steps to developing and implementing a N I S T C S F Profile, highlighting real-world examples of how different industries apply the framework to protect assets, improve resilience, and meet compliance mandates. You’ll learn how organizations use Profiles to prioritize security controls, integrate cybersecurity into risk management workflows, and continuously refine their security strategies. Whether you’re building a cybersecurity program from scratch or looking to enhance your existing framework, this episode will provide actionable insights on how to create a security strategy that is both scalable and adaptable.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/330863f9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>GV.OC-01 - Aligning Cybersecurity with Organizational Mission</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>GV.OC-01 - Aligning Cybersecurity with Organizational Mission</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e2ad756-fc83-430f-8b2d-2ad005dbbf0a</guid>
      <link>https://share.transistor.fm/s/43339667</link>
      <description>
        <![CDATA[<p>The GV.OC-01 subcategory emphasizes the importance of aligning an organization’s cybersecurity risk management efforts with its overarching mission. It ensures that leaders and stakeholders have a clear understanding of the mission—whether it’s delivering services, producing goods, or advancing research—so that cybersecurity strategies directly support these goals. By anchoring risk management to the mission, organizations can prioritize resources and efforts to protect what matters most, avoiding a one-size-fits-all approach.</p><p>This alignment helps identify risks that could derail mission-critical operations, such as data breaches or system downtime, and fosters a proactive stance toward cybersecurity. It encourages the dissemination of mission objectives across the organization, often through vision statements or strategic plans, to ensure all levels understand how their roles contribute to both mission success and security. Ultimately, GV.OC-01 establishes a foundational link between purpose and protection, guiding risk decisions with clarity and intent.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The GV.OC-01 subcategory emphasizes the importance of aligning an organization’s cybersecurity risk management efforts with its overarching mission. It ensures that leaders and stakeholders have a clear understanding of the mission—whether it’s delivering services, producing goods, or advancing research—so that cybersecurity strategies directly support these goals. By anchoring risk management to the mission, organizations can prioritize resources and efforts to protect what matters most, avoiding a one-size-fits-all approach.</p><p>This alignment helps identify risks that could derail mission-critical operations, such as data breaches or system downtime, and fosters a proactive stance toward cybersecurity. It encourages the dissemination of mission objectives across the organization, often through vision statements or strategic plans, to ensure all levels understand how their roles contribute to both mission success and security. Ultimately, GV.OC-01 establishes a foundational link between purpose and protection, guiding risk decisions with clarity and intent.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 21:58:22 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/43339667/edad4d3b.mp3" length="16762621" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1042</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The GV.OC-01 subcategory emphasizes the importance of aligning an organization’s cybersecurity risk management efforts with its overarching mission. It ensures that leaders and stakeholders have a clear understanding of the mission—whether it’s delivering services, producing goods, or advancing research—so that cybersecurity strategies directly support these goals. By anchoring risk management to the mission, organizations can prioritize resources and efforts to protect what matters most, avoiding a one-size-fits-all approach.</p><p>This alignment helps identify risks that could derail mission-critical operations, such as data breaches or system downtime, and fosters a proactive stance toward cybersecurity. It encourages the dissemination of mission objectives across the organization, often through vision statements or strategic plans, to ensure all levels understand how their roles contribute to both mission success and security. Ultimately, GV.OC-01 establishes a foundational link between purpose and protection, guiding risk decisions with clarity and intent.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/43339667/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.OC-02 - Understanding Stakeholder Needs in Cybersecurity </title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>GV.OC-02 - Understanding Stakeholder Needs in Cybersecurity </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9216ac17-efb6-40f9-8e3f-99e15611b507</guid>
      <link>https://share.transistor.fm/s/90c47f27</link>
      <description>
        <![CDATA[<p>GV.OC-02 focuses on identifying and comprehending the stakeholders—both within and outside the organization—who influence or are impacted by cybersecurity risk management. Internally, this includes employees, executives, and advisors with expectations around performance and culture, while externally, it involves customers, partners, regulators, and society, each with distinct needs like privacy or compliance. Recognizing these stakeholders ensures their perspectives shape risk management strategies effectively.</p><p>By considering stakeholder needs, organizations can tailor cybersecurity measures to meet diverse requirements, such as safeguarding customer data or adhering to regulatory standards. This subcategory promotes a holistic approach, fostering communication and collaboration to balance internal priorities with external obligations. It underscores that cybersecurity is not just a technical issue but a relational one, requiring ongoing engagement to maintain trust and alignment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.OC-02 focuses on identifying and comprehending the stakeholders—both within and outside the organization—who influence or are impacted by cybersecurity risk management. Internally, this includes employees, executives, and advisors with expectations around performance and culture, while externally, it involves customers, partners, regulators, and society, each with distinct needs like privacy or compliance. Recognizing these stakeholders ensures their perspectives shape risk management strategies effectively.</p><p>By considering stakeholder needs, organizations can tailor cybersecurity measures to meet diverse requirements, such as safeguarding customer data or adhering to regulatory standards. This subcategory promotes a holistic approach, fostering communication and collaboration to balance internal priorities with external obligations. It underscores that cybersecurity is not just a technical issue but a relational one, requiring ongoing engagement to maintain trust and alignment.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 21:59:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/90c47f27/8c08ea53.mp3" length="16999185" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1057</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.OC-02 focuses on identifying and comprehending the stakeholders—both within and outside the organization—who influence or are impacted by cybersecurity risk management. Internally, this includes employees, executives, and advisors with expectations around performance and culture, while externally, it involves customers, partners, regulators, and society, each with distinct needs like privacy or compliance. Recognizing these stakeholders ensures their perspectives shape risk management strategies effectively.</p><p>By considering stakeholder needs, organizations can tailor cybersecurity measures to meet diverse requirements, such as safeguarding customer data or adhering to regulatory standards. This subcategory promotes a holistic approach, fostering communication and collaboration to balance internal priorities with external obligations. It underscores that cybersecurity is not just a technical issue but a relational one, requiring ongoing engagement to maintain trust and alignment.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/90c47f27/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.OC-03 - Navigating Legal and Regulatory Cybersecurity Requirements</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>GV.OC-03 - Navigating Legal and Regulatory Cybersecurity Requirements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">25cbfbed-40dc-4352-b5b9-0cde1ce0bce3</guid>
      <link>https://share.transistor.fm/s/bc7029ec</link>
      <description>
        <![CDATA[<p>GV.OC-03 addresses the need for organizations to fully grasp and manage the legal, regulatory, and contractual obligations that govern their cybersecurity practices. This includes compliance with laws like the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA), as well as contractual commitments to protect supplier or customer data. It ensures organizations stay ahead of mandatory requirements while safeguarding privacy and civil liberties.</p><p>Effective management under this subcategory involves establishing processes to track these obligations and integrating them into the broader cybersecurity strategy. It requires diligence to adapt to evolving legal landscapes and contractual terms, ensuring that policies and practices remain compliant and defensible. GV.OC-03 highlights the intersection of cybersecurity with governance, making it a critical component for avoiding penalties and maintaining operational integrity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.OC-03 addresses the need for organizations to fully grasp and manage the legal, regulatory, and contractual obligations that govern their cybersecurity practices. This includes compliance with laws like the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA), as well as contractual commitments to protect supplier or customer data. It ensures organizations stay ahead of mandatory requirements while safeguarding privacy and civil liberties.</p><p>Effective management under this subcategory involves establishing processes to track these obligations and integrating them into the broader cybersecurity strategy. It requires diligence to adapt to evolving legal landscapes and contractual terms, ensuring that policies and practices remain compliant and defensible. GV.OC-03 highlights the intersection of cybersecurity with governance, making it a critical component for avoiding penalties and maintaining operational integrity.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 21:59:35 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bc7029ec/31b4a51b.mp3" length="17639091" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1097</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.OC-03 addresses the need for organizations to fully grasp and manage the legal, regulatory, and contractual obligations that govern their cybersecurity practices. This includes compliance with laws like the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA), as well as contractual commitments to protect supplier or customer data. It ensures organizations stay ahead of mandatory requirements while safeguarding privacy and civil liberties.</p><p>Effective management under this subcategory involves establishing processes to track these obligations and integrating them into the broader cybersecurity strategy. It requires diligence to adapt to evolving legal landscapes and contractual terms, ensuring that policies and practices remain compliant and defensible. GV.OC-03 highlights the intersection of cybersecurity with governance, making it a critical component for avoiding penalties and maintaining operational integrity.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bc7029ec/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.OC-04 - Prioritizing Critical Objectives and Services </title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>GV.OC-04 - Prioritizing Critical Objectives and Services </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">97e98b4a-0b53-448d-83f7-2d5054620664</guid>
      <link>https://share.transistor.fm/s/97f2da6d</link>
      <description>
        <![CDATA[<p>GV.OC-04 centers on identifying and communicating the critical objectives, capabilities, and services that stakeholders rely on, ensuring they are prioritized in cybersecurity efforts. This involves understanding what internal and external parties—such as employees, customers, or partners—view as essential, like uninterrupted service delivery or secure data handling. Clear communication of these priorities helps align cybersecurity measures with stakeholder expectations.</p><p>This subcategory drives organizations to assess the potential impact of disruptions and establish resilience goals, such as recovery time objectives, to maintain these critical elements under various conditions. It fosters a shared understanding across the organization, enabling better resource allocation and risk mitigation planning. GV.OC-04 ensures that cybersecurity supports what stakeholders value most, reinforcing trust and reliability.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.OC-04 centers on identifying and communicating the critical objectives, capabilities, and services that stakeholders rely on, ensuring they are prioritized in cybersecurity efforts. This involves understanding what internal and external parties—such as employees, customers, or partners—view as essential, like uninterrupted service delivery or secure data handling. Clear communication of these priorities helps align cybersecurity measures with stakeholder expectations.</p><p>This subcategory drives organizations to assess the potential impact of disruptions and establish resilience goals, such as recovery time objectives, to maintain these critical elements under various conditions. It fosters a shared understanding across the organization, enabling better resource allocation and risk mitigation planning. GV.OC-04 ensures that cybersecurity supports what stakeholders value most, reinforcing trust and reliability.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:00:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/97f2da6d/20031846.mp3" length="17737717" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1103</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.OC-04 centers on identifying and communicating the critical objectives, capabilities, and services that stakeholders rely on, ensuring they are prioritized in cybersecurity efforts. This involves understanding what internal and external parties—such as employees, customers, or partners—view as essential, like uninterrupted service delivery or secure data handling. Clear communication of these priorities helps align cybersecurity measures with stakeholder expectations.</p><p>This subcategory drives organizations to assess the potential impact of disruptions and establish resilience goals, such as recovery time objectives, to maintain these critical elements under various conditions. It fosters a shared understanding across the organization, enabling better resource allocation and risk mitigation planning. GV.OC-04 ensures that cybersecurity supports what stakeholders value most, reinforcing trust and reliability.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/97f2da6d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.OC-05 - Mapping Organizational Dependencies</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>GV.OC-05 - Mapping Organizational Dependencies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92c2f7d9-dab7-4f80-9cda-a0c36f7c7e97</guid>
      <link>https://share.transistor.fm/s/72957d4a</link>
      <description>
        <![CDATA[<p>GV.OC-05 focuses on recognizing and sharing knowledge about the external outcomes, capabilities, and services the organization relies upon to function effectively. This includes dependencies on third-party providers, such as cloud hosting or facility management, which could become points of failure if disrupted. By documenting and communicating these dependencies, organizations can better prepare for risks that originate beyond their direct control.</p><p>Understanding these external factors allows organizations to map their reliance on critical resources and integrate this insight into risk management plans. It promotes proactive measures, like contingency planning, to mitigate the impact of supplier failures or service interruptions. GV.OC-05 strengthens resilience by ensuring that external dependencies are not overlooked in cybersecurity strategies.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.OC-05 focuses on recognizing and sharing knowledge about the external outcomes, capabilities, and services the organization relies upon to function effectively. This includes dependencies on third-party providers, such as cloud hosting or facility management, which could become points of failure if disrupted. By documenting and communicating these dependencies, organizations can better prepare for risks that originate beyond their direct control.</p><p>Understanding these external factors allows organizations to map their reliance on critical resources and integrate this insight into risk management plans. It promotes proactive measures, like contingency planning, to mitigate the impact of supplier failures or service interruptions. GV.OC-05 strengthens resilience by ensuring that external dependencies are not overlooked in cybersecurity strategies.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:00:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/72957d4a/4d574bdd.mp3" length="18849059" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1172</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.OC-05 focuses on recognizing and sharing knowledge about the external outcomes, capabilities, and services the organization relies upon to function effectively. This includes dependencies on third-party providers, such as cloud hosting or facility management, which could become points of failure if disrupted. By documenting and communicating these dependencies, organizations can better prepare for risks that originate beyond their direct control.</p><p>Understanding these external factors allows organizations to map their reliance on critical resources and integrate this insight into risk management plans. It promotes proactive measures, like contingency planning, to mitigate the impact of supplier failures or service interruptions. GV.OC-05 strengthens resilience by ensuring that external dependencies are not overlooked in cybersecurity strategies.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/72957d4a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RM-01 - Setting Cybersecurity Risk Management Goals</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>GV.RM-01 - Setting Cybersecurity Risk Management Goals</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0d12cf9a-ce8a-46a7-b67e-0b8a076c6c26</guid>
      <link>https://share.transistor.fm/s/e96670e6</link>
      <description>
        <![CDATA[<p>GV.RM-01 involves setting clear, agreed-upon objectives for managing cybersecurity risks across the organization, ensuring alignment among stakeholders like leadership and operational teams. These objectives, which might include improving user training or protecting critical systems, provide measurable targets to guide risk management efforts. Stakeholder consensus ensures that these goals reflect organizational priorities and resource realities.</p><p>This subcategory establishes a structured approach to risk management by integrating objectives into strategic planning and performance evaluation. It encourages regular updates to reflect changes in the organization or its risk environment, keeping cybersecurity efforts relevant and effective. GV.RM-01 lays the groundwork for a unified, goal-driven approach to mitigating cyber threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RM-01 involves setting clear, agreed-upon objectives for managing cybersecurity risks across the organization, ensuring alignment among stakeholders like leadership and operational teams. These objectives, which might include improving user training or protecting critical systems, provide measurable targets to guide risk management efforts. Stakeholder consensus ensures that these goals reflect organizational priorities and resource realities.</p><p>This subcategory establishes a structured approach to risk management by integrating objectives into strategic planning and performance evaluation. It encourages regular updates to reflect changes in the organization or its risk environment, keeping cybersecurity efforts relevant and effective. GV.RM-01 lays the groundwork for a unified, goal-driven approach to mitigating cyber threats.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:02:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e96670e6/061573e1.mp3" length="17790795" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1106</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RM-01 involves setting clear, agreed-upon objectives for managing cybersecurity risks across the organization, ensuring alignment among stakeholders like leadership and operational teams. These objectives, which might include improving user training or protecting critical systems, provide measurable targets to guide risk management efforts. Stakeholder consensus ensures that these goals reflect organizational priorities and resource realities.</p><p>This subcategory establishes a structured approach to risk management by integrating objectives into strategic planning and performance evaluation. It encourages regular updates to reflect changes in the organization or its risk environment, keeping cybersecurity efforts relevant and effective. GV.RM-01 lays the groundwork for a unified, goal-driven approach to mitigating cyber threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e96670e6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RM-02 - Defining Risk Appetite and Tolerance  </title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>GV.RM-02 - Defining Risk Appetite and Tolerance  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4a06366c-c6b7-49f3-89e6-a4e35ed6808f</guid>
      <link>https://share.transistor.fm/s/86605da8</link>
      <description>
        <![CDATA[<p>GV.RM-02 requires organizations to define and communicate their risk appetite—the level of risk they are willing to accept—and translate it into specific, measurable risk tolerance statements. This clarity helps stakeholders understand acceptable risk thresholds, ensuring decisions align with strategic goals, such as innovation or stability. Regular maintenance of these statements keeps them relevant as risks evolve.</p><p>By establishing these boundaries, organizations can make informed choices about where to invest resources or accept residual risks, fostering consistency in risk management practices. It promotes transparency, enabling all levels of the organization to operate within agreed-upon limits. GV.RM-02 provides a critical framework for balancing risk and reward in cybersecurity efforts.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RM-02 requires organizations to define and communicate their risk appetite—the level of risk they are willing to accept—and translate it into specific, measurable risk tolerance statements. This clarity helps stakeholders understand acceptable risk thresholds, ensuring decisions align with strategic goals, such as innovation or stability. Regular maintenance of these statements keeps them relevant as risks evolve.</p><p>By establishing these boundaries, organizations can make informed choices about where to invest resources or accept residual risks, fostering consistency in risk management practices. It promotes transparency, enabling all levels of the organization to operate within agreed-upon limits. GV.RM-02 provides a critical framework for balancing risk and reward in cybersecurity efforts.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:03:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/86605da8/a5e8ad8b.mp3" length="18100915" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1126</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RM-02 requires organizations to define and communicate their risk appetite—the level of risk they are willing to accept—and translate it into specific, measurable risk tolerance statements. This clarity helps stakeholders understand acceptable risk thresholds, ensuring decisions align with strategic goals, such as innovation or stability. Regular maintenance of these statements keeps them relevant as risks evolve.</p><p>By establishing these boundaries, organizations can make informed choices about where to invest resources or accept residual risks, fostering consistency in risk management practices. It promotes transparency, enabling all levels of the organization to operate within agreed-upon limits. GV.RM-02 provides a critical framework for balancing risk and reward in cybersecurity efforts.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/86605da8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RM-03 - Integrating Cybersecurity into Enterprise Risk Management  </title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>GV.RM-03 - Integrating Cybersecurity into Enterprise Risk Management  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60c220df-a535-4e7e-8715-064001f5bc05</guid>
      <link>https://share.transistor.fm/s/a972815e</link>
      <description>
        <![CDATA[<p>GV.RM-03 integrates cybersecurity risk management into the broader enterprise risk management (ERM) framework, ensuring it is considered alongside other risks like financial or operational challenges. This holistic approach allows organizations to aggregate and prioritize cybersecurity risks within the context of overall business objectives. It fosters collaboration between cybersecurity teams and enterprise risk managers to align efforts.</p><p>Incorporating cybersecurity into ERM enables better escalation of significant risks to senior leadership, ensuring timely responses and resource allocation. It also establishes criteria for when cybersecurity issues warrant broader attention, enhancing organizational resilience. GV.RM-03 bridges technical and strategic perspectives, embedding cybersecurity into the fabric of enterprise governance.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RM-03 integrates cybersecurity risk management into the broader enterprise risk management (ERM) framework, ensuring it is considered alongside other risks like financial or operational challenges. This holistic approach allows organizations to aggregate and prioritize cybersecurity risks within the context of overall business objectives. It fosters collaboration between cybersecurity teams and enterprise risk managers to align efforts.</p><p>Incorporating cybersecurity into ERM enables better escalation of significant risks to senior leadership, ensuring timely responses and resource allocation. It also establishes criteria for when cybersecurity issues warrant broader attention, enhancing organizational resilience. GV.RM-03 bridges technical and strategic perspectives, embedding cybersecurity into the fabric of enterprise governance.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:03:32 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a972815e/d619c3c8.mp3" length="18263105" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1136</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RM-03 integrates cybersecurity risk management into the broader enterprise risk management (ERM) framework, ensuring it is considered alongside other risks like financial or operational challenges. This holistic approach allows organizations to aggregate and prioritize cybersecurity risks within the context of overall business objectives. It fosters collaboration between cybersecurity teams and enterprise risk managers to align efforts.</p><p>Incorporating cybersecurity into ERM enables better escalation of significant risks to senior leadership, ensuring timely responses and resource allocation. It also establishes criteria for when cybersecurity issues warrant broader attention, enhancing organizational resilience. GV.RM-03 bridges technical and strategic perspectives, embedding cybersecurity into the fabric of enterprise governance.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a972815e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RM-04 - Crafting Strategic Risk Response Options </title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>GV.RM-04 - Crafting Strategic Risk Response Options </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">da6ef2dc-a693-49fe-b808-fb77a570a6ac</guid>
      <link>https://share.transistor.fm/s/e04d7ad8</link>
      <description>
        <![CDATA[<p>GV.RM-04 focuses on defining and sharing a strategic direction for responding to cybersecurity risks, outlining options like acceptance, mitigation, or transfer (e.g., via insurance). This guidance helps organizations decide how to address risks based on data classification, criticality, or operational needs, ensuring consistency in decision-making. Clear communication ensures all stakeholders understand the chosen approaches.</p><p>This subcategory supports proactive planning by identifying conditions under which certain responses, such as outsourcing or shared responsibility models, are viable. It aligns risk responses with organizational priorities, balancing cost, feasibility, and security needs. GV.RM-04 empowers organizations to respond strategically rather than reactively to cyber threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RM-04 focuses on defining and sharing a strategic direction for responding to cybersecurity risks, outlining options like acceptance, mitigation, or transfer (e.g., via insurance). This guidance helps organizations decide how to address risks based on data classification, criticality, or operational needs, ensuring consistency in decision-making. Clear communication ensures all stakeholders understand the chosen approaches.</p><p>This subcategory supports proactive planning by identifying conditions under which certain responses, such as outsourcing or shared responsibility models, are viable. It aligns risk responses with organizational priorities, balancing cost, feasibility, and security needs. GV.RM-04 empowers organizations to respond strategically rather than reactively to cyber threats.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:04:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e04d7ad8/5144d101.mp3" length="18212932" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1133</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RM-04 focuses on defining and sharing a strategic direction for responding to cybersecurity risks, outlining options like acceptance, mitigation, or transfer (e.g., via insurance). This guidance helps organizations decide how to address risks based on data classification, criticality, or operational needs, ensuring consistency in decision-making. Clear communication ensures all stakeholders understand the chosen approaches.</p><p>This subcategory supports proactive planning by identifying conditions under which certain responses, such as outsourcing or shared responsibility models, are viable. It aligns risk responses with organizational priorities, balancing cost, feasibility, and security needs. GV.RM-04 empowers organizations to respond strategically rather than reactively to cyber threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e04d7ad8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RM-05 - Building Communication Channels for Cybersecurity Risks </title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>GV.RM-05 - Building Communication Channels for Cybersecurity Risks </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8684dd3-d631-49c6-9fdd-4be7c543ab8d</guid>
      <link>https://share.transistor.fm/s/dd2ace71</link>
      <description>
        <![CDATA[<p>GV.RM-05 emphasizes creating structured communication channels to share cybersecurity risk information across departments and with external parties like suppliers. This ensures that senior executives, operational teams, and third-party partners stay informed about the organization’s cybersecurity posture and emerging risks. Effective communication reduces silos and enhances collective awareness.</p><p>By including third-party risks, this subcategory addresses the interconnected nature of modern operations, where supplier vulnerabilities can impact the organization. It supports timely updates and coordination, enabling rapid responses to threats. GV.RM-05 fosters a collaborative environment where risk information flows freely, strengthening overall security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RM-05 emphasizes creating structured communication channels to share cybersecurity risk information across departments and with external parties like suppliers. This ensures that senior executives, operational teams, and third-party partners stay informed about the organization’s cybersecurity posture and emerging risks. Effective communication reduces silos and enhances collective awareness.</p><p>By including third-party risks, this subcategory addresses the interconnected nature of modern operations, where supplier vulnerabilities can impact the organization. It supports timely updates and coordination, enabling rapid responses to threats. GV.RM-05 fosters a collaborative environment where risk information flows freely, strengthening overall security.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:04:43 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dd2ace71/6c9051f1.mp3" length="19665773" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1223</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RM-05 emphasizes creating structured communication channels to share cybersecurity risk information across departments and with external parties like suppliers. This ensures that senior executives, operational teams, and third-party partners stay informed about the organization’s cybersecurity posture and emerging risks. Effective communication reduces silos and enhances collective awareness.</p><p>By including third-party risks, this subcategory addresses the interconnected nature of modern operations, where supplier vulnerabilities can impact the organization. It supports timely updates and coordination, enabling rapid responses to threats. GV.RM-05 fosters a collaborative environment where risk information flows freely, strengthening overall security.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dd2ace71/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RM-06 - Standardizing Cybersecurity Risk Assessment</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>GV.RM-06 - Standardizing Cybersecurity Risk Assessment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b9622e6-778f-4e34-ad6c-a91ba4acf068</guid>
      <link>https://share.transistor.fm/s/564c90d9</link>
      <description>
        <![CDATA[<p>GV.RM-06 establishes a consistent methodology for assessing and prioritizing cybersecurity risks, using tools like risk registers or quantitative formulas. This standardized approach ensures risks are documented, categorized (e.g., by severity or type), and ranked in a way that is clear and repeatable across the organization. Communication of this method ensures all stakeholders can interpret and act on risk data uniformly.</p><p>This subcategory enables organizations to compare and aggregate risks effectively, supporting informed decision-making and resource allocation. It provides a structured framework to track risk exposure and treatment plans, reducing ambiguity in risk management. GV.RM-06 enhances transparency and accountability in addressing cybersecurity challenges.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RM-06 establishes a consistent methodology for assessing and prioritizing cybersecurity risks, using tools like risk registers or quantitative formulas. This standardized approach ensures risks are documented, categorized (e.g., by severity or type), and ranked in a way that is clear and repeatable across the organization. Communication of this method ensures all stakeholders can interpret and act on risk data uniformly.</p><p>This subcategory enables organizations to compare and aggregate risks effectively, supporting informed decision-making and resource allocation. It provides a structured framework to track risk exposure and treatment plans, reducing ambiguity in risk management. GV.RM-06 enhances transparency and accountability in addressing cybersecurity challenges.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:05:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/564c90d9/0b6903da.mp3" length="19478514" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1212</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RM-06 establishes a consistent methodology for assessing and prioritizing cybersecurity risks, using tools like risk registers or quantitative formulas. This standardized approach ensures risks are documented, categorized (e.g., by severity or type), and ranked in a way that is clear and repeatable across the organization. Communication of this method ensures all stakeholders can interpret and act on risk data uniformly.</p><p>This subcategory enables organizations to compare and aggregate risks effectively, supporting informed decision-making and resource allocation. It provides a structured framework to track risk exposure and treatment plans, reducing ambiguity in risk management. GV.RM-06 enhances transparency and accountability in addressing cybersecurity challenges.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/564c90d9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RM-07 - Embracing Strategic Opportunities in Risk Management</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>GV.RM-07 - Embracing Strategic Opportunities in Risk Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f88dbd44-b57c-4da6-bbe6-7988fbbb84a3</guid>
      <link>https://share.transistor.fm/s/c7e49a60</link>
      <description>
        <![CDATA[<p>GV.RM-07 recognizes that not all risks are negative, encouraging organizations to identify and discuss strategic opportunities, or “positive risks,” alongside threats. These might include adopting new technologies or expanding services, which could enhance capabilities despite introducing risks. Including these in risk discussions ensures a balanced perspective that considers potential benefits.</p><p>This subcategory promotes methods like SWOT analysis to characterize opportunities and integrate them into risk planning, prioritizing them alongside threats. It fosters innovation by encouraging calculated risk-taking within a cybersecurity context. GV.RM-07 broadens the scope of risk management to support organizational growth and resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RM-07 recognizes that not all risks are negative, encouraging organizations to identify and discuss strategic opportunities, or “positive risks,” alongside threats. These might include adopting new technologies or expanding services, which could enhance capabilities despite introducing risks. Including these in risk discussions ensures a balanced perspective that considers potential benefits.</p><p>This subcategory promotes methods like SWOT analysis to characterize opportunities and integrate them into risk planning, prioritizing them alongside threats. It fosters innovation by encouraging calculated risk-taking within a cybersecurity context. GV.RM-07 broadens the scope of risk management to support organizational growth and resilience.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:05:58 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c7e49a60/89d9dea3.mp3" length="20338683" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1266</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RM-07 recognizes that not all risks are negative, encouraging organizations to identify and discuss strategic opportunities, or “positive risks,” alongside threats. These might include adopting new technologies or expanding services, which could enhance capabilities despite introducing risks. Including these in risk discussions ensures a balanced perspective that considers potential benefits.</p><p>This subcategory promotes methods like SWOT analysis to characterize opportunities and integrate them into risk planning, prioritizing them alongside threats. It fosters innovation by encouraging calculated risk-taking within a cybersecurity context. GV.RM-07 broadens the scope of risk management to support organizational growth and resilience.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c7e49a60/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RR-01 - Leadership’s Role in Cybersecurity Accountability</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>GV.RR-01 - Leadership’s Role in Cybersecurity Accountability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">89a4f9b2-de70-4512-bac1-5e2bb51a9a89</guid>
      <link>https://share.transistor.fm/s/b873c19b</link>
      <description>
        <![CDATA[<p>GV.RR-01 assigns responsibility to leadership for overseeing cybersecurity risk, ensuring they are accountable for strategy development and execution. It emphasizes fostering a risk-aware, ethical culture where security is a shared priority, reinforced through visible leadership commitment. This cultural focus drives continuous improvement in cybersecurity practices.</p><p>Leaders under this subcategory set the tone by directing comprehensive risk strategies and ensuring adequate coordination among teams. Their accountability ensures that cybersecurity aligns with organizational goals, while their influence shapes a proactive, ethical approach to risk management. GV.RR-01 establishes leadership as the cornerstone of a strong security posture.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RR-01 assigns responsibility to leadership for overseeing cybersecurity risk, ensuring they are accountable for strategy development and execution. It emphasizes fostering a risk-aware, ethical culture where security is a shared priority, reinforced through visible leadership commitment. This cultural focus drives continuous improvement in cybersecurity practices.</p><p>Leaders under this subcategory set the tone by directing comprehensive risk strategies and ensuring adequate coordination among teams. Their accountability ensures that cybersecurity aligns with organizational goals, while their influence shapes a proactive, ethical approach to risk management. GV.RR-01 establishes leadership as the cornerstone of a strong security posture.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:06:38 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b873c19b/42e2e944.mp3" length="19622360" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1221</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RR-01 assigns responsibility to leadership for overseeing cybersecurity risk, ensuring they are accountable for strategy development and execution. It emphasizes fostering a risk-aware, ethical culture where security is a shared priority, reinforced through visible leadership commitment. This cultural focus drives continuous improvement in cybersecurity practices.</p><p>Leaders under this subcategory set the tone by directing comprehensive risk strategies and ensuring adequate coordination among teams. Their accountability ensures that cybersecurity aligns with organizational goals, while their influence shapes a proactive, ethical approach to risk management. GV.RR-01 establishes leadership as the cornerstone of a strong security posture.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b873c19b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RR-02 - Clarifying Cybersecurity Roles and Responsibilities </title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>GV.RR-02 - Clarifying Cybersecurity Roles and Responsibilities </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d48cb09-bbcb-4418-a28f-20328c47b444</guid>
      <link>https://share.transistor.fm/s/8980c447</link>
      <description>
        <![CDATA[<p>GV.RR-02 focuses on defining and disseminating clear roles, responsibilities, and authorities for cybersecurity risk management across the organization. This clarity ensures that individuals and teams know their specific duties—whether strategic, operational, or auditing—and have the authority to act. Enforcement mechanisms ensure accountability and adherence to these roles.</p><p>By documenting and communicating these expectations, often through policies or job descriptions, organizations reduce confusion and overlap in risk management efforts. This subcategory promotes a structured, transparent approach where responsibilities are understood and upheld at all levels. GV.RR-02 strengthens the operational framework for managing cybersecurity risks effectively.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RR-02 focuses on defining and disseminating clear roles, responsibilities, and authorities for cybersecurity risk management across the organization. This clarity ensures that individuals and teams know their specific duties—whether strategic, operational, or auditing—and have the authority to act. Enforcement mechanisms ensure accountability and adherence to these roles.</p><p>By documenting and communicating these expectations, often through policies or job descriptions, organizations reduce confusion and overlap in risk management efforts. This subcategory promotes a structured, transparent approach where responsibilities are understood and upheld at all levels. GV.RR-02 strengthens the operational framework for managing cybersecurity risks effectively.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:07:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8980c447/98948bf1.mp3" length="19078954" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1187</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RR-02 focuses on defining and disseminating clear roles, responsibilities, and authorities for cybersecurity risk management across the organization. This clarity ensures that individuals and teams know their specific duties—whether strategic, operational, or auditing—and have the authority to act. Enforcement mechanisms ensure accountability and adherence to these roles.</p><p>By documenting and communicating these expectations, often through policies or job descriptions, organizations reduce confusion and overlap in risk management efforts. This subcategory promotes a structured, transparent approach where responsibilities are understood and upheld at all levels. GV.RR-02 strengthens the operational framework for managing cybersecurity risks effectively.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8980c447/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RR-03 - Allocating Resources for Cybersecurity Success</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>GV.RR-03 - Allocating Resources for Cybersecurity Success</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">08ce4085-a46c-4cf5-b421-4552773fcd10</guid>
      <link>https://share.transistor.fm/s/5582c719</link>
      <description>
        <![CDATA[<p>GV.RR-03 ensures that sufficient resources—people, processes, and technology—are allocated to support the organization’s cybersecurity risk strategy and assigned roles. This involves regular reviews to confirm that resource levels match the risk tolerance and response plans, avoiding gaps in capability. Adequate resourcing enables effective execution of security measures.</p><p>This subcategory aligns investments with strategic priorities, ensuring that those tasked with managing risks have the tools and authority needed to succeed. It fosters a practical approach to balancing risk and resource constraints, optimizing protection efforts. GV.RR-03 underscores the importance of backing policies with tangible support.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RR-03 ensures that sufficient resources—people, processes, and technology—are allocated to support the organization’s cybersecurity risk strategy and assigned roles. This involves regular reviews to confirm that resource levels match the risk tolerance and response plans, avoiding gaps in capability. Adequate resourcing enables effective execution of security measures.</p><p>This subcategory aligns investments with strategic priorities, ensuring that those tasked with managing risks have the tools and authority needed to succeed. It fosters a practical approach to balancing risk and resource constraints, optimizing protection efforts. GV.RR-03 underscores the importance of backing policies with tangible support.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:07:58 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5582c719/f4f5e9ef.mp3" length="18997446" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1182</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RR-03 ensures that sufficient resources—people, processes, and technology—are allocated to support the organization’s cybersecurity risk strategy and assigned roles. This involves regular reviews to confirm that resource levels match the risk tolerance and response plans, avoiding gaps in capability. Adequate resourcing enables effective execution of security measures.</p><p>This subcategory aligns investments with strategic priorities, ensuring that those tasked with managing risks have the tools and authority needed to succeed. It fosters a practical approach to balancing risk and resource constraints, optimizing protection efforts. GV.RR-03 underscores the importance of backing policies with tangible support.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5582c719/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.RR-04 - Embedding Cybersecurity in HR Practices </title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>GV.RR-04 - Embedding Cybersecurity in HR Practices </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6f6d46a-636e-43db-b4d8-0d8bc46b3ff6</guid>
      <link>https://share.transistor.fm/s/bac85798</link>
      <description>
        <![CDATA[<p>GV.RR-04 integrates cybersecurity considerations into human resources processes, such as hiring, onboarding, training, and offboarding, to enhance organizational security. This includes screening for cybersecurity knowledge, enforcing policy adherence, and ensuring departing employees’ access is revoked promptly. It embeds security awareness into the employee lifecycle.</p><p>By prioritizing cybersecurity in HR practices, organizations build a workforce equipped to support risk management goals, from basic awareness to specialized skills. Regular background checks and training reinforce a security-conscious culture, reducing insider risks. GV.RR-04 ties human capital management to cybersecurity resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.RR-04 integrates cybersecurity considerations into human resources processes, such as hiring, onboarding, training, and offboarding, to enhance organizational security. This includes screening for cybersecurity knowledge, enforcing policy adherence, and ensuring departing employees’ access is revoked promptly. It embeds security awareness into the employee lifecycle.</p><p>By prioritizing cybersecurity in HR practices, organizations build a workforce equipped to support risk management goals, from basic awareness to specialized skills. Regular background checks and training reinforce a security-conscious culture, reducing insider risks. GV.RR-04 ties human capital management to cybersecurity resilience.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:08:38 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bac85798/971a875f.mp3" length="19474331" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1212</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.RR-04 integrates cybersecurity considerations into human resources processes, such as hiring, onboarding, training, and offboarding, to enhance organizational security. This includes screening for cybersecurity knowledge, enforcing policy adherence, and ensuring departing employees’ access is revoked promptly. It embeds security awareness into the employee lifecycle.</p><p>By prioritizing cybersecurity in HR practices, organizations build a workforce equipped to support risk management goals, from basic awareness to specialized skills. Regular background checks and training reinforce a security-conscious culture, reducing insider risks. GV.RR-04 ties human capital management to cybersecurity resilience.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bac85798/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.PO-01 - Establishing a Cybersecurity Risk Management Policy </title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>GV.PO-01 - Establishing a Cybersecurity Risk Management Policy </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">535def5b-4b8f-47c5-88b7-feff4765fd05</guid>
      <link>https://share.transistor.fm/s/bd6489a3</link>
      <description>
        <![CDATA[<p>GV.PO-01 involves creating a formal cybersecurity risk management policy that reflects the organization’s unique context, strategy, and priorities. This policy outlines management’s intent and expectations, providing a clear framework for security practices that is communicated across all levels. Enforcement ensures that the policy translates into actionable, consistent behavior.</p><p>This subcategory establishes a foundation for aligning cybersecurity efforts with organizational goals, requiring senior management approval to lend it authority. Regular dissemination and acknowledgment by personnel reinforce its importance and applicability. GV.PO-01 serves as a cornerstone for governance, guiding risk management with a unified approach.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.PO-01 involves creating a formal cybersecurity risk management policy that reflects the organization’s unique context, strategy, and priorities. This policy outlines management’s intent and expectations, providing a clear framework for security practices that is communicated across all levels. Enforcement ensures that the policy translates into actionable, consistent behavior.</p><p>This subcategory establishes a foundation for aligning cybersecurity efforts with organizational goals, requiring senior management approval to lend it authority. Regular dissemination and acknowledgment by personnel reinforce its importance and applicability. GV.PO-01 serves as a cornerstone for governance, guiding risk management with a unified approach.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:09:19 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bd6489a3/c3f7f35e.mp3" length="19097344" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1188</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.PO-01 involves creating a formal cybersecurity risk management policy that reflects the organization’s unique context, strategy, and priorities. This policy outlines management’s intent and expectations, providing a clear framework for security practices that is communicated across all levels. Enforcement ensures that the policy translates into actionable, consistent behavior.</p><p>This subcategory establishes a foundation for aligning cybersecurity efforts with organizational goals, requiring senior management approval to lend it authority. Regular dissemination and acknowledgment by personnel reinforce its importance and applicability. GV.PO-01 serves as a cornerstone for governance, guiding risk management with a unified approach.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bd6489a3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.PO-02 - Keeping Cybersecurity Policies Current</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>GV.PO-02 - Keeping Cybersecurity Policies Current</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7e12c1ce-c4aa-4d7a-8365-97392bc866f8</guid>
      <link>https://share.transistor.fm/s/67958b38</link>
      <description>
        <![CDATA[<p>GV.PO-02 ensures that the cybersecurity risk management policy remains dynamic, undergoing regular reviews to adapt to evolving threats, technologies, legal requirements, or mission shifts. Updates are communicated to keep stakeholders informed and ensure ongoing relevance, while enforcement maintains compliance. This adaptability keeps the policy effective over time.</p><p>This subcategory promotes a proactive stance by setting timelines for policy reassessment and incorporating feedback from risk management outcomes. It addresses changes like new regulations or AI adoption, ensuring the policy supports current needs. GV.PO-02 sustains a living policy framework that evolves with the organization’s risk landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.PO-02 ensures that the cybersecurity risk management policy remains dynamic, undergoing regular reviews to adapt to evolving threats, technologies, legal requirements, or mission shifts. Updates are communicated to keep stakeholders informed and ensure ongoing relevance, while enforcement maintains compliance. This adaptability keeps the policy effective over time.</p><p>This subcategory promotes a proactive stance by setting timelines for policy reassessment and incorporating feedback from risk management outcomes. It addresses changes like new regulations or AI adoption, ensuring the policy supports current needs. GV.PO-02 sustains a living policy framework that evolves with the organization’s risk landscape.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:09:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/67958b38/cf578728.mp3" length="18846137" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1172</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.PO-02 ensures that the cybersecurity risk management policy remains dynamic, undergoing regular reviews to adapt to evolving threats, technologies, legal requirements, or mission shifts. Updates are communicated to keep stakeholders informed and ensure ongoing relevance, while enforcement maintains compliance. This adaptability keeps the policy effective over time.</p><p>This subcategory promotes a proactive stance by setting timelines for policy reassessment and incorporating feedback from risk management outcomes. It addresses changes like new regulations or AI adoption, ensuring the policy supports current needs. GV.PO-02 sustains a living policy framework that evolves with the organization’s risk landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/67958b38/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.OV-01 - Reviewing Cybersecurity Strategy Outcomes</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>GV.OV-01 - Reviewing Cybersecurity Strategy Outcomes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17a900a8-3a63-4f22-a289-72dadec71aec</guid>
      <link>https://share.transistor.fm/s/4b60451e</link>
      <description>
        <![CDATA[<p>GV.OV-01 focuses on evaluating the outcomes of the cybersecurity risk management strategy to refine its direction and effectiveness. This involves measuring how well the strategy supports decision-making and organizational objectives, identifying successes or shortcomings. Adjustments based on these reviews ensure the strategy remains aligned with goals.</p><p>This subcategory encourages a feedback loop where performance data informs strategic updates, preventing stagnation or misalignment with operational needs. It helps leaders assess whether current approaches hinder innovation or efficiency, prompting necessary changes. GV.OV-01 drives continuous improvement by linking outcomes to future planning.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.OV-01 focuses on evaluating the outcomes of the cybersecurity risk management strategy to refine its direction and effectiveness. This involves measuring how well the strategy supports decision-making and organizational objectives, identifying successes or shortcomings. Adjustments based on these reviews ensure the strategy remains aligned with goals.</p><p>This subcategory encourages a feedback loop where performance data informs strategic updates, preventing stagnation or misalignment with operational needs. It helps leaders assess whether current approaches hinder innovation or efficiency, prompting necessary changes. GV.OV-01 drives continuous improvement by linking outcomes to future planning.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:10:33 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4b60451e/1dd556e5.mp3" length="19176745" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1193</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.OV-01 focuses on evaluating the outcomes of the cybersecurity risk management strategy to refine its direction and effectiveness. This involves measuring how well the strategy supports decision-making and organizational objectives, identifying successes or shortcomings. Adjustments based on these reviews ensure the strategy remains aligned with goals.</p><p>This subcategory encourages a feedback loop where performance data informs strategic updates, preventing stagnation or misalignment with operational needs. It helps leaders assess whether current approaches hinder innovation or efficiency, prompting necessary changes. GV.OV-01 drives continuous improvement by linking outcomes to future planning.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4b60451e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.OV-02 - Adjusting Strategies for Comprehensive Risk Coverage</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>GV.OV-02 - Adjusting Strategies for Comprehensive Risk Coverage</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fdd016fa-3dda-436e-8b6a-7418f42b8e5e</guid>
      <link>https://share.transistor.fm/s/b4930b1b</link>
      <description>
        <![CDATA[<p>GV.OV-02 involves periodic reviews of the cybersecurity risk management strategy to confirm it addresses all organizational requirements and emerging risks. This includes analyzing audit findings, incidents, or role performance to identify gaps in coverage or compliance. Adjustments ensure the strategy remains comprehensive and relevant.</p><p>This subcategory strengthens governance by tying strategy to real-world performance and external obligations, such as regulatory mandates. It fosters a responsive approach, adapting to new threats or operational changes as they arise. GV.OV-02 keeps the strategy robust and fit-for-purpose across the organization.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.OV-02 involves periodic reviews of the cybersecurity risk management strategy to confirm it addresses all organizational requirements and emerging risks. This includes analyzing audit findings, incidents, or role performance to identify gaps in coverage or compliance. Adjustments ensure the strategy remains comprehensive and relevant.</p><p>This subcategory strengthens governance by tying strategy to real-world performance and external obligations, such as regulatory mandates. It fosters a responsive approach, adapting to new threats or operational changes as they arise. GV.OV-02 keeps the strategy robust and fit-for-purpose across the organization.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:11:10 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b4930b1b/c0dacd0a.mp3" length="19506526" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1214</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.OV-02 involves periodic reviews of the cybersecurity risk management strategy to confirm it addresses all organizational requirements and emerging risks. This includes analyzing audit findings, incidents, or role performance to identify gaps in coverage or compliance. Adjustments ensure the strategy remains comprehensive and relevant.</p><p>This subcategory strengthens governance by tying strategy to real-world performance and external obligations, such as regulatory mandates. It fosters a responsive approach, adapting to new threats or operational changes as they arise. GV.OV-02 keeps the strategy robust and fit-for-purpose across the organization.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b4930b1b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.OV-03 - Evaluating Cybersecurity Performance  </title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>GV.OV-03 - Evaluating Cybersecurity Performance  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e0e22ad-4a1a-446c-8780-e34b163f86a1</guid>
      <link>https://share.transistor.fm/s/0b36d8da</link>
      <description>
        <![CDATA[<p>GV.OV-03 emphasizes measuring and reviewing the organization’s cybersecurity risk management performance using indicators like KPIs and KRIs. This evaluation identifies how well policies and procedures meet objectives and highlights risks in terms of likelihood and impact. Regular reviews with leadership ensure insights lead to actionable improvements.</p><p>This subcategory supports data-driven decision-making by collecting and sharing performance metrics, enabling targeted adjustments to enhance effectiveness. It bridges strategy and execution, ensuring resources and efforts align with risk priorities. GV.OV-03 sustains a cycle of assessment and refinement for optimal cybersecurity outcomes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.OV-03 emphasizes measuring and reviewing the organization’s cybersecurity risk management performance using indicators like KPIs and KRIs. This evaluation identifies how well policies and procedures meet objectives and highlights risks in terms of likelihood and impact. Regular reviews with leadership ensure insights lead to actionable improvements.</p><p>This subcategory supports data-driven decision-making by collecting and sharing performance metrics, enabling targeted adjustments to enhance effectiveness. It bridges strategy and execution, ensuring resources and efforts align with risk priorities. GV.OV-03 sustains a cycle of assessment and refinement for optimal cybersecurity outcomes.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:11:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0b36d8da/8fe9bf3a.mp3" length="19324700" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1202</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.OV-03 emphasizes measuring and reviewing the organization’s cybersecurity risk management performance using indicators like KPIs and KRIs. This evaluation identifies how well policies and procedures meet objectives and highlights risks in terms of likelihood and impact. Regular reviews with leadership ensure insights lead to actionable improvements.</p><p>This subcategory supports data-driven decision-making by collecting and sharing performance metrics, enabling targeted adjustments to enhance effectiveness. It bridges strategy and execution, ensuring resources and efforts align with risk priorities. GV.OV-03 sustains a cycle of assessment and refinement for optimal cybersecurity outcomes.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0b36d8da/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-01 - Building a Supply Chain Risk Management Program</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>GV.SC-01 - Building a Supply Chain Risk Management Program</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">073d47c6-4186-4f0b-933e-b9f3bdad7f22</guid>
      <link>https://share.transistor.fm/s/3559899c</link>
      <description>
        <![CDATA[<p>GV.SC-01 focuses on creating a structured cybersecurity supply chain risk management program that includes a clear strategy, objectives, policies, and processes, all endorsed by organizational stakeholders. This ensures that risks stemming from suppliers and third-party relationships are systematically addressed, with a defined plan that outlines milestones and responsibilities. Stakeholder agreement reinforces the program’s legitimacy and aligns it with broader organizational goals.</p><p>This subcategory establishes a foundation for managing supply chain risks by integrating cybersecurity considerations into procurement and vendor interactions. It promotes collaboration across functions like IT, legal, and operations to ensure the program is actionable and effective. GV.SC-01 sets the stage for a proactive, organization-wide approach to securing the supply chain.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-01 focuses on creating a structured cybersecurity supply chain risk management program that includes a clear strategy, objectives, policies, and processes, all endorsed by organizational stakeholders. This ensures that risks stemming from suppliers and third-party relationships are systematically addressed, with a defined plan that outlines milestones and responsibilities. Stakeholder agreement reinforces the program’s legitimacy and aligns it with broader organizational goals.</p><p>This subcategory establishes a foundation for managing supply chain risks by integrating cybersecurity considerations into procurement and vendor interactions. It promotes collaboration across functions like IT, legal, and operations to ensure the program is actionable and effective. GV.SC-01 sets the stage for a proactive, organization-wide approach to securing the supply chain.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:12:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3559899c/5476b89a.mp3" length="19604324" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1220</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-01 focuses on creating a structured cybersecurity supply chain risk management program that includes a clear strategy, objectives, policies, and processes, all endorsed by organizational stakeholders. This ensures that risks stemming from suppliers and third-party relationships are systematically addressed, with a defined plan that outlines milestones and responsibilities. Stakeholder agreement reinforces the program’s legitimacy and aligns it with broader organizational goals.</p><p>This subcategory establishes a foundation for managing supply chain risks by integrating cybersecurity considerations into procurement and vendor interactions. It promotes collaboration across functions like IT, legal, and operations to ensure the program is actionable and effective. GV.SC-01 sets the stage for a proactive, organization-wide approach to securing the supply chain.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3559899c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-02 - Defining Cybersecurity Roles in the Supply Chain</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>GV.SC-02 - Defining Cybersecurity Roles in the Supply Chain</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9296ab50-94f4-46be-82ae-054e1b2a2fc4</guid>
      <link>https://share.transistor.fm/s/f15973e3</link>
      <description>
        <![CDATA[<p>GV.SC-02 emphasizes defining and sharing cybersecurity roles and responsibilities for all parties in the supply chain—suppliers, customers, and partners—as well as within the organization. This clarity ensures that everyone understands their obligations, from planning to executing risk management activities, fostering accountability and coordination. Communication extends both internally and externally to align efforts and expectations.</p><p>This subcategory strengthens supply chain security by embedding these responsibilities into policies, contracts, and performance metrics, enhancing oversight and enforcement. It supports a collaborative framework where shared risks are managed through well-defined roles, reducing gaps in accountability. GV.SC-02 builds a network of responsibility that underpins effective supply chain risk management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-02 emphasizes defining and sharing cybersecurity roles and responsibilities for all parties in the supply chain—suppliers, customers, and partners—as well as within the organization. This clarity ensures that everyone understands their obligations, from planning to executing risk management activities, fostering accountability and coordination. Communication extends both internally and externally to align efforts and expectations.</p><p>This subcategory strengthens supply chain security by embedding these responsibilities into policies, contracts, and performance metrics, enhancing oversight and enforcement. It supports a collaborative framework where shared risks are managed through well-defined roles, reducing gaps in accountability. GV.SC-02 builds a network of responsibility that underpins effective supply chain risk management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:13:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f15973e3/5d41afd9.mp3" length="19718845" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1227</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-02 emphasizes defining and sharing cybersecurity roles and responsibilities for all parties in the supply chain—suppliers, customers, and partners—as well as within the organization. This clarity ensures that everyone understands their obligations, from planning to executing risk management activities, fostering accountability and coordination. Communication extends both internally and externally to align efforts and expectations.</p><p>This subcategory strengthens supply chain security by embedding these responsibilities into policies, contracts, and performance metrics, enhancing oversight and enforcement. It supports a collaborative framework where shared risks are managed through well-defined roles, reducing gaps in accountability. GV.SC-02 builds a network of responsibility that underpins effective supply chain risk management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f15973e3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-03 - Integrating Supply Chain Risks into Broader Frameworks </title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>GV.SC-03 - Integrating Supply Chain Risks into Broader Frameworks </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8d850206-5ef3-49c7-877d-b51703977040</guid>
      <link>https://share.transistor.fm/s/e20735a6</link>
      <description>
        <![CDATA[<p>GV.SC-03 integrates supply chain risk management into the organization’s broader cybersecurity and enterprise risk management (ERM) frameworks, ensuring a unified approach to risk. This alignment allows supply chain risks to be assessed and prioritized alongside other organizational risks, such as operational or financial threats. It fosters consistency in how risks are identified, managed, and escalated across the enterprise.</p><p>By embedding supply chain considerations into improvement processes, this subcategory ensures that lessons learned enhance both cybersecurity and supplier-related practices. It promotes the use of integrated controls and regular reporting to senior management, elevating critical supply chain risks as needed. GV.SC-03 bridges supply chain security with enterprise-wide resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-03 integrates supply chain risk management into the organization’s broader cybersecurity and enterprise risk management (ERM) frameworks, ensuring a unified approach to risk. This alignment allows supply chain risks to be assessed and prioritized alongside other organizational risks, such as operational or financial threats. It fosters consistency in how risks are identified, managed, and escalated across the enterprise.</p><p>By embedding supply chain considerations into improvement processes, this subcategory ensures that lessons learned enhance both cybersecurity and supplier-related practices. It promotes the use of integrated controls and regular reporting to senior management, elevating critical supply chain risks as needed. GV.SC-03 bridges supply chain security with enterprise-wide resilience.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:13:42 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e20735a6/7de54eda.mp3" length="20359166" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1267</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-03 integrates supply chain risk management into the organization’s broader cybersecurity and enterprise risk management (ERM) frameworks, ensuring a unified approach to risk. This alignment allows supply chain risks to be assessed and prioritized alongside other organizational risks, such as operational or financial threats. It fosters consistency in how risks are identified, managed, and escalated across the enterprise.</p><p>By embedding supply chain considerations into improvement processes, this subcategory ensures that lessons learned enhance both cybersecurity and supplier-related practices. It promotes the use of integrated controls and regular reporting to senior management, elevating critical supply chain risks as needed. GV.SC-03 bridges supply chain security with enterprise-wide resilience.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e20735a6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-04 - Prioritizing Suppliers by Criticality</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>GV.SC-04 - Prioritizing Suppliers by Criticality</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">35074d42-0bff-4cef-95ac-a2dd2f8391d1</guid>
      <link>https://share.transistor.fm/s/a3426ce7</link>
      <description>
        <![CDATA[<p>GV.SC-04 requires organizations to identify all suppliers and rank them based on their criticality to operations, considering factors like data sensitivity or system access. This prioritization helps focus cybersecurity efforts on the most vital suppliers, whose failure or compromise could significantly impact the organization. Maintaining an up-to-date supplier inventory is key to this process.</p><p>This subcategory enables efficient resource allocation by directing risk management efforts toward high-priority suppliers, ensuring they meet stringent security standards. It provides a clear picture of the supply chain landscape, enhancing visibility and control. GV.SC-04 lays the groundwork for targeted, risk-based supplier management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-04 requires organizations to identify all suppliers and rank them based on their criticality to operations, considering factors like data sensitivity or system access. This prioritization helps focus cybersecurity efforts on the most vital suppliers, whose failure or compromise could significantly impact the organization. Maintaining an up-to-date supplier inventory is key to this process.</p><p>This subcategory enables efficient resource allocation by directing risk management efforts toward high-priority suppliers, ensuring they meet stringent security standards. It provides a clear picture of the supply chain landscape, enhancing visibility and control. GV.SC-04 lays the groundwork for targeted, risk-based supplier management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:14:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a3426ce7/456ae2f2.mp3" length="19282067" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1199</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-04 requires organizations to identify all suppliers and rank them based on their criticality to operations, considering factors like data sensitivity or system access. This prioritization helps focus cybersecurity efforts on the most vital suppliers, whose failure or compromise could significantly impact the organization. Maintaining an up-to-date supplier inventory is key to this process.</p><p>This subcategory enables efficient resource allocation by directing risk management efforts toward high-priority suppliers, ensuring they meet stringent security standards. It provides a clear picture of the supply chain landscape, enhancing visibility and control. GV.SC-04 lays the groundwork for targeted, risk-based supplier management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a3426ce7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-05 - Setting Cybersecurity Requirements for Suppliers </title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>GV.SC-05 - Setting Cybersecurity Requirements for Suppliers </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4df9e698-f86e-4e98-9a33-15d197d17611</guid>
      <link>https://share.transistor.fm/s/7efc02b3</link>
      <description>
        <![CDATA[<p>GV.SC-05 establishes and prioritizes cybersecurity requirements for suppliers, embedding them into contracts and agreements to enforce consistent security standards. These requirements, tailored to supplier criticality, might include vulnerability disclosures or employee vetting, ensuring third parties align with organizational risk priorities. This contractual approach formalizes expectations and accountability.</p><p>This subcategory enhances supply chain security by defining protocols for information sharing and compliance verification, such as through audits or certifications. It mitigates risks by legally binding suppliers to maintain cybersecurity practices throughout their relationship with the organization. GV.SC-05 transforms supplier relationships into a structured, secure partnership.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-05 establishes and prioritizes cybersecurity requirements for suppliers, embedding them into contracts and agreements to enforce consistent security standards. These requirements, tailored to supplier criticality, might include vulnerability disclosures or employee vetting, ensuring third parties align with organizational risk priorities. This contractual approach formalizes expectations and accountability.</p><p>This subcategory enhances supply chain security by defining protocols for information sharing and compliance verification, such as through audits or certifications. It mitigates risks by legally binding suppliers to maintain cybersecurity practices throughout their relationship with the organization. GV.SC-05 transforms supplier relationships into a structured, secure partnership.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:14:53 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7efc02b3/8e960b0d.mp3" length="19597638" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1219</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-05 establishes and prioritizes cybersecurity requirements for suppliers, embedding them into contracts and agreements to enforce consistent security standards. These requirements, tailored to supplier criticality, might include vulnerability disclosures or employee vetting, ensuring third parties align with organizational risk priorities. This contractual approach formalizes expectations and accountability.</p><p>This subcategory enhances supply chain security by defining protocols for information sharing and compliance verification, such as through audits or certifications. It mitigates risks by legally binding suppliers to maintain cybersecurity practices throughout their relationship with the organization. GV.SC-05 transforms supplier relationships into a structured, secure partnership.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7efc02b3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-06 - Conducting Due Diligence Before Supplier Partnerships  </title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>GV.SC-06 - Conducting Due Diligence Before Supplier Partnerships  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e73e0a2e-09f1-4c8c-8ee3-10105a7b1936</guid>
      <link>https://share.transistor.fm/s/0ee3dbc1</link>
      <description>
        <![CDATA[<p>GV.SC-06 mandates thorough planning and due diligence before engaging suppliers or third parties, assessing their cybersecurity capabilities and risks. This proactive step evaluates factors like technology suitability and risk management practices, ensuring potential partners meet organizational standards. It aims to minimize vulnerabilities introduced through new relationships.</p><p>By conducting risk assessments prior to formal agreements, this subcategory helps organizations avoid suppliers that could compromise security or operations. It supports informed decision-making, aligning procurement with cybersecurity goals. GV.SC-06 establishes a preventive approach to supply chain risk management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-06 mandates thorough planning and due diligence before engaging suppliers or third parties, assessing their cybersecurity capabilities and risks. This proactive step evaluates factors like technology suitability and risk management practices, ensuring potential partners meet organizational standards. It aims to minimize vulnerabilities introduced through new relationships.</p><p>By conducting risk assessments prior to formal agreements, this subcategory helps organizations avoid suppliers that could compromise security or operations. It supports informed decision-making, aligning procurement with cybersecurity goals. GV.SC-06 establishes a preventive approach to supply chain risk management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:15:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0ee3dbc1/c8f943a2.mp3" length="20443176" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1272</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-06 mandates thorough planning and due diligence before engaging suppliers or third parties, assessing their cybersecurity capabilities and risks. This proactive step evaluates factors like technology suitability and risk management practices, ensuring potential partners meet organizational standards. It aims to minimize vulnerabilities introduced through new relationships.</p><p>By conducting risk assessments prior to formal agreements, this subcategory helps organizations avoid suppliers that could compromise security or operations. It supports informed decision-making, aligning procurement with cybersecurity goals. GV.SC-06 establishes a preventive approach to supply chain risk management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0ee3dbc1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-07 - Managing Supplier Risks Throughout Relationships </title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>GV.SC-07 - Managing Supplier Risks Throughout Relationships </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0e976741-7d1a-4a08-b104-4250e05bd8b5</guid>
      <link>https://share.transistor.fm/s/6bdc3b6f</link>
      <description>
        <![CDATA[<p>GV.SC-07 ensures ongoing understanding and management of risks from suppliers and third parties throughout their relationship with the organization. This involves documenting, prioritizing, and assessing risks—such as product vulnerabilities or service disruptions—and developing tailored responses. Continuous monitoring keeps these risks in check over time.</p><p>This subcategory promotes a dynamic risk management process, using methods like audits or inspections to verify supplier compliance and adapt to changing risk profiles. It ensures that critical suppliers are closely watched, maintaining security across the relationship lifecycle. GV.SC-07 sustains vigilance and responsiveness in supply chain security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-07 ensures ongoing understanding and management of risks from suppliers and third parties throughout their relationship with the organization. This involves documenting, prioritizing, and assessing risks—such as product vulnerabilities or service disruptions—and developing tailored responses. Continuous monitoring keeps these risks in check over time.</p><p>This subcategory promotes a dynamic risk management process, using methods like audits or inspections to verify supplier compliance and adapt to changing risk profiles. It ensures that critical suppliers are closely watched, maintaining security across the relationship lifecycle. GV.SC-07 sustains vigilance and responsiveness in supply chain security.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:16:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6bdc3b6f/249db458.mp3" length="20038167" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1247</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-07 ensures ongoing understanding and management of risks from suppliers and third parties throughout their relationship with the organization. This involves documenting, prioritizing, and assessing risks—such as product vulnerabilities or service disruptions—and developing tailored responses. Continuous monitoring keeps these risks in check over time.</p><p>This subcategory promotes a dynamic risk management process, using methods like audits or inspections to verify supplier compliance and adapt to changing risk profiles. It ensures that critical suppliers are closely watched, maintaining security across the relationship lifecycle. GV.SC-07 sustains vigilance and responsiveness in supply chain security.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6bdc3b6f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-08 - Including Suppliers in Incident Response Planning </title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>GV.SC-08 - Including Suppliers in Incident Response Planning </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">62390768-26dd-425b-a309-672f9d8dde87</guid>
      <link>https://share.transistor.fm/s/7b5503ff</link>
      <description>
        <![CDATA[<p>GV.SC-08 integrates key suppliers and third parties into the organization’s incident planning, response, and recovery efforts, ensuring coordinated action during cybersecurity events. This includes defining roles, communication protocols, and participation in exercises like simulations to prepare for incidents. Collaboration with suppliers enhances the organization’s ability to manage and recover from disruptions.</p><p>This subcategory fosters resilience by aligning supplier and organizational response strategies, reducing delays and miscommunication during crises. It ensures that third parties contribute to lessons learned, improving future preparedness. GV.SC-08 strengthens the collective response to supply chain-related incidents.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-08 integrates key suppliers and third parties into the organization’s incident planning, response, and recovery efforts, ensuring coordinated action during cybersecurity events. This includes defining roles, communication protocols, and participation in exercises like simulations to prepare for incidents. Collaboration with suppliers enhances the organization’s ability to manage and recover from disruptions.</p><p>This subcategory fosters resilience by aligning supplier and organizational response strategies, reducing delays and miscommunication during crises. It ensures that third parties contribute to lessons learned, improving future preparedness. GV.SC-08 strengthens the collective response to supply chain-related incidents.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:16:35 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7b5503ff/b5c15193.mp3" length="20413914" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1270</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-08 integrates key suppliers and third parties into the organization’s incident planning, response, and recovery efforts, ensuring coordinated action during cybersecurity events. This includes defining roles, communication protocols, and participation in exercises like simulations to prepare for incidents. Collaboration with suppliers enhances the organization’s ability to manage and recover from disruptions.</p><p>This subcategory fosters resilience by aligning supplier and organizational response strategies, reducing delays and miscommunication during crises. It ensures that third parties contribute to lessons learned, improving future preparedness. GV.SC-08 strengthens the collective response to supply chain-related incidents.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7b5503ff/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-09 - Monitoring Supply Chain Security Practices</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>GV.SC-09 - Monitoring Supply Chain Security Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d7693754-23c2-40aa-bcdd-c4216808dd90</guid>
      <link>https://share.transistor.fm/s/28a93cee</link>
      <description>
        <![CDATA[<p>GV.SC-09 embeds supply chain security practices into cybersecurity and enterprise risk management, ensuring consistent oversight from acquisition to disposal of products and services. This integration includes requiring provenance records and monitoring performance metrics to verify authenticity and security. It aligns supply chain activities with organizational risk strategies.</p><p>This subcategory supports ongoing risk reporting and communication, ensuring that leaders and operations personnel address supply chain vulnerabilities, such as unauthorized hardware upgrades. It maintains security throughout the technology lifecycle, reducing risks from compromised components. GV.SC-09 reinforces a holistic approach to managing supply chain threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-09 embeds supply chain security practices into cybersecurity and enterprise risk management, ensuring consistent oversight from acquisition to disposal of products and services. This integration includes requiring provenance records and monitoring performance metrics to verify authenticity and security. It aligns supply chain activities with organizational risk strategies.</p><p>This subcategory supports ongoing risk reporting and communication, ensuring that leaders and operations personnel address supply chain vulnerabilities, such as unauthorized hardware upgrades. It maintains security throughout the technology lifecycle, reducing risks from compromised components. GV.SC-09 reinforces a holistic approach to managing supply chain threats.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:17:10 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/28a93cee/1553ef07.mp3" length="20035653" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1247</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-09 embeds supply chain security practices into cybersecurity and enterprise risk management, ensuring consistent oversight from acquisition to disposal of products and services. This integration includes requiring provenance records and monitoring performance metrics to verify authenticity and security. It aligns supply chain activities with organizational risk strategies.</p><p>This subcategory supports ongoing risk reporting and communication, ensuring that leaders and operations personnel address supply chain vulnerabilities, such as unauthorized hardware upgrades. It maintains security throughout the technology lifecycle, reducing risks from compromised components. GV.SC-09 reinforces a holistic approach to managing supply chain threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/28a93cee/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>GV.SC-10 - Planning for Post-Partnership Security</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>GV.SC-10 - Planning for Post-Partnership Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">688c1062-10f5-445f-81c5-33307dd7ef11</guid>
      <link>https://share.transistor.fm/s/6eb0fdc6</link>
      <description>
        <![CDATA[<p>GV.SC-10 ensures that supply chain risk management plans address post-relationship activities, such as terminating supplier access or managing data disposal. This involves establishing processes for secure transitions, including end-of-life maintenance and asset recovery, to prevent residual risks. It safeguards the organization after partnerships end.</p><p>This subcategory mitigates risks like data leakage or system vulnerabilities by verifying that supplier obligations are fulfilled at termination. It promotes resilience by planning for both normal and adverse exits, ensuring continuity and security. GV.SC-10 closes the loop on supply chain risk management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GV.SC-10 ensures that supply chain risk management plans address post-relationship activities, such as terminating supplier access or managing data disposal. This involves establishing processes for secure transitions, including end-of-life maintenance and asset recovery, to prevent residual risks. It safeguards the organization after partnerships end.</p><p>This subcategory mitigates risks like data leakage or system vulnerabilities by verifying that supplier obligations are fulfilled at termination. It promotes resilience by planning for both normal and adverse exits, ensuring continuity and security. GV.SC-10 closes the loop on supply chain risk management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:17:43 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6eb0fdc6/5ca5d470.mp3" length="20386316" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1269</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>GV.SC-10 ensures that supply chain risk management plans address post-relationship activities, such as terminating supplier access or managing data disposal. This involves establishing processes for secure transitions, including end-of-life maintenance and asset recovery, to prevent residual risks. It safeguards the organization after partnerships end.</p><p>This subcategory mitigates risks like data leakage or system vulnerabilities by verifying that supplier obligations are fulfilled at termination. It promotes resilience by planning for both normal and adverse exits, ensuring continuity and security. GV.SC-10 closes the loop on supply chain risk management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6eb0fdc6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.AM-01 - Tracking Organizational Hardware Assets </title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>ID.AM-01 - Tracking Organizational Hardware Assets </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b15b3d9-7249-433c-844b-71defb4ddea9</guid>
      <link>https://share.transistor.fm/s/42bd8d73</link>
      <description>
        <![CDATA[<p>ID.AM-01 requires organizations to maintain comprehensive inventories of all hardware assets under their control, including IT, IoT, OT, and mobile devices. This ongoing cataloging ensures visibility into the physical components that support operations, enabling better risk assessment and management. Accurate inventories are foundational to identifying vulnerabilities and protecting critical assets.</p><p>This subcategory supports proactive security by integrating real-time monitoring to detect and log new hardware, keeping the inventory current. It facilitates tracking of hardware locations and status, reducing the risk of unmanaged devices becoming entry points for threats. ID.AM-01 establishes a baseline for securing the organization’s physical infrastructure.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.AM-01 requires organizations to maintain comprehensive inventories of all hardware assets under their control, including IT, IoT, OT, and mobile devices. This ongoing cataloging ensures visibility into the physical components that support operations, enabling better risk assessment and management. Accurate inventories are foundational to identifying vulnerabilities and protecting critical assets.</p><p>This subcategory supports proactive security by integrating real-time monitoring to detect and log new hardware, keeping the inventory current. It facilitates tracking of hardware locations and status, reducing the risk of unmanaged devices becoming entry points for threats. ID.AM-01 establishes a baseline for securing the organization’s physical infrastructure.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:18:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/42bd8d73/b2be0594.mp3" length="18490455" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1150</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.AM-01 requires organizations to maintain comprehensive inventories of all hardware assets under their control, including IT, IoT, OT, and mobile devices. This ongoing cataloging ensures visibility into the physical components that support operations, enabling better risk assessment and management. Accurate inventories are foundational to identifying vulnerabilities and protecting critical assets.</p><p>This subcategory supports proactive security by integrating real-time monitoring to detect and log new hardware, keeping the inventory current. It facilitates tracking of hardware locations and status, reducing the risk of unmanaged devices becoming entry points for threats. ID.AM-01 establishes a baseline for securing the organization’s physical infrastructure.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/42bd8d73/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.AM-02 - Managing Software and Service Inventories </title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>ID.AM-02 - Managing Software and Service Inventories </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b5f14ce6-de42-4816-a985-407790adad8f</guid>
      <link>https://share.transistor.fm/s/de23ca3d</link>
      <description>
        <![CDATA[<p>ID.AM-02 focuses on maintaining detailed inventories of software, services, and systems, covering everything from commercial applications to cloud-based offerings and custom solutions. This comprehensive tracking ensures organizations know what digital assets they manage, aiding in vulnerability identification and compliance efforts. It provides a clear picture of the software landscape supporting operations.</p><p>This subcategory enhances security by monitoring platforms like containers and virtual machines for changes, ensuring the inventory reflects real-time usage. It supports lifecycle management by identifying outdated or unsupported software that could pose risks. ID.AM-02 strengthens the organization’s ability to protect its digital environment.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.AM-02 focuses on maintaining detailed inventories of software, services, and systems, covering everything from commercial applications to cloud-based offerings and custom solutions. This comprehensive tracking ensures organizations know what digital assets they manage, aiding in vulnerability identification and compliance efforts. It provides a clear picture of the software landscape supporting operations.</p><p>This subcategory enhances security by monitoring platforms like containers and virtual machines for changes, ensuring the inventory reflects real-time usage. It supports lifecycle management by identifying outdated or unsupported software that could pose risks. ID.AM-02 strengthens the organization’s ability to protect its digital environment.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:18:45 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/de23ca3d/f1f60e4e.mp3" length="19138712" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1191</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.AM-02 focuses on maintaining detailed inventories of software, services, and systems, covering everything from commercial applications to cloud-based offerings and custom solutions. This comprehensive tracking ensures organizations know what digital assets they manage, aiding in vulnerability identification and compliance efforts. It provides a clear picture of the software landscape supporting operations.</p><p>This subcategory enhances security by monitoring platforms like containers and virtual machines for changes, ensuring the inventory reflects real-time usage. It supports lifecycle management by identifying outdated or unsupported software that could pose risks. ID.AM-02 strengthens the organization’s ability to protect its digital environment.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/de23ca3d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.AM-03 - Mapping Network Communication Flows </title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>ID.AM-03 - Mapping Network Communication Flows </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">54a8ce72-0a79-41ef-8a66-8e3e614d8f1a</guid>
      <link>https://share.transistor.fm/s/db22f315</link>
      <description>
        <![CDATA[<p>ID.AM-03 involves maintaining up-to-date representations of authorized network communications and data flows, both within the organization and with external entities. This includes documenting baselines for wired, wireless, and cloud-based interactions, as well as expected protocols and ports. It ensures visibility into how data moves, critical for detecting anomalies or unauthorized access.</p><p>This subcategory supports risk management by providing a reference for normal network behavior, enabling quick identification of deviations that might signal a breach. It fosters secure configuration and monitoring of network infrastructure, including third-party connections. ID.AM-03 underpins a robust defense against network-based threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.AM-03 involves maintaining up-to-date representations of authorized network communications and data flows, both within the organization and with external entities. This includes documenting baselines for wired, wireless, and cloud-based interactions, as well as expected protocols and ports. It ensures visibility into how data moves, critical for detecting anomalies or unauthorized access.</p><p>This subcategory supports risk management by providing a reference for normal network behavior, enabling quick identification of deviations that might signal a breach. It fosters secure configuration and monitoring of network infrastructure, including third-party connections. ID.AM-03 underpins a robust defense against network-based threats.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:19:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/db22f315/dcdf1d17.mp3" length="17453913" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1085</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.AM-03 involves maintaining up-to-date representations of authorized network communications and data flows, both within the organization and with external entities. This includes documenting baselines for wired, wireless, and cloud-based interactions, as well as expected protocols and ports. It ensures visibility into how data moves, critical for detecting anomalies or unauthorized access.</p><p>This subcategory supports risk management by providing a reference for normal network behavior, enabling quick identification of deviations that might signal a breach. It fosters secure configuration and monitoring of network infrastructure, including third-party connections. ID.AM-03 underpins a robust defense against network-based threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>ID.AM-04 - Cataloging Supplier-Provided Services</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>ID.AM-04 - Cataloging Supplier-Provided Services</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">56e91126-8135-4513-a21f-31942aa9e339</guid>
      <link>https://share.transistor.fm/s/11541c1d</link>
      <description>
        <![CDATA[<p>ID.AM-04 requires organizations to keep inventories of supplier-provided services, such as IaaS, PaaS, SaaS, and APIs, used in their operations. This tracking ensures awareness of external dependencies that could introduce risks if not properly managed. It provides a basis for monitoring and securing third-party service usage.</p><p>This subcategory enhances oversight by updating inventories whenever new services are adopted, aligning them with cybersecurity risk management efforts. It helps identify critical external services that require heightened scrutiny or contractual safeguards. ID.AM-04 strengthens supply chain visibility within asset management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.AM-04 requires organizations to keep inventories of supplier-provided services, such as IaaS, PaaS, SaaS, and APIs, used in their operations. This tracking ensures awareness of external dependencies that could introduce risks if not properly managed. It provides a basis for monitoring and securing third-party service usage.</p><p>This subcategory enhances oversight by updating inventories whenever new services are adopted, aligning them with cybersecurity risk management efforts. It helps identify critical external services that require heightened scrutiny or contractual safeguards. ID.AM-04 strengthens supply chain visibility within asset management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:19:50 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/11541c1d/35550007.mp3" length="20128434" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1252</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.AM-04 requires organizations to keep inventories of supplier-provided services, such as IaaS, PaaS, SaaS, and APIs, used in their operations. This tracking ensures awareness of external dependencies that could introduce risks if not properly managed. It provides a basis for monitoring and securing third-party service usage.</p><p>This subcategory enhances oversight by updating inventories whenever new services are adopted, aligning them with cybersecurity risk management efforts. It helps identify critical external services that require heightened scrutiny or contractual safeguards. ID.AM-04 strengthens supply chain visibility within asset management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/11541c1d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.AM-05 - Prioritizing Assets by Importance  </title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>ID.AM-05 - Prioritizing Assets by Importance  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e4d42fdb-d2bd-4b99-bbbc-560b8d4b8840</guid>
      <link>https://share.transistor.fm/s/9bd62f7d</link>
      <description>
        <![CDATA[<p>ID.AM-05 involves prioritizing assets—data, hardware, software, and services—based on their classification, criticality, resource needs, and mission impact. This process defines criteria to rank assets, ensuring that those most vital to organizational objectives receive focused protection. Regular updates keep priorities aligned with changing conditions.</p><p>This subcategory enables efficient resource allocation by directing cybersecurity efforts toward high-value assets, reducing the risk of mission disruption. It supports strategic planning by linking asset importance to risk management decisions. ID.AM-05 ensures that protection efforts match organizational priorities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.AM-05 involves prioritizing assets—data, hardware, software, and services—based on their classification, criticality, resource needs, and mission impact. This process defines criteria to rank assets, ensuring that those most vital to organizational objectives receive focused protection. Regular updates keep priorities aligned with changing conditions.</p><p>This subcategory enables efficient resource allocation by directing cybersecurity efforts toward high-value assets, reducing the risk of mission disruption. It supports strategic planning by linking asset importance to risk management decisions. ID.AM-05 ensures that protection efforts match organizational priorities.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:20:22 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9bd62f7d/f47dfaf2.mp3" length="18530157" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1152</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.AM-05 involves prioritizing assets—data, hardware, software, and services—based on their classification, criticality, resource needs, and mission impact. This process defines criteria to rank assets, ensuring that those most vital to organizational objectives receive focused protection. Regular updates keep priorities aligned with changing conditions.</p><p>This subcategory enables efficient resource allocation by directing cybersecurity efforts toward high-value assets, reducing the risk of mission disruption. It supports strategic planning by linking asset importance to risk management decisions. ID.AM-05 ensures that protection efforts match organizational priorities.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9bd62f7d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.AM-07 - Inventorying Sensitive Data and Metadata</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>ID.AM-07 - Inventorying Sensitive Data and Metadata</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">07506b61-7e0e-45ec-8fa1-69ea839927ad</guid>
      <link>https://share.transistor.fm/s/729900d8</link>
      <description>
        <![CDATA[<p>ID.AM-07 requires maintaining inventories of designated data types—like PII, health information, or intellectual property—along with metadata such as provenance and ownership. This ongoing effort ensures organizations know where sensitive data resides and how it’s classified, critical for compliance and security. It supports tracking data across systems and locations.</p><p>This subcategory enhances data protection by enabling continuous discovery and tagging of sensitive information, reducing the risk of overlooked exposures. It provides a foundation for managing data risks, such as breaches or misuse, throughout its lifecycle. ID.AM-07 strengthens data governance within asset management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.AM-07 requires maintaining inventories of designated data types—like PII, health information, or intellectual property—along with metadata such as provenance and ownership. This ongoing effort ensures organizations know where sensitive data resides and how it’s classified, critical for compliance and security. It supports tracking data across systems and locations.</p><p>This subcategory enhances data protection by enabling continuous discovery and tagging of sensitive information, reducing the risk of overlooked exposures. It provides a foundation for managing data risks, such as breaches or misuse, throughout its lifecycle. ID.AM-07 strengthens data governance within asset management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:20:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/729900d8/4ad225dc.mp3" length="19211017" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1195</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.AM-07 requires maintaining inventories of designated data types—like PII, health information, or intellectual property—along with metadata such as provenance and ownership. This ongoing effort ensures organizations know where sensitive data resides and how it’s classified, critical for compliance and security. It supports tracking data across systems and locations.</p><p>This subcategory enhances data protection by enabling continuous discovery and tagging of sensitive information, reducing the risk of overlooked exposures. It provides a foundation for managing data risks, such as breaches or misuse, throughout its lifecycle. ID.AM-07 strengthens data governance within asset management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/729900d8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.AM-08 - Managing Assets Across Their Lifecycle </title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>ID.AM-08 - Managing Assets Across Their Lifecycle </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">39f39743-2b82-4dec-976b-28222645da5b</guid>
      <link>https://share.transistor.fm/s/4ba4f1c4</link>
      <description>
        <![CDATA[<p>ID.AM-08 focuses on managing all assets—systems, hardware, software, services, and data—across their entire life cycles, from deployment to disposal. This includes integrating cybersecurity considerations into acquisition, use, and retirement phases, ensuring consistent protection. It addresses risks like shadow IT or redundant systems that expand the attack surface.</p><p>This subcategory promotes secure configuration, timely updates, and proper disposal, such as data sanitization, to prevent vulnerabilities at any stage. It ensures inventories reflect asset movements or changes, maintaining accuracy over time. ID.AM-08 sustains a lifecycle approach to asset security and resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.AM-08 focuses on managing all assets—systems, hardware, software, services, and data—across their entire life cycles, from deployment to disposal. This includes integrating cybersecurity considerations into acquisition, use, and retirement phases, ensuring consistent protection. It addresses risks like shadow IT or redundant systems that expand the attack surface.</p><p>This subcategory promotes secure configuration, timely updates, and proper disposal, such as data sanitization, to prevent vulnerabilities at any stage. It ensures inventories reflect asset movements or changes, maintaining accuracy over time. ID.AM-08 sustains a lifecycle approach to asset security and resilience.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:21:26 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4ba4f1c4/f66d2806.mp3" length="18741648" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1166</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.AM-08 focuses on managing all assets—systems, hardware, software, services, and data—across their entire life cycles, from deployment to disposal. This includes integrating cybersecurity considerations into acquisition, use, and retirement phases, ensuring consistent protection. It addresses risks like shadow IT or redundant systems that expand the attack surface.</p><p>This subcategory promotes secure configuration, timely updates, and proper disposal, such as data sanitization, to prevent vulnerabilities at any stage. It ensures inventories reflect asset movements or changes, maintaining accuracy over time. ID.AM-08 sustains a lifecycle approach to asset security and resilience.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4ba4f1c4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-01 - Identifying and Recording Asset Vulnerabilities</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>ID.RA-01 - Identifying and Recording Asset Vulnerabilities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dc6f5cf3-bc7d-4454-86b0-902da6b23ae0</guid>
      <link>https://share.transistor.fm/s/d062a0b7</link>
      <description>
        <![CDATA[<p>ID.RA-01 involves identifying, validating, and documenting vulnerabilities in organizational assets, including software, hardware, and facilities. This process uses tools and assessments to pinpoint weaknesses—like unpatched software or physical security gaps—that could be exploited. Recording these vulnerabilities ensures a clear record for tracking and remediation.</p><p>This subcategory supports risk management by providing a comprehensive view of potential entry points for threats, enabling prioritized responses. It includes monitoring external intelligence for new vulnerabilities, keeping the organization ahead of emerging risks. ID.RA-01 is a critical first step in understanding and mitigating asset-specific threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-01 involves identifying, validating, and documenting vulnerabilities in organizational assets, including software, hardware, and facilities. This process uses tools and assessments to pinpoint weaknesses—like unpatched software or physical security gaps—that could be exploited. Recording these vulnerabilities ensures a clear record for tracking and remediation.</p><p>This subcategory supports risk management by providing a comprehensive view of potential entry points for threats, enabling prioritized responses. It includes monitoring external intelligence for new vulnerabilities, keeping the organization ahead of emerging risks. ID.RA-01 is a critical first step in understanding and mitigating asset-specific threats.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:22:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d062a0b7/4093c00d.mp3" length="19359818" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1204</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-01 involves identifying, validating, and documenting vulnerabilities in organizational assets, including software, hardware, and facilities. This process uses tools and assessments to pinpoint weaknesses—like unpatched software or physical security gaps—that could be exploited. Recording these vulnerabilities ensures a clear record for tracking and remediation.</p><p>This subcategory supports risk management by providing a comprehensive view of potential entry points for threats, enabling prioritized responses. It includes monitoring external intelligence for new vulnerabilities, keeping the organization ahead of emerging risks. ID.RA-01 is a critical first step in understanding and mitigating asset-specific threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d062a0b7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-02 - Leveraging Cyber Threat Intelligence </title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>ID.RA-02 - Leveraging Cyber Threat Intelligence </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">931c4464-ba68-4dae-b0f3-adda1d34c783</guid>
      <link>https://share.transistor.fm/s/a0bd2a92</link>
      <description>
        <![CDATA[<p>ID.RA-02 focuses on gathering cyber threat intelligence from forums, advisories, and reputable sources to stay informed about current and emerging threats. This intelligence includes details on threat actors, tactics, and vulnerabilities relevant to the organization’s assets. It ensures that cybersecurity tools and teams have up-to-date information to enhance detection and response.</p><p>This subcategory strengthens proactive defense by integrating intelligence feeds into security systems, improving accuracy in identifying risks. It supports awareness of threats tied to new technologies or industry trends, broadening the risk perspective. ID.RA-02 keeps the organization connected to the broader threat landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-02 focuses on gathering cyber threat intelligence from forums, advisories, and reputable sources to stay informed about current and emerging threats. This intelligence includes details on threat actors, tactics, and vulnerabilities relevant to the organization’s assets. It ensures that cybersecurity tools and teams have up-to-date information to enhance detection and response.</p><p>This subcategory strengthens proactive defense by integrating intelligence feeds into security systems, improving accuracy in identifying risks. It supports awareness of threats tied to new technologies or industry trends, broadening the risk perspective. ID.RA-02 keeps the organization connected to the broader threat landscape.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:22:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a0bd2a92/d91a0965.mp3" length="18849479" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1172</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-02 focuses on gathering cyber threat intelligence from forums, advisories, and reputable sources to stay informed about current and emerging threats. This intelligence includes details on threat actors, tactics, and vulnerabilities relevant to the organization’s assets. It ensures that cybersecurity tools and teams have up-to-date information to enhance detection and response.</p><p>This subcategory strengthens proactive defense by integrating intelligence feeds into security systems, improving accuracy in identifying risks. It supports awareness of threats tied to new technologies or industry trends, broadening the risk perspective. ID.RA-02 keeps the organization connected to the broader threat landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a0bd2a92/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-03 - Recognizing Internal and External Threats </title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>ID.RA-03 - Recognizing Internal and External Threats </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">67843c17-b468-4ce3-8a6a-13a1c929ff0b</guid>
      <link>https://share.transistor.fm/s/c5eebcf7</link>
      <description>
        <![CDATA[<p>ID.RA-03 involves identifying and documenting threats—both internal, like insider risks, and external, like cyberattacks—that could impact the organization. This process uses threat intelligence and hunting techniques to pinpoint actors and tactics likely to target operations or assets. Recording these threats ensures a comprehensive threat profile for risk planning.</p><p>This subcategory enhances situational awareness by focusing on threats specific to the organization’s context, enabling tailored defenses. It supports proactive measures, such as monitoring for signs of compromise within the environment. ID.RA-03 builds a foundation for understanding the full spectrum of potential dangers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-03 involves identifying and documenting threats—both internal, like insider risks, and external, like cyberattacks—that could impact the organization. This process uses threat intelligence and hunting techniques to pinpoint actors and tactics likely to target operations or assets. Recording these threats ensures a comprehensive threat profile for risk planning.</p><p>This subcategory enhances situational awareness by focusing on threats specific to the organization’s context, enabling tailored defenses. It supports proactive measures, such as monitoring for signs of compromise within the environment. ID.RA-03 builds a foundation for understanding the full spectrum of potential dangers.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:23:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c5eebcf7/bd554d35.mp3" length="19473497" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1211</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-03 involves identifying and documenting threats—both internal, like insider risks, and external, like cyberattacks—that could impact the organization. This process uses threat intelligence and hunting techniques to pinpoint actors and tactics likely to target operations or assets. Recording these threats ensures a comprehensive threat profile for risk planning.</p><p>This subcategory enhances situational awareness by focusing on threats specific to the organization’s context, enabling tailored defenses. It supports proactive measures, such as monitoring for signs of compromise within the environment. ID.RA-03 builds a foundation for understanding the full spectrum of potential dangers.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c5eebcf7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-04 - Assessing Threat Impact and Likelihood </title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>ID.RA-04 - Assessing Threat Impact and Likelihood </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f218bfec-9ad2-40d8-bbb1-06a7d2496b8f</guid>
      <link>https://share.transistor.fm/s/e4916647</link>
      <description>
        <![CDATA[<p>ID.RA-04 requires assessing and documenting the likelihood and potential impacts of threats exploiting identified vulnerabilities, such as data breaches or system failures. This collaborative effort between business and cybersecurity teams estimates risk scenarios and their consequences, recorded in tools like risk registers. It provides a clear picture of risk severity and scope.</p><p>This subcategory informs prioritization by quantifying how threats could disrupt operations or cascade across systems, guiding resource allocation. It ensures that risk assessments reflect real-world implications, such as financial or reputational loss. ID.RA-04 bridges vulnerability identification with actionable risk insights.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-04 requires assessing and documenting the likelihood and potential impacts of threats exploiting identified vulnerabilities, such as data breaches or system failures. This collaborative effort between business and cybersecurity teams estimates risk scenarios and their consequences, recorded in tools like risk registers. It provides a clear picture of risk severity and scope.</p><p>This subcategory informs prioritization by quantifying how threats could disrupt operations or cascade across systems, guiding resource allocation. It ensures that risk assessments reflect real-world implications, such as financial or reputational loss. ID.RA-04 bridges vulnerability identification with actionable risk insights.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:23:43 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e4916647/1a63368f.mp3" length="18832345" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1171</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-04 requires assessing and documenting the likelihood and potential impacts of threats exploiting identified vulnerabilities, such as data breaches or system failures. This collaborative effort between business and cybersecurity teams estimates risk scenarios and their consequences, recorded in tools like risk registers. It provides a clear picture of risk severity and scope.</p><p>This subcategory informs prioritization by quantifying how threats could disrupt operations or cascade across systems, guiding resource allocation. It ensures that risk assessments reflect real-world implications, such as financial or reputational loss. ID.RA-04 bridges vulnerability identification with actionable risk insights.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e4916647/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-05 - Understanding Inherent Cybersecurity Risks</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>ID.RA-05 - Understanding Inherent Cybersecurity Risks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c67794b-bf46-41c8-8180-c155f2a1dfc6</guid>
      <link>https://share.transistor.fm/s/2db13bc6</link>
      <description>
        <![CDATA[<p>ID.RA-05 uses data on threats, vulnerabilities, likelihoods, and impacts to assess inherent risk—the risk before controls are applied—and prioritize responses. This involves developing threat models to understand risks to critical assets and guide mitigation strategies. It ensures that risk management focuses on the most pressing dangers.</p><p>This subcategory supports strategic decision-making by linking risk analysis to resource investments, emphasizing high-probability, high-impact scenarios. It provides a structured approach to weighing risks against organizational tolerances. ID.RA-05 drives a risk-based prioritization of cybersecurity efforts.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-05 uses data on threats, vulnerabilities, likelihoods, and impacts to assess inherent risk—the risk before controls are applied—and prioritize responses. This involves developing threat models to understand risks to critical assets and guide mitigation strategies. It ensures that risk management focuses on the most pressing dangers.</p><p>This subcategory supports strategic decision-making by linking risk analysis to resource investments, emphasizing high-probability, high-impact scenarios. It provides a structured approach to weighing risks against organizational tolerances. ID.RA-05 drives a risk-based prioritization of cybersecurity efforts.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:24:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2db13bc6/1f5fd00e.mp3" length="18882503" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1175</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-05 uses data on threats, vulnerabilities, likelihoods, and impacts to assess inherent risk—the risk before controls are applied—and prioritize responses. This involves developing threat models to understand risks to critical assets and guide mitigation strategies. It ensures that risk management focuses on the most pressing dangers.</p><p>This subcategory supports strategic decision-making by linking risk analysis to resource investments, emphasizing high-probability, high-impact scenarios. It provides a structured approach to weighing risks against organizational tolerances. ID.RA-05 drives a risk-based prioritization of cybersecurity efforts.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2db13bc6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-06 - Prioritizing Risk Response Strategies </title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>ID.RA-06 - Prioritizing Risk Response Strategies </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f65215e6-64b6-4fdd-96ca-ff0526e378ba</guid>
      <link>https://share.transistor.fm/s/a788b3f1</link>
      <description>
        <![CDATA[<p>ID.RA-06 involves selecting, prioritizing, and planning risk responses—such as mitigation, acceptance, or transfer—based on assessed risks, then tracking and sharing progress. This structured process uses vulnerability management criteria to decide actions and monitor implementation through tools like risk registers. Communication ensures stakeholders are informed of planned responses.</p><p>This subcategory ensures that risk responses align with organizational priorities, balancing cost and effectiveness while maintaining visibility into execution. It supports accountability by tracking progress and adjusting plans as needed. ID.RA-06 operationalizes risk assessment into actionable, transparent steps.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-06 involves selecting, prioritizing, and planning risk responses—such as mitigation, acceptance, or transfer—based on assessed risks, then tracking and sharing progress. This structured process uses vulnerability management criteria to decide actions and monitor implementation through tools like risk registers. Communication ensures stakeholders are informed of planned responses.</p><p>This subcategory ensures that risk responses align with organizational priorities, balancing cost and effectiveness while maintaining visibility into execution. It supports accountability by tracking progress and adjusting plans as needed. ID.RA-06 operationalizes risk assessment into actionable, transparent steps.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:24:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a788b3f1/cf4bdaa6.mp3" length="19467642" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1211</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-06 involves selecting, prioritizing, and planning risk responses—such as mitigation, acceptance, or transfer—based on assessed risks, then tracking and sharing progress. This structured process uses vulnerability management criteria to decide actions and monitor implementation through tools like risk registers. Communication ensures stakeholders are informed of planned responses.</p><p>This subcategory ensures that risk responses align with organizational priorities, balancing cost and effectiveness while maintaining visibility into execution. It supports accountability by tracking progress and adjusting plans as needed. ID.RA-06 operationalizes risk assessment into actionable, transparent steps.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a788b3f1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-07 - Managing Changes and Exceptions in Risk</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>ID.RA-07 - Managing Changes and Exceptions in Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6ff9ca7c-0bd5-42a0-ab1d-2ae4a207ce0b</guid>
      <link>https://share.transistor.fm/s/22803a97</link>
      <description>
        <![CDATA[<p>ID.RA-07 focuses on managing changes to systems or processes and exceptions to policies, assessing their risk impacts, and documenting them for oversight. This includes formal procedures for reviewing proposed changes, evaluating risks, and planning rollbacks if needed. Tracking ensures that accepted risks or exceptions are revisited over time.</p><p>This subcategory prevents unintended vulnerabilities by ensuring changes and exceptions are deliberate and risk-informed, reducing disruption. It maintains a record of decisions, supporting audits and accountability. ID.RA-07 integrates risk management into operational flexibility.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-07 focuses on managing changes to systems or processes and exceptions to policies, assessing their risk impacts, and documenting them for oversight. This includes formal procedures for reviewing proposed changes, evaluating risks, and planning rollbacks if needed. Tracking ensures that accepted risks or exceptions are revisited over time.</p><p>This subcategory prevents unintended vulnerabilities by ensuring changes and exceptions are deliberate and risk-informed, reducing disruption. It maintains a record of decisions, supporting audits and accountability. ID.RA-07 integrates risk management into operational flexibility.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:25:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/22803a97/231b73c8.mp3" length="19502752" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1213</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-07 focuses on managing changes to systems or processes and exceptions to policies, assessing their risk impacts, and documenting them for oversight. This includes formal procedures for reviewing proposed changes, evaluating risks, and planning rollbacks if needed. Tracking ensures that accepted risks or exceptions are revisited over time.</p><p>This subcategory prevents unintended vulnerabilities by ensuring changes and exceptions are deliberate and risk-informed, reducing disruption. It maintains a record of decisions, supporting audits and accountability. ID.RA-07 integrates risk management into operational flexibility.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/22803a97/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-08 - Handling Vulnerability Disclosures </title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>ID.RA-08 - Handling Vulnerability Disclosures </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">63e0bdf7-2794-4964-91bc-bb20cbad60d1</guid>
      <link>https://share.transistor.fm/s/56866219</link>
      <description>
        <![CDATA[<p>ID.RA-08 establishes processes for handling vulnerability disclosures from suppliers, customers, or government sources, ensuring timely analysis and response. This includes assigning responsibilities to assess impacts and coordinate with stakeholders under defined protocols, often outlined in contracts. It keeps the organization responsive to external vulnerability reports.</p><p>This subcategory enhances collaboration by structuring information sharing, reducing delays in addressing disclosed weaknesses. It ensures that vulnerabilities are systematically processed, validated, and mitigated, strengthening overall security. ID.RA-08 connects external insights to internal risk management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-08 establishes processes for handling vulnerability disclosures from suppliers, customers, or government sources, ensuring timely analysis and response. This includes assigning responsibilities to assess impacts and coordinate with stakeholders under defined protocols, often outlined in contracts. It keeps the organization responsive to external vulnerability reports.</p><p>This subcategory enhances collaboration by structuring information sharing, reducing delays in addressing disclosed weaknesses. It ensures that vulnerabilities are systematically processed, validated, and mitigated, strengthening overall security. ID.RA-08 connects external insights to internal risk management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:25:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/56866219/c41b51ed.mp3" length="19370672" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1205</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-08 establishes processes for handling vulnerability disclosures from suppliers, customers, or government sources, ensuring timely analysis and response. This includes assigning responsibilities to assess impacts and coordinate with stakeholders under defined protocols, often outlined in contracts. It keeps the organization responsive to external vulnerability reports.</p><p>This subcategory enhances collaboration by structuring information sharing, reducing delays in addressing disclosed weaknesses. It ensures that vulnerabilities are systematically processed, validated, and mitigated, strengthening overall security. ID.RA-08 connects external insights to internal risk management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/56866219/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-09 - Verifying Hardware and Software Integrity</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>ID.RA-09 - Verifying Hardware and Software Integrity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">53b57711-2a4d-4e08-9528-7248a6eb001b</guid>
      <link>https://share.transistor.fm/s/c8cb378f</link>
      <description>
        <![CDATA[<p>ID.RA-09 requires assessing the authenticity and integrity of hardware and software before purchase or deployment, ensuring they are free from tampering or vulnerabilities. This due diligence verifies that critical technology meets security standards, reducing the risk of compromised assets entering the environment. It’s a preventive measure against supply chain threats.</p><p>This subcategory supports secure acquisition by integrating cybersecurity checks into procurement, protecting organizational operations from the outset. It ensures that only trusted components are used, aligning with risk management goals. ID.RA-09 safeguards the foundation of the technology stack.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-09 requires assessing the authenticity and integrity of hardware and software before purchase or deployment, ensuring they are free from tampering or vulnerabilities. This due diligence verifies that critical technology meets security standards, reducing the risk of compromised assets entering the environment. It’s a preventive measure against supply chain threats.</p><p>This subcategory supports secure acquisition by integrating cybersecurity checks into procurement, protecting organizational operations from the outset. It ensures that only trusted components are used, aligning with risk management goals. ID.RA-09 safeguards the foundation of the technology stack.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:26:31 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c8cb378f/3d30ecff.mp3" length="19029206" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1184</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-09 requires assessing the authenticity and integrity of hardware and software before purchase or deployment, ensuring they are free from tampering or vulnerabilities. This due diligence verifies that critical technology meets security standards, reducing the risk of compromised assets entering the environment. It’s a preventive measure against supply chain threats.</p><p>This subcategory supports secure acquisition by integrating cybersecurity checks into procurement, protecting organizational operations from the outset. It ensures that only trusted components are used, aligning with risk management goals. ID.RA-09 safeguards the foundation of the technology stack.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c8cb378f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.RA-10 - Assessing Critical Suppliers Before Acquisition</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>ID.RA-10 - Assessing Critical Suppliers Before Acquisition</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a30bd0d1-8d23-41a3-b250-ea42344b7574</guid>
      <link>https://share.transistor.fm/s/a4acf920</link>
      <description>
        <![CDATA[<p>ID.RA-10 involves conducting risk assessments of critical suppliers before engaging them, evaluating their cybersecurity practices and supply chain risks. This ensures that suppliers handling sensitive data or vital services meet organizational security requirements. It’s a proactive step to mitigate third-party vulnerabilities.</p><p>This subcategory aligns procurement with risk priorities, focusing on suppliers whose failure could disrupt operations or expose assets. It provides a structured basis for supplier selection, enhancing supply chain security. ID.RA-10 integrates supplier risk into the broader risk assessment process.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.RA-10 involves conducting risk assessments of critical suppliers before engaging them, evaluating their cybersecurity practices and supply chain risks. This ensures that suppliers handling sensitive data or vital services meet organizational security requirements. It’s a proactive step to mitigate third-party vulnerabilities.</p><p>This subcategory aligns procurement with risk priorities, focusing on suppliers whose failure could disrupt operations or expose assets. It provides a structured basis for supplier selection, enhancing supply chain security. ID.RA-10 integrates supplier risk into the broader risk assessment process.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:27:04 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a4acf920/29273875.mp3" length="18806858" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1170</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.RA-10 involves conducting risk assessments of critical suppliers before engaging them, evaluating their cybersecurity practices and supply chain risks. This ensures that suppliers handling sensitive data or vital services meet organizational security requirements. It’s a proactive step to mitigate third-party vulnerabilities.</p><p>This subcategory aligns procurement with risk priorities, focusing on suppliers whose failure could disrupt operations or expose assets. It provides a structured basis for supplier selection, enhancing supply chain security. ID.RA-10 integrates supplier risk into the broader risk assessment process.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a4acf920/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.IM-01 - Learning from Cybersecurity Evaluations</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>ID.IM-01 - Learning from Cybersecurity Evaluations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">477648e4-81ff-490a-adf7-39758094ea9a</guid>
      <link>https://share.transistor.fm/s/ad987e94</link>
      <description>
        <![CDATA[<p>ID.IM-01 focuses on identifying improvements to cybersecurity risk management through evaluations, such as self-assessments or third-party audits. These reviews consider current threats and compliance requirements, pinpointing gaps in processes or controls. It drives continuous enhancement of the organization’s security posture.</p><p>This subcategory supports a culture of learning by using evaluation findings to refine strategies and practices, ensuring they remain effective. It leverages both internal and external perspectives to address weaknesses proactively. ID.IM-01 fosters ongoing improvement through structured feedback.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.IM-01 focuses on identifying improvements to cybersecurity risk management through evaluations, such as self-assessments or third-party audits. These reviews consider current threats and compliance requirements, pinpointing gaps in processes or controls. It drives continuous enhancement of the organization’s security posture.</p><p>This subcategory supports a culture of learning by using evaluation findings to refine strategies and practices, ensuring they remain effective. It leverages both internal and external perspectives to address weaknesses proactively. ID.IM-01 fosters ongoing improvement through structured feedback.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:27:39 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ad987e94/bffe302d.mp3" length="19113632" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1189</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.IM-01 focuses on identifying improvements to cybersecurity risk management through evaluations, such as self-assessments or third-party audits. These reviews consider current threats and compliance requirements, pinpointing gaps in processes or controls. It drives continuous enhancement of the organization’s security posture.</p><p>This subcategory supports a culture of learning by using evaluation findings to refine strategies and practices, ensuring they remain effective. It leverages both internal and external perspectives to address weaknesses proactively. ID.IM-01 fosters ongoing improvement through structured feedback.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ad987e94/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.IM-02 - Improving Through Security Tests and Exercises </title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>ID.IM-02 - Improving Through Security Tests and Exercises </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b3874250-6ffb-45d1-9bbd-992cbab45979</guid>
      <link>https://share.transistor.fm/s/ee531b00</link>
      <description>
        <![CDATA[<p>ID.IM-02 identifies improvements from security tests and exercises, like penetration testing or incident response simulations, often involving suppliers and third parties. These activities reveal vulnerabilities and response gaps, providing actionable insights for enhancement. Collaboration with external partners ensures a comprehensive view of shared risks.</p><p>This subcategory strengthens preparedness by using exercise outcomes to refine incident response, business continuity, and recovery plans. It encourages regular testing to keep security measures current and effective. ID.IM-02 drives improvement through practical, scenario-based learning.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.IM-02 identifies improvements from security tests and exercises, like penetration testing or incident response simulations, often involving suppliers and third parties. These activities reveal vulnerabilities and response gaps, providing actionable insights for enhancement. Collaboration with external partners ensures a comprehensive view of shared risks.</p><p>This subcategory strengthens preparedness by using exercise outcomes to refine incident response, business continuity, and recovery plans. It encourages regular testing to keep security measures current and effective. ID.IM-02 drives improvement through practical, scenario-based learning.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:28:10 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ee531b00/d066050b.mp3" length="18498404" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1151</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.IM-02 identifies improvements from security tests and exercises, like penetration testing or incident response simulations, often involving suppliers and third parties. These activities reveal vulnerabilities and response gaps, providing actionable insights for enhancement. Collaboration with external partners ensures a comprehensive view of shared risks.</p><p>This subcategory strengthens preparedness by using exercise outcomes to refine incident response, business continuity, and recovery plans. It encourages regular testing to keep security measures current and effective. ID.IM-02 drives improvement through practical, scenario-based learning.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ee531b00/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.IM-03 - Enhancing Processes from Operational Insights</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>ID.IM-03 - Enhancing Processes from Operational Insights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">304fc41f-7d3c-48b6-af76-a0c442b82e9e</guid>
      <link>https://share.transistor.fm/s/d8ebc32d</link>
      <description>
        <![CDATA[<p>ID.IM-03 seeks improvements from the day-to-day execution of cybersecurity processes, procedures, and activities, capturing lessons learned in real-world operations. This includes reviewing metrics or conducting supplier collaboration sessions to assess performance over time. It ensures that operational experience informs security enhancements.</p><p>This subcategory promotes a feedback loop where practical insights refine policies and practices, reducing inefficiencies or risks. It supports ongoing adjustment by tying improvements to measurable outcomes. ID.IM-03 keeps cybersecurity aligned with operational realities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.IM-03 seeks improvements from the day-to-day execution of cybersecurity processes, procedures, and activities, capturing lessons learned in real-world operations. This includes reviewing metrics or conducting supplier collaboration sessions to assess performance over time. It ensures that operational experience informs security enhancements.</p><p>This subcategory promotes a feedback loop where practical insights refine policies and practices, reducing inefficiencies or risks. It supports ongoing adjustment by tying improvements to measurable outcomes. ID.IM-03 keeps cybersecurity aligned with operational realities.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:28:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d8ebc32d/c514d67d.mp3" length="19051362" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1185</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.IM-03 seeks improvements from the day-to-day execution of cybersecurity processes, procedures, and activities, capturing lessons learned in real-world operations. This includes reviewing metrics or conducting supplier collaboration sessions to assess performance over time. It ensures that operational experience informs security enhancements.</p><p>This subcategory promotes a feedback loop where practical insights refine policies and practices, reducing inefficiencies or risks. It supports ongoing adjustment by tying improvements to measurable outcomes. ID.IM-03 keeps cybersecurity aligned with operational realities.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d8ebc32d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>ID.IM-04 - Strengthening Incident Response Plans</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>ID.IM-04 - Strengthening Incident Response Plans</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c47cc0f-0008-4d6f-aa9e-a7ea4157fe42</guid>
      <link>https://share.transistor.fm/s/dc8e5a07</link>
      <description>
        <![CDATA[<p>ID.IM-04 involves establishing, sharing, and maintaining cybersecurity plans—like incident response or disaster recovery—that impact operations, with a focus on continuous improvement. These plans include clear processes, contacts, and escalation criteria to manage adverse events effectively. Regular updates ensure they address evolving threats and organizational needs.</p><p>This subcategory enhances resilience by ensuring plans are actionable and well-understood by those responsible for execution, with improvements drawn from reviews or incidents. It integrates planning into risk management, keeping operations secure and recoverable. ID.IM-04 sustains a proactive, adaptable approach to cybersecurity preparedness.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ID.IM-04 involves establishing, sharing, and maintaining cybersecurity plans—like incident response or disaster recovery—that impact operations, with a focus on continuous improvement. These plans include clear processes, contacts, and escalation criteria to manage adverse events effectively. Regular updates ensure they address evolving threats and organizational needs.</p><p>This subcategory enhances resilience by ensuring plans are actionable and well-understood by those responsible for execution, with improvements drawn from reviews or incidents. It integrates planning into risk management, keeping operations secure and recoverable. ID.IM-04 sustains a proactive, adaptable approach to cybersecurity preparedness.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:29:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dc8e5a07/ecee85d4.mp3" length="18465375" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1148</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ID.IM-04 involves establishing, sharing, and maintaining cybersecurity plans—like incident response or disaster recovery—that impact operations, with a focus on continuous improvement. These plans include clear processes, contacts, and escalation criteria to manage adverse events effectively. Regular updates ensure they address evolving threats and organizational needs.</p><p>This subcategory enhances resilience by ensuring plans are actionable and well-understood by those responsible for execution, with improvements drawn from reviews or incidents. It integrates planning into risk management, keeping operations secure and recoverable. ID.IM-04 sustains a proactive, adaptable approach to cybersecurity preparedness.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dc8e5a07/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.AA-01 - Managing Identities and Credentials</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>PR.AA-01 - Managing Identities and Credentials</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">93be9ece-69d0-4851-babb-decb007b4957</guid>
      <link>https://share.transistor.fm/s/e3f603b3</link>
      <description>
        <![CDATA[<p>PR.AA-01 focuses on the management of identities and credentials for all authorized entities—users, services, and hardware—within the organization’s control. This involves issuing, tracking, and revoking access credentials, such as cryptographic certificates or device identifiers, to ensure only legitimate entities can interact with systems and assets. Proper management reduces the risk of unauthorized access stemming from lost or compromised credentials.</p><p>This subcategory establishes a foundation for secure access by integrating identity management into daily operations, with processes for requesting and approving access aligned with system owner permissions. It enhances security by maintaining a clear inventory of authorized entities, supporting audits and rapid response to incidents. PR.AA-01 is a critical step in safeguarding logical and physical assets.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.AA-01 focuses on the management of identities and credentials for all authorized entities—users, services, and hardware—within the organization’s control. This involves issuing, tracking, and revoking access credentials, such as cryptographic certificates or device identifiers, to ensure only legitimate entities can interact with systems and assets. Proper management reduces the risk of unauthorized access stemming from lost or compromised credentials.</p><p>This subcategory establishes a foundation for secure access by integrating identity management into daily operations, with processes for requesting and approving access aligned with system owner permissions. It enhances security by maintaining a clear inventory of authorized entities, supporting audits and rapid response to incidents. PR.AA-01 is a critical step in safeguarding logical and physical assets.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:57:09 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e3f603b3/6ba66a48.mp3" length="18470806" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1149</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.AA-01 focuses on the management of identities and credentials for all authorized entities—users, services, and hardware—within the organization’s control. This involves issuing, tracking, and revoking access credentials, such as cryptographic certificates or device identifiers, to ensure only legitimate entities can interact with systems and assets. Proper management reduces the risk of unauthorized access stemming from lost or compromised credentials.</p><p>This subcategory establishes a foundation for secure access by integrating identity management into daily operations, with processes for requesting and approving access aligned with system owner permissions. It enhances security by maintaining a clear inventory of authorized entities, supporting audits and rapid response to incidents. PR.AA-01 is a critical step in safeguarding logical and physical assets.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e3f603b3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.AA-02 - Verifying Identities for Credential Issuance</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>PR.AA-02 - Verifying Identities for Credential Issuance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ffd11ee5-9a92-478a-a47a-559df0456614</guid>
      <link>https://share.transistor.fm/s/baba1fb5</link>
      <description>
        <![CDATA[<p>PR.AA-02 requires verifying the identities of individuals or entities before binding them to credentials, tailoring the proofing process to the context of their intended interactions. This might involve checking government-issued IDs for personnel or ensuring unique credentials are issued without sharing, confirming legitimacy at enrollment. It ensures that credentials accurately represent authorized users or devices.</p><p>This subcategory strengthens authentication by establishing trust in the identity-credential relationship, reducing the risk of impersonation or misuse. It aligns proofing rigor with the sensitivity of interactions, enhancing security for high-risk access scenarios. PR.AA-02 builds a reliable identity foundation for access control measures.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.AA-02 requires verifying the identities of individuals or entities before binding them to credentials, tailoring the proofing process to the context of their intended interactions. This might involve checking government-issued IDs for personnel or ensuring unique credentials are issued without sharing, confirming legitimacy at enrollment. It ensures that credentials accurately represent authorized users or devices.</p><p>This subcategory strengthens authentication by establishing trust in the identity-credential relationship, reducing the risk of impersonation or misuse. It aligns proofing rigor with the sensitivity of interactions, enhancing security for high-risk access scenarios. PR.AA-02 builds a reliable identity foundation for access control measures.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:57:57 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/baba1fb5/4603d745.mp3" length="19100262" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1188</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.AA-02 requires verifying the identities of individuals or entities before binding them to credentials, tailoring the proofing process to the context of their intended interactions. This might involve checking government-issued IDs for personnel or ensuring unique credentials are issued without sharing, confirming legitimacy at enrollment. It ensures that credentials accurately represent authorized users or devices.</p><p>This subcategory strengthens authentication by establishing trust in the identity-credential relationship, reducing the risk of impersonation or misuse. It aligns proofing rigor with the sensitivity of interactions, enhancing security for high-risk access scenarios. PR.AA-02 builds a reliable identity foundation for access control measures.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/baba1fb5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.AA-03 - Authenticating Users and Devices </title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>PR.AA-03 - Authenticating Users and Devices </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">53eb7c09-d088-4c72-a59d-5a83d8293de3</guid>
      <link>https://share.transistor.fm/s/74012737</link>
      <description>
        <![CDATA[<p>PR.AA-03 mandates the authentication of users, services, and hardware to verify their identity before granting access to organizational assets. This can include multifactor authentication (MFA), strong password policies, or periodic re-authentication, particularly in high-risk environments like zero trust architectures. It ensures that only verified entities can operate within the system.</p><p>This subcategory bolsters security by enforcing robust authentication mechanisms tailored to risk levels, preventing unauthorized access even if credentials are compromised. It supports emergency access protocols to maintain safety-critical operations, balancing security with functionality. PR.AA-03 is a key defense against identity-based threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.AA-03 mandates the authentication of users, services, and hardware to verify their identity before granting access to organizational assets. This can include multifactor authentication (MFA), strong password policies, or periodic re-authentication, particularly in high-risk environments like zero trust architectures. It ensures that only verified entities can operate within the system.</p><p>This subcategory bolsters security by enforcing robust authentication mechanisms tailored to risk levels, preventing unauthorized access even if credentials are compromised. It supports emergency access protocols to maintain safety-critical operations, balancing security with functionality. PR.AA-03 is a key defense against identity-based threats.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:58:25 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/74012737/b8206ffd.mp3" length="18840698" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1172</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.AA-03 mandates the authentication of users, services, and hardware to verify their identity before granting access to organizational assets. This can include multifactor authentication (MFA), strong password policies, or periodic re-authentication, particularly in high-risk environments like zero trust architectures. It ensures that only verified entities can operate within the system.</p><p>This subcategory bolsters security by enforcing robust authentication mechanisms tailored to risk levels, preventing unauthorized access even if credentials are compromised. It supports emergency access protocols to maintain safety-critical operations, balancing security with functionality. PR.AA-03 is a key defense against identity-based threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/74012737/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.AA-04 - Securing Identity Assertions</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>PR.AA-04 - Securing Identity Assertions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">748c0ecc-c1f0-4720-bc73-4572cbdc8a8c</guid>
      <link>https://share.transistor.fm/s/8d72ffff</link>
      <description>
        <![CDATA[<p>PR.AA-04 focuses on securing identity assertions—digital statements used to convey authentication and user information—across systems like single sign-on or federated environments. This involves protecting assertions with encryption or digital signatures and verifying their integrity to prevent tampering or spoofing. It ensures trust in identity data as it moves between systems.</p><p>This subcategory enhances interoperability by adopting standards-based approaches for generating and validating assertions, maintaining security across diverse platforms. It reduces vulnerabilities in identity transmission, safeguarding access to sensitive resources. PR.AA-04 strengthens the reliability of identity management in complex IT ecosystems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.AA-04 focuses on securing identity assertions—digital statements used to convey authentication and user information—across systems like single sign-on or federated environments. This involves protecting assertions with encryption or digital signatures and verifying their integrity to prevent tampering or spoofing. It ensures trust in identity data as it moves between systems.</p><p>This subcategory enhances interoperability by adopting standards-based approaches for generating and validating assertions, maintaining security across diverse platforms. It reduces vulnerabilities in identity transmission, safeguarding access to sensitive resources. PR.AA-04 strengthens the reliability of identity management in complex IT ecosystems.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:59:05 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8d72ffff/c0584214.mp3" length="18505490" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1151</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.AA-04 focuses on securing identity assertions—digital statements used to convey authentication and user information—across systems like single sign-on or federated environments. This involves protecting assertions with encryption or digital signatures and verifying their integrity to prevent tampering or spoofing. It ensures trust in identity data as it moves between systems.</p><p>This subcategory enhances interoperability by adopting standards-based approaches for generating and validating assertions, maintaining security across diverse platforms. It reduces vulnerabilities in identity transmission, safeguarding access to sensitive resources. PR.AA-04 strengthens the reliability of identity management in complex IT ecosystems.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8d72ffff/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.AA-05 - Enforcing Access Control Policies</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>PR.AA-05 - Enforcing Access Control Policies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">31e844e9-7523-43b7-8cef-9e871269d9df</guid>
      <link>https://share.transistor.fm/s/c3fd5c2d</link>
      <description>
        <![CDATA[<p>PR.AA-05 establishes a policy-driven approach to managing access permissions, ensuring they are granted based on need (least privilege) and distinct roles (separation of duties). This includes regular reviews to revoke unnecessary privileges, such as when roles change, and enforcement through technical controls. It minimizes the risk of excessive or conflicting access rights.</p><p>This subcategory supports a secure environment by aligning authorizations with risk levels, considering factors like geolocation or device health in dynamic systems like zero trust. It ensures accountability through periodic audits, maintaining proper access boundaries across the organization. PR.AA-05 balances usability with stringent access control.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.AA-05 establishes a policy-driven approach to managing access permissions, ensuring they are granted based on need (least privilege) and distinct roles (separation of duties). This includes regular reviews to revoke unnecessary privileges, such as when roles change, and enforcement through technical controls. It minimizes the risk of excessive or conflicting access rights.</p><p>This subcategory supports a secure environment by aligning authorizations with risk levels, considering factors like geolocation or device health in dynamic systems like zero trust. It ensures accountability through periodic audits, maintaining proper access boundaries across the organization. PR.AA-05 balances usability with stringent access control.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 22:59:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c3fd5c2d/42b55083.mp3" length="18430680" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1146</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.AA-05 establishes a policy-driven approach to managing access permissions, ensuring they are granted based on need (least privilege) and distinct roles (separation of duties). This includes regular reviews to revoke unnecessary privileges, such as when roles change, and enforcement through technical controls. It minimizes the risk of excessive or conflicting access rights.</p><p>This subcategory supports a secure environment by aligning authorizations with risk levels, considering factors like geolocation or device health in dynamic systems like zero trust. It ensures accountability through periodic audits, maintaining proper access boundaries across the organization. PR.AA-05 balances usability with stringent access control.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c3fd5c2d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.AA-06 - Controlling Physical Access to Assets</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>PR.AA-06 - Controlling Physical Access to Assets</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">33f160b0-486a-4153-92e3-5e13107f3e15</guid>
      <link>https://share.transistor.fm/s/d92a0ad0</link>
      <description>
        <![CDATA[<p>PR.AA-06 addresses the management and monitoring of physical access to assets, using controls like security guards, cameras, and locked entries to restrict entry based on risk levels. High-risk areas receive enhanced protections, while guests or vendors are escorted to limit exposure. It prevents unauthorized physical interactions that could compromise systems or data.</p><p>This subcategory aligns physical security with cybersecurity goals, ensuring that facilities housing critical assets are safeguarded against tampering or theft. Continuous monitoring detects anomalies, enabling rapid response to breaches. PR.AA-06 complements logical access controls with robust physical defenses.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.AA-06 addresses the management and monitoring of physical access to assets, using controls like security guards, cameras, and locked entries to restrict entry based on risk levels. High-risk areas receive enhanced protections, while guests or vendors are escorted to limit exposure. It prevents unauthorized physical interactions that could compromise systems or data.</p><p>This subcategory aligns physical security with cybersecurity goals, ensuring that facilities housing critical assets are safeguarded against tampering or theft. Continuous monitoring detects anomalies, enabling rapid response to breaches. PR.AA-06 complements logical access controls with robust physical defenses.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:00:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d92a0ad0/7e069d51.mp3" length="18131843" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1128</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.AA-06 addresses the management and monitoring of physical access to assets, using controls like security guards, cameras, and locked entries to restrict entry based on risk levels. High-risk areas receive enhanced protections, while guests or vendors are escorted to limit exposure. It prevents unauthorized physical interactions that could compromise systems or data.</p><p>This subcategory aligns physical security with cybersecurity goals, ensuring that facilities housing critical assets are safeguarded against tampering or theft. Continuous monitoring detects anomalies, enabling rapid response to breaches. PR.AA-06 complements logical access controls with robust physical defenses.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d92a0ad0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.AT-01 - Training Personnel on Cybersecurity Basics</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>PR.AT-01 - Training Personnel on Cybersecurity Basics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6f4e376b-f432-47a3-86da-1ac41640fdbc</guid>
      <link>https://share.transistor.fm/s/da77ae10</link>
      <description>
        <![CDATA[<p>PR.AT-01 ensures that all personnel—employees, contractors, and partners—receive basic cybersecurity awareness and training to handle tasks securely. This includes recognizing phishing attempts, adhering to acceptable use policies, and practicing cyber hygiene like password management. It builds a foundational layer of human-centric security across the organization.</p><p>This subcategory reinforces a security-conscious culture by explaining policy violation consequences and testing user understanding periodically. Annual refreshers keep knowledge current, addressing new threats and practices. PR.AT-01 empowers personnel to act as a first line of defense against common cyber risks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.AT-01 ensures that all personnel—employees, contractors, and partners—receive basic cybersecurity awareness and training to handle tasks securely. This includes recognizing phishing attempts, adhering to acceptable use policies, and practicing cyber hygiene like password management. It builds a foundational layer of human-centric security across the organization.</p><p>This subcategory reinforces a security-conscious culture by explaining policy violation consequences and testing user understanding periodically. Annual refreshers keep knowledge current, addressing new threats and practices. PR.AT-01 empowers personnel to act as a first line of defense against common cyber risks.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:00:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/da77ae10/c8df888c.mp3" length="17186007" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1068</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.AT-01 ensures that all personnel—employees, contractors, and partners—receive basic cybersecurity awareness and training to handle tasks securely. This includes recognizing phishing attempts, adhering to acceptable use policies, and practicing cyber hygiene like password management. It builds a foundational layer of human-centric security across the organization.</p><p>This subcategory reinforces a security-conscious culture by explaining policy violation consequences and testing user understanding periodically. Annual refreshers keep knowledge current, addressing new threats and practices. PR.AT-01 empowers personnel to act as a first line of defense against common cyber risks.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/da77ae10/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.AT-02 - Preparing Specialists for Cybersecurity Roles </title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>PR.AT-02 - Preparing Specialists for Cybersecurity Roles </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">426ad563-6896-464b-b2b4-0d4bdfdd7985</guid>
      <link>https://share.transistor.fm/s/114a1009</link>
      <description>
        <![CDATA[<p>PR.AT-02 targets individuals in specialized roles—like cybersecurity staff, finance personnel, or senior leaders—with tailored training to address role-specific risks. This advanced education ensures they can manage complex tasks, such as handling critical data or responding to incidents, with security in mind. It extends beyond general awareness to meet unique job demands.</p><p>This subcategory enhances expertise by assessing specialized knowledge regularly and requiring annual refreshers to introduce evolving practices. It includes third parties in these roles, ensuring consistent competency across the ecosystem. PR.AT-02 strengthens the organization’s ability to manage high-stakes cybersecurity challenges.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.AT-02 targets individuals in specialized roles—like cybersecurity staff, finance personnel, or senior leaders—with tailored training to address role-specific risks. This advanced education ensures they can manage complex tasks, such as handling critical data or responding to incidents, with security in mind. It extends beyond general awareness to meet unique job demands.</p><p>This subcategory enhances expertise by assessing specialized knowledge regularly and requiring annual refreshers to introduce evolving practices. It includes third parties in these roles, ensuring consistent competency across the ecosystem. PR.AT-02 strengthens the organization’s ability to manage high-stakes cybersecurity challenges.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:01:42 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/114a1009/9f965f38.mp3" length="19155434" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1192</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.AT-02 targets individuals in specialized roles—like cybersecurity staff, finance personnel, or senior leaders—with tailored training to address role-specific risks. This advanced education ensures they can manage complex tasks, such as handling critical data or responding to incidents, with security in mind. It extends beyond general awareness to meet unique job demands.</p><p>This subcategory enhances expertise by assessing specialized knowledge regularly and requiring annual refreshers to introduce evolving practices. It includes third parties in these roles, ensuring consistent competency across the ecosystem. PR.AT-02 strengthens the organization’s ability to manage high-stakes cybersecurity challenges.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/114a1009/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.DS-01 - Protecting Data-at-Rest  </title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>PR.DS-01 - Protecting Data-at-Rest  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce21f5e0-aa78-4483-baca-29a393cbb249</guid>
      <link>https://share.transistor.fm/s/fe8e8a69</link>
      <description>
        <![CDATA[<p>PR.DS-01 focuses on securing data-at-rest—stored in files, databases, or devices—using encryption, digital signatures, and physical controls to protect confidentiality, integrity, and availability. This includes full disk encryption for endpoints and restricting removable media to prevent unauthorized access or exfiltration. It safeguards data when it’s not actively being used.</p><p>This subcategory ensures that stored data remains trustworthy and accessible only to authorized parties, reducing risks like theft or corruption. It aligns protection measures with the organization’s risk strategy, prioritizing sensitive data types. PR.DS-01 forms a critical layer of defense for persistent data assets.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.DS-01 focuses on securing data-at-rest—stored in files, databases, or devices—using encryption, digital signatures, and physical controls to protect confidentiality, integrity, and availability. This includes full disk encryption for endpoints and restricting removable media to prevent unauthorized access or exfiltration. It safeguards data when it’s not actively being used.</p><p>This subcategory ensures that stored data remains trustworthy and accessible only to authorized parties, reducing risks like theft or corruption. It aligns protection measures with the organization’s risk strategy, prioritizing sensitive data types. PR.DS-01 forms a critical layer of defense for persistent data assets.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:02:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fe8e8a69/3ad770db.mp3" length="17466440" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1086</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.DS-01 focuses on securing data-at-rest—stored in files, databases, or devices—using encryption, digital signatures, and physical controls to protect confidentiality, integrity, and availability. This includes full disk encryption for endpoints and restricting removable media to prevent unauthorized access or exfiltration. It safeguards data when it’s not actively being used.</p><p>This subcategory ensures that stored data remains trustworthy and accessible only to authorized parties, reducing risks like theft or corruption. It aligns protection measures with the organization’s risk strategy, prioritizing sensitive data types. PR.DS-01 forms a critical layer of defense for persistent data assets.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fe8e8a69/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.DS-02 - Securing Data-in-Transit</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>PR.DS-02 - Securing Data-in-Transit</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dcc2ba02-08e6-45a8-8896-686855e43e90</guid>
      <link>https://share.transistor.fm/s/81fa2017</link>
      <description>
        <![CDATA[<p>PR.DS-02 secures data-in-transit—moving across networks or communications—using encryption and integrity checks like digital signatures to prevent interception or alteration. This includes blocking or encrypting sensitive outbound emails and restricting access to personal communication tools on organizational systems. It ensures data remains protected during transmission.</p><p>This subcategory mitigates risks like eavesdropping or data leaks by enforcing secure channels and preventing sensitive data reuse in non-production environments. It aligns with risk priorities, applying stronger controls to high-value transmissions. PR.DS-02 safeguards data as it travels within and beyond the organization.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.DS-02 secures data-in-transit—moving across networks or communications—using encryption and integrity checks like digital signatures to prevent interception or alteration. This includes blocking or encrypting sensitive outbound emails and restricting access to personal communication tools on organizational systems. It ensures data remains protected during transmission.</p><p>This subcategory mitigates risks like eavesdropping or data leaks by enforcing secure channels and preventing sensitive data reuse in non-production environments. It aligns with risk priorities, applying stronger controls to high-value transmissions. PR.DS-02 safeguards data as it travels within and beyond the organization.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:02:44 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/81fa2017/459658f8.mp3" length="17635713" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1097</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.DS-02 secures data-in-transit—moving across networks or communications—using encryption and integrity checks like digital signatures to prevent interception or alteration. This includes blocking or encrypting sensitive outbound emails and restricting access to personal communication tools on organizational systems. It ensures data remains protected during transmission.</p><p>This subcategory mitigates risks like eavesdropping or data leaks by enforcing secure channels and preventing sensitive data reuse in non-production environments. It aligns with risk priorities, applying stronger controls to high-value transmissions. PR.DS-02 safeguards data as it travels within and beyond the organization.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/81fa2017/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.DS-10 - Safeguarding Data-in-Use </title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>PR.DS-10 - Safeguarding Data-in-Use </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">10910270-708a-48a8-97e6-4d75ce47566c</guid>
      <link>https://share.transistor.fm/s/6b42e281</link>
      <description>
        <![CDATA[<p>PR.DS-10 protects data-in-use—actively processed in memory or applications—by removing it when no longer needed and isolating it from other users or processes on the same platform. This prevents unauthorized access or leakage during active operations, a critical concern for sensitive computations. It ensures data remains secure while being manipulated.</p><p>This subcategory enhances runtime security by implementing controls that safeguard data integrity and confidentiality in real-time environments. It aligns with risk strategies to protect high-value data during processing, reducing exposure. PR.DS-10 completes the triad of data protection across its states.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.DS-10 protects data-in-use—actively processed in memory or applications—by removing it when no longer needed and isolating it from other users or processes on the same platform. This prevents unauthorized access or leakage during active operations, a critical concern for sensitive computations. It ensures data remains secure while being manipulated.</p><p>This subcategory enhances runtime security by implementing controls that safeguard data integrity and confidentiality in real-time environments. It aligns with risk strategies to protect high-value data during processing, reducing exposure. PR.DS-10 completes the triad of data protection across its states.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:03:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6b42e281/6c2bb411.mp3" length="17953363" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1116</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.DS-10 protects data-in-use—actively processed in memory or applications—by removing it when no longer needed and isolating it from other users or processes on the same platform. This prevents unauthorized access or leakage during active operations, a critical concern for sensitive computations. It ensures data remains secure while being manipulated.</p><p>This subcategory enhances runtime security by implementing controls that safeguard data integrity and confidentiality in real-time environments. It aligns with risk strategies to protect high-value data during processing, reducing exposure. PR.DS-10 completes the triad of data protection across its states.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6b42e281/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.DS-11 - Ensuring Reliable Data Backups</title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>PR.DS-11 - Ensuring Reliable Data Backups</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d3b3ae4b-949e-4ecd-8f20-347e86ba2988</guid>
      <link>https://share.transistor.fm/s/1b91c33c</link>
      <description>
        <![CDATA[<p>PR.DS-11 ensures that data backups are regularly created, securely stored, and tested to maintain availability and integrity for recovery purposes. This includes near-real-time backups for critical data, offline storage to protect against incidents, and annual testing to verify restorability. It supports resilience by enabling rapid restoration after disruptions.</p><p>This subcategory mitigates risks like data loss from ransomware or disasters by enforcing geographic separation and secure storage practices. It aligns backup strategies with organizational priorities, ensuring critical data is recoverable. PR.DS-11 provides a safety net for operational continuity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.DS-11 ensures that data backups are regularly created, securely stored, and tested to maintain availability and integrity for recovery purposes. This includes near-real-time backups for critical data, offline storage to protect against incidents, and annual testing to verify restorability. It supports resilience by enabling rapid restoration after disruptions.</p><p>This subcategory mitigates risks like data loss from ransomware or disasters by enforcing geographic separation and secure storage practices. It aligns backup strategies with organizational priorities, ensuring critical data is recoverable. PR.DS-11 provides a safety net for operational continuity.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:03:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1b91c33c/a0f50da4.mp3" length="24939974" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1553</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.DS-11 ensures that data backups are regularly created, securely stored, and tested to maintain availability and integrity for recovery purposes. This includes near-real-time backups for critical data, offline storage to protect against incidents, and annual testing to verify restorability. It supports resilience by enabling rapid restoration after disruptions.</p><p>This subcategory mitigates risks like data loss from ransomware or disasters by enforcing geographic separation and secure storage practices. It aligns backup strategies with organizational priorities, ensuring critical data is recoverable. PR.DS-11 provides a safety net for operational continuity.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1b91c33c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.PS-01 - Implementing Configuration Management </title>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>PR.PS-01 - Implementing Configuration Management </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d0a6ee92-86d2-435e-a6bb-4def2f7def84</guid>
      <link>https://share.transistor.fm/s/dc3adcb3</link>
      <description>
        <![CDATA[<p>PR.PS-01 establishes and applies configuration management practices to maintain secure baselines for hardware, software, and services, adhering to the principle of least functionality. This involves testing and deploying hardened configurations while reviewing defaults for potential risks during installations or upgrades. It ensures platforms are set up to minimize vulnerabilities.</p><p>This subcategory enhances security by monitoring systems for deviations from approved baselines, enabling quick correction of misconfigurations. It aligns configurations with organizational risk strategies, reducing the attack surface. PR.PS-01 provides a structured approach to platform security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.PS-01 establishes and applies configuration management practices to maintain secure baselines for hardware, software, and services, adhering to the principle of least functionality. This involves testing and deploying hardened configurations while reviewing defaults for potential risks during installations or upgrades. It ensures platforms are set up to minimize vulnerabilities.</p><p>This subcategory enhances security by monitoring systems for deviations from approved baselines, enabling quick correction of misconfigurations. It aligns configurations with organizational risk strategies, reducing the attack surface. PR.PS-01 provides a structured approach to platform security.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:04:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dc3adcb3/e30de41c.mp3" length="17117457" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1064</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.PS-01 establishes and applies configuration management practices to maintain secure baselines for hardware, software, and services, adhering to the principle of least functionality. This involves testing and deploying hardened configurations while reviewing defaults for potential risks during installations or upgrades. It ensures platforms are set up to minimize vulnerabilities.</p><p>This subcategory enhances security by monitoring systems for deviations from approved baselines, enabling quick correction of misconfigurations. It aligns configurations with organizational risk strategies, reducing the attack surface. PR.PS-01 provides a structured approach to platform security.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dc3adcb3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.PS-02 - Maintaining Software Security</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>PR.PS-02 - Maintaining Software Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0cec3af5-3db3-4c88-ac9f-8c1eb2f01521</guid>
      <link>https://share.transistor.fm/s/6bd09326</link>
      <description>
        <![CDATA[<p>PR.PS-02 focuses on maintaining, replacing, or removing software based on risk, including timely patching, updating container images, and phasing out end-of-life versions. This ensures software remains supported and secure, reducing vulnerabilities from outdated or unauthorized applications. It includes plans for obsolescence to manage lifecycle risks.</p><p>This subcategory strengthens resilience by uninstalling unnecessary or risky software components that could be exploited, aligning updates with vulnerability management timelines. It balances security with operational needs, ensuring only current, necessary software persists. PR.PS-02 keeps the software environment lean and protected.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.PS-02 focuses on maintaining, replacing, or removing software based on risk, including timely patching, updating container images, and phasing out end-of-life versions. This ensures software remains supported and secure, reducing vulnerabilities from outdated or unauthorized applications. It includes plans for obsolescence to manage lifecycle risks.</p><p>This subcategory strengthens resilience by uninstalling unnecessary or risky software components that could be exploited, aligning updates with vulnerability management timelines. It balances security with operational needs, ensuring only current, necessary software persists. PR.PS-02 keeps the software environment lean and protected.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:04:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6bd09326/e6290d30.mp3" length="15940057" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>991</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.PS-02 focuses on maintaining, replacing, or removing software based on risk, including timely patching, updating container images, and phasing out end-of-life versions. This ensures software remains supported and secure, reducing vulnerabilities from outdated or unauthorized applications. It includes plans for obsolescence to manage lifecycle risks.</p><p>This subcategory strengthens resilience by uninstalling unnecessary or risky software components that could be exploited, aligning updates with vulnerability management timelines. It balances security with operational needs, ensuring only current, necessary software persists. PR.PS-02 keeps the software environment lean and protected.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6bd09326/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.PS-03 - Managing Hardware Lifecycles</title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>PR.PS-03 - Managing Hardware Lifecycles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce4938e4-9fa9-4f26-b051-8ac542173523</guid>
      <link>https://share.transistor.fm/s/4cb4bc57</link>
      <description>
        <![CDATA[<p>PR.PS-03 ensures hardware is maintained, replaced, or securely removed based on its security capabilities and risk profile, such as replacing devices unable to support modern software protections. This includes planning for end-of-life support and disposing of hardware responsibly to prevent data leakage. It keeps the physical infrastructure secure and functional.</p><p>This subcategory reduces risks by ensuring hardware meets evolving security needs, with auditable disposal processes to maintain accountability. It aligns hardware management with organizational risk strategies, prioritizing critical systems. PR.PS-03 sustains a secure hardware lifecycle.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.PS-03 ensures hardware is maintained, replaced, or securely removed based on its security capabilities and risk profile, such as replacing devices unable to support modern software protections. This includes planning for end-of-life support and disposing of hardware responsibly to prevent data leakage. It keeps the physical infrastructure secure and functional.</p><p>This subcategory reduces risks by ensuring hardware meets evolving security needs, with auditable disposal processes to maintain accountability. It aligns hardware management with organizational risk strategies, prioritizing critical systems. PR.PS-03 sustains a secure hardware lifecycle.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:05:23 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4cb4bc57/75180d50.mp3" length="15831387" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>984</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.PS-03 ensures hardware is maintained, replaced, or securely removed based on its security capabilities and risk profile, such as replacing devices unable to support modern software protections. This includes planning for end-of-life support and disposing of hardware responsibly to prevent data leakage. It keeps the physical infrastructure secure and functional.</p><p>This subcategory reduces risks by ensuring hardware meets evolving security needs, with auditable disposal processes to maintain accountability. It aligns hardware management with organizational risk strategies, prioritizing critical systems. PR.PS-03 sustains a secure hardware lifecycle.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4cb4bc57/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.PS-04 - Enabling Continuous Monitoring with Logs </title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>PR.PS-04 - Enabling Continuous Monitoring with Logs </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5a852c67-2d38-41c5-971a-f0325d9c5fb6</guid>
      <link>https://share.transistor.fm/s/75e70884</link>
      <description>
        <![CDATA[<p>PR.PS-04 requires configuring systems, applications, and services to generate log records that support continuous monitoring, ensuring visibility into activities and events. This includes securely sharing logs with centralized infrastructure for analysis, tailored to needs like zero trust architectures. It provides the data needed to detect and respond to threats.</p><p>This subcategory enhances security by enabling real-time oversight of platform behavior, critical for identifying anomalies or breaches. It aligns logging with risk priorities, ensuring comprehensive coverage across IT and cloud environments. PR.PS-04 underpins proactive threat detection and response.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.PS-04 requires configuring systems, applications, and services to generate log records that support continuous monitoring, ensuring visibility into activities and events. This includes securely sharing logs with centralized infrastructure for analysis, tailored to needs like zero trust architectures. It provides the data needed to detect and respond to threats.</p><p>This subcategory enhances security by enabling real-time oversight of platform behavior, critical for identifying anomalies or breaches. It aligns logging with risk priorities, ensuring comprehensive coverage across IT and cloud environments. PR.PS-04 underpins proactive threat detection and response.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:05:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/75e70884/c9ef1614.mp3" length="16760941" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1042</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.PS-04 requires configuring systems, applications, and services to generate log records that support continuous monitoring, ensuring visibility into activities and events. This includes securely sharing logs with centralized infrastructure for analysis, tailored to needs like zero trust architectures. It provides the data needed to detect and respond to threats.</p><p>This subcategory enhances security by enabling real-time oversight of platform behavior, critical for identifying anomalies or breaches. It aligns logging with risk priorities, ensuring comprehensive coverage across IT and cloud environments. PR.PS-04 underpins proactive threat detection and response.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/75e70884/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.PS-05 - Preventing Unauthorized Software Use</title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>PR.PS-05 - Preventing Unauthorized Software Use</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2667be87-2e8c-4bbd-a95b-a7ff811a7a9a</guid>
      <link>https://share.transistor.fm/s/c05af9a2</link>
      <description>
        <![CDATA[<p>PR.PS-05 prevents the installation and execution of unauthorized software by restricting platforms to approved applications and verifying software integrity before use. This includes using approved DNS services to block malicious domains and limiting execution to permitted products where risk warrants. It reduces the risk of malware or unvetted software compromising systems.</p><p>This subcategory strengthens control by enforcing a secure software environment, aligning restrictions with organizational risk tolerance. It ensures only trusted, necessary software operates, minimizing vulnerabilities. PR.PS-05 locks down platforms against unauthorized changes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.PS-05 prevents the installation and execution of unauthorized software by restricting platforms to approved applications and verifying software integrity before use. This includes using approved DNS services to block malicious domains and limiting execution to permitted products where risk warrants. It reduces the risk of malware or unvetted software compromising systems.</p><p>This subcategory strengthens control by enforcing a secure software environment, aligning restrictions with organizational risk tolerance. It ensures only trusted, necessary software operates, minimizing vulnerabilities. PR.PS-05 locks down platforms against unauthorized changes.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:06:14 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c05af9a2/b9e9fc47.mp3" length="16463767" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1023</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.PS-05 prevents the installation and execution of unauthorized software by restricting platforms to approved applications and verifying software integrity before use. This includes using approved DNS services to block malicious domains and limiting execution to permitted products where risk warrants. It reduces the risk of malware or unvetted software compromising systems.</p><p>This subcategory strengthens control by enforcing a secure software environment, aligning restrictions with organizational risk tolerance. It ensures only trusted, necessary software operates, minimizing vulnerabilities. PR.PS-05 locks down platforms against unauthorized changes.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c05af9a2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.PS-06 - Securing the Software Development Process</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>PR.PS-06 - Securing the Software Development Process</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4798f14a-18a7-4094-9b80-6e2a2ee23416</guid>
      <link>https://share.transistor.fm/s/a9749440</link>
      <description>
        <![CDATA[<p>PR.PS-06 integrates secure development practices into the software lifecycle, protecting code from tampering and ensuring releases have minimal vulnerabilities. This includes monitoring performance to maintain security in production and securely disposing of software when obsolete. It ensures organization-developed software meets high security standards.</p><p>This subcategory enhances software integrity by embedding cybersecurity from design to deployment, reducing exploitable flaws. It aligns development with risk management goals, supporting ongoing improvement through performance tracking. PR.PS-06 fosters secure, reliable software outputs.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.PS-06 integrates secure development practices into the software lifecycle, protecting code from tampering and ensuring releases have minimal vulnerabilities. This includes monitoring performance to maintain security in production and securely disposing of software when obsolete. It ensures organization-developed software meets high security standards.</p><p>This subcategory enhances software integrity by embedding cybersecurity from design to deployment, reducing exploitable flaws. It aligns development with risk management goals, supporting ongoing improvement through performance tracking. PR.PS-06 fosters secure, reliable software outputs.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:06:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a9749440/e710eddb.mp3" length="17017568" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1058</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.PS-06 integrates secure development practices into the software lifecycle, protecting code from tampering and ensuring releases have minimal vulnerabilities. This includes monitoring performance to maintain security in production and securely disposing of software when obsolete. It ensures organization-developed software meets high security standards.</p><p>This subcategory enhances software integrity by embedding cybersecurity from design to deployment, reducing exploitable flaws. It aligns development with risk management goals, supporting ongoing improvement through performance tracking. PR.PS-06 fosters secure, reliable software outputs.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a9749440/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.IR-01 - Protecting Against Unauthorized Network Access</title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>PR.IR-01 - Protecting Against Unauthorized Network Access</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">229bba25-9976-4c42-888a-9d1306e18c97</guid>
      <link>https://share.transistor.fm/s/646498b5</link>
      <description>
        <![CDATA[<p>PR.IR-01 protects networks and environments from unauthorized logical access by segmenting them based on trust boundaries (e.g., IT, IoT, OT) and restricting communications to essentials. This includes zero trust architectures and endpoint health checks to limit access to verified devices only. It prevents intruders from moving freely within systems.</p><p>This subcategory enhances resilience by isolating critical segments and blocking unnecessary external connections, aligning protections with risk levels. It ensures that only authorized, healthy endpoints interact with resources, reducing exposure. PR.IR-01 fortifies the logical perimeter of the organization’s infrastructure.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.IR-01 protects networks and environments from unauthorized logical access by segmenting them based on trust boundaries (e.g., IT, IoT, OT) and restricting communications to essentials. This includes zero trust architectures and endpoint health checks to limit access to verified devices only. It prevents intruders from moving freely within systems.</p><p>This subcategory enhances resilience by isolating critical segments and blocking unnecessary external connections, aligning protections with risk levels. It ensures that only authorized, healthy endpoints interact with resources, reducing exposure. PR.IR-01 fortifies the logical perimeter of the organization’s infrastructure.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:07:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/646498b5/ef8daf06.mp3" length="18086295" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1125</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.IR-01 protects networks and environments from unauthorized logical access by segmenting them based on trust boundaries (e.g., IT, IoT, OT) and restricting communications to essentials. This includes zero trust architectures and endpoint health checks to limit access to verified devices only. It prevents intruders from moving freely within systems.</p><p>This subcategory enhances resilience by isolating critical segments and blocking unnecessary external connections, aligning protections with risk levels. It ensures that only authorized, healthy endpoints interact with resources, reducing exposure. PR.IR-01 fortifies the logical perimeter of the organization’s infrastructure.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/646498b5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.IR-02 - Shielding Assets from Environmental Threats</title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>PR.IR-02 - Shielding Assets from Environmental Threats</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b313c87e-800b-4e98-be72-24ac9951b91b</guid>
      <link>https://share.transistor.fm/s/d49f644a</link>
      <description>
        <![CDATA[<p>PR.IR-02 safeguards technology assets from environmental threats like flooding, fire, or excessive heat, using physical protections and resilient infrastructure. This includes requiring service providers to mitigate such risks in their operations, ensuring consistent protection across owned and outsourced systems. It maintains asset availability under adverse conditions.</p><p>This subcategory aligns environmental safeguards with risk strategies, prioritizing critical assets to minimize downtime or damage. It ensures operational continuity by addressing natural and facility-based threats proactively. PR.IR-02 complements cybersecurity with physical resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.IR-02 safeguards technology assets from environmental threats like flooding, fire, or excessive heat, using physical protections and resilient infrastructure. This includes requiring service providers to mitigate such risks in their operations, ensuring consistent protection across owned and outsourced systems. It maintains asset availability under adverse conditions.</p><p>This subcategory aligns environmental safeguards with risk strategies, prioritizing critical assets to minimize downtime or damage. It ensures operational continuity by addressing natural and facility-based threats proactively. PR.IR-02 complements cybersecurity with physical resilience.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:07:50 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d49f644a/3fc8fa86.mp3" length="19267027" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1199</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.IR-02 safeguards technology assets from environmental threats like flooding, fire, or excessive heat, using physical protections and resilient infrastructure. This includes requiring service providers to mitigate such risks in their operations, ensuring consistent protection across owned and outsourced systems. It maintains asset availability under adverse conditions.</p><p>This subcategory aligns environmental safeguards with risk strategies, prioritizing critical assets to minimize downtime or damage. It ensures operational continuity by addressing natural and facility-based threats proactively. PR.IR-02 complements cybersecurity with physical resilience.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d49f644a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.IR-03 - Building Resilient Technology Systems</title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>PR.IR-03 - Building Resilient Technology Systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">420a01c7-dd31-4ba2-a9cf-0480b64b0b21</guid>
      <link>https://share.transistor.fm/s/bc53bc9b</link>
      <description>
        <![CDATA[<p>PR.IR-03 implements mechanisms like redundant storage, load balancing, and high-availability components to meet resilience requirements under both normal and adverse conditions. This avoids single points of failure, ensuring systems remain operational during disruptions. It supports continuous service delivery aligned with risk goals.</p><p>This subcategory enhances infrastructure reliability by distributing resources and capacity to handle stress or attacks, reducing outage risks. It ensures that resilience measures match organizational priorities, maintaining functionality. PR.IR-03 builds a robust backbone for operational stability.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.IR-03 implements mechanisms like redundant storage, load balancing, and high-availability components to meet resilience requirements under both normal and adverse conditions. This avoids single points of failure, ensuring systems remain operational during disruptions. It supports continuous service delivery aligned with risk goals.</p><p>This subcategory enhances infrastructure reliability by distributing resources and capacity to handle stress or attacks, reducing outage risks. It ensures that resilience measures match organizational priorities, maintaining functionality. PR.IR-03 builds a robust backbone for operational stability.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:08:19 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bc53bc9b/3eaede01.mp3" length="19382377" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1206</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.IR-03 implements mechanisms like redundant storage, load balancing, and high-availability components to meet resilience requirements under both normal and adverse conditions. This avoids single points of failure, ensuring systems remain operational during disruptions. It supports continuous service delivery aligned with risk goals.</p><p>This subcategory enhances infrastructure reliability by distributing resources and capacity to handle stress or attacks, reducing outage risks. It ensures that resilience measures match organizational priorities, maintaining functionality. PR.IR-03 builds a robust backbone for operational stability.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bc53bc9b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>PR.IR-04 - Maintaining Resource Capacity for Availability</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>PR.IR-04 - Maintaining Resource Capacity for Availability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9e4f9f2e-2d98-4561-bc88-d88a2e75fa7c</guid>
      <link>https://share.transistor.fm/s/324372c4</link>
      <description>
        <![CDATA[<p>PR.IR-04 maintains sufficient resource capacity—storage, compute, power, and bandwidth—to ensure system availability, monitoring usage and forecasting needs. This proactive scaling prevents performance bottlenecks or failures that could disrupt operations. It aligns capacity planning with risk and resilience objectives.</p><p>This subcategory supports uninterrupted access to critical systems by anticipating growth and stress scenarios, ensuring resources meet demand. It reduces availability risks through data-driven adjustments, keeping services operational. PR.IR-04 sustains the infrastructure’s ability to deliver under pressure.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>PR.IR-04 maintains sufficient resource capacity—storage, compute, power, and bandwidth—to ensure system availability, monitoring usage and forecasting needs. This proactive scaling prevents performance bottlenecks or failures that could disrupt operations. It aligns capacity planning with risk and resilience objectives.</p><p>This subcategory supports uninterrupted access to critical systems by anticipating growth and stress scenarios, ensuring resources meet demand. It reduces availability risks through data-driven adjustments, keeping services operational. PR.IR-04 sustains the infrastructure’s ability to deliver under pressure.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:08:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/324372c4/0e6cd2bf.mp3" length="17410455" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1083</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>PR.IR-04 maintains sufficient resource capacity—storage, compute, power, and bandwidth—to ensure system availability, monitoring usage and forecasting needs. This proactive scaling prevents performance bottlenecks or failures that could disrupt operations. It aligns capacity planning with risk and resilience objectives.</p><p>This subcategory supports uninterrupted access to critical systems by anticipating growth and stress scenarios, ensuring resources meet demand. It reduces availability risks through data-driven adjustments, keeping services operational. PR.IR-04 sustains the infrastructure’s ability to deliver under pressure.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/324372c4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.CM-01 - Monitoring Networks for Adverse Events </title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>DE.CM-01 - Monitoring Networks for Adverse Events </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff7183d0-fbe7-4ccf-a8a7-4e725e0d3c65</guid>
      <link>https://share.transistor.fm/s/3045aad9</link>
      <description>
        <![CDATA[<p>DE.CM-01 focuses on continuously monitoring networks and network services, such as DNS and BGP, to detect potentially adverse events like unauthorized connections or traffic anomalies. This involves comparing real-time network flows against established baselines to identify deviations that could signal a security threat. It ensures visibility into network activity to catch issues early.</p><p>This subcategory strengthens proactive defense by monitoring both wired and wireless networks, including facilities for rogue access points, aligning efforts with risk priorities. It supports rapid detection of compromises by maintaining a comprehensive view of network behavior. DE.CM-01 is a cornerstone of network security vigilance.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.CM-01 focuses on continuously monitoring networks and network services, such as DNS and BGP, to detect potentially adverse events like unauthorized connections or traffic anomalies. This involves comparing real-time network flows against established baselines to identify deviations that could signal a security threat. It ensures visibility into network activity to catch issues early.</p><p>This subcategory strengthens proactive defense by monitoring both wired and wireless networks, including facilities for rogue access points, aligning efforts with risk priorities. It supports rapid detection of compromises by maintaining a comprehensive view of network behavior. DE.CM-01 is a cornerstone of network security vigilance.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:09:24 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3045aad9/1ef57390.mp3" length="17462275" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1086</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.CM-01 focuses on continuously monitoring networks and network services, such as DNS and BGP, to detect potentially adverse events like unauthorized connections or traffic anomalies. This involves comparing real-time network flows against established baselines to identify deviations that could signal a security threat. It ensures visibility into network activity to catch issues early.</p><p>This subcategory strengthens proactive defense by monitoring both wired and wireless networks, including facilities for rogue access points, aligning efforts with risk priorities. It supports rapid detection of compromises by maintaining a comprehensive view of network behavior. DE.CM-01 is a cornerstone of network security vigilance.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3045aad9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.CM-02 - Watching the Physical Environment for Threats</title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>DE.CM-02 - Watching the Physical Environment for Threats</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2f5539f5-60b0-4d88-87f5-1972f0b2c8bb</guid>
      <link>https://share.transistor.fm/s/fd2d9e30</link>
      <description>
        <![CDATA[<p>DE.CM-02 involves monitoring the physical environment housing technology assets to detect adverse events, such as unauthorized access or tampering with controls like locks and alarms. This includes reviewing logs from badge readers and visitor records for unusual patterns, supplemented by tools like cameras and security guards. It protects the physical layer of cybersecurity.</p><p>This subcategory ensures that physical breaches, which could enable logical attacks, are identified quickly, aligning monitoring with risk levels for critical areas. It supports a holistic security approach by integrating physical oversight with digital defenses. DE.CM-02 safeguards assets from tangible threats that could compromise operations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.CM-02 involves monitoring the physical environment housing technology assets to detect adverse events, such as unauthorized access or tampering with controls like locks and alarms. This includes reviewing logs from badge readers and visitor records for unusual patterns, supplemented by tools like cameras and security guards. It protects the physical layer of cybersecurity.</p><p>This subcategory ensures that physical breaches, which could enable logical attacks, are identified quickly, aligning monitoring with risk levels for critical areas. It supports a holistic security approach by integrating physical oversight with digital defenses. DE.CM-02 safeguards assets from tangible threats that could compromise operations.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:10:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fd2d9e30/d8c4a2af.mp3" length="17845549" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1110</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.CM-02 involves monitoring the physical environment housing technology assets to detect adverse events, such as unauthorized access or tampering with controls like locks and alarms. This includes reviewing logs from badge readers and visitor records for unusual patterns, supplemented by tools like cameras and security guards. It protects the physical layer of cybersecurity.</p><p>This subcategory ensures that physical breaches, which could enable logical attacks, are identified quickly, aligning monitoring with risk levels for critical areas. It supports a holistic security approach by integrating physical oversight with digital defenses. DE.CM-02 safeguards assets from tangible threats that could compromise operations.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fd2d9e30/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.CM-03 - Tracking Personnel and Technology Usage </title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>DE.CM-03 - Tracking Personnel and Technology Usage </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">73186441-713d-4ba7-8e7e-6e74151ccd99</guid>
      <link>https://share.transistor.fm/s/e0348b8f</link>
      <description>
        <![CDATA[<p>DE.CM-03 monitors personnel activity and technology usage to identify potentially adverse events, such as insider threats or policy violations, using tools like behavior analytics and access logs. This includes tracking unusual access patterns or interactions with deception technologies, like honeypot accounts, to detect malicious intent. It focuses on the human element of security risks.</p><p>This subcategory enhances insider threat detection by providing visibility into user actions, ensuring deviations from norms trigger investigation. It aligns monitoring with risk strategies, prioritizing high-privilege users or critical systems. DE.CM-03 strengthens defenses against both intentional and unintentional personnel-related risks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.CM-03 monitors personnel activity and technology usage to identify potentially adverse events, such as insider threats or policy violations, using tools like behavior analytics and access logs. This includes tracking unusual access patterns or interactions with deception technologies, like honeypot accounts, to detect malicious intent. It focuses on the human element of security risks.</p><p>This subcategory enhances insider threat detection by providing visibility into user actions, ensuring deviations from norms trigger investigation. It aligns monitoring with risk strategies, prioritizing high-privilege users or critical systems. DE.CM-03 strengthens defenses against both intentional and unintentional personnel-related risks.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:11:05 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e0348b8f/439a3d50.mp3" length="17964245" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1117</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.CM-03 monitors personnel activity and technology usage to identify potentially adverse events, such as insider threats or policy violations, using tools like behavior analytics and access logs. This includes tracking unusual access patterns or interactions with deception technologies, like honeypot accounts, to detect malicious intent. It focuses on the human element of security risks.</p><p>This subcategory enhances insider threat detection by providing visibility into user actions, ensuring deviations from norms trigger investigation. It aligns monitoring with risk strategies, prioritizing high-privilege users or critical systems. DE.CM-03 strengthens defenses against both intentional and unintentional personnel-related risks.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e0348b8f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.CM-06 - Monitoring External Service Providers</title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>DE.CM-06 - Monitoring External Service Providers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a1cf077a-3830-4adf-a299-5d360b9d662b</guid>
      <link>https://share.transistor.fm/s/65a3dcd2</link>
      <description>
        <![CDATA[<p>DE.CM-06 requires monitoring the activities and services of external providers—like cloud platforms or ISPs—to detect adverse events that could impact the organization. This includes tracking remote administration or onsite maintenance by third parties for deviations from expected behavior. It ensures external dependencies don’t become blind spots.</p><p>This subcategory mitigates risks from outsourced services by maintaining oversight, aligning monitoring with contractual security expectations. It supports a comprehensive security posture by extending vigilance beyond organizational boundaries. DE.CM-06 safeguards against threats originating in the supply chain.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.CM-06 requires monitoring the activities and services of external providers—like cloud platforms or ISPs—to detect adverse events that could impact the organization. This includes tracking remote administration or onsite maintenance by third parties for deviations from expected behavior. It ensures external dependencies don’t become blind spots.</p><p>This subcategory mitigates risks from outsourced services by maintaining oversight, aligning monitoring with contractual security expectations. It supports a comprehensive security posture by extending vigilance beyond organizational boundaries. DE.CM-06 safeguards against threats originating in the supply chain.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:11:33 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/65a3dcd2/13132114.mp3" length="18490034" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1150</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.CM-06 requires monitoring the activities and services of external providers—like cloud platforms or ISPs—to detect adverse events that could impact the organization. This includes tracking remote administration or onsite maintenance by third parties for deviations from expected behavior. It ensures external dependencies don’t become blind spots.</p><p>This subcategory mitigates risks from outsourced services by maintaining oversight, aligning monitoring with contractual security expectations. It supports a comprehensive security posture by extending vigilance beyond organizational boundaries. DE.CM-06 safeguards against threats originating in the supply chain.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/65a3dcd2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.CM-09 - Detecting Threats Across Technology Stacks</title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>DE.CM-09 - Detecting Threats Across Technology Stacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">831420b7-f5dc-403a-9195-1af999b1b64e</guid>
      <link>https://share.transistor.fm/s/dd4aaa9a</link>
      <description>
        <![CDATA[<p>DE.CM-09 involves monitoring hardware, software, runtime environments, and associated data to detect adverse events like malware, phishing, or tampering. This includes tracking authentication attempts, configuration changes, and endpoint health to identify risks such as unauthorized software or credential attacks. It ensures a deep, system-level view of potential threats.</p><p>This subcategory enhances security by using endpoint technologies to redirect compromised devices for remediation, aligning monitoring with risk priorities. It provides comprehensive coverage of common attack vectors like email or file sharing, enabling rapid response. DE.CM-09 underpins a robust detection framework across the technology stack.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.CM-09 involves monitoring hardware, software, runtime environments, and associated data to detect adverse events like malware, phishing, or tampering. This includes tracking authentication attempts, configuration changes, and endpoint health to identify risks such as unauthorized software or credential attacks. It ensures a deep, system-level view of potential threats.</p><p>This subcategory enhances security by using endpoint technologies to redirect compromised devices for remediation, aligning monitoring with risk priorities. It provides comprehensive coverage of common attack vectors like email or file sharing, enabling rapid response. DE.CM-09 underpins a robust detection framework across the technology stack.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:12:04 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dd4aaa9a/9e295c47.mp3" length="19421253" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1208</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.CM-09 involves monitoring hardware, software, runtime environments, and associated data to detect adverse events like malware, phishing, or tampering. This includes tracking authentication attempts, configuration changes, and endpoint health to identify risks such as unauthorized software or credential attacks. It ensures a deep, system-level view of potential threats.</p><p>This subcategory enhances security by using endpoint technologies to redirect compromised devices for remediation, aligning monitoring with risk priorities. It provides comprehensive coverage of common attack vectors like email or file sharing, enabling rapid response. DE.CM-09 underpins a robust detection framework across the technology stack.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dd4aaa9a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.AE-02 - Analyzing Adverse Events for Insights</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>DE.AE-02 - Analyzing Adverse Events for Insights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1b810458-e0bc-478c-8509-610bde13322b</guid>
      <link>https://share.transistor.fm/s/c4f61d9e</link>
      <description>
        <![CDATA[<p>DE.AE-02 focuses on analyzing potentially adverse events to understand their nature, using tools like SIEM systems to examine log events for malicious or suspicious activity. This includes leveraging cyber threat intelligence to characterize threat actors, tactics, and indicators of compromise, supplemented by manual reviews where automation falls short. It turns raw detections into actionable insights.</p><p>This subcategory improves detection accuracy by providing detailed context about event origins and methods, supporting informed response decisions. It ensures thorough analysis across all technologies, aligning efforts with risk priorities. DE.AE-02 bridges monitoring and incident characterization for effective threat management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.AE-02 focuses on analyzing potentially adverse events to understand their nature, using tools like SIEM systems to examine log events for malicious or suspicious activity. This includes leveraging cyber threat intelligence to characterize threat actors, tactics, and indicators of compromise, supplemented by manual reviews where automation falls short. It turns raw detections into actionable insights.</p><p>This subcategory improves detection accuracy by providing detailed context about event origins and methods, supporting informed response decisions. It ensures thorough analysis across all technologies, aligning efforts with risk priorities. DE.AE-02 bridges monitoring and incident characterization for effective threat management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:12:32 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c4f61d9e/83e9c175.mp3" length="18072493" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1124</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.AE-02 focuses on analyzing potentially adverse events to understand their nature, using tools like SIEM systems to examine log events for malicious or suspicious activity. This includes leveraging cyber threat intelligence to characterize threat actors, tactics, and indicators of compromise, supplemented by manual reviews where automation falls short. It turns raw detections into actionable insights.</p><p>This subcategory improves detection accuracy by providing detailed context about event origins and methods, supporting informed response decisions. It ensures thorough analysis across all technologies, aligning efforts with risk priorities. DE.AE-02 bridges monitoring and incident characterization for effective threat management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c4f61d9e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.AE-03 - Correlating Data from Multiple Sources </title>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>DE.AE-03 - Correlating Data from Multiple Sources </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">369845d7-5fcb-401d-a5ae-0a4ab2233309</guid>
      <link>https://share.transistor.fm/s/f9675ede</link>
      <description>
        <![CDATA[<p>DE.AE-03 correlates information from diverse sources—like logs, sensors, and threat intelligence—to build a unified picture of potential adverse events. This involves consolidating log data into centralized servers and using event correlation tools (e.g., SIEM) to identify patterns or connections. It enhances detection by linking disparate clues into coherent threats.</p><p>This subcategory strengthens analysis by integrating external intelligence with internal data, improving the accuracy of event characterization. It supports a holistic view of the threat landscape, aligning correlation with risk priorities. DE.AE-03 amplifies the power of individual monitoring efforts.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.AE-03 correlates information from diverse sources—like logs, sensors, and threat intelligence—to build a unified picture of potential adverse events. This involves consolidating log data into centralized servers and using event correlation tools (e.g., SIEM) to identify patterns or connections. It enhances detection by linking disparate clues into coherent threats.</p><p>This subcategory strengthens analysis by integrating external intelligence with internal data, improving the accuracy of event characterization. It supports a holistic view of the threat landscape, aligning correlation with risk priorities. DE.AE-03 amplifies the power of individual monitoring efforts.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:13:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f9675ede/caf976d0.mp3" length="18480005" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1149</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.AE-03 correlates information from diverse sources—like logs, sensors, and threat intelligence—to build a unified picture of potential adverse events. This involves consolidating log data into centralized servers and using event correlation tools (e.g., SIEM) to identify patterns or connections. It enhances detection by linking disparate clues into coherent threats.</p><p>This subcategory strengthens analysis by integrating external intelligence with internal data, improving the accuracy of event characterization. It supports a holistic view of the threat landscape, aligning correlation with risk priorities. DE.AE-03 amplifies the power of individual monitoring efforts.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f9675ede/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.AE-04 - Estimating the Impact of Adverse Events </title>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>DE.AE-04 - Estimating the Impact of Adverse Events </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">317683d3-571e-42b1-93f9-66b8db1ced2c</guid>
      <link>https://share.transistor.fm/s/874c721f</link>
      <description>
        <![CDATA[<p>DE.AE-04 estimates the impact and scope of adverse events to gauge their potential harm, using tools like SIEMs or manual analysis to assess affected assets and severity. This process refines initial estimates through review, ensuring a clear understanding of consequences like data loss or downtime. It informs prioritization of response efforts.</p><p>This subcategory aligns analysis with risk management by quantifying event effects, supporting resource allocation and escalation decisions. It ensures that the organization grasps the full extent of a threat, from isolated incidents to systemic risks. DE.AE-04 provides critical context for effective incident handling.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.AE-04 estimates the impact and scope of adverse events to gauge their potential harm, using tools like SIEMs or manual analysis to assess affected assets and severity. This process refines initial estimates through review, ensuring a clear understanding of consequences like data loss or downtime. It informs prioritization of response efforts.</p><p>This subcategory aligns analysis with risk management by quantifying event effects, supporting resource allocation and escalation decisions. It ensures that the organization grasps the full extent of a threat, from isolated incidents to systemic risks. DE.AE-04 provides critical context for effective incident handling.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:13:33 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/874c721f/420a5a2c.mp3" length="18821061" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1171</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.AE-04 estimates the impact and scope of adverse events to gauge their potential harm, using tools like SIEMs or manual analysis to assess affected assets and severity. This process refines initial estimates through review, ensuring a clear understanding of consequences like data loss or downtime. It informs prioritization of response efforts.</p><p>This subcategory aligns analysis with risk management by quantifying event effects, supporting resource allocation and escalation decisions. It ensures that the organization grasps the full extent of a threat, from isolated incidents to systemic risks. DE.AE-04 provides critical context for effective incident handling.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/874c721f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.AE-06 - Sharing Adverse Event Information </title>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>DE.AE-06 - Sharing Adverse Event Information </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a965ae6d-da1d-47b3-b589-65624d5ed6ff</guid>
      <link>https://share.transistor.fm/s/180a9350</link>
      <description>
        <![CDATA[<p>DE.AE-06 ensures that information about adverse events is promptly shared with authorized staff—such as SOC teams and incident responders—and integrated into response tools. This includes generating alerts, assigning tickets in ticketing systems, and providing access to analysis findings at all times. It enables swift, coordinated action against detected threats.</p><p>This subcategory enhances response efficiency by aligning information delivery with operational needs, ensuring the right people and systems are informed. It supports both automated and manual workflows, reducing delays in addressing events. DE.AE-06 bridges detection and response with timely communication.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.AE-06 ensures that information about adverse events is promptly shared with authorized staff—such as SOC teams and incident responders—and integrated into response tools. This includes generating alerts, assigning tickets in ticketing systems, and providing access to analysis findings at all times. It enables swift, coordinated action against detected threats.</p><p>This subcategory enhances response efficiency by aligning information delivery with operational needs, ensuring the right people and systems are informed. It supports both automated and manual workflows, reducing delays in addressing events. DE.AE-06 bridges detection and response with timely communication.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:14:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/180a9350/a89c8eac.mp3" length="18915932" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1177</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.AE-06 ensures that information about adverse events is promptly shared with authorized staff—such as SOC teams and incident responders—and integrated into response tools. This includes generating alerts, assigning tickets in ticketing systems, and providing access to analysis findings at all times. It enables swift, coordinated action against detected threats.</p><p>This subcategory enhances response efficiency by aligning information delivery with operational needs, ensuring the right people and systems are informed. It supports both automated and manual workflows, reducing delays in addressing events. DE.AE-06 bridges detection and response with timely communication.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/180a9350/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.AE-07 - Enhancing Analysis with Threat Intelligence</title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>DE.AE-07 - Enhancing Analysis with Threat Intelligence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fd82e050-a77d-43a5-ba8d-91e718c4ec5a</guid>
      <link>https://share.transistor.fm/s/ec5d4662</link>
      <description>
        <![CDATA[<p>DE.AE-07 integrates cyber threat intelligence and contextual data—like asset inventories or vulnerability disclosures—into adverse event analysis to enhance accuracy and relevance. This involves securely feeding intelligence to detection technologies and personnel, enabling rapid analysis of supplier or third-party advisories. It enriches understanding of event significance.</p><p>This subcategory strengthens detection by providing a broader context, aligning analysis with the organization’s specific risk profile and technology stack. It ensures that external insights inform internal responses, reducing false positives and missed threats. DE.AE-07 connects global intelligence to local action.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.AE-07 integrates cyber threat intelligence and contextual data—like asset inventories or vulnerability disclosures—into adverse event analysis to enhance accuracy and relevance. This involves securely feeding intelligence to detection technologies and personnel, enabling rapid analysis of supplier or third-party advisories. It enriches understanding of event significance.</p><p>This subcategory strengthens detection by providing a broader context, aligning analysis with the organization’s specific risk profile and technology stack. It ensures that external insights inform internal responses, reducing false positives and missed threats. DE.AE-07 connects global intelligence to local action.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:14:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ec5d4662/84d588f6.mp3" length="18691915" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1163</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.AE-07 integrates cyber threat intelligence and contextual data—like asset inventories or vulnerability disclosures—into adverse event analysis to enhance accuracy and relevance. This involves securely feeding intelligence to detection technologies and personnel, enabling rapid analysis of supplier or third-party advisories. It enriches understanding of event significance.</p><p>This subcategory strengthens detection by providing a broader context, aligning analysis with the organization’s specific risk profile and technology stack. It ensures that external insights inform internal responses, reducing false positives and missed threats. DE.AE-07 connects global intelligence to local action.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ec5d4662/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>DE.AE-08 - Declaring Incidents Based on Criteria </title>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:title>DE.AE-08 - Declaring Incidents Based on Criteria </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8cf2ad00-4897-4aed-8dbb-6e8f04a66986</guid>
      <link>https://share.transistor.fm/s/ccf5d04a</link>
      <description>
        <![CDATA[<p>DE.AE-08 involves declaring incidents when adverse events meet predefined criteria, such as severity or scope, ensuring a formal response is triggered. This process accounts for known false positives to avoid unnecessary escalation, applying criteria to event characteristics systematically. It marks the transition from detection to response.</p><p>This subcategory ensures consistency in incident identification, aligning declarations with risk management priorities and operational impact. It provides a clear threshold for action, enabling timely mitigation efforts. DE.AE-08 formalizes the shift to incident management with precision.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>DE.AE-08 involves declaring incidents when adverse events meet predefined criteria, such as severity or scope, ensuring a formal response is triggered. This process accounts for known false positives to avoid unnecessary escalation, applying criteria to event characteristics systematically. It marks the transition from detection to response.</p><p>This subcategory ensures consistency in incident identification, aligning declarations with risk management priorities and operational impact. It provides a clear threshold for action, enabling timely mitigation efforts. DE.AE-08 formalizes the shift to incident management with precision.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:15:07 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ccf5d04a/4fedc11d.mp3" length="19296697" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1200</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>DE.AE-08 involves declaring incidents when adverse events meet predefined criteria, such as severity or scope, ensuring a formal response is triggered. This process accounts for known false positives to avoid unnecessary escalation, applying criteria to event characteristics systematically. It marks the transition from detection to response.</p><p>This subcategory ensures consistency in incident identification, aligning declarations with risk management priorities and operational impact. It provides a clear threshold for action, enabling timely mitigation efforts. DE.AE-08 formalizes the shift to incident management with precision.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ccf5d04a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.MA-01 - Executing the Incident Response Plan</title>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:title>RS.MA-01 - Executing the Incident Response Plan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f9d7f26c-b465-4420-a845-79600f66ea68</guid>
      <link>https://share.transistor.fm/s/9d48a51a</link>
      <description>
        <![CDATA[<p>RS.MA-01 initiates the execution of the incident response plan in coordination with third parties—like outsourcers or suppliers—once an incident is confirmed. This includes designating an incident lead and activating additional plans (e.g., business continuity) as needed to support response efforts. It ensures a structured, collaborative approach to managing incidents.</p><p>This subcategory aligns response actions with organizational and external capabilities, leveraging automation or external assistance for efficiency. It minimizes disruption by integrating third-party roles into the response framework, enhancing effectiveness. RS.MA-01 sets the stage for a unified incident handling process.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.MA-01 initiates the execution of the incident response plan in coordination with third parties—like outsourcers or suppliers—once an incident is confirmed. This includes designating an incident lead and activating additional plans (e.g., business continuity) as needed to support response efforts. It ensures a structured, collaborative approach to managing incidents.</p><p>This subcategory aligns response actions with organizational and external capabilities, leveraging automation or external assistance for efficiency. It minimizes disruption by integrating third-party roles into the response framework, enhancing effectiveness. RS.MA-01 sets the stage for a unified incident handling process.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:15:44 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9d48a51a/e2f36178.mp3" length="18189521" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1131</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.MA-01 initiates the execution of the incident response plan in coordination with third parties—like outsourcers or suppliers—once an incident is confirmed. This includes designating an incident lead and activating additional plans (e.g., business continuity) as needed to support response efforts. It ensures a structured, collaborative approach to managing incidents.</p><p>This subcategory aligns response actions with organizational and external capabilities, leveraging automation or external assistance for efficiency. It minimizes disruption by integrating third-party roles into the response framework, enhancing effectiveness. RS.MA-01 sets the stage for a unified incident handling process.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9d48a51a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.MA-02 - Triaging and Validating Incident Reports  </title>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:title>RS.MA-02 - Triaging and Validating Incident Reports  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fdcba4d8-8720-4fd0-9aff-09ee61c4945c</guid>
      <link>https://share.transistor.fm/s/678ea90b</link>
      <description>
        <![CDATA[<p>RS.MA-02 involves triaging and validating incident reports to confirm their cybersecurity relevance and need for response, applying severity criteria to prioritize action. This preliminary review filters out non-issues, ensuring resources focus on genuine threats like breaches or malware. It streamlines the initial handling of reported events.</p><p>This subcategory enhances efficiency by quickly assessing incident legitimacy, aligning efforts with risk priorities. It provides a clear entry point for response, reducing delays in addressing critical incidents. RS.MA-02 ensures that only validated threats proceed to deeper management.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.MA-02 involves triaging and validating incident reports to confirm their cybersecurity relevance and need for response, applying severity criteria to prioritize action. This preliminary review filters out non-issues, ensuring resources focus on genuine threats like breaches or malware. It streamlines the initial handling of reported events.</p><p>This subcategory enhances efficiency by quickly assessing incident legitimacy, aligning efforts with risk priorities. It provides a clear entry point for response, reducing delays in addressing critical incidents. RS.MA-02 ensures that only validated threats proceed to deeper management.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:16:12 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/678ea90b/bbb8bedb.mp3" length="18325364" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1140</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.MA-02 involves triaging and validating incident reports to confirm their cybersecurity relevance and need for response, applying severity criteria to prioritize action. This preliminary review filters out non-issues, ensuring resources focus on genuine threats like breaches or malware. It streamlines the initial handling of reported events.</p><p>This subcategory enhances efficiency by quickly assessing incident legitimacy, aligning efforts with risk priorities. It provides a clear entry point for response, reducing delays in addressing critical incidents. RS.MA-02 ensures that only validated threats proceed to deeper management.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/678ea90b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.MA-03 - Categorizing and Prioritizing Incidents </title>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:title>RS.MA-03 - Categorizing and Prioritizing Incidents </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60448661-55d8-455e-9ef3-62d9a7ee1b2d</guid>
      <link>https://share.transistor.fm/s/b22347b4</link>
      <description>
        <![CDATA[<p>RS.MA-03 categorizes incidents—such as ransomware or data breaches—and prioritizes them based on scope, impact, and urgency, balancing rapid recovery with investigation needs. This detailed review assigns incidents to specific response strategies, ensuring appropriate resource allocation. It organizes chaos into actionable steps.</p><p>This subcategory aligns response efforts with organizational priorities, focusing on high-impact events while preserving evidence where needed. It supports strategic decision-making by classifying incidents systematically. RS.MA-03 optimizes the response process for efficiency and effectiveness.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.MA-03 categorizes incidents—such as ransomware or data breaches—and prioritizes them based on scope, impact, and urgency, balancing rapid recovery with investigation needs. This detailed review assigns incidents to specific response strategies, ensuring appropriate resource allocation. It organizes chaos into actionable steps.</p><p>This subcategory aligns response efforts with organizational priorities, focusing on high-impact events while preserving evidence where needed. It supports strategic decision-making by classifying incidents systematically. RS.MA-03 optimizes the response process for efficiency and effectiveness.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:16:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b22347b4/898d30bc.mp3" length="19058044" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1185</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.MA-03 categorizes incidents—such as ransomware or data breaches—and prioritizes them based on scope, impact, and urgency, balancing rapid recovery with investigation needs. This detailed review assigns incidents to specific response strategies, ensuring appropriate resource allocation. It organizes chaos into actionable steps.</p><p>This subcategory aligns response efforts with organizational priorities, focusing on high-impact events while preserving evidence where needed. It supports strategic decision-making by classifying incidents systematically. RS.MA-03 optimizes the response process for efficiency and effectiveness.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b22347b4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.MA-04 - Escalating Incidents When Needed </title>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:title>RS.MA-04 - Escalating Incidents When Needed </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a09ac9e0-2a3f-44c1-b355-c86e3a947d7d</guid>
      <link>https://share.transistor.fm/s/2643b52c</link>
      <description>
        <![CDATA[<p>RS.MA-04 ensures incidents are escalated or elevated to higher levels of authority or expertise when their complexity or impact exceeds initial handling capabilities. This involves tracking incident status and coordinating with designated stakeholders, both internal and external, for additional support. It maintains control over evolving incidents.</p><p>This subcategory aligns escalation with risk thresholds, ensuring timely involvement of senior leadership or specialists as needed. It enhances response flexibility by validating progress and adjusting resources dynamically. RS.MA-04 keeps incident management responsive to changing demands.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.MA-04 ensures incidents are escalated or elevated to higher levels of authority or expertise when their complexity or impact exceeds initial handling capabilities. This involves tracking incident status and coordinating with designated stakeholders, both internal and external, for additional support. It maintains control over evolving incidents.</p><p>This subcategory aligns escalation with risk thresholds, ensuring timely involvement of senior leadership or specialists as needed. It enhances response flexibility by validating progress and adjusting resources dynamically. RS.MA-04 keeps incident management responsive to changing demands.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:17:09 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2643b52c/d2009716.mp3" length="18952711" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1179</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.MA-04 ensures incidents are escalated or elevated to higher levels of authority or expertise when their complexity or impact exceeds initial handling capabilities. This involves tracking incident status and coordinating with designated stakeholders, both internal and external, for additional support. It maintains control over evolving incidents.</p><p>This subcategory aligns escalation with risk thresholds, ensuring timely involvement of senior leadership or specialists as needed. It enhances response flexibility by validating progress and adjusting resources dynamically. RS.MA-04 keeps incident management responsive to changing demands.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2643b52c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.MA-05 - Initiating Incident Recovery</title>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:title>RS.MA-05 - Initiating Incident Recovery</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e07cd572-1af7-416e-aec4-d81c97554417</guid>
      <link>https://share.transistor.fm/s/a015eb51</link>
      <description>
        <![CDATA[<p>RS.MA-05 applies predefined criteria to determine when to shift from response to recovery, based on incident characteristics and operational considerations. This decision balances containment success with potential disruptions from recovery actions, ensuring a smooth transition. It marks the pivot to restoring normalcy.</p><p>This subcategory aligns recovery initiation with risk and operational priorities, preventing premature or delayed action that could worsen impacts. It ensures a deliberate, criteria-driven approach to recovery planning. RS.MA-05 facilitates a seamless move from mitigation to restoration.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.MA-05 applies predefined criteria to determine when to shift from response to recovery, based on incident characteristics and operational considerations. This decision balances containment success with potential disruptions from recovery actions, ensuring a smooth transition. It marks the pivot to restoring normalcy.</p><p>This subcategory aligns recovery initiation with risk and operational priorities, preventing premature or delayed action that could worsen impacts. It ensures a deliberate, criteria-driven approach to recovery planning. RS.MA-05 facilitates a seamless move from mitigation to restoration.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:17:39 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a015eb51/f1d983b0.mp3" length="18013552" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1120</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.MA-05 applies predefined criteria to determine when to shift from response to recovery, based on incident characteristics and operational considerations. This decision balances containment success with potential disruptions from recovery actions, ensuring a smooth transition. It marks the pivot to restoring normalcy.</p><p>This subcategory aligns recovery initiation with risk and operational priorities, preventing premature or delayed action that could worsen impacts. It ensures a deliberate, criteria-driven approach to recovery planning. RS.MA-05 facilitates a seamless move from mitigation to restoration.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a015eb51/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.AN-03 - Investigating Incident Causes</title>
      <itunes:episode>98</itunes:episode>
      <podcast:episode>98</podcast:episode>
      <itunes:title>RS.AN-03 - Investigating Incident Causes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7a855d9f-75d6-44eb-9e64-669d4f6d75f5</guid>
      <link>https://share.transistor.fm/s/c7dd9ba0</link>
      <description>
        <![CDATA[<p>RS.AN-03 conducts detailed analysis to reconstruct incident events, identify involved assets, and pinpoint root causes, such as exploited vulnerabilities or threat actors. This includes examining deception technologies for attacker behavior insights, aiming to understand both immediate triggers and systemic issues. It provides the foundation for effective response and prevention.</p><p>This subcategory enhances response by delivering actionable findings, aligning analysis with risk priorities to address critical weaknesses. It supports forensics and recovery by uncovering underlying causes, reducing recurrence risks. RS.AN-03 drives a thorough understanding of incident dynamics.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.AN-03 conducts detailed analysis to reconstruct incident events, identify involved assets, and pinpoint root causes, such as exploited vulnerabilities or threat actors. This includes examining deception technologies for attacker behavior insights, aiming to understand both immediate triggers and systemic issues. It provides the foundation for effective response and prevention.</p><p>This subcategory enhances response by delivering actionable findings, aligning analysis with risk priorities to address critical weaknesses. It supports forensics and recovery by uncovering underlying causes, reducing recurrence risks. RS.AN-03 drives a thorough understanding of incident dynamics.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:18:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c7dd9ba0/a8dd0117.mp3" length="17706353" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1101</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.AN-03 conducts detailed analysis to reconstruct incident events, identify involved assets, and pinpoint root causes, such as exploited vulnerabilities or threat actors. This includes examining deception technologies for attacker behavior insights, aiming to understand both immediate triggers and systemic issues. It provides the foundation for effective response and prevention.</p><p>This subcategory enhances response by delivering actionable findings, aligning analysis with risk priorities to address critical weaknesses. It supports forensics and recovery by uncovering underlying causes, reducing recurrence risks. RS.AN-03 drives a thorough understanding of incident dynamics.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c7dd9ba0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.AN-06 - Recording Investigation Actions</title>
      <itunes:episode>99</itunes:episode>
      <podcast:episode>99</podcast:episode>
      <itunes:title>RS.AN-06 - Recording Investigation Actions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bd5021fa-9ba5-43fb-8b7d-21268582ce6d</guid>
      <link>https://share.transistor.fm/s/9e9421e2</link>
      <description>
        <![CDATA[<p>RS.AN-06 ensures that all investigative actions during an incident—like system checks or containment steps—are meticulously recorded, with integrity and provenance preserved. This involves immutable logs by responders and detailed documentation by the incident lead, safeguarding evidence for legal or audit purposes. It maintains a reliable investigation trail.</p><p>This subcategory supports accountability and forensics by ensuring records are tamper-proof and traceable, aligning with risk management needs. It enables accurate post-incident reviews and lessons learned, enhancing future responses. RS.AN-06 upholds the credibility of incident investigations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.AN-06 ensures that all investigative actions during an incident—like system checks or containment steps—are meticulously recorded, with integrity and provenance preserved. This involves immutable logs by responders and detailed documentation by the incident lead, safeguarding evidence for legal or audit purposes. It maintains a reliable investigation trail.</p><p>This subcategory supports accountability and forensics by ensuring records are tamper-proof and traceable, aligning with risk management needs. It enables accurate post-incident reviews and lessons learned, enhancing future responses. RS.AN-06 upholds the credibility of incident investigations.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:18:47 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9e9421e2/423992ba.mp3" length="18281467" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1137</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.AN-06 ensures that all investigative actions during an incident—like system checks or containment steps—are meticulously recorded, with integrity and provenance preserved. This involves immutable logs by responders and detailed documentation by the incident lead, safeguarding evidence for legal or audit purposes. It maintains a reliable investigation trail.</p><p>This subcategory supports accountability and forensics by ensuring records are tamper-proof and traceable, aligning with risk management needs. It enables accurate post-incident reviews and lessons learned, enhancing future responses. RS.AN-06 upholds the credibility of incident investigations.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9e9421e2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.AN-07 - Preserving Incident Data Integrity </title>
      <itunes:episode>100</itunes:episode>
      <podcast:episode>100</podcast:episode>
      <itunes:title>RS.AN-07 - Preserving Incident Data Integrity </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">30abe9d8-0bbd-4292-852a-cfe27bd45ee2</guid>
      <link>https://share.transistor.fm/s/48a2b5c8</link>
      <description>
        <![CDATA[<p>RS.AN-07 focuses on collecting and preserving incident data and metadata—such as source and timestamps—using chain-of-custody procedures to ensure integrity. This comprehensive gathering supports forensic analysis and compliance, protecting evidence from alteration. It ensures data remains a trustworthy resource for investigation.</p><p>This subcategory aligns with risk and legal requirements, safeguarding critical information for root cause analysis and reporting. It enhances response accuracy by maintaining a pristine data set for review. RS.AN-07 underpins robust incident analysis and recovery.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.AN-07 focuses on collecting and preserving incident data and metadata—such as source and timestamps—using chain-of-custody procedures to ensure integrity. This comprehensive gathering supports forensic analysis and compliance, protecting evidence from alteration. It ensures data remains a trustworthy resource for investigation.</p><p>This subcategory aligns with risk and legal requirements, safeguarding critical information for root cause analysis and reporting. It enhances response accuracy by maintaining a pristine data set for review. RS.AN-07 underpins robust incident analysis and recovery.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:19:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/48a2b5c8/0c471186.mp3" length="18464956" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1148</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.AN-07 focuses on collecting and preserving incident data and metadata—such as source and timestamps—using chain-of-custody procedures to ensure integrity. This comprehensive gathering supports forensic analysis and compliance, protecting evidence from alteration. It ensures data remains a trustworthy resource for investigation.</p><p>This subcategory aligns with risk and legal requirements, safeguarding critical information for root cause analysis and reporting. It enhances response accuracy by maintaining a pristine data set for review. RS.AN-07 underpins robust incident analysis and recovery.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/48a2b5c8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.AN-08 - Assessing Incident Magnitude </title>
      <itunes:episode>101</itunes:episode>
      <podcast:episode>101</podcast:episode>
      <itunes:title>RS.AN-08 - Assessing Incident Magnitude </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d67b4360-171e-4b94-9374-676356502777</guid>
      <link>https://share.transistor.fm/s/4e54ccd9</link>
      <description>
        <![CDATA[<p>RS.AN-08 estimates and validates an incident’s magnitude by assessing its scope and impact, searching other targets for indicators of compromise or persistence. This involves manual reviews or automated tools to confirm the extent of damage or spread, refining initial assessments. It quantifies the incident’s true reach.</p><p>This subcategory aligns analysis with risk priorities, ensuring resources target the full breadth of an incident, from isolated to systemic effects. It supports effective mitigation by clarifying the scale of response needed. RS.AN-08 ensures a comprehensive grasp of incident consequences.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.AN-08 estimates and validates an incident’s magnitude by assessing its scope and impact, searching other targets for indicators of compromise or persistence. This involves manual reviews or automated tools to confirm the extent of damage or spread, refining initial assessments. It quantifies the incident’s true reach.</p><p>This subcategory aligns analysis with risk priorities, ensuring resources target the full breadth of an incident, from isolated to systemic effects. It supports effective mitigation by clarifying the scale of response needed. RS.AN-08 ensures a comprehensive grasp of incident consequences.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:19:44 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4e54ccd9/f7dc9f42.mp3" length="18489192" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1150</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.AN-08 estimates and validates an incident’s magnitude by assessing its scope and impact, searching other targets for indicators of compromise or persistence. This involves manual reviews or automated tools to confirm the extent of damage or spread, refining initial assessments. It quantifies the incident’s true reach.</p><p>This subcategory aligns analysis with risk priorities, ensuring resources target the full breadth of an incident, from isolated to systemic effects. It supports effective mitigation by clarifying the scale of response needed. RS.AN-08 ensures a comprehensive grasp of incident consequences.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4e54ccd9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.CO-02 - Notifying Stakeholders of Incidents</title>
      <itunes:episode>102</itunes:episode>
      <podcast:episode>102</podcast:episode>
      <itunes:title>RS.CO-02 - Notifying Stakeholders of Incidents</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3cc75a55-43cb-4d86-80f5-711f974def3f</guid>
      <link>https://share.transistor.fm/s/d012b8ef</link>
      <description>
        <![CDATA[<p>RS.CO-02 ensures timely notification of internal and external stakeholders—like customers, partners, or regulators—about incidents, following breach procedures or contractual obligations. This includes notifying law enforcement when criteria and approvals dictate, maintaining transparency and compliance. It keeps affected parties informed and engaged.</p><p>This subcategory aligns communication with legal and risk requirements, reducing delays in critical notifications that could impact trust or recovery. It supports coordinated response by ensuring stakeholders know their roles or risks. RS.CO-02 fosters a collaborative incident response ecosystem.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.CO-02 ensures timely notification of internal and external stakeholders—like customers, partners, or regulators—about incidents, following breach procedures or contractual obligations. This includes notifying law enforcement when criteria and approvals dictate, maintaining transparency and compliance. It keeps affected parties informed and engaged.</p><p>This subcategory aligns communication with legal and risk requirements, reducing delays in critical notifications that could impact trust or recovery. It supports coordinated response by ensuring stakeholders know their roles or risks. RS.CO-02 fosters a collaborative incident response ecosystem.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:20:23 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d012b8ef/1225548b.mp3" length="18246781" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1135</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.CO-02 ensures timely notification of internal and external stakeholders—like customers, partners, or regulators—about incidents, following breach procedures or contractual obligations. This includes notifying law enforcement when criteria and approvals dictate, maintaining transparency and compliance. It keeps affected parties informed and engaged.</p><p>This subcategory aligns communication with legal and risk requirements, reducing delays in critical notifications that could impact trust or recovery. It supports coordinated response by ensuring stakeholders know their roles or risks. RS.CO-02 fosters a collaborative incident response ecosystem.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d012b8ef/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.CO-03 - Sharing Information with Stakeholders </title>
      <itunes:episode>103</itunes:episode>
      <podcast:episode>103</podcast:episode>
      <itunes:title>RS.CO-03 - Sharing Information with Stakeholders </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fee2e0a7-2c26-461b-830e-7c1842b61d88</guid>
      <link>https://share.transistor.fm/s/337fb867</link>
      <description>
        <![CDATA[<p>RS.CO-03 involves sharing incident information with designated stakeholders—both internal, like leadership, and external, like ISACs—consistent with response plans and agreements. This includes voluntary sharing of anonymized attack data or updates on insider threats with HR, enhancing situational awareness. It ensures relevant parties stay informed.</p><p>This subcategory strengthens response by aligning information flow with contractual rules and crisis protocols, such as supplier coordination. It promotes broader cybersecurity collaboration while protecting sensitive data. RS.CO-03 builds a network of informed responders and supporters.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.CO-03 involves sharing incident information with designated stakeholders—both internal, like leadership, and external, like ISACs—consistent with response plans and agreements. This includes voluntary sharing of anonymized attack data or updates on insider threats with HR, enhancing situational awareness. It ensures relevant parties stay informed.</p><p>This subcategory strengthens response by aligning information flow with contractual rules and crisis protocols, such as supplier coordination. It promotes broader cybersecurity collaboration while protecting sensitive data. RS.CO-03 builds a network of informed responders and supporters.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:20:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/337fb867/0cd99165.mp3" length="19295444" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1200</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.CO-03 involves sharing incident information with designated stakeholders—both internal, like leadership, and external, like ISACs—consistent with response plans and agreements. This includes voluntary sharing of anonymized attack data or updates on insider threats with HR, enhancing situational awareness. It ensures relevant parties stay informed.</p><p>This subcategory strengthens response by aligning information flow with contractual rules and crisis protocols, such as supplier coordination. It promotes broader cybersecurity collaboration while protecting sensitive data. RS.CO-03 builds a network of informed responders and supporters.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/337fb867/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.MI-01 - Containing Cybersecurity Incidents</title>
      <itunes:episode>104</itunes:episode>
      <podcast:episode>104</podcast:episode>
      <itunes:title>RS.MI-01 - Containing Cybersecurity Incidents</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aba69dae-547f-4739-af56-a791402b0a2a</guid>
      <link>https://share.transistor.fm/s/af8f0fae</link>
      <description>
        <![CDATA[<p>RS.MI-01 focuses on containing incidents to prevent their expansion, using automated tools like antivirus or manual actions by responders to isolate threats. This can involve third-party assistance (e.g., ISPs) or redirecting compromised endpoints to remediation VLANs, limiting damage. It stops incidents from spreading further.</p><p>This subcategory aligns containment with risk priorities, ensuring rapid action protects critical assets and minimizes disruption. It supports a proactive stance by leveraging both technology and human intervention as needed. RS.MI-01 is the first line of defense in incident mitigation.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.MI-01 focuses on containing incidents to prevent their expansion, using automated tools like antivirus or manual actions by responders to isolate threats. This can involve third-party assistance (e.g., ISPs) or redirecting compromised endpoints to remediation VLANs, limiting damage. It stops incidents from spreading further.</p><p>This subcategory aligns containment with risk priorities, ensuring rapid action protects critical assets and minimizes disruption. It supports a proactive stance by leveraging both technology and human intervention as needed. RS.MI-01 is the first line of defense in incident mitigation.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:21:23 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/af8f0fae/ff478e6d.mp3" length="17511172" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1089</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.MI-01 focuses on containing incidents to prevent their expansion, using automated tools like antivirus or manual actions by responders to isolate threats. This can involve third-party assistance (e.g., ISPs) or redirecting compromised endpoints to remediation VLANs, limiting damage. It stops incidents from spreading further.</p><p>This subcategory aligns containment with risk priorities, ensuring rapid action protects critical assets and minimizes disruption. It supports a proactive stance by leveraging both technology and human intervention as needed. RS.MI-01 is the first line of defense in incident mitigation.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/af8f0fae/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RS.MI-02 - Eradicating Incident Threats </title>
      <itunes:episode>105</itunes:episode>
      <podcast:episode>105</podcast:episode>
      <itunes:title>RS.MI-02 - Eradicating Incident Threats </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">006da8d0-db70-46df-9448-dc7e3f7fb67d</guid>
      <link>https://share.transistor.fm/s/00319e51</link>
      <description>
        <![CDATA[<p>RS.MI-02 ensures incidents are fully eradicated, removing threats like malware or unauthorized access through automated system features or manual responder actions. This can involve third-party support, such as MSSPs, to eliminate root causes and residual risks. It restores systems to a secure state.</p><p>This subcategory aligns eradication with risk goals, ensuring complete threat removal to prevent recurrence, balancing speed with thoroughness. It supports recovery by clearing the path for safe restoration. RS.MI-02 finalizes the mitigation process with decisive action.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RS.MI-02 ensures incidents are fully eradicated, removing threats like malware or unauthorized access through automated system features or manual responder actions. This can involve third-party support, such as MSSPs, to eliminate root causes and residual risks. It restores systems to a secure state.</p><p>This subcategory aligns eradication with risk goals, ensuring complete threat removal to prevent recurrence, balancing speed with thoroughness. It supports recovery by clearing the path for safe restoration. RS.MI-02 finalizes the mitigation process with decisive action.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:21:54 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/00319e51/2139505b.mp3" length="17973848" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1118</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RS.MI-02 ensures incidents are fully eradicated, removing threats like malware or unauthorized access through automated system features or manual responder actions. This can involve third-party support, such as MSSPs, to eliminate root causes and residual risks. It restores systems to a secure state.</p><p>This subcategory aligns eradication with risk goals, ensuring complete threat removal to prevent recurrence, balancing speed with thoroughness. It supports recovery by clearing the path for safe restoration. RS.MI-02 finalizes the mitigation process with decisive action.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/00319e51/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RC.RP-01 - Launching Incident Recovery Efforts</title>
      <itunes:episode>106</itunes:episode>
      <podcast:episode>106</podcast:episode>
      <itunes:title>RC.RP-01 - Launching Incident Recovery Efforts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">73fb9a51-002e-4f5b-b85c-49befdefc918</guid>
      <link>https://share.transistor.fm/s/d542b2b2</link>
      <description>
        <![CDATA[<p>RC.RP-01 initiates the recovery phase of the incident response plan once triggered, ensuring all responsible parties are aware of their roles and required authorizations. This begins during or after containment, focusing on restoring affected systems and services systematically. It transitions the organization from response to recovery.</p><p>This subcategory aligns recovery with risk and operational priorities, ensuring a coordinated effort to regain normalcy with minimal disruption. It sets the stage for restoring availability, leveraging predefined plans for efficiency. RC.RP-01 launches the path to operational restoration.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RC.RP-01 initiates the recovery phase of the incident response plan once triggered, ensuring all responsible parties are aware of their roles and required authorizations. This begins during or after containment, focusing on restoring affected systems and services systematically. It transitions the organization from response to recovery.</p><p>This subcategory aligns recovery with risk and operational priorities, ensuring a coordinated effort to regain normalcy with minimal disruption. It sets the stage for restoring availability, leveraging predefined plans for efficiency. RC.RP-01 launches the path to operational restoration.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:22:35 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d542b2b2/e8019115.mp3" length="17400832" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1082</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RC.RP-01 initiates the recovery phase of the incident response plan once triggered, ensuring all responsible parties are aware of their roles and required authorizations. This begins during or after containment, focusing on restoring affected systems and services systematically. It transitions the organization from response to recovery.</p><p>This subcategory aligns recovery with risk and operational priorities, ensuring a coordinated effort to regain normalcy with minimal disruption. It sets the stage for restoring availability, leveraging predefined plans for efficiency. RC.RP-01 launches the path to operational restoration.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d542b2b2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RC.RP-02 - Prioritizing Recovery Actions</title>
      <itunes:episode>107</itunes:episode>
      <podcast:episode>107</podcast:episode>
      <itunes:title>RC.RP-02 - Prioritizing Recovery Actions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0ff2b3a2-ac8e-4f93-9895-3375a25e7105</guid>
      <link>https://share.transistor.fm/s/2a625085</link>
      <description>
        <![CDATA[<p>RC.RP-02 involves selecting, scoping, and prioritizing recovery actions based on incident response plan criteria and available resources, adapting as needs shift. This ensures efforts focus on critical systems first, balancing speed with effectiveness in execution. It operationalizes recovery with precision.</p><p>This subcategory aligns actions with risk and operational goals, ensuring resources address the most impactful areas efficiently. It supports flexibility by allowing reassessment of plans mid-recovery, optimizing outcomes. RC.RP-02 drives a targeted restoration process.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RC.RP-02 involves selecting, scoping, and prioritizing recovery actions based on incident response plan criteria and available resources, adapting as needs shift. This ensures efforts focus on critical systems first, balancing speed with effectiveness in execution. It operationalizes recovery with precision.</p><p>This subcategory aligns actions with risk and operational goals, ensuring resources address the most impactful areas efficiently. It supports flexibility by allowing reassessment of plans mid-recovery, optimizing outcomes. RC.RP-02 drives a targeted restoration process.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:23:07 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2a625085/f20bc4a5.mp3" length="18576963" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1155</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RC.RP-02 involves selecting, scoping, and prioritizing recovery actions based on incident response plan criteria and available resources, adapting as needs shift. This ensures efforts focus on critical systems first, balancing speed with effectiveness in execution. It operationalizes recovery with precision.</p><p>This subcategory aligns actions with risk and operational goals, ensuring resources address the most impactful areas efficiently. It supports flexibility by allowing reassessment of plans mid-recovery, optimizing outcomes. RC.RP-02 drives a targeted restoration process.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2a625085/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RC.RP-03 - Verifying Backup Integrity</title>
      <itunes:episode>108</itunes:episode>
      <podcast:episode>108</podcast:episode>
      <itunes:title>RC.RP-03 - Verifying Backup Integrity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9986bff6-8a6c-4e01-9128-769eec74be75</guid>
      <link>https://share.transistor.fm/s/919e13e6</link>
      <description>
        <![CDATA[<p>RC.RP-03 ensures backups and restoration assets are checked for integrity—free of compromise or corruption—before use in recovery efforts. This verification prevents reintroducing threats or using unreliable data, safeguarding the restoration process. It guarantees a clean starting point for recovery.</p><p>This subcategory aligns with risk management by prioritizing the reliability of recovery tools, reducing the chance of failed restorations. It supports operational continuity by ensuring only trusted assets are deployed. RC.RP-03 underpins a secure recovery foundation.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RC.RP-03 ensures backups and restoration assets are checked for integrity—free of compromise or corruption—before use in recovery efforts. This verification prevents reintroducing threats or using unreliable data, safeguarding the restoration process. It guarantees a clean starting point for recovery.</p><p>This subcategory aligns with risk management by prioritizing the reliability of recovery tools, reducing the chance of failed restorations. It supports operational continuity by ensuring only trusted assets are deployed. RC.RP-03 underpins a secure recovery foundation.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:23:38 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/919e13e6/302aff99.mp3" length="17833411" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1109</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RC.RP-03 ensures backups and restoration assets are checked for integrity—free of compromise or corruption—before use in recovery efforts. This verification prevents reintroducing threats or using unreliable data, safeguarding the restoration process. It guarantees a clean starting point for recovery.</p><p>This subcategory aligns with risk management by prioritizing the reliability of recovery tools, reducing the chance of failed restorations. It supports operational continuity by ensuring only trusted assets are deployed. RC.RP-03 underpins a secure recovery foundation.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/919e13e6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RC.RP-04 - Restoring Critical Functions Post-Incident</title>
      <itunes:episode>109</itunes:episode>
      <podcast:episode>109</podcast:episode>
      <itunes:title>RC.RP-04 - Restoring Critical Functions Post-Incident</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c177e784-befa-4a05-b5fa-a9bca22031fe</guid>
      <link>https://share.transistor.fm/s/c8d9ebb3</link>
      <description>
        <![CDATA[<p>RC.RP-04 considers critical mission functions and cybersecurity risks to define post-incident operational norms, using impact records to prioritize restoration order. This involves collaboration with system owners to confirm successful recovery and monitor performance for adequacy. It ensures recovery aligns with strategic goals.</p><p>This subcategory aligns restoration with risk and mission priorities, ensuring essential services resume first while maintaining security standards. It establishes a sustainable post-incident state, balancing functionality and protection. RC.RP-04 shapes a resilient operational recovery.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RC.RP-04 considers critical mission functions and cybersecurity risks to define post-incident operational norms, using impact records to prioritize restoration order. This involves collaboration with system owners to confirm successful recovery and monitor performance for adequacy. It ensures recovery aligns with strategic goals.</p><p>This subcategory aligns restoration with risk and mission priorities, ensuring essential services resume first while maintaining security standards. It establishes a sustainable post-incident state, balancing functionality and protection. RC.RP-04 shapes a resilient operational recovery.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:24:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c8d9ebb3/2bb53cd6.mp3" length="18563601" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1155</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RC.RP-04 considers critical mission functions and cybersecurity risks to define post-incident operational norms, using impact records to prioritize restoration order. This involves collaboration with system owners to confirm successful recovery and monitor performance for adequacy. It ensures recovery aligns with strategic goals.</p><p>This subcategory aligns restoration with risk and mission priorities, ensuring essential services resume first while maintaining security standards. It establishes a sustainable post-incident state, balancing functionality and protection. RC.RP-04 shapes a resilient operational recovery.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c8d9ebb3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RC.RP-05 - Confirming System Restoration  </title>
      <itunes:episode>110</itunes:episode>
      <podcast:episode>110</podcast:episode>
      <itunes:title>RC.RP-05 - Confirming System Restoration  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a744133e-b2e6-4de5-9636-5588e3d56730</guid>
      <link>https://share.transistor.fm/s/9ab9d904</link>
      <description>
        <![CDATA[<p>RC.RP-05 verifies the integrity of restored assets—checking for lingering threats or root causes—before returning systems to production, confirming normal operations. This involves testing restoration adequacy to ensure functionality and security are fully restored. It finalizes recovery with assurance.</p><p>This subcategory aligns with risk goals by ensuring restored systems are secure and operational, preventing recurrence from overlooked issues. It supports confidence in recovery outcomes through rigorous validation. RC.RP-05 completes the restoration process with integrity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RC.RP-05 verifies the integrity of restored assets—checking for lingering threats or root causes—before returning systems to production, confirming normal operations. This involves testing restoration adequacy to ensure functionality and security are fully restored. It finalizes recovery with assurance.</p><p>This subcategory aligns with risk goals by ensuring restored systems are secure and operational, preventing recurrence from overlooked issues. It supports confidence in recovery outcomes through rigorous validation. RC.RP-05 completes the restoration process with integrity.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:24:44 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9ab9d904/a837a988.mp3" length="18260570" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1136</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RC.RP-05 verifies the integrity of restored assets—checking for lingering threats or root causes—before returning systems to production, confirming normal operations. This involves testing restoration adequacy to ensure functionality and security are fully restored. It finalizes recovery with assurance.</p><p>This subcategory aligns with risk goals by ensuring restored systems are secure and operational, preventing recurrence from overlooked issues. It supports confidence in recovery outcomes through rigorous validation. RC.RP-05 completes the restoration process with integrity.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9ab9d904/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RC.RP-06 - Declaring Recovery Completion </title>
      <itunes:episode>111</itunes:episode>
      <podcast:episode>111</podcast:episode>
      <itunes:title>RC.RP-06 - Declaring Recovery Completion </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0387a1ed-41eb-4829-811d-6e49a42dae89</guid>
      <link>https://share.transistor.fm/s/db38641f</link>
      <description>
        <![CDATA[<p>RC.RP-06 declares the end of recovery once predefined criteria are met, finalizing the process with a comprehensive after-action report detailing the incident, actions, and lessons learned. This formal closure ensures all steps are documented for review and improvement. It marks the return to full normalcy.</p><p>This subcategory aligns with risk management by tying closure to measurable outcomes, ensuring accountability and transparency in recovery efforts. It supports future resilience by capturing insights for refinement. RC.RP-06 concludes recovery with clarity and foresight.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RC.RP-06 declares the end of recovery once predefined criteria are met, finalizing the process with a comprehensive after-action report detailing the incident, actions, and lessons learned. This formal closure ensures all steps are documented for review and improvement. It marks the return to full normalcy.</p><p>This subcategory aligns with risk management by tying closure to measurable outcomes, ensuring accountability and transparency in recovery efforts. It supports future resilience by capturing insights for refinement. RC.RP-06 concludes recovery with clarity and foresight.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:25:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/db38641f/59f0b041.mp3" length="18618342" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1158</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RC.RP-06 declares the end of recovery once predefined criteria are met, finalizing the process with a comprehensive after-action report detailing the incident, actions, and lessons learned. This formal closure ensures all steps are documented for review and improvement. It marks the return to full normalcy.</p><p>This subcategory aligns with risk management by tying closure to measurable outcomes, ensuring accountability and transparency in recovery efforts. It supports future resilience by capturing insights for refinement. RC.RP-06 concludes recovery with clarity and foresight.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/db38641f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RC.CO-03 - Communicating Recovery Progress </title>
      <itunes:episode>112</itunes:episode>
      <podcast:episode>112</podcast:episode>
      <itunes:title>RC.CO-03 - Communicating Recovery Progress </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">00a96e13-80e2-4a33-970e-b5974e7269ed</guid>
      <link>https://share.transistor.fm/s/e385c7ee</link>
      <description>
        <![CDATA[<p>RC.CO-03 ensures recovery activities and progress are shared with designated stakeholders—like leadership and suppliers—consistent with response plans and agreements. This includes regular updates on restoration status, adhering to contractual protocols for information sharing. It keeps all parties informed and aligned during recovery.</p><p>This subcategory aligns communication with risk and operational needs, fostering trust and coordination with critical partners. It supports a unified recovery effort by ensuring transparency on progress and challenges. RC.CO-03 sustains stakeholder engagement through the restoration phase.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RC.CO-03 ensures recovery activities and progress are shared with designated stakeholders—like leadership and suppliers—consistent with response plans and agreements. This includes regular updates on restoration status, adhering to contractual protocols for information sharing. It keeps all parties informed and aligned during recovery.</p><p>This subcategory aligns communication with risk and operational needs, fostering trust and coordination with critical partners. It supports a unified recovery effort by ensuring transparency on progress and challenges. RC.CO-03 sustains stakeholder engagement through the restoration phase.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:25:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e385c7ee/3f029330.mp3" length="18634644" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1159</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RC.CO-03 ensures recovery activities and progress are shared with designated stakeholders—like leadership and suppliers—consistent with response plans and agreements. This includes regular updates on restoration status, adhering to contractual protocols for information sharing. It keeps all parties informed and aligned during recovery.</p><p>This subcategory aligns communication with risk and operational needs, fostering trust and coordination with critical partners. It supports a unified recovery effort by ensuring transparency on progress and challenges. RC.CO-03 sustains stakeholder engagement through the restoration phase.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e385c7ee/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>RC.CO-04 - Sharing Public Recovery Updates</title>
      <itunes:episode>113</itunes:episode>
      <podcast:episode>113</podcast:episode>
      <itunes:title>RC.CO-04 - Sharing Public Recovery Updates</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3cd85810-0bb6-4d77-b90c-0bd88a9893dd</guid>
      <link>https://share.transistor.fm/s/15fb31c9</link>
      <description>
        <![CDATA[<p>RC.CO-04 involves sharing public updates on incident recovery using approved channels and messaging, such as breach notifications or preventative steps, to inform affected parties or the broader community. This ensures transparency about recovery efforts and future safeguards, maintaining public trust. It addresses external expectations post-incident.</p><p>This subcategory aligns with legal and risk requirements, ensuring communications are consistent and controlled to avoid misinformation. It supports reputation management by explaining recovery actions clearly and responsibly. RC.CO-04 bridges organizational recovery with public accountability.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>RC.CO-04 involves sharing public updates on incident recovery using approved channels and messaging, such as breach notifications or preventative steps, to inform affected parties or the broader community. This ensures transparency about recovery efforts and future safeguards, maintaining public trust. It addresses external expectations post-incident.</p><p>This subcategory aligns with legal and risk requirements, ensuring communications are consistent and controlled to avoid misinformation. It supports reputation management by explaining recovery actions clearly and responsibly. RC.CO-04 bridges organizational recovery with public accountability.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Feb 2025 23:26:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/15fb31c9/bca5e6cd.mp3" length="18395571" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1144</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>RC.CO-04 involves sharing public updates on incident recovery using approved channels and messaging, such as breach notifications or preventative steps, to inform affected parties or the broader community. This ensures transparency about recovery efforts and future safeguards, maintaining public trust. It addresses external expectations post-incident.</p><p>This subcategory aligns with legal and risk requirements, ensuring communications are consistent and controlled to avoid misinformation. It supports reputation management by explaining recovery actions clearly and responsibly. RC.CO-04 bridges organizational recovery with public accountability.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/15fb31c9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Welcome to Framework: The NIST CSF</title>
      <itunes:title>Welcome to Framework: The NIST CSF</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">e0e2b55f-dfa8-46c0-b8fc-7a809b78a4fe</guid>
      <link>https://share.transistor.fm/s/bae8bae4</link>
      <description>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 22:27:59 -0500</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bae8bae4/b8fa021f.mp3" length="4133615" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>104</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, nist, technology, educational, certification, hacking, blue team, red team</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bae8bae4/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
