<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-the-giac-gccc-audio-course" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified: The GIAC GCCC Audio Course</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-the-giac-gccc-audio-course</itunes:new-feed-url>
    <description>GCCC is a control-first security course built for busy professionals who want practical mastery of the CIS Controls v8 and the real-world workflows that make them stick. You’ll learn how to inventory assets and software with confidence, harden configurations without breaking operations, manage vulnerabilities with proof-based closure, and turn logging into outcomes through centralized collection, correlation, and sustainable alerting. The course also covers malware defense as layered prevention plus rapid containment, data protection through classification, access boundaries, and safe retention, and recovery readiness with RPO/RTO planning, backup isolation, and restore testing. You’ll strengthen governance across identity and access management, change control, third-party risk, awareness programs that drive behavior change, incident response readiness and execution, and how to use testing results to improve controls over time. Every lesson stays exam-focused while keeping the emphasis on operational evidence, measurable effectiveness, and decision-making under pressure—so you’re not just memorizing terms, you’re learning how to run the controls in production with confidence.
</description>
    <copyright>2026 Bare Metal Cyber</copyright>
    <podcast:guid>af88b261-0f35-53a2-afeb-0b122c66fc77</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="7b53f1c0-366a-5728-826b-5b1c0d45ecac" feedUrl="https://feeds.transistor.fm/framework-soc-2-compliance-course"/>
      <podcast:remoteItem feedGuid="3a5eeb4b-2c10-54fd-941a-e7190309122b" feedUrl="https://feeds.transistor.fm/framework-nist-800-53-audio-course"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="d97377c1-7035-525f-9ab3-8bdfa2c3a586" feedUrl="https://feeds.transistor.fm/framework-the-center-for-internet-security-cis-top-18-controls"/>
      <podcast:remoteItem feedGuid="12ba6b47-50a9-5caa-aebe-16bae40dbbc5" feedUrl="https://feeds.transistor.fm/cism"/>
      <podcast:remoteItem feedGuid="6ad73685-a446-5ab3-8b2c-c25af99834f6" feedUrl="https://feeds.transistor.fm/certified-the-security-prepcast"/>
      <podcast:remoteItem feedGuid="143fc9c4-74e3-506c-8f6a-319fe2cb366d" feedUrl="https://feeds.transistor.fm/certified-the-cissp-prepcast"/>
      <podcast:remoteItem feedGuid="8fb26813-bdb7-5678-85b7-f8b5206137a4" feedUrl="https://feeds.transistor.fm/certified-sans-giac-gsec-audio-course"/>
      <podcast:remoteItem feedGuid="9a42f4e8-efe3-507c-ba2f-e2d2d4db8bdf" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-presents-framework"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <itunes:applepodcastsverify>03ba44c0-0aea-11f1-bc8b-87b644f09467</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Mon, 09 Feb 2026 12:28:17 -0600" url="https://media.transistor.fm/727fab1d/c5c2dc75.mp3" length="607939" type="audio/mpeg">Welcome to the GIAC GCCC Audio Course</podcast:trailer>
    <language>en</language>
    <pubDate>Mon, 16 Mar 2026 19:22:42 -0500</pubDate>
    <lastBuildDate>Sun, 05 Apr 2026 00:04:57 -0500</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/NlD7igF-O3C7lOhjtgkcEPmEt3ZkCXga1hNQBJwqZ0A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ZGNh/NzBlNGVjODJlN2Ew/YzQzM2MzMzVhMWIy/ODIyOS5wbmc.jpg</url>
      <title>Certified: The GIAC GCCC Audio Course</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>serial</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/NlD7igF-O3C7lOhjtgkcEPmEt3ZkCXga1hNQBJwqZ0A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84ZGNh/NzBlNGVjODJlN2Ew/YzQzM2MzMzVhMWIy/ODIyOS5wbmc.jpg"/>
    <itunes:summary>GCCC is a control-first security course built for busy professionals who want practical mastery of the CIS Controls v8 and the real-world workflows that make them stick. You’ll learn how to inventory assets and software with confidence, harden configurations without breaking operations, manage vulnerabilities with proof-based closure, and turn logging into outcomes through centralized collection, correlation, and sustainable alerting. The course also covers malware defense as layered prevention plus rapid containment, data protection through classification, access boundaries, and safe retention, and recovery readiness with RPO/RTO planning, backup isolation, and restore testing. You’ll strengthen governance across identity and access management, change control, third-party risk, awareness programs that drive behavior change, incident response readiness and execution, and how to use testing results to improve controls over time. Every lesson stays exam-focused while keeping the emphasis on operational evidence, measurable effectiveness, and decision-making under pressure—so you’re not just memorizing terms, you’re learning how to run the controls in production with confidence.
</itunes:summary>
    <itunes:subtitle>GCCC is a control-first security course built for busy professionals who want practical mastery of the CIS Controls v8 and the real-world workflows that make them stick.</itunes:subtitle>
    <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 1 — Decode the GCCC blueprint: domains, scoring, pacing, and what 71% demands</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1 — Decode the GCCC blueprint: domains, scoring, pacing, and what 71% demands</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e7970b1d-8ad4-4b86-8620-c5a4bca8ced9</guid>
      <link>https://share.transistor.fm/s/c92ccc02</link>
      <description>
        <![CDATA[<p>This episode focuses on interpreting the GCCC exam blueprint so you can study with precision instead of guesswork. You’ll break down how domains shape the question mix, what a passing score means in practical terms, and how pacing decisions affect outcomes when time pressure builds. We’ll translate “71%” into a performance target by discussing consistency across domains, avoiding preventable misses, and recognizing when a question is testing definitions versus applied judgment. You’ll also learn exam-day tactics like timeboxing per block of questions, identifying high-effort traps, and using a disciplined second-pass review to recover points without running out of time. Finally, we connect blueprint awareness to real work by showing how control intent and operational evidence commonly appear in scenario-style prompts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on interpreting the GCCC exam blueprint so you can study with precision instead of guesswork. You’ll break down how domains shape the question mix, what a passing score means in practical terms, and how pacing decisions affect outcomes when time pressure builds. We’ll translate “71%” into a performance target by discussing consistency across domains, avoiding preventable misses, and recognizing when a question is testing definitions versus applied judgment. You’ll also learn exam-day tactics like timeboxing per block of questions, identifying high-effort traps, and using a disciplined second-pass review to recover points without running out of time. Finally, we connect blueprint awareness to real work by showing how control intent and operational evidence commonly appear in scenario-style prompts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:50:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c92ccc02/b1ba8a58.mp3" length="32798366" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>818</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on interpreting the GCCC exam blueprint so you can study with precision instead of guesswork. You’ll break down how domains shape the question mix, what a passing score means in practical terms, and how pacing decisions affect outcomes when time pressure builds. We’ll translate “71%” into a performance target by discussing consistency across domains, avoiding preventable misses, and recognizing when a question is testing definitions versus applied judgment. You’ll also learn exam-day tactics like timeboxing per block of questions, identifying high-effort traps, and using a disciplined second-pass review to recover points without running out of time. Finally, we connect blueprint awareness to real work by showing how control intent and operational evidence commonly appear in scenario-style prompts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c92ccc02/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 2 — Build an audio-first study plan: recall cycles, review rhythm, and exam-day flow</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2 — Build an audio-first study plan: recall cycles, review rhythm, and exam-day flow</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">02eee350-c7d2-4369-9499-5abff62d4b69</guid>
      <link>https://share.transistor.fm/s/fa7a1641</link>
      <description>
        <![CDATA[<p>This episode builds an audio-first study plan designed for busy schedules while still meeting GCCC performance demands. You’ll learn how to structure short, repeatable recall cycles that force active retrieval, not passive listening, and how to set a weekly review rhythm that prevents forgetting from compounding. We’ll define what “good repetition” looks like using spaced review, mixed practice across domains, and quick self-check prompts that mimic exam constraints. You’ll also shape an exam-day flow plan: sleep, nutrition, warm-up recall, and a simple pre-exam checklist that reduces cognitive load when the first questions feel unfamiliar. Troubleshooting is included, such as what to do when you keep missing the same control concepts, how to tighten your error log, and how to pivot your next week’s plan based on measurable weak areas instead of vibes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode builds an audio-first study plan designed for busy schedules while still meeting GCCC performance demands. You’ll learn how to structure short, repeatable recall cycles that force active retrieval, not passive listening, and how to set a weekly review rhythm that prevents forgetting from compounding. We’ll define what “good repetition” looks like using spaced review, mixed practice across domains, and quick self-check prompts that mimic exam constraints. You’ll also shape an exam-day flow plan: sleep, nutrition, warm-up recall, and a simple pre-exam checklist that reduces cognitive load when the first questions feel unfamiliar. Troubleshooting is included, such as what to do when you keep missing the same control concepts, how to tighten your error log, and how to pivot your next week’s plan based on measurable weak areas instead of vibes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:51:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fa7a1641/a731342f.mp3" length="28298004" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>706</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode builds an audio-first study plan designed for busy schedules while still meeting GCCC performance demands. You’ll learn how to structure short, repeatable recall cycles that force active retrieval, not passive listening, and how to set a weekly review rhythm that prevents forgetting from compounding. We’ll define what “good repetition” looks like using spaced review, mixed practice across domains, and quick self-check prompts that mimic exam constraints. You’ll also shape an exam-day flow plan: sleep, nutrition, warm-up recall, and a simple pre-exam checklist that reduces cognitive load when the first questions feel unfamiliar. Troubleshooting is included, such as what to do when you keep missing the same control concepts, how to tighten your error log, and how to pivot your next week’s plan based on measurable weak areas instead of vibes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fa7a1641/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 3 — Understand CIS Controls v8 history, purpose, and how the model is organized</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3 — Understand CIS Controls v8 history, purpose, and how the model is organized</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4466c9f5-a1b2-472a-ab0c-c311d16623c6</guid>
      <link>https://share.transistor.fm/s/0aeb2c81</link>
      <description>
        <![CDATA[<p>This episode explains CIS Controls v8 in a way that supports both exam recall and practical implementation discussions. You’ll cover why the Controls exist, how they evolved from earlier versions, and what “prioritized, safeguard-focused guidance” means when an organization needs defensible security improvements. We’ll walk through the structure of the model, including Controls, Safeguards, and how grouping and sequencing help teams execute in manageable steps. You’ll learn how to answer exam questions that test intent, like distinguishing a Control’s goal from a specific Safeguard activity, and how to avoid confusion when similar-sounding safeguards appear across different areas. Real-world examples include aligning a small organization’s first steps versus a larger enterprise’s scaling approach, and how to use the Controls to communicate with leadership without turning the program into a paperwork exercise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains CIS Controls v8 in a way that supports both exam recall and practical implementation discussions. You’ll cover why the Controls exist, how they evolved from earlier versions, and what “prioritized, safeguard-focused guidance” means when an organization needs defensible security improvements. We’ll walk through the structure of the model, including Controls, Safeguards, and how grouping and sequencing help teams execute in manageable steps. You’ll learn how to answer exam questions that test intent, like distinguishing a Control’s goal from a specific Safeguard activity, and how to avoid confusion when similar-sounding safeguards appear across different areas. Real-world examples include aligning a small organization’s first steps versus a larger enterprise’s scaling approach, and how to use the Controls to communicate with leadership without turning the program into a paperwork exercise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:51:39 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0aeb2c81/56fed181.mp3" length="26938582" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>672</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains CIS Controls v8 in a way that supports both exam recall and practical implementation discussions. You’ll cover why the Controls exist, how they evolved from earlier versions, and what “prioritized, safeguard-focused guidance” means when an organization needs defensible security improvements. We’ll walk through the structure of the model, including Controls, Safeguards, and how grouping and sequencing help teams execute in manageable steps. You’ll learn how to answer exam questions that test intent, like distinguishing a Control’s goal from a specific Safeguard activity, and how to avoid confusion when similar-sounding safeguards appear across different areas. Real-world examples include aligning a small organization’s first steps versus a larger enterprise’s scaling approach, and how to use the Controls to communicate with leadership without turning the program into a paperwork exercise. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0aeb2c81/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 4 — Map CIS Controls to major security standards and governance expectations</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4 — Map CIS Controls to major security standards and governance expectations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a86ce08a-1653-4dea-8eaa-0ed270acd3f1</guid>
      <link>https://share.transistor.fm/s/3d4d1cae</link>
      <description>
        <![CDATA[<p>This episode connects CIS Controls v8 to the standards and governance expectations you’ll see referenced in GCCC-style thinking. You’ll learn why mapping matters, how organizations use crosswalks to avoid duplicate work, and what auditors and risk leaders expect when they ask, “Show me how your controls align to frameworks.” We’ll discuss how CIS Controls can support programs aligned to common standards, and how to interpret mapping language so you do not confuse a policy requirement with an operational safeguard. You’ll practice translating a safeguard into evidence artifacts, such as logs, configuration reports, access reviews, and remediation tickets, which helps on exam questions that test “what proves the control is working.” Troubleshooting covers pitfalls like treating a mapping table as a guarantee of compliance, or assuming a control exists because a policy document mentions it, when the exam often wants operational reality and verification. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode connects CIS Controls v8 to the standards and governance expectations you’ll see referenced in GCCC-style thinking. You’ll learn why mapping matters, how organizations use crosswalks to avoid duplicate work, and what auditors and risk leaders expect when they ask, “Show me how your controls align to frameworks.” We’ll discuss how CIS Controls can support programs aligned to common standards, and how to interpret mapping language so you do not confuse a policy requirement with an operational safeguard. You’ll practice translating a safeguard into evidence artifacts, such as logs, configuration reports, access reviews, and remediation tickets, which helps on exam questions that test “what proves the control is working.” Troubleshooting covers pitfalls like treating a mapping table as a guarantee of compliance, or assuming a control exists because a policy document mentions it, when the exam often wants operational reality and verification. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:52:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3d4d1cae/e834faf6.mp3" length="30492274" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>761</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode connects CIS Controls v8 to the standards and governance expectations you’ll see referenced in GCCC-style thinking. You’ll learn why mapping matters, how organizations use crosswalks to avoid duplicate work, and what auditors and risk leaders expect when they ask, “Show me how your controls align to frameworks.” We’ll discuss how CIS Controls can support programs aligned to common standards, and how to interpret mapping language so you do not confuse a policy requirement with an operational safeguard. You’ll practice translating a safeguard into evidence artifacts, such as logs, configuration reports, access reviews, and remediation tickets, which helps on exam questions that test “what proves the control is working.” Troubleshooting covers pitfalls like treating a mapping table as a guarantee of compliance, or assuming a control exists because a policy document mentions it, when the exam often wants operational reality and verification. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3d4d1cae/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 5 — Operationalize CIS Controls governance: owners, metrics, reporting, and accountability</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5 — Operationalize CIS Controls governance: owners, metrics, reporting, and accountability</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b0d435f-4bca-4a7e-aaaa-99d25410ffa8</guid>
      <link>https://share.transistor.fm/s/0b4bd1a6</link>
      <description>
        <![CDATA[<p>This episode turns CIS Controls from a reference document into a governed program that survives staff changes and competing priorities. You’ll define governance in practical terms: named owners, clear decision rights, and a repeatable cadence for measuring progress and handling exceptions. We’ll cover how to assign ownership so it matches where work actually happens, how to build metrics that show control outcomes instead of vanity counts, and how to report upward without drowning leadership in technical detail. You’ll also learn how accountability differs from responsibility, which often appears in exam questions as a subtle but important distinction. Scenarios include handling a control that spans security and IT operations, resolving conflicts when owners disagree on risk acceptance, and building an exception process that documents scope, duration, compensating safeguards, and revalidation so “temporary” does not become permanent drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode turns CIS Controls from a reference document into a governed program that survives staff changes and competing priorities. You’ll define governance in practical terms: named owners, clear decision rights, and a repeatable cadence for measuring progress and handling exceptions. We’ll cover how to assign ownership so it matches where work actually happens, how to build metrics that show control outcomes instead of vanity counts, and how to report upward without drowning leadership in technical detail. You’ll also learn how accountability differs from responsibility, which often appears in exam questions as a subtle but important distinction. Scenarios include handling a control that spans security and IT operations, resolving conflicts when owners disagree on risk acceptance, and building an exception process that documents scope, duration, compensating safeguards, and revalidation so “temporary” does not become permanent drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:52:30 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0b4bd1a6/fdf50bdd.mp3" length="29466212" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>735</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode turns CIS Controls from a reference document into a governed program that survives staff changes and competing priorities. You’ll define governance in practical terms: named owners, clear decision rights, and a repeatable cadence for measuring progress and handling exceptions. We’ll cover how to assign ownership so it matches where work actually happens, how to build metrics that show control outcomes instead of vanity counts, and how to report upward without drowning leadership in technical detail. You’ll also learn how accountability differs from responsibility, which often appears in exam questions as a subtle but important distinction. Scenarios include handling a control that spans security and IT operations, resolving conflicts when owners disagree on risk acceptance, and building an exception process that documents scope, duration, compensating safeguards, and revalidation so “temporary” does not become permanent drift. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0b4bd1a6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 6 — Define enterprise asset scope: what counts, why it matters, who owns accuracy</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6 — Define enterprise asset scope: what counts, why it matters, who owns accuracy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">681d98fe-24df-48ae-8741-687ae79a2384</guid>
      <link>https://share.transistor.fm/s/ae9e06e4</link>
      <description>
        <![CDATA[<p>This episode defines enterprise asset scope in a way that supports both exam questions and day-to-day security operations. You’ll clarify what “enterprise assets” include, such as endpoints, servers, cloud workloads, network devices, and managed services, and why scope errors cause control failures downstream. We’ll explain how asset scope ties directly to coverage-based questions, like whether vulnerability scanning or configuration management is meaningful when the inventory is incomplete. You’ll learn ownership models for inventory accuracy, including who approves scope changes, who maintains authoritative sources, and how to handle shared responsibilities between IT, security, and business units. Real-world examples include acquisitions, shadow IT, and cloud sprawl, where assets appear faster than governance can respond. Troubleshooting focuses on recognizing symptoms of inventory gaps, like inconsistent agent coverage, missing tags, or “unknown device” alerts that never get resolved into ownership and lifecycle tracking. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode defines enterprise asset scope in a way that supports both exam questions and day-to-day security operations. You’ll clarify what “enterprise assets” include, such as endpoints, servers, cloud workloads, network devices, and managed services, and why scope errors cause control failures downstream. We’ll explain how asset scope ties directly to coverage-based questions, like whether vulnerability scanning or configuration management is meaningful when the inventory is incomplete. You’ll learn ownership models for inventory accuracy, including who approves scope changes, who maintains authoritative sources, and how to handle shared responsibilities between IT, security, and business units. Real-world examples include acquisitions, shadow IT, and cloud sprawl, where assets appear faster than governance can respond. Troubleshooting focuses on recognizing symptoms of inventory gaps, like inconsistent agent coverage, missing tags, or “unknown device” alerts that never get resolved into ownership and lifecycle tracking. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:52:53 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ae9e06e4/d8c5ed15.mp3" length="25129868" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>627</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode defines enterprise asset scope in a way that supports both exam questions and day-to-day security operations. You’ll clarify what “enterprise assets” include, such as endpoints, servers, cloud workloads, network devices, and managed services, and why scope errors cause control failures downstream. We’ll explain how asset scope ties directly to coverage-based questions, like whether vulnerability scanning or configuration management is meaningful when the inventory is incomplete. You’ll learn ownership models for inventory accuracy, including who approves scope changes, who maintains authoritative sources, and how to handle shared responsibilities between IT, security, and business units. Real-world examples include acquisitions, shadow IT, and cloud sprawl, where assets appear faster than governance can respond. Troubleshooting focuses on recognizing symptoms of inventory gaps, like inconsistent agent coverage, missing tags, or “unknown device” alerts that never get resolved into ownership and lifecycle tracking. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ae9e06e4/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 7 — Discover enterprise assets continuously using multiple sources and reconciliation discipline</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7 — Discover enterprise assets continuously using multiple sources and reconciliation discipline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c883105d-85c1-4386-a323-f08be7742ecd</guid>
      <link>https://share.transistor.fm/s/431c7d34</link>
      <description>
        <![CDATA[<p>This episode focuses on continuous asset discovery, emphasizing how multiple data sources reduce blind spots but introduce reconciliation challenges. You’ll learn why single-source inventory approaches fail at scale, and how to combine signals from DHCP, DNS, directory services, endpoint management tools, cloud control planes, and network monitoring to improve completeness. We’ll define reconciliation as the process of deduplicating, matching identities, resolving conflicts, and deciding which system is authoritative for each attribute. Exam relevance shows up in questions about coverage, control validation, and the difference between “detected once” versus “managed as an ongoing lifecycle.” Scenarios include a device that appears in network logs but not in endpoint tools, and how to resolve whether it is unmanaged, misclassified, or truly unauthorized. Troubleshooting includes handling naming inconsistencies, stale records, and incomplete tagging, along with practical routines for setting thresholds, triage queues, and ownership follow-ups so discovery turns into action. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on continuous asset discovery, emphasizing how multiple data sources reduce blind spots but introduce reconciliation challenges. You’ll learn why single-source inventory approaches fail at scale, and how to combine signals from DHCP, DNS, directory services, endpoint management tools, cloud control planes, and network monitoring to improve completeness. We’ll define reconciliation as the process of deduplicating, matching identities, resolving conflicts, and deciding which system is authoritative for each attribute. Exam relevance shows up in questions about coverage, control validation, and the difference between “detected once” versus “managed as an ongoing lifecycle.” Scenarios include a device that appears in network logs but not in endpoint tools, and how to resolve whether it is unmanaged, misclassified, or truly unauthorized. Troubleshooting includes handling naming inconsistencies, stale records, and incomplete tagging, along with practical routines for setting thresholds, triage queues, and ownership follow-ups so discovery turns into action. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:53:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/431c7d34/8e9d8267.mp3" length="24988837" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>623</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on continuous asset discovery, emphasizing how multiple data sources reduce blind spots but introduce reconciliation challenges. You’ll learn why single-source inventory approaches fail at scale, and how to combine signals from DHCP, DNS, directory services, endpoint management tools, cloud control planes, and network monitoring to improve completeness. We’ll define reconciliation as the process of deduplicating, matching identities, resolving conflicts, and deciding which system is authoritative for each attribute. Exam relevance shows up in questions about coverage, control validation, and the difference between “detected once” versus “managed as an ongoing lifecycle.” Scenarios include a device that appears in network logs but not in endpoint tools, and how to resolve whether it is unmanaged, misclassified, or truly unauthorized. Troubleshooting includes handling naming inconsistencies, stale records, and incomplete tagging, along with practical routines for setting thresholds, triage queues, and ownership follow-ups so discovery turns into action. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/431c7d34/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 8 — Validate enterprise asset inventory quality with drift checks and audit-ready evidence</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8 — Validate enterprise asset inventory quality with drift checks and audit-ready evidence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2e514dea-c51a-4f33-9290-3f617361ae72</guid>
      <link>https://share.transistor.fm/s/ae6fd4c5</link>
      <description>
        <![CDATA[<p>This episode teaches you how to validate inventory quality rather than assuming an inventory tool is correct because it produces a list. You’ll define what “quality” means for asset data: completeness, accuracy, timeliness, uniqueness, and traceable ownership, all of which influence downstream controls like scanning, patching, and incident response. We’ll cover drift checks that compare expected versus observed assets, such as agent coverage reports, network discovery deltas, and cloud account resource changes, and how to turn those checks into a repeatable control routine. Exam relevance appears in questions asking what evidence proves a control is operating, not merely documented. You’ll also learn how to produce audit-ready evidence, including change records, reconciliation logs, exception approvals, and periodic review results. Troubleshooting scenarios include stale assets that never decommission, “ghost” records after reimaging, and environments where asset identity changes frequently, requiring durable identifiers and disciplined lifecycle processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you how to validate inventory quality rather than assuming an inventory tool is correct because it produces a list. You’ll define what “quality” means for asset data: completeness, accuracy, timeliness, uniqueness, and traceable ownership, all of which influence downstream controls like scanning, patching, and incident response. We’ll cover drift checks that compare expected versus observed assets, such as agent coverage reports, network discovery deltas, and cloud account resource changes, and how to turn those checks into a repeatable control routine. Exam relevance appears in questions asking what evidence proves a control is operating, not merely documented. You’ll also learn how to produce audit-ready evidence, including change records, reconciliation logs, exception approvals, and periodic review results. Troubleshooting scenarios include stale assets that never decommission, “ghost” records after reimaging, and environments where asset identity changes frequently, requiring durable identifiers and disciplined lifecycle processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:53:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ae6fd4c5/f097fd15.mp3" length="25614718" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>639</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you how to validate inventory quality rather than assuming an inventory tool is correct because it produces a list. You’ll define what “quality” means for asset data: completeness, accuracy, timeliness, uniqueness, and traceable ownership, all of which influence downstream controls like scanning, patching, and incident response. We’ll cover drift checks that compare expected versus observed assets, such as agent coverage reports, network discovery deltas, and cloud account resource changes, and how to turn those checks into a repeatable control routine. Exam relevance appears in questions asking what evidence proves a control is operating, not merely documented. You’ll also learn how to produce audit-ready evidence, including change records, reconciliation logs, exception approvals, and periodic review results. Troubleshooting scenarios include stale assets that never decommission, “ghost” records after reimaging, and environments where asset identity changes frequently, requiring durable identifiers and disciplined lifecycle processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ae6fd4c5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 9 — Establish software asset authority: approved lists, licensing realities, and control points</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9 — Establish software asset authority: approved lists, licensing realities, and control points</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">530bcecd-b517-4023-9d95-a70c7235d7b3</guid>
      <link>https://share.transistor.fm/s/af3bb22f</link>
      <description>
        <![CDATA[<p>This episode explains how to establish software asset authority so “approved software” is a controlled concept, not a vague preference. You’ll define software asset authority as the policies, tools, and decision processes that determine what is allowed, who approves it, and how changes are tracked across environments. We’ll connect this to exam expectations around governance and control enforcement, including why licensing constraints, vendor support status, and security risk all influence approval decisions. You’ll learn how approved lists differ by role and environment, such as production servers versus developer workstations, and how to handle exceptions without creating permanent holes in enforcement. Real-world examples include emergency installs during outages, legacy dependencies that cannot be removed immediately, and managing multiple package ecosystems. Troubleshooting covers missing ownership for approval decisions, lack of version control for the allowed list, and weak integration with procurement and endpoint tools that leaves teams unable to prove what is actually installed versus what is permitted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to establish software asset authority so “approved software” is a controlled concept, not a vague preference. You’ll define software asset authority as the policies, tools, and decision processes that determine what is allowed, who approves it, and how changes are tracked across environments. We’ll connect this to exam expectations around governance and control enforcement, including why licensing constraints, vendor support status, and security risk all influence approval decisions. You’ll learn how approved lists differ by role and environment, such as production servers versus developer workstations, and how to handle exceptions without creating permanent holes in enforcement. Real-world examples include emergency installs during outages, legacy dependencies that cannot be removed immediately, and managing multiple package ecosystems. Troubleshooting covers missing ownership for approval decisions, lack of version control for the allowed list, and weak integration with procurement and endpoint tools that leaves teams unable to prove what is actually installed versus what is permitted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:54:04 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/af3bb22f/82051883.mp3" length="25385896" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>633</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to establish software asset authority so “approved software” is a controlled concept, not a vague preference. You’ll define software asset authority as the policies, tools, and decision processes that determine what is allowed, who approves it, and how changes are tracked across environments. We’ll connect this to exam expectations around governance and control enforcement, including why licensing constraints, vendor support status, and security risk all influence approval decisions. You’ll learn how approved lists differ by role and environment, such as production servers versus developer workstations, and how to handle exceptions without creating permanent holes in enforcement. Real-world examples include emergency installs during outages, legacy dependencies that cannot be removed immediately, and managing multiple package ecosystems. Troubleshooting covers missing ownership for approval decisions, lack of version control for the allowed list, and weak integration with procurement and endpoint tools that leaves teams unable to prove what is actually installed versus what is permitted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/af3bb22f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 10 — Detect unauthorized software quickly using discovery signals, baselines, and change patterns</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10 — Detect unauthorized software quickly using discovery signals, baselines, and change patterns</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a2430870-c186-40a9-a387-795e110ff1b2</guid>
      <link>https://share.transistor.fm/s/e4548806</link>
      <description>
        <![CDATA[<p>This episode focuses on detecting unauthorized software fast enough to reduce dwell time and prevent small issues from becoming incidents. You’ll learn what counts as unauthorized, including unapproved tools, risky remote access utilities, pirated software, and unexpected admin tools that often signal compromise. We’ll cover discovery signals such as endpoint inventory deltas, EDR telemetry, application execution logs, package manager histories, and software deployment tool reports, then explain how baselines help distinguish normal change from suspicious change. Exam relevance includes recognizing which data sources provide the strongest evidence and what response steps make sense based on risk and business impact. Scenarios include a newly installed tool that matches known attacker tradecraft and a harmless but unlicensed app that still creates compliance exposure. Troubleshooting includes reducing false positives, handling software that changes names or installs in nonstandard paths, and building a workflow that assigns owners, validates legitimacy, and documents outcomes so detection becomes a repeatable control, not an endless alert stream. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on detecting unauthorized software fast enough to reduce dwell time and prevent small issues from becoming incidents. You’ll learn what counts as unauthorized, including unapproved tools, risky remote access utilities, pirated software, and unexpected admin tools that often signal compromise. We’ll cover discovery signals such as endpoint inventory deltas, EDR telemetry, application execution logs, package manager histories, and software deployment tool reports, then explain how baselines help distinguish normal change from suspicious change. Exam relevance includes recognizing which data sources provide the strongest evidence and what response steps make sense based on risk and business impact. Scenarios include a newly installed tool that matches known attacker tradecraft and a harmless but unlicensed app that still creates compliance exposure. Troubleshooting includes reducing false positives, handling software that changes names or installs in nonstandard paths, and building a workflow that assigns owners, validates legitimacy, and documents outcomes so detection becomes a repeatable control, not an endless alert stream. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:54:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e4548806/93ec3b1b.mp3" length="22598113" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>563</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on detecting unauthorized software fast enough to reduce dwell time and prevent small issues from becoming incidents. You’ll learn what counts as unauthorized, including unapproved tools, risky remote access utilities, pirated software, and unexpected admin tools that often signal compromise. We’ll cover discovery signals such as endpoint inventory deltas, EDR telemetry, application execution logs, package manager histories, and software deployment tool reports, then explain how baselines help distinguish normal change from suspicious change. Exam relevance includes recognizing which data sources provide the strongest evidence and what response steps make sense based on risk and business impact. Scenarios include a newly installed tool that matches known attacker tradecraft and a harmless but unlicensed app that still creates compliance exposure. Troubleshooting includes reducing false positives, handling software that changes names or installs in nonstandard paths, and building a workflow that assigns owners, validates legitimacy, and documents outcomes so detection becomes a repeatable control, not an endless alert stream. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e4548806/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 11 — Prevent unapproved execution with allowlisting logic and tightly governed exceptions</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11 — Prevent unapproved execution with allowlisting logic and tightly governed exceptions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1a2ce879-446b-4c82-8ca7-012804cd4d80</guid>
      <link>https://share.transistor.fm/s/b01d730d</link>
      <description>
        <![CDATA[<p>This episode explains how application allowlisting reduces attack surface by controlling what is permitted to execute, not just what is blocked after detection. You’ll define allowlisting in practical terms, including path rules, publisher signatures, hashes, and policy scopes that apply differently to servers, endpoints, and privileged admin workstations. For the exam, you’ll focus on the intent: preventing unknown binaries, scripts, and living-off-the-land abuse from running when a user is tricked or a system is partially compromised. We’ll walk through how to design exceptions without undermining the control, including who can request an exception, what evidence is required, how to time-box approvals, and how to review exceptions for removal. Real-world scenarios include urgent business installs, developer toolchains, and break-glass troubleshooting, with guidance on compensating safeguards like monitoring, temporary elevation, and restricted execution contexts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how application allowlisting reduces attack surface by controlling what is permitted to execute, not just what is blocked after detection. You’ll define allowlisting in practical terms, including path rules, publisher signatures, hashes, and policy scopes that apply differently to servers, endpoints, and privileged admin workstations. For the exam, you’ll focus on the intent: preventing unknown binaries, scripts, and living-off-the-land abuse from running when a user is tricked or a system is partially compromised. We’ll walk through how to design exceptions without undermining the control, including who can request an exception, what evidence is required, how to time-box approvals, and how to review exceptions for removal. Real-world scenarios include urgent business installs, developer toolchains, and break-glass troubleshooting, with guidance on compensating safeguards like monitoring, temporary elevation, and restricted execution contexts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:54:54 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b01d730d/4b53e10e.mp3" length="23863468" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>595</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how application allowlisting reduces attack surface by controlling what is permitted to execute, not just what is blocked after detection. You’ll define allowlisting in practical terms, including path rules, publisher signatures, hashes, and policy scopes that apply differently to servers, endpoints, and privileged admin workstations. For the exam, you’ll focus on the intent: preventing unknown binaries, scripts, and living-off-the-land abuse from running when a user is tricked or a system is partially compromised. We’ll walk through how to design exceptions without undermining the control, including who can request an exception, what evidence is required, how to time-box approvals, and how to review exceptions for removal. Real-world scenarios include urgent business installs, developer toolchains, and break-glass troubleshooting, with guidance on compensating safeguards like monitoring, temporary elevation, and restricted execution contexts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b01d730d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 12 — Design secure configuration baselines that are measurable, repeatable, and realistic</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12 — Design secure configuration baselines that are measurable, repeatable, and realistic</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">12f85152-5cda-42b5-8b1c-ac6b577c054a</guid>
      <link>https://share.transistor.fm/s/1c5f86d5</link>
      <description>
        <![CDATA[<p>This episode focuses on configuration baselines as the foundation for hardening that can be verified, maintained, and defended under audit. You’ll define a baseline as a documented, approved set of secure settings for a specific asset class, such as Windows workstations, Linux servers, network devices, or cloud workloads, and you’ll connect that definition to exam questions that test “policy versus enforceable configuration.” We’ll cover how to make baselines measurable by choosing settings you can query and report on, repeatable by using templates and automation, and realistic by accounting for operational needs like performance, legacy dependencies, and maintenance windows. You’ll practice thinking through baseline scope boundaries, version control, and ownership, including how to manage baseline changes as threats evolve. Troubleshooting includes handling conflicting requirements, preventing “baseline sprawl,” and keeping exceptions from becoming silent defaults that erase the value of standardization. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on configuration baselines as the foundation for hardening that can be verified, maintained, and defended under audit. You’ll define a baseline as a documented, approved set of secure settings for a specific asset class, such as Windows workstations, Linux servers, network devices, or cloud workloads, and you’ll connect that definition to exam questions that test “policy versus enforceable configuration.” We’ll cover how to make baselines measurable by choosing settings you can query and report on, repeatable by using templates and automation, and realistic by accounting for operational needs like performance, legacy dependencies, and maintenance windows. You’ll practice thinking through baseline scope boundaries, version control, and ownership, including how to manage baseline changes as threats evolve. Troubleshooting includes handling conflicting requirements, preventing “baseline sprawl,” and keeping exceptions from becoming silent defaults that erase the value of standardization. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:55:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1c5f86d5/9e112870.mp3" length="22865591" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>570</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on configuration baselines as the foundation for hardening that can be verified, maintained, and defended under audit. You’ll define a baseline as a documented, approved set of secure settings for a specific asset class, such as Windows workstations, Linux servers, network devices, or cloud workloads, and you’ll connect that definition to exam questions that test “policy versus enforceable configuration.” We’ll cover how to make baselines measurable by choosing settings you can query and report on, repeatable by using templates and automation, and realistic by accounting for operational needs like performance, legacy dependencies, and maintenance windows. You’ll practice thinking through baseline scope boundaries, version control, and ownership, including how to manage baseline changes as threats evolve. Troubleshooting includes handling conflicting requirements, preventing “baseline sprawl,” and keeping exceptions from becoming silent defaults that erase the value of standardization. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1c5f86d5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 13 — Control configuration drift with monitoring, remediation workflows, and change discipline</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13 — Control configuration drift with monitoring, remediation workflows, and change discipline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a7909921-3271-4c54-8eca-4a292886d30b</guid>
      <link>https://share.transistor.fm/s/70a21c66</link>
      <description>
        <![CDATA[<p>This episode teaches configuration drift as an operational reality and shows how to control it without freezing the business. You’ll define drift as deviation from an approved baseline over time, caused by patches, manual fixes, emergency changes, tool updates, or unauthorized modifications, and you’ll connect it to exam themes like continuous control validation and lifecycle governance. We’ll cover monitoring approaches, from periodic configuration checks to near-real-time policy evaluation, and how to tune for meaningful drift rather than noise. You’ll learn remediation workflows that assign ownership, set timelines, distinguish planned change from misconfiguration, and include rollback paths when a “fix” breaks production. Real-world scenarios include drift caused by outage response, inconsistent golden images, and cloud policy gaps where teams can bypass standards with a few clicks. Troubleshooting emphasizes keeping evidence of detection and correction, preventing repeat drift through root-cause analysis, and integrating drift control with change management so security and operations stay aligned. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches configuration drift as an operational reality and shows how to control it without freezing the business. You’ll define drift as deviation from an approved baseline over time, caused by patches, manual fixes, emergency changes, tool updates, or unauthorized modifications, and you’ll connect it to exam themes like continuous control validation and lifecycle governance. We’ll cover monitoring approaches, from periodic configuration checks to near-real-time policy evaluation, and how to tune for meaningful drift rather than noise. You’ll learn remediation workflows that assign ownership, set timelines, distinguish planned change from misconfiguration, and include rollback paths when a “fix” breaks production. Real-world scenarios include drift caused by outage response, inconsistent golden images, and cloud policy gaps where teams can bypass standards with a few clicks. Troubleshooting emphasizes keeping evidence of detection and correction, preventing repeat drift through root-cause analysis, and integrating drift control with change management so security and operations stay aligned. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:55:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/70a21c66/109b2b7c.mp3" length="24704621" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>616</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches configuration drift as an operational reality and shows how to control it without freezing the business. You’ll define drift as deviation from an approved baseline over time, caused by patches, manual fixes, emergency changes, tool updates, or unauthorized modifications, and you’ll connect it to exam themes like continuous control validation and lifecycle governance. We’ll cover monitoring approaches, from periodic configuration checks to near-real-time policy evaluation, and how to tune for meaningful drift rather than noise. You’ll learn remediation workflows that assign ownership, set timelines, distinguish planned change from misconfiguration, and include rollback paths when a “fix” breaks production. Real-world scenarios include drift caused by outage response, inconsistent golden images, and cloud policy gaps where teams can bypass standards with a few clicks. Troubleshooting emphasizes keeping evidence of detection and correction, preventing repeat drift through root-cause analysis, and integrating drift control with change management so security and operations stay aligned. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/70a21c66/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 14 — Prove configuration compliance with sampling, evidence, and exception governance</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14 — Prove configuration compliance with sampling, evidence, and exception governance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e5cd9766-1eab-4e42-b308-ef200e4e02be</guid>
      <link>https://share.transistor.fm/s/d5c5a0ee</link>
      <description>
        <![CDATA[<p>This episode focuses on proving configuration compliance in ways that stand up to scrutiny, which is a common exam angle: the difference between claiming compliance and demonstrating it. You’ll learn how compliance evidence is created through repeatable checks, documented scope, and results that tie back to specific baseline requirements. We’ll discuss when sampling is acceptable, how to choose a sample that is defensible, and how to avoid misleading conclusions when environments are heterogeneous or rapidly changing. You’ll also cover exception governance, including how to document why an exception exists, what compensating safeguards are in place, and how to time-limit and revalidate exceptions so they do not become permanent drift. Real-world examples include demonstrating secure configuration for a critical server group, reconciling conflicting tool reports, and producing artifacts such as query outputs, compliance dashboards, tickets, and approvals. Troubleshooting includes handling partial tool coverage, stale reports, and “green dashboards” that hide mis-scoped inventories or missing data. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on proving configuration compliance in ways that stand up to scrutiny, which is a common exam angle: the difference between claiming compliance and demonstrating it. You’ll learn how compliance evidence is created through repeatable checks, documented scope, and results that tie back to specific baseline requirements. We’ll discuss when sampling is acceptable, how to choose a sample that is defensible, and how to avoid misleading conclusions when environments are heterogeneous or rapidly changing. You’ll also cover exception governance, including how to document why an exception exists, what compensating safeguards are in place, and how to time-limit and revalidate exceptions so they do not become permanent drift. Real-world examples include demonstrating secure configuration for a critical server group, reconciling conflicting tool reports, and producing artifacts such as query outputs, compliance dashboards, tickets, and approvals. Troubleshooting includes handling partial tool coverage, stale reports, and “green dashboards” that hide mis-scoped inventories or missing data. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:56:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d5c5a0ee/3f1a54a7.mp3" length="24487265" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>611</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on proving configuration compliance in ways that stand up to scrutiny, which is a common exam angle: the difference between claiming compliance and demonstrating it. You’ll learn how compliance evidence is created through repeatable checks, documented scope, and results that tie back to specific baseline requirements. We’ll discuss when sampling is acceptable, how to choose a sample that is defensible, and how to avoid misleading conclusions when environments are heterogeneous or rapidly changing. You’ll also cover exception governance, including how to document why an exception exists, what compensating safeguards are in place, and how to time-limit and revalidate exceptions so they do not become permanent drift. Real-world examples include demonstrating secure configuration for a critical server group, reconciling conflicting tool reports, and producing artifacts such as query outputs, compliance dashboards, tickets, and approvals. Troubleshooting includes handling partial tool coverage, stale reports, and “green dashboards” that hide mis-scoped inventories or missing data. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d5c5a0ee/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 15 — Clarify account types and lifecycles: user, admin, service, shared, and temporary</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15 — Clarify account types and lifecycles: user, admin, service, shared, and temporary</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5fdb4e70-6e65-4ad9-bdb4-a0fa49b11e36</guid>
      <link>https://share.transistor.fm/s/061931e4</link>
      <description>
        <![CDATA[<p>This episode breaks down account types and lifecycles so you can answer identity questions cleanly and design safer access in real environments. You’ll define standard user accounts, privileged admin accounts, service accounts, shared accounts, and temporary accounts, and you’ll connect each type to its typical risks, management needs, and audit expectations. For the exam, you’ll focus on recognizing when a scenario implies the wrong account type is being used, such as administrators browsing the web from privileged accounts or services relying on shared credentials without ownership. We’ll cover lifecycle stages from request and approval through provisioning, use, review, and deprovisioning, emphasizing what changes when accounts are non-human or time-bound. Real-world scenarios include vendors needing short-term access, automated jobs running with excessive privileges, and emergency shared accounts that become permanent. Troubleshooting includes tracking ownership, enforcing naming and tagging conventions, limiting where privileged accounts can log in, and building processes that prevent “mystery accounts” from accumulating over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode breaks down account types and lifecycles so you can answer identity questions cleanly and design safer access in real environments. You’ll define standard user accounts, privileged admin accounts, service accounts, shared accounts, and temporary accounts, and you’ll connect each type to its typical risks, management needs, and audit expectations. For the exam, you’ll focus on recognizing when a scenario implies the wrong account type is being used, such as administrators browsing the web from privileged accounts or services relying on shared credentials without ownership. We’ll cover lifecycle stages from request and approval through provisioning, use, review, and deprovisioning, emphasizing what changes when accounts are non-human or time-bound. Real-world scenarios include vendors needing short-term access, automated jobs running with excessive privileges, and emergency shared accounts that become permanent. Troubleshooting includes tracking ownership, enforcing naming and tagging conventions, limiting where privileged accounts can log in, and building processes that prevent “mystery accounts” from accumulating over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:56:25 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/061931e4/52f0bee2.mp3" length="38312311" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>956</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode breaks down account types and lifecycles so you can answer identity questions cleanly and design safer access in real environments. You’ll define standard user accounts, privileged admin accounts, service accounts, shared accounts, and temporary accounts, and you’ll connect each type to its typical risks, management needs, and audit expectations. For the exam, you’ll focus on recognizing when a scenario implies the wrong account type is being used, such as administrators browsing the web from privileged accounts or services relying on shared credentials without ownership. We’ll cover lifecycle stages from request and approval through provisioning, use, review, and deprovisioning, emphasizing what changes when accounts are non-human or time-bound. Real-world scenarios include vendors needing short-term access, automated jobs running with excessive privileges, and emergency shared accounts that become permanent. Troubleshooting includes tracking ownership, enforcing naming and tagging conventions, limiting where privileged accounts can log in, and building processes that prevent “mystery accounts” from accumulating over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/061931e4/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 16 — Provision accounts safely with approvals, role fit, and minimum privilege intent</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16 — Provision accounts safely with approvals, role fit, and minimum privilege intent</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9334f95a-f014-4d9a-9e64-bc107447358b</guid>
      <link>https://share.transistor.fm/s/84fd80c5</link>
      <description>
        <![CDATA[<p>This episode focuses on secure account provisioning as a control that prevents future incidents by getting access right at the start. You’ll learn how approvals should reflect business justification and role fit, not informal requests, and how to document intent so access is defensible and reviewable later. We’ll define minimum privilege as granting only the permissions needed for expected tasks, then show how that intent is applied through role-based access control, group-based entitlements, and time-bound elevation for rare administrative actions. Exam relevance includes identifying weak provisioning practices, such as granting broad access “just in case,” skipping manager approval, or provisioning privileges outside standard workflows. Real-world scenarios include onboarding in a fast-moving team, provisioning access to sensitive data sets, and handling privileged access for administrators in ways that separate daily work from high-risk actions. Troubleshooting covers preventing privilege creep at onboarding, verifying that provisioning matches the requested role, and integrating provisioning with inventory and ticketing so you can prove who approved access and when it was granted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on secure account provisioning as a control that prevents future incidents by getting access right at the start. You’ll learn how approvals should reflect business justification and role fit, not informal requests, and how to document intent so access is defensible and reviewable later. We’ll define minimum privilege as granting only the permissions needed for expected tasks, then show how that intent is applied through role-based access control, group-based entitlements, and time-bound elevation for rare administrative actions. Exam relevance includes identifying weak provisioning practices, such as granting broad access “just in case,” skipping manager approval, or provisioning privileges outside standard workflows. Real-world scenarios include onboarding in a fast-moving team, provisioning access to sensitive data sets, and handling privileged access for administrators in ways that separate daily work from high-risk actions. Troubleshooting covers preventing privilege creep at onboarding, verifying that provisioning matches the requested role, and integrating provisioning with inventory and ticketing so you can prove who approved access and when it was granted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:56:51 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/84fd80c5/7fc5bb0f.mp3" length="32097256" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>801</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on secure account provisioning as a control that prevents future incidents by getting access right at the start. You’ll learn how approvals should reflect business justification and role fit, not informal requests, and how to document intent so access is defensible and reviewable later. We’ll define minimum privilege as granting only the permissions needed for expected tasks, then show how that intent is applied through role-based access control, group-based entitlements, and time-bound elevation for rare administrative actions. Exam relevance includes identifying weak provisioning practices, such as granting broad access “just in case,” skipping manager approval, or provisioning privileges outside standard workflows. Real-world scenarios include onboarding in a fast-moving team, provisioning access to sensitive data sets, and handling privileged access for administrators in ways that separate daily work from high-risk actions. Troubleshooting covers preventing privilege creep at onboarding, verifying that provisioning matches the requested role, and integrating provisioning with inventory and ticketing so you can prove who approved access and when it was granted. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/84fd80c5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 17 — Deprovision accounts cleanly to eliminate orphaned access and lingering entitlements</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17 — Deprovision accounts cleanly to eliminate orphaned access and lingering entitlements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">65d800ef-ea49-4573-9cfb-4a1441692851</guid>
      <link>https://share.transistor.fm/s/d238380c</link>
      <description>
        <![CDATA[<p>This episode covers deprovisioning as a high-impact security control that reduces exposure after employees change roles, leave the organization, or when services are retired. You’ll define orphaned access as credentials and entitlements that remain active without a valid owner, then connect that to common exam scenarios where former users still have VPN access, cloud keys, or group memberships that should have been removed. We’ll explain how deprovisioning must cover more than disabling a login, including removing privileged group membership, revoking tokens and API keys, rotating shared secrets, reclaiming licenses, and handling data ownership and mailbox access responsibly. Real-world examples include contractors ending early, transfers between departments, and service accounts tied to an application that has been replaced. Troubleshooting focuses on dependencies that break when access is removed, how to stage changes to avoid outages, and how to prove completion with evidence like account status reports, access removal logs, and periodic audits that discover lingering entitlements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers deprovisioning as a high-impact security control that reduces exposure after employees change roles, leave the organization, or when services are retired. You’ll define orphaned access as credentials and entitlements that remain active without a valid owner, then connect that to common exam scenarios where former users still have VPN access, cloud keys, or group memberships that should have been removed. We’ll explain how deprovisioning must cover more than disabling a login, including removing privileged group membership, revoking tokens and API keys, rotating shared secrets, reclaiming licenses, and handling data ownership and mailbox access responsibly. Real-world examples include contractors ending early, transfers between departments, and service accounts tied to an application that has been replaced. Troubleshooting focuses on dependencies that break when access is removed, how to stage changes to avoid outages, and how to prove completion with evidence like account status reports, access removal logs, and periodic audits that discover lingering entitlements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:57:14 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d238380c/91d79da0.mp3" length="29079599" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>725</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers deprovisioning as a high-impact security control that reduces exposure after employees change roles, leave the organization, or when services are retired. You’ll define orphaned access as credentials and entitlements that remain active without a valid owner, then connect that to common exam scenarios where former users still have VPN access, cloud keys, or group memberships that should have been removed. We’ll explain how deprovisioning must cover more than disabling a login, including removing privileged group membership, revoking tokens and API keys, rotating shared secrets, reclaiming licenses, and handling data ownership and mailbox access responsibly. Real-world examples include contractors ending early, transfers between departments, and service accounts tied to an application that has been replaced. Troubleshooting focuses on dependencies that break when access is removed, how to stage changes to avoid outages, and how to prove completion with evidence like account status reports, access removal logs, and periodic audits that discover lingering entitlements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d238380c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 18 — Strengthen authentication foundations: factors, session controls, and identity assurance</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18 — Strengthen authentication foundations: factors, session controls, and identity assurance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92cd54ab-37e9-44b3-a6e3-4a92d65987c1</guid>
      <link>https://share.transistor.fm/s/81fe7359</link>
      <description>
        <![CDATA[<p>This episode explains authentication as more than “add MFA,” focusing on factors, session controls, and identity assurance that collectively reduce account takeover risk. You’ll define authentication factors, including knowledge, possession, and inherence, and you’ll discuss why factor strength varies depending on implementation, phishing resistance, and recovery pathways. For the exam, you’ll learn how questions often probe weak links, such as insecure password reset flows, overlong sessions, inconsistent MFA enforcement, or privileged accounts lacking stronger controls. We’ll cover session controls like timeouts, reauthentication for sensitive actions, conditional access based on device posture or location, and detection of anomalous sign-in behavior. Real-world scenarios include rolling out MFA without locking down legacy protocols, balancing usability with security for frontline staff, and controlling admin access with step-up authentication. Troubleshooting includes handling MFA fatigue risks, reducing helpdesk-driven bypasses, and creating measurable assurance levels tied to the sensitivity of the resource being accessed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains authentication as more than “add MFA,” focusing on factors, session controls, and identity assurance that collectively reduce account takeover risk. You’ll define authentication factors, including knowledge, possession, and inherence, and you’ll discuss why factor strength varies depending on implementation, phishing resistance, and recovery pathways. For the exam, you’ll learn how questions often probe weak links, such as insecure password reset flows, overlong sessions, inconsistent MFA enforcement, or privileged accounts lacking stronger controls. We’ll cover session controls like timeouts, reauthentication for sensitive actions, conditional access based on device posture or location, and detection of anomalous sign-in behavior. Real-world scenarios include rolling out MFA without locking down legacy protocols, balancing usability with security for frontline staff, and controlling admin access with step-up authentication. Troubleshooting includes handling MFA fatigue risks, reducing helpdesk-driven bypasses, and creating measurable assurance levels tied to the sensitivity of the resource being accessed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:57:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/81fe7359/20af839f.mp3" length="37412668" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>934</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains authentication as more than “add MFA,” focusing on factors, session controls, and identity assurance that collectively reduce account takeover risk. You’ll define authentication factors, including knowledge, possession, and inherence, and you’ll discuss why factor strength varies depending on implementation, phishing resistance, and recovery pathways. For the exam, you’ll learn how questions often probe weak links, such as insecure password reset flows, overlong sessions, inconsistent MFA enforcement, or privileged accounts lacking stronger controls. We’ll cover session controls like timeouts, reauthentication for sensitive actions, conditional access based on device posture or location, and detection of anomalous sign-in behavior. Real-world scenarios include rolling out MFA without locking down legacy protocols, balancing usability with security for frontline staff, and controlling admin access with step-up authentication. Troubleshooting includes handling MFA fatigue risks, reducing helpdesk-driven bypasses, and creating measurable assurance levels tied to the sensitivity of the resource being accessed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/81fe7359/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 19 — Build authorization models that match real work without privilege creep</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19 — Build authorization models that match real work without privilege creep</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">90ce811c-0c5d-4fce-b930-51d37038facc</guid>
      <link>https://share.transistor.fm/s/30f6488c</link>
      <description>
        <![CDATA[<p>This episode focuses on authorization as the practical “what can you do” layer that must align to real job functions while resisting privilege creep over time. You’ll define authorization concepts like roles, permissions, entitlements, and resource scopes, then connect them to exam scenarios where access looks convenient but becomes dangerous when users accumulate rights across transfers and projects. We’ll cover how to design roles that are understandable and auditable, how to separate duties for high-risk actions, and how to use group-based access patterns that simplify control while preserving least privilege. Real-world examples include granting access to a shared data repository, controlling administrative actions in cloud platforms, and handling exceptions for power users without turning them into permanent admins. Troubleshooting emphasizes role explosion, overly broad “everyone” groups, and ad hoc direct permissions that bypass governance. You’ll also learn how to incorporate time-bound access, approval workflows, and logging so authorization supports both productivity and defensible security outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on authorization as the practical “what can you do” layer that must align to real job functions while resisting privilege creep over time. You’ll define authorization concepts like roles, permissions, entitlements, and resource scopes, then connect them to exam scenarios where access looks convenient but becomes dangerous when users accumulate rights across transfers and projects. We’ll cover how to design roles that are understandable and auditable, how to separate duties for high-risk actions, and how to use group-based access patterns that simplify control while preserving least privilege. Real-world examples include granting access to a shared data repository, controlling administrative actions in cloud platforms, and handling exceptions for power users without turning them into permanent admins. Troubleshooting emphasizes role explosion, overly broad “everyone” groups, and ad hoc direct permissions that bypass governance. You’ll also learn how to incorporate time-bound access, approval workflows, and logging so authorization supports both productivity and defensible security outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:58:01 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/30f6488c/bca836ea.mp3" length="30814104" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>769</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on authorization as the practical “what can you do” layer that must align to real job functions while resisting privilege creep over time. You’ll define authorization concepts like roles, permissions, entitlements, and resource scopes, then connect them to exam scenarios where access looks convenient but becomes dangerous when users accumulate rights across transfers and projects. We’ll cover how to design roles that are understandable and auditable, how to separate duties for high-risk actions, and how to use group-based access patterns that simplify control while preserving least privilege. Real-world examples include granting access to a shared data repository, controlling administrative actions in cloud platforms, and handling exceptions for power users without turning them into permanent admins. Troubleshooting emphasizes role explosion, overly broad “everyone” groups, and ad hoc direct permissions that bypass governance. You’ll also learn how to incorporate time-bound access, approval workflows, and logging so authorization supports both productivity and defensible security outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/30f6488c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 20 — Validate access control effectiveness with reviews, testing, and corrective action</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20 — Validate access control effectiveness with reviews, testing, and corrective action</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82980d80-fcff-4b38-8a46-8602d25b20ec</guid>
      <link>https://share.transistor.fm/s/6a64bf60</link>
      <description>
        <![CDATA[<p>This episode teaches how to validate access controls so you can detect gaps before attackers or auditors do, a theme that shows up frequently in control-focused exams. You’ll learn what “effective” means: access matches job needs, sensitive resources are protected, privileges are limited, and changes are reviewed and corrected on a schedule. We’ll cover access reviews, including frequency, scoping high-risk groups and resources, and validating that approvals are meaningful rather than rubber-stamped. You’ll also discuss testing approaches, such as attempting least-privilege verification, checking for privilege escalation paths, and confirming that revoked access truly stops working across sessions, tokens, and cached credentials. Real-world scenarios include cleaning up inherited permissions after reorganizations and validating that terminated users cannot access SaaS apps via lingering SSO sessions. Troubleshooting focuses on review fatigue, incomplete evidence, and corrective actions that never close, with guidance on tying findings to owners, deadlines, and proof of remediation so validation becomes a continuous improvement loop. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to validate access controls so you can detect gaps before attackers or auditors do, a theme that shows up frequently in control-focused exams. You’ll learn what “effective” means: access matches job needs, sensitive resources are protected, privileges are limited, and changes are reviewed and corrected on a schedule. We’ll cover access reviews, including frequency, scoping high-risk groups and resources, and validating that approvals are meaningful rather than rubber-stamped. You’ll also discuss testing approaches, such as attempting least-privilege verification, checking for privilege escalation paths, and confirming that revoked access truly stops working across sessions, tokens, and cached credentials. Real-world scenarios include cleaning up inherited permissions after reorganizations and validating that terminated users cannot access SaaS apps via lingering SSO sessions. Troubleshooting focuses on review fatigue, incomplete evidence, and corrective actions that never close, with guidance on tying findings to owners, deadlines, and proof of remediation so validation becomes a continuous improvement loop. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:58:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6a64bf60/ad4e13ce.mp3" length="18524036" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>461</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to validate access controls so you can detect gaps before attackers or auditors do, a theme that shows up frequently in control-focused exams. You’ll learn what “effective” means: access matches job needs, sensitive resources are protected, privileges are limited, and changes are reviewed and corrected on a schedule. We’ll cover access reviews, including frequency, scoping high-risk groups and resources, and validating that approvals are meaningful rather than rubber-stamped. You’ll also discuss testing approaches, such as attempting least-privilege verification, checking for privilege escalation paths, and confirming that revoked access truly stops working across sessions, tokens, and cached credentials. Real-world scenarios include cleaning up inherited permissions after reorganizations and validating that terminated users cannot access SaaS apps via lingering SSO sessions. Troubleshooting focuses on review fatigue, incomplete evidence, and corrective actions that never close, with guidance on tying findings to owners, deadlines, and proof of remediation so validation becomes a continuous improvement loop. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6a64bf60/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 21 — Build continuous vulnerability management: coverage, scan cadence, and owner assignment</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21 — Build continuous vulnerability management: coverage, scan cadence, and owner assignment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d92b4e8b-302f-462e-a618-941f1c726f24</guid>
      <link>https://share.transistor.fm/s/e393e60f</link>
      <description>
        <![CDATA[<p>This episode explains how to build a continuous vulnerability management program that the GCCC exam expects you to understand as an operational control, not a one-time scan. You’ll define vulnerability management as the lifecycle of discovering, assessing, prioritizing, remediating, and verifying weaknesses across in-scope assets, with special attention to coverage gaps that make “good results” meaningless. We’ll walk through choosing scan cadences based on asset criticality, exposure, and change rate, and how authenticated scanning and agent telemetry change what you can reliably detect. You’ll also learn why owner assignment is the hinge point between findings and fixes, including how to route issues to the right teams, handle shared ownership for platforms, and prevent remediation queues from becoming permanent backlogs. Troubleshooting includes dealing with missing credentials, fragile scanners, cloud inventory drift, and the common exam trap of confusing tool output with validated control effectiveness. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to build a continuous vulnerability management program that the GCCC exam expects you to understand as an operational control, not a one-time scan. You’ll define vulnerability management as the lifecycle of discovering, assessing, prioritizing, remediating, and verifying weaknesses across in-scope assets, with special attention to coverage gaps that make “good results” meaningless. We’ll walk through choosing scan cadences based on asset criticality, exposure, and change rate, and how authenticated scanning and agent telemetry change what you can reliably detect. You’ll also learn why owner assignment is the hinge point between findings and fixes, including how to route issues to the right teams, handle shared ownership for platforms, and prevent remediation queues from becoming permanent backlogs. Troubleshooting includes dealing with missing credentials, fragile scanners, cloud inventory drift, and the common exam trap of confusing tool output with validated control effectiveness. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:58:51 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e393e60f/fbae2d91.mp3" length="15012144" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>374</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to build a continuous vulnerability management program that the GCCC exam expects you to understand as an operational control, not a one-time scan. You’ll define vulnerability management as the lifecycle of discovering, assessing, prioritizing, remediating, and verifying weaknesses across in-scope assets, with special attention to coverage gaps that make “good results” meaningless. We’ll walk through choosing scan cadences based on asset criticality, exposure, and change rate, and how authenticated scanning and agent telemetry change what you can reliably detect. You’ll also learn why owner assignment is the hinge point between findings and fixes, including how to route issues to the right teams, handle shared ownership for platforms, and prevent remediation queues from becoming permanent backlogs. Troubleshooting includes dealing with missing credentials, fragile scanners, cloud inventory drift, and the common exam trap of confusing tool output with validated control effectiveness. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e393e60f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 22 — Prioritize vulnerabilities with risk context, exploitability, and exposure-driven triage</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22 — Prioritize vulnerabilities with risk context, exploitability, and exposure-driven triage</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c3445a8c-404b-420d-8b89-b4b84612a297</guid>
      <link>https://share.transistor.fm/s/b69d9eb7</link>
      <description>
        <![CDATA[<p>This episode teaches vulnerability prioritization as a decision process that combines severity with real risk, which is a frequent exam theme when multiple “correct” fixes compete for limited time. You’ll define why raw CVSS scores are insufficient by themselves and how risk context reshapes urgency based on asset criticality, internet exposure, privilege level, compensating controls, and known exploitation in the wild. We’ll discuss exploitability signals such as weaponized proof-of-concepts, exploit kits, and attacker tradecraft patterns, and how to translate those signals into a triage queue that engineering teams will actually follow. Real-world scenarios include a medium-severity bug on an internet-facing system versus a high-severity issue on an isolated lab host, and how the right answer depends on exposure, business impact, and likelihood. Troubleshooting covers avoiding “priority inflation,” setting clear service-level targets, and documenting decisions so triage is defensible during audits and after incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches vulnerability prioritization as a decision process that combines severity with real risk, which is a frequent exam theme when multiple “correct” fixes compete for limited time. You’ll define why raw CVSS scores are insufficient by themselves and how risk context reshapes urgency based on asset criticality, internet exposure, privilege level, compensating controls, and known exploitation in the wild. We’ll discuss exploitability signals such as weaponized proof-of-concepts, exploit kits, and attacker tradecraft patterns, and how to translate those signals into a triage queue that engineering teams will actually follow. Real-world scenarios include a medium-severity bug on an internet-facing system versus a high-severity issue on an isolated lab host, and how the right answer depends on exposure, business impact, and likelihood. Troubleshooting covers avoiding “priority inflation,” setting clear service-level targets, and documenting decisions so triage is defensible during audits and after incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:59:13 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b69d9eb7/d9133782.mp3" length="16508440" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>411</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches vulnerability prioritization as a decision process that combines severity with real risk, which is a frequent exam theme when multiple “correct” fixes compete for limited time. You’ll define why raw CVSS scores are insufficient by themselves and how risk context reshapes urgency based on asset criticality, internet exposure, privilege level, compensating controls, and known exploitation in the wild. We’ll discuss exploitability signals such as weaponized proof-of-concepts, exploit kits, and attacker tradecraft patterns, and how to translate those signals into a triage queue that engineering teams will actually follow. Real-world scenarios include a medium-severity bug on an internet-facing system versus a high-severity issue on an isolated lab host, and how the right answer depends on exposure, business impact, and likelihood. Troubleshooting covers avoiding “priority inflation,” setting clear service-level targets, and documenting decisions so triage is defensible during audits and after incidents. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b69d9eb7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 23 — Close vulnerabilities with verification evidence, rollback planning, and durable tracking</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23 — Close vulnerabilities with verification evidence, rollback planning, and durable tracking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8f339c32-786f-4037-8de4-ce213712772f</guid>
      <link>https://share.transistor.fm/s/d2a42f0e</link>
      <description>
        <![CDATA[<p>This episode focuses on the part of vulnerability management that separates mature programs from noisy dashboards: closure with proof. You’ll define what it means to “close” a vulnerability, including remediation actions such as patching, configuration change, compensating controls, or retirement of the affected asset, and why closure must be verified rather than assumed. We’ll cover verification evidence, like rescans, configuration checks, and artifact capture, and how to tie evidence to specific tickets and asset identifiers so results are audit-ready and searchable. You’ll also learn rollback planning and change discipline, since the exam often tests whether you can reduce risk without creating downtime, especially for production systems that require maintenance windows and backout steps. Troubleshooting includes dealing with false positives, flaky scanner results, dependency conflicts, and the common failure mode where tickets are marked “done” but the exposure remains due to missed hosts or unpatched components. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the part of vulnerability management that separates mature programs from noisy dashboards: closure with proof. You’ll define what it means to “close” a vulnerability, including remediation actions such as patching, configuration change, compensating controls, or retirement of the affected asset, and why closure must be verified rather than assumed. We’ll cover verification evidence, like rescans, configuration checks, and artifact capture, and how to tie evidence to specific tickets and asset identifiers so results are audit-ready and searchable. You’ll also learn rollback planning and change discipline, since the exam often tests whether you can reduce risk without creating downtime, especially for production systems that require maintenance windows and backout steps. Troubleshooting includes dealing with false positives, flaky scanner results, dependency conflicts, and the common failure mode where tickets are marked “done” but the exposure remains due to missed hosts or unpatched components. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 11:59:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d2a42f0e/bdbf0d0c.mp3" length="12763527" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>317</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the part of vulnerability management that separates mature programs from noisy dashboards: closure with proof. You’ll define what it means to “close” a vulnerability, including remediation actions such as patching, configuration change, compensating controls, or retirement of the affected asset, and why closure must be verified rather than assumed. We’ll cover verification evidence, like rescans, configuration checks, and artifact capture, and how to tie evidence to specific tickets and asset identifiers so results are audit-ready and searchable. You’ll also learn rollback planning and change discipline, since the exam often tests whether you can reduce risk without creating downtime, especially for production systems that require maintenance windows and backout steps. Troubleshooting includes dealing with false positives, flaky scanner results, dependency conflicts, and the common failure mode where tickets are marked “done” but the exposure remains due to missed hosts or unpatched components. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d2a42f0e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 24 — Decide what to log and why: events that power detection and investigations</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24 — Decide what to log and why: events that power detection and investigations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">646cbc07-cbdd-4df2-bf44-09604d048cf7</guid>
      <link>https://share.transistor.fm/s/405cd94e</link>
      <description>
        <![CDATA[<p>This episode teaches log strategy from first principles so you can answer exam questions about visibility, detection, and investigation readiness. You’ll define logging as the capture of security-relevant events with enough context to support alerting, triage, and incident reconstruction, and you’ll learn how to decide what is “security-relevant” based on threat models and control objectives. We’ll cover high-value event categories such as authentication outcomes, privilege changes, configuration modifications, process execution, network connections, and data access to sensitive repositories, along with the practical metadata that makes events useful, like user identity, host identity, timestamps, and request source. Real-world scenarios include investigating an account takeover where you need sign-in logs and session context, and diagnosing suspicious admin activity where change logs and command traces matter more than generic syslog noise. Troubleshooting covers overcollection that drives cost without outcomes, undercollection that blocks investigations, and the exam trap of treating logging as compliance-only instead of operational security capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches log strategy from first principles so you can answer exam questions about visibility, detection, and investigation readiness. You’ll define logging as the capture of security-relevant events with enough context to support alerting, triage, and incident reconstruction, and you’ll learn how to decide what is “security-relevant” based on threat models and control objectives. We’ll cover high-value event categories such as authentication outcomes, privilege changes, configuration modifications, process execution, network connections, and data access to sensitive repositories, along with the practical metadata that makes events useful, like user identity, host identity, timestamps, and request source. Real-world scenarios include investigating an account takeover where you need sign-in logs and session context, and diagnosing suspicious admin activity where change logs and command traces matter more than generic syslog noise. Troubleshooting covers overcollection that drives cost without outcomes, undercollection that blocks investigations, and the exam trap of treating logging as compliance-only instead of operational security capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:00:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/405cd94e/73117e63.mp3" length="21848885" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>545</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches log strategy from first principles so you can answer exam questions about visibility, detection, and investigation readiness. You’ll define logging as the capture of security-relevant events with enough context to support alerting, triage, and incident reconstruction, and you’ll learn how to decide what is “security-relevant” based on threat models and control objectives. We’ll cover high-value event categories such as authentication outcomes, privilege changes, configuration modifications, process execution, network connections, and data access to sensitive repositories, along with the practical metadata that makes events useful, like user identity, host identity, timestamps, and request source. Real-world scenarios include investigating an account takeover where you need sign-in logs and session context, and diagnosing suspicious admin activity where change logs and command traces matter more than generic syslog noise. Troubleshooting covers overcollection that drives cost without outcomes, undercollection that blocks investigations, and the exam trap of treating logging as compliance-only instead of operational security capability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/405cd94e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 25 — Centralize and normalize logs for correlation, retention integrity, and fast search</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25 — Centralize and normalize logs for correlation, retention integrity, and fast search</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b2229cc3-1047-496e-9313-446791a724cc</guid>
      <link>https://share.transistor.fm/s/2e796c10</link>
      <description>
        <![CDATA[<p>This episode explains why centralizing logs is necessary for modern detection and response and how normalization turns scattered records into a usable investigative timeline. You’ll define centralization as collecting logs from endpoints, servers, network devices, identity platforms, and cloud services into a common system, then define normalization as parsing and structuring fields so events can be searched and correlated reliably. For the exam, you’ll focus on outcomes: faster investigations, better detection coverage, tamper resistance, and defensible retention, especially when adversaries try to delete local logs. We’ll discuss retention integrity concepts such as access controls, immutability, time synchronization, and chain-of-custody expectations when logs support legal or regulatory inquiries. Real-world scenarios include correlating identity events with endpoint telemetry to confirm whether a suspicious sign-in led to code execution, and using normalized fields to quickly pivot across users, devices, and IP addresses. Troubleshooting covers parsing failures, time drift, ingestion gaps, and the operational reality that poor field mapping can make “centralized logs” feel unusable during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why centralizing logs is necessary for modern detection and response and how normalization turns scattered records into a usable investigative timeline. You’ll define centralization as collecting logs from endpoints, servers, network devices, identity platforms, and cloud services into a common system, then define normalization as parsing and structuring fields so events can be searched and correlated reliably. For the exam, you’ll focus on outcomes: faster investigations, better detection coverage, tamper resistance, and defensible retention, especially when adversaries try to delete local logs. We’ll discuss retention integrity concepts such as access controls, immutability, time synchronization, and chain-of-custody expectations when logs support legal or regulatory inquiries. Real-world scenarios include correlating identity events with endpoint telemetry to confirm whether a suspicious sign-in led to code execution, and using normalized fields to quickly pivot across users, devices, and IP addresses. Troubleshooting covers parsing failures, time drift, ingestion gaps, and the operational reality that poor field mapping can make “centralized logs” feel unusable during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:00:50 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2e796c10/5a905671.mp3" length="20494715" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>511</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why centralizing logs is necessary for modern detection and response and how normalization turns scattered records into a usable investigative timeline. You’ll define centralization as collecting logs from endpoints, servers, network devices, identity platforms, and cloud services into a common system, then define normalization as parsing and structuring fields so events can be searched and correlated reliably. For the exam, you’ll focus on outcomes: faster investigations, better detection coverage, tamper resistance, and defensible retention, especially when adversaries try to delete local logs. We’ll discuss retention integrity concepts such as access controls, immutability, time synchronization, and chain-of-custody expectations when logs support legal or regulatory inquiries. Real-world scenarios include correlating identity events with endpoint telemetry to confirm whether a suspicious sign-in led to code execution, and using normalized fields to quickly pivot across users, devices, and IP addresses. Troubleshooting covers parsing failures, time drift, ingestion gaps, and the operational reality that poor field mapping can make “centralized logs” feel unusable during an incident. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2e796c10/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 26 — Turn logs into outcomes: alerting strategy, review routines, and noise reduction</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26 — Turn logs into outcomes: alerting strategy, review routines, and noise reduction</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0792bd17-1b0e-4dda-80cf-ec7210142b73</guid>
      <link>https://share.transistor.fm/s/713ff7a0</link>
      <description>
        <![CDATA[<p>This episode turns logging into a detection capability by focusing on alerting strategy, review routines, and sustainable noise reduction. You’ll define an alert as a decision-support signal, not a raw event, and you’ll learn how to design alerts around realistic threat scenarios like credential abuse, privilege escalation, malware persistence, and unusual data access. We’ll cover detection engineering basics: choosing the right signals, adding context enrichment, setting thresholds, and building suppression rules that reduce duplicate alerts without hiding true positives. Exam relevance includes distinguishing between proactive monitoring and reactive incident response, and recognizing when an alert should trigger containment actions versus an analyst review. Real-world scenarios include tuning repeated failed logins, detecting impossible travel, and catching new administrative changes outside approved windows. Troubleshooting covers alert fatigue, inconsistent data quality, missing baselines, and building a review cadence that includes metrics like false positive rate, mean time to triage, and closed-loop feedback from incident outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode turns logging into a detection capability by focusing on alerting strategy, review routines, and sustainable noise reduction. You’ll define an alert as a decision-support signal, not a raw event, and you’ll learn how to design alerts around realistic threat scenarios like credential abuse, privilege escalation, malware persistence, and unusual data access. We’ll cover detection engineering basics: choosing the right signals, adding context enrichment, setting thresholds, and building suppression rules that reduce duplicate alerts without hiding true positives. Exam relevance includes distinguishing between proactive monitoring and reactive incident response, and recognizing when an alert should trigger containment actions versus an analyst review. Real-world scenarios include tuning repeated failed logins, detecting impossible travel, and catching new administrative changes outside approved windows. Troubleshooting covers alert fatigue, inconsistent data quality, missing baselines, and building a review cadence that includes metrics like false positive rate, mean time to triage, and closed-loop feedback from incident outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:01:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/713ff7a0/ff1c5748.mp3" length="18612848" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>464</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode turns logging into a detection capability by focusing on alerting strategy, review routines, and sustainable noise reduction. You’ll define an alert as a decision-support signal, not a raw event, and you’ll learn how to design alerts around realistic threat scenarios like credential abuse, privilege escalation, malware persistence, and unusual data access. We’ll cover detection engineering basics: choosing the right signals, adding context enrichment, setting thresholds, and building suppression rules that reduce duplicate alerts without hiding true positives. Exam relevance includes distinguishing between proactive monitoring and reactive incident response, and recognizing when an alert should trigger containment actions versus an analyst review. Real-world scenarios include tuning repeated failed logins, detecting impossible travel, and catching new administrative changes outside approved windows. Troubleshooting covers alert fatigue, inconsistent data quality, missing baselines, and building a review cadence that includes metrics like false positive rate, mean time to triage, and closed-loop feedback from incident outcomes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/713ff7a0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 27 — Prevent malware execution using layered controls across endpoints and servers</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27 — Prevent malware execution using layered controls across endpoints and servers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7df1124c-7ae7-4cb2-b9a7-8da76b11331f</guid>
      <link>https://share.transistor.fm/s/a3b808ca</link>
      <description>
        <![CDATA[<p>This episode explains malware prevention as a layered control strategy that reduces both initial execution and successful persistence, which is core to control-based exam reasoning. You’ll define prevention layers including secure configuration baselines, patch hygiene, application allowlisting, macro and script controls, attachment filtering, browser protections, and endpoint security platforms that block known-bad and suspicious behaviors. We’ll discuss why endpoints and servers require different tuning, since servers prioritize stability and predictable workloads while endpoints face higher exposure to phishing, drive-by downloads, and user-installed software. Real-world scenarios include stopping malicious Office macros, blocking unsigned binaries in sensitive paths, and preventing tools commonly used by attackers from running in user contexts. Troubleshooting includes handling business applications that behave like malware, reducing performance impacts, avoiding overbroad exclusions, and ensuring prevention controls are validated through telemetry and tests rather than assumed effective because an agent is installed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains malware prevention as a layered control strategy that reduces both initial execution and successful persistence, which is core to control-based exam reasoning. You’ll define prevention layers including secure configuration baselines, patch hygiene, application allowlisting, macro and script controls, attachment filtering, browser protections, and endpoint security platforms that block known-bad and suspicious behaviors. We’ll discuss why endpoints and servers require different tuning, since servers prioritize stability and predictable workloads while endpoints face higher exposure to phishing, drive-by downloads, and user-installed software. Real-world scenarios include stopping malicious Office macros, blocking unsigned binaries in sensitive paths, and preventing tools commonly used by attackers from running in user contexts. Troubleshooting includes handling business applications that behave like malware, reducing performance impacts, avoiding overbroad exclusions, and ensuring prevention controls are validated through telemetry and tests rather than assumed effective because an agent is installed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:01:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a3b808ca/00fc7c74.mp3" length="22276254" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>555</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains malware prevention as a layered control strategy that reduces both initial execution and successful persistence, which is core to control-based exam reasoning. You’ll define prevention layers including secure configuration baselines, patch hygiene, application allowlisting, macro and script controls, attachment filtering, browser protections, and endpoint security platforms that block known-bad and suspicious behaviors. We’ll discuss why endpoints and servers require different tuning, since servers prioritize stability and predictable workloads while endpoints face higher exposure to phishing, drive-by downloads, and user-installed software. Real-world scenarios include stopping malicious Office macros, blocking unsigned binaries in sensitive paths, and preventing tools commonly used by attackers from running in user contexts. Troubleshooting includes handling business applications that behave like malware, reducing performance impacts, avoiding overbroad exclusions, and ensuring prevention controls are validated through telemetry and tests rather than assumed effective because an agent is installed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a3b808ca/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 28 — Contain malware spread with segmentation, privilege limits, and rapid isolation routines</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28 — Contain malware spread with segmentation, privilege limits, and rapid isolation routines</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">947edc11-5745-4011-ad85-5cb1402a3eac</guid>
      <link>https://share.transistor.fm/s/0d67e22f</link>
      <description>
        <![CDATA[<p>This episode focuses on containment as the difference between a single compromised host and a widespread outage. You’ll define containment as limiting lateral movement and stopping further impact while preserving evidence, then connect that to exam scenarios where the correct action is to isolate quickly rather than chase root cause first. We’ll cover segmentation strategies that reduce reachability, privilege limits that prevent credential theft from becoming domain-wide compromise, and rapid isolation routines such as EDR network containment, disabling accounts, blocking suspicious traffic, and quarantining affected subnets. Real-world scenarios include ransomware attempting to spread via SMB shares and stolen admin credentials, and how strong segmentation plus least privilege can keep the blast radius small even when prevention fails. Troubleshooting includes balancing isolation with business continuity, avoiding accidental isolation of critical systems without coordination, and building rehearsed runbooks so containment is fast, consistent, and defensible during incident reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on containment as the difference between a single compromised host and a widespread outage. You’ll define containment as limiting lateral movement and stopping further impact while preserving evidence, then connect that to exam scenarios where the correct action is to isolate quickly rather than chase root cause first. We’ll cover segmentation strategies that reduce reachability, privilege limits that prevent credential theft from becoming domain-wide compromise, and rapid isolation routines such as EDR network containment, disabling accounts, blocking suspicious traffic, and quarantining affected subnets. Real-world scenarios include ransomware attempting to spread via SMB shares and stolen admin credentials, and how strong segmentation plus least privilege can keep the blast radius small even when prevention fails. Troubleshooting includes balancing isolation with business continuity, avoiding accidental isolation of critical systems without coordination, and building rehearsed runbooks so containment is fast, consistent, and defensible during incident reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:02:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0d67e22f/f6ebf44e.mp3" length="21682774" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>540</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on containment as the difference between a single compromised host and a widespread outage. You’ll define containment as limiting lateral movement and stopping further impact while preserving evidence, then connect that to exam scenarios where the correct action is to isolate quickly rather than chase root cause first. We’ll cover segmentation strategies that reduce reachability, privilege limits that prevent credential theft from becoming domain-wide compromise, and rapid isolation routines such as EDR network containment, disabling accounts, blocking suspicious traffic, and quarantining affected subnets. Real-world scenarios include ransomware attempting to spread via SMB shares and stolen admin credentials, and how strong segmentation plus least privilege can keep the blast radius small even when prevention fails. Troubleshooting includes balancing isolation with business continuity, avoiding accidental isolation of critical systems without coordination, and building rehearsed runbooks so containment is fast, consistent, and defensible during incident reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0d67e22f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 29 — Validate malware defenses with testing, tuning, and incident-driven improvement loops</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29 — Validate malware defenses with testing, tuning, and incident-driven improvement loops</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0ba759ac-06b1-4fec-9fff-a4b883434b37</guid>
      <link>https://share.transistor.fm/s/6266c507</link>
      <description>
        <![CDATA[<p>This episode teaches how to validate malware defenses so you can prove protection is real and continuously improving, not merely installed. You’ll define validation as testing and measuring whether controls prevent execution, detect suspicious behavior, and support response actions like isolation and rollback. We’ll discuss testing approaches such as controlled simulations, safe test files, and red-team-style exercises that focus on common attacker techniques, while emphasizing that testing must be scoped and approved to avoid disrupting production. Exam relevance includes recognizing evidence of effective defense, interpreting telemetry outputs, and selecting the next improvement step when defenses miss an event. Real-world scenarios include tuning EDR rules after a near-miss, tightening allowlisting based on observed tool abuse, and improving email and web filtering after phishing-driven infections. Troubleshooting covers false confidence from green dashboards, misconfigured exclusions, incomplete coverage on high-risk endpoints, and using incident lessons learned to update baselines, detections, and user workflows so the program evolves with threats. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to validate malware defenses so you can prove protection is real and continuously improving, not merely installed. You’ll define validation as testing and measuring whether controls prevent execution, detect suspicious behavior, and support response actions like isolation and rollback. We’ll discuss testing approaches such as controlled simulations, safe test files, and red-team-style exercises that focus on common attacker techniques, while emphasizing that testing must be scoped and approved to avoid disrupting production. Exam relevance includes recognizing evidence of effective defense, interpreting telemetry outputs, and selecting the next improvement step when defenses miss an event. Real-world scenarios include tuning EDR rules after a near-miss, tightening allowlisting based on observed tool abuse, and improving email and web filtering after phishing-driven infections. Troubleshooting covers false confidence from green dashboards, misconfigured exclusions, incomplete coverage on high-risk endpoints, and using incident lessons learned to update baselines, detections, and user workflows so the program evolves with threats. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:02:35 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6266c507/a3d5f4ce.mp3" length="19508336" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>486</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to validate malware defenses so you can prove protection is real and continuously improving, not merely installed. You’ll define validation as testing and measuring whether controls prevent execution, detect suspicious behavior, and support response actions like isolation and rollback. We’ll discuss testing approaches such as controlled simulations, safe test files, and red-team-style exercises that focus on common attacker techniques, while emphasizing that testing must be scoped and approved to avoid disrupting production. Exam relevance includes recognizing evidence of effective defense, interpreting telemetry outputs, and selecting the next improvement step when defenses miss an event. Real-world scenarios include tuning EDR rules after a near-miss, tightening allowlisting based on observed tool abuse, and improving email and web filtering after phishing-driven infections. Troubleshooting covers false confidence from green dashboards, misconfigured exclusions, incomplete coverage on high-risk endpoints, and using incident lessons learned to update baselines, detections, and user workflows so the program evolves with threats. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6266c507/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 30 — Inventory network infrastructure: devices, services, dependencies, and ownership clarity</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30 — Inventory network infrastructure: devices, services, dependencies, and ownership clarity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6858d4f9-7f31-49e7-9d26-a8a52d4ff28e</guid>
      <link>https://share.transistor.fm/s/ade34de7</link>
      <description>
        <![CDATA[<p>This episode explains network infrastructure inventory as a prerequisite for controlling exposure, troubleshooting outages, and answering exam questions about scope and accountability. You’ll define network infrastructure assets to include routers, switches, firewalls, wireless controllers, load balancers, VPN gateways, DNS and DHCP services, and cloud networking components, then discuss why unmanaged network devices create blind spots that undermine multiple CIS safeguards. We’ll cover documenting dependencies such as authentication backends, routing relationships, and management plane access paths, because incident response and change management both fail when critical dependencies are unknown. Real-world scenarios include an unknown switch providing an unauthorized path into a secure segment, or a misconfigured DNS change causing widespread disruption that looks like an attack until inventory and change records clarify the cause. Troubleshooting includes reconciling discovery data, handling dynamic cloud networking, assigning owners for shared platforms, and producing evidence that inventory is current, complete, and tied to lifecycle processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains network infrastructure inventory as a prerequisite for controlling exposure, troubleshooting outages, and answering exam questions about scope and accountability. You’ll define network infrastructure assets to include routers, switches, firewalls, wireless controllers, load balancers, VPN gateways, DNS and DHCP services, and cloud networking components, then discuss why unmanaged network devices create blind spots that undermine multiple CIS safeguards. We’ll cover documenting dependencies such as authentication backends, routing relationships, and management plane access paths, because incident response and change management both fail when critical dependencies are unknown. Real-world scenarios include an unknown switch providing an unauthorized path into a secure segment, or a misconfigured DNS change causing widespread disruption that looks like an attack until inventory and change records clarify the cause. Troubleshooting includes reconciling discovery data, handling dynamic cloud networking, assigning owners for shared platforms, and producing evidence that inventory is current, complete, and tied to lifecycle processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:02:57 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ade34de7/5abdf5fb.mp3" length="19627460" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>489</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains network infrastructure inventory as a prerequisite for controlling exposure, troubleshooting outages, and answering exam questions about scope and accountability. You’ll define network infrastructure assets to include routers, switches, firewalls, wireless controllers, load balancers, VPN gateways, DNS and DHCP services, and cloud networking components, then discuss why unmanaged network devices create blind spots that undermine multiple CIS safeguards. We’ll cover documenting dependencies such as authentication backends, routing relationships, and management plane access paths, because incident response and change management both fail when critical dependencies are unknown. Real-world scenarios include an unknown switch providing an unauthorized path into a secure segment, or a misconfigured DNS change causing widespread disruption that looks like an attack until inventory and change records clarify the cause. Troubleshooting includes reconciling discovery data, handling dynamic cloud networking, assigning owners for shared platforms, and producing evidence that inventory is current, complete, and tied to lifecycle processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ade34de7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 31 — Harden network device management planes to reduce takeover and tampering risk</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31 — Harden network device management planes to reduce takeover and tampering risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cb4c0fe3-3c16-4e95-8c33-9e8b70bbd105</guid>
      <link>https://share.transistor.fm/s/517e8a4d</link>
      <description>
        <![CDATA[<p>This episode explains how to secure network device management planes so attackers cannot quietly take control of routing, switching, or security enforcement. You’ll define the management plane as the interfaces and services used to administer devices, then connect that concept to exam-style scenarios where compromise happens through exposed admin ports, weak authentication, or mis-scoped management access. We’ll cover best practices like restricting management to dedicated networks, enforcing strong authentication and MFA where supported, disabling insecure protocols, and limiting who can make configuration changes. Real-world examples include hardening SNMP usage, protecting remote administration paths, securing device credentials, and ensuring logging exists for configuration and privilege changes. Troubleshooting includes handling legacy devices that lack modern controls, reducing operational pushback by using staged changes and break-glass procedures, and validating hardening with checks that confirm management access is limited to expected sources and identities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to secure network device management planes so attackers cannot quietly take control of routing, switching, or security enforcement. You’ll define the management plane as the interfaces and services used to administer devices, then connect that concept to exam-style scenarios where compromise happens through exposed admin ports, weak authentication, or mis-scoped management access. We’ll cover best practices like restricting management to dedicated networks, enforcing strong authentication and MFA where supported, disabling insecure protocols, and limiting who can make configuration changes. Real-world examples include hardening SNMP usage, protecting remote administration paths, securing device credentials, and ensuring logging exists for configuration and privilege changes. Troubleshooting includes handling legacy devices that lack modern controls, reducing operational pushback by using staged changes and break-glass procedures, and validating hardening with checks that confirm management access is limited to expected sources and identities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:03:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/517e8a4d/7c04f644.mp3" length="19802981" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>493</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to secure network device management planes so attackers cannot quietly take control of routing, switching, or security enforcement. You’ll define the management plane as the interfaces and services used to administer devices, then connect that concept to exam-style scenarios where compromise happens through exposed admin ports, weak authentication, or mis-scoped management access. We’ll cover best practices like restricting management to dedicated networks, enforcing strong authentication and MFA where supported, disabling insecure protocols, and limiting who can make configuration changes. Real-world examples include hardening SNMP usage, protecting remote administration paths, securing device credentials, and ensuring logging exists for configuration and privilege changes. Troubleshooting includes handling legacy devices that lack modern controls, reducing operational pushback by using staged changes and break-glass procedures, and validating hardening with checks that confirm management access is limited to expected sources and identities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/517e8a4d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 32 — Control network changes safely with baselines, approvals, and rollback discipline</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32 — Control network changes safely with baselines, approvals, and rollback discipline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a466fe5b-f333-41a2-b793-4ee398334b24</guid>
      <link>https://share.transistor.fm/s/89242cdd</link>
      <description>
        <![CDATA[<p>This episode focuses on network change control as a security control, not just an IT process, because uncontrolled changes can create exposures faster than scanners can find them. You’ll define a network baseline as an approved “known good” configuration state and explain how baselines support both stability and defensible security posture. We’ll discuss approval workflows that match risk, such as peer review for routine changes and stricter gates for firewall rules, VPN access changes, or routing updates that affect segmentation. Exam relevance shows up when questions test whether you can prevent accidental exposure and detect unauthorized modifications through change records and configuration monitoring. Real-world scenarios include emergency changes during outages and how rollback plans keep pressure from turning into permanent insecure shortcuts. Troubleshooting covers incomplete documentation, drift between intended and running configurations, and building evidence that every meaningful change had an owner, a reason, a tested plan, and a verified outcome. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on network change control as a security control, not just an IT process, because uncontrolled changes can create exposures faster than scanners can find them. You’ll define a network baseline as an approved “known good” configuration state and explain how baselines support both stability and defensible security posture. We’ll discuss approval workflows that match risk, such as peer review for routine changes and stricter gates for firewall rules, VPN access changes, or routing updates that affect segmentation. Exam relevance shows up when questions test whether you can prevent accidental exposure and detect unauthorized modifications through change records and configuration monitoring. Real-world scenarios include emergency changes during outages and how rollback plans keep pressure from turning into permanent insecure shortcuts. Troubleshooting covers incomplete documentation, drift between intended and running configurations, and building evidence that every meaningful change had an owner, a reason, a tested plan, and a verified outcome. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:04:09 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/89242cdd/946c49f8.mp3" length="18441487" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>459</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on network change control as a security control, not just an IT process, because uncontrolled changes can create exposures faster than scanners can find them. You’ll define a network baseline as an approved “known good” configuration state and explain how baselines support both stability and defensible security posture. We’ll discuss approval workflows that match risk, such as peer review for routine changes and stricter gates for firewall rules, VPN access changes, or routing updates that affect segmentation. Exam relevance shows up when questions test whether you can prevent accidental exposure and detect unauthorized modifications through change records and configuration monitoring. Real-world scenarios include emergency changes during outages and how rollback plans keep pressure from turning into permanent insecure shortcuts. Troubleshooting covers incomplete documentation, drift between intended and running configurations, and building evidence that every meaningful change had an owner, a reason, a tested plan, and a verified outcome. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/89242cdd/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 33 — Design network visibility that matters: telemetry selection and baseline behavior modeling</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33 — Design network visibility that matters: telemetry selection and baseline behavior modeling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">483abc50-b6ce-4edd-b33e-02b97913c0a8</guid>
      <link>https://share.transistor.fm/s/a8f4df12</link>
      <description>
        <![CDATA[<p>This episode teaches how to design network visibility that produces actionable security outcomes instead of overwhelming teams with noise. You’ll define telemetry as the signals collected from networks and devices, then explain which sources are most useful for detecting threats, investigating incidents, and validating controls. We’ll cover selecting telemetry such as flow records, firewall logs, DNS data, proxy events, authentication-related network signals, and intrusion detection outputs, with an emphasis on choosing signals that support realistic threat scenarios. You’ll also learn baseline behavior modeling, meaning you understand what “normal” traffic looks like so anomalies stand out as meaningful, not random variation. Real-world scenarios include spotting unusual outbound connections from a server, detecting lateral movement patterns, and identifying unexpected DNS behavior that hints at command-and-control. Troubleshooting includes handling incomplete coverage, inconsistent time settings, noisy environments with frequent change, and ensuring the visibility design is tied to response workflows so telemetry leads to decisions, not dashboards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to design network visibility that produces actionable security outcomes instead of overwhelming teams with noise. You’ll define telemetry as the signals collected from networks and devices, then explain which sources are most useful for detecting threats, investigating incidents, and validating controls. We’ll cover selecting telemetry such as flow records, firewall logs, DNS data, proxy events, authentication-related network signals, and intrusion detection outputs, with an emphasis on choosing signals that support realistic threat scenarios. You’ll also learn baseline behavior modeling, meaning you understand what “normal” traffic looks like so anomalies stand out as meaningful, not random variation. Real-world scenarios include spotting unusual outbound connections from a server, detecting lateral movement patterns, and identifying unexpected DNS behavior that hints at command-and-control. Troubleshooting includes handling incomplete coverage, inconsistent time settings, noisy environments with frequent change, and ensuring the visibility design is tied to response workflows so telemetry leads to decisions, not dashboards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:04:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a8f4df12/685f3b37.mp3" length="32031448" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>799</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to design network visibility that produces actionable security outcomes instead of overwhelming teams with noise. You’ll define telemetry as the signals collected from networks and devices, then explain which sources are most useful for detecting threats, investigating incidents, and validating controls. We’ll cover selecting telemetry such as flow records, firewall logs, DNS data, proxy events, authentication-related network signals, and intrusion detection outputs, with an emphasis on choosing signals that support realistic threat scenarios. You’ll also learn baseline behavior modeling, meaning you understand what “normal” traffic looks like so anomalies stand out as meaningful, not random variation. Real-world scenarios include spotting unusual outbound connections from a server, detecting lateral movement patterns, and identifying unexpected DNS behavior that hints at command-and-control. Troubleshooting includes handling incomplete coverage, inconsistent time settings, noisy environments with frequent change, and ensuring the visibility design is tied to response workflows so telemetry leads to decisions, not dashboards. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a8f4df12/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 34 — Detect threats faster with triage workflows, escalation rules, and response coordination</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34 — Detect threats faster with triage workflows, escalation rules, and response coordination</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b23fc8ae-8f9e-4aad-a898-1298730921a6</guid>
      <link>https://share.transistor.fm/s/0aad26f9</link>
      <description>
        <![CDATA[<p>This episode focuses on detection as a process, not a product, showing how triage workflows and escalation rules turn alerts into timely action. You’ll define triage as rapidly determining credibility, scope, and urgency, then connect that to exam scenarios where the correct response is to prioritize containment and evidence preservation based on risk. We’ll cover escalation rules that clarify when to involve incident response, IT operations, legal, or leadership, and how to prevent delays caused by unclear decision rights. Real-world examples include handling suspected credential compromise, ransomware indicators, and suspicious administrative changes, each requiring different first steps and coordination patterns. Troubleshooting emphasizes common failure modes like alert overload, missing context, unclear ownership, and slow approvals that let incidents expand. You’ll learn how to build a repeatable runbook approach that includes minimum required data, standard communication channels, and fast containment options so detection becomes a reliable capability under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on detection as a process, not a product, showing how triage workflows and escalation rules turn alerts into timely action. You’ll define triage as rapidly determining credibility, scope, and urgency, then connect that to exam scenarios where the correct response is to prioritize containment and evidence preservation based on risk. We’ll cover escalation rules that clarify when to involve incident response, IT operations, legal, or leadership, and how to prevent delays caused by unclear decision rights. Real-world examples include handling suspected credential compromise, ransomware indicators, and suspicious administrative changes, each requiring different first steps and coordination patterns. Troubleshooting emphasizes common failure modes like alert overload, missing context, unclear ownership, and slow approvals that let incidents expand. You’ll learn how to build a repeatable runbook approach that includes minimum required data, standard communication channels, and fast containment options so detection becomes a reliable capability under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:05:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0aad26f9/f5217100.mp3" length="30742040" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>767</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on detection as a process, not a product, showing how triage workflows and escalation rules turn alerts into timely action. You’ll define triage as rapidly determining credibility, scope, and urgency, then connect that to exam scenarios where the correct response is to prioritize containment and evidence preservation based on risk. We’ll cover escalation rules that clarify when to involve incident response, IT operations, legal, or leadership, and how to prevent delays caused by unclear decision rights. Real-world examples include handling suspected credential compromise, ransomware indicators, and suspicious administrative changes, each requiring different first steps and coordination patterns. Troubleshooting emphasizes common failure modes like alert overload, missing context, unclear ownership, and slow approvals that let incidents expand. You’ll learn how to build a repeatable runbook approach that includes minimum required data, standard communication channels, and fast containment options so detection becomes a reliable capability under pressure. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0aad26f9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 35 — Improve monitoring outcomes with tuning, validation, and gap-driven coverage fixes</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35 — Improve monitoring outcomes with tuning, validation, and gap-driven coverage fixes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bc32890a-d5e3-4ace-b914-35722d713c3f</guid>
      <link>https://share.transistor.fm/s/3ab54d21</link>
      <description>
        <![CDATA[<p>This episode teaches how to improve monitoring outcomes by treating detection as an engineered system that needs tuning, validation, and continuous coverage improvement. You’ll define tuning as adjusting detections to reduce false positives while preserving sensitivity to real threats, and validation as proving detections fire when expected through controlled tests and incident replay. We’ll connect these concepts to exam questions that distinguish “we collect logs” from “we can detect and respond,” emphasizing measurable outcomes like time to detect and time to triage. Real-world scenarios include tuning brute-force alerts, reducing duplicate notifications from correlated sensors, and adding enrichment so analysts can make decisions faster. Troubleshooting covers gaps discovered during incidents, such as missing endpoint telemetry on high-risk hosts or absent identity logs that block investigation, and how to drive fixes through ownership, deadlines, and verification. The goal is to build a feedback loop where monitoring improves based on evidence, not hope, and where coverage gaps become tracked work items rather than recurring surprises. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to improve monitoring outcomes by treating detection as an engineered system that needs tuning, validation, and continuous coverage improvement. You’ll define tuning as adjusting detections to reduce false positives while preserving sensitivity to real threats, and validation as proving detections fire when expected through controlled tests and incident replay. We’ll connect these concepts to exam questions that distinguish “we collect logs” from “we can detect and respond,” emphasizing measurable outcomes like time to detect and time to triage. Real-world scenarios include tuning brute-force alerts, reducing duplicate notifications from correlated sensors, and adding enrichment so analysts can make decisions faster. Troubleshooting covers gaps discovered during incidents, such as missing endpoint telemetry on high-risk hosts or absent identity logs that block investigation, and how to drive fixes through ownership, deadlines, and verification. The goal is to build a feedback loop where monitoring improves based on evidence, not hope, and where coverage gaps become tracked work items rather than recurring surprises. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:05:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3ab54d21/b761b27a.mp3" length="28861211" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>720</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to improve monitoring outcomes by treating detection as an engineered system that needs tuning, validation, and continuous coverage improvement. You’ll define tuning as adjusting detections to reduce false positives while preserving sensitivity to real threats, and validation as proving detections fire when expected through controlled tests and incident replay. We’ll connect these concepts to exam questions that distinguish “we collect logs” from “we can detect and respond,” emphasizing measurable outcomes like time to detect and time to triage. Real-world scenarios include tuning brute-force alerts, reducing duplicate notifications from correlated sensors, and adding enrichment so analysts can make decisions faster. Troubleshooting covers gaps discovered during incidents, such as missing endpoint telemetry on high-risk hosts or absent identity logs that block investigation, and how to drive fixes through ownership, deadlines, and verification. The goal is to build a feedback loop where monitoring improves based on evidence, not hope, and where coverage gaps become tracked work items rather than recurring surprises. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ab54d21/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 36 — Reduce phishing success with email controls that block, warn, and verify safely</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36 — Reduce phishing success with email controls that block, warn, and verify safely</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">adf03797-cc9d-4a8d-8644-8e45f1abefef</guid>
      <link>https://share.transistor.fm/s/7a41c5f3</link>
      <description>
        <![CDATA[<p>This episode focuses on reducing phishing success by combining blocking, warning, and verification controls that protect users even when messages look legitimate. You’ll define phishing as deception designed to steal credentials, deliver malware, or trigger fraudulent actions, then connect that to exam-style prompts that test layered defenses rather than a single tool. We’ll cover email controls such as sender authentication, attachment and link inspection, sandboxing, and policies that flag risky patterns like unusual sender domains, lookalike addresses, and spoofed internal communications. You’ll also learn user-facing warning patterns and verification workflows, including how to confirm sensitive requests through trusted channels so the “reply to the email” trap is avoided. Real-world scenarios include invoice fraud, password reset lures, and executive impersonation attempts, highlighting what controls stop delivery versus what controls reduce impact after delivery. Troubleshooting includes managing false positives that block business email, handling new vendors and legitimate external senders, and building evidence that controls are working through metrics like click rates, reported messages, and blocked campaign patterns. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on reducing phishing success by combining blocking, warning, and verification controls that protect users even when messages look legitimate. You’ll define phishing as deception designed to steal credentials, deliver malware, or trigger fraudulent actions, then connect that to exam-style prompts that test layered defenses rather than a single tool. We’ll cover email controls such as sender authentication, attachment and link inspection, sandboxing, and policies that flag risky patterns like unusual sender domains, lookalike addresses, and spoofed internal communications. You’ll also learn user-facing warning patterns and verification workflows, including how to confirm sensitive requests through trusted channels so the “reply to the email” trap is avoided. Real-world scenarios include invoice fraud, password reset lures, and executive impersonation attempts, highlighting what controls stop delivery versus what controls reduce impact after delivery. Troubleshooting includes managing false positives that block business email, handling new vendors and legitimate external senders, and building evidence that controls are working through metrics like click rates, reported messages, and blocked campaign patterns. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:06:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7a41c5f3/e01c1d4b.mp3" length="25142414" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>627</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on reducing phishing success by combining blocking, warning, and verification controls that protect users even when messages look legitimate. You’ll define phishing as deception designed to steal credentials, deliver malware, or trigger fraudulent actions, then connect that to exam-style prompts that test layered defenses rather than a single tool. We’ll cover email controls such as sender authentication, attachment and link inspection, sandboxing, and policies that flag risky patterns like unusual sender domains, lookalike addresses, and spoofed internal communications. You’ll also learn user-facing warning patterns and verification workflows, including how to confirm sensitive requests through trusted channels so the “reply to the email” trap is avoided. Real-world scenarios include invoice fraud, password reset lures, and executive impersonation attempts, highlighting what controls stop delivery versus what controls reduce impact after delivery. Troubleshooting includes managing false positives that block business email, handling new vendors and legitimate external senders, and building evidence that controls are working through metrics like click rates, reported messages, and blocked campaign patterns. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7a41c5f3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 37 — Harden web browsing with technical safeguards and safer execution pathways</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37 — Harden web browsing with technical safeguards and safer execution pathways</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2a450f0c-eb75-46ee-8ae6-0224f9f4d0b1</guid>
      <link>https://share.transistor.fm/s/f4a42939</link>
      <description>
        <![CDATA[<p>This episode explains how to harden web browsing so routine internet use does not become an easy malware delivery channel or credential theft pathway. You’ll define browsing risk in terms of drive-by downloads, malicious scripts, exploit chains, and credential harvesting, then connect those risks to exam questions that emphasize preventative controls and safe defaults. We’ll cover technical safeguards such as secure browser configurations, extension governance, blocking risky content types, DNS and web filtering, and isolating or sandboxing browsing sessions to reduce the blast radius of a compromise. Real-world examples include restricting local admin privileges so browser compromise cannot immediately install persistence, using separate browsers or profiles for privileged workflows, and applying policies that reduce exposure to unknown or newly registered domains. Troubleshooting covers balancing usability with security, handling business sites that break under stricter controls, and ensuring “secure browsing” is not just a policy statement but a verifiable configuration with measurable coverage across endpoints. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to harden web browsing so routine internet use does not become an easy malware delivery channel or credential theft pathway. You’ll define browsing risk in terms of drive-by downloads, malicious scripts, exploit chains, and credential harvesting, then connect those risks to exam questions that emphasize preventative controls and safe defaults. We’ll cover technical safeguards such as secure browser configurations, extension governance, blocking risky content types, DNS and web filtering, and isolating or sandboxing browsing sessions to reduce the blast radius of a compromise. Real-world examples include restricting local admin privileges so browser compromise cannot immediately install persistence, using separate browsers or profiles for privileged workflows, and applying policies that reduce exposure to unknown or newly registered domains. Troubleshooting covers balancing usability with security, handling business sites that break under stricter controls, and ensuring “secure browsing” is not just a policy statement but a verifiable configuration with measurable coverage across endpoints. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:06:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f4a42939/be012afc.mp3" length="26284477" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>655</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to harden web browsing so routine internet use does not become an easy malware delivery channel or credential theft pathway. You’ll define browsing risk in terms of drive-by downloads, malicious scripts, exploit chains, and credential harvesting, then connect those risks to exam questions that emphasize preventative controls and safe defaults. We’ll cover technical safeguards such as secure browser configurations, extension governance, blocking risky content types, DNS and web filtering, and isolating or sandboxing browsing sessions to reduce the blast radius of a compromise. Real-world examples include restricting local admin privileges so browser compromise cannot immediately install persistence, using separate browsers or profiles for privileged workflows, and applying policies that reduce exposure to unknown or newly registered domains. Troubleshooting covers balancing usability with security, handling business sites that break under stricter controls, and ensuring “secure browsing” is not just a policy statement but a verifiable configuration with measurable coverage across endpoints. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f4a42939/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 38 — Confirm email and browser protections work with testing and measurable outcomes</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38 — Confirm email and browser protections work with testing and measurable outcomes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">74682140-6a70-427c-99bc-e471b0335582</guid>
      <link>https://share.transistor.fm/s/6de169ae</link>
      <description>
        <![CDATA[<p>This episode focuses on confirming that phishing and browsing controls actually reduce risk by using testing and measurable outcomes rather than assuming tools are effective. You’ll define testing as controlled validation of control behavior, such as safe phishing simulations, benign attachment tests, and controlled link detonation, and you’ll connect the results to exam expectations around continuous control verification. We’ll cover metrics that matter, including delivery rates of simulated campaigns, click and credential submission rates, time to report suspicious messages, and the percentage of endpoints enforcing required browser policies. Real-world scenarios include validating that risky file types are blocked, confirming that spoofed domains trigger warnings, and ensuring that web filtering policies apply consistently across remote and on-network users. Troubleshooting includes avoiding misleading metrics, preventing tests from becoming punitive, handling changes in attacker tactics, and using test failures to drive concrete fixes like policy updates, training adjustments, and improved reporting workflows that shorten the time between detection and containment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on confirming that phishing and browsing controls actually reduce risk by using testing and measurable outcomes rather than assuming tools are effective. You’ll define testing as controlled validation of control behavior, such as safe phishing simulations, benign attachment tests, and controlled link detonation, and you’ll connect the results to exam expectations around continuous control verification. We’ll cover metrics that matter, including delivery rates of simulated campaigns, click and credential submission rates, time to report suspicious messages, and the percentage of endpoints enforcing required browser policies. Real-world scenarios include validating that risky file types are blocked, confirming that spoofed domains trigger warnings, and ensuring that web filtering policies apply consistently across remote and on-network users. Troubleshooting includes avoiding misleading metrics, preventing tests from becoming punitive, handling changes in attacker tactics, and using test failures to drive concrete fixes like policy updates, training adjustments, and improved reporting workflows that shorten the time between detection and containment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:06:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6de169ae/6819ab0e.mp3" length="22528079" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>562</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on confirming that phishing and browsing controls actually reduce risk by using testing and measurable outcomes rather than assuming tools are effective. You’ll define testing as controlled validation of control behavior, such as safe phishing simulations, benign attachment tests, and controlled link detonation, and you’ll connect the results to exam expectations around continuous control verification. We’ll cover metrics that matter, including delivery rates of simulated campaigns, click and credential submission rates, time to report suspicious messages, and the percentage of endpoints enforcing required browser policies. Real-world scenarios include validating that risky file types are blocked, confirming that spoofed domains trigger warnings, and ensuring that web filtering policies apply consistently across remote and on-network users. Troubleshooting includes avoiding misleading metrics, preventing tests from becoming punitive, handling changes in attacker tactics, and using test failures to drive concrete fixes like policy updates, training adjustments, and improved reporting workflows that shorten the time between detection and containment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6de169ae/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 39 — Classify data in practice: sensitivity tiers, handling rules, and real-world exceptions</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39 — Classify data in practice: sensitivity tiers, handling rules, and real-world exceptions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">48fe0069-2acb-4791-a3f2-cad125e583e9</guid>
      <link>https://share.transistor.fm/s/ec54621c</link>
      <description>
        <![CDATA[<p>This episode teaches data classification as an operational system that drives real handling behaviors, not a theoretical labeling exercise. You’ll define classification as assigning sensitivity tiers based on confidentiality, integrity, and availability needs, then explain how those tiers translate into handling rules like storage locations, access restrictions, encryption requirements, retention, and approved sharing methods. Exam relevance includes recognizing which classification level should apply in a scenario and what controls must follow from that decision, especially when questions test “appropriate” rather than “maximum” security. Real-world examples include classifying customer data, internal financial information, source code, and operational telemetry, along with the practical reality that teams will request exceptions for business workflows. Troubleshooting focuses on preventing classification from becoming inconsistent across departments, handling mixed-data repositories, and creating an exception process that documents why an exception exists, what compensating safeguards apply, and when the exception must be reviewed or removed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches data classification as an operational system that drives real handling behaviors, not a theoretical labeling exercise. You’ll define classification as assigning sensitivity tiers based on confidentiality, integrity, and availability needs, then explain how those tiers translate into handling rules like storage locations, access restrictions, encryption requirements, retention, and approved sharing methods. Exam relevance includes recognizing which classification level should apply in a scenario and what controls must follow from that decision, especially when questions test “appropriate” rather than “maximum” security. Real-world examples include classifying customer data, internal financial information, source code, and operational telemetry, along with the practical reality that teams will request exceptions for business workflows. Troubleshooting focuses on preventing classification from becoming inconsistent across departments, handling mixed-data repositories, and creating an exception process that documents why an exception exists, what compensating safeguards apply, and when the exception must be reviewed or removed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:07:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ec54621c/35443ef3.mp3" length="21105989" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>526</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches data classification as an operational system that drives real handling behaviors, not a theoretical labeling exercise. You’ll define classification as assigning sensitivity tiers based on confidentiality, integrity, and availability needs, then explain how those tiers translate into handling rules like storage locations, access restrictions, encryption requirements, retention, and approved sharing methods. Exam relevance includes recognizing which classification level should apply in a scenario and what controls must follow from that decision, especially when questions test “appropriate” rather than “maximum” security. Real-world examples include classifying customer data, internal financial information, source code, and operational telemetry, along with the practical reality that teams will request exceptions for business workflows. Troubleshooting focuses on preventing classification from becoming inconsistent across departments, handling mixed-data repositories, and creating an exception process that documents why an exception exists, what compensating safeguards apply, and when the exception must be reviewed or removed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ec54621c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 40 — Protect data with access boundaries, encryption decisions, and controlled sharing patterns</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40 — Protect data with access boundaries, encryption decisions, and controlled sharing patterns</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">27054141-3b8f-4b68-b2a3-fb82afad2ce8</guid>
      <link>https://share.transistor.fm/s/e7e73158</link>
      <description>
        <![CDATA[<p>This episode explains how to protect data by combining access boundaries, encryption decisions, and controlled sharing patterns that reduce accidental exposure and intentional misuse. You’ll define access boundaries as the segmentation of data by sensitivity, ownership, and purpose, then connect that to exam scenarios where the right answer depends on limiting who can access what, from where, and under what conditions. We’ll discuss encryption decisions in practical terms, including encryption at rest versus in transit, key management responsibilities, and how to avoid false confidence when encryption is enabled but keys are overly accessible. Real-world scenarios include sharing sensitive files with external partners, controlling access to cloud storage, and preventing uncontrolled data replication through email, chat, or personal cloud accounts. Troubleshooting includes identifying overbroad sharing links, fixing permissions drift, handling legitimate business needs for collaboration without weakening controls, and producing evidence that protections are operating through access reviews, audit logs, and repeatable verification checks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to protect data by combining access boundaries, encryption decisions, and controlled sharing patterns that reduce accidental exposure and intentional misuse. You’ll define access boundaries as the segmentation of data by sensitivity, ownership, and purpose, then connect that to exam scenarios where the right answer depends on limiting who can access what, from where, and under what conditions. We’ll discuss encryption decisions in practical terms, including encryption at rest versus in transit, key management responsibilities, and how to avoid false confidence when encryption is enabled but keys are overly accessible. Real-world scenarios include sharing sensitive files with external partners, controlling access to cloud storage, and preventing uncontrolled data replication through email, chat, or personal cloud accounts. Troubleshooting includes identifying overbroad sharing links, fixing permissions drift, handling legitimate business needs for collaboration without weakening controls, and producing evidence that protections are operating through access reviews, audit logs, and repeatable verification checks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:07:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e7e73158/e66a756b.mp3" length="23457015" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>585</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to protect data by combining access boundaries, encryption decisions, and controlled sharing patterns that reduce accidental exposure and intentional misuse. You’ll define access boundaries as the segmentation of data by sensitivity, ownership, and purpose, then connect that to exam scenarios where the right answer depends on limiting who can access what, from where, and under what conditions. We’ll discuss encryption decisions in practical terms, including encryption at rest versus in transit, key management responsibilities, and how to avoid false confidence when encryption is enabled but keys are overly accessible. Real-world scenarios include sharing sensitive files with external partners, controlling access to cloud storage, and preventing uncontrolled data replication through email, chat, or personal cloud accounts. Troubleshooting includes identifying overbroad sharing links, fixing permissions drift, handling legitimate business needs for collaboration without weakening controls, and producing evidence that protections are operating through access reviews, audit logs, and repeatable verification checks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e7e73158/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 41 — Retain and dispose of data safely with automation, approvals, and audit evidence</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41 — Retain and dispose of data safely with automation, approvals, and audit evidence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c419a18-d0cc-47b8-80e1-ba428cc43361</guid>
      <link>https://share.transistor.fm/s/1504d9ea</link>
      <description>
        <![CDATA[<p>This episode explains data retention and disposal as lifecycle controls that reduce legal exposure, breach impact, and storage sprawl while preserving what the business truly needs. You’ll define retention as keeping data for a justified period and disposal as verified removal or destruction, then connect both to exam scenarios that test whether controls are enforceable and evidenced, not merely documented. We’ll cover automation patterns like retention policies by data class, storage tier rules, and scheduled deletion workflows that reduce human error, plus approval gates for legal holds, investigations, and exception cases where disposal must pause. Real-world examples include cleaning up old user data in SaaS platforms, retiring legacy file shares, and disposing of backups and logs without breaking compliance obligations. Troubleshooting focuses on proving disposal happened, preventing orphaned copies in sync tools, handling conflicting requirements across jurisdictions, and producing audit evidence such as policy versions, approval records, job logs, exception registers, and periodic verification reports. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains data retention and disposal as lifecycle controls that reduce legal exposure, breach impact, and storage sprawl while preserving what the business truly needs. You’ll define retention as keeping data for a justified period and disposal as verified removal or destruction, then connect both to exam scenarios that test whether controls are enforceable and evidenced, not merely documented. We’ll cover automation patterns like retention policies by data class, storage tier rules, and scheduled deletion workflows that reduce human error, plus approval gates for legal holds, investigations, and exception cases where disposal must pause. Real-world examples include cleaning up old user data in SaaS platforms, retiring legacy file shares, and disposing of backups and logs without breaking compliance obligations. Troubleshooting focuses on proving disposal happened, preventing orphaned copies in sync tools, handling conflicting requirements across jurisdictions, and producing audit evidence such as policy versions, approval records, job logs, exception registers, and periodic verification reports. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:08:02 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1504d9ea/cd704633.mp3" length="29243640" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>729</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains data retention and disposal as lifecycle controls that reduce legal exposure, breach impact, and storage sprawl while preserving what the business truly needs. You’ll define retention as keeping data for a justified period and disposal as verified removal or destruction, then connect both to exam scenarios that test whether controls are enforceable and evidenced, not merely documented. We’ll cover automation patterns like retention policies by data class, storage tier rules, and scheduled deletion workflows that reduce human error, plus approval gates for legal holds, investigations, and exception cases where disposal must pause. Real-world examples include cleaning up old user data in SaaS platforms, retiring legacy file shares, and disposing of backups and logs without breaking compliance obligations. Troubleshooting focuses on proving disposal happened, preventing orphaned copies in sync tools, handling conflicting requirements across jurisdictions, and producing audit evidence such as policy versions, approval records, job logs, exception registers, and periodic verification reports. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1504d9ea/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 42 — Define recovery objectives that fit business reality: RPO, RTO, and scope decisions</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42 — Define recovery objectives that fit business reality: RPO, RTO, and scope decisions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e977d3a2-28b2-4657-b559-88727071c1db</guid>
      <link>https://share.transistor.fm/s/01e4859e</link>
      <description>
        <![CDATA[<p>This episode teaches recovery objectives as decision tools that shape how resilient your environment truly is, and how exam questions often test whether you can match objectives to business needs instead of picking the most aggressive option. You’ll define RPO as the maximum tolerable data loss window and RTO as the maximum tolerable downtime window, then explain how scope decisions determine what systems, data sets, and dependencies are included in recovery planning. We’ll connect objectives to concrete design choices such as replication frequency, backup strategy, failover design, staffing readiness, and the difference between recovering a service versus restoring full business function. Real-world scenarios include choosing different RPO and RTO targets for payroll, customer-facing apps, and internal collaboration tools, and negotiating realistic targets when budgets and operational constraints exist. Troubleshooting covers vague objectives that cannot be tested, missing dependency mapping that breaks recoveries, and documentation gaps that create false confidence until a real outage forces uncomfortable truths. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches recovery objectives as decision tools that shape how resilient your environment truly is, and how exam questions often test whether you can match objectives to business needs instead of picking the most aggressive option. You’ll define RPO as the maximum tolerable data loss window and RTO as the maximum tolerable downtime window, then explain how scope decisions determine what systems, data sets, and dependencies are included in recovery planning. We’ll connect objectives to concrete design choices such as replication frequency, backup strategy, failover design, staffing readiness, and the difference between recovering a service versus restoring full business function. Real-world scenarios include choosing different RPO and RTO targets for payroll, customer-facing apps, and internal collaboration tools, and negotiating realistic targets when budgets and operational constraints exist. Troubleshooting covers vague objectives that cannot be tested, missing dependency mapping that breaks recoveries, and documentation gaps that create false confidence until a real outage forces uncomfortable truths. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:08:26 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/01e4859e/e0786406.mp3" length="23911532" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>596</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches recovery objectives as decision tools that shape how resilient your environment truly is, and how exam questions often test whether you can match objectives to business needs instead of picking the most aggressive option. You’ll define RPO as the maximum tolerable data loss window and RTO as the maximum tolerable downtime window, then explain how scope decisions determine what systems, data sets, and dependencies are included in recovery planning. We’ll connect objectives to concrete design choices such as replication frequency, backup strategy, failover design, staffing readiness, and the difference between recovering a service versus restoring full business function. Real-world scenarios include choosing different RPO and RTO targets for payroll, customer-facing apps, and internal collaboration tools, and negotiating realistic targets when budgets and operational constraints exist. Troubleshooting covers vague objectives that cannot be tested, missing dependency mapping that breaks recoveries, and documentation gaps that create false confidence until a real outage forces uncomfortable truths. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/01e4859e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 43 — Protect backups as high-value targets: access controls, encryption, and isolation strategy</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43 — Protect backups as high-value targets: access controls, encryption, and isolation strategy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">820b08d4-7248-4176-9b16-b6cdacdc5e79</guid>
      <link>https://share.transistor.fm/s/47146501</link>
      <description>
        <![CDATA[<p>This episode explains why backups are prime targets for attackers and how protecting them requires stronger controls than ordinary storage because backups can recreate the entire environment. You’ll define backup security objectives such as confidentiality, integrity, availability, and recoverability, then connect these to exam scenarios involving ransomware, insider threats, and compromised admin credentials. We’ll cover access controls like separate backup admin roles, MFA, least privilege to modify retention or delete sets, and monitoring for unusual delete or encryption events. You’ll also learn encryption decisions, including key ownership and separation so attackers who compromise production cannot automatically decrypt backup data. Isolation strategy is a core focus, including immutable storage, offline or air-gapped options, and separate accounts or tenants to prevent blast radius. Troubleshooting includes avoiding single points of failure, preventing backup agents from becoming attack paths, ensuring backup metadata is protected, and validating protections with periodic reviews of permissions, change logs, and alerting on destructive operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains why backups are prime targets for attackers and how protecting them requires stronger controls than ordinary storage because backups can recreate the entire environment. You’ll define backup security objectives such as confidentiality, integrity, availability, and recoverability, then connect these to exam scenarios involving ransomware, insider threats, and compromised admin credentials. We’ll cover access controls like separate backup admin roles, MFA, least privilege to modify retention or delete sets, and monitoring for unusual delete or encryption events. You’ll also learn encryption decisions, including key ownership and separation so attackers who compromise production cannot automatically decrypt backup data. Isolation strategy is a core focus, including immutable storage, offline or air-gapped options, and separate accounts or tenants to prevent blast radius. Troubleshooting includes avoiding single points of failure, preventing backup agents from becoming attack paths, ensuring backup metadata is protected, and validating protections with periodic reviews of permissions, change logs, and alerting on destructive operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:08:50 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/47146501/790f8079.mp3" length="36109685" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>901</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains why backups are prime targets for attackers and how protecting them requires stronger controls than ordinary storage because backups can recreate the entire environment. You’ll define backup security objectives such as confidentiality, integrity, availability, and recoverability, then connect these to exam scenarios involving ransomware, insider threats, and compromised admin credentials. We’ll cover access controls like separate backup admin roles, MFA, least privilege to modify retention or delete sets, and monitoring for unusual delete or encryption events. You’ll also learn encryption decisions, including key ownership and separation so attackers who compromise production cannot automatically decrypt backup data. Isolation strategy is a core focus, including immutable storage, offline or air-gapped options, and separate accounts or tenants to prevent blast radius. Troubleshooting includes avoiding single points of failure, preventing backup agents from becoming attack paths, ensuring backup metadata is protected, and validating protections with periodic reviews of permissions, change logs, and alerting on destructive operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/47146501/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 44 — Prove recoverability with restore tests, integrity checks, and documented results</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44 — Prove recoverability with restore tests, integrity checks, and documented results</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e5994f55-29c3-461b-84e7-f69c2b5c6433</guid>
      <link>https://share.transistor.fm/s/b9f03bc5</link>
      <description>
        <![CDATA[<p>This episode focuses on proving recoverability, because the exam frequently distinguishes “we have backups” from “we can restore correctly under pressure.” You’ll define recoverability as the ability to restore required systems and data within stated objectives, with verified integrity and usable outcomes, not merely completed backup jobs. We’ll cover restore testing types, from file-level restores to full system recovery and application-consistent restores, and how to choose tests that match criticality and change frequency. Integrity checks are emphasized, including checksum validation, verification that restored data is current enough for business use, and ensuring configuration and secrets needed to run the service are recoverable too. Real-world scenarios include restoring after ransomware, validating that backups were not silently corrupted, and recovering cloud workloads where infrastructure definitions and permissions are as important as data. Troubleshooting includes tests that never exercise production-like complexity, missing documentation, unclear success criteria, and how to capture results as audit evidence with dates, scope, steps, outcomes, and remediation actions for failures. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on proving recoverability, because the exam frequently distinguishes “we have backups” from “we can restore correctly under pressure.” You’ll define recoverability as the ability to restore required systems and data within stated objectives, with verified integrity and usable outcomes, not merely completed backup jobs. We’ll cover restore testing types, from file-level restores to full system recovery and application-consistent restores, and how to choose tests that match criticality and change frequency. Integrity checks are emphasized, including checksum validation, verification that restored data is current enough for business use, and ensuring configuration and secrets needed to run the service are recoverable too. Real-world scenarios include restoring after ransomware, validating that backups were not silently corrupted, and recovering cloud workloads where infrastructure definitions and permissions are as important as data. Troubleshooting includes tests that never exercise production-like complexity, missing documentation, unclear success criteria, and how to capture results as audit evidence with dates, scope, steps, outcomes, and remediation actions for failures. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:09:14 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b9f03bc5/f06e3a91.mp3" length="22890662" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>571</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on proving recoverability, because the exam frequently distinguishes “we have backups” from “we can restore correctly under pressure.” You’ll define recoverability as the ability to restore required systems and data within stated objectives, with verified integrity and usable outcomes, not merely completed backup jobs. We’ll cover restore testing types, from file-level restores to full system recovery and application-consistent restores, and how to choose tests that match criticality and change frequency. Integrity checks are emphasized, including checksum validation, verification that restored data is current enough for business use, and ensuring configuration and secrets needed to run the service are recoverable too. Real-world scenarios include restoring after ransomware, validating that backups were not silently corrupted, and recovering cloud workloads where infrastructure definitions and permissions are as important as data. Troubleshooting includes tests that never exercise production-like complexity, missing documentation, unclear success criteria, and how to capture results as audit evidence with dates, scope, steps, outcomes, and remediation actions for failures. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b9f03bc5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 45 — Secure the software lifecycle end-to-end: design, build, deploy, and operate safely</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45 — Secure the software lifecycle end-to-end: design, build, deploy, and operate safely</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c1d6f30e-c3d2-436e-9dd6-7f9dc6e3444e</guid>
      <link>https://share.transistor.fm/s/ba940ad0</link>
      <description>
        <![CDATA[<p>This episode explains securing the software lifecycle as a continuous set of controls that start at design and extend through build, deployment, and ongoing operation, which aligns closely with control-based exam thinking. You’ll define lifecycle security goals such as reducing defect introduction, preventing tampering, and ensuring changes are traceable, then map those goals to practical practices like threat modeling, secure coding standards, code review discipline, and build pipeline hardening. We’ll cover how to protect source repositories, control who can merge changes, secure CI/CD secrets, and ensure artifacts are signed and traceable so you can answer exam questions about supply chain integrity and change accountability. Real-world examples include separating duties between developers and release approvers, limiting production access, and monitoring deployments for unexpected changes. Troubleshooting includes dealing with legacy apps, balancing speed with risk, preventing “bypass paths” around pipelines, and generating evidence such as commit histories, review records, pipeline logs, and deployment approvals that demonstrate the controls are operating in reality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains securing the software lifecycle as a continuous set of controls that start at design and extend through build, deployment, and ongoing operation, which aligns closely with control-based exam thinking. You’ll define lifecycle security goals such as reducing defect introduction, preventing tampering, and ensuring changes are traceable, then map those goals to practical practices like threat modeling, secure coding standards, code review discipline, and build pipeline hardening. We’ll cover how to protect source repositories, control who can merge changes, secure CI/CD secrets, and ensure artifacts are signed and traceable so you can answer exam questions about supply chain integrity and change accountability. Real-world examples include separating duties between developers and release approvers, limiting production access, and monitoring deployments for unexpected changes. Troubleshooting includes dealing with legacy apps, balancing speed with risk, preventing “bypass paths” around pipelines, and generating evidence such as commit histories, review records, pipeline logs, and deployment approvals that demonstrate the controls are operating in reality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:09:42 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ba940ad0/ca27f09b.mp3" length="27777654" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>693</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains securing the software lifecycle as a continuous set of controls that start at design and extend through build, deployment, and ongoing operation, which aligns closely with control-based exam thinking. You’ll define lifecycle security goals such as reducing defect introduction, preventing tampering, and ensuring changes are traceable, then map those goals to practical practices like threat modeling, secure coding standards, code review discipline, and build pipeline hardening. We’ll cover how to protect source repositories, control who can merge changes, secure CI/CD secrets, and ensure artifacts are signed and traceable so you can answer exam questions about supply chain integrity and change accountability. Real-world examples include separating duties between developers and release approvers, limiting production access, and monitoring deployments for unexpected changes. Troubleshooting includes dealing with legacy apps, balancing speed with risk, preventing “bypass paths” around pipelines, and generating evidence such as commit histories, review records, pipeline logs, and deployment approvals that demonstrate the controls are operating in reality. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ba940ad0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 46 — Reduce application risk by managing dependencies and patching weak components quickly</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46 — Reduce application risk by managing dependencies and patching weak components quickly</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">034c7fcd-19d9-43b3-a6e0-76bc2eab068c</guid>
      <link>https://share.transistor.fm/s/1eb39c9a</link>
      <description>
        <![CDATA[<p>This episode focuses on dependency risk because modern applications rely on third-party libraries, frameworks, containers, and services that can introduce critical vulnerabilities outside your own code. You’ll define dependencies broadly, including open-source packages, internal shared libraries, base images, and hosted service components, then connect that definition to exam scenarios where the right answer involves inventory, version control, and timely patch action. We’ll cover practical dependency management, such as maintaining a software bill of materials mindset, pinning versions, validating sources, and monitoring for vulnerable components. Patching strategy is discussed as both speed and safety, including how to prioritize exploitable weaknesses, stage updates, and prevent breaking changes with testing gates and rollback plans. Real-world scenarios include high-profile library vulnerabilities, compromised package repositories, and container image drift where “latest” quietly changes. Troubleshooting includes incomplete dependency visibility, slow ownership response, conflicting versions across microservices, and how to prove closure with evidence that updated components were deployed and vulnerable versions are no longer reachable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on dependency risk because modern applications rely on third-party libraries, frameworks, containers, and services that can introduce critical vulnerabilities outside your own code. You’ll define dependencies broadly, including open-source packages, internal shared libraries, base images, and hosted service components, then connect that definition to exam scenarios where the right answer involves inventory, version control, and timely patch action. We’ll cover practical dependency management, such as maintaining a software bill of materials mindset, pinning versions, validating sources, and monitoring for vulnerable components. Patching strategy is discussed as both speed and safety, including how to prioritize exploitable weaknesses, stage updates, and prevent breaking changes with testing gates and rollback plans. Real-world scenarios include high-profile library vulnerabilities, compromised package repositories, and container image drift where “latest” quietly changes. Troubleshooting includes incomplete dependency visibility, slow ownership response, conflicting versions across microservices, and how to prove closure with evidence that updated components were deployed and vulnerable versions are no longer reachable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:10:06 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1eb39c9a/0960d427.mp3" length="23350426" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>582</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on dependency risk because modern applications rely on third-party libraries, frameworks, containers, and services that can introduce critical vulnerabilities outside your own code. You’ll define dependencies broadly, including open-source packages, internal shared libraries, base images, and hosted service components, then connect that definition to exam scenarios where the right answer involves inventory, version control, and timely patch action. We’ll cover practical dependency management, such as maintaining a software bill of materials mindset, pinning versions, validating sources, and monitoring for vulnerable components. Patching strategy is discussed as both speed and safety, including how to prioritize exploitable weaknesses, stage updates, and prevent breaking changes with testing gates and rollback plans. Real-world scenarios include high-profile library vulnerabilities, compromised package repositories, and container image drift where “latest” quietly changes. Troubleshooting includes incomplete dependency visibility, slow ownership response, conflicting versions across microservices, and how to prove closure with evidence that updated components were deployed and vulnerable versions are no longer reachable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1eb39c9a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 47 — Detect and remediate weaknesses with testing evidence, prioritization, and closure proof</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47 — Detect and remediate weaknesses with testing evidence, prioritization, and closure proof</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">80133bfb-c49e-4f94-96db-5d601dc9db2f</guid>
      <link>https://share.transistor.fm/s/02958f4a</link>
      <description>
        <![CDATA[<p>This episode explains application and system weakness management as a lifecycle that depends on testing evidence, risk-based prioritization, and verified closure rather than optimistic ticket updates. You’ll define weakness detection methods such as static analysis, dynamic testing, dependency scanning, configuration testing, and manual review, and you’ll connect these to exam questions that test what evidence is strongest and what actions are most appropriate for different findings. We’ll cover how to prioritize weaknesses using exploitability, exposure, business impact, and compensating controls, then translate priorities into remediation plans with owners, timelines, and acceptance criteria. Real-world scenarios include a critical injection flaw in a public API, weak authentication logic in an internal admin tool, and insecure defaults in cloud configuration that create app-level data exposure. Troubleshooting focuses on false positives, tool overlap that creates duplicate findings, and remediation that breaks functionality because fixes were not validated. You’ll learn closure proof techniques like retesting, verifying deployed versions, and recording artifacts so findings can be defended as resolved. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains application and system weakness management as a lifecycle that depends on testing evidence, risk-based prioritization, and verified closure rather than optimistic ticket updates. You’ll define weakness detection methods such as static analysis, dynamic testing, dependency scanning, configuration testing, and manual review, and you’ll connect these to exam questions that test what evidence is strongest and what actions are most appropriate for different findings. We’ll cover how to prioritize weaknesses using exploitability, exposure, business impact, and compensating controls, then translate priorities into remediation plans with owners, timelines, and acceptance criteria. Real-world scenarios include a critical injection flaw in a public API, weak authentication logic in an internal admin tool, and insecure defaults in cloud configuration that create app-level data exposure. Troubleshooting focuses on false positives, tool overlap that creates duplicate findings, and remediation that breaks functionality because fixes were not validated. You’ll learn closure proof techniques like retesting, verifying deployed versions, and recording artifacts so findings can be defended as resolved. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:10:30 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/02958f4a/7561657e.mp3" length="21684864" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>541</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains application and system weakness management as a lifecycle that depends on testing evidence, risk-based prioritization, and verified closure rather than optimistic ticket updates. You’ll define weakness detection methods such as static analysis, dynamic testing, dependency scanning, configuration testing, and manual review, and you’ll connect these to exam questions that test what evidence is strongest and what actions are most appropriate for different findings. We’ll cover how to prioritize weaknesses using exploitability, exposure, business impact, and compensating controls, then translate priorities into remediation plans with owners, timelines, and acceptance criteria. Real-world scenarios include a critical injection flaw in a public API, weak authentication logic in an internal admin tool, and insecure defaults in cloud configuration that create app-level data exposure. Troubleshooting focuses on false positives, tool overlap that creates duplicate findings, and remediation that breaks functionality because fixes were not validated. You’ll learn closure proof techniques like retesting, verifying deployed versions, and recording artifacts so findings can be defended as resolved. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/02958f4a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 48 — Evaluate service providers with due diligence that matches risk and criticality</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48 — Evaluate service providers with due diligence that matches risk and criticality</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b2936f25-22d4-40b0-8d63-7ee4af13075d</guid>
      <link>https://share.transistor.fm/s/fded90cc</link>
      <description>
        <![CDATA[<p>This episode teaches third-party due diligence as a risk-matching exercise, because the exam often tests whether you can scale scrutiny based on the provider’s access, data sensitivity, and operational criticality. You’ll define service provider evaluation as assessing security posture, reliability, and governance before onboarding, then connect it to practical questions like what evidence is reasonable to request and what red flags should block adoption. We’ll cover due diligence inputs such as security questionnaires, independent assessments, incident history, data handling practices, access models, and continuity capabilities, with emphasis on verifying claims instead of relying on marketing statements. Real-world scenarios include selecting a SaaS platform that stores customer data, a managed service provider with admin access, and a niche vendor supporting a mission-critical workflow. Troubleshooting includes vendors that resist transparency, mismatched control language, incomplete scope definitions, and how to document risk decisions, compensating controls, and approval outcomes so onboarding is defensible and aligned to the organization’s risk tolerance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches third-party due diligence as a risk-matching exercise, because the exam often tests whether you can scale scrutiny based on the provider’s access, data sensitivity, and operational criticality. You’ll define service provider evaluation as assessing security posture, reliability, and governance before onboarding, then connect it to practical questions like what evidence is reasonable to request and what red flags should block adoption. We’ll cover due diligence inputs such as security questionnaires, independent assessments, incident history, data handling practices, access models, and continuity capabilities, with emphasis on verifying claims instead of relying on marketing statements. Real-world scenarios include selecting a SaaS platform that stores customer data, a managed service provider with admin access, and a niche vendor supporting a mission-critical workflow. Troubleshooting includes vendors that resist transparency, mismatched control language, incomplete scope definitions, and how to document risk decisions, compensating controls, and approval outcomes so onboarding is defensible and aligned to the organization’s risk tolerance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:10:54 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fded90cc/18fabfee.mp3" length="21119556" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>526</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches third-party due diligence as a risk-matching exercise, because the exam often tests whether you can scale scrutiny based on the provider’s access, data sensitivity, and operational criticality. You’ll define service provider evaluation as assessing security posture, reliability, and governance before onboarding, then connect it to practical questions like what evidence is reasonable to request and what red flags should block adoption. We’ll cover due diligence inputs such as security questionnaires, independent assessments, incident history, data handling practices, access models, and continuity capabilities, with emphasis on verifying claims instead of relying on marketing statements. Real-world scenarios include selecting a SaaS platform that stores customer data, a managed service provider with admin access, and a niche vendor supporting a mission-critical workflow. Troubleshooting includes vendors that resist transparency, mismatched control language, incomplete scope definitions, and how to document risk decisions, compensating controls, and approval outcomes so onboarding is defensible and aligned to the organization’s risk tolerance. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fded90cc/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 49 — Enforce provider accountability through contracts, controls, and ongoing assurance reviews</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49 — Enforce provider accountability through contracts, controls, and ongoing assurance reviews</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">524e536c-14ff-463e-99d9-805923f1bb94</guid>
      <link>https://share.transistor.fm/s/7585ce86</link>
      <description>
        <![CDATA[<p>This episode explains how to enforce service provider accountability after selection, because third-party risk management fails when controls exist only during onboarding. You’ll define accountability mechanisms such as contractual requirements, security addenda, right-to-audit clauses, breach notification timelines, subcontractor disclosures, and clear responsibility boundaries for shared controls. Exam relevance includes recognizing that “trust” must be operationalized through measurable obligations and ongoing assurance, especially when providers process sensitive data or maintain privileged access. We’ll cover control expectations like access logging, encryption requirements, incident response coordination, vulnerability management, and change notification for impactful platform updates. Real-world scenarios include negotiating acceptable SLA language, ensuring providers support timely user access reviews, and establishing procedures for emergency access and evidence requests during incidents. Troubleshooting includes ambiguous shared-responsibility assumptions, contracts that lack enforcement teeth, assurance reviews that become checkbox exercises, and building a repeatable cadence of reviews, metrics, and escalation paths when providers fail to meet requirements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to enforce service provider accountability after selection, because third-party risk management fails when controls exist only during onboarding. You’ll define accountability mechanisms such as contractual requirements, security addenda, right-to-audit clauses, breach notification timelines, subcontractor disclosures, and clear responsibility boundaries for shared controls. Exam relevance includes recognizing that “trust” must be operationalized through measurable obligations and ongoing assurance, especially when providers process sensitive data or maintain privileged access. We’ll cover control expectations like access logging, encryption requirements, incident response coordination, vulnerability management, and change notification for impactful platform updates. Real-world scenarios include negotiating acceptable SLA language, ensuring providers support timely user access reviews, and establishing procedures for emergency access and evidence requests during incidents. Troubleshooting includes ambiguous shared-responsibility assumptions, contracts that lack enforcement teeth, assurance reviews that become checkbox exercises, and building a repeatable cadence of reviews, metrics, and escalation paths when providers fail to meet requirements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:11:20 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7585ce86/8ed4a542.mp3" length="24193668" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>603</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to enforce service provider accountability after selection, because third-party risk management fails when controls exist only during onboarding. You’ll define accountability mechanisms such as contractual requirements, security addenda, right-to-audit clauses, breach notification timelines, subcontractor disclosures, and clear responsibility boundaries for shared controls. Exam relevance includes recognizing that “trust” must be operationalized through measurable obligations and ongoing assurance, especially when providers process sensitive data or maintain privileged access. We’ll cover control expectations like access logging, encryption requirements, incident response coordination, vulnerability management, and change notification for impactful platform updates. Real-world scenarios include negotiating acceptable SLA language, ensuring providers support timely user access reviews, and establishing procedures for emergency access and evidence requests during incidents. Troubleshooting includes ambiguous shared-responsibility assumptions, contracts that lack enforcement teeth, assurance reviews that become checkbox exercises, and building a repeatable cadence of reviews, metrics, and escalation paths when providers fail to meet requirements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7585ce86/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 50 — Monitor third-party risk continuously with signals, assessments, and escalation triggers</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50 — Monitor third-party risk continuously with signals, assessments, and escalation triggers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">825aab47-95ff-4ba3-8abe-5ca18747e9ba</guid>
      <link>https://share.transistor.fm/s/9a70cb11</link>
      <description>
        <![CDATA[<p>This episode focuses on continuous third-party risk monitoring, because provider posture can change quickly due to acquisitions, new products, outages, or security incidents. You’ll define continuous monitoring as maintaining ongoing visibility into provider risk signals and control performance rather than relying on annual questionnaires. We’ll cover monitoring inputs such as periodic reassessments, security attestations, vulnerability and incident disclosures, service reliability trends, access log reviews where feasible, and business-side signals like expanding data scope or increasing integration depth. Exam scenarios often test whether you can detect scope creep, respond to new risks, and escalate when a provider no longer meets requirements, so we’ll build practical escalation triggers tied to severity, customer impact, and control failure patterns. Real-world examples include responding to a provider breach notification, reassessing a vendor after a major platform change, and tightening access when integration expands to new sensitive datasets. Troubleshooting includes avoiding monitoring theater, preventing alert overload, and ensuring escalations lead to real decisions such as mitigation plans, contractual remediation, or provider exit strategies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on continuous third-party risk monitoring, because provider posture can change quickly due to acquisitions, new products, outages, or security incidents. You’ll define continuous monitoring as maintaining ongoing visibility into provider risk signals and control performance rather than relying on annual questionnaires. We’ll cover monitoring inputs such as periodic reassessments, security attestations, vulnerability and incident disclosures, service reliability trends, access log reviews where feasible, and business-side signals like expanding data scope or increasing integration depth. Exam scenarios often test whether you can detect scope creep, respond to new risks, and escalate when a provider no longer meets requirements, so we’ll build practical escalation triggers tied to severity, customer impact, and control failure patterns. Real-world examples include responding to a provider breach notification, reassessing a vendor after a major platform change, and tightening access when integration expands to new sensitive datasets. Troubleshooting includes avoiding monitoring theater, preventing alert overload, and ensuring escalations lead to real decisions such as mitigation plans, contractual remediation, or provider exit strategies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:11:43 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9a70cb11/e4273e1e.mp3" length="36202676" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>903</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on continuous third-party risk monitoring, because provider posture can change quickly due to acquisitions, new products, outages, or security incidents. You’ll define continuous monitoring as maintaining ongoing visibility into provider risk signals and control performance rather than relying on annual questionnaires. We’ll cover monitoring inputs such as periodic reassessments, security attestations, vulnerability and incident disclosures, service reliability trends, access log reviews where feasible, and business-side signals like expanding data scope or increasing integration depth. Exam scenarios often test whether you can detect scope creep, respond to new risks, and escalate when a provider no longer meets requirements, so we’ll build practical escalation triggers tied to severity, customer impact, and control failure patterns. Real-world examples include responding to a provider breach notification, reassessing a vendor after a major platform change, and tightening access when integration expands to new sensitive datasets. Troubleshooting includes avoiding monitoring theater, preventing alert overload, and ensuring escalations lead to real decisions such as mitigation plans, contractual remediation, or provider exit strategies. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9a70cb11/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 51 — Build awareness programs that change behavior, not just complete training requirements</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51 — Build awareness programs that change behavior, not just complete training requirements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">349c718e-8d5a-4a25-ac2f-cfa1b5987294</guid>
      <link>https://share.transistor.fm/s/305aa1b7</link>
      <description>
        <![CDATA[<p>This episode focuses on designing security awareness programs that produce measurable behavior change, which is often the underlying goal behind exam questions that reference “training” as a control. You’ll define awareness as building recognition and safer decision-making, and training as developing specific skills, then explain why check-the-box completion rates rarely reduce phishing success, data mishandling, or policy violations. We’ll cover program design elements such as audience segmentation, role-specific messaging, realistic scenarios, and reinforcement patterns that match how people actually work. Real-world examples include tailoring content for finance, IT admins, developers, and frontline staff, and using policy moments like new tool rollouts or incidents to make messaging timely and relevant. Troubleshooting includes handling resistance, avoiding fear-based messaging, preventing “security theater” campaigns, and building governance so content stays current and aligned to top threat patterns and control priorities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on designing security awareness programs that produce measurable behavior change, which is often the underlying goal behind exam questions that reference “training” as a control. You’ll define awareness as building recognition and safer decision-making, and training as developing specific skills, then explain why check-the-box completion rates rarely reduce phishing success, data mishandling, or policy violations. We’ll cover program design elements such as audience segmentation, role-specific messaging, realistic scenarios, and reinforcement patterns that match how people actually work. Real-world examples include tailoring content for finance, IT admins, developers, and frontline staff, and using policy moments like new tool rollouts or incidents to make messaging timely and relevant. Troubleshooting includes handling resistance, avoiding fear-based messaging, preventing “security theater” campaigns, and building governance so content stays current and aligned to top threat patterns and control priorities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:12:08 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/305aa1b7/f8d846d1.mp3" length="27027423" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>674</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on designing security awareness programs that produce measurable behavior change, which is often the underlying goal behind exam questions that reference “training” as a control. You’ll define awareness as building recognition and safer decision-making, and training as developing specific skills, then explain why check-the-box completion rates rarely reduce phishing success, data mishandling, or policy violations. We’ll cover program design elements such as audience segmentation, role-specific messaging, realistic scenarios, and reinforcement patterns that match how people actually work. Real-world examples include tailoring content for finance, IT admins, developers, and frontline staff, and using policy moments like new tool rollouts or incidents to make messaging timely and relevant. Troubleshooting includes handling resistance, avoiding fear-based messaging, preventing “security theater” campaigns, and building governance so content stays current and aligned to top threat patterns and control priorities. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/305aa1b7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 52 — Measure training effectiveness with metrics tied to real risk reduction outcomes</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52 — Measure training effectiveness with metrics tied to real risk reduction outcomes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">68f5566f-f935-4a27-8b70-bd2503aa33d9</guid>
      <link>https://share.transistor.fm/s/562582a5</link>
      <description>
        <![CDATA[<p>This episode teaches how to measure security training effectiveness in ways that connect to real risk reduction, which is what exam scenarios often want when they ask how to prove a control is working. You’ll define meaningful metrics that go beyond attendance, such as phishing report rates, reduction in repeated policy violations, faster incident reporting, fewer risky credential behaviors, and improved secure configuration compliance for technical teams. We’ll explain how to design measurement so it respects privacy and avoids punishing individuals, while still producing actionable program insights. Real-world examples include measuring time-to-report suspicious email, tracking reduction in malware infections tied to risky browsing patterns, and correlating improved access review hygiene after targeted training for managers. Troubleshooting covers misleading metrics, small sample sizes, changing attacker tactics that distort trends, and the common failure where organizations collect numbers but do not change the program based on what the data shows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to measure security training effectiveness in ways that connect to real risk reduction, which is what exam scenarios often want when they ask how to prove a control is working. You’ll define meaningful metrics that go beyond attendance, such as phishing report rates, reduction in repeated policy violations, faster incident reporting, fewer risky credential behaviors, and improved secure configuration compliance for technical teams. We’ll explain how to design measurement so it respects privacy and avoids punishing individuals, while still producing actionable program insights. Real-world examples include measuring time-to-report suspicious email, tracking reduction in malware infections tied to risky browsing patterns, and correlating improved access review hygiene after targeted training for managers. Troubleshooting covers misleading metrics, small sample sizes, changing attacker tactics that distort trends, and the common failure where organizations collect numbers but do not change the program based on what the data shows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:12:58 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/562582a5/2c3ee91d.mp3" length="27049354" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>675</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to measure security training effectiveness in ways that connect to real risk reduction, which is what exam scenarios often want when they ask how to prove a control is working. You’ll define meaningful metrics that go beyond attendance, such as phishing report rates, reduction in repeated policy violations, faster incident reporting, fewer risky credential behaviors, and improved secure configuration compliance for technical teams. We’ll explain how to design measurement so it respects privacy and avoids punishing individuals, while still producing actionable program insights. Real-world examples include measuring time-to-report suspicious email, tracking reduction in malware infections tied to risky browsing patterns, and correlating improved access review hygiene after targeted training for managers. Troubleshooting covers misleading metrics, small sample sizes, changing attacker tactics that distort trends, and the common failure where organizations collect numbers but do not change the program based on what the data shows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/562582a5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 53 — Reinforce skills over time with role-based focus, coaching, and timely feedback</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53 — Reinforce skills over time with role-based focus, coaching, and timely feedback</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c38b1781-9509-4868-a0e3-90eaad723384</guid>
      <link>https://share.transistor.fm/s/b389fcf2</link>
      <description>
        <![CDATA[<p>This episode focuses on reinforcement, because durable security improvement requires repeated practice, coaching, and timely feedback rather than one-time annual training. You’ll define reinforcement as the cycle of reminding, practicing, observing, and correcting, and connect it to exam logic where ongoing validation and continuous improvement matter more than policies alone. We’ll cover role-based reinforcement methods, such as admin runbooks and tabletop drills for responders, secure coding reviews and patterns for developers, and simple verification workflows for business teams facing fraud attempts. Real-world scenarios include providing immediate feedback after a user reports a suspicious message, coaching managers during access reviews to reduce rubber-stamping, and reinforcing secure change procedures after a near-miss outage. Troubleshooting includes preventing reinforcement from becoming noise, choosing the right cadence for different roles, avoiding “gotcha” culture, and creating feedback loops where lessons learned from incidents and audits directly update the next reinforcement cycle. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on reinforcement, because durable security improvement requires repeated practice, coaching, and timely feedback rather than one-time annual training. You’ll define reinforcement as the cycle of reminding, practicing, observing, and correcting, and connect it to exam logic where ongoing validation and continuous improvement matter more than policies alone. We’ll cover role-based reinforcement methods, such as admin runbooks and tabletop drills for responders, secure coding reviews and patterns for developers, and simple verification workflows for business teams facing fraud attempts. Real-world scenarios include providing immediate feedback after a user reports a suspicious message, coaching managers during access reviews to reduce rubber-stamping, and reinforcing secure change procedures after a near-miss outage. Troubleshooting includes preventing reinforcement from becoming noise, choosing the right cadence for different roles, avoiding “gotcha” culture, and creating feedback loops where lessons learned from incidents and audits directly update the next reinforcement cycle. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:13:22 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b389fcf2/2934b80e.mp3" length="24914626" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>621</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on reinforcement, because durable security improvement requires repeated practice, coaching, and timely feedback rather than one-time annual training. You’ll define reinforcement as the cycle of reminding, practicing, observing, and correcting, and connect it to exam logic where ongoing validation and continuous improvement matter more than policies alone. We’ll cover role-based reinforcement methods, such as admin runbooks and tabletop drills for responders, secure coding reviews and patterns for developers, and simple verification workflows for business teams facing fraud attempts. Real-world scenarios include providing immediate feedback after a user reports a suspicious message, coaching managers during access reviews to reduce rubber-stamping, and reinforcing secure change procedures after a near-miss outage. Troubleshooting includes preventing reinforcement from becoming noise, choosing the right cadence for different roles, avoiding “gotcha” culture, and creating feedback loops where lessons learned from incidents and audits directly update the next reinforcement cycle. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b389fcf2/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 54 — Build incident response readiness with roles, playbooks, and communications discipline</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54 — Build incident response readiness with roles, playbooks, and communications discipline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9ed1f78f-493c-4f0e-b7e4-f1ed1ea66e27</guid>
      <link>https://share.transistor.fm/s/b10ba55e</link>
      <description>
        <![CDATA[<p>This episode builds incident response readiness as a structured capability that can be executed under stress, which aligns with exam questions that test process clarity and role accountability. You’ll define readiness as having named roles, clear decision rights, and documented playbooks that cover common incident types, while ensuring evidence handling and containment steps are not improvised. We’ll cover role assignments such as incident commander, technical leads, communications lead, legal liaison, and operations coordinators, and explain how to establish escalation triggers and authority boundaries before a crisis. Real-world examples include creating playbooks for ransomware, credential compromise, and data exposure, with emphasis on what to do in the first hour and how to coordinate across security, IT, and leadership. Troubleshooting includes missing contact paths, unclear approval chains that slow containment, poorly maintained playbooks that no longer match the environment, and building communications discipline so internal updates and external statements stay accurate and consistent. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode builds incident response readiness as a structured capability that can be executed under stress, which aligns with exam questions that test process clarity and role accountability. You’ll define readiness as having named roles, clear decision rights, and documented playbooks that cover common incident types, while ensuring evidence handling and containment steps are not improvised. We’ll cover role assignments such as incident commander, technical leads, communications lead, legal liaison, and operations coordinators, and explain how to establish escalation triggers and authority boundaries before a crisis. Real-world examples include creating playbooks for ransomware, credential compromise, and data exposure, with emphasis on what to do in the first hour and how to coordinate across security, IT, and leadership. Troubleshooting includes missing contact paths, unclear approval chains that slow containment, poorly maintained playbooks that no longer match the environment, and building communications discipline so internal updates and external statements stay accurate and consistent. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:13:47 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b10ba55e/8dc1b16a.mp3" length="23189513" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>578</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode builds incident response readiness as a structured capability that can be executed under stress, which aligns with exam questions that test process clarity and role accountability. You’ll define readiness as having named roles, clear decision rights, and documented playbooks that cover common incident types, while ensuring evidence handling and containment steps are not improvised. We’ll cover role assignments such as incident commander, technical leads, communications lead, legal liaison, and operations coordinators, and explain how to establish escalation triggers and authority boundaries before a crisis. Real-world examples include creating playbooks for ransomware, credential compromise, and data exposure, with emphasis on what to do in the first hour and how to coordinate across security, IT, and leadership. Troubleshooting includes missing contact paths, unclear approval chains that slow containment, poorly maintained playbooks that no longer match the environment, and building communications discipline so internal updates and external statements stay accurate and consistent. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b10ba55e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 55 — Execute incident response under pressure: detection, containment, and evidence handling</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55 — Execute incident response under pressure: detection, containment, and evidence handling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fd79598a-bd80-46d6-96f6-147b9e314df1</guid>
      <link>https://share.transistor.fm/s/f5c0dca3</link>
      <description>
        <![CDATA[<p>This episode focuses on executing incident response under pressure, emphasizing detection confirmation, rapid containment, and careful evidence handling so actions are defensible and effective. You’ll define the early response objectives: stop the bleeding, understand scope, preserve proof, and maintain business operations where possible, which maps directly to exam scenarios that ask for the best “next step.” We’ll cover practical containment actions like isolating hosts, disabling compromised accounts, blocking malicious indicators, and securing affected segments, along with decision-making guidance on when containment should happen immediately versus after collecting volatile evidence. Real-world examples include responding to suspected ransomware spread, credential theft with active session abuse, and suspicious admin changes that suggest persistence. Troubleshooting includes avoiding destructive “cleanup” that destroys evidence, handling conflicting priorities between uptime and containment, documenting actions in a clear timeline, and maintaining communications discipline so stakeholders receive accurate updates without speculation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on executing incident response under pressure, emphasizing detection confirmation, rapid containment, and careful evidence handling so actions are defensible and effective. You’ll define the early response objectives: stop the bleeding, understand scope, preserve proof, and maintain business operations where possible, which maps directly to exam scenarios that ask for the best “next step.” We’ll cover practical containment actions like isolating hosts, disabling compromised accounts, blocking malicious indicators, and securing affected segments, along with decision-making guidance on when containment should happen immediately versus after collecting volatile evidence. Real-world examples include responding to suspected ransomware spread, credential theft with active session abuse, and suspicious admin changes that suggest persistence. Troubleshooting includes avoiding destructive “cleanup” that destroys evidence, handling conflicting priorities between uptime and containment, documenting actions in a clear timeline, and maintaining communications discipline so stakeholders receive accurate updates without speculation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:14:11 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f5c0dca3/c61e63b9.mp3" length="27880062" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>695</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on executing incident response under pressure, emphasizing detection confirmation, rapid containment, and careful evidence handling so actions are defensible and effective. You’ll define the early response objectives: stop the bleeding, understand scope, preserve proof, and maintain business operations where possible, which maps directly to exam scenarios that ask for the best “next step.” We’ll cover practical containment actions like isolating hosts, disabling compromised accounts, blocking malicious indicators, and securing affected segments, along with decision-making guidance on when containment should happen immediately versus after collecting volatile evidence. Real-world examples include responding to suspected ransomware spread, credential theft with active session abuse, and suspicious admin changes that suggest persistence. Troubleshooting includes avoiding destructive “cleanup” that destroys evidence, handling conflicting priorities between uptime and containment, documenting actions in a clear timeline, and maintaining communications discipline so stakeholders receive accurate updates without speculation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f5c0dca3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 56 — Improve response capability with lessons learned and continuous program refinement</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56 — Improve response capability with lessons learned and continuous program refinement</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef66c793-204b-43f4-acdc-081d1f0f138b</guid>
      <link>https://share.transistor.fm/s/89817748</link>
      <description>
        <![CDATA[<p>This episode explains how to improve incident response capability using lessons learned, because the exam often expects you to treat response as a program that matures through evidence-based refinement. You’ll define lessons learned as a structured review that identifies what happened, what worked, what failed, and what must change in people, process, and technology, without turning into blame. We’ll cover how to produce actionable outputs such as updated playbooks, improved logging and detection coverage, clarified escalation rules, and better containment tooling, then show how to assign owners and deadlines so improvements actually land. Real-world scenarios include discovering that missing identity logs delayed triage, or that unclear authority for isolating systems caused response hesitation, and how those insights translate into concrete fixes. Troubleshooting includes reviews that become vague narratives, action items that never close, and improvements that are not validated; you’ll learn how to retest response changes through tabletop exercises, controlled simulations, and metrics like time-to-detect and time-to-contain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to improve incident response capability using lessons learned, because the exam often expects you to treat response as a program that matures through evidence-based refinement. You’ll define lessons learned as a structured review that identifies what happened, what worked, what failed, and what must change in people, process, and technology, without turning into blame. We’ll cover how to produce actionable outputs such as updated playbooks, improved logging and detection coverage, clarified escalation rules, and better containment tooling, then show how to assign owners and deadlines so improvements actually land. Real-world scenarios include discovering that missing identity logs delayed triage, or that unclear authority for isolating systems caused response hesitation, and how those insights translate into concrete fixes. Troubleshooting includes reviews that become vague narratives, action items that never close, and improvements that are not validated; you’ll learn how to retest response changes through tabletop exercises, controlled simulations, and metrics like time-to-detect and time-to-contain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:14:37 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/89817748/46d49389.mp3" length="29409783" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>734</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to improve incident response capability using lessons learned, because the exam often expects you to treat response as a program that matures through evidence-based refinement. You’ll define lessons learned as a structured review that identifies what happened, what worked, what failed, and what must change in people, process, and technology, without turning into blame. We’ll cover how to produce actionable outputs such as updated playbooks, improved logging and detection coverage, clarified escalation rules, and better containment tooling, then show how to assign owners and deadlines so improvements actually land. Real-world scenarios include discovering that missing identity logs delayed triage, or that unclear authority for isolating systems caused response hesitation, and how those insights translate into concrete fixes. Troubleshooting includes reviews that become vague narratives, action items that never close, and improvements that are not validated; you’ll learn how to retest response changes through tabletop exercises, controlled simulations, and metrics like time-to-detect and time-to-contain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/89817748/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 57 — Plan penetration tests safely: scope control, rules of engagement, and reporting clarity</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57 — Plan penetration tests safely: scope control, rules of engagement, and reporting clarity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d7761920-0726-4894-829b-8521a9f27ef7</guid>
      <link>https://share.transistor.fm/s/ec122b67</link>
      <description>
        <![CDATA[<p>This episode teaches how to plan penetration tests safely and effectively, focusing on scope control, rules of engagement, and reporting clarity that protect operations while producing useful results. You’ll define a penetration test as an authorized simulation of adversary techniques to evaluate controls, not a chaotic “hack everything” exercise, and connect this to exam questions that test governance and safety. We’ll cover scope definition, allowed targets, prohibited actions, test windows, communication paths, and approval requirements, plus how rules of engagement establish guardrails for social engineering, exploitation, data access, and denial-of-service risk. Real-world examples include coordinating with IT operations to prevent false incident escalations, defining how credentials and sensitive findings are handled, and ensuring testing does not accidentally disrupt critical services. Troubleshooting includes ambiguous scope that leads to conflict, missing contacts during the test window, poor documentation of assumptions, and report outputs that lack reproducibility or actionable detail for remediation teams. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to plan penetration tests safely and effectively, focusing on scope control, rules of engagement, and reporting clarity that protect operations while producing useful results. You’ll define a penetration test as an authorized simulation of adversary techniques to evaluate controls, not a chaotic “hack everything” exercise, and connect this to exam questions that test governance and safety. We’ll cover scope definition, allowed targets, prohibited actions, test windows, communication paths, and approval requirements, plus how rules of engagement establish guardrails for social engineering, exploitation, data access, and denial-of-service risk. Real-world examples include coordinating with IT operations to prevent false incident escalations, defining how credentials and sensitive findings are handled, and ensuring testing does not accidentally disrupt critical services. Troubleshooting includes ambiguous scope that leads to conflict, missing contacts during the test window, poor documentation of assumptions, and report outputs that lack reproducibility or actionable detail for remediation teams. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:14:59 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ec122b67/d021d287.mp3" length="25209305" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>629</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to plan penetration tests safely and effectively, focusing on scope control, rules of engagement, and reporting clarity that protect operations while producing useful results. You’ll define a penetration test as an authorized simulation of adversary techniques to evaluate controls, not a chaotic “hack everything” exercise, and connect this to exam questions that test governance and safety. We’ll cover scope definition, allowed targets, prohibited actions, test windows, communication paths, and approval requirements, plus how rules of engagement establish guardrails for social engineering, exploitation, data access, and denial-of-service risk. Real-world examples include coordinating with IT operations to prevent false incident escalations, defining how credentials and sensitive findings are handled, and ensuring testing does not accidentally disrupt critical services. Troubleshooting includes ambiguous scope that leads to conflict, missing contacts during the test window, poor documentation of assumptions, and report outputs that lack reproducibility or actionable detail for remediation teams. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ec122b67/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 58 — Translate pen test findings into remediation priorities and measurable control improvements</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58 — Translate pen test findings into remediation priorities and measurable control improvements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c9a708d-4efd-4d82-936c-cfcf2a1d72e9</guid>
      <link>https://share.transistor.fm/s/d4d29dc1</link>
      <description>
        <![CDATA[<p>This episode focuses on turning penetration test findings into remediation priorities and measurable improvements, because the real value of testing is how it strengthens controls and reduces future risk. You’ll define the difference between findings that show a specific vulnerability and findings that reveal systemic control gaps, then connect this to exam logic about prioritization, ownership, and verification. We’ll cover how to triage findings using exploitability, exposure, business impact, and control relevance, and how to convert results into work items with clear owners, deadlines, and success criteria. Real-world examples include addressing credential abuse paths by tightening privileged access and monitoring, fixing segmentation weaknesses that enabled lateral movement, and improving secure configuration baselines when default settings made exploitation easy. Troubleshooting includes remediation that treats symptoms without root cause, teams that dispute findings due to environment drift, and programs that close tickets without validating results; you’ll learn how to tie fixes to control statements, create evidence artifacts, and show measurable improvement over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on turning penetration test findings into remediation priorities and measurable improvements, because the real value of testing is how it strengthens controls and reduces future risk. You’ll define the difference between findings that show a specific vulnerability and findings that reveal systemic control gaps, then connect this to exam logic about prioritization, ownership, and verification. We’ll cover how to triage findings using exploitability, exposure, business impact, and control relevance, and how to convert results into work items with clear owners, deadlines, and success criteria. Real-world examples include addressing credential abuse paths by tightening privileged access and monitoring, fixing segmentation weaknesses that enabled lateral movement, and improving secure configuration baselines when default settings made exploitation easy. Troubleshooting includes remediation that treats symptoms without root cause, teams that dispute findings due to environment drift, and programs that close tickets without validating results; you’ll learn how to tie fixes to control statements, create evidence artifacts, and show measurable improvement over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:15:25 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d4d29dc1/3877089b.mp3" length="20680723" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>515</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on turning penetration test findings into remediation priorities and measurable improvements, because the real value of testing is how it strengthens controls and reduces future risk. You’ll define the difference between findings that show a specific vulnerability and findings that reveal systemic control gaps, then connect this to exam logic about prioritization, ownership, and verification. We’ll cover how to triage findings using exploitability, exposure, business impact, and control relevance, and how to convert results into work items with clear owners, deadlines, and success criteria. Real-world examples include addressing credential abuse paths by tightening privileged access and monitoring, fixing segmentation weaknesses that enabled lateral movement, and improving secure configuration baselines when default settings made exploitation easy. Troubleshooting includes remediation that treats symptoms without root cause, teams that dispute findings due to environment drift, and programs that close tickets without validating results; you’ll learn how to tie fixes to control statements, create evidence artifacts, and show measurable improvement over time. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d4d29dc1/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 59 — Validate resilience after fixes with retesting and durable closure evidence</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59 — Validate resilience after fixes with retesting and durable closure evidence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a6a48739-95cf-4652-8b5c-a44ed30d8a71</guid>
      <link>https://share.transistor.fm/s/5efc3291</link>
      <description>
        <![CDATA[<p>This final episode focuses on validating resilience after fixes, emphasizing retesting and durable closure evidence so improvements persist beyond a single remediation sprint. You’ll define retesting as confirming that exploited paths are no longer feasible and that compensating controls work as intended, then connect it to exam expectations about verification, continuous control validation, and defensible evidence. We’ll cover retesting methods such as targeted re-exploitation attempts, configuration verification, vulnerability rescans, and detection validation to ensure monitoring now catches the behaviors that previously slipped through. Real-world scenarios include confirming ransomware containment controls hold after segmentation changes, validating that privileged access controls prevent repeat abuse, and ensuring patch and hardening changes did not introduce new operational fragility. Troubleshooting includes partial fixes that leave alternate attack paths open, environment changes that invalidate earlier assumptions, and weak evidence practices that cannot demonstrate closure; you’ll learn how to document outcomes with timestamps, scope, artifacts, and follow-up checks so closure is credible and long-lasting. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This final episode focuses on validating resilience after fixes, emphasizing retesting and durable closure evidence so improvements persist beyond a single remediation sprint. You’ll define retesting as confirming that exploited paths are no longer feasible and that compensating controls work as intended, then connect it to exam expectations about verification, continuous control validation, and defensible evidence. We’ll cover retesting methods such as targeted re-exploitation attempts, configuration verification, vulnerability rescans, and detection validation to ensure monitoring now catches the behaviors that previously slipped through. Real-world scenarios include confirming ransomware containment controls hold after segmentation changes, validating that privileged access controls prevent repeat abuse, and ensuring patch and hardening changes did not introduce new operational fragility. Troubleshooting includes partial fixes that leave alternate attack paths open, environment changes that invalidate earlier assumptions, and weak evidence practices that cannot demonstrate closure; you’ll learn how to document outcomes with timestamps, scope, artifacts, and follow-up checks so closure is credible and long-lasting. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:15:53 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5efc3291/bb6e8e08.mp3" length="23244871" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>580</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This final episode focuses on validating resilience after fixes, emphasizing retesting and durable closure evidence so improvements persist beyond a single remediation sprint. You’ll define retesting as confirming that exploited paths are no longer feasible and that compensating controls work as intended, then connect it to exam expectations about verification, continuous control validation, and defensible evidence. We’ll cover retesting methods such as targeted re-exploitation attempts, configuration verification, vulnerability rescans, and detection validation to ensure monitoring now catches the behaviors that previously slipped through. Real-world scenarios include confirming ransomware containment controls hold after segmentation changes, validating that privileged access controls prevent repeat abuse, and ensuring patch and hardening changes did not introduce new operational fragility. Troubleshooting includes partial fixes that leave alternate attack paths open, environment changes that invalidate earlier assumptions, and weak evidence practices that cannot demonstrate closure; you’ll learn how to document outcomes with timestamps, scope, artifacts, and follow-up checks so closure is credible and long-lasting. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5efc3291/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Welcome to the GIAC GCCC Audio Course</title>
      <itunes:title>Welcome to the GIAC GCCC Audio Course</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">93c77268-ee23-4392-a3fb-dd14d167a399</guid>
      <link>https://share.transistor.fm/s/727fab1d</link>
      <description>
        <![CDATA[<p>If you build, run, or defend systems for a living, you already know the truth: security isn’t one thing you do. It’s a chain of decisions—design, build, deploy, operate, recover—under real constraints.</p><p>This 90-second trailer is for an audio course that treats cybersecurity like an operational discipline, not a buzzword. You’ll learn how to set recovery objectives that match business reality, protect backups like high-value targets, and prove recoverability with restore tests and closure evidence. You’ll hear how to harden the software lifecycle end-to-end, manage dependencies and patch weak components fast, and turn pen test findings into measurable control improvements instead of one-time cleanup. You’ll also get practical guidance for third-party risk, from due diligence through contract enforcement and continuous monitoring, and you’ll build incident response readiness that holds up under pressure—clear roles, reliable playbooks, and communications discipline.</p><p>Every episode is designed for busy professionals: plain language, real-world decision points, and repeatable habits you can apply immediately.</p><p>If you want security that actually survives production and incident reality, start here.</p><p>Developed by BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>If you build, run, or defend systems for a living, you already know the truth: security isn’t one thing you do. It’s a chain of decisions—design, build, deploy, operate, recover—under real constraints.</p><p>This 90-second trailer is for an audio course that treats cybersecurity like an operational discipline, not a buzzword. You’ll learn how to set recovery objectives that match business reality, protect backups like high-value targets, and prove recoverability with restore tests and closure evidence. You’ll hear how to harden the software lifecycle end-to-end, manage dependencies and patch weak components fast, and turn pen test findings into measurable control improvements instead of one-time cleanup. You’ll also get practical guidance for third-party risk, from due diligence through contract enforcement and continuous monitoring, and you’ll build incident response readiness that holds up under pressure—clear roles, reliable playbooks, and communications discipline.</p><p>Every episode is designed for busy professionals: plain language, real-world decision points, and repeatable habits you can apply immediately.</p><p>If you want security that actually survives production and incident reality, start here.</p><p>Developed by BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 12:28:17 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/727fab1d/c5c2dc75.mp3" length="607939" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>76</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>If you build, run, or defend systems for a living, you already know the truth: security isn’t one thing you do. It’s a chain of decisions—design, build, deploy, operate, recover—under real constraints.</p><p>This 90-second trailer is for an audio course that treats cybersecurity like an operational discipline, not a buzzword. You’ll learn how to set recovery objectives that match business reality, protect backups like high-value targets, and prove recoverability with restore tests and closure evidence. You’ll hear how to harden the software lifecycle end-to-end, manage dependencies and patch weak components fast, and turn pen test findings into measurable control improvements instead of one-time cleanup. You’ll also get practical guidance for third-party risk, from due diligence through contract enforcement and continuous monitoring, and you’ll build incident response readiness that holds up under pressure—clear roles, reliable playbooks, and communications discipline.</p><p>Every episode is designed for busy professionals: plain language, real-world decision points, and repeatable habits you can apply immediately.</p><p>If you want security that actually survives production and incident reality, start here.</p><p>Developed by BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>GCCC, CIS Controls v8, cyber security controls, security governance, asset inventory, software inventory, configuration management, secure configuration baselines, configuration drift, vulnerability management, vulnerability prioritization, patch management, log management, SIEM, security monitoring, incident response, ransomware defense, backup security, RPO RTO, third-party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/727fab1d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
