<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-the-giac-gsom-audio-course" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified: The GIAC GSOM Audio Course</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-the-giac-gsom-audio-course</itunes:new-feed-url>
    <description>Welcome to Certified: The ISACA GSOM Audio Course. I’m here to help you build the kind of security operations management mindset that works in the real world, where priorities shift, alerts pile up, and executives want answers in plain language. Across this course, you can expect practical explanations, clear definitions, and guidance that connects day-to-day operations to business risk. We’ll talk about how security teams are structured, how work gets triaged and tracked, how incidents are managed without chaos, and how to report progress in a way leaders trust. Everything is taught with the assumption that you’re busy, you’re accountable, and you want material that is direct, usable, and aligned to the ISACA GSOM body of knowledge.

To get the most from Certified: The ISACA GSOM Audio Course, listen with a notebook mindset, even if you never write a thing down. After each lesson, pause and ask one question: what would this look like in my environment, with my people, my tools, and my constraints? If you’re studying for the exam, keep a running list of terms and frameworks you want to revisit, and replay the episodes that feel dense until they start to sound obvious. If you’re using this for the job, pick one improvement to test each week, because small changes compound quickly in operations. Follow the show so new episodes land automatically, and subscribe wherever you get podcasts.</description>
    <copyright>2026 Bare Metal Cyber</copyright>
    <podcast:guid>e8a7627d-9011-59ce-b857-b5ea7ffb73e6</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="12ba6b47-50a9-5caa-aebe-16bae40dbbc5" feedUrl="https://feeds.transistor.fm/cism"/>
      <podcast:remoteItem feedGuid="cacae54a-ce67-5106-88f2-f64bd5fdceaf" feedUrl="https://feeds.transistor.fm/certified-the-isaca-ccoa-audio-course"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="c20b81e4-c8ba-5ad1-a56f-adb004b2840b" feedUrl="https://feeds.transistor.fm/certified-the-giac-gcil-audio-course"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="143fc9c4-74e3-506c-8f6a-319fe2cb366d" feedUrl="https://feeds.transistor.fm/certified-the-cissp-prepcast"/>
      <podcast:remoteItem feedGuid="6b60b84f-86ab-58f7-9e86-6b3111b823c2" feedUrl="https://feeds.transistor.fm/certified-comptia-cysa"/>
      <podcast:remoteItem feedGuid="b6a2705a-6440-5c6a-8c0e-2a21eccbe46d" feedUrl="https://feeds.transistor.fm/certified-the-giac-gstrt-audio-course"/>
      <podcast:remoteItem feedGuid="8fb26813-bdb7-5678-85b7-f8b5206137a4" feedUrl="https://feeds.transistor.fm/certified-sans-giac-gsec-audio-course"/>
      <podcast:remoteItem feedGuid="f9ed3af6-4b3e-568e-a8a9-050b642f8918" feedUrl="https://feeds.transistor.fm/certified-the-giac-gslc-audio-course"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <itunes:applepodcastsverify>b7d603f0-0ae9-11f1-91c0-1f3067bf36bb</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Sat, 14 Feb 2026 21:00:35 -0600" url="https://media.transistor.fm/1f547a50/4b2dacad.mp3" length="413170" type="audio/mpeg">Welcome to the GIAC GSOM Audio Course</podcast:trailer>
    <language>en</language>
    <pubDate>Mon, 16 Mar 2026 18:55:16 -0500</pubDate>
    <lastBuildDate>Sat, 04 Apr 2026 00:07:16 -0500</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/TN4wIy5WHUUKelPUqoOCIY8XO8vYoL9CRT4aB6ymD2w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NjU2/ODQwOWUzNWUyOTU2/ZDBiNWZkYjFlYWI1/ZGJlYi5wbmc.jpg</url>
      <title>Certified: The GIAC GSOM Audio Course</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>serial</itunes:type>
    <itunes:author>Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/TN4wIy5WHUUKelPUqoOCIY8XO8vYoL9CRT4aB6ymD2w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NjU2/ODQwOWUzNWUyOTU2/ZDBiNWZkYjFlYWI1/ZGJlYi5wbmc.jpg"/>
    <itunes:summary>Welcome to Certified: The ISACA GSOM Audio Course. I’m here to help you build the kind of security operations management mindset that works in the real world, where priorities shift, alerts pile up, and executives want answers in plain language. Across this course, you can expect practical explanations, clear definitions, and guidance that connects day-to-day operations to business risk. We’ll talk about how security teams are structured, how work gets triaged and tracked, how incidents are managed without chaos, and how to report progress in a way leaders trust. Everything is taught with the assumption that you’re busy, you’re accountable, and you want material that is direct, usable, and aligned to the ISACA GSOM body of knowledge.

To get the most from Certified: The ISACA GSOM Audio Course, listen with a notebook mindset, even if you never write a thing down. After each lesson, pause and ask one question: what would this look like in my environment, with my people, my tools, and my constraints? If you’re studying for the exam, keep a running list of terms and frameworks you want to revisit, and replay the episodes that feel dense until they start to sound obvious. If you’re using this for the job, pick one improvement to test each week, because small changes compound quickly in operations. Follow the show so new episodes land automatically, and subscribe wherever you get podcasts.</itunes:summary>
    <itunes:subtitle>Welcome to Certified: The ISACA GSOM Audio Course.</itunes:subtitle>
    <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 1 — Decode the GSOM Exam: structure, scoring, and what success looks like</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1 — Decode the GSOM Exam: structure, scoring, and what success looks like</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d93ea9b2-93c6-48b8-8520-793248f3a354</guid>
      <link>https://share.transistor.fm/s/f9e1211a</link>
      <description>
        <![CDATA[<p>This episode frames the GIAC GSOM exam as a job-task validation test for SOC leadership and operations, then breaks down how the domains connect so you can study by operational workflows instead of isolated facts. You’ll review how question style rewards defensible decision-making, consistent terminology, and the ability to choose the “best next step” under realistic constraints like limited telemetry, competing priorities, and business impact. We’ll define what “success” looks like in exam terms: recognizing what the question is really testing, identifying the critical assumption, and selecting the option that preserves evidence, reduces risk, and supports repeatable operations. You’ll also practice a pacing mindset: when to move quickly on definitions versus when to slow down for scenario nuance, tradeoffs, and exception handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode frames the GIAC GSOM exam as a job-task validation test for SOC leadership and operations, then breaks down how the domains connect so you can study by operational workflows instead of isolated facts. You’ll review how question style rewards defensible decision-making, consistent terminology, and the ability to choose the “best next step” under realistic constraints like limited telemetry, competing priorities, and business impact. We’ll define what “success” looks like in exam terms: recognizing what the question is really testing, identifying the critical assumption, and selecting the option that preserves evidence, reduces risk, and supports repeatable operations. You’ll also practice a pacing mindset: when to move quickly on definitions versus when to slow down for scenario nuance, tradeoffs, and exception handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:51:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f9e1211a/43a1727e.mp3" length="29704852" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>742</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode frames the GIAC GSOM exam as a job-task validation test for SOC leadership and operations, then breaks down how the domains connect so you can study by operational workflows instead of isolated facts. You’ll review how question style rewards defensible decision-making, consistent terminology, and the ability to choose the “best next step” under realistic constraints like limited telemetry, competing priorities, and business impact. We’ll define what “success” looks like in exam terms: recognizing what the question is really testing, identifying the critical assumption, and selecting the option that preserves evidence, reduces risk, and supports repeatable operations. You’ll also practice a pacing mindset: when to move quickly on definitions versus when to slow down for scenario nuance, tradeoffs, and exception handling. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f9e1211a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 2 — Navigate GIAC proctoring rules and policies without test-day surprises</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2 — Navigate GIAC proctoring rules and policies without test-day surprises</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">44ec79e1-6962-4f20-926e-99ac32415f70</guid>
      <link>https://share.transistor.fm/s/4bc94df8</link>
      <description>
        <![CDATA[<p>This episode prepares you for the proctored testing experience by treating logistics as a risk-reduction problem, because a preventable rule violation can end an otherwise strong exam attempt. You’ll connect common proctoring requirements to concrete prep steps: identity verification, workspace rules, permitted materials, break behavior, and how system checks can fail if you ignore updates, multi-monitor settings, or background applications. We’ll map these details to exam relevance by showing how “operational discipline” is tested everywhere in GSOM, including pre-incident readiness and change control, and the same mindset applies on test day. You’ll hear troubleshooting scenarios such as camera placement issues, network instability, and interrupted check-in flows, with a focus on what to do calmly so you do not compound the problem. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode prepares you for the proctored testing experience by treating logistics as a risk-reduction problem, because a preventable rule violation can end an otherwise strong exam attempt. You’ll connect common proctoring requirements to concrete prep steps: identity verification, workspace rules, permitted materials, break behavior, and how system checks can fail if you ignore updates, multi-monitor settings, or background applications. We’ll map these details to exam relevance by showing how “operational discipline” is tested everywhere in GSOM, including pre-incident readiness and change control, and the same mindset applies on test day. You’ll hear troubleshooting scenarios such as camera placement issues, network instability, and interrupted check-in flows, with a focus on what to do calmly so you do not compound the problem. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:51:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4bc94df8/c54794c9.mp3" length="27635956" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>690</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode prepares you for the proctored testing experience by treating logistics as a risk-reduction problem, because a preventable rule violation can end an otherwise strong exam attempt. You’ll connect common proctoring requirements to concrete prep steps: identity verification, workspace rules, permitted materials, break behavior, and how system checks can fail if you ignore updates, multi-monitor settings, or background applications. We’ll map these details to exam relevance by showing how “operational discipline” is tested everywhere in GSOM, including pre-incident readiness and change control, and the same mindset applies on test day. You’ll hear troubleshooting scenarios such as camera placement issues, network instability, and interrupted check-in flows, with a focus on what to do calmly so you do not compound the problem. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4bc94df8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 3 — Build an audio-first study plan mapped to official GSOM objectives</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3 — Build an audio-first study plan mapped to official GSOM objectives</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">88816f11-e6e2-4441-9d69-bf65293ecf37</guid>
      <link>https://share.transistor.fm/s/c14bd3a5</link>
      <description>
        <![CDATA[<p>This episode teaches you how to convert the GSOM objectives into a repeatable study system that emphasizes recall, application, and decision quality instead of passive review. You’ll define an audio-first cadence that fits a commute and still covers depth: short daily objective blocks, weekly consolidation, and spaced reviews that re-hit the same concepts in new contexts. We’ll connect the plan to exam performance by focusing on the most common failure mode—recognizing the term but missing the operational implication—then showing how to practice with “why this option is best” explanations. You’ll also learn how to track weak areas using objective tags, then use targeted mini-scenarios to rehearse triage, escalation, and control selection without needing a lab. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you how to convert the GSOM objectives into a repeatable study system that emphasizes recall, application, and decision quality instead of passive review. You’ll define an audio-first cadence that fits a commute and still covers depth: short daily objective blocks, weekly consolidation, and spaced reviews that re-hit the same concepts in new contexts. We’ll connect the plan to exam performance by focusing on the most common failure mode—recognizing the term but missing the operational implication—then showing how to practice with “why this option is best” explanations. You’ll also learn how to track weak areas using objective tags, then use targeted mini-scenarios to rehearse triage, escalation, and control selection without needing a lab. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:52:03 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c14bd3a5/d98bf361.mp3" length="25927540" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>648</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you how to convert the GSOM objectives into a repeatable study system that emphasizes recall, application, and decision quality instead of passive review. You’ll define an audio-first cadence that fits a commute and still covers depth: short daily objective blocks, weekly consolidation, and spaced reviews that re-hit the same concepts in new contexts. We’ll connect the plan to exam performance by focusing on the most common failure mode—recognizing the term but missing the operational implication—then showing how to practice with “why this option is best” explanations. You’ll also learn how to track weak areas using objective tags, then use targeted mini-scenarios to rehearse triage, escalation, and control selection without needing a lab. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c14bd3a5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 4 — Cyber Defense Theory, Threat Intel, and Defensible Architecture in plain English</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4 — Cyber Defense Theory, Threat Intel, and Defensible Architecture in plain English</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2cde35f8-0f36-41ca-b4f6-2fee0ed3484d</guid>
      <link>https://share.transistor.fm/s/393a50b3</link>
      <description>
        <![CDATA[<p>This episode builds the foundation that GSOM expects before it tests tooling and process, because the exam assumes you can reason from attacker behavior to defensive design choices. You’ll define cyber defense theory in practical terms: how adversaries create effects, how defenders reduce opportunity and blast radius, and how uncertainty drives layered controls. Then we translate threat intelligence into operational value by distinguishing raw indicators from assessed intelligence, and by clarifying the difference between relevance, credibility, and timeliness. Finally, you’ll connect those inputs to defensible architecture by mapping threats to detection and prevention layers, understanding compensating controls, and recognizing where visibility breaks down. Examples include how a single weak trust boundary can invalidate monitoring assumptions and how architecture choices change what the SOC can prove during investigations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode builds the foundation that GSOM expects before it tests tooling and process, because the exam assumes you can reason from attacker behavior to defensive design choices. You’ll define cyber defense theory in practical terms: how adversaries create effects, how defenders reduce opportunity and blast radius, and how uncertainty drives layered controls. Then we translate threat intelligence into operational value by distinguishing raw indicators from assessed intelligence, and by clarifying the difference between relevance, credibility, and timeliness. Finally, you’ll connect those inputs to defensible architecture by mapping threats to detection and prevention layers, understanding compensating controls, and recognizing where visibility breaks down. Examples include how a single weak trust boundary can invalidate monitoring assumptions and how architecture choices change what the SOC can prove during investigations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:52:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/393a50b3/bcb5939e.mp3" length="26808417" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>670</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode builds the foundation that GSOM expects before it tests tooling and process, because the exam assumes you can reason from attacker behavior to defensive design choices. You’ll define cyber defense theory in practical terms: how adversaries create effects, how defenders reduce opportunity and blast radius, and how uncertainty drives layered controls. Then we translate threat intelligence into operational value by distinguishing raw indicators from assessed intelligence, and by clarifying the difference between relevance, credibility, and timeliness. Finally, you’ll connect those inputs to defensible architecture by mapping threats to detection and prevention layers, understanding compensating controls, and recognizing where visibility breaks down. Examples include how a single weak trust boundary can invalidate monitoring assumptions and how architecture choices change what the SOC can prove during investigations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/393a50b3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 5 — Apply fundamental cyber defense theory to anticipate attacker moves early</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5 — Apply fundamental cyber defense theory to anticipate attacker moves early</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6a2154ba-9936-40c9-b500-5c5abfaf887d</guid>
      <link>https://share.transistor.fm/s/131f2bec</link>
      <description>
        <![CDATA[<p>This episode shows how to use basic attacker logic to predict what comes next, which is a common GSOM testing angle because mature SOC decisions depend on anticipating follow-on actions. You’ll practice reasoning from objectives like credential access, persistence, or data theft to likely techniques such as phishing, token abuse, lateral movement, and living-off-the-land behavior. We’ll define early-warning signals and explain why they matter: weak authentication events, unusual administrative activity, suspicious process chains, and access patterns that do not match business workflows. You’ll also learn best practices for forming hypotheses that are testable with available telemetry, plus troubleshooting considerations when logs are missing, time is skewed, or enrichment is incomplete. The goal is to make your choices defensible: not just “block it,” but “contain while preserving evidence and confirming scope.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode shows how to use basic attacker logic to predict what comes next, which is a common GSOM testing angle because mature SOC decisions depend on anticipating follow-on actions. You’ll practice reasoning from objectives like credential access, persistence, or data theft to likely techniques such as phishing, token abuse, lateral movement, and living-off-the-land behavior. We’ll define early-warning signals and explain why they matter: weak authentication events, unusual administrative activity, suspicious process chains, and access patterns that do not match business workflows. You’ll also learn best practices for forming hypotheses that are testable with available telemetry, plus troubleshooting considerations when logs are missing, time is skewed, or enrichment is incomplete. The goal is to make your choices defensible: not just “block it,” but “contain while preserving evidence and confirming scope.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:52:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/131f2bec/964e317c.mp3" length="35461203" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>886</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode shows how to use basic attacker logic to predict what comes next, which is a common GSOM testing angle because mature SOC decisions depend on anticipating follow-on actions. You’ll practice reasoning from objectives like credential access, persistence, or data theft to likely techniques such as phishing, token abuse, lateral movement, and living-off-the-land behavior. We’ll define early-warning signals and explain why they matter: weak authentication events, unusual administrative activity, suspicious process chains, and access patterns that do not match business workflows. You’ll also learn best practices for forming hypotheses that are testable with available telemetry, plus troubleshooting considerations when logs are missing, time is skewed, or enrichment is incomplete. The goal is to make your choices defensible: not just “block it,” but “contain while preserving evidence and confirming scope.” Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/131f2bec/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 6 — Translate cyber threat intelligence into prioritized detections and response decisions</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6 — Translate cyber threat intelligence into prioritized detections and response decisions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b43b66d6-745d-460d-983d-3695c0571ed8</guid>
      <link>https://share.transistor.fm/s/866228bc</link>
      <description>
        <![CDATA[<p>This episode explains how threat intelligence becomes action inside a SOC, because GSOM questions often test whether you can turn information into a practical detection or response plan rather than collecting intel as a hobby. You’ll define common intel outputs—indicators, tactics and techniques, targeting profiles, and campaign context—and then map each one to what it can realistically drive: detections, hunts, control tuning, or stakeholder communications. We’ll walk through prioritization logic that blends threat relevance with business exposure, so you can justify why one detection or playbook update is higher value than another. You’ll also examine scenarios where intel is incomplete or noisy, and learn response considerations such as when to block, when to monitor, and when to treat intel as a hypothesis requiring validation to avoid self-inflicted outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how threat intelligence becomes action inside a SOC, because GSOM questions often test whether you can turn information into a practical detection or response plan rather than collecting intel as a hobby. You’ll define common intel outputs—indicators, tactics and techniques, targeting profiles, and campaign context—and then map each one to what it can realistically drive: detections, hunts, control tuning, or stakeholder communications. We’ll walk through prioritization logic that blends threat relevance with business exposure, so you can justify why one detection or playbook update is higher value than another. You’ll also examine scenarios where intel is incomplete or noisy, and learn response considerations such as when to block, when to monitor, and when to treat intel as a hypothesis requiring validation to avoid self-inflicted outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:52:47 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/866228bc/86604541.mp3" length="30525131" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>763</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how threat intelligence becomes action inside a SOC, because GSOM questions often test whether you can turn information into a practical detection or response plan rather than collecting intel as a hobby. You’ll define common intel outputs—indicators, tactics and techniques, targeting profiles, and campaign context—and then map each one to what it can realistically drive: detections, hunts, control tuning, or stakeholder communications. We’ll walk through prioritization logic that blends threat relevance with business exposure, so you can justify why one detection or playbook update is higher value than another. You’ll also examine scenarios where intel is incomplete or noisy, and learn response considerations such as when to block, when to monitor, and when to treat intel as a hypothesis requiring validation to avoid self-inflicted outages. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/866228bc/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 7 — Judge threat intel quality: source reliability, confidence, and operational fit</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7 — Judge threat intel quality: source reliability, confidence, and operational fit</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">522c3168-770a-4d81-b9a2-d40fa9bb8a46</guid>
      <link>https://share.transistor.fm/s/282ab669</link>
      <description>
        <![CDATA[<p>This episode teaches you to evaluate threat intelligence like an analyst and manager, because GSOM expects you to distinguish “interesting” from “actionable” using reliability, confidence, and fit for your environment. You’ll define reliability as a history-based assessment of the source, and confidence as how strongly the evidence supports the analytic claim, then apply both to avoid overreacting to weak reporting. We’ll connect quality judgments to exam scenarios: an unreliable indicator list should not trigger broad blocking, while a high-confidence report about targeted exploitation may justify immediate detection tuning and monitoring. You’ll also learn how operational fit changes the decision, such as whether you have the log sources to detect the described behavior, whether the intel aligns with your sector and tech stack, and how to document assumptions when you act under uncertainty. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches you to evaluate threat intelligence like an analyst and manager, because GSOM expects you to distinguish “interesting” from “actionable” using reliability, confidence, and fit for your environment. You’ll define reliability as a history-based assessment of the source, and confidence as how strongly the evidence supports the analytic claim, then apply both to avoid overreacting to weak reporting. We’ll connect quality judgments to exam scenarios: an unreliable indicator list should not trigger broad blocking, while a high-confidence report about targeted exploitation may justify immediate detection tuning and monitoring. You’ll also learn how operational fit changes the decision, such as whether you have the log sources to detect the described behavior, whether the intel aligns with your sector and tech stack, and how to document assumptions when you act under uncertainty. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:53:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/282ab669/1bce0a94.mp3" length="28040350" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>700</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches you to evaluate threat intelligence like an analyst and manager, because GSOM expects you to distinguish “interesting” from “actionable” using reliability, confidence, and fit for your environment. You’ll define reliability as a history-based assessment of the source, and confidence as how strongly the evidence supports the analytic claim, then apply both to avoid overreacting to weak reporting. We’ll connect quality judgments to exam scenarios: an unreliable indicator list should not trigger broad blocking, while a high-confidence report about targeted exploitation may justify immediate detection tuning and monitoring. You’ll also learn how operational fit changes the decision, such as whether you have the log sources to detect the described behavior, whether the intel aligns with your sector and tech stack, and how to document assumptions when you act under uncertainty. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/282ab669/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 8 — Design defensible security architecture by mapping threats to layered controls</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8 — Design defensible security architecture by mapping threats to layered controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6af2ae64-f2e0-47ae-bced-00fc7d060fbb</guid>
      <link>https://share.transistor.fm/s/375625c6</link>
      <description>
        <![CDATA[<p>This episode focuses on making architecture choices defensible under audit and incident pressure, which GSOM tests by asking you to pick controls that reduce risk without relying on a single point of failure. You’ll define layered defense as coverage across prevention, detection, response, and recovery, and then practice mapping threats to control types such as segmentation, identity hardening, endpoint controls, logging, and safe administrative pathways. We’ll use scenarios to show how architecture affects SOC outcomes: a flat network increases containment cost, weak key management undermines encryption claims, and missing centralized logging turns investigations into guesswork. You’ll also cover best practices for trust boundaries, least privilege, and secure management planes, plus troubleshooting considerations like exception sprawl and “shadow” paths that bypass intended controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on making architecture choices defensible under audit and incident pressure, which GSOM tests by asking you to pick controls that reduce risk without relying on a single point of failure. You’ll define layered defense as coverage across prevention, detection, response, and recovery, and then practice mapping threats to control types such as segmentation, identity hardening, endpoint controls, logging, and safe administrative pathways. We’ll use scenarios to show how architecture affects SOC outcomes: a flat network increases containment cost, weak key management undermines encryption claims, and missing centralized logging turns investigations into guesswork. You’ll also cover best practices for trust boundaries, least privilege, and secure management planes, plus troubleshooting considerations like exception sprawl and “shadow” paths that bypass intended controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:53:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/375625c6/a17a034c.mp3" length="28394568" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>709</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on making architecture choices defensible under audit and incident pressure, which GSOM tests by asking you to pick controls that reduce risk without relying on a single point of failure. You’ll define layered defense as coverage across prevention, detection, response, and recovery, and then practice mapping threats to control types such as segmentation, identity hardening, endpoint controls, logging, and safe administrative pathways. We’ll use scenarios to show how architecture affects SOC outcomes: a flat network increases containment cost, weak key management undermines encryption claims, and missing centralized logging turns investigations into guesswork. You’ll also cover best practices for trust boundaries, least privilege, and secure management planes, plus troubleshooting considerations like exception sprawl and “shadow” paths that bypass intended controls. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/375625c6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 9 — Spaced Review: recall cyber defense theory, threat intel, defensible architecture quickly</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9 — Spaced Review: recall cyber defense theory, threat intel, defensible architecture quickly</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9c18650b-8e78-4b80-899b-9faaf4692c11</guid>
      <link>https://share.transistor.fm/s/fba2a27b</link>
      <description>
        <![CDATA[<p>This episode is a structured recall pass designed to lock in high-yield concepts that reappear throughout GSOM, because the exam rewards fast recognition of what category a problem belongs to and what decision criteria apply. You’ll revisit the core definitions—defense theory as adversary-driven reasoning, threat intelligence as assessed information with reliability and confidence, and architecture as layered controls aligned to threats and business constraints. We’ll practice rapid “if-then” thinking using short scenario cues: what changes when intel is low confidence, what to do when visibility is incomplete, and how to choose compensating controls when ideal controls are unavailable. You’ll also reinforce common pitfalls like confusing indicators with intelligence, treating architecture as a diagram instead of a risk model, and selecting controls that look strong but cannot be operated or evidenced. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode is a structured recall pass designed to lock in high-yield concepts that reappear throughout GSOM, because the exam rewards fast recognition of what category a problem belongs to and what decision criteria apply. You’ll revisit the core definitions—defense theory as adversary-driven reasoning, threat intelligence as assessed information with reliability and confidence, and architecture as layered controls aligned to threats and business constraints. We’ll practice rapid “if-then” thinking using short scenario cues: what changes when intel is low confidence, what to do when visibility is incomplete, and how to choose compensating controls when ideal controls are unavailable. You’ll also reinforce common pitfalls like confusing indicators with intelligence, treating architecture as a diagram instead of a risk model, and selecting controls that look strong but cannot be operated or evidenced. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:54:00 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fba2a27b/92d2571a.mp3" length="30589921" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>764</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode is a structured recall pass designed to lock in high-yield concepts that reappear throughout GSOM, because the exam rewards fast recognition of what category a problem belongs to and what decision criteria apply. You’ll revisit the core definitions—defense theory as adversary-driven reasoning, threat intelligence as assessed information with reliability and confidence, and architecture as layered controls aligned to threats and business constraints. We’ll practice rapid “if-then” thinking using short scenario cues: what changes when intel is low confidence, what to do when visibility is incomplete, and how to choose compensating controls when ideal controls are unavailable. You’ll also reinforce common pitfalls like confusing indicators with intelligence, treating architecture as a diagram instead of a risk model, and selecting controls that look strong but cannot be operated or evidenced. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fba2a27b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 10 — SOC Design and Planning: assess business goals and security requirements</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10 — SOC Design and Planning: assess business goals and security requirements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d5c4ac5b-c9ba-49b4-8dba-17beeacbda42</guid>
      <link>https://share.transistor.fm/s/37960a7e</link>
      <description>
        <![CDATA[<p>This episode introduces SOC design as a business-aligned operating model, which GSOM tests by asking whether your SOC choices match organizational risk, constraints, and expected outcomes. You’ll define the SOC’s mission in measurable terms—coverage, response expectations, and service boundaries—then translate business goals into security requirements like detection scope, investigation depth, and escalation authority. We’ll explore planning concepts such as stakeholder needs, critical asset identification, regulatory drivers, and how staffing and tooling choices should follow from use cases rather than vendor features. Scenarios include designing coverage for a small team with limited after-hours support, deciding what “24x7” truly means operationally, and troubleshooting common design failures like unclear handoffs, unrealistic SLAs, and missing ownership for response decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces SOC design as a business-aligned operating model, which GSOM tests by asking whether your SOC choices match organizational risk, constraints, and expected outcomes. You’ll define the SOC’s mission in measurable terms—coverage, response expectations, and service boundaries—then translate business goals into security requirements like detection scope, investigation depth, and escalation authority. We’ll explore planning concepts such as stakeholder needs, critical asset identification, regulatory drivers, and how staffing and tooling choices should follow from use cases rather than vendor features. Scenarios include designing coverage for a small team with limited after-hours support, deciding what “24x7” truly means operationally, and troubleshooting common design failures like unclear handoffs, unrealistic SLAs, and missing ownership for response decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:54:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/37960a7e/0683888f.mp3" length="31955571" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>798</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces SOC design as a business-aligned operating model, which GSOM tests by asking whether your SOC choices match organizational risk, constraints, and expected outcomes. You’ll define the SOC’s mission in measurable terms—coverage, response expectations, and service boundaries—then translate business goals into security requirements like detection scope, investigation depth, and escalation authority. We’ll explore planning concepts such as stakeholder needs, critical asset identification, regulatory drivers, and how staffing and tooling choices should follow from use cases rather than vendor features. Scenarios include designing coverage for a small team with limited after-hours support, deciding what “24x7” truly means operationally, and troubleshooting common design failures like unclear handoffs, unrealistic SLAs, and missing ownership for response decisions. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/37960a7e/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 11 — Turn operational requirements into SOC services, coverage models, and staffing</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11 — Turn operational requirements into SOC services, coverage models, and staffing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">798a1545-ecf8-49a5-b62d-2faa0f45501f</guid>
      <link>https://share.transistor.fm/s/768ab22b</link>
      <description>
        <![CDATA[<p>This episode explains how to translate real operational requirements into a SOC service catalog that the GSOM exam expects you to reason about, including what the SOC does, for whom, under what conditions, and with what measurable expectations. You will define core SOC services such as monitoring, triage, investigation, containment coordination, threat hunting, and reporting, then connect each service to a coverage model like business-hours support, follow-the-sun, on-call escalation, or full 24x7 operations. We will apply exam-style tradeoffs that test staffing realism, including how analyst levels, shift patterns, and surge capacity affect response quality and backlog growth, and how to document what cannot be covered without creating false confidence. Troubleshooting scenarios include a SOC that claims broad coverage but lacks telemetry, unclear escalation authority, or adequate handoffs, and you will learn how to correct the model without overpromising. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to translate real operational requirements into a SOC service catalog that the GSOM exam expects you to reason about, including what the SOC does, for whom, under what conditions, and with what measurable expectations. You will define core SOC services such as monitoring, triage, investigation, containment coordination, threat hunting, and reporting, then connect each service to a coverage model like business-hours support, follow-the-sun, on-call escalation, or full 24x7 operations. We will apply exam-style tradeoffs that test staffing realism, including how analyst levels, shift patterns, and surge capacity affect response quality and backlog growth, and how to document what cannot be covered without creating false confidence. Troubleshooting scenarios include a SOC that claims broad coverage but lacks telemetry, unclear escalation authority, or adequate handoffs, and you will learn how to correct the model without overpromising. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:54:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/768ab22b/a4c04d89.mp3" length="40275061" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1006</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to translate real operational requirements into a SOC service catalog that the GSOM exam expects you to reason about, including what the SOC does, for whom, under what conditions, and with what measurable expectations. You will define core SOC services such as monitoring, triage, investigation, containment coordination, threat hunting, and reporting, then connect each service to a coverage model like business-hours support, follow-the-sun, on-call escalation, or full 24x7 operations. We will apply exam-style tradeoffs that test staffing realism, including how analyst levels, shift patterns, and surge capacity affect response quality and backlog growth, and how to document what cannot be covered without creating false confidence. Troubleshooting scenarios include a SOC that claims broad coverage but lacks telemetry, unclear escalation authority, or adequate handoffs, and you will learn how to correct the model without overpromising. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/768ab22b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 12 — Identify relevant threats and potential attack paths unique to your environment</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12 — Identify relevant threats and potential attack paths unique to your environment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">851731ed-f334-47f1-9848-fe2a4c02abe5</guid>
      <link>https://share.transistor.fm/s/97ada8ed</link>
      <description>
        <![CDATA[<p>This episode teaches a practical approach to identifying the threats and attack paths that matter most to your organization, which is a recurring GSOM theme because detection and response plans must be tailored to actual exposure. You will define what makes a threat “relevant” by linking adversary capability and intent to your sector, technology stack, and business processes, then map likely attack paths from initial access through privilege escalation, lateral movement, and objective completion. We will use examples like credential theft in cloud identity, abuse of remote management tools, and data exfiltration via approved channels to show how attackers often ride normal workflows. Exam-focused best practices include prioritizing high-impact paths, documenting assumptions, and validating paths against what you can actually detect with your current logs and tools. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches a practical approach to identifying the threats and attack paths that matter most to your organization, which is a recurring GSOM theme because detection and response plans must be tailored to actual exposure. You will define what makes a threat “relevant” by linking adversary capability and intent to your sector, technology stack, and business processes, then map likely attack paths from initial access through privilege escalation, lateral movement, and objective completion. We will use examples like credential theft in cloud identity, abuse of remote management tools, and data exfiltration via approved channels to show how attackers often ride normal workflows. Exam-focused best practices include prioritizing high-impact paths, documenting assumptions, and validating paths against what you can actually detect with your current logs and tools. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:54:47 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/97ada8ed/86262818.mp3" length="31567928" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>789</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches a practical approach to identifying the threats and attack paths that matter most to your organization, which is a recurring GSOM theme because detection and response plans must be tailored to actual exposure. You will define what makes a threat “relevant” by linking adversary capability and intent to your sector, technology stack, and business processes, then map likely attack paths from initial access through privilege escalation, lateral movement, and objective completion. We will use examples like credential theft in cloud identity, abuse of remote management tools, and data exfiltration via approved channels to show how attackers often ride normal workflows. Exam-focused best practices include prioritizing high-impact paths, documenting assumptions, and validating paths against what you can actually detect with your current logs and tools. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/97ada8ed/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 13 — Build an organizational risk profile that drives SOC priorities and escalation</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13 — Build an organizational risk profile that drives SOC priorities and escalation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fad11eca-64ba-4c31-a593-8c238dbf0492</guid>
      <link>https://share.transistor.fm/s/33f9b6d9</link>
      <description>
        <![CDATA[<p>This episode focuses on building a risk profile that directly shapes SOC priorities, alert severity logic, and escalation thresholds, because GSOM questions often test whether you can align response intensity to business impact instead of treating every event the same. You will define risk in operational terms using likelihood, impact, and exposure, then connect those concepts to what the SOC monitors most closely, what gets automated, and what triggers immediate human investigation. We will walk through how crown-jewel assets, regulated data, critical services, and fragile dependencies should change your triage decisions and on-call rules, especially when evidence is incomplete. Troubleshooting considerations include over-broad “critical” labels that dilute focus, inconsistent severity definitions across teams, and escalation paths that bypass the right decision makers, all of which can produce delays or unnecessary outages during containment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on building a risk profile that directly shapes SOC priorities, alert severity logic, and escalation thresholds, because GSOM questions often test whether you can align response intensity to business impact instead of treating every event the same. You will define risk in operational terms using likelihood, impact, and exposure, then connect those concepts to what the SOC monitors most closely, what gets automated, and what triggers immediate human investigation. We will walk through how crown-jewel assets, regulated data, critical services, and fragile dependencies should change your triage decisions and on-call rules, especially when evidence is incomplete. Troubleshooting considerations include over-broad “critical” labels that dilute focus, inconsistent severity definitions across teams, and escalation paths that bypass the right decision makers, all of which can produce delays or unnecessary outages during containment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:55:08 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/33f9b6d9/b9ef2155.mp3" length="43451551" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1086</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on building a risk profile that directly shapes SOC priorities, alert severity logic, and escalation thresholds, because GSOM questions often test whether you can align response intensity to business impact instead of treating every event the same. You will define risk in operational terms using likelihood, impact, and exposure, then connect those concepts to what the SOC monitors most closely, what gets automated, and what triggers immediate human investigation. We will walk through how crown-jewel assets, regulated data, critical services, and fragile dependencies should change your triage decisions and on-call rules, especially when evidence is incomplete. Troubleshooting considerations include over-broad “critical” labels that dilute focus, inconsistent severity definitions across teams, and escalation paths that bypass the right decision makers, all of which can produce delays or unnecessary outages during containment. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/33f9b6d9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 14 — Design and staff an effective SOC program that actually runs well</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14 — Design and staff an effective SOC program that actually runs well</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d3c8322c-cfe5-4a3b-b7fa-6893f74e3e08</guid>
      <link>https://share.transistor.fm/s/dfd0d6c0</link>
      <description>
        <![CDATA[<p>This episode brings SOC design down to the realities that the GSOM exam emphasizes: sustainable operations, clear ownership, and repeatable outcomes under pressure. You will connect staffing models to workload drivers such as alert volume, investigative depth, and incident frequency, then define roles and responsibilities so triage, investigation, containment coordination, and reporting do not collide or leave gaps. We will explore how processes like queue management, handoffs, escalation, and documentation determine whether the SOC can scale without burnout, and how training and quality review prevent silent drift in analyst decisions. Real-world scenarios include a SOC drowning in low-value alerts, a “hero culture” where only one analyst can solve hard cases, and a mismatch between tool complexity and team skill, with exam-focused fixes that prioritize clarity, consistency, and measurable improvement. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode brings SOC design down to the realities that the GSOM exam emphasizes: sustainable operations, clear ownership, and repeatable outcomes under pressure. You will connect staffing models to workload drivers such as alert volume, investigative depth, and incident frequency, then define roles and responsibilities so triage, investigation, containment coordination, and reporting do not collide or leave gaps. We will explore how processes like queue management, handoffs, escalation, and documentation determine whether the SOC can scale without burnout, and how training and quality review prevent silent drift in analyst decisions. Real-world scenarios include a SOC drowning in low-value alerts, a “hero culture” where only one analyst can solve hard cases, and a mismatch between tool complexity and team skill, with exam-focused fixes that prioritize clarity, consistency, and measurable improvement. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:55:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dfd0d6c0/5af728aa.mp3" length="40614627" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1015</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode brings SOC design down to the realities that the GSOM exam emphasizes: sustainable operations, clear ownership, and repeatable outcomes under pressure. You will connect staffing models to workload drivers such as alert volume, investigative depth, and incident frequency, then define roles and responsibilities so triage, investigation, containment coordination, and reporting do not collide or leave gaps. We will explore how processes like queue management, handoffs, escalation, and documentation determine whether the SOC can scale without burnout, and how training and quality review prevent silent drift in analyst decisions. Real-world scenarios include a SOC drowning in low-value alerts, a “hero culture” where only one analyst can solve hard cases, and a mismatch between tool complexity and team skill, with exam-focused fixes that prioritize clarity, consistency, and measurable improvement. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dfd0d6c0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 15 — Spaced Review: replay business context, attack paths, risk, and planning decisions</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15 — Spaced Review: replay business context, attack paths, risk, and planning decisions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ebd0548a-137f-42c1-9744-cce7c715fd27</guid>
      <link>https://share.transistor.fm/s/6cb5b6bd</link>
      <description>
        <![CDATA[<p>This episode is a rapid consolidation of SOC planning concepts that appear throughout GSOM, designed to sharpen your ability to pick the best answer when multiple options sound reasonable. You will revisit how business goals become SOC services, how coverage models must match staffing and authority, and how attack paths guide what you detect, hunt, and harden first. We will reinforce risk profiling as the engine behind severity definitions and escalation, emphasizing that consistent decision criteria matter more than memorizing terms. Short scenario prompts will help you practice recognizing when the question is testing feasibility, impact containment, investigative defensibility, or governance alignment, and you will learn to eliminate choices that create operational debt, false coverage claims, or uncontrolled business disruption. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode is a rapid consolidation of SOC planning concepts that appear throughout GSOM, designed to sharpen your ability to pick the best answer when multiple options sound reasonable. You will revisit how business goals become SOC services, how coverage models must match staffing and authority, and how attack paths guide what you detect, hunt, and harden first. We will reinforce risk profiling as the engine behind severity definitions and escalation, emphasizing that consistent decision criteria matter more than memorizing terms. Short scenario prompts will help you practice recognizing when the question is testing feasibility, impact containment, investigative defensibility, or governance alignment, and you will learn to eliminate choices that create operational debt, false coverage claims, or uncontrolled business disruption. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:55:55 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6cb5b6bd/844f4f2d.mp3" length="34489469" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>862</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode is a rapid consolidation of SOC planning concepts that appear throughout GSOM, designed to sharpen your ability to pick the best answer when multiple options sound reasonable. You will revisit how business goals become SOC services, how coverage models must match staffing and authority, and how attack paths guide what you detect, hunt, and harden first. We will reinforce risk profiling as the engine behind severity definitions and escalation, emphasizing that consistent decision criteria matter more than memorizing terms. Short scenario prompts will help you practice recognizing when the question is testing feasibility, impact containment, investigative defensibility, or governance alignment, and you will learn to eliminate choices that create operational debt, false coverage claims, or uncontrolled business disruption. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6cb5b6bd/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 16 — Exam Acronyms: High-Yield Audio Reference for the GIAC GSOM</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16 — Exam Acronyms: High-Yield Audio Reference for the GIAC GSOM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5ea5d434-0391-4e10-8659-fa263571bcbb</guid>
      <link>https://share.transistor.fm/s/03e978e2</link>
      <description>
        <![CDATA[<p>This episode provides a high-yield acronym reference in context, because GSOM questions often hinge on whether you understand what a term implies operationally rather than whether you can expand the letters. You will connect common SOC acronyms to their job-task meaning, such as how SIEM relates to centralized log analytics and correlation, how EDR changes endpoint visibility and response options, and how SOAR impacts consistency, speed, and auditability of actions. We will also clarify management and process acronyms that influence decision making, including how SLAs, KPIs, and MTTR can be misused if they drive the wrong behavior. The exam-focused goal is to recognize what an acronym enables, what it requires to work well, and what risks it introduces, such as over-automation without safeguards or metrics that incentivize shallow triage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode provides a high-yield acronym reference in context, because GSOM questions often hinge on whether you understand what a term implies operationally rather than whether you can expand the letters. You will connect common SOC acronyms to their job-task meaning, such as how SIEM relates to centralized log analytics and correlation, how EDR changes endpoint visibility and response options, and how SOAR impacts consistency, speed, and auditability of actions. We will also clarify management and process acronyms that influence decision making, including how SLAs, KPIs, and MTTR can be misused if they drive the wrong behavior. The exam-focused goal is to recognize what an acronym enables, what it requires to work well, and what risks it introduces, such as over-automation without safeguards or metrics that incentivize shallow triage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:56:18 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/03e978e2/a1f80f02.mp3" length="47010435" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1175</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode provides a high-yield acronym reference in context, because GSOM questions often hinge on whether you understand what a term implies operationally rather than whether you can expand the letters. You will connect common SOC acronyms to their job-task meaning, such as how SIEM relates to centralized log analytics and correlation, how EDR changes endpoint visibility and response options, and how SOAR impacts consistency, speed, and auditability of actions. We will also clarify management and process acronyms that influence decision making, including how SLAs, KPIs, and MTTR can be misused if they drive the wrong behavior. The exam-focused goal is to recognize what an acronym enables, what it requires to work well, and what risks it introduces, such as over-automation without safeguards or metrics that incentivize shallow triage. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/03e978e2/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 17 — SOC Tools and Technology: know what common platforms do and why</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17 — SOC Tools and Technology: know what common platforms do and why</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c31ec44f-a297-4a60-a510-277528b7749c</guid>
      <link>https://share.transistor.fm/s/795fa60f</link>
      <description>
        <![CDATA[<p>This episode builds a practical map of common SOC platforms and what problems they solve, because the GSOM exam expects you to select tools based on operational outcomes, not brand names. You will define the roles of log management and SIEM, endpoint telemetry and EDR, network visibility, ticketing and case management, and orchestration layers that coordinate workflows. We will explain why each platform matters by tying it to SOC tasks like triage speed, investigative depth, containment options, evidence retention, and reporting, then discuss the operational costs that come with each choice, such as onboarding effort, tuning workload, and skills needed to use the data responsibly. Troubleshooting scenarios include tool overlap that creates conflicting “sources of truth,” alert floods from poor rules, and gaps where the SOC cannot confirm scope due to missing telemetry. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode builds a practical map of common SOC platforms and what problems they solve, because the GSOM exam expects you to select tools based on operational outcomes, not brand names. You will define the roles of log management and SIEM, endpoint telemetry and EDR, network visibility, ticketing and case management, and orchestration layers that coordinate workflows. We will explain why each platform matters by tying it to SOC tasks like triage speed, investigative depth, containment options, evidence retention, and reporting, then discuss the operational costs that come with each choice, such as onboarding effort, tuning workload, and skills needed to use the data responsibly. Troubleshooting scenarios include tool overlap that creates conflicting “sources of truth,” alert floods from poor rules, and gaps where the SOC cannot confirm scope due to missing telemetry. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:56:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/795fa60f/672df5ac.mp3" length="49148304" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1228</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode builds a practical map of common SOC platforms and what problems they solve, because the GSOM exam expects you to select tools based on operational outcomes, not brand names. You will define the roles of log management and SIEM, endpoint telemetry and EDR, network visibility, ticketing and case management, and orchestration layers that coordinate workflows. We will explain why each platform matters by tying it to SOC tasks like triage speed, investigative depth, containment options, evidence retention, and reporting, then discuss the operational costs that come with each choice, such as onboarding effort, tuning workload, and skills needed to use the data responsibly. Troubleshooting scenarios include tool overlap that creates conflicting “sources of truth,” alert floods from poor rules, and gaps where the SOC cannot confirm scope due to missing telemetry. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/795fa60f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 18 — Choose SIEM, EDR, SOAR, and case tooling that supports operations</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18 — Choose SIEM, EDR, SOAR, and case tooling that supports operations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b59e8f1e-e51c-4351-be84-0e73dfc33184</guid>
      <link>https://share.transistor.fm/s/b534c86c</link>
      <description>
        <![CDATA[<p>This episode teaches selection logic for core SOC tooling categories, a frequent GSOM topic because the exam tests whether your choices support detection quality, response safety, and manageable operations. You will compare how SIEM and EDR complement each other, where SOAR adds value through consistent automation and integrated approvals, and why case management is not optional if you need defensible documentation and repeatable handoffs. We will walk through exam-relevant criteria such as data coverage, query capability, retention needs, integration maturity, access controls, and the human workload of tuning and maintenance. Real-world examples include selecting EDR when endpoint isolation is a must, prioritizing case workflows when investigations are inconsistent, and avoiding SOAR “automation theater” when prerequisites like clean data and stable playbooks are missing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches selection logic for core SOC tooling categories, a frequent GSOM topic because the exam tests whether your choices support detection quality, response safety, and manageable operations. You will compare how SIEM and EDR complement each other, where SOAR adds value through consistent automation and integrated approvals, and why case management is not optional if you need defensible documentation and repeatable handoffs. We will walk through exam-relevant criteria such as data coverage, query capability, retention needs, integration maturity, access controls, and the human workload of tuning and maintenance. Real-world examples include selecting EDR when endpoint isolation is a must, prioritizing case workflows when investigations are inconsistent, and avoiding SOAR “automation theater” when prerequisites like clean data and stable playbooks are missing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:56:53 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b534c86c/8b4727dc.mp3" length="47899655" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1197</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches selection logic for core SOC tooling categories, a frequent GSOM topic because the exam tests whether your choices support detection quality, response safety, and manageable operations. You will compare how SIEM and EDR complement each other, where SOAR adds value through consistent automation and integrated approvals, and why case management is not optional if you need defensible documentation and repeatable handoffs. We will walk through exam-relevant criteria such as data coverage, query capability, retention needs, integration maturity, access controls, and the human workload of tuning and maintenance. Real-world examples include selecting EDR when endpoint isolation is a must, prioritizing case workflows when investigations are inconsistent, and avoiding SOAR “automation theater” when prerequisites like clean data and stable playbooks are missing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b534c86c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 19 — Integrate SOC tools safely so data flows without breaking trust</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19 — Integrate SOC tools safely so data flows without breaking trust</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b450f546-5346-4aba-b66b-e6cde12e49cd</guid>
      <link>https://share.transistor.fm/s/d0ab6142</link>
      <description>
        <![CDATA[<p>This episode explains SOC integration as a security and reliability engineering problem, because GSOM questions often probe whether you can connect systems without creating new attack paths, data integrity issues, or operational fragility. You will define what “safe integration” means in practice: well-scoped APIs, least-privilege service accounts, secure secrets handling, clear data ownership, and monitoring for pipeline failures. We will discuss how normalization, time synchronization, and enrichment affect correlation quality, and why incomplete mappings can lead to false positives, missed detections, or flawed incident timelines. Troubleshooting scenarios include duplicate events, broken parsers after vendor updates, gaps caused by network segmentation, and ingestion failures that silently reduce coverage, along with best practices for health checks, version control, and rollback plans to keep monitoring trustworthy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains SOC integration as a security and reliability engineering problem, because GSOM questions often probe whether you can connect systems without creating new attack paths, data integrity issues, or operational fragility. You will define what “safe integration” means in practice: well-scoped APIs, least-privilege service accounts, secure secrets handling, clear data ownership, and monitoring for pipeline failures. We will discuss how normalization, time synchronization, and enrichment affect correlation quality, and why incomplete mappings can lead to false positives, missed detections, or flawed incident timelines. Troubleshooting scenarios include duplicate events, broken parsers after vendor updates, gaps caused by network segmentation, and ingestion failures that silently reduce coverage, along with best practices for health checks, version control, and rollback plans to keep monitoring trustworthy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:57:07 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d0ab6142/9ad779bc.mp3" length="44638525" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1115</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains SOC integration as a security and reliability engineering problem, because GSOM questions often probe whether you can connect systems without creating new attack paths, data integrity issues, or operational fragility. You will define what “safe integration” means in practice: well-scoped APIs, least-privilege service accounts, secure secrets handling, clear data ownership, and monitoring for pipeline failures. We will discuss how normalization, time synchronization, and enrichment affect correlation quality, and why incomplete mappings can lead to false positives, missed detections, or flawed incident timelines. Troubleshooting scenarios include duplicate events, broken parsers after vendor updates, gaps caused by network segmentation, and ingestion failures that silently reduce coverage, along with best practices for health checks, version control, and rollback plans to keep monitoring trustworthy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d0ab6142/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 20 — Secure SOC technology with least privilege, hardening, monitoring, and logging</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20 — Secure SOC technology with least privilege, hardening, monitoring, and logging</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cf366c29-3ea1-4695-9037-9f48b4b1d2b8</guid>
      <link>https://share.transistor.fm/s/5bdec78f</link>
      <description>
        <![CDATA[<p>This episode treats SOC tooling as high-value infrastructure that must be protected like production systems, because GSOM expects you to recognize that attackers target the SOC to blind detection and manipulate evidence. You will define least privilege for analysts, engineers, and service accounts, then connect it to hardening practices such as secure baseline configurations, patch discipline, and separation of duties for rule changes and automation actions. We will explain how monitoring and logging of SOC platforms supports auditability and incident response, including tracking administrative actions, data pipeline changes, and suspicious access patterns that could indicate tampering. Real-world scenarios include compromised automation credentials, a malicious rule change that suppresses alerts, and an exposed management interface, with exam-focused guidance on containment steps that preserve evidence and restore trustworthy monitoring quickly. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode treats SOC tooling as high-value infrastructure that must be protected like production systems, because GSOM expects you to recognize that attackers target the SOC to blind detection and manipulate evidence. You will define least privilege for analysts, engineers, and service accounts, then connect it to hardening practices such as secure baseline configurations, patch discipline, and separation of duties for rule changes and automation actions. We will explain how monitoring and logging of SOC platforms supports auditability and incident response, including tracking administrative actions, data pipeline changes, and suspicious access patterns that could indicate tampering. Real-world scenarios include compromised automation credentials, a malicious rule change that suppresses alerts, and an exposed management interface, with exam-focused guidance on containment steps that preserve evidence and restore trustworthy monitoring quickly. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:57:24 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5bdec78f/7856cc33.mp3" length="43856971" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1096</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode treats SOC tooling as high-value infrastructure that must be protected like production systems, because GSOM expects you to recognize that attackers target the SOC to blind detection and manipulate evidence. You will define least privilege for analysts, engineers, and service accounts, then connect it to hardening practices such as secure baseline configurations, patch discipline, and separation of duties for rule changes and automation actions. We will explain how monitoring and logging of SOC platforms supports auditability and incident response, including tracking administrative actions, data pipeline changes, and suspicious access patterns that could indicate tampering. Real-world scenarios include compromised automation credentials, a malicious rule change that suppresses alerts, and an exposed management interface, with exam-focused guidance on containment steps that preserve evidence and restore trustworthy monitoring quickly. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5bdec78f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 21 — Spaced Review: cement SOC tooling choices, integrations, and secure implementation habits</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21 — Spaced Review: cement SOC tooling choices, integrations, and secure implementation habits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1abf40ca-8e6b-46a4-9b49-e78926cb7cf0</guid>
      <link>https://share.transistor.fm/s/c1869b9a</link>
      <description>
        <![CDATA[<p>This episode reinforces how GSOM expects you to think about SOC technology decisions as operational systems that must stay reliable, secure, and supportable over time, not as a one-time procurement checklist. You will quickly revisit what SIEM, EDR, SOAR, and case tooling each contribute, then focus on integration fundamentals that make the data trustworthy, including normalization, time alignment, enrichment, and clear ownership of pipelines and parsers. We will connect these themes to exam-style decision points such as choosing the most defensible next step when alerts spike after a parser change, or when an integration introduces excessive privileges that create a new compromise path. You will also practice secure implementation habits like least privilege for service accounts, change control for detection rules and automations, monitoring the monitoring stack, and building rollback and health-check routines so the SOC can prove coverage rather than assume it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode reinforces how GSOM expects you to think about SOC technology decisions as operational systems that must stay reliable, secure, and supportable over time, not as a one-time procurement checklist. You will quickly revisit what SIEM, EDR, SOAR, and case tooling each contribute, then focus on integration fundamentals that make the data trustworthy, including normalization, time alignment, enrichment, and clear ownership of pipelines and parsers. We will connect these themes to exam-style decision points such as choosing the most defensible next step when alerts spike after a parser change, or when an integration introduces excessive privileges that create a new compromise path. You will also practice secure implementation habits like least privilege for service accounts, change control for detection rules and automations, monitoring the monitoring stack, and building rollback and health-check routines so the SOC can prove coverage rather than assume it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:57:40 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c1869b9a/0d196f25.mp3" length="36353581" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>908</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode reinforces how GSOM expects you to think about SOC technology decisions as operational systems that must stay reliable, secure, and supportable over time, not as a one-time procurement checklist. You will quickly revisit what SIEM, EDR, SOAR, and case tooling each contribute, then focus on integration fundamentals that make the data trustworthy, including normalization, time alignment, enrichment, and clear ownership of pipelines and parsers. We will connect these themes to exam-style decision points such as choosing the most defensible next step when alerts spike after a parser change, or when an integration introduces excessive privileges that create a new compromise path. You will also practice secure implementation habits like least privilege for service accounts, change control for detection rules and automations, monitoring the monitoring stack, and building rollback and health-check routines so the SOC can prove coverage rather than assume it. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c1869b9a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 22 — Data Source Assessment and Collection: decide what to collect and prioritize</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22 — Data Source Assessment and Collection: decide what to collect and prioritize</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86e99a57-57e9-45e3-8db6-5717d2578fb1</guid>
      <link>https://share.transistor.fm/s/25d39b4b</link>
      <description>
        <![CDATA[<p>This episode teaches how to assess and prioritize data sources so your SOC collects the minimum set that enables strong detection and investigation outcomes, which is a core GSOM competency because many exam questions assume you must make tradeoffs under cost, bandwidth, and staffing constraints. You will define what “high-value telemetry” means by linking events to questions the SOC must answer during triage, such as who did what, from where, with what privilege, and what changed as a result. We will examine common collection categories, including identity, endpoint, network, cloud control-plane, and application logs, and explain how each category supports different detection and response tasks. Troubleshooting scenarios include over-collection that creates noise and storage pain, under-collection that makes incident scope unprovable, and gaps created by inconsistent log retention or time skew, with best practices for prioritizing coverage based on business risk and attacker behavior. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to assess and prioritize data sources so your SOC collects the minimum set that enables strong detection and investigation outcomes, which is a core GSOM competency because many exam questions assume you must make tradeoffs under cost, bandwidth, and staffing constraints. You will define what “high-value telemetry” means by linking events to questions the SOC must answer during triage, such as who did what, from where, with what privilege, and what changed as a result. We will examine common collection categories, including identity, endpoint, network, cloud control-plane, and application logs, and explain how each category supports different detection and response tasks. Troubleshooting scenarios include over-collection that creates noise and storage pain, under-collection that makes incident scope unprovable, and gaps created by inconsistent log retention or time skew, with best practices for prioritizing coverage based on business risk and attacker behavior. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:57:52 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/25d39b4b/1fe91f5f.mp3" length="32853147" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>821</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to assess and prioritize data sources so your SOC collects the minimum set that enables strong detection and investigation outcomes, which is a core GSOM competency because many exam questions assume you must make tradeoffs under cost, bandwidth, and staffing constraints. You will define what “high-value telemetry” means by linking events to questions the SOC must answer during triage, such as who did what, from where, with what privilege, and what changed as a result. We will examine common collection categories, including identity, endpoint, network, cloud control-plane, and application logs, and explain how each category supports different detection and response tasks. Troubleshooting scenarios include over-collection that creates noise and storage pain, under-collection that makes incident scope unprovable, and gaps created by inconsistent log retention or time skew, with best practices for prioritizing coverage based on business risk and attacker behavior. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/25d39b4b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 23 — Use business operations knowledge to select telemetry that matters most</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23 — Use business operations knowledge to select telemetry that matters most</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8ce16aeb-c886-4a37-b043-c4cf614ab211</guid>
      <link>https://share.transistor.fm/s/ecab0262</link>
      <description>
        <![CDATA[<p>This episode shows how to use business operations context to choose telemetry that actually helps, because GSOM rewards decisions that align monitoring with how the organization runs rather than how a tool vendor describes the world. You will learn to start with business-critical services, key workflows, and peak operational periods, then map them to the assets, identities, and data flows that would create the most damage if abused. We will connect this approach to exam relevance by demonstrating how operational knowledge changes severity and escalation, such as why authentication anomalies for privileged finance users may outrank generic malware hits on a lab workstation. You will also work through scenarios where an organization has multiple environments and uneven logging, and you must decide what to instrument first to enable incident confirmation, containment validation, and recovery decisions without interrupting core business processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode shows how to use business operations context to choose telemetry that actually helps, because GSOM rewards decisions that align monitoring with how the organization runs rather than how a tool vendor describes the world. You will learn to start with business-critical services, key workflows, and peak operational periods, then map them to the assets, identities, and data flows that would create the most damage if abused. We will connect this approach to exam relevance by demonstrating how operational knowledge changes severity and escalation, such as why authentication anomalies for privileged finance users may outrank generic malware hits on a lab workstation. You will also work through scenarios where an organization has multiple environments and uneven logging, and you must decide what to instrument first to enable incident confirmation, containment validation, and recovery decisions without interrupting core business processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:58:08 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ecab0262/3f5b8960.mp3" length="40399390" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1009</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode shows how to use business operations context to choose telemetry that actually helps, because GSOM rewards decisions that align monitoring with how the organization runs rather than how a tool vendor describes the world. You will learn to start with business-critical services, key workflows, and peak operational periods, then map them to the assets, identities, and data flows that would create the most damage if abused. We will connect this approach to exam relevance by demonstrating how operational knowledge changes severity and escalation, such as why authentication anomalies for privileged finance users may outrank generic malware hits on a lab workstation. You will also work through scenarios where an organization has multiple environments and uneven logging, and you must decide what to instrument first to enable incident confirmation, containment validation, and recovery decisions without interrupting core business processes. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ecab0262/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 24 — Turn organizational use cases into specific data source requirements fast</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24 — Turn organizational use cases into specific data source requirements fast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">935b44fb-e270-4e50-9b91-a5b325c4fc1e</guid>
      <link>https://share.transistor.fm/s/8eb62263</link>
      <description>
        <![CDATA[<p>This episode explains how to translate security use cases into concrete data requirements, which is a high-yield GSOM skill because the exam often tests whether you can identify what evidence is needed to detect a behavior and investigate it quickly. You will define a use case as a statement of what you want to catch, why it matters, and what observable signals prove it, then convert that into specific log sources, event types, and fields that must be present and searchable. We will walk through examples such as suspicious privileged logins, lateral movement patterns, and data exfiltration concerns, showing how each one demands identity events, endpoint process data, network connections, and sometimes cloud audit logs to confirm scope and intent. Troubleshooting considerations include vague use cases that cannot be measured, missing fields that break correlation, and “data exists but is unusable” problems caused by inconsistent formats or no retention, along with best practices for writing requirements that engineers can implement and analysts can validate. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to translate security use cases into concrete data requirements, which is a high-yield GSOM skill because the exam often tests whether you can identify what evidence is needed to detect a behavior and investigate it quickly. You will define a use case as a statement of what you want to catch, why it matters, and what observable signals prove it, then convert that into specific log sources, event types, and fields that must be present and searchable. We will walk through examples such as suspicious privileged logins, lateral movement patterns, and data exfiltration concerns, showing how each one demands identity events, endpoint process data, network connections, and sometimes cloud audit logs to confirm scope and intent. Troubleshooting considerations include vague use cases that cannot be measured, missing fields that break correlation, and “data exists but is unusable” problems caused by inconsistent formats or no retention, along with best practices for writing requirements that engineers can implement and analysts can validate. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:58:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8eb62263/e2117308.mp3" length="37445467" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>936</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to translate security use cases into concrete data requirements, which is a high-yield GSOM skill because the exam often tests whether you can identify what evidence is needed to detect a behavior and investigate it quickly. You will define a use case as a statement of what you want to catch, why it matters, and what observable signals prove it, then convert that into specific log sources, event types, and fields that must be present and searchable. We will walk through examples such as suspicious privileged logins, lateral movement patterns, and data exfiltration concerns, showing how each one demands identity events, endpoint process data, network connections, and sometimes cloud audit logs to confirm scope and intent. Troubleshooting considerations include vague use cases that cannot be measured, missing fields that break correlation, and “data exists but is unusable” problems caused by inconsistent formats or no retention, along with best practices for writing requirements that engineers can implement and analysts can validate. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8eb62263/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 25 — Leverage industry frameworks to prioritize collection, enrichment, and coverage gaps</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25 — Leverage industry frameworks to prioritize collection, enrichment, and coverage gaps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4aaebb51-9d9b-4107-ad47-e2f0c83cade1</guid>
      <link>https://share.transistor.fm/s/eb66e891</link>
      <description>
        <![CDATA[<p>This episode teaches how to use industry frameworks as a prioritization accelerator rather than a compliance checkbox, because GSOM expects you to justify collection choices using defensible models when time and resources are limited. You will discuss how frameworks help you categorize attacker behaviors, map them to control and detection needs, and identify where your telemetry cannot support the investigations your SOC claims it can perform. We will connect the concept to exam questions by focusing on “what to fix first” decisions, such as whether to close a critical identity logging gap, improve endpoint visibility, or strengthen network flow collection to validate lateral movement. You will also cover enrichment as a force multiplier, including asset identity, user role, business unit, and criticality tags, and how those context elements reduce triage time and improve escalation accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to use industry frameworks as a prioritization accelerator rather than a compliance checkbox, because GSOM expects you to justify collection choices using defensible models when time and resources are limited. You will discuss how frameworks help you categorize attacker behaviors, map them to control and detection needs, and identify where your telemetry cannot support the investigations your SOC claims it can perform. We will connect the concept to exam questions by focusing on “what to fix first” decisions, such as whether to close a critical identity logging gap, improve endpoint visibility, or strengthen network flow collection to validate lateral movement. You will also cover enrichment as a force multiplier, including asset identity, user role, business unit, and criticality tags, and how those context elements reduce triage time and improve escalation accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:58:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/eb66e891/16def3e7.mp3" length="36668085" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>916</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to use industry frameworks as a prioritization accelerator rather than a compliance checkbox, because GSOM expects you to justify collection choices using defensible models when time and resources are limited. You will discuss how frameworks help you categorize attacker behaviors, map them to control and detection needs, and identify where your telemetry cannot support the investigations your SOC claims it can perform. We will connect the concept to exam questions by focusing on “what to fix first” decisions, such as whether to close a critical identity logging gap, improve endpoint visibility, or strengthen network flow collection to validate lateral movement. You will also cover enrichment as a force multiplier, including asset identity, user role, business unit, and criticality tags, and how those context elements reduce triage time and improve escalation accuracy. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/eb66e891/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 26 — Orchestrate secure and efficient data collection pipelines across diverse systems</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26 — Orchestrate secure and efficient data collection pipelines across diverse systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">94ece762-3afc-4b44-bcab-f560f2009624</guid>
      <link>https://share.transistor.fm/s/c8268315</link>
      <description>
        <![CDATA[<p>This episode explains how to design data collection pipelines that are both reliable and secure, a frequent GSOM theme because weak pipelines create blind spots, integrity risks, and operational chaos when incidents happen. You will define the pipeline components, including collection agents or API pulls, transport, buffering, parsing, normalization, routing, storage, and indexing, then connect each stage to failure modes that show up as missing events, duplicates, or corrupted timestamps. We will examine the security side of collection, including hardened collectors, least-privilege access, secure credential storage, and segmentation that prevents the logging infrastructure from becoming a pivot point into production networks. Troubleshooting scenarios include bursts that overwhelm forwarders, schema changes that break parsers, and noisy sources that dominate storage, along with best practices for health monitoring, backpressure handling, and controlled change management to keep coverage stable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to design data collection pipelines that are both reliable and secure, a frequent GSOM theme because weak pipelines create blind spots, integrity risks, and operational chaos when incidents happen. You will define the pipeline components, including collection agents or API pulls, transport, buffering, parsing, normalization, routing, storage, and indexing, then connect each stage to failure modes that show up as missing events, duplicates, or corrupted timestamps. We will examine the security side of collection, including hardened collectors, least-privilege access, secure credential storage, and segmentation that prevents the logging infrastructure from becoming a pivot point into production networks. Troubleshooting scenarios include bursts that overwhelm forwarders, schema changes that break parsers, and noisy sources that dominate storage, along with best practices for health monitoring, backpressure handling, and controlled change management to keep coverage stable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:58:56 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c8268315/1878522c.mp3" length="37429810" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>935</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to design data collection pipelines that are both reliable and secure, a frequent GSOM theme because weak pipelines create blind spots, integrity risks, and operational chaos when incidents happen. You will define the pipeline components, including collection agents or API pulls, transport, buffering, parsing, normalization, routing, storage, and indexing, then connect each stage to failure modes that show up as missing events, duplicates, or corrupted timestamps. We will examine the security side of collection, including hardened collectors, least-privilege access, secure credential storage, and segmentation that prevents the logging infrastructure from becoming a pivot point into production networks. Troubleshooting scenarios include bursts that overwhelm forwarders, schema changes that break parsers, and noisy sources that dominate storage, along with best practices for health monitoring, backpressure handling, and controlled change management to keep coverage stable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c8268315/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 27 — Enrich collected data with context so monitoring becomes decisively faster</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27 — Enrich collected data with context so monitoring becomes decisively faster</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">19543852-53c2-4904-b2f8-18c9117e47db</guid>
      <link>https://share.transistor.fm/s/0f4c0f90</link>
      <description>
        <![CDATA[<p>This episode focuses on enrichment as the difference between “an event happened” and “an analyst can act,” which GSOM tests because strong triage depends on context that reduces uncertainty and speeds defensible decisions. You will define enrichment as attaching business and technical context to raw telemetry, such as asset ownership, criticality, environment, user role, geolocation, known-good service accounts, and vulnerability or exposure signals that change risk. We will apply the concept to exam-style scenarios where two alerts look identical but should be handled differently, such as the same login pattern on a domain admin account versus a low-privilege test user, or the same process execution on a crown-jewel server versus an isolated kiosk. You will also learn troubleshooting considerations, including stale asset inventories, inconsistent naming, and enrichment sources that become single points of failure, with best practices for validation, versioning, and graceful degradation when context is missing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on enrichment as the difference between “an event happened” and “an analyst can act,” which GSOM tests because strong triage depends on context that reduces uncertainty and speeds defensible decisions. You will define enrichment as attaching business and technical context to raw telemetry, such as asset ownership, criticality, environment, user role, geolocation, known-good service accounts, and vulnerability or exposure signals that change risk. We will apply the concept to exam-style scenarios where two alerts look identical but should be handled differently, such as the same login pattern on a domain admin account versus a low-privilege test user, or the same process execution on a crown-jewel server versus an isolated kiosk. You will also learn troubleshooting considerations, including stale asset inventories, inconsistent naming, and enrichment sources that become single points of failure, with best practices for validation, versioning, and graceful degradation when context is missing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:59:13 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0f4c0f90/ff6f9921.mp3" length="38244816" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>956</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on enrichment as the difference between “an event happened” and “an analyst can act,” which GSOM tests because strong triage depends on context that reduces uncertainty and speeds defensible decisions. You will define enrichment as attaching business and technical context to raw telemetry, such as asset ownership, criticality, environment, user role, geolocation, known-good service accounts, and vulnerability or exposure signals that change risk. We will apply the concept to exam-style scenarios where two alerts look identical but should be handled differently, such as the same login pattern on a domain admin account versus a low-privilege test user, or the same process execution on a crown-jewel server versus an isolated kiosk. You will also learn troubleshooting considerations, including stale asset inventories, inconsistent naming, and enrichment sources that become single points of failure, with best practices for validation, versioning, and graceful degradation when context is missing. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0f4c0f90/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 28 — Spaced Review: prioritize, collect, and enrich data sources without blind spots</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28 — Spaced Review: prioritize, collect, and enrich data sources without blind spots</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1d923ee8-0f1f-43d2-bff6-7ed7fc129504</guid>
      <link>https://share.transistor.fm/s/6251bbd7</link>
      <description>
        <![CDATA[<p>This episode consolidates the data-source decision chain that GSOM expects you to apply quickly: start from mission and risk, define use cases, identify required evidence, then implement collection and enrichment that makes the evidence usable at speed. You will revisit what makes telemetry high value, why operations context changes priority, and how frameworks help you spot coverage gaps that matter for real investigations rather than theoretical completeness. We will reinforce pipeline reliability and integrity as exam-relevant themes, including time sync, retention consistency, parser stability, and monitoring of ingestion health so you can trust what the SOC sees during an incident. Short scenario cues will help you practice choosing the best next step when data is missing, context is stale, or a new environment is being onboarded, emphasizing defensible tradeoffs that preserve investigative capability while keeping collection sustainable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode consolidates the data-source decision chain that GSOM expects you to apply quickly: start from mission and risk, define use cases, identify required evidence, then implement collection and enrichment that makes the evidence usable at speed. You will revisit what makes telemetry high value, why operations context changes priority, and how frameworks help you spot coverage gaps that matter for real investigations rather than theoretical completeness. We will reinforce pipeline reliability and integrity as exam-relevant themes, including time sync, retention consistency, parser stability, and monitoring of ingestion health so you can trust what the SOC sees during an incident. Short scenario cues will help you practice choosing the best next step when data is missing, context is stale, or a new environment is being onboarded, emphasizing defensible tradeoffs that preserve investigative capability while keeping collection sustainable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:59:26 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6251bbd7/f9ab2a37.mp3" length="34906377" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>872</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode consolidates the data-source decision chain that GSOM expects you to apply quickly: start from mission and risk, define use cases, identify required evidence, then implement collection and enrichment that makes the evidence usable at speed. You will revisit what makes telemetry high value, why operations context changes priority, and how frameworks help you spot coverage gaps that matter for real investigations rather than theoretical completeness. We will reinforce pipeline reliability and integrity as exam-relevant themes, including time sync, retention consistency, parser stability, and monitoring of ingestion health so you can trust what the SOC sees during an incident. Short scenario cues will help you practice choosing the best next step when data is missing, context is stale, or a new environment is being onboarded, emphasizing defensible tradeoffs that preserve investigative capability while keeping collection sustainable. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6251bbd7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 29 — Managing Alert Creation and Processing: build alerts people can act on</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29 — Managing Alert Creation and Processing: build alerts people can act on</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c682e4da-af1f-433a-a0bb-73607aa995e4</guid>
      <link>https://share.transistor.fm/s/bd534817</link>
      <description>
        <![CDATA[<p>This episode introduces alert management as an operational discipline that GSOM frequently tests, because alerting is where detection theory meets real workload, and poor alert design creates burnout, missed incidents, and false confidence. You will define an actionable alert as one that has a clear detection logic, a meaningful signal-to-noise ratio, enough context to start triage, and a predictable response path that includes ownership and escalation criteria. We will discuss how to design alerts around observable attacker behaviors rather than vague anomalies, and how severity, confidence, and business impact should be assigned consistently so queues stay manageable. Troubleshooting scenarios include alert storms after a rule change, alerts that cannot be investigated due to missing fields, and duplicative detections that waste analyst time, with best practices for tuning loops, suppression logic, and validation against known-good baselines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces alert management as an operational discipline that GSOM frequently tests, because alerting is where detection theory meets real workload, and poor alert design creates burnout, missed incidents, and false confidence. You will define an actionable alert as one that has a clear detection logic, a meaningful signal-to-noise ratio, enough context to start triage, and a predictable response path that includes ownership and escalation criteria. We will discuss how to design alerts around observable attacker behaviors rather than vague anomalies, and how severity, confidence, and business impact should be assigned consistently so queues stay manageable. Troubleshooting scenarios include alert storms after a rule change, alerts that cannot be investigated due to missing fields, and duplicative detections that waste analyst time, with best practices for tuning loops, suppression logic, and validation against known-good baselines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:59:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bd534817/3a257b07.mp3" length="36662833" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>916</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces alert management as an operational discipline that GSOM frequently tests, because alerting is where detection theory meets real workload, and poor alert design creates burnout, missed incidents, and false confidence. You will define an actionable alert as one that has a clear detection logic, a meaningful signal-to-noise ratio, enough context to start triage, and a predictable response path that includes ownership and escalation criteria. We will discuss how to design alerts around observable attacker behaviors rather than vague anomalies, and how severity, confidence, and business impact should be assigned consistently so queues stay manageable. Troubleshooting scenarios include alert storms after a rule change, alerts that cannot be investigated due to missing fields, and duplicative detections that waste analyst time, with best practices for tuning loops, suppression logic, and validation against known-good baselines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bd534817/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 30 — Create actionable alerts from use cases and observable attacker behaviors</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30 — Create actionable alerts from use cases and observable attacker behaviors</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">78063315-c6d5-48cc-bbbb-484aad8bc37f</guid>
      <link>https://share.transistor.fm/s/bc93b2fb</link>
      <description>
        <![CDATA[<p>This episode teaches the workflow for turning a detection use case into an alert that reliably drives the right action, which is a high-value GSOM skill because the exam often asks what to alert on, what to include, and what to do when ambiguity remains. You will learn to start with a behavior statement, identify the minimum evidence that proves it, and then build logic that balances precision and coverage, such as combining identity events with endpoint process signals or network connections to reduce false positives. We will cover alert content best practices, including what fields an analyst needs to triage quickly, what links or pivots should be available, and how to express the suspected technique in clear operational language that supports escalation and documentation. Real-world scenarios include detecting suspicious authentication patterns, persistence behaviors, and unusual administrative activity, plus troubleshooting considerations like noisy normal behavior, missing telemetry, and how to stage a new alert in monitor-only mode before enforcing automated response. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches the workflow for turning a detection use case into an alert that reliably drives the right action, which is a high-value GSOM skill because the exam often asks what to alert on, what to include, and what to do when ambiguity remains. You will learn to start with a behavior statement, identify the minimum evidence that proves it, and then build logic that balances precision and coverage, such as combining identity events with endpoint process signals or network connections to reduce false positives. We will cover alert content best practices, including what fields an analyst needs to triage quickly, what links or pivots should be available, and how to express the suspected technique in clear operational language that supports escalation and documentation. Real-world scenarios include detecting suspicious authentication patterns, persistence behaviors, and unusual administrative activity, plus troubleshooting considerations like noisy normal behavior, missing telemetry, and how to stage a new alert in monitor-only mode before enforcing automated response. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 10:59:59 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bc93b2fb/91130ba1.mp3" length="34311818" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>857</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches the workflow for turning a detection use case into an alert that reliably drives the right action, which is a high-value GSOM skill because the exam often asks what to alert on, what to include, and what to do when ambiguity remains. You will learn to start with a behavior statement, identify the minimum evidence that proves it, and then build logic that balances precision and coverage, such as combining identity events with endpoint process signals or network connections to reduce false positives. We will cover alert content best practices, including what fields an analyst needs to triage quickly, what links or pivots should be available, and how to express the suspected technique in clear operational language that supports escalation and documentation. Real-world scenarios include detecting suspicious authentication patterns, persistence behaviors, and unusual administrative activity, plus troubleshooting considerations like noisy normal behavior, missing telemetry, and how to stage a new alert in monitor-only mode before enforcing automated response. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bc93b2fb/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 31 — Prioritize alerts using severity, confidence, and business impact tradeoffs</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31 — Prioritize alerts using severity, confidence, and business impact tradeoffs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0d1c0bd7-cdde-4083-8973-095a3c863ccc</guid>
      <link>https://share.transistor.fm/s/52b469f0</link>
      <description>
        <![CDATA[<p>This episode explains how GSOM expects you to prioritize alerts as a disciplined triage system, not as a gut-feel reaction to whichever notification is loudest. You will define severity as potential impact if the alert is true, confidence as how strongly the evidence supports the detection, and business impact as the operational consequence of both attacker activity and your response actions. We will walk through how these three factors interact when queues are full, such as why a medium-severity alert with high confidence on a privileged identity may outrank a high-severity alert with weak evidence, or why a lower-confidence alert tied to a crown-jewel system may still demand immediate validation. Exam-focused scenarios include competing alerts during peak business hours, incomplete context that forces temporary classification, and how to document assumptions while you escalate or contain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how GSOM expects you to prioritize alerts as a disciplined triage system, not as a gut-feel reaction to whichever notification is loudest. You will define severity as potential impact if the alert is true, confidence as how strongly the evidence supports the detection, and business impact as the operational consequence of both attacker activity and your response actions. We will walk through how these three factors interact when queues are full, such as why a medium-severity alert with high confidence on a privileged identity may outrank a high-severity alert with weak evidence, or why a lower-confidence alert tied to a crown-jewel system may still demand immediate validation. Exam-focused scenarios include competing alerts during peak business hours, incomplete context that forces temporary classification, and how to document assumptions while you escalate or contain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:00:16 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/52b469f0/5607f805.mp3" length="35872900" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>896</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how GSOM expects you to prioritize alerts as a disciplined triage system, not as a gut-feel reaction to whichever notification is loudest. You will define severity as potential impact if the alert is true, confidence as how strongly the evidence supports the detection, and business impact as the operational consequence of both attacker activity and your response actions. We will walk through how these three factors interact when queues are full, such as why a medium-severity alert with high confidence on a privileged identity may outrank a high-severity alert with weak evidence, or why a lower-confidence alert tied to a crown-jewel system may still demand immediate validation. Exam-focused scenarios include competing alerts during peak business hours, incomplete context that forces temporary classification, and how to document assumptions while you escalate or contain. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/52b469f0/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 32 — Classify alerts consistently to speed triage, routing, and investigation handoffs</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32 — Classify alerts consistently to speed triage, routing, and investigation handoffs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cbd2d8fa-4c53-4d03-8d36-8b5593c923a6</guid>
      <link>https://share.transistor.fm/s/3f0551ad</link>
      <description>
        <![CDATA[<p>This episode teaches alert classification as a standard language that keeps SOC operations fast and defensible, which GSOM tests because inconsistency creates delays, misroutes, and poor incident narratives. You will define what a “classification” should capture, such as suspected activity type, affected scope, current confidence, and required next action, and how that differs from raw severity or a final incident label. We will connect classification to routing decisions, including when to keep work in the triage queue, when to escalate to deeper investigation, and when to involve system owners, identity teams, or network teams without creating noise. Troubleshooting scenarios include teams using different definitions for the same category, labels that drift over time, and handoffs that lose context, with best practices for minimal but complete documentation that supports fast pivots and clear accountability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches alert classification as a standard language that keeps SOC operations fast and defensible, which GSOM tests because inconsistency creates delays, misroutes, and poor incident narratives. You will define what a “classification” should capture, such as suspected activity type, affected scope, current confidence, and required next action, and how that differs from raw severity or a final incident label. We will connect classification to routing decisions, including when to keep work in the triage queue, when to escalate to deeper investigation, and when to involve system owners, identity teams, or network teams without creating noise. Troubleshooting scenarios include teams using different definitions for the same category, labels that drift over time, and handoffs that lose context, with best practices for minimal but complete documentation that supports fast pivots and clear accountability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:00:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3f0551ad/8e7c2642.mp3" length="35486299" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>887</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches alert classification as a standard language that keeps SOC operations fast and defensible, which GSOM tests because inconsistency creates delays, misroutes, and poor incident narratives. You will define what a “classification” should capture, such as suspected activity type, affected scope, current confidence, and required next action, and how that differs from raw severity or a final incident label. We will connect classification to routing decisions, including when to keep work in the triage queue, when to escalate to deeper investigation, and when to involve system owners, identity teams, or network teams without creating noise. Troubleshooting scenarios include teams using different definitions for the same category, labels that drift over time, and handoffs that lose context, with best practices for minimal but complete documentation that supports fast pivots and clear accountability. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3f0551ad/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 33 — Implement best practices for timely, manageable, and sustainable alert response</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33 — Implement best practices for timely, manageable, and sustainable alert response</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bd3f55fa-27e2-40bb-b73a-f0c50584a4da</guid>
      <link>https://share.transistor.fm/s/e9a76b75</link>
      <description>
        <![CDATA[<p>This episode focuses on building an alert response engine that can run every day without burning out the team, a key GSOM expectation because response sustainability directly impacts detection quality and incident outcomes. You will learn how queue management, response SLAs, and escalation thresholds should be designed around evidence-driven actions, not arbitrary timers, so analysts know what “good” looks like in triage, investigation, and containment coordination. We will discuss practices that reduce rework, such as using repeatable investigation checklists inside the case record, standardizing enrichment and pivots, and ensuring every alert has a clear owner and a defined “done” condition. Exam-relevant troubleshooting includes backlog growth after a new data source, inconsistent analyst decisions, and alert fatigue that leads to premature closures, with best practices for quality sampling, coaching, and periodic rule review to keep response both fast and correct. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on building an alert response engine that can run every day without burning out the team, a key GSOM expectation because response sustainability directly impacts detection quality and incident outcomes. You will learn how queue management, response SLAs, and escalation thresholds should be designed around evidence-driven actions, not arbitrary timers, so analysts know what “good” looks like in triage, investigation, and containment coordination. We will discuss practices that reduce rework, such as using repeatable investigation checklists inside the case record, standardizing enrichment and pivots, and ensuring every alert has a clear owner and a defined “done” condition. Exam-relevant troubleshooting includes backlog growth after a new data source, inconsistent analyst decisions, and alert fatigue that leads to premature closures, with best practices for quality sampling, coaching, and periodic rule review to keep response both fast and correct. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:00:58 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e9a76b75/02c5b4b6.mp3" length="44069087" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1101</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on building an alert response engine that can run every day without burning out the team, a key GSOM expectation because response sustainability directly impacts detection quality and incident outcomes. You will learn how queue management, response SLAs, and escalation thresholds should be designed around evidence-driven actions, not arbitrary timers, so analysts know what “good” looks like in triage, investigation, and containment coordination. We will discuss practices that reduce rework, such as using repeatable investigation checklists inside the case record, standardizing enrichment and pivots, and ensuring every alert has a clear owner and a defined “done” condition. Exam-relevant troubleshooting includes backlog growth after a new data source, inconsistent analyst decisions, and alert fatigue that leads to premature closures, with best practices for quality sampling, coaching, and periodic rule review to keep response both fast and correct. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e9a76b75/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 34 — Tune noisy detections using feedback loops that shrink backlogs over time</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34 — Tune noisy detections using feedback loops that shrink backlogs over time</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8bf8750-48bb-422a-baf1-2119b2e13145</guid>
      <link>https://share.transistor.fm/s/19208ff6</link>
      <description>
        <![CDATA[<p>This episode teaches detection tuning as an iterative feedback loop that improves signal quality while preserving coverage, which GSOM tests because “turn it off” is rarely the right long-term answer. You will define noise sources such as overly broad logic, missing allowlists for known-good behavior, poor asset or user context, and environmental changes like new software deployments that shift baselines. We will connect tuning to backlog reduction by showing how to prioritize which detections to refine first, using metrics like alert volume, time-to-triage, false positive rate, and the business cost of analyst distraction. Real-world scenarios include an alert that fires on legitimate administrative tools, correlation rules that duplicate EDR detections, and cloud audit events that explode after a policy change, with best practices for staged changes, validation periods, and rollback plans so tuning does not accidentally create blind spots. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches detection tuning as an iterative feedback loop that improves signal quality while preserving coverage, which GSOM tests because “turn it off” is rarely the right long-term answer. You will define noise sources such as overly broad logic, missing allowlists for known-good behavior, poor asset or user context, and environmental changes like new software deployments that shift baselines. We will connect tuning to backlog reduction by showing how to prioritize which detections to refine first, using metrics like alert volume, time-to-triage, false positive rate, and the business cost of analyst distraction. Real-world scenarios include an alert that fires on legitimate administrative tools, correlation rules that duplicate EDR detections, and cloud audit events that explode after a policy change, with best practices for staged changes, validation periods, and rollback plans so tuning does not accidentally create blind spots. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:01:13 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/19208ff6/8f4e02a5.mp3" length="43109859" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1077</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches detection tuning as an iterative feedback loop that improves signal quality while preserving coverage, which GSOM tests because “turn it off” is rarely the right long-term answer. You will define noise sources such as overly broad logic, missing allowlists for known-good behavior, poor asset or user context, and environmental changes like new software deployments that shift baselines. We will connect tuning to backlog reduction by showing how to prioritize which detections to refine first, using metrics like alert volume, time-to-triage, false positive rate, and the business cost of analyst distraction. Real-world scenarios include an alert that fires on legitimate administrative tools, correlation rules that duplicate EDR detections, and cloud audit events that explode after a policy change, with best practices for staged changes, validation periods, and rollback plans so tuning does not accidentally create blind spots. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/19208ff6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 35 — Spaced Review: build, prioritize, classify, respond, and tune alerts confidently</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35 — Spaced Review: build, prioritize, classify, respond, and tune alerts confidently</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a71cb49d-3c17-4a1e-bc15-0db5f2117c35</guid>
      <link>https://share.transistor.fm/s/2adc5825</link>
      <description>
        <![CDATA[<p>This episode is a high-speed consolidation of alert lifecycle skills that show up repeatedly in GSOM questions, designed to help you recognize what decision the exam is actually testing in a noisy scenario. You will revisit how use cases become actionable alerts, how severity, confidence, and business impact shape priority, and why consistent classification speeds routing and preserves context during handoffs. We will reinforce response best practices that keep operations sustainable, including clear ownership, evidence-based “done” conditions, and documentation that supports later incident timelines and lessons learned. Short scenario prompts will help you practice choosing the best next step when the queue spikes, a detection becomes noisy, or an alert lacks required fields, emphasizing choices that reduce risk while maintaining a trustworthy monitoring posture. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode is a high-speed consolidation of alert lifecycle skills that show up repeatedly in GSOM questions, designed to help you recognize what decision the exam is actually testing in a noisy scenario. You will revisit how use cases become actionable alerts, how severity, confidence, and business impact shape priority, and why consistent classification speeds routing and preserves context during handoffs. We will reinforce response best practices that keep operations sustainable, including clear ownership, evidence-based “done” conditions, and documentation that supports later incident timelines and lessons learned. Short scenario prompts will help you practice choosing the best next step when the queue spikes, a detection becomes noisy, or an alert lacks required fields, emphasizing choices that reduce risk while maintaining a trustworthy monitoring posture. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:01:28 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2adc5825/0b9344ef.mp3" length="44727375" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1118</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode is a high-speed consolidation of alert lifecycle skills that show up repeatedly in GSOM questions, designed to help you recognize what decision the exam is actually testing in a noisy scenario. You will revisit how use cases become actionable alerts, how severity, confidence, and business impact shape priority, and why consistent classification speeds routing and preserves context during handoffs. We will reinforce response best practices that keep operations sustainable, including clear ownership, evidence-based “done” conditions, and documentation that supports later incident timelines and lessons learned. Short scenario prompts will help you practice choosing the best next step when the queue spikes, a detection becomes noisy, or an alert lacks required fields, emphasizing choices that reduce risk while maintaining a trustworthy monitoring posture. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2adc5825/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 36 — Preparing for Incident Response: readiness steps that prevent chaos later</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36 — Preparing for Incident Response: readiness steps that prevent chaos later</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">230b1742-a35c-422b-9da7-a883114a0b4d</guid>
      <link>https://share.transistor.fm/s/92f49f36</link>
      <description>
        <![CDATA[<p>This episode introduces incident response readiness as deliberate preparation that keeps you from improvising under pressure, and GSOM frequently tests these fundamentals because they determine whether investigations are credible and containment is controlled. You will define readiness in practical terms: having clear roles, access, evidence handling practices, logging retention, and escalation paths before the first major event, so the SOC can move fast without breaking trust or losing data. We will discuss why prebuilt playbooks matter, not as rigid scripts, but as shared decision frameworks that reduce confusion around who approves isolation actions, when legal or HR should be notified, and how to preserve critical business functions. Troubleshooting scenarios include discovering during an incident that logs are missing, credentials are unavailable, or ownership is unclear, with best practices for readiness audits, tabletop validation, and continuous updates as systems and org structures change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces incident response readiness as deliberate preparation that keeps you from improvising under pressure, and GSOM frequently tests these fundamentals because they determine whether investigations are credible and containment is controlled. You will define readiness in practical terms: having clear roles, access, evidence handling practices, logging retention, and escalation paths before the first major event, so the SOC can move fast without breaking trust or losing data. We will discuss why prebuilt playbooks matter, not as rigid scripts, but as shared decision frameworks that reduce confusion around who approves isolation actions, when legal or HR should be notified, and how to preserve critical business functions. Troubleshooting scenarios include discovering during an incident that logs are missing, credentials are unavailable, or ownership is unclear, with best practices for readiness audits, tabletop validation, and continuous updates as systems and org structures change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:01:48 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/92f49f36/52cb2de0.mp3" length="40525826" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1013</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces incident response readiness as deliberate preparation that keeps you from improvising under pressure, and GSOM frequently tests these fundamentals because they determine whether investigations are credible and containment is controlled. You will define readiness in practical terms: having clear roles, access, evidence handling practices, logging retention, and escalation paths before the first major event, so the SOC can move fast without breaking trust or losing data. We will discuss why prebuilt playbooks matter, not as rigid scripts, but as shared decision frameworks that reduce confusion around who approves isolation actions, when legal or HR should be notified, and how to preserve critical business functions. Troubleshooting scenarios include discovering during an incident that logs are missing, credentials are unavailable, or ownership is unclear, with best practices for readiness audits, tabletop validation, and continuous updates as systems and org structures change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/92f49f36/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 37 — Master the incident response cycle and where SOC operations plug in</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37 — Master the incident response cycle and where SOC operations plug in</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0b22c8d8-a59c-4682-bde5-ef01931b6dbd</guid>
      <link>https://share.transistor.fm/s/8ca346c3</link>
      <description>
        <![CDATA[<p>This episode teaches the incident response cycle as an end-to-end workflow that the SOC supports at every stage, which GSOM tests by asking where specific actions belong and what the correct sequence should be when the situation evolves. You will define the major phases—preparation, detection and analysis, containment, eradication, recovery, and lessons learned—and connect each phase to SOC responsibilities such as alert triage, evidence collection, timeline building, coordination with IT owners, and verification that controls are restored safely. We will use scenarios to show how phase boundaries blur in real life, such as when containment must begin before full scope is known, and how to make defensible decisions that balance speed with evidence integrity. Exam-focused troubleshooting includes premature eradication that destroys artifacts, recovery steps taken without verification that persistence is removed, and communication failures that cause duplicated work or business disruption. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches the incident response cycle as an end-to-end workflow that the SOC supports at every stage, which GSOM tests by asking where specific actions belong and what the correct sequence should be when the situation evolves. You will define the major phases—preparation, detection and analysis, containment, eradication, recovery, and lessons learned—and connect each phase to SOC responsibilities such as alert triage, evidence collection, timeline building, coordination with IT owners, and verification that controls are restored safely. We will use scenarios to show how phase boundaries blur in real life, such as when containment must begin before full scope is known, and how to make defensible decisions that balance speed with evidence integrity. Exam-focused troubleshooting includes premature eradication that destroys artifacts, recovery steps taken without verification that persistence is removed, and communication failures that cause duplicated work or business disruption. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:02:09 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8ca346c3/595821fc.mp3" length="46564280" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1163</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches the incident response cycle as an end-to-end workflow that the SOC supports at every stage, which GSOM tests by asking where specific actions belong and what the correct sequence should be when the situation evolves. You will define the major phases—preparation, detection and analysis, containment, eradication, recovery, and lessons learned—and connect each phase to SOC responsibilities such as alert triage, evidence collection, timeline building, coordination with IT owners, and verification that controls are restored safely. We will use scenarios to show how phase boundaries blur in real life, such as when containment must begin before full scope is known, and how to make defensible decisions that balance speed with evidence integrity. Exam-focused troubleshooting includes premature eradication that destroys artifacts, recovery steps taken without verification that persistence is removed, and communication failures that cause duplicated work or business disruption. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8ca346c3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 38 — Prepare investigation foundations: evidence handling, tooling access, and documentation</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38 — Prepare investigation foundations: evidence handling, tooling access, and documentation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d50be6e0-fcad-487d-b37a-c72b8e942edd</guid>
      <link>https://share.transistor.fm/s/3c406c79</link>
      <description>
        <![CDATA[<p>This episode focuses on the investigation foundations that make your conclusions defensible, because GSOM often tests whether you preserve evidence, maintain integrity, and document decisions in a way that survives scrutiny after the incident. You will define evidence handling in SOC terms, including preserving original artifacts, tracking chain-of-custody where needed, and avoiding actions that overwrite or delete volatile data before it is captured. We will connect tooling access to readiness by discussing the practical necessity of pre-approved permissions, break-glass accounts, and reliable data retrieval methods so investigators can collect logs, endpoint data, and cloud audit trails without delay. Troubleshooting scenarios include missing time synchronization, inconsistent log retention, limited access that forces risky workarounds, and documentation that is too vague to support a timeline, with best practices for consistent case notes, decision rationale, and repeatable evidence capture routines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on the investigation foundations that make your conclusions defensible, because GSOM often tests whether you preserve evidence, maintain integrity, and document decisions in a way that survives scrutiny after the incident. You will define evidence handling in SOC terms, including preserving original artifacts, tracking chain-of-custody where needed, and avoiding actions that overwrite or delete volatile data before it is captured. We will connect tooling access to readiness by discussing the practical necessity of pre-approved permissions, break-glass accounts, and reliable data retrieval methods so investigators can collect logs, endpoint data, and cloud audit trails without delay. Troubleshooting scenarios include missing time synchronization, inconsistent log retention, limited access that forces risky workarounds, and documentation that is too vague to support a timeline, with best practices for consistent case notes, decision rationale, and repeatable evidence capture routines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:02:22 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3c406c79/cfd4d42b.mp3" length="47833871" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1195</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on the investigation foundations that make your conclusions defensible, because GSOM often tests whether you preserve evidence, maintain integrity, and document decisions in a way that survives scrutiny after the incident. You will define evidence handling in SOC terms, including preserving original artifacts, tracking chain-of-custody where needed, and avoiding actions that overwrite or delete volatile data before it is captured. We will connect tooling access to readiness by discussing the practical necessity of pre-approved permissions, break-glass accounts, and reliable data retrieval methods so investigators can collect logs, endpoint data, and cloud audit trails without delay. Troubleshooting scenarios include missing time synchronization, inconsistent log retention, limited access that forces risky workarounds, and documentation that is too vague to support a timeline, with best practices for consistent case notes, decision rationale, and repeatable evidence capture routines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3c406c79/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 39 — Build communication paths and decision points before the first incident hits</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39 — Build communication paths and decision points before the first incident hits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">70930d46-7a0d-4772-9f4e-b705581c563a</guid>
      <link>https://share.transistor.fm/s/9ab936a3</link>
      <description>
        <![CDATA[<p>This episode teaches communication and decision design as part of incident response readiness, because GSOM expects you to prevent “communication incidents” that slow containment, confuse stakeholders, and increase business damage. You will define communication paths as pre-agreed channels, roles, and escalation ladders that answer who must be informed, who can authorize disruptive actions, and how updates are delivered without leaking sensitive details or causing panic. We will explore decision points such as when to isolate endpoints, when to disable accounts, when to take systems offline, and when to involve legal, executive leadership, vendors, or law enforcement, emphasizing that timing and authority are as important as technical correctness. Troubleshooting scenarios include conflicting instructions from leaders, inconsistent messaging to IT owners, and delayed approvals during after-hours events, with best practices for concise incident updates, stakeholder-specific language, and documented approval workflows that keep actions controlled. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches communication and decision design as part of incident response readiness, because GSOM expects you to prevent “communication incidents” that slow containment, confuse stakeholders, and increase business damage. You will define communication paths as pre-agreed channels, roles, and escalation ladders that answer who must be informed, who can authorize disruptive actions, and how updates are delivered without leaking sensitive details or causing panic. We will explore decision points such as when to isolate endpoints, when to disable accounts, when to take systems offline, and when to involve legal, executive leadership, vendors, or law enforcement, emphasizing that timing and authority are as important as technical correctness. Troubleshooting scenarios include conflicting instructions from leaders, inconsistent messaging to IT owners, and delayed approvals during after-hours events, with best practices for concise incident updates, stakeholder-specific language, and documented approval workflows that keep actions controlled. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:02:46 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9ab936a3/509981f3.mp3" length="45697032" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1142</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches communication and decision design as part of incident response readiness, because GSOM expects you to prevent “communication incidents” that slow containment, confuse stakeholders, and increase business damage. You will define communication paths as pre-agreed channels, roles, and escalation ladders that answer who must be informed, who can authorize disruptive actions, and how updates are delivered without leaking sensitive details or causing panic. We will explore decision points such as when to isolate endpoints, when to disable accounts, when to take systems offline, and when to involve legal, executive leadership, vendors, or law enforcement, emphasizing that timing and authority are as important as technical correctness. Troubleshooting scenarios include conflicting instructions from leaders, inconsistent messaging to IT owners, and delayed approvals during after-hours events, with best practices for concise incident updates, stakeholder-specific language, and documented approval workflows that keep actions controlled. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9ab936a3/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 40 — Spaced Review: remember IR preparation, phases, and SOC coordination essentials</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40 — Spaced Review: remember IR preparation, phases, and SOC coordination essentials</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5795c7e5-d79e-4a26-866f-197e1a15726a</guid>
      <link>https://share.transistor.fm/s/bca8bc3c</link>
      <description>
        <![CDATA[<p>This episode consolidates incident response preparation and coordination concepts that GSOM revisits in multiple domains, helping you recognize the most defensible next action when a scenario accelerates. You will review readiness as prebuilt access, logging, evidence routines, playbooks, and communication paths, then reinforce the incident response cycle and what the SOC contributes at each phase, from detection and analysis through recovery validation and lessons learned. We will use short scenario cues to practice identifying when a question is testing evidence preservation, approval authority, containment sequencing, or documentation quality, so you can eliminate answers that sound decisive but create long-term damage. The emphasis is on repeatable operations: coordinated actions, clear decision points, and credible investigation outputs that improve the program after the incident is closed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode consolidates incident response preparation and coordination concepts that GSOM revisits in multiple domains, helping you recognize the most defensible next action when a scenario accelerates. You will review readiness as prebuilt access, logging, evidence routines, playbooks, and communication paths, then reinforce the incident response cycle and what the SOC contributes at each phase, from detection and analysis through recovery validation and lessons learned. We will use short scenario cues to practice identifying when a question is testing evidence preservation, approval authority, containment sequencing, or documentation quality, so you can eliminate answers that sound decisive but create long-term damage. The emphasis is on repeatable operations: coordinated actions, clear decision points, and credible investigation outputs that improve the program after the incident is closed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:03:01 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/bca8bc3c/afa343fb.mp3" length="48092989" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1202</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode consolidates incident response preparation and coordination concepts that GSOM revisits in multiple domains, helping you recognize the most defensible next action when a scenario accelerates. You will review readiness as prebuilt access, logging, evidence routines, playbooks, and communication paths, then reinforce the incident response cycle and what the SOC contributes at each phase, from detection and analysis through recovery validation and lessons learned. We will use short scenario cues to practice identifying when a question is testing evidence preservation, approval authority, containment sequencing, or documentation quality, so you can eliminate answers that sound decisive but create long-term damage. The emphasis is on repeatable operations: coordinated actions, clear decision points, and credible investigation outputs that improve the program after the incident is closed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bca8bc3c/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 41 — Managing Incident Response Execution: investigation techniques that reach the truth</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41 — Managing Incident Response Execution: investigation techniques that reach the truth</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bf19844b-32b9-4761-8777-5e81e07fd80e</guid>
      <link>https://share.transistor.fm/s/8a350b66</link>
      <description>
        <![CDATA[<p>This episode focuses on how incident response execution works in practice once an event is declared, because the GSOM exam often tests whether you can move from alert-level uncertainty to evidence-backed conclusions without destroying artifacts or rushing to assumptions. You will define core investigation techniques such as triage validation, scoping by observable facts, artifact collection from endpoints and logs, and correlation across identity, network, and host data to confirm what actually happened. We will discuss how to manage competing pressures—speed, business disruption, and incomplete telemetry—while still producing a defensible narrative that supports containment and recovery decisions. Real-world scenarios include a suspected credential compromise that may involve lateral movement, or suspicious administrative actions where you must prove intent and scope, plus troubleshooting considerations like missing logs, time drift, and unreliable enrichment that can distort timelines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on how incident response execution works in practice once an event is declared, because the GSOM exam often tests whether you can move from alert-level uncertainty to evidence-backed conclusions without destroying artifacts or rushing to assumptions. You will define core investigation techniques such as triage validation, scoping by observable facts, artifact collection from endpoints and logs, and correlation across identity, network, and host data to confirm what actually happened. We will discuss how to manage competing pressures—speed, business disruption, and incomplete telemetry—while still producing a defensible narrative that supports containment and recovery decisions. Real-world scenarios include a suspected credential compromise that may involve lateral movement, or suspicious administrative actions where you must prove intent and scope, plus troubleshooting considerations like missing logs, time drift, and unreliable enrichment that can distort timelines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:03:22 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8a350b66/a7e53889.mp3" length="48092997" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1202</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on how incident response execution works in practice once an event is declared, because the GSOM exam often tests whether you can move from alert-level uncertainty to evidence-backed conclusions without destroying artifacts or rushing to assumptions. You will define core investigation techniques such as triage validation, scoping by observable facts, artifact collection from endpoints and logs, and correlation across identity, network, and host data to confirm what actually happened. We will discuss how to manage competing pressures—speed, business disruption, and incomplete telemetry—while still producing a defensible narrative that supports containment and recovery decisions. Real-world scenarios include a suspected credential compromise that may involve lateral movement, or suspicious administrative actions where you must prove intent and scope, plus troubleshooting considerations like missing logs, time drift, and unreliable enrichment that can distort timelines. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8a350b66/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 42 — Scope incidents rapidly using hypotheses, timelines, and high-value evidence</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42 — Scope incidents rapidly using hypotheses, timelines, and high-value evidence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2ad5475a-b215-4cbe-905b-03bb873b1dd9</guid>
      <link>https://share.transistor.fm/s/dda3a9a6</link>
      <description>
        <![CDATA[<p>This episode teaches rapid scoping as a structured method rather than a guessing game, which GSOM tests because effective scoping determines whether you contain the right systems and avoid wasting hours on low-value data. You will define a hypothesis as a testable statement about attacker activity, then learn how to build and refine it using a timeline anchored to high-confidence events like authentication records, endpoint execution traces, and known changes to accounts or configurations. We will explain what “high-value evidence” looks like in common scenarios, including privileged identity use, lateral movement indicators, persistence attempts, and data access events that imply impact, and how to prioritize collection when time is limited. Troubleshooting considerations include conflicting signals between tools, partial visibility across environments, and noisy baseline behavior, with best practices for narrowing scope by validating the earliest known event, identifying the blast radius, and documenting what remains unknown. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches rapid scoping as a structured method rather than a guessing game, which GSOM tests because effective scoping determines whether you contain the right systems and avoid wasting hours on low-value data. You will define a hypothesis as a testable statement about attacker activity, then learn how to build and refine it using a timeline anchored to high-confidence events like authentication records, endpoint execution traces, and known changes to accounts or configurations. We will explain what “high-value evidence” looks like in common scenarios, including privileged identity use, lateral movement indicators, persistence attempts, and data access events that imply impact, and how to prioritize collection when time is limited. Troubleshooting considerations include conflicting signals between tools, partial visibility across environments, and noisy baseline behavior, with best practices for narrowing scope by validating the earliest known event, identifying the blast radius, and documenting what remains unknown. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:03:35 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dda3a9a6/6c252c6b.mp3" length="36848836" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>921</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches rapid scoping as a structured method rather than a guessing game, which GSOM tests because effective scoping determines whether you contain the right systems and avoid wasting hours on low-value data. You will define a hypothesis as a testable statement about attacker activity, then learn how to build and refine it using a timeline anchored to high-confidence events like authentication records, endpoint execution traces, and known changes to accounts or configurations. We will explain what “high-value evidence” looks like in common scenarios, including privileged identity use, lateral movement indicators, persistence attempts, and data access events that imply impact, and how to prioritize collection when time is limited. Troubleshooting considerations include conflicting signals between tools, partial visibility across environments, and noisy baseline behavior, with best practices for narrowing scope by validating the earliest known event, identifying the blast radius, and documenting what remains unknown. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dda3a9a6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 43 — Execute containment choices that reduce risk without crippling the business</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43 — Execute containment choices that reduce risk without crippling the business</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cc9c8fd1-83a4-455c-b3e5-dd71aae4c261</guid>
      <link>https://share.transistor.fm/s/ba8b8bc9</link>
      <description>
        <![CDATA[<p>This episode explores containment as a set of controlled options with tradeoffs, because GSOM questions often ask you to choose a response that reduces attacker capability while preserving critical operations and investigative integrity. You will define containment goals such as stopping spread, preventing further access, and protecting data, then map them to actions like isolating endpoints, disabling accounts, blocking network paths, revoking tokens, or tightening conditional access policies. We will discuss how to choose the least disruptive action that still meaningfully reduces risk, and how to stage containment when you are not fully sure of scope, such as isolating high-risk assets first while monitoring for breakout behavior. Troubleshooting scenarios include containment steps that break production workflows, attackers reacting by accelerating exfiltration, and gaps where containment cannot be verified due to missing telemetry, with best practices for approvals, communication, rollback planning, and validation checks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explores containment as a set of controlled options with tradeoffs, because GSOM questions often ask you to choose a response that reduces attacker capability while preserving critical operations and investigative integrity. You will define containment goals such as stopping spread, preventing further access, and protecting data, then map them to actions like isolating endpoints, disabling accounts, blocking network paths, revoking tokens, or tightening conditional access policies. We will discuss how to choose the least disruptive action that still meaningfully reduces risk, and how to stage containment when you are not fully sure of scope, such as isolating high-risk assets first while monitoring for breakout behavior. Troubleshooting scenarios include containment steps that break production workflows, attackers reacting by accelerating exfiltration, and gaps where containment cannot be verified due to missing telemetry, with best practices for approvals, communication, rollback planning, and validation checks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:03:53 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ba8b8bc9/ce7d8d1d.mp3" length="37768345" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>944</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explores containment as a set of controlled options with tradeoffs, because GSOM questions often ask you to choose a response that reduces attacker capability while preserving critical operations and investigative integrity. You will define containment goals such as stopping spread, preventing further access, and protecting data, then map them to actions like isolating endpoints, disabling accounts, blocking network paths, revoking tokens, or tightening conditional access policies. We will discuss how to choose the least disruptive action that still meaningfully reduces risk, and how to stage containment when you are not fully sure of scope, such as isolating high-risk assets first while monitoring for breakout behavior. Troubleshooting scenarios include containment steps that break production workflows, attackers reacting by accelerating exfiltration, and gaps where containment cannot be verified due to missing telemetry, with best practices for approvals, communication, rollback planning, and validation checks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ba8b8bc9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 44 — Drive eradication and recovery with verification and controlled reentry steps</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44 — Drive eradication and recovery with verification and controlled reentry steps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4a0f30b-b34f-4e7e-8ed2-9ac35dd1c01d</guid>
      <link>https://share.transistor.fm/s/5b4995a8</link>
      <description>
        <![CDATA[<p>This episode explains how eradication and recovery should be executed with verification gates, because GSOM expects you to prevent “false recovery” where systems return to service while persistence or attacker access remains. You will define eradication as removing the attacker’s foothold, including persistence mechanisms, malicious tooling, unauthorized accounts, and abused credentials, and recovery as restoring normal operations in a way that prevents immediate reinfection. We will walk through verification steps such as confirming patches or configuration fixes are applied, checking identity and token hygiene, validating endpoint cleanliness, and monitoring for repeat indicators before full reentry. Real-world scenarios include rebuilding a compromised host versus cleaning it in place, restoring from backups with integrity checks, and sequencing recovery so critical services return safely without reopening the original attack path. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how eradication and recovery should be executed with verification gates, because GSOM expects you to prevent “false recovery” where systems return to service while persistence or attacker access remains. You will define eradication as removing the attacker’s foothold, including persistence mechanisms, malicious tooling, unauthorized accounts, and abused credentials, and recovery as restoring normal operations in a way that prevents immediate reinfection. We will walk through verification steps such as confirming patches or configuration fixes are applied, checking identity and token hygiene, validating endpoint cleanliness, and monitoring for repeat indicators before full reentry. Real-world scenarios include rebuilding a compromised host versus cleaning it in place, restoring from backups with integrity checks, and sequencing recovery so critical services return safely without reopening the original attack path. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:04:07 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5b4995a8/126ae3e4.mp3" length="35265818" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>881</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how eradication and recovery should be executed with verification gates, because GSOM expects you to prevent “false recovery” where systems return to service while persistence or attacker access remains. You will define eradication as removing the attacker’s foothold, including persistence mechanisms, malicious tooling, unauthorized accounts, and abused credentials, and recovery as restoring normal operations in a way that prevents immediate reinfection. We will walk through verification steps such as confirming patches or configuration fixes are applied, checking identity and token hygiene, validating endpoint cleanliness, and monitoring for repeat indicators before full reentry. Real-world scenarios include rebuilding a compromised host versus cleaning it in place, restoring from backups with integrity checks, and sequencing recovery so critical services return safely without reopening the original attack path. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5b4995a8/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 45 — Close the loop with lessons learned that strengthen every IR phase</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45 — Close the loop with lessons learned that strengthen every IR phase</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">509fb23f-6c4a-44d5-8791-7b625aaea48c</guid>
      <link>https://share.transistor.fm/s/784284a2</link>
      <description>
        <![CDATA[<p>This episode teaches lessons learned as an operational improvement process, which GSOM tests because mature programs turn incidents into better detections, clearer playbooks, and fewer repeat failures. You will define lessons learned as evidence-driven findings tied to root causes, contributing factors, and control gaps, then connect those findings to concrete improvements across preparation, detection and analysis, containment, eradication, and recovery. We will discuss how to capture what worked and what failed without blame, using timelines, decision logs, and measurable outcomes like time-to-detect, time-to-contain, and investigation completeness. Troubleshooting considerations include shallow retrospectives that only list “do better,” lack of ownership for action items, and improvements that cannot be verified, with best practices for assigning owners, setting deadlines, and validating changes through testing or targeted monitoring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches lessons learned as an operational improvement process, which GSOM tests because mature programs turn incidents into better detections, clearer playbooks, and fewer repeat failures. You will define lessons learned as evidence-driven findings tied to root causes, contributing factors, and control gaps, then connect those findings to concrete improvements across preparation, detection and analysis, containment, eradication, and recovery. We will discuss how to capture what worked and what failed without blame, using timelines, decision logs, and measurable outcomes like time-to-detect, time-to-contain, and investigation completeness. Troubleshooting considerations include shallow retrospectives that only list “do better,” lack of ownership for action items, and improvements that cannot be verified, with best practices for assigning owners, setting deadlines, and validating changes through testing or targeted monitoring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:04:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/784284a2/91cee998.mp3" length="33966988" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>849</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches lessons learned as an operational improvement process, which GSOM tests because mature programs turn incidents into better detections, clearer playbooks, and fewer repeat failures. You will define lessons learned as evidence-driven findings tied to root causes, contributing factors, and control gaps, then connect those findings to concrete improvements across preparation, detection and analysis, containment, eradication, and recovery. We will discuss how to capture what worked and what failed without blame, using timelines, decision logs, and measurable outcomes like time-to-detect, time-to-contain, and investigation completeness. Troubleshooting considerations include shallow retrospectives that only list “do better,” lack of ownership for action items, and improvements that cannot be verified, with best practices for assigning owners, setting deadlines, and validating changes through testing or targeted monitoring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/784284a2/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 46 — Spaced Review: investigate, contain, eradicate, recover, and learn without guesswork</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46 — Spaced Review: investigate, contain, eradicate, recover, and learn without guesswork</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4369972c-d2e9-4040-8fb2-f9caac1fc131</guid>
      <link>https://share.transistor.fm/s/ad1895f6</link>
      <description>
        <![CDATA[<p>This episode consolidates the incident response execution flow that GSOM repeatedly evaluates, helping you recognize which phase a question is targeting and what “best next step” logic applies. You will revisit rapid scoping with hypotheses and timelines, then reinforce containment as risk-reducing actions chosen with business impact in mind and verified through telemetry. We will review eradication and recovery as gated processes that require proof of removal and controlled reentry, and then connect the full cycle to lessons learned as a mechanism for improving detections, playbooks, and readiness. Short scenario cues will help you practice avoiding common traps such as taking disruptive actions without approvals, erasing evidence during cleanup, or declaring recovery before validating that persistence is gone and access pathways are closed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode consolidates the incident response execution flow that GSOM repeatedly evaluates, helping you recognize which phase a question is targeting and what “best next step” logic applies. You will revisit rapid scoping with hypotheses and timelines, then reinforce containment as risk-reducing actions chosen with business impact in mind and verified through telemetry. We will review eradication and recovery as gated processes that require proof of removal and controlled reentry, and then connect the full cycle to lessons learned as a mechanism for improving detections, playbooks, and readiness. Short scenario cues will help you practice avoiding common traps such as taking disruptive actions without approvals, erasing evidence during cleanup, or declaring recovery before validating that persistence is gone and access pathways are closed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:04:34 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ad1895f6/722b236b.mp3" length="35699465" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>892</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode consolidates the incident response execution flow that GSOM repeatedly evaluates, helping you recognize which phase a question is targeting and what “best next step” logic applies. You will revisit rapid scoping with hypotheses and timelines, then reinforce containment as risk-reducing actions chosen with business impact in mind and verified through telemetry. We will review eradication and recovery as gated processes that require proof of removal and controlled reentry, and then connect the full cycle to lessons learned as a mechanism for improving detections, playbooks, and readiness. Short scenario cues will help you practice avoiding common traps such as taking disruptive actions without approvals, erasing evidence during cleanup, or declaring recovery before validating that persistence is gone and access pathways are closed. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ad1895f6/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 47 — Proactive Detection and Analysis: threat hunting and active defense fundamentals</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47 — Proactive Detection and Analysis: threat hunting and active defense fundamentals</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">85015322-ccb4-4f07-8310-8e9f6c95c685</guid>
      <link>https://share.transistor.fm/s/8f60ccc9</link>
      <description>
        <![CDATA[<p>This episode introduces threat hunting and active defense as proactive practices that complement alert-driven monitoring, which GSOM tests because SOC maturity includes finding what detections miss and increasing attacker friction. You will define threat hunting as hypothesis-driven analysis across data sources to discover suspicious patterns that have not yet triggered reliable alerts, and active defense as deliberate actions that improve visibility and constrain adversary movement without reckless interference. We will connect these concepts to exam relevance by explaining when a hunt is the right choice, how hunts inform detection engineering, and how active defense can be implemented safely through improved telemetry, controlled deception, and hardened pathways rather than risky counterattacks. Real-world scenarios include hunting for credential misuse across identity logs, suspicious process chains on endpoints, or lateral movement patterns in network data, with troubleshooting considerations like incomplete coverage, noisy baselines, and unclear success criteria. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces threat hunting and active defense as proactive practices that complement alert-driven monitoring, which GSOM tests because SOC maturity includes finding what detections miss and increasing attacker friction. You will define threat hunting as hypothesis-driven analysis across data sources to discover suspicious patterns that have not yet triggered reliable alerts, and active defense as deliberate actions that improve visibility and constrain adversary movement without reckless interference. We will connect these concepts to exam relevance by explaining when a hunt is the right choice, how hunts inform detection engineering, and how active defense can be implemented safely through improved telemetry, controlled deception, and hardened pathways rather than risky counterattacks. Real-world scenarios include hunting for credential misuse across identity logs, suspicious process chains on endpoints, or lateral movement patterns in network data, with troubleshooting considerations like incomplete coverage, noisy baselines, and unclear success criteria. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:05:29 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8f60ccc9/d5a58098.mp3" length="34758004" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>868</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces threat hunting and active defense as proactive practices that complement alert-driven monitoring, which GSOM tests because SOC maturity includes finding what detections miss and increasing attacker friction. You will define threat hunting as hypothesis-driven analysis across data sources to discover suspicious patterns that have not yet triggered reliable alerts, and active defense as deliberate actions that improve visibility and constrain adversary movement without reckless interference. We will connect these concepts to exam relevance by explaining when a hunt is the right choice, how hunts inform detection engineering, and how active defense can be implemented safely through improved telemetry, controlled deception, and hardened pathways rather than risky counterattacks. Real-world scenarios include hunting for credential misuse across identity logs, suspicious process chains on endpoints, or lateral movement patterns in network data, with troubleshooting considerations like incomplete coverage, noisy baselines, and unclear success criteria. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8f60ccc9/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 48 — Run the threat hunting process from hypothesis to defensible conclusions</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48 — Run the threat hunting process from hypothesis to defensible conclusions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">696ce9d5-11d0-41dd-a7c0-851f078d8737</guid>
      <link>https://share.transistor.fm/s/e6333517</link>
      <description>
        <![CDATA[<p>This episode teaches the full threat hunting workflow in a way the GSOM exam expects you to apply, emphasizing that hunts must produce defensible conclusions, not just interesting charts. You will learn how to form a hypothesis from threat intelligence, environmental knowledge, or observed anomalies, then translate it into specific questions your telemetry can answer, including what data sources, fields, and time ranges are required. We will discuss how to test hypotheses iteratively, refine queries, validate findings against known-good behavior, and document decisions so another analyst can reproduce the reasoning and results. Troubleshooting scenarios include false patterns caused by incomplete normalization, gaps created by missing endpoint or cloud logging, and ambiguous results that require targeted data collection or a focused follow-up hunt, with best practices for declaring outcomes such as confirmed malicious activity, benign explanation, or insufficient evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches the full threat hunting workflow in a way the GSOM exam expects you to apply, emphasizing that hunts must produce defensible conclusions, not just interesting charts. You will learn how to form a hypothesis from threat intelligence, environmental knowledge, or observed anomalies, then translate it into specific questions your telemetry can answer, including what data sources, fields, and time ranges are required. We will discuss how to test hypotheses iteratively, refine queries, validate findings against known-good behavior, and document decisions so another analyst can reproduce the reasoning and results. Troubleshooting scenarios include false patterns caused by incomplete normalization, gaps created by missing endpoint or cloud logging, and ambiguous results that require targeted data collection or a focused follow-up hunt, with best practices for declaring outcomes such as confirmed malicious activity, benign explanation, or insufficient evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:05:43 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e6333517/8636bd81.mp3" length="31097710" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>777</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches the full threat hunting workflow in a way the GSOM exam expects you to apply, emphasizing that hunts must produce defensible conclusions, not just interesting charts. You will learn how to form a hypothesis from threat intelligence, environmental knowledge, or observed anomalies, then translate it into specific questions your telemetry can answer, including what data sources, fields, and time ranges are required. We will discuss how to test hypotheses iteratively, refine queries, validate findings against known-good behavior, and document decisions so another analyst can reproduce the reasoning and results. Troubleshooting scenarios include false patterns caused by incomplete normalization, gaps created by missing endpoint or cloud logging, and ambiguous results that require targeted data collection or a focused follow-up hunt, with best practices for declaring outcomes such as confirmed malicious activity, benign explanation, or insufficient evidence. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e6333517/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 49 — Apply active defense techniques that increase visibility and adversary friction</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49 — Apply active defense techniques that increase visibility and adversary friction</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">91002347-037d-4ff4-86ab-f6742c93f635</guid>
      <link>https://share.transistor.fm/s/65ca6c0d</link>
      <description>
        <![CDATA[<p>This episode focuses on active defense techniques that strengthen detection and slow adversaries, which GSOM may test by presenting options that range from safe improvements to risky actions that create legal or operational problems. You will define “increasing visibility” as ensuring key attacker behaviors leave reliable evidence, such as improved endpoint telemetry, richer identity logging, stronger network flow coverage, and tighter audit logging on critical cloud and administrative planes. We will define “adversary friction” as raising the cost of attacker movement through segmentation, least privilege, stricter authentication controls, hardened admin workflows, and careful monitoring of high-risk pathways like remote access and privileged tooling. Real-world scenarios include restricting lateral movement using network controls, detecting suspicious admin actions through better audit trails, and instrumenting “canary” access patterns to highlight misuse, with troubleshooting considerations like exception sprawl, user impact, and the need to validate that the friction does not break required operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on active defense techniques that strengthen detection and slow adversaries, which GSOM may test by presenting options that range from safe improvements to risky actions that create legal or operational problems. You will define “increasing visibility” as ensuring key attacker behaviors leave reliable evidence, such as improved endpoint telemetry, richer identity logging, stronger network flow coverage, and tighter audit logging on critical cloud and administrative planes. We will define “adversary friction” as raising the cost of attacker movement through segmentation, least privilege, stricter authentication controls, hardened admin workflows, and careful monitoring of high-risk pathways like remote access and privileged tooling. Real-world scenarios include restricting lateral movement using network controls, detecting suspicious admin actions through better audit trails, and instrumenting “canary” access patterns to highlight misuse, with troubleshooting considerations like exception sprawl, user impact, and the need to validate that the friction does not break required operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:06:01 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/65ca6c0d/0502e4f3.mp3" length="35390165" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>884</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on active defense techniques that strengthen detection and slow adversaries, which GSOM may test by presenting options that range from safe improvements to risky actions that create legal or operational problems. You will define “increasing visibility” as ensuring key attacker behaviors leave reliable evidence, such as improved endpoint telemetry, richer identity logging, stronger network flow coverage, and tighter audit logging on critical cloud and administrative planes. We will define “adversary friction” as raising the cost of attacker movement through segmentation, least privilege, stricter authentication controls, hardened admin workflows, and careful monitoring of high-risk pathways like remote access and privileged tooling. Real-world scenarios include restricting lateral movement using network controls, detecting suspicious admin actions through better audit trails, and instrumenting “canary” access patterns to highlight misuse, with troubleshooting considerations like exception sprawl, user impact, and the need to validate that the friction does not break required operations. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/65ca6c0d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 50 — Use community sourced resources to supplement gaps in detection capabilities</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50 — Use community sourced resources to supplement gaps in detection capabilities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4cf50d3d-4693-4db5-ac5a-f92f06a1066b</guid>
      <link>https://share.transistor.fm/s/aee23f25</link>
      <description>
        <![CDATA[<p>This episode explains how to use community resources responsibly to accelerate detection coverage, which GSOM tests because leaders must balance speed with trust, quality, and operational fit. You will discuss how community detection content, threat reports, and shared hunting queries can provide starting points for new alerts and hunts, while emphasizing that everything must be validated against your telemetry, environment, and business workflows before it is operationalized. We will connect this to exam relevance by showing how to assess credibility, understand assumptions embedded in shared queries, and tune logic to reduce false positives while preserving the behavior you care about. Real-world scenarios include adopting a community query for suspicious authentication behavior, adapting a rule for endpoint persistence techniques, and using shared indicators for temporary monitoring, with troubleshooting considerations like field mismatches, different log schemas, and the risk of importing overly broad rules that flood analysts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to use community resources responsibly to accelerate detection coverage, which GSOM tests because leaders must balance speed with trust, quality, and operational fit. You will discuss how community detection content, threat reports, and shared hunting queries can provide starting points for new alerts and hunts, while emphasizing that everything must be validated against your telemetry, environment, and business workflows before it is operationalized. We will connect this to exam relevance by showing how to assess credibility, understand assumptions embedded in shared queries, and tune logic to reduce false positives while preserving the behavior you care about. Real-world scenarios include adopting a community query for suspicious authentication behavior, adapting a rule for endpoint persistence techniques, and using shared indicators for temporary monitoring, with troubleshooting considerations like field mismatches, different log schemas, and the risk of importing overly broad rules that flood analysts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:06:21 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/aee23f25/5faf0526.mp3" length="32429963" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>810</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to use community resources responsibly to accelerate detection coverage, which GSOM tests because leaders must balance speed with trust, quality, and operational fit. You will discuss how community detection content, threat reports, and shared hunting queries can provide starting points for new alerts and hunts, while emphasizing that everything must be validated against your telemetry, environment, and business workflows before it is operationalized. We will connect this to exam relevance by showing how to assess credibility, understand assumptions embedded in shared queries, and tune logic to reduce false positives while preserving the behavior you care about. Real-world scenarios include adopting a community query for suspicious authentication behavior, adapting a rule for endpoint persistence techniques, and using shared indicators for temporary monitoring, with troubleshooting considerations like field mismatches, different log schemas, and the risk of importing overly broad rules that flood analysts. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aee23f25/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 51 — Convert hunt results into improved detections, playbooks, and data needs</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51 — Convert hunt results into improved detections, playbooks, and data needs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22a085f5-e93e-4913-b703-22100b47d55f</guid>
      <link>https://share.transistor.fm/s/6509f663</link>
      <description>
        <![CDATA[<p>This episode explains how threat hunting creates lasting value only when results are converted into durable operational improvements, which GSOM tests by asking what to do after you discover a pattern, confirm suspicious behavior, or identify a visibility gap. You will define the main hunt outputs—confirmed malicious activity, confirmed benign behavior, and “inconclusive due to missing evidence”—and learn what each outcome should trigger in detection engineering, response playbooks, and collection priorities. We will walk through examples like turning a hunt discovery into a new correlation rule, updating triage steps to include a specific pivot, or adding required fields and retention to a log source so future investigations can prove scope faster. Troubleshooting considerations include hunts that produce vague findings, failure to document assumptions and query logic, and improvements that never get implemented due to unclear ownership, with best practices for creating action items that are testable, measurable, and integrated into standard SOC workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how threat hunting creates lasting value only when results are converted into durable operational improvements, which GSOM tests by asking what to do after you discover a pattern, confirm suspicious behavior, or identify a visibility gap. You will define the main hunt outputs—confirmed malicious activity, confirmed benign behavior, and “inconclusive due to missing evidence”—and learn what each outcome should trigger in detection engineering, response playbooks, and collection priorities. We will walk through examples like turning a hunt discovery into a new correlation rule, updating triage steps to include a specific pivot, or adding required fields and retention to a log source so future investigations can prove scope faster. Troubleshooting considerations include hunts that produce vague findings, failure to document assumptions and query logic, and improvements that never get implemented due to unclear ownership, with best practices for creating action items that are testable, measurable, and integrated into standard SOC workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:06:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6509f663/d62e9069.mp3" length="31422673" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>785</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how threat hunting creates lasting value only when results are converted into durable operational improvements, which GSOM tests by asking what to do after you discover a pattern, confirm suspicious behavior, or identify a visibility gap. You will define the main hunt outputs—confirmed malicious activity, confirmed benign behavior, and “inconclusive due to missing evidence”—and learn what each outcome should trigger in detection engineering, response playbooks, and collection priorities. We will walk through examples like turning a hunt discovery into a new correlation rule, updating triage steps to include a specific pivot, or adding required fields and retention to a log source so future investigations can prove scope faster. Troubleshooting considerations include hunts that produce vague findings, failure to document assumptions and query logic, and improvements that never get implemented due to unclear ownership, with best practices for creating action items that are testable, measurable, and integrated into standard SOC workflows. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6509f663/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 52 — Spaced Review: reinforce threat hunting, active defense, and community resource leverage</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52 — Spaced Review: reinforce threat hunting, active defense, and community resource leverage</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2bf7fe9e-d0fa-40f2-80dd-62824bc24cb2</guid>
      <link>https://share.transistor.fm/s/3f558ed5</link>
      <description>
        <![CDATA[<p>This episode consolidates proactive detection concepts that GSOM expects you to apply with confidence, especially when traditional alerts are not giving you enough clarity or coverage. You will revisit threat hunting as a hypothesis-driven process that demands clear questions, reliable telemetry, and defensible conclusions, then connect active defense to safe improvements that increase visibility and impose friction through hardened pathways and better auditing. We will also reinforce how community sourced resources can accelerate coverage, while emphasizing the exam-relevant discipline of validating assumptions, adapting queries to your schema, and tuning to prevent noise and false confidence. Short scenario cues will help you practice selecting the best next step when a hunt reveals a gap, when a shared detection rule floods the queue, or when leadership asks for proactive assurance after a high-profile threat report. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode consolidates proactive detection concepts that GSOM expects you to apply with confidence, especially when traditional alerts are not giving you enough clarity or coverage. You will revisit threat hunting as a hypothesis-driven process that demands clear questions, reliable telemetry, and defensible conclusions, then connect active defense to safe improvements that increase visibility and impose friction through hardened pathways and better auditing. We will also reinforce how community sourced resources can accelerate coverage, while emphasizing the exam-relevant discipline of validating assumptions, adapting queries to your schema, and tuning to prevent noise and false confidence. Short scenario cues will help you practice selecting the best next step when a hunt reveals a gap, when a shared detection rule floods the queue, or when leadership asks for proactive assurance after a high-profile threat report. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:06:49 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/3f558ed5/4825f730.mp3" length="33627440" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>840</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode consolidates proactive detection concepts that GSOM expects you to apply with confidence, especially when traditional alerts are not giving you enough clarity or coverage. You will revisit threat hunting as a hypothesis-driven process that demands clear questions, reliable telemetry, and defensible conclusions, then connect active defense to safe improvements that increase visibility and impose friction through hardened pathways and better auditing. We will also reinforce how community sourced resources can accelerate coverage, while emphasizing the exam-relevant discipline of validating assumptions, adapting queries to your schema, and tuning to prevent noise and false confidence. Short scenario cues will help you practice selecting the best next step when a hunt reveals a gap, when a shared detection rule floods the queue, or when leadership asks for proactive assurance after a high-profile threat report. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3f558ed5/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 53 — SOC Analytics and Metrics: choose measures that reflect progress and effectiveness</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53 — SOC Analytics and Metrics: choose measures that reflect progress and effectiveness</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">29e79cbe-14d9-454b-a99a-3b93605cfce4</guid>
      <link>https://share.transistor.fm/s/d1150a92</link>
      <description>
        <![CDATA[<p>This episode introduces SOC analytics and metrics as decision tools rather than vanity numbers, which GSOM tests because leaders must measure what matters, detect drift, and improve outcomes without incentivizing bad behavior. You will define the difference between activity metrics, quality metrics, and outcome metrics, and learn how to select measures that reflect detection effectiveness, response consistency, and investigative defensibility. We will discuss common metric pitfalls, such as optimizing for speed at the expense of accuracy, counting alerts instead of measuring risk reduction, and using averages that hide extreme delays during surge events. Exam-focused scenarios include choosing metrics for a new SOC, deciding what to report to executives versus what to use for internal coaching, and troubleshooting a situation where the team is “meeting SLAs” but still missing incidents due to blind spots, noise, or weak escalation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode introduces SOC analytics and metrics as decision tools rather than vanity numbers, which GSOM tests because leaders must measure what matters, detect drift, and improve outcomes without incentivizing bad behavior. You will define the difference between activity metrics, quality metrics, and outcome metrics, and learn how to select measures that reflect detection effectiveness, response consistency, and investigative defensibility. We will discuss common metric pitfalls, such as optimizing for speed at the expense of accuracy, counting alerts instead of measuring risk reduction, and using averages that hide extreme delays during surge events. Exam-focused scenarios include choosing metrics for a new SOC, deciding what to report to executives versus what to use for internal coaching, and troubleshooting a situation where the team is “meeting SLAs” but still missing incidents due to blind spots, noise, or weak escalation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:07:01 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d1150a92/ca9c9bac.mp3" length="42045126" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1051</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode introduces SOC analytics and metrics as decision tools rather than vanity numbers, which GSOM tests because leaders must measure what matters, detect drift, and improve outcomes without incentivizing bad behavior. You will define the difference between activity metrics, quality metrics, and outcome metrics, and learn how to select measures that reflect detection effectiveness, response consistency, and investigative defensibility. We will discuss common metric pitfalls, such as optimizing for speed at the expense of accuracy, counting alerts instead of measuring risk reduction, and using averages that hide extreme delays during surge events. Exam-focused scenarios include choosing metrics for a new SOC, deciding what to report to executives versus what to use for internal coaching, and troubleshooting a situation where the team is “meeting SLAs” but still missing incidents due to blind spots, noise, or weak escalation. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d1150a92/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 54 — Set SOC goals and analytics that guide continuous maturity planning</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54 — Set SOC goals and analytics that guide continuous maturity planning</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8e0f66b-4fe5-42cf-87fb-834992c15ae1</guid>
      <link>https://share.transistor.fm/s/b102f904</link>
      <description>
        <![CDATA[<p>This episode teaches how to set SOC goals that are specific enough to guide day-to-day choices and long-term maturity, a GSOM expectation because exam questions often ask what to prioritize next when resources are limited. You will define good goals as ones tied to mission outcomes, such as improved detection coverage for critical attack paths, reduced time to contain high-confidence incidents, or increased investigation completeness through better data and playbooks. We will show how analytics supports these goals by turning them into measurable indicators, including leading indicators that predict problems, such as backlog growth or parser failures, and lagging indicators that confirm improvement, such as reduced recurrence of the same incident type. Troubleshooting considerations include goals that are too broad, metrics that cannot be measured reliably due to inconsistent case documentation, and conflicting goals across teams, with best practices for baselining, setting realistic targets, and reviewing progress on a regular operational rhythm. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to set SOC goals that are specific enough to guide day-to-day choices and long-term maturity, a GSOM expectation because exam questions often ask what to prioritize next when resources are limited. You will define good goals as ones tied to mission outcomes, such as improved detection coverage for critical attack paths, reduced time to contain high-confidence incidents, or increased investigation completeness through better data and playbooks. We will show how analytics supports these goals by turning them into measurable indicators, including leading indicators that predict problems, such as backlog growth or parser failures, and lagging indicators that confirm improvement, such as reduced recurrence of the same incident type. Troubleshooting considerations include goals that are too broad, metrics that cannot be measured reliably due to inconsistent case documentation, and conflicting goals across teams, with best practices for baselining, setting realistic targets, and reviewing progress on a regular operational rhythm. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:07:15 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b102f904/12f0c6bb.mp3" length="41691920" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1042</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to set SOC goals that are specific enough to guide day-to-day choices and long-term maturity, a GSOM expectation because exam questions often ask what to prioritize next when resources are limited. You will define good goals as ones tied to mission outcomes, such as improved detection coverage for critical attack paths, reduced time to contain high-confidence incidents, or increased investigation completeness through better data and playbooks. We will show how analytics supports these goals by turning them into measurable indicators, including leading indicators that predict problems, such as backlog growth or parser failures, and lagging indicators that confirm improvement, such as reduced recurrence of the same incident type. Troubleshooting considerations include goals that are too broad, metrics that cannot be measured reliably due to inconsistent case documentation, and conflicting goals across teams, with best practices for baselining, setting realistic targets, and reviewing progress on a regular operational rhythm. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b102f904/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 55 — Analyze SOC operations to find bottlenecks, gaps, and high-impact improvements</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55 — Analyze SOC operations to find bottlenecks, gaps, and high-impact improvements</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef96273a-998e-44af-b178-10c32f399213</guid>
      <link>https://share.transistor.fm/s/b9bbbb2a</link>
      <description>
        <![CDATA[<p>This episode focuses on operational analysis as a way to identify where your SOC is losing time, losing quality, or losing visibility, which GSOM tests by presenting symptoms and asking for the most effective corrective action. You will learn how to examine workflows from alert intake through triage, investigation, escalation, and closure, and how to use evidence such as queue age, reopens, handoff delays, and missing context fields to locate true bottlenecks. We will discuss gap analysis that looks beyond staffing, including detection coverage gaps, enrichment failures, inconsistent severity logic, and unclear ownership that forces analysts into slow, manual coordination. Real-world scenarios include a SOC that cannot keep up after onboarding a new log source, a team that spends most of its time chasing false positives, and a situation where escalation is slow because approvals are ambiguous, with best practices for prioritizing fixes that improve outcomes quickly and sustainably. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on operational analysis as a way to identify where your SOC is losing time, losing quality, or losing visibility, which GSOM tests by presenting symptoms and asking for the most effective corrective action. You will learn how to examine workflows from alert intake through triage, investigation, escalation, and closure, and how to use evidence such as queue age, reopens, handoff delays, and missing context fields to locate true bottlenecks. We will discuss gap analysis that looks beyond staffing, including detection coverage gaps, enrichment failures, inconsistent severity logic, and unclear ownership that forces analysts into slow, manual coordination. Real-world scenarios include a SOC that cannot keep up after onboarding a new log source, a team that spends most of its time chasing false positives, and a situation where escalation is slow because approvals are ambiguous, with best practices for prioritizing fixes that improve outcomes quickly and sustainably. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:07:31 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b9bbbb2a/8b9ad2f9.mp3" length="45795257" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1144</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on operational analysis as a way to identify where your SOC is losing time, losing quality, or losing visibility, which GSOM tests by presenting symptoms and asking for the most effective corrective action. You will learn how to examine workflows from alert intake through triage, investigation, escalation, and closure, and how to use evidence such as queue age, reopens, handoff delays, and missing context fields to locate true bottlenecks. We will discuss gap analysis that looks beyond staffing, including detection coverage gaps, enrichment failures, inconsistent severity logic, and unclear ownership that forces analysts into slow, manual coordination. Real-world scenarios include a SOC that cannot keep up after onboarding a new log source, a team that spends most of its time chasing false positives, and a situation where escalation is slow because approvals are ambiguous, with best practices for prioritizing fixes that improve outcomes quickly and sustainably. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b9bbbb2a/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 56 — Build a strategic plan that turns metrics into sustained operational change</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56 — Build a strategic plan that turns metrics into sustained operational change</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">25d22509-855a-4416-80dc-6ac69a05f70a</guid>
      <link>https://share.transistor.fm/s/e5bd7809</link>
      <description>
        <![CDATA[<p>This episode teaches how to convert metrics into a strategic improvement plan that survives beyond a single initiative, which GSOM tests because SOC leadership must demonstrate continuous maturity instead of reactive firefighting. You will define a strategic plan as a prioritized set of improvements with clear outcomes, owners, timelines, and validation methods, where metrics provide both the baseline and the proof that changes worked. We will cover how to balance quick wins, like tuning high-noise detections, with foundational investments, like improving data quality, case discipline, or identity logging, and how to sequence work so you do not create new blind spots while fixing old problems. Troubleshooting considerations include plans that chase too many metrics at once, initiatives that lack operational buy-in, and improvements that cannot be validated due to poor measurement hygiene, with best practices for small iterative milestones and recurring reviews that keep progress honest. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches how to convert metrics into a strategic improvement plan that survives beyond a single initiative, which GSOM tests because SOC leadership must demonstrate continuous maturity instead of reactive firefighting. You will define a strategic plan as a prioritized set of improvements with clear outcomes, owners, timelines, and validation methods, where metrics provide both the baseline and the proof that changes worked. We will cover how to balance quick wins, like tuning high-noise detections, with foundational investments, like improving data quality, case discipline, or identity logging, and how to sequence work so you do not create new blind spots while fixing old problems. Troubleshooting considerations include plans that chase too many metrics at once, initiatives that lack operational buy-in, and improvements that cannot be validated due to poor measurement hygiene, with best practices for small iterative milestones and recurring reviews that keep progress honest. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:08:05 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e5bd7809/3d928d1d.mp3" length="43497520" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1087</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches how to convert metrics into a strategic improvement plan that survives beyond a single initiative, which GSOM tests because SOC leadership must demonstrate continuous maturity instead of reactive firefighting. You will define a strategic plan as a prioritized set of improvements with clear outcomes, owners, timelines, and validation methods, where metrics provide both the baseline and the proof that changes worked. We will cover how to balance quick wins, like tuning high-noise detections, with foundational investments, like improving data quality, case discipline, or identity logging, and how to sequence work so you do not create new blind spots while fixing old problems. Troubleshooting considerations include plans that chase too many metrics at once, initiatives that lack operational buy-in, and improvements that cannot be validated due to poor measurement hygiene, with best practices for small iterative milestones and recurring reviews that keep progress honest. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e5bd7809/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 57 — Communicate SOC performance with metrics leaders trust and teams respect</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57 — Communicate SOC performance with metrics leaders trust and teams respect</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">57ccd046-0496-4a1f-b161-920081adcf38</guid>
      <link>https://share.transistor.fm/s/9ec33071</link>
      <description>
        <![CDATA[<p>This episode explains how to communicate SOC performance in a way that earns trust, because GSOM expects leaders to report clearly without hiding problems or punishing the team through misleading numbers. You will learn to choose metrics that are credible, explainable, and connected to business risk, then present them with context that shows what changed, why it changed, and what actions are underway. We will discuss how to avoid common failures such as reporting only positive metrics, using technical jargon that leaders cannot map to outcomes, or sharing metrics that feel like surveillance to analysts and reduce morale. Exam-style scenarios include an executive asking whether the SOC is “getting better,” a board-level request for risk assurance after an incident, and internal debates about whether metrics are driving the right behavior, with best practices for narrative discipline, transparency, and aligning definitions across stakeholders. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains how to communicate SOC performance in a way that earns trust, because GSOM expects leaders to report clearly without hiding problems or punishing the team through misleading numbers. You will learn to choose metrics that are credible, explainable, and connected to business risk, then present them with context that shows what changed, why it changed, and what actions are underway. We will discuss how to avoid common failures such as reporting only positive metrics, using technical jargon that leaders cannot map to outcomes, or sharing metrics that feel like surveillance to analysts and reduce morale. Exam-style scenarios include an executive asking whether the SOC is “getting better,” a board-level request for risk assurance after an incident, and internal debates about whether metrics are driving the right behavior, with best practices for narrative discipline, transparency, and aligning definitions across stakeholders. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:08:36 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9ec33071/aea6d9b3.mp3" length="42977155" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1074</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains how to communicate SOC performance in a way that earns trust, because GSOM expects leaders to report clearly without hiding problems or punishing the team through misleading numbers. You will learn to choose metrics that are credible, explainable, and connected to business risk, then present them with context that shows what changed, why it changed, and what actions are underway. We will discuss how to avoid common failures such as reporting only positive metrics, using technical jargon that leaders cannot map to outcomes, or sharing metrics that feel like surveillance to analysts and reduce morale. Exam-style scenarios include an executive asking whether the SOC is “getting better,” a board-level request for risk assurance after an incident, and internal debates about whether metrics are driving the right behavior, with best practices for narrative discipline, transparency, and aligning definitions across stakeholders. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9ec33071/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 58 — Spaced Review: make metrics, analytics, and planning feel automatic under pressure</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58 — Spaced Review: make metrics, analytics, and planning feel automatic under pressure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">796a0f5e-5d8d-4310-80b7-b3a58f0a0912</guid>
      <link>https://share.transistor.fm/s/145d0005</link>
      <description>
        <![CDATA[<p>This episode reinforces the analytics mindset that GSOM tests: metrics are tools for better decisions, not decorations, and they must be chosen, interpreted, and acted on consistently even when operations are busy. You will revisit how to distinguish activity from outcomes, how to set goals that map to detection and response maturity, and how to diagnose bottlenecks using evidence from queues, handoffs, false positives, and missing context. We will connect those insights to planning by practicing how to choose the highest-impact improvement initiative when multiple metrics are trending the wrong direction, and how to define success in a way that can be measured and verified. Short scenario prompts will help you practice communicating metrics to leaders and teams without gaming the numbers, emphasizing clarity, shared definitions, and accountability for sustained change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode reinforces the analytics mindset that GSOM tests: metrics are tools for better decisions, not decorations, and they must be chosen, interpreted, and acted on consistently even when operations are busy. You will revisit how to distinguish activity from outcomes, how to set goals that map to detection and response maturity, and how to diagnose bottlenecks using evidence from queues, handoffs, false positives, and missing context. We will connect those insights to planning by practicing how to choose the highest-impact improvement initiative when multiple metrics are trending the wrong direction, and how to define success in a way that can be measured and verified. Short scenario prompts will help you practice communicating metrics to leaders and teams without gaming the numbers, emphasizing clarity, shared definitions, and accountability for sustained change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:08:55 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/145d0005/23701dca.mp3" length="34517681" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>862</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode reinforces the analytics mindset that GSOM tests: metrics are tools for better decisions, not decorations, and they must be chosen, interpreted, and acted on consistently even when operations are busy. You will revisit how to distinguish activity from outcomes, how to set goals that map to detection and response maturity, and how to diagnose bottlenecks using evidence from queues, handoffs, false positives, and missing context. We will connect those insights to planning by practicing how to choose the highest-impact improvement initiative when multiple metrics are trending the wrong direction, and how to define success in a way that can be measured and verified. Short scenario prompts will help you practice communicating metrics to leaders and teams without gaming the numbers, emphasizing clarity, shared definitions, and accountability for sustained change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/145d0005/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 59 — Continuous Improvement: use post-incident data to fuel future growth</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59 — Continuous Improvement: use post-incident data to fuel future growth</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">64d50781-d72f-4515-9d83-87bcae2472db</guid>
      <link>https://share.transistor.fm/s/913e520f</link>
      <description>
        <![CDATA[<p>This episode focuses on continuous improvement as a repeatable loop that uses post-incident evidence to strengthen the SOC, which GSOM tests because mature operations treat every incident as data for better prevention, detection, and response. You will learn how to extract improvement signals from timelines, decision logs, and investigation gaps, then convert them into prioritized changes such as better alert logic, improved enrichment, clearer escalation thresholds, or stronger access and logging readiness. We will discuss how to avoid shallow takeaways by separating root causes from contributing factors, measuring the operational cost of delays, and validating that fixes actually reduce recurrence or improve time to contain. Troubleshooting considerations include incidents that appear “resolved” but leave unanswered questions due to missing telemetry, changes that create new noise, and improvement backlogs that never close, with best practices for ownership, deadlines, verification tests, and periodic re-measurement. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on continuous improvement as a repeatable loop that uses post-incident evidence to strengthen the SOC, which GSOM tests because mature operations treat every incident as data for better prevention, detection, and response. You will learn how to extract improvement signals from timelines, decision logs, and investigation gaps, then convert them into prioritized changes such as better alert logic, improved enrichment, clearer escalation thresholds, or stronger access and logging readiness. We will discuss how to avoid shallow takeaways by separating root causes from contributing factors, measuring the operational cost of delays, and validating that fixes actually reduce recurrence or improve time to contain. Troubleshooting considerations include incidents that appear “resolved” but leave unanswered questions due to missing telemetry, changes that create new noise, and improvement backlogs that never close, with best practices for ownership, deadlines, verification tests, and periodic re-measurement. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:09:08 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/913e520f/f1a87ee2.mp3" length="45565359" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1139</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on continuous improvement as a repeatable loop that uses post-incident evidence to strengthen the SOC, which GSOM tests because mature operations treat every incident as data for better prevention, detection, and response. You will learn how to extract improvement signals from timelines, decision logs, and investigation gaps, then convert them into prioritized changes such as better alert logic, improved enrichment, clearer escalation thresholds, or stronger access and logging readiness. We will discuss how to avoid shallow takeaways by separating root causes from contributing factors, measuring the operational cost of delays, and validating that fixes actually reduce recurrence or improve time to contain. Troubleshooting considerations include incidents that appear “resolved” but leave unanswered questions due to missing telemetry, changes that create new noise, and improvement backlogs that never close, with best practices for ownership, deadlines, verification tests, and periodic re-measurement. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/913e520f/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 60 — Automate repetitive SOC tasks to boost consistency and reduce burnout</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Episode 60 — Automate repetitive SOC tasks to boost consistency and reduce burnout</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0a73f566-f81a-45ed-8aea-81112953c907</guid>
      <link>https://share.transistor.fm/s/377e2619</link>
      <description>
        <![CDATA[<p>This episode teaches automation as a controlled way to improve consistency and free analysts for higher-value thinking, which GSOM tests by asking what should be automated, what should remain human-approved, and how to avoid automating mistakes at scale. You will define good automation candidates as repetitive, well-understood tasks with clear success criteria, such as enrichment lookups, evidence collection steps, ticket creation, deduplication, and routing, while emphasizing guardrails like least privilege, approval checkpoints for disruptive actions, and thorough logging of every automated step. We will apply the concept to exam scenarios such as an overwhelmed triage queue, inconsistent case notes, or slow incident scoping due to manual pivots, and show how automation can standardize the early workflow without turning response into an unsafe “push-button” action. Troubleshooting considerations include brittle integrations, poor error handling, automation loops that flood systems, and the need for rollback and health monitoring so automation remains trustworthy as environments change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode teaches automation as a controlled way to improve consistency and free analysts for higher-value thinking, which GSOM tests by asking what should be automated, what should remain human-approved, and how to avoid automating mistakes at scale. You will define good automation candidates as repetitive, well-understood tasks with clear success criteria, such as enrichment lookups, evidence collection steps, ticket creation, deduplication, and routing, while emphasizing guardrails like least privilege, approval checkpoints for disruptive actions, and thorough logging of every automated step. We will apply the concept to exam scenarios such as an overwhelmed triage queue, inconsistent case notes, or slow incident scoping due to manual pivots, and show how automation can standardize the early workflow without turning response into an unsafe “push-button” action. Troubleshooting considerations include brittle integrations, poor error handling, automation loops that flood systems, and the need for rollback and health monitoring so automation remains trustworthy as environments change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 11:09:27 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/377e2619/0690db2f.mp3" length="39423451" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>985</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode teaches automation as a controlled way to improve consistency and free analysts for higher-value thinking, which GSOM tests by asking what should be automated, what should remain human-approved, and how to avoid automating mistakes at scale. You will define good automation candidates as repetitive, well-understood tasks with clear success criteria, such as enrichment lookups, evidence collection steps, ticket creation, deduplication, and routing, while emphasizing guardrails like least privilege, approval checkpoints for disruptive actions, and thorough logging of every automated step. We will apply the concept to exam scenarios such as an overwhelmed triage queue, inconsistent case notes, or slow incident scoping due to manual pivots, and show how automation can standardize the early workflow without turning response into an unsafe “push-button” action. Troubleshooting considerations include brittle integrations, poor error handling, automation loops that flood systems, and the need for rollback and health monitoring so automation remains trustworthy as environments change. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/377e2619/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 61 — Validate detections with analytic testing before attackers exploit your gaps</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Episode 61 — Validate detections with analytic testing before attackers exploit your gaps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c8fd4d5f-e6ba-4fa1-a85d-dd2a2a8bc6e4</guid>
      <link>https://share.transistor.fm/s/74f3825d</link>
      <description>
        <![CDATA[<p>This episode explains detection validation as a disciplined testing practice, because the GSOM exam expects you to recognize that detections are hypotheses that must be proven reliable before you trust them in production. You will define analytic testing as the process of confirming that a detection fires for the right behavior, includes the right context for triage, and does not create unacceptable false positives or operational risk. We will connect this to exam relevance by showing how leaders should validate detections against known attacker techniques, expected log fields, and realistic environmental noise, then document assumptions and limitations so analysts know what an alert truly means. Real-world scenarios include a correlation rule that fails silently because a parser changed, an EDR alert that lacks process ancestry, and a cloud audit rule that floods during normal maintenance, with best practices for test cases, baselining, staging changes, and measuring performance before full rollout. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode explains detection validation as a disciplined testing practice, because the GSOM exam expects you to recognize that detections are hypotheses that must be proven reliable before you trust them in production. You will define analytic testing as the process of confirming that a detection fires for the right behavior, includes the right context for triage, and does not create unacceptable false positives or operational risk. We will connect this to exam relevance by showing how leaders should validate detections against known attacker techniques, expected log fields, and realistic environmental noise, then document assumptions and limitations so analysts know what an alert truly means. Real-world scenarios include a correlation rule that fails silently because a parser changed, an EDR alert that lacks process ancestry, and a cloud audit rule that floods during normal maintenance, with best practices for test cases, baselining, staging changes, and measuring performance before full rollout. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 20:53:24 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/74f3825d/78abd2f3.mp3" length="34954436" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>873</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode explains detection validation as a disciplined testing practice, because the GSOM exam expects you to recognize that detections are hypotheses that must be proven reliable before you trust them in production. You will define analytic testing as the process of confirming that a detection fires for the right behavior, includes the right context for triage, and does not create unacceptable false positives or operational risk. We will connect this to exam relevance by showing how leaders should validate detections against known attacker techniques, expected log fields, and realistic environmental noise, then document assumptions and limitations so analysts know what an alert truly means. Real-world scenarios include a correlation rule that fails silently because a parser changed, an EDR alert that lacks process ancestry, and a cloud audit rule that floods during normal maintenance, with best practices for test cases, baselining, staging changes, and measuring performance before full rollout. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/74f3825d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 62 — Apply adversarial emulation to stress-test SOC people, process, and tools</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Episode 62 — Apply adversarial emulation to stress-test SOC people, process, and tools</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2debb0d0-357f-417e-9b9c-5ee7200c28cf</guid>
      <link>https://share.transistor.fm/s/647700d7</link>
      <description>
        <![CDATA[<p>This episode covers adversarial emulation as a controlled way to evaluate SOC readiness, which GSOM may test by asking how to find real gaps in detection, response coordination, and decision quality without waiting for a real incident. You will define adversarial emulation as executing planned attacker-like behaviors in a safe, authorized manner to verify that telemetry, alerts, playbooks, and escalation paths work as intended. We will tie this to exam scenarios by focusing on what to measure: whether the SOC detects the activity, how quickly triage happens, whether the investigation can prove scope, and whether containment actions are approved and executed without harming business operations. You will also explore common pitfalls, such as emulation that does not match your environment, unrealistic “perfect telemetry” assumptions, or tests that produce noise without clear success criteria, along with best practices for scoping, safety guardrails, and converting findings into concrete detection and process improvements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers adversarial emulation as a controlled way to evaluate SOC readiness, which GSOM may test by asking how to find real gaps in detection, response coordination, and decision quality without waiting for a real incident. You will define adversarial emulation as executing planned attacker-like behaviors in a safe, authorized manner to verify that telemetry, alerts, playbooks, and escalation paths work as intended. We will tie this to exam scenarios by focusing on what to measure: whether the SOC detects the activity, how quickly triage happens, whether the investigation can prove scope, and whether containment actions are approved and executed without harming business operations. You will also explore common pitfalls, such as emulation that does not match your environment, unrealistic “perfect telemetry” assumptions, or tests that produce noise without clear success criteria, along with best practices for scoping, safety guardrails, and converting findings into concrete detection and process improvements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 20:53:41 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/647700d7/74ddeeb6.mp3" length="38819508" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>970</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers adversarial emulation as a controlled way to evaluate SOC readiness, which GSOM may test by asking how to find real gaps in detection, response coordination, and decision quality without waiting for a real incident. You will define adversarial emulation as executing planned attacker-like behaviors in a safe, authorized manner to verify that telemetry, alerts, playbooks, and escalation paths work as intended. We will tie this to exam scenarios by focusing on what to measure: whether the SOC detects the activity, how quickly triage happens, whether the investigation can prove scope, and whether containment actions are approved and executed without harming business operations. You will also explore common pitfalls, such as emulation that does not match your environment, unrealistic “perfect telemetry” assumptions, or tests that produce noise without clear success criteria, along with best practices for scoping, safety guardrails, and converting findings into concrete detection and process improvements. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/647700d7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 63 — Essential Terms: Plain-Language Glossary for Fast Recall</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Episode 63 — Essential Terms: Plain-Language Glossary for Fast Recall</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f402b9fd-2ae7-42f3-ad59-5cda874582db</guid>
      <link>https://share.transistor.fm/s/039e5aa7</link>
      <description>
        <![CDATA[<p>This episode is a focused glossary pass designed for rapid recall under exam conditions, because GSOM questions often hinge on precise meaning and operational implications rather than memorizing buzzwords. You will review essential terms across SOC planning, telemetry, alerting, incident response, threat hunting, and metrics, with each term framed as “what it means in practice” and “what decision it supports.” We will connect vocabulary to exam relevance by highlighting how small wording differences change the best answer, such as severity versus confidence, containment versus eradication, use case versus detection logic, and activity metrics versus outcome metrics. You will also practice recognizing when the exam is testing process discipline, evidentiary thinking, or business alignment based on the terms used in the prompt, and we will include short operational examples to reinforce meaning without drifting into filler. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode is a focused glossary pass designed for rapid recall under exam conditions, because GSOM questions often hinge on precise meaning and operational implications rather than memorizing buzzwords. You will review essential terms across SOC planning, telemetry, alerting, incident response, threat hunting, and metrics, with each term framed as “what it means in practice” and “what decision it supports.” We will connect vocabulary to exam relevance by highlighting how small wording differences change the best answer, such as severity versus confidence, containment versus eradication, use case versus detection logic, and activity metrics versus outcome metrics. You will also practice recognizing when the exam is testing process discipline, evidentiary thinking, or business alignment based on the terms used in the prompt, and we will include short operational examples to reinforce meaning without drifting into filler. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 20:54:04 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/039e5aa7/45d19a6e.mp3" length="42419147" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1060</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode is a focused glossary pass designed for rapid recall under exam conditions, because GSOM questions often hinge on precise meaning and operational implications rather than memorizing buzzwords. You will review essential terms across SOC planning, telemetry, alerting, incident response, threat hunting, and metrics, with each term framed as “what it means in practice” and “what decision it supports.” We will connect vocabulary to exam relevance by highlighting how small wording differences change the best answer, such as severity versus confidence, containment versus eradication, use case versus detection logic, and activity metrics versus outcome metrics. You will also practice recognizing when the exam is testing process discipline, evidentiary thinking, or business alignment based on the terms used in the prompt, and we will include short operational examples to reinforce meaning without drifting into filler. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/039e5aa7/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 64 — Final Review: weave every GSOM objective into one coherent SOC operating model</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Episode 64 — Final Review: weave every GSOM objective into one coherent SOC operating model</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">31644d10-05bc-4ce2-b1b0-414679ec24a0</guid>
      <link>https://share.transistor.fm/s/75adb679</link>
      <description>
        <![CDATA[<p>This episode integrates the full GSOM scope into a single operating model, because the exam rewards candidates who can connect planning, tooling, telemetry, alerting, incident response, hunting, and metrics into a consistent set of choices rather than treating them as separate topics. You will walk through the SOC lifecycle end to end: defining mission and coverage, selecting and securing tools, collecting and enriching data, building and tuning detections, executing incident response with evidence and approvals, running proactive hunts, and using metrics to drive continuous improvement. We will emphasize the exam’s “best next step” logic by showing how decisions flow from constraints like limited visibility, staffing limits, and business impact, and how to defend tradeoffs without overpromising coverage or taking reckless actions. The goal is to leave you with a mental map you can apply to any scenario prompt, ensuring your answers align with a mature, realistic SOC that can be operated and audited. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode integrates the full GSOM scope into a single operating model, because the exam rewards candidates who can connect planning, tooling, telemetry, alerting, incident response, hunting, and metrics into a consistent set of choices rather than treating them as separate topics. You will walk through the SOC lifecycle end to end: defining mission and coverage, selecting and securing tools, collecting and enriching data, building and tuning detections, executing incident response with evidence and approvals, running proactive hunts, and using metrics to drive continuous improvement. We will emphasize the exam’s “best next step” logic by showing how decisions flow from constraints like limited visibility, staffing limits, and business impact, and how to defend tradeoffs without overpromising coverage or taking reckless actions. The goal is to leave you with a mental map you can apply to any scenario prompt, ensuring your answers align with a mature, realistic SOC that can be operated and audited. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 20:54:24 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/75adb679/5fde5b02.mp3" length="45052334" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>1126</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode integrates the full GSOM scope into a single operating model, because the exam rewards candidates who can connect planning, tooling, telemetry, alerting, incident response, hunting, and metrics into a consistent set of choices rather than treating them as separate topics. You will walk through the SOC lifecycle end to end: defining mission and coverage, selecting and securing tools, collecting and enriching data, building and tuning detections, executing incident response with evidence and approvals, running proactive hunts, and using metrics to drive continuous improvement. We will emphasize the exam’s “best next step” logic by showing how decisions flow from constraints like limited visibility, staffing limits, and business impact, and how to defend tradeoffs without overpromising coverage or taking reckless actions. The goal is to leave you with a mental map you can apply to any scenario prompt, ensuring your answers align with a mature, realistic SOC that can be operated and audited. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/75adb679/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 65 — Exam-Day Tactics: mental models for triage and confident GSOM answers</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>Episode 65 — Exam-Day Tactics: mental models for triage and confident GSOM answers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fbedccd2-933e-4d32-b1e2-fd33f8301981</guid>
      <link>https://share.transistor.fm/s/1ebc88fd</link>
      <description>
        <![CDATA[<p>This episode prepares you for exam-day decision making by treating each question like a mini triage event: identify what is being tested, classify the situation, choose the safest high-value next action, and avoid choices that create evidence loss or uncontrolled business disruption. You will learn mental models for quickly spotting the domain in play, such as whether the prompt is really about data quality, alert lifecycle management, incident response sequencing, or metrics-driven leadership, and how to use keywords to infer constraints like authority, timing, and visibility. We will cover practical tactics such as eliminating answers that overreach, prioritizing options that preserve investigation integrity, and selecting actions that are repeatable and measurable, which aligns with GSOM’s focus on operational maturity. This is the last episode in the provided list. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode prepares you for exam-day decision making by treating each question like a mini triage event: identify what is being tested, classify the situation, choose the safest high-value next action, and avoid choices that create evidence loss or uncontrolled business disruption. You will learn mental models for quickly spotting the domain in play, such as whether the prompt is really about data quality, alert lifecycle management, incident response sequencing, or metrics-driven leadership, and how to use keywords to infer constraints like authority, timing, and visibility. We will cover practical tactics such as eliminating answers that overreach, prioritizing options that preserve investigation integrity, and selecting actions that are repeatable and measurable, which aligns with GSOM’s focus on operational maturity. This is the last episode in the provided list. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 20:54:38 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1ebc88fd/bd50363e.mp3" length="38626194" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>965</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode prepares you for exam-day decision making by treating each question like a mini triage event: identify what is being tested, classify the situation, choose the safest high-value next action, and avoid choices that create evidence loss or uncontrolled business disruption. You will learn mental models for quickly spotting the domain in play, such as whether the prompt is really about data quality, alert lifecycle management, incident response sequencing, or metrics-driven leadership, and how to use keywords to infer constraints like authority, timing, and visibility. We will cover practical tactics such as eliminating answers that overreach, prioritizing options that preserve investigation integrity, and selecting actions that are repeatable and measurable, which aligns with GSOM’s focus on operational maturity. This is the last episode in the provided list. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1ebc88fd/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Welcome to the GIAC GSOM Audio Course</title>
      <itunes:title>Welcome to the GIAC GSOM Audio Course</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">b9dc4583-e1d7-4997-afa0-9531dffdec2d</guid>
      <link>https://share.transistor.fm/s/1f547a50</link>
      <description>
        <![CDATA[<p>Certified: The ISACA GSOM Audio Course is built for security leaders, managers, and senior practitioners who need to run a security program that holds up under real pressure. If you’re stepping into a security operations management role, leveling up from hands-on work into leadership, or trying to bring order to a messy set of tools and processes, this course is for you. It assumes you understand the basics of security and IT, but it does not assume you’ve had years to formalize operations, metrics, staffing, or governance. The focus stays practical: how to make daily operations predictable, how to lead people through incidents and change, and how to communicate risk in a way the business will actually act on.</p><p>In Certified: The ISACA GSOM Audio Course, you’ll learn how to translate security strategy into operating rhythm, roles, workflows, and measurable outcomes. We’ll cover how to structure a security operations function, define service expectations, prioritize work, and build a repeatable approach to monitoring, response, vulnerability management, and continuous improvement. You’ll also work through the management layer that often gets skipped: budgeting, staffing models, skills planning, reporting, and alignment with enterprise risk and compliance needs. Because it’s audio-first, you can learn in short blocks that fit your schedule, and each lesson is designed to be clear enough to replay on a commute and still apply when you’re back at the keyboard.</p><p>What makes Certified: The ISACA GSOM Audio Course different is that it treats security operations as a living system, not a checklist. You’ll hear how strong programs make decisions, document tradeoffs, and keep teams focused when the environment changes. The course balances exam readiness with job readiness, so you’re not just memorizing terms—you’re building a mental model you can use in meetings, during incidents, and while planning the next quarter. Success looks like this: you can explain your operating model, defend your priorities, measure what matters, and lead a team that delivers consistent results without burning out.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Certified: The ISACA GSOM Audio Course is built for security leaders, managers, and senior practitioners who need to run a security program that holds up under real pressure. If you’re stepping into a security operations management role, leveling up from hands-on work into leadership, or trying to bring order to a messy set of tools and processes, this course is for you. It assumes you understand the basics of security and IT, but it does not assume you’ve had years to formalize operations, metrics, staffing, or governance. The focus stays practical: how to make daily operations predictable, how to lead people through incidents and change, and how to communicate risk in a way the business will actually act on.</p><p>In Certified: The ISACA GSOM Audio Course, you’ll learn how to translate security strategy into operating rhythm, roles, workflows, and measurable outcomes. We’ll cover how to structure a security operations function, define service expectations, prioritize work, and build a repeatable approach to monitoring, response, vulnerability management, and continuous improvement. You’ll also work through the management layer that often gets skipped: budgeting, staffing models, skills planning, reporting, and alignment with enterprise risk and compliance needs. Because it’s audio-first, you can learn in short blocks that fit your schedule, and each lesson is designed to be clear enough to replay on a commute and still apply when you’re back at the keyboard.</p><p>What makes Certified: The ISACA GSOM Audio Course different is that it treats security operations as a living system, not a checklist. You’ll hear how strong programs make decisions, document tradeoffs, and keep teams focused when the environment changes. The course balances exam readiness with job readiness, so you’re not just memorizing terms—you’re building a mental model you can use in meetings, during incidents, and while planning the next quarter. Success looks like this: you can explain your operating model, defend your priorities, measure what matters, and lead a team that delivers consistent results without burning out.</p>]]>
      </content:encoded>
      <pubDate>Sat, 14 Feb 2026 21:00:35 -0600</pubDate>
      <author>Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1f547a50/4b2dacad.mp3" length="413170" type="audio/mpeg"/>
      <itunes:author>Jason Edwards</itunes:author>
      <itunes:duration>52</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Certified: The ISACA GSOM Audio Course is built for security leaders, managers, and senior practitioners who need to run a security program that holds up under real pressure. If you’re stepping into a security operations management role, leveling up from hands-on work into leadership, or trying to bring order to a messy set of tools and processes, this course is for you. It assumes you understand the basics of security and IT, but it does not assume you’ve had years to formalize operations, metrics, staffing, or governance. The focus stays practical: how to make daily operations predictable, how to lead people through incidents and change, and how to communicate risk in a way the business will actually act on.</p><p>In Certified: The ISACA GSOM Audio Course, you’ll learn how to translate security strategy into operating rhythm, roles, workflows, and measurable outcomes. We’ll cover how to structure a security operations function, define service expectations, prioritize work, and build a repeatable approach to monitoring, response, vulnerability management, and continuous improvement. You’ll also work through the management layer that often gets skipped: budgeting, staffing models, skills planning, reporting, and alignment with enterprise risk and compliance needs. Because it’s audio-first, you can learn in short blocks that fit your schedule, and each lesson is designed to be clear enough to replay on a commute and still apply when you’re back at the keyboard.</p><p>What makes Certified: The ISACA GSOM Audio Course different is that it treats security operations as a living system, not a checklist. You’ll hear how strong programs make decisions, document tradeoffs, and keep teams focused when the environment changes. The course balances exam readiness with job readiness, so you’re not just memorizing terms—you’re building a mental model you can use in meetings, during incidents, and while planning the next quarter. Success looks like this: you can explain your operating model, defend your priorities, measure what matters, and lead a team that delivers consistent results without burning out.</p>]]>
      </itunes:summary>
      <itunes:keywords>Certified: The ISACA GSOM Audio Course, ISACA GSOM, security operations management, SOC leadership, incident management, detection and response, alert triage, security metrics, KPI and KRI, operational governance, risk communication, vulnerability management, threat monitoring, playbooks and runbooks, escalation procedures, SLAs and service expectations, staffing and shift planning, skills development, tooling strategy, log management, SIEM concepts, continuous improvement, audit readiness, security reporting, executive stakeholder management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
