<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/certified-the-isaca-cisa-prepcast" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Certified: The ISACA CISA Audio Course</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/certified-the-isaca-cisa-prepcast</itunes:new-feed-url>
    <description>The Bare Metal Cyber CISA Audio Course is your complete, exam-focused companion for mastering the Certified Information Systems Auditor (CISA) certification. Designed for IT auditors, security professionals, and governance specialists, this comprehensive Audio Course transforms the ISACA exam blueprint into over one hundred clear, structured, and engaging episodes. Each lesson delivers practical explanations and real-world context across all five CISA domains—ranging from audit processes and IT governance to systems acquisition, operations, resilience, and information asset protection. Whether you’re driving, exercising, or studying between work sessions, every episode helps you understand key audit principles, retain critical terminology, and apply your knowledge with confidence.

The CISA certification from ISACA is a globally recognized credential that validates expertise in auditing, control, and assurance of information systems. It focuses on evaluating the effectiveness of IT governance, managing risk, ensuring system integrity, and maintaining operational resilience within complex technology environments. Earning the CISA demonstrates that you have the analytical insight and professional judgment to assess vulnerabilities, design controls, and safeguard enterprise systems. Recognized by organizations worldwide, it is a trusted benchmark for IT auditors, compliance officers, and security leaders seeking to advance into higher-responsibility roles in governance and assurance.

Developed by BareMetalCyber.com, the CISA Audio Course combines professional narration, exam alignment, and practical application to give you a complete, portable study experience. Each episode builds momentum toward certification success—helping you not only pass the exam but also elevate your understanding of how effective information systems auditing strengthens organizations.
</description>
    <copyright>2025 Bare Metal Cyber TM</copyright>
    <podcast:guid>c424cfac-04e8-5c02-8ac7-4df13280735d</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="1e81ed4d-b3a7-5035-b12a-5171bdd497b8" feedUrl="https://feeds.transistor.fm/certified-the-crisc-prepcast"/>
      <podcast:remoteItem feedGuid="d017ff20-a07a-57ee-ae6c-bbea258822ed" feedUrl="https://feeds.transistor.fm/certified-the-isaca-cgeit-audio-course"/>
      <podcast:remoteItem feedGuid="12ba6b47-50a9-5caa-aebe-16bae40dbbc5" feedUrl="https://feeds.transistor.fm/cism"/>
      <podcast:remoteItem feedGuid="6ad73685-a446-5ab3-8b2c-c25af99834f6" feedUrl="https://feeds.transistor.fm/certified-the-security-prepcast"/>
      <podcast:remoteItem feedGuid="9af25f2f-f465-5c56-8635-fc5e831ff06a" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-a725a484-8216-4f80-9a32-2bfd5efcc240"/>
      <podcast:remoteItem feedGuid="0e52dc8b-9c94-58c7-b2fc-3041b8d8ca89" feedUrl="https://feeds.transistor.fm/certified-the-isaca-cdpse-audio-course"/>
      <podcast:remoteItem feedGuid="9a42f4e8-efe3-507c-ba2f-e2d2d4db8bdf" feedUrl="https://feeds.transistor.fm/bare-metal-cyber-presents-framework"/>
      <podcast:remoteItem feedGuid="143fc9c4-74e3-506c-8f6a-319fe2cb366d" feedUrl="https://feeds.transistor.fm/certified-the-cissp-prepcast"/>
      <podcast:remoteItem feedGuid="ac645ca7-7469-50bf-9010-f13c165e3e14" feedUrl="https://feeds.transistor.fm/baremetalcyber-dot-one"/>
      <podcast:remoteItem feedGuid="ed370f78-cd32-54e3-8929-52771faf14ee" feedUrl="https://feeds.transistor.fm/certified-the-cciso-prepcast"/>
    </podcast:podroll>
    <podcast:locked owner="baremetalcyber@outlook.com">no</podcast:locked>
    <itunes:applepodcastsverify>6e4c9aa0-8303-11f0-a92e-9f202ed855fd</itunes:applepodcastsverify>
    <podcast:trailer pubdate="Mon, 13 Oct 2025 22:42:32 -0500" url="https://media.transistor.fm/f4fa4acd/29c34587.mp3" length="3942399" type="audio/mpeg">Welcome to the ISACA CISA Certification</podcast:trailer>
    <language>en</language>
    <pubDate>Thu, 02 Apr 2026 13:02:12 -0500</pubDate>
    <lastBuildDate>Mon, 13 Apr 2026 00:04:34 -0500</lastBuildDate>
    <link>https://baremetalcyber.com/isaca-cisa-audio-course</link>
    <image>
      <url>https://img.transistorcdn.com/_ezHw8qe3Jma2bgKIjFRzd77-NrHpOJ8RfP2c-Ail74/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MjRh/ODRhY2UzODQ0MzBi/ZjI2YjBjZjA5NWJm/NGE3Yi5wbmc.jpg</url>
      <title>Certified: The ISACA CISA Audio Course</title>
      <link>https://baremetalcyber.com/isaca-cisa-audio-course</link>
    </image>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <itunes:type>serial</itunes:type>
    <itunes:author>Dr Jason Edwards</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/_ezHw8qe3Jma2bgKIjFRzd77-NrHpOJ8RfP2c-Ail74/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MjRh/ODRhY2UzODQ0MzBi/ZjI2YjBjZjA5NWJm/NGE3Yi5wbmc.jpg"/>
    <itunes:summary>The Bare Metal Cyber CISA Audio Course is your complete, exam-focused companion for mastering the Certified Information Systems Auditor (CISA) certification. Designed for IT auditors, security professionals, and governance specialists, this comprehensive Audio Course transforms the ISACA exam blueprint into over one hundred clear, structured, and engaging episodes. Each lesson delivers practical explanations and real-world context across all five CISA domains—ranging from audit processes and IT governance to systems acquisition, operations, resilience, and information asset protection. Whether you’re driving, exercising, or studying between work sessions, every episode helps you understand key audit principles, retain critical terminology, and apply your knowledge with confidence.

The CISA certification from ISACA is a globally recognized credential that validates expertise in auditing, control, and assurance of information systems. It focuses on evaluating the effectiveness of IT governance, managing risk, ensuring system integrity, and maintaining operational resilience within complex technology environments. Earning the CISA demonstrates that you have the analytical insight and professional judgment to assess vulnerabilities, design controls, and safeguard enterprise systems. Recognized by organizations worldwide, it is a trusted benchmark for IT auditors, compliance officers, and security leaders seeking to advance into higher-responsibility roles in governance and assurance.

Developed by BareMetalCyber.com, the CISA Audio Course combines professional narration, exam alignment, and practical application to give you a complete, portable study experience. Each episode builds momentum toward certification success—helping you not only pass the exam but also elevate your understanding of how effective information systems auditing strengthens organizations.
</itunes:summary>
    <itunes:subtitle>The Bare Metal Cyber CISA Audio Course is your complete, exam-focused companion for mastering the Certified Information Systems Auditor (CISA) certification.</itunes:subtitle>
    <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
    <itunes:owner>
      <itunes:name>Dr Jason Edwards</itunes:name>
      <itunes:email>baremetalcyber@outlook.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 1: Welcome to the CISA Certification</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1: Welcome to the CISA Certification</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce17bd20-e66e-4228-a9b7-05c865fb9d76</guid>
      <link>https://share.transistor.fm/s/c3a18589</link>
      <description>
        <![CDATA[<p>Start your CISA journey with a clear understanding of what the certification is, why it matters, and how it can transform your career in IT audit. This episode introduces the exam's structure, the benefits of certification, and what you can expect from the Prepcast series to help you succeed. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Start your CISA journey with a clear understanding of what the certification is, why it matters, and how it can transform your career in IT audit. This episode introduces the exam's structure, the benefits of certification, and what you can expect from the Prepcast series to help you succeed. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:21:08 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c3a18589/2be5d05e.mp3" length="36998352" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>924</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Start your CISA journey with a clear understanding of what the certification is, why it matters, and how it can transform your career in IT audit. This episode introduces the exam's structure, the benefits of certification, and what you can expect from the Prepcast series to help you succeed. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c3a18589/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 2: Understanding ISACA and Key Resources</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2: Understanding ISACA and Key Resources</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">578e2eb3-93c8-4e89-98f9-91ca1dbdc271</guid>
      <link>https://share.transistor.fm/s/533e4edf</link>
      <description>
        <![CDATA[<p>In this episode, we explore ISACA—the organization behind the CISA—and the essential study tools it provides. You'll learn how to use the official review manual, question database, and support resources to build a winning study strategy aligned with the exam objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we explore ISACA—the organization behind the CISA—and the essential study tools it provides. You'll learn how to use the official review manual, question database, and support resources to build a winning study strategy aligned with the exam objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:22:21 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/533e4edf/eb9d70b6.mp3" length="38120576" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>952</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, we explore ISACA—the organization behind the CISA—and the essential study tools it provides. You'll learn how to use the official review manual, question database, and support resources to build a winning study strategy aligned with the exam objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/533e4edf/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 3: Proven Strategies for Passing the CISA Exam</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3: Proven Strategies for Passing the CISA Exam</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1a17a8eb-d350-4146-a599-d006ebac6025</guid>
      <link>https://share.transistor.fm/s/f99ea452</link>
      <description>
        <![CDATA[<p>Get equipped with practical, actionable study strategies to tackle the CISA exam with confidence. This episode covers planning, retention techniques, practice question usage, and how to identify your weak spots before test day. It’s focused entirely on building the habits that lead to success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Get equipped with practical, actionable study strategies to tackle the CISA exam with confidence. This episode covers planning, retention techniques, practice question usage, and how to identify your weak spots before test day. It’s focused entirely on building the habits that lead to success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:23:34 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f99ea452/bcb792f4.mp3" length="37278394" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>931</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Get equipped with practical, actionable study strategies to tackle the CISA exam with confidence. This episode covers planning, retention techniques, practice question usage, and how to identify your weak spots before test day. It’s focused entirely on building the habits that lead to success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f99ea452/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 4: Critical Exam Tips, Test-taking Strategies, and Common Pitfalls</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4: Critical Exam Tips, Test-taking Strategies, and Common Pitfalls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">19b19653-4c27-4eae-98ef-734f4d091e6b</guid>
      <link>https://share.transistor.fm/s/d275f810</link>
      <description>
        <![CDATA[<p>Learn how to avoid the most common CISA exam mistakes and apply time-tested test-taking strategies. From managing time to breaking down tricky questions, this episode is designed to help you stay sharp, focused, and in control during the exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Learn how to avoid the most common CISA exam mistakes and apply time-tested test-taking strategies. From managing time to breaking down tricky questions, this episode is designed to help you stay sharp, focused, and in control during the exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:24:29 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d275f810/f1cf0b23.mp3" length="36854186" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>921</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Learn how to avoid the most common CISA exam mistakes and apply time-tested test-taking strategies. From managing time to breaking down tricky questions, this episode is designed to help you stay sharp, focused, and in control during the exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d275f810/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 5: Final Review – Summary of Key Concepts Across All Domains</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5: Final Review – Summary of Key Concepts Across All Domains</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b2fafefb-fc9f-4e8b-8804-482556f662bd</guid>
      <link>https://share.transistor.fm/s/99645008</link>
      <description>
        <![CDATA[<p>This episode gives you a high-level review of the most tested concepts across all five CISA domains. If you need a solid refresh or want to verify that your prep is on track, this targeted summary reinforces what you need to know most. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode gives you a high-level review of the most tested concepts across all five CISA domains. If you need a solid refresh or want to verify that your prep is on track, this targeted summary reinforces what you need to know most. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:26:05 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/99645008/5ba6c552.mp3" length="42552078" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1063</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode gives you a high-level review of the most tested concepts across all five CISA domains. If you need a solid refresh or want to verify that your prep is on track, this targeted summary reinforces what you need to know most. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/99645008/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 6: Exam-Day Preparation – What to Expect and How to Prepare Mentally</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6: Exam-Day Preparation – What to Expect and How to Prepare Mentally</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e34470a6-7f5a-4030-930d-a48f8533132d</guid>
      <link>https://share.transistor.fm/s/5f620723</link>
      <description>
        <![CDATA[<p>Exam day can be stressful, but it doesn’t have to be. This episode walks you through everything from logistics and ID requirements to mental strategies and pacing, so you're ready to perform at your best. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Exam day can be stressful, but it doesn’t have to be. This episode walks you through everything from logistics and ID requirements to mental strategies and pacing, so you're ready to perform at your best. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:27:37 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5f620723/e00ed9fa.mp3" length="39320225" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>982</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Exam day can be stressful, but it doesn’t have to be. This episode walks you through everything from logistics and ID requirements to mental strategies and pacing, so you're ready to perform at your best. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5f620723/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 7: Overview of Domain 1 – Information Systems Auditing Process</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7: Overview of Domain 1 – Information Systems Auditing Process</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">65fbc66d-4eca-4dec-b764-ada09f34db2d</guid>
      <link>https://share.transistor.fm/s/7835898c</link>
      <description>
        <![CDATA[<p>Domain 1 is the foundation of the CISA exam. In this episode, we break down what IS auditing means, how it fits into the bigger picture of IT governance, and what the exam expects you to understand about audit roles, risk, and controls. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain 1 is the foundation of the CISA exam. In this episode, we break down what IS auditing means, how it fits into the bigger picture of IT governance, and what the exam expects you to understand about audit roles, risk, and controls. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:28:58 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7835898c/fd2ec93b.mp3" length="42661797" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1066</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain 1 is the foundation of the CISA exam. In this episode, we break down what IS auditing means, how it fits into the bigger picture of IT governance, and what the exam expects you to understand about audit roles, risk, and controls. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7835898c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 8: IS Audit Standards, Guidelines, and Codes of Ethics</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8: IS Audit Standards, Guidelines, and Codes of Ethics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9bf05392-17b1-475a-9b54-25fbea518cab</guid>
      <link>https://share.transistor.fm/s/00820c48</link>
      <description>
        <![CDATA[<p>Know the rules before you’re tested on them. This episode covers the ISACA audit standards and ethics you’ll need to master for Domain 1. You’ll learn what to memorize, how these principles shape audits, and why they matter for exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Know the rules before you’re tested on them. This episode covers the ISACA audit standards and ethics you’ll need to master for Domain 1. You’ll learn what to memorize, how these principles shape audits, and why they matter for exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:30:13 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/00820c48/4f16965f.mp3" length="42743219" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1068</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Know the rules before you’re tested on them. This episode covers the ISACA audit standards and ethics you’ll need to master for Domain 1. You’ll learn what to memorize, how these principles shape audits, and why they matter for exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/00820c48/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 9: Types of Audits, Assessments, and Reviews</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9: Types of Audits, Assessments, and Reviews</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9606246a-1279-4d26-a937-a7236617f558</guid>
      <link>https://share.transistor.fm/s/e8079386</link>
      <description>
        <![CDATA[<p>Not all audits are the same. This episode teaches you how to distinguish between audit types—compliance, financial, operational, and more—so you can answer CISA questions with clarity. Learn the nuances that the exam loves to test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Not all audits are the same. This episode teaches you how to distinguish between audit types—compliance, financial, operational, and more—so you can answer CISA questions with clarity. Learn the nuances that the exam loves to test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:41:36 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e8079386/32aba503.mp3" length="42625135" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1065</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Not all audits are the same. This episode teaches you how to distinguish between audit types—compliance, financial, operational, and more—so you can answer CISA questions with clarity. Learn the nuances that the exam loves to test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e8079386/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 10: Fundamentals of Risk-Based Audit Planning</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10: Fundamentals of Risk-Based Audit Planning</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">20abd0c8-540e-445d-9f97-5c61c6d102f6</guid>
      <link>https://share.transistor.fm/s/ba672a9c</link>
      <description>
        <![CDATA[<p>Risk-based planning is at the core of IT auditing and a major theme on the CISA exam. This episode covers how to prioritize audits, identify risks, and design audit scopes that align with business impact—all framed for what you need to know to pass. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Risk-based planning is at the core of IT auditing and a major theme on the CISA exam. This episode covers how to prioritize audits, identify risks, and design audit scopes that align with business impact—all framed for what you need to know to pass. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:42:23 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ba672a9c/81dbfd54.mp3" length="43228043" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1080</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Risk-based planning is at the core of IT auditing and a major theme on the CISA exam. This episode covers how to prioritize audits, identify risks, and design audit scopes that align with business impact—all framed for what you need to know to pass. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ba672a9c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 11: Advanced Risk Assessment Methods and Practical Examples</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11: Advanced Risk Assessment Methods and Practical Examples</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b92bef1-d51b-4547-bea7-7929d294f7ce</guid>
      <link>https://share.transistor.fm/s/b767de61</link>
      <description>
        <![CDATA[<p>Understanding risk is a cornerstone of the CISA exam, and this episode takes you beyond the basics. You’ll explore advanced techniques such as scenario-based analysis, quantitative vs. qualitative risk scoring, and how to apply them in real audit environments. Through practical examples, we connect these methods to the types of audit planning decisions you’ll be tested on. This deep dive gives you the context and nuance needed to master complex risk questions on exam day. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding risk is a cornerstone of the CISA exam, and this episode takes you beyond the basics. You’ll explore advanced techniques such as scenario-based analysis, quantitative vs. qualitative risk scoring, and how to apply them in real audit environments. Through practical examples, we connect these methods to the types of audit planning decisions you’ll be tested on. This deep dive gives you the context and nuance needed to master complex risk questions on exam day. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:43:18 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b767de61/75c23151.mp3" length="40611633" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1015</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Understanding risk is a cornerstone of the CISA exam, and this episode takes you beyond the basics. You’ll explore advanced techniques such as scenario-based analysis, quantitative vs. qualitative risk scoring, and how to apply them in real audit environments. Through practical examples, we connect these methods to the types of audit planning decisions you’ll be tested on. This deep dive gives you the context and nuance needed to master complex risk questions on exam day. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b767de61/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 12: Types of Controls and Audit Considerations</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12: Types of Controls and Audit Considerations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3b190623-5879-48c2-a9b4-8f5df980dbf9</guid>
      <link>https://share.transistor.fm/s/854302b0</link>
      <description>
        <![CDATA[<p>The CISA exam tests your ability to evaluate and differentiate between control types—preventive, detective, corrective, and compensating. This episode breaks down each control category, explains when and how they’re used, and ties them to audit objectives. We also explore the difference between design and operational effectiveness, a key area where exam questions often challenge candidates. If you need to build control fluency, this episode will help you get there. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The CISA exam tests your ability to evaluate and differentiate between control types—preventive, detective, corrective, and compensating. This episode breaks down each control category, explains when and how they’re used, and ties them to audit objectives. We also explore the difference between design and operational effectiveness, a key area where exam questions often challenge candidates. If you need to build control fluency, this episode will help you get there. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:44:26 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/854302b0/3eb3ec54.mp3" length="45000191" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1124</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The CISA exam tests your ability to evaluate and differentiate between control types—preventive, detective, corrective, and compensating. This episode breaks down each control category, explains when and how they’re used, and ties them to audit objectives. We also explore the difference between design and operational effectiveness, a key area where exam questions often challenge candidates. If you need to build control fluency, this episode will help you get there. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/854302b0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 13: Audit Project Management</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13: Audit Project Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">036f6b2c-fa0d-4f5a-b476-c502119db4d2</guid>
      <link>https://share.transistor.fm/s/4419ee94</link>
      <description>
        <![CDATA[<p>CISA candidates must not only understand audits—they must also understand how to manage them. This episode outlines the core principles of audit project management, including setting timelines, assigning resources, monitoring progress, and addressing unexpected changes. You’ll learn how to apply project management techniques to real audit environments and understand how these tasks align with ISACA’s exam objectives. It’s a vital listen for mastering Domain 1. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CISA candidates must not only understand audits—they must also understand how to manage them. This episode outlines the core principles of audit project management, including setting timelines, assigning resources, monitoring progress, and addressing unexpected changes. You’ll learn how to apply project management techniques to real audit environments and understand how these tasks align with ISACA’s exam objectives. It’s a vital listen for mastering Domain 1. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:45:13 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4419ee94/4efa7cfa.mp3" length="43750475" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1093</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>CISA candidates must not only understand audits—they must also understand how to manage them. This episode outlines the core principles of audit project management, including setting timelines, assigning resources, monitoring progress, and addressing unexpected changes. You’ll learn how to apply project management techniques to real audit environments and understand how these tasks align with ISACA’s exam objectives. It’s a vital listen for mastering Domain 1. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4419ee94/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 14: Audit Testing and Sampling Methodology</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14: Audit Testing and Sampling Methodology</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b133d4cd-2441-4f7a-9ab5-b6e1ca8b37dc</guid>
      <link>https://share.transistor.fm/s/db0d1bea</link>
      <description>
        <![CDATA[<p>Sampling is a heavily tested concept, and many CISA candidates struggle to distinguish between statistical and judgmental sampling. This episode demystifies sampling strategy, explains how to choose the right sample size, and shows you how to interpret sample-based results accurately. You'll also learn how testing ties directly into audit objectives. If you're unsure how to approach audit evidence and sample reliability, this episode is a must. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Sampling is a heavily tested concept, and many CISA candidates struggle to distinguish between statistical and judgmental sampling. This episode demystifies sampling strategy, explains how to choose the right sample size, and shows you how to interpret sample-based results accurately. You'll also learn how testing ties directly into audit objectives. If you're unsure how to approach audit evidence and sample reliability, this episode is a must. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:46:04 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/db0d1bea/141e81fe.mp3" length="42318979" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1057</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Sampling is a heavily tested concept, and many CISA candidates struggle to distinguish between statistical and judgmental sampling. This episode demystifies sampling strategy, explains how to choose the right sample size, and shows you how to interpret sample-based results accurately. You'll also learn how testing ties directly into audit objectives. If you're unsure how to approach audit evidence and sample reliability, this episode is a must. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/db0d1bea/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 15: Audit Evidence Collection Techniques</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15: Audit Evidence Collection Techniques</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ad897439-4ac8-41a8-83f2-f686974acafa</guid>
      <link>https://share.transistor.fm/s/1e07297c</link>
      <description>
        <![CDATA[<p>Effective audits rely on strong, defensible evidence. In this episode, we explore how to gather evidence using inquiry, observation, inspection, and re-performance. You'll learn how to assess evidence sufficiency, reliability, and relevance—three key terms you’ll see on the exam. We also discuss the auditor’s professional judgment in deciding which method to use and when. These foundational skills are directly mapped to Domain 1 questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Effective audits rely on strong, defensible evidence. In this episode, we explore how to gather evidence using inquiry, observation, inspection, and re-performance. You'll learn how to assess evidence sufficiency, reliability, and relevance—three key terms you’ll see on the exam. We also discuss the auditor’s professional judgment in deciding which method to use and when. These foundational skills are directly mapped to Domain 1 questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:47:22 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/1e07297c/89eb63ad.mp3" length="42917704" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1072</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Effective audits rely on strong, defensible evidence. In this episode, we explore how to gather evidence using inquiry, observation, inspection, and re-performance. You'll learn how to assess evidence sufficiency, reliability, and relevance—three key terms you’ll see on the exam. We also discuss the auditor’s professional judgment in deciding which method to use and when. These foundational skills are directly mapped to Domain 1 questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1e07297c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 16: Introduction to Audit Data Analytics Tools and Techniques</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16: Introduction to Audit Data Analytics Tools and Techniques</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">862e54aa-273b-4dc5-b792-e28af81d4f86</guid>
      <link>https://share.transistor.fm/s/f90a2a1d</link>
      <description>
        <![CDATA[<p>Modern audits demand more than checklists—they require smart use of data. This episode introduces audit data analytics, explains the types of analytics (descriptive, diagnostic, predictive), and outlines how tools like ACL and IDEA support audit objectives. You’ll also learn how data analytics supports risk-based auditing, improves coverage, and enhances evidence quality—core areas for CISA Domain 1. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Modern audits demand more than checklists—they require smart use of data. This episode introduces audit data analytics, explains the types of analytics (descriptive, diagnostic, predictive), and outlines how tools like ACL and IDEA support audit objectives. You’ll also learn how data analytics supports risk-based auditing, improves coverage, and enhances evidence quality—core areas for CISA Domain 1. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:48:16 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f90a2a1d/b73f3b44.mp3" length="44530002" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1113</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Modern audits demand more than checklists—they require smart use of data. This episode introduces audit data analytics, explains the types of analytics (descriptive, diagnostic, predictive), and outlines how tools like ACL and IDEA support audit objectives. You’ll also learn how data analytics supports risk-based auditing, improves coverage, and enhances evidence quality—core areas for CISA Domain 1. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f90a2a1d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 17: Practical Applications and Case Studies of Audit Data Analytics</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17: Practical Applications and Case Studies of Audit Data Analytics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">32410968-d8c3-487e-96c4-2e565d1d1fbe</guid>
      <link>https://share.transistor.fm/s/fc955190</link>
      <description>
        <![CDATA[<p>To truly master data analytics, you need to see it in action. This episode presents real-world examples and case studies showing how data analytics is used in fraud detection, operational audits, and compliance testing. You’ll understand the workflow from data extraction to final analysis and learn how CISA exam questions might present similar scenarios. It’s a high-value session that connects theory to practice and brings audit data to life. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>To truly master data analytics, you need to see it in action. This episode presents real-world examples and case studies showing how data analytics is used in fraud detection, operational audits, and compliance testing. You’ll understand the workflow from data extraction to final analysis and learn how CISA exam questions might present similar scenarios. It’s a high-value session that connects theory to practice and brings audit data to life. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:48:50 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fc955190/7e17192c.mp3" length="46125567" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1153</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>To truly master data analytics, you need to see it in action. This episode presents real-world examples and case studies showing how data analytics is used in fraud detection, operational audits, and compliance testing. You’ll understand the workflow from data extraction to final analysis and learn how CISA exam questions might present similar scenarios. It’s a high-value session that connects theory to practice and brings audit data to life. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fc955190/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 18: Audit Reporting and Communication Techniques</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18: Audit Reporting and Communication Techniques</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aa929c96-c7f0-4ad4-bfaf-a6f4c65f055d</guid>
      <link>https://share.transistor.fm/s/38eb7829</link>
      <description>
        <![CDATA[<p>Communicating audit results effectively is critical for both real-world auditors and CISA exam success. This episode teaches you how to write clear findings, structure reports logically, and deliver recommendations that management can act on. We’ll also explore techniques for presenting sensitive results diplomatically—a key soft skill that shows up in audit reporting scenarios on the test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Communicating audit results effectively is critical for both real-world auditors and CISA exam success. This episode teaches you how to write clear findings, structure reports logically, and deliver recommendations that management can act on. We’ll also explore techniques for presenting sensitive results diplomatically—a key soft skill that shows up in audit reporting scenarios on the test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:49:46 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/38eb7829/b6f28b9e.mp3" length="48890348" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1222</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Communicating audit results effectively is critical for both real-world auditors and CISA exam success. This episode teaches you how to write clear findings, structure reports logically, and deliver recommendations that management can act on. We’ll also explore techniques for presenting sensitive results diplomatically—a key soft skill that shows up in audit reporting scenarios on the test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/38eb7829/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 19: Quality Assurance and Improvement of Audit Processes</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19: Quality Assurance and Improvement of Audit Processes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dfbbfd52-a6ac-4d26-b353-15730265f38b</guid>
      <link>https://share.transistor.fm/s/533ddf7a</link>
      <description>
        <![CDATA[<p>ISACA expects CISA-certified professionals to uphold audit quality through structured QA practices. In this episode, we explore internal reviews, peer assessments, and continuous improvement models that strengthen the audit function. You'll learn how quality metrics are defined, how findings are tracked, and how QA fits into the professional standards you’ll be tested on. This is a vital component of Domain 1 that every candidate should understand. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ISACA expects CISA-certified professionals to uphold audit quality through structured QA practices. In this episode, we explore internal reviews, peer assessments, and continuous improvement models that strengthen the audit function. You'll learn how quality metrics are defined, how findings are tracked, and how QA fits into the professional standards you’ll be tested on. This is a vital component of Domain 1 that every candidate should understand. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:50:31 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/533ddf7a/0e15e41d.mp3" length="88022830" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>2200</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ISACA expects CISA-certified professionals to uphold audit quality through structured QA practices. In this episode, we explore internal reviews, peer assessments, and continuous improvement models that strengthen the audit function. You'll learn how quality metrics are defined, how findings are tracked, and how QA fits into the professional standards you’ll be tested on. This is a vital component of Domain 1 that every candidate should understand. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/533ddf7a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 20: Overview of Domain 2 – Governance of IT</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20: Overview of Domain 2 – Governance of IT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">efc60f88-8088-41db-83d6-0e17ea455456</guid>
      <link>https://share.transistor.fm/s/58bd34d3</link>
      <description>
        <![CDATA[<p>Domain 2 shifts your focus from audit execution to how IT supports business objectives. This episode provides a strategic overview of IT governance principles, roles and responsibilities, and how auditors assess the effectiveness of governance frameworks. You'll gain a preview of the domain’s major topics—including risk management, IT strategy, and compliance—so you can prepare to master this high-impact section of the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain 2 shifts your focus from audit execution to how IT supports business objectives. This episode provides a strategic overview of IT governance principles, roles and responsibilities, and how auditors assess the effectiveness of governance frameworks. You'll gain a preview of the domain’s major topics—including risk management, IT strategy, and compliance—so you can prepare to master this high-impact section of the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:51:11 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/58bd34d3/7bb0848d.mp3" length="42786103" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1069</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain 2 shifts your focus from audit execution to how IT supports business objectives. This episode provides a strategic overview of IT governance principles, roles and responsibilities, and how auditors assess the effectiveness of governance frameworks. You'll gain a preview of the domain’s major topics—including risk management, IT strategy, and compliance—so you can prepare to master this high-impact section of the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/58bd34d3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 21: Overview of Domain 2 – Management of IT</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21: Overview of Domain 2 – Management of IT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">07887ec5-459b-4c01-a5bd-9175b8aa9f20</guid>
      <link>https://share.transistor.fm/s/be12ac78</link>
      <description>
        <![CDATA[<p>Domain 2 doesn’t stop at governance—it also expects you to understand IT management practices. This episode introduces the key responsibilities of IT leaders, including resource allocation, vendor oversight, performance monitoring, and quality assurance. You’ll gain clarity on how management supports governance goals and what you’ll need to know for CISA exam questions on IT operations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain 2 doesn’t stop at governance—it also expects you to understand IT management practices. This episode introduces the key responsibilities of IT leaders, including resource allocation, vendor oversight, performance monitoring, and quality assurance. You’ll gain clarity on how management supports governance goals and what you’ll need to know for CISA exam questions on IT operations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:51:54 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/be12ac78/9f77d723.mp3" length="36830184" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>920</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain 2 doesn’t stop at governance—it also expects you to understand IT management practices. This episode introduces the key responsibilities of IT leaders, including resource allocation, vendor oversight, performance monitoring, and quality assurance. You’ll gain clarity on how management supports governance goals and what you’ll need to know for CISA exam questions on IT operations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/be12ac78/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 22: Laws, Regulations, and Industry Standards</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22: Laws, Regulations, and Industry Standards</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">788ac2b8-3756-47e7-96b9-b7a072cc808d</guid>
      <link>https://share.transistor.fm/s/4bd024dc</link>
      <description>
        <![CDATA[<p>The CISA exam expects you to recognize and apply legal, regulatory, and industry-specific requirements to audit scenarios. This episode explores major compliance drivers like GDPR, HIPAA, and SOX, and explains how auditors assess adherence to these standards. You’ll also learn how to distinguish between laws, regulations, and frameworks—a critical distinction for exam success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The CISA exam expects you to recognize and apply legal, regulatory, and industry-specific requirements to audit scenarios. This episode explores major compliance drivers like GDPR, HIPAA, and SOX, and explains how auditors assess adherence to these standards. You’ll also learn how to distinguish between laws, regulations, and frameworks—a critical distinction for exam success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:54:53 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/4bd024dc/43d7b2e5.mp3" length="39371325" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>984</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The CISA exam expects you to recognize and apply legal, regulatory, and industry-specific requirements to audit scenarios. This episode explores major compliance drivers like GDPR, HIPAA, and SOX, and explains how auditors assess adherence to these standards. You’ll also learn how to distinguish between laws, regulations, and frameworks—a critical distinction for exam success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4bd024dc/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 23: Organizational Structure, IT Governance, and IT Strategy</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23: Organizational Structure, IT Governance, and IT Strategy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b320b32f-c6fb-4f61-82ec-be90465a240d</guid>
      <link>https://share.transistor.fm/s/fb9464d9</link>
      <description>
        <![CDATA[<p>A solid grasp of organizational structure is key to evaluating IT governance. This episode walks you through reporting lines, governance committees, roles like CIO and CISO, and how strategy aligns with structure. You’ll also learn what the CISA exam expects you to know about evaluating the effectiveness of governance models. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>A solid grasp of organizational structure is key to evaluating IT governance. This episode walks you through reporting lines, governance committees, roles like CIO and CISO, and how strategy aligns with structure. You’ll also learn what the CISA exam expects you to know about evaluating the effectiveness of governance models. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:55:54 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fb9464d9/aa6ea61d.mp3" length="41316940" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1032</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>A solid grasp of organizational structure is key to evaluating IT governance. This episode walks you through reporting lines, governance committees, roles like CIO and CISO, and how strategy aligns with structure. You’ll also learn what the CISA exam expects you to know about evaluating the effectiveness of governance models. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fb9464d9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 24: IT Policies, Standards, Procedures, and Practices</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24: IT Policies, Standards, Procedures, and Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3fa62626-6cc7-455c-8768-1e235f7796c1</guid>
      <link>https://share.transistor.fm/s/b766fa28</link>
      <description>
        <![CDATA[<p>Policies and standards form the backbone of IT governance, and this episode helps you understand how auditors evaluate their design, communication, and enforcement. You’ll explore the differences between policies, procedures, and guidelines, and how each supports control objectives—critical distinctions the CISA exam frequently tests. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Policies and standards form the backbone of IT governance, and this episode helps you understand how auditors evaluate their design, communication, and enforcement. You’ll explore the differences between policies, procedures, and guidelines, and how each supports control objectives—critical distinctions the CISA exam frequently tests. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:56:39 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b766fa28/c41e006b.mp3" length="39497766" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>987</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Policies and standards form the backbone of IT governance, and this episode helps you understand how auditors evaluate their design, communication, and enforcement. You’ll explore the differences between policies, procedures, and guidelines, and how each supports control objectives—critical distinctions the CISA exam frequently tests. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b766fa28/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 25: Enterprise Architecture and Considerations</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25: Enterprise Architecture and Considerations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5998a94f-ebe3-46b8-a5cc-f8aac6615f81</guid>
      <link>https://share.transistor.fm/s/c0e539f9</link>
      <description>
        <![CDATA[<p>Enterprise Architecture (EA) connects IT design to business strategy, and the CISA exam wants you to evaluate how well it supports organizational goals. In this episode, you’ll learn the components of EA, including frameworks like TOGAF, and how auditors assess EA governance, integration, and documentation across the enterprise. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Enterprise Architecture (EA) connects IT design to business strategy, and the CISA exam wants you to evaluate how well it supports organizational goals. In this episode, you’ll learn the components of EA, including frameworks like TOGAF, and how auditors assess EA governance, integration, and documentation across the enterprise. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:57:43 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c0e539f9/0fea1f3d.mp3" length="38669155" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>966</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Enterprise Architecture (EA) connects IT design to business strategy, and the CISA exam wants you to evaluate how well it supports organizational goals. In this episode, you’ll learn the components of EA, including frameworks like TOGAF, and how auditors assess EA governance, integration, and documentation across the enterprise. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c0e539f9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 26: ERM Frameworks and Principles</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26: ERM Frameworks and Principles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">373fbe1d-53b7-4d8c-8b4f-4fa8f339f82c</guid>
      <link>https://share.transistor.fm/s/988358b2</link>
      <description>
        <![CDATA[<p>Enterprise Risk Management (ERM) is a key pillar of IT governance. This episode explains risk frameworks like COSO ERM and ISO 31000 and shows how auditors evaluate the structure, roles, and processes of ERM programs. You’ll gain a clear understanding of how strategic risk management connects with audit objectives on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Enterprise Risk Management (ERM) is a key pillar of IT governance. This episode explains risk frameworks like COSO ERM and ISO 31000 and shows how auditors evaluate the structure, roles, and processes of ERM programs. You’ll gain a clear understanding of how strategic risk management connects with audit objectives on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:58:10 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/988358b2/40fee4a7.mp3" length="39609550" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>990</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Enterprise Risk Management (ERM) is a key pillar of IT governance. This episode explains risk frameworks like COSO ERM and ISO 31000 and shows how auditors evaluate the structure, roles, and processes of ERM programs. You’ll gain a clear understanding of how strategic risk management connects with audit objectives on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/988358b2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 27: ERM Implementation and Evaluation Examples</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Episode 27: ERM Implementation and Evaluation Examples</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">63aeb8e3-32d2-4626-b6c1-f7880b781464</guid>
      <link>https://share.transistor.fm/s/06c891db</link>
      <description>
        <![CDATA[<p>Building on the last episode, we now focus on how ERM is implemented and assessed. Through audit-relevant examples, you’ll learn how to evaluate risk ownership, review program maturity, and assess documentation quality. This practical insight will prepare you for case-based questions that test your understanding of ERM in action. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Building on the last episode, we now focus on how ERM is implemented and assessed. Through audit-relevant examples, you’ll learn how to evaluate risk ownership, review program maturity, and assess documentation quality. This practical insight will prepare you for case-based questions that test your understanding of ERM in action. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:59:03 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/06c891db/7c461084.mp3" length="44090085" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1102</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Building on the last episode, we now focus on how ERM is implemented and assessed. Through audit-relevant examples, you’ll learn how to evaluate risk ownership, review program maturity, and assess documentation quality. This practical insight will prepare you for case-based questions that test your understanding of ERM in action. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/06c891db/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 28: Privacy Program and Principles</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28: Privacy Program and Principles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">98508cc8-c44b-421b-b27f-7d7a9e3bc407</guid>
      <link>https://share.transistor.fm/s/12ada1b5</link>
      <description>
        <![CDATA[<p>Data privacy is no longer optional—it’s a regulatory and reputational imperative. This episode covers privacy frameworks, laws, and controls auditors must assess during evaluations. You'll also learn how to audit privacy program design, policy enforcement, and data protection measures, all aligned with CISA Domain 2 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data privacy is no longer optional—it’s a regulatory and reputational imperative. This episode covers privacy frameworks, laws, and controls auditors must assess during evaluations. You'll also learn how to audit privacy program design, policy enforcement, and data protection measures, all aligned with CISA Domain 2 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 11:59:48 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/12ada1b5/f134d2a9.mp3" length="39822710" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>995</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data privacy is no longer optional—it’s a regulatory and reputational imperative. This episode covers privacy frameworks, laws, and controls auditors must assess during evaluations. You'll also learn how to audit privacy program design, policy enforcement, and data protection measures, all aligned with CISA Domain 2 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/12ada1b5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 29: Data Governance Program Fundamentals</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29: Data Governance Program Fundamentals</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c3ab4e22-c1b4-4a65-9b62-70e55515c446</guid>
      <link>https://share.transistor.fm/s/2bde48df</link>
      <description>
        <![CDATA[<p>Governance doesn’t stop at systems—it includes data. This episode explores how data is owned, classified, and controlled across the enterprise. You’ll learn how to evaluate governance roles, policies, and procedures related to data quality, security, and accountability, which are all highly relevant to CISA exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Governance doesn’t stop at systems—it includes data. This episode explores how data is owned, classified, and controlled across the enterprise. You’ll learn how to evaluate governance roles, policies, and procedures related to data quality, security, and accountability, which are all highly relevant to CISA exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:00:37 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2bde48df/9a3a56f1.mp3" length="40467418" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1011</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Governance doesn’t stop at systems—it includes data. This episode explores how data is owned, classified, and controlled across the enterprise. You’ll learn how to evaluate governance roles, policies, and procedures related to data quality, security, and accountability, which are all highly relevant to CISA exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2bde48df/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 30: Practical Data Classification Techniques and Compliance</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30: Practical Data Classification Techniques and Compliance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e5dc18d6-643c-4939-8c57-8b7bef3abd01</guid>
      <link>https://share.transistor.fm/s/d1821290</link>
      <description>
        <![CDATA[<p>Data classification is a key input to effective security and compliance auditing. In this episode, you’ll learn how to evaluate classification policies, review labeling and access controls, and understand how classification ties into privacy, retention, and audit scope. It’s a critical concept for mastering both Domains 2 and 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data classification is a key input to effective security and compliance auditing. In this episode, you’ll learn how to evaluate classification policies, review labeling and access controls, and understand how classification ties into privacy, retention, and audit scope. It’s a critical concept for mastering both Domains 2 and 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:01:22 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d1821290/2523a673.mp3" length="43456890" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1086</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data classification is a key input to effective security and compliance auditing. In this episode, you’ll learn how to evaluate classification policies, review labeling and access controls, and understand how classification ties into privacy, retention, and audit scope. It’s a critical concept for mastering both Domains 2 and 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d1821290/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 31: IT Resource Management</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31: IT Resource Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef83a3b1-9e85-4766-bad6-48270089f2df</guid>
      <link>https://share.transistor.fm/s/88e886d6</link>
      <description>
        <![CDATA[<p>Resource management is foundational to IT governance, and the CISA exam tests your ability to evaluate how organizations allocate, monitor, and optimize people, hardware, software, and funding. This episode walks you through how auditors assess resource alignment with business objectives, identify misallocations, and verify that capacity planning is realistic and well-documented. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Resource management is foundational to IT governance, and the CISA exam tests your ability to evaluate how organizations allocate, monitor, and optimize people, hardware, software, and funding. This episode walks you through how auditors assess resource alignment with business objectives, identify misallocations, and verify that capacity planning is realistic and well-documented. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:02:07 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/88e886d6/03e3a459.mp3" length="40812220" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1020</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Resource management is foundational to IT governance, and the CISA exam tests your ability to evaluate how organizations allocate, monitor, and optimize people, hardware, software, and funding. This episode walks you through how auditors assess resource alignment with business objectives, identify misallocations, and verify that capacity planning is realistic and well-documented. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/88e886d6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 32: IT Vendor Management</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32: IT Vendor Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4fa056c7-2177-4288-8881-c8e9d46ef055</guid>
      <link>https://share.transistor.fm/s/7676ff00</link>
      <description>
        <![CDATA[<p>Managing third-party risk is a key topic on the CISA exam, and this episode dives into how to audit vendor selection, onboarding, performance evaluation, and contract compliance. You'll learn how to assess risk from service providers, examine contract clarity, and ensure that controls are in place to manage vendor performance effectively across the lifecycle. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Managing third-party risk is a key topic on the CISA exam, and this episode dives into how to audit vendor selection, onboarding, performance evaluation, and contract compliance. You'll learn how to assess risk from service providers, examine contract clarity, and ensure that controls are in place to manage vendor performance effectively across the lifecycle. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:02:39 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/7676ff00/9c631f22.mp3" length="43456855" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1086</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Managing third-party risk is a key topic on the CISA exam, and this episode dives into how to audit vendor selection, onboarding, performance evaluation, and contract compliance. You'll learn how to assess risk from service providers, examine contract clarity, and ensure that controls are in place to manage vendor performance effectively across the lifecycle. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7676ff00/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 33: IT Performance Monitoring and Reporting</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33: IT Performance Monitoring and Reporting</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">20052278-eb61-4205-b08d-3a484bc0b0ec</guid>
      <link>https://share.transistor.fm/s/0d342b7a</link>
      <description>
        <![CDATA[<p>Audit success depends on knowing how to evaluate IT performance. This episode explains how key performance indicators (KPIs) and reports are used to measure service delivery, support governance goals, and drive corrective action. You’ll learn how to assess the accuracy, relevance, and alignment of performance data with business strategy—just like the CISA exam will test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Audit success depends on knowing how to evaluate IT performance. This episode explains how key performance indicators (KPIs) and reports are used to measure service delivery, support governance goals, and drive corrective action. You’ll learn how to assess the accuracy, relevance, and alignment of performance data with business strategy—just like the CISA exam will test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:03:27 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0d342b7a/b7c25f7d.mp3" length="41331552" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1033</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Audit success depends on knowing how to evaluate IT performance. This episode explains how key performance indicators (KPIs) and reports are used to measure service delivery, support governance goals, and drive corrective action. You’ll learn how to assess the accuracy, relevance, and alignment of performance data with business strategy—just like the CISA exam will test. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0d342b7a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 34: Quality Assurance and Quality Management of IT</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34: Quality Assurance and Quality Management of IT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1ae1e266-9a62-4842-a513-d66844f4d690</guid>
      <link>https://share.transistor.fm/s/6d3bdb7a</link>
      <description>
        <![CDATA[<p>The CISA exam expects candidates to understand how IT quality is planned, implemented, and improved over time. This episode covers quality assurance policies, continuous improvement practices, metrics, and reviews. You’ll learn how to audit the effectiveness of IT quality management frameworks and ensure they support reliable and consistent service delivery. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The CISA exam expects candidates to understand how IT quality is planned, implemented, and improved over time. This episode covers quality assurance policies, continuous improvement practices, metrics, and reviews. You’ll learn how to audit the effectiveness of IT quality management frameworks and ensure they support reliable and consistent service delivery. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:04:12 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6d3bdb7a/4674bc5b.mp3" length="40380702" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1009</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The CISA exam expects candidates to understand how IT quality is planned, implemented, and improved over time. This episode covers quality assurance policies, continuous improvement practices, metrics, and reviews. You’ll learn how to audit the effectiveness of IT quality management frameworks and ensure they support reliable and consistent service delivery. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6d3bdb7a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 35: Overview of Domain 3 – Information Systems Acquisition, Development &amp; Implementation</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35: Overview of Domain 3 – Information Systems Acquisition, Development &amp; Implementation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7e03259e-4267-4e7e-b330-2633e5b5a7dd</guid>
      <link>https://share.transistor.fm/s/24e912d9</link>
      <description>
        <![CDATA[<p>Domain 3 focuses on the controls and governance involved in acquiring and implementing IT solutions. This episode provides a strategic overview of project governance, system development methodologies, and how these elements align with audit objectives. If you're looking to understand what ISACA expects from auditors in development environments, this is your starting point. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain 3 focuses on the controls and governance involved in acquiring and implementing IT solutions. This episode provides a strategic overview of project governance, system development methodologies, and how these elements align with audit objectives. If you're looking to understand what ISACA expects from auditors in development environments, this is your starting point. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:04:53 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/24e912d9/6a798709.mp3" length="40970160" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1024</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain 3 focuses on the controls and governance involved in acquiring and implementing IT solutions. This episode provides a strategic overview of project governance, system development methodologies, and how these elements align with audit objectives. If you're looking to understand what ISACA expects from auditors in development environments, this is your starting point. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/24e912d9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 36: Project Governance and Management</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Episode 36: Project Governance and Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">97d2a771-8268-4a6a-8c38-ac8509f5ad98</guid>
      <link>https://share.transistor.fm/s/c7f7a263</link>
      <description>
        <![CDATA[<p>Project governance ensures IT initiatives deliver value and align with business goals. This episode covers how auditors evaluate project oversight, milestone tracking, risk management, and stakeholder involvement. You'll also learn how to audit project management methodologies like PMBOK and Agile, which the CISA exam often references in Domain 3 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Project governance ensures IT initiatives deliver value and align with business goals. This episode covers how auditors evaluate project oversight, milestone tracking, risk management, and stakeholder involvement. You'll also learn how to audit project management methodologies like PMBOK and Agile, which the CISA exam often references in Domain 3 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:05:51 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c7f7a263/a4e96f43.mp3" length="42659611" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1066</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Project governance ensures IT initiatives deliver value and align with business goals. This episode covers how auditors evaluate project oversight, milestone tracking, risk management, and stakeholder involvement. You'll also learn how to audit project management methodologies like PMBOK and Agile, which the CISA exam often references in Domain 3 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c7f7a263/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 37: Business Case and Feasibility Analysis</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Episode 37: Business Case and Feasibility Analysis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">77e0aa0e-3cc8-43f3-82d1-d25a8c2a90c5</guid>
      <link>https://share.transistor.fm/s/b0a212ab</link>
      <description>
        <![CDATA[<p>Before a project begins, auditors must evaluate whether it’s justified. This episode focuses on auditing business case development, feasibility assessments, and benefit realization. You'll learn how to assess whether proposed IT investments align with strategic goals and whether cost, risk, and return have been properly considered—core concepts in Domain 3. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Before a project begins, auditors must evaluate whether it’s justified. This episode focuses on auditing business case development, feasibility assessments, and benefit realization. You'll learn how to assess whether proposed IT investments align with strategic goals and whether cost, risk, and return have been properly considered—core concepts in Domain 3. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:06:32 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b0a212ab/b6401c7c.mp3" length="44702391" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1117</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Before a project begins, auditors must evaluate whether it’s justified. This episode focuses on auditing business case development, feasibility assessments, and benefit realization. You'll learn how to assess whether proposed IT investments align with strategic goals and whether cost, risk, and return have been properly considered—core concepts in Domain 3. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b0a212ab/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 38: Waterfall and Traditional SDLC</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Episode 38: Waterfall and Traditional SDLC</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e8b1ab24-91d3-4a08-baf2-742359eff298</guid>
      <link>https://share.transistor.fm/s/43ee1106</link>
      <description>
        <![CDATA[<p>Understanding the traditional software development lifecycle is essential for CISA candidates. This episode explains each phase of the waterfall model and the corresponding audit controls. You'll learn how to evaluate documentation, testing, change controls, and stakeholder approvals, all of which are commonly tested under Domain 3 of the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding the traditional software development lifecycle is essential for CISA candidates. This episode explains each phase of the waterfall model and the corresponding audit controls. You'll learn how to evaluate documentation, testing, change controls, and stakeholder approvals, all of which are commonly tested under Domain 3 of the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:07:06 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/43ee1106/04bf396d.mp3" length="44735820" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1118</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Understanding the traditional software development lifecycle is essential for CISA candidates. This episode explains each phase of the waterfall model and the corresponding audit controls. You'll learn how to evaluate documentation, testing, change controls, and stakeholder approvals, all of which are commonly tested under Domain 3 of the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/43ee1106/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 39: Agile, DevOps, and Modern SDLC Approaches</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Episode 39: Agile, DevOps, and Modern SDLC Approaches</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">458c3150-e0db-4c30-9424-80f0b8d3c8ca</guid>
      <link>https://share.transistor.fm/s/59e3c064</link>
      <description>
        <![CDATA[<p>Agile and DevOps are increasingly popular in IT development, and the CISA exam expects you to understand how to audit these environments. This episode explains how control requirements shift in iterative, fast-paced delivery models. You'll learn how to audit sprints, CI/CD pipelines, backlog grooming, and quality gates in flexible but compliant ways. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Agile and DevOps are increasingly popular in IT development, and the CISA exam expects you to understand how to audit these environments. This episode explains how control requirements shift in iterative, fast-paced delivery models. You'll learn how to audit sprints, CI/CD pipelines, backlog grooming, and quality gates in flexible but compliant ways. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:07:47 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/59e3c064/a9bdd4e4.mp3" length="43281333" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1081</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Agile and DevOps are increasingly popular in IT development, and the CISA exam expects you to understand how to audit these environments. This episode explains how control requirements shift in iterative, fast-paced delivery models. You'll learn how to audit sprints, CI/CD pipelines, backlog grooming, and quality gates in flexible but compliant ways. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/59e3c064/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 40: Control Identification and Design</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Episode 40: Control Identification and Design</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">87ec89ae-ff4c-4146-aff9-71427f87f7d7</guid>
      <link>https://share.transistor.fm/s/5537e736</link>
      <description>
        <![CDATA[<p>Strong control design starts early in the system lifecycle. In this episode, you'll learn how auditors assess whether appropriate controls have been identified and designed during planning, development, and implementation. From input validation to segregation of duties, this session aligns closely with Domain 3 control objectives and audit best practices. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Strong control design starts early in the system lifecycle. In this episode, you'll learn how auditors assess whether appropriate controls have been identified and designed during planning, development, and implementation. From input validation to segregation of duties, this session aligns closely with Domain 3 control objectives and audit best practices. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:08:15 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5537e736/9db3999f.mp3" length="43167431" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1079</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Strong control design starts early in the system lifecycle. In this episode, you'll learn how auditors assess whether appropriate controls have been identified and designed during planning, development, and implementation. From input validation to segregation of duties, this session aligns closely with Domain 3 control objectives and audit best practices. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5537e736/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 41: System Readiness and Implementation Testing</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Episode 41: System Readiness and Implementation Testing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">67aeef7d-66fd-4013-9733-babad199ebb3</guid>
      <link>https://share.transistor.fm/s/e2d42c69</link>
      <description>
        <![CDATA[<p>Before a new system goes live, auditors must confirm that it’s ready for production. This episode explains how to evaluate readiness through testing, validation, and stakeholder approvals. You’ll learn how to assess user acceptance testing (UAT), implementation criteria, and go/no-go decisions—all key exam topics in Domain 3. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Before a new system goes live, auditors must confirm that it’s ready for production. This episode explains how to evaluate readiness through testing, validation, and stakeholder approvals. You’ll learn how to assess user acceptance testing (UAT), implementation criteria, and go/no-go decisions—all key exam topics in Domain 3. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:09:06 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e2d42c69/65f77e6b.mp3" length="43443294" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1085</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Before a new system goes live, auditors must confirm that it’s ready for production. This episode explains how to evaluate readiness through testing, validation, and stakeholder approvals. You’ll learn how to assess user acceptance testing (UAT), implementation criteria, and go/no-go decisions—all key exam topics in Domain 3. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e2d42c69/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 42: Implementation Configuration and Release Management</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Episode 42: Implementation Configuration and Release Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">af846093-517d-452a-85fb-79e32c45acec</guid>
      <link>https://share.transistor.fm/s/2542a672</link>
      <description>
        <![CDATA[<p>Poor configuration control can lead to outages, vulnerabilities, and audit findings. In this episode, we cover how to evaluate release planning, version control, rollback procedures, and configuration documentation. You’ll understand how to audit change approvals and production readiness, giving you the tools to answer configuration-related questions with confidence. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Poor configuration control can lead to outages, vulnerabilities, and audit findings. In this episode, we cover how to evaluate release planning, version control, rollback procedures, and configuration documentation. You’ll understand how to audit change approvals and production readiness, giving you the tools to answer configuration-related questions with confidence. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:09:36 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2542a672/20986741.mp3" length="46583221" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1164</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Poor configuration control can lead to outages, vulnerabilities, and audit findings. In this episode, we cover how to evaluate release planning, version control, rollback procedures, and configuration documentation. You’ll understand how to audit change approvals and production readiness, giving you the tools to answer configuration-related questions with confidence. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2542a672/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 43: System Migration, Infrastructure Deployment, and Data Conversion</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Episode 43: System Migration, Infrastructure Deployment, and Data Conversion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">921a1ec0-fa73-4877-aeca-ed2bfdccbbf7</guid>
      <link>https://share.transistor.fm/s/cbbbb6d3</link>
      <description>
        <![CDATA[<p>CISA candidates must understand the risks and controls involved in moving systems and data. This episode explains how to audit system migrations, infrastructure rollouts, and data conversion processes. You’ll learn how to identify red flags during transitions and verify that testing, backups, and validation controls are in place. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CISA candidates must understand the risks and controls involved in moving systems and data. This episode explains how to audit system migrations, infrastructure rollouts, and data conversion processes. You’ll learn how to identify red flags during transitions and verify that testing, backups, and validation controls are in place. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:10:38 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cbbbb6d3/8be253b5.mp3" length="46362760" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1158</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>CISA candidates must understand the risks and controls involved in moving systems and data. This episode explains how to audit system migrations, infrastructure rollouts, and data conversion processes. You’ll learn how to identify red flags during transitions and verify that testing, backups, and validation controls are in place. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cbbbb6d3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 44: Post-Implementation Review</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Episode 44: Post-Implementation Review</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">85627549-f72a-4154-a20d-2a6be5a9098f</guid>
      <link>https://share.transistor.fm/s/96bc73f6</link>
      <description>
        <![CDATA[<p>Once a system is deployed, the work isn’t over—auditors still need to assess whether objectives were achieved. This episode teaches you how to conduct a post-implementation review, evaluate project outcomes, assess stakeholder satisfaction, and document lessons learned. It’s a must-know process for Domain 3 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Once a system is deployed, the work isn’t over—auditors still need to assess whether objectives were achieved. This episode teaches you how to conduct a post-implementation review, evaluate project outcomes, assess stakeholder satisfaction, and document lessons learned. It’s a must-know process for Domain 3 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:11:10 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/96bc73f6/053f114a.mp3" length="45127653" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1128</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Once a system is deployed, the work isn’t over—auditors still need to assess whether objectives were achieved. This episode teaches you how to conduct a post-implementation review, evaluate project outcomes, assess stakeholder satisfaction, and document lessons learned. It’s a must-know process for Domain 3 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/96bc73f6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 45: Overview of Domain 4 – Information Systems Operations &amp; Business Resilience</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Episode 45: Overview of Domain 4 – Information Systems Operations &amp; Business Resilience</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d01e6f49-48e4-44e0-82cd-68eaee9ae8c6</guid>
      <link>https://share.transistor.fm/s/dd464e97</link>
      <description>
        <![CDATA[<p>Domain 4 shifts focus to the reliability and sustainability of IT operations. In this episode, you’ll gain an overview of operational controls, availability, service delivery, incident response, and business continuity. We highlight what ISACA wants you to know about managing daily operations and preparing for disruptions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain 4 shifts focus to the reliability and sustainability of IT operations. In this episode, you’ll gain an overview of operational controls, availability, service delivery, incident response, and business continuity. We highlight what ISACA wants you to know about managing daily operations and preparing for disruptions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:11:47 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dd464e97/325127f6.mp3" length="43682697" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1091</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain 4 shifts focus to the reliability and sustainability of IT operations. In this episode, you’ll gain an overview of operational controls, availability, service delivery, incident response, and business continuity. We highlight what ISACA wants you to know about managing daily operations and preparing for disruptions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dd464e97/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 46: IT Components</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Episode 46: IT Components</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">120fe40b-a0d3-40c6-acae-b7cf883e8f53</guid>
      <link>https://share.transistor.fm/s/34b5cf8c</link>
      <description>
        <![CDATA[<p>Understanding the elements that make up the IT environment is essential for audit readiness. This episode breaks down how to evaluate the hardware, software, network, and data assets that support critical business processes. You’ll also learn how to audit system dependencies and asset configuration controls, all mapped to Domain 4 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Understanding the elements that make up the IT environment is essential for audit readiness. This episode breaks down how to evaluate the hardware, software, network, and data assets that support critical business processes. You’ll also learn how to audit system dependencies and asset configuration controls, all mapped to Domain 4 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:12:25 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/34b5cf8c/6930061f.mp3" length="44195591" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1104</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Understanding the elements that make up the IT environment is essential for audit readiness. This episode breaks down how to evaluate the hardware, software, network, and data assets that support critical business processes. You’ll also learn how to audit system dependencies and asset configuration controls, all mapped to Domain 4 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/34b5cf8c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 47: IT Asset Management</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Episode 47: IT Asset Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">26a83309-69f2-406a-ac05-56e95d418f1f</guid>
      <link>https://share.transistor.fm/s/e8a54959</link>
      <description>
        <![CDATA[<p>IT asset management is more than keeping an inventory—it’s about control, accountability, and lifecycle oversight. In this episode, you’ll learn how to audit asset acquisition, tagging, usage, and disposal. We also explore how asset management intersects with compliance and risk, making it a key topic for your CISA exam prep. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>IT asset management is more than keeping an inventory—it’s about control, accountability, and lifecycle oversight. In this episode, you’ll learn how to audit asset acquisition, tagging, usage, and disposal. We also explore how asset management intersects with compliance and risk, making it a key topic for your CISA exam prep. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:12:58 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e8a54959/c7a9cfee.mp3" length="41956381" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1048</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>IT asset management is more than keeping an inventory—it’s about control, accountability, and lifecycle oversight. In this episode, you’ll learn how to audit asset acquisition, tagging, usage, and disposal. We also explore how asset management intersects with compliance and risk, making it a key topic for your CISA exam prep. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e8a54959/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 48: Job Scheduling and Production Process Automation</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Episode 48: Job Scheduling and Production Process Automation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23d54adf-95d0-4d81-909e-255833dfee1a</guid>
      <link>https://share.transistor.fm/s/19d1285d</link>
      <description>
        <![CDATA[<p>This episode covers how auditors evaluate job scheduling systems, batch processing, and automated task workflows. You’ll learn how to assess controls for error handling, reprocessing, and change approval—all of which are frequently tested in Domain 4 scenarios involving IT operations and reliability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode covers how auditors evaluate job scheduling systems, batch processing, and automated task workflows. You’ll learn how to assess controls for error handling, reprocessing, and change approval—all of which are frequently tested in Domain 4 scenarios involving IT operations and reliability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:13:29 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/19d1285d/8198b17d.mp3" length="42504981" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1062</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode covers how auditors evaluate job scheduling systems, batch processing, and automated task workflows. You’ll learn how to assess controls for error handling, reprocessing, and change approval—all of which are frequently tested in Domain 4 scenarios involving IT operations and reliability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/19d1285d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 49: System Interfaces</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Episode 49: System Interfaces</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b0fbfbee-b315-445c-8753-e475f271a648</guid>
      <link>https://share.transistor.fm/s/6bfbcc34</link>
      <description>
        <![CDATA[<p>When systems talk to each other, auditors must ensure that the communication is controlled and secure. This episode explores interface types (manual and automated), error checking, data reconciliation, and exception handling. You’ll gain clarity on how to audit inter-system interactions—knowledge that’s essential for Domain 4. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>When systems talk to each other, auditors must ensure that the communication is controlled and secure. This episode explores interface types (manual and automated), error checking, data reconciliation, and exception handling. You’ll gain clarity on how to audit inter-system interactions—knowledge that’s essential for Domain 4. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:14:06 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6bfbcc34/3804b0f0.mp3" length="44837162" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1120</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>When systems talk to each other, auditors must ensure that the communication is controlled and secure. This episode explores interface types (manual and automated), error checking, data reconciliation, and exception handling. You’ll gain clarity on how to audit inter-system interactions—knowledge that’s essential for Domain 4. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6bfbcc34/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 50: Shadow IT and End-User Computing</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Episode 50: Shadow IT and End-User Computing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9029e9e2-4115-4031-9c8f-7ccc22af18fb</guid>
      <link>https://share.transistor.fm/s/0e78248e</link>
      <description>
        <![CDATA[<p>Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business units. We also cover end-user computing controls, policies, and monitoring, which are increasingly tested in Domain 4 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business units. We also cover end-user computing controls, policies, and monitoring, which are increasingly tested in Domain 4 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:15:00 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0e78248e/4a8509d7.mp3" length="43797504" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1094</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Shadow IT introduces risk outside the view of central IT. In this episode, you will learn how to identify and audit unauthorized tools, spreadsheets, applications, and systems created by business units. We also cover end-user computing controls, policies, and monitoring, which are increasingly tested in Domain 4 scenarios. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0e78248e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 51: Systems Availability and Capacity Management</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Episode 51: Systems Availability and Capacity Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">80360911-df90-4854-a84f-70c6ca9042be</guid>
      <link>https://share.transistor.fm/s/65f46b78</link>
      <description>
        <![CDATA[<p>Auditors must verify that IT systems are designed and managed to meet performance demands. This episode explores how to evaluate availability strategies, capacity planning, monitoring tools, and escalation processes. Learn how these elements support operational resilience and how they appear in Domain 4 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Auditors must verify that IT systems are designed and managed to meet performance demands. This episode explores how to evaluate availability strategies, capacity planning, monitoring tools, and escalation processes. Learn how these elements support operational resilience and how they appear in Domain 4 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:15:34 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/65f46b78/21764b02.mp3" length="35844797" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>896</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Auditors must verify that IT systems are designed and managed to meet performance demands. This episode explores how to evaluate availability strategies, capacity planning, monitoring tools, and escalation processes. Learn how these elements support operational resilience and how they appear in Domain 4 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/65f46b78/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 52: Incident Management Best Practices</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Episode 52: Incident Management Best Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">498513ac-d562-4ea4-9bd8-0fb22c43db45</guid>
      <link>https://share.transistor.fm/s/2304fe60</link>
      <description>
        <![CDATA[<p>When things go wrong, incident management ensures that services are restored quickly and effectively. This episode explains how to audit detection procedures, escalation paths, incident logs, and resolution workflows. You will learn how incident response aligns with audit standards and how these topics are framed in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>When things go wrong, incident management ensures that services are restored quickly and effectively. This episode explains how to audit detection procedures, escalation paths, incident logs, and resolution workflows. You will learn how incident response aligns with audit standards and how these topics are framed in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:15:59 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/2304fe60/4f82ac94.mp3" length="39532232" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>988</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>When things go wrong, incident management ensures that services are restored quickly and effectively. This episode explains how to audit detection procedures, escalation paths, incident logs, and resolution workflows. You will learn how incident response aligns with audit standards and how these topics are framed in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2304fe60/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 53: Problem Management and Root Cause Analysis</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Episode 53: Problem Management and Root Cause Analysis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">351cbbf0-9308-4561-8d80-3de310e208da</guid>
      <link>https://share.transistor.fm/s/965b64bb</link>
      <description>
        <![CDATA[<p>Problem management focuses on eliminating the underlying causes of incidents. In this episode, you will learn how to audit problem detection, investigation, root cause analysis, and resolution tracking. We also cover the importance of documentation and trend analysis, which are key areas for Domain 4 exam preparation. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Problem management focuses on eliminating the underlying causes of incidents. In this episode, you will learn how to audit problem detection, investigation, root cause analysis, and resolution tracking. We also cover the importance of documentation and trend analysis, which are key areas for Domain 4 exam preparation. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:16:37 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/965b64bb/17225ff3.mp3" length="39218771" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>980</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Problem management focuses on eliminating the underlying causes of incidents. In this episode, you will learn how to audit problem detection, investigation, root cause analysis, and resolution tracking. We also cover the importance of documentation and trend analysis, which are key areas for Domain 4 exam preparation. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/965b64bb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 54: Change Management Processes</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Episode 54: Change Management Processes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">14686f93-16bf-4182-bcef-976bf93a4e41</guid>
      <link>https://share.transistor.fm/s/c9bbc82b</link>
      <description>
        <![CDATA[<p>Effective change management minimizes disruption and maintains control over the IT environment. This episode walks you through change request procedures, approval workflows, emergency change handling, and audit trail verification. Mastering these elements is essential for answering CISA questions on change governance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Effective change management minimizes disruption and maintains control over the IT environment. This episode walks you through change request procedures, approval workflows, emergency change handling, and audit trail verification. Mastering these elements is essential for answering CISA questions on change governance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:17:00 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c9bbc82b/45706d7f.mp3" length="39564617" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>989</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Effective change management minimizes disruption and maintains control over the IT environment. This episode walks you through change request procedures, approval workflows, emergency change handling, and audit trail verification. Mastering these elements is essential for answering CISA questions on change governance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c9bbc82b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 55: Configuration and Patch Management Processes</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Episode 55: Configuration and Patch Management Processes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">094fb71e-7bcf-49e2-bb71-dc4897af96af</guid>
      <link>https://share.transistor.fm/s/c81dc542</link>
      <description>
        <![CDATA[<p>Configuration and patch controls are essential for system stability and security. In this episode, you will learn how to audit configuration baselines, patch deployment processes, exception handling, and rollback procedures. These controls are highly relevant for questions involving system hardening and change assurance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Configuration and patch controls are essential for system stability and security. In this episode, you will learn how to audit configuration baselines, patch deployment processes, exception handling, and rollback procedures. These controls are highly relevant for questions involving system hardening and change assurance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:17:45 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c81dc542/fc2b8d5c.mp3" length="42304357" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1057</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Configuration and patch controls are essential for system stability and security. In this episode, you will learn how to audit configuration baselines, patch deployment processes, exception handling, and rollback procedures. These controls are highly relevant for questions involving system hardening and change assurance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c81dc542/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 56: Operational Log Management</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Episode 56: Operational Log Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f9cf891d-5a74-4f53-bb24-052954aae325</guid>
      <link>https://share.transistor.fm/s/89d0a86d</link>
      <description>
        <![CDATA[<p>Logs provide critical evidence for detecting incidents and monitoring system health. This episode explains how to audit log collection, retention, analysis, and alerting mechanisms. You will also learn how auditors evaluate whether logs support accountability, forensics, and compliance with organizational policies. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Logs provide critical evidence for detecting incidents and monitoring system health. This episode explains how to audit log collection, retention, analysis, and alerting mechanisms. You will also learn how auditors evaluate whether logs support accountability, forensics, and compliance with organizational policies. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:18:14 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/89d0a86d/b07e8915.mp3" length="42327326" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1058</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Logs provide critical evidence for detecting incidents and monitoring system health. This episode explains how to audit log collection, retention, analysis, and alerting mechanisms. You will also learn how auditors evaluate whether logs support accountability, forensics, and compliance with organizational policies. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/89d0a86d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 57: IT Service Level Management</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Episode 57: IT Service Level Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">12589f46-8f09-455b-9996-8cd2cd710e95</guid>
      <link>https://share.transistor.fm/s/8439bd77</link>
      <description>
        <![CDATA[<p>Service level agreements define performance expectations between IT and the business. In this episode, you will learn how to audit SLA creation, monitoring, breach handling, and vendor service reporting. These concepts are tested frequently in Domain 4, especially in questions that examine governance and performance alignment. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Service level agreements define performance expectations between IT and the business. In this episode, you will learn how to audit SLA creation, monitoring, breach handling, and vendor service reporting. These concepts are tested frequently in Domain 4, especially in questions that examine governance and performance alignment. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:18:44 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8439bd77/157ecb24.mp3" length="40964780" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1024</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Service level agreements define performance expectations between IT and the business. In this episode, you will learn how to audit SLA creation, monitoring, breach handling, and vendor service reporting. These concepts are tested frequently in Domain 4, especially in questions that examine governance and performance alignment. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8439bd77/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 58: Database Management Practices</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Episode 58: Database Management Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c27d2dd8-097b-4303-86b9-1e6ec0b0c568</guid>
      <link>https://share.transistor.fm/s/b3618fe2</link>
      <description>
        <![CDATA[<p>Databases are central to most IT operations, and auditors must ensure they are managed securely and efficiently. This episode covers access controls, backup procedures, configuration changes, and performance optimization. You will gain insight into how to audit database environments using the lens of confidentiality, integrity, and availability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Databases are central to most IT operations, and auditors must ensure they are managed securely and efficiently. This episode covers access controls, backup procedures, configuration changes, and performance optimization. You will gain insight into how to audit database environments using the lens of confidentiality, integrity, and availability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:19:15 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b3618fe2/1bddab19.mp3" length="41122562" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1027</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Databases are central to most IT operations, and auditors must ensure they are managed securely and efficiently. This episode covers access controls, backup procedures, configuration changes, and performance optimization. You will gain insight into how to audit database environments using the lens of confidentiality, integrity, and availability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b3618fe2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 59: Overview of Business Resilience</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Episode 59: Overview of Business Resilience</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce008379-9569-4751-8f59-a04162022cc2</guid>
      <link>https://share.transistor.fm/s/e41bdbef</link>
      <description>
        <![CDATA[<p>Business resilience ensures that critical operations can continue through disruption. This episode introduces the core concepts of business continuity, disaster recovery, redundancy, and failover. You will learn how to evaluate resilience strategies and how they relate to the audit objectives covered in Domain 4 and beyond. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Business resilience ensures that critical operations can continue through disruption. This episode introduces the core concepts of business continuity, disaster recovery, redundancy, and failover. You will learn how to evaluate resilience strategies and how they relate to the audit objectives covered in Domain 4 and beyond. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:20:05 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e41bdbef/ff67419f.mp3" length="39547903" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>988</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Business resilience ensures that critical operations can continue through disruption. This episode introduces the core concepts of business continuity, disaster recovery, redundancy, and failover. You will learn how to evaluate resilience strategies and how they relate to the audit objectives covered in Domain 4 and beyond. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e41bdbef/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 60: Conducting a Business Impact Analysis (BIA)</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Episode 60: Conducting a Business Impact Analysis (BIA)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e607fd8a-2a2a-4c31-93f5-a84ba97fe154</guid>
      <link>https://share.transistor.fm/s/e22928b4</link>
      <description>
        <![CDATA[<p>The business impact analysis is a foundational activity in resilience planning. In this episode, you will learn how to audit BIA processes, assess documentation of critical functions, and evaluate recovery time and recovery point objectives. CISA candidates must understand how to validate BIA results and tie them to continuity plans. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The business impact analysis is a foundational activity in resilience planning. In this episode, you will learn how to audit BIA processes, assess documentation of critical functions, and evaluate recovery time and recovery point objectives. CISA candidates must understand how to validate BIA results and tie them to continuity plans. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:20:51 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e22928b4/f6a0c78f.mp3" length="42449596" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1061</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The business impact analysis is a foundational activity in resilience planning. In this episode, you will learn how to audit BIA processes, assess documentation of critical functions, and evaluate recovery time and recovery point objectives. CISA candidates must understand how to validate BIA results and tie them to continuity plans. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e22928b4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 61: System and Operational Resilience</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Episode 61: System and Operational Resilience</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">28bb2d5a-b5fa-4e8c-9de3-72c0f584624d</guid>
      <link>https://share.transistor.fm/s/81a6a8a1</link>
      <description>
        <![CDATA[<p>Operational resilience is about sustaining essential services under stress. This episode explains how auditors evaluate systems for fault tolerance, high availability, and continuous operation. You will learn how to assess risk mitigation strategies, redundancy planning, and the effectiveness of proactive monitoring. These areas are core to Domain 4 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Operational resilience is about sustaining essential services under stress. This episode explains how auditors evaluate systems for fault tolerance, high availability, and continuous operation. You will learn how to assess risk mitigation strategies, redundancy planning, and the effectiveness of proactive monitoring. These areas are core to Domain 4 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:21:29 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/81a6a8a1/e7046f4a.mp3" length="41804884" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1045</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Operational resilience is about sustaining essential services under stress. This episode explains how auditors evaluate systems for fault tolerance, high availability, and continuous operation. You will learn how to assess risk mitigation strategies, redundancy planning, and the effectiveness of proactive monitoring. These areas are core to Domain 4 exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/81a6a8a1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 62: Data Backup, Storage, and Restoration Practices</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Episode 62: Data Backup, Storage, and Restoration Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b7fad407-8eb0-4151-b098-117097481398</guid>
      <link>https://share.transistor.fm/s/220bd71a</link>
      <description>
        <![CDATA[<p>Backup and restoration processes are critical for protecting data integrity and ensuring continuity. In this episode, you will learn how to evaluate backup frequency, storage media security, offsite storage protocols, and restoration testing. Understanding these controls is essential for CISA exam topics related to recovery readiness and operational risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Backup and restoration processes are critical for protecting data integrity and ensuring continuity. In this episode, you will learn how to evaluate backup frequency, storage media security, offsite storage protocols, and restoration testing. Understanding these controls is essential for CISA exam topics related to recovery readiness and operational risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:21:56 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/220bd71a/9e1525da.mp3" length="45571756" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1139</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Backup and restoration processes are critical for protecting data integrity and ensuring continuity. In this episode, you will learn how to evaluate backup frequency, storage media security, offsite storage protocols, and restoration testing. Understanding these controls is essential for CISA exam topics related to recovery readiness and operational risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/220bd71a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 63: Developing and Maintaining a Business Continuity Plan</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Episode 63: Developing and Maintaining a Business Continuity Plan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4fd0993c-c1bb-4c09-9d34-465784847292</guid>
      <link>https://share.transistor.fm/s/8d420ba8</link>
      <description>
        <![CDATA[<p>Business continuity planning ensures the organization can operate during and after disruptions. This episode explains how auditors evaluate continuity plan development, critical process identification, training, and documentation. You will also learn how plans are tested and updated to remain effective under real-world conditions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Business continuity planning ensures the organization can operate during and after disruptions. This episode explains how auditors evaluate continuity plan development, critical process identification, training, and documentation. You will also learn how plans are tested and updated to remain effective under real-world conditions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:22:47 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8d420ba8/f1a0c163.mp3" length="44831974" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1120</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Business continuity planning ensures the organization can operate during and after disruptions. This episode explains how auditors evaluate continuity plan development, critical process identification, training, and documentation. You will also learn how plans are tested and updated to remain effective under real-world conditions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8d420ba8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 64: Disaster Recovery Planning Fundamentals</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Episode 64: Disaster Recovery Planning Fundamentals</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a96aedcb-a87a-4f17-a3cc-891f58069345</guid>
      <link>https://share.transistor.fm/s/0413687d</link>
      <description>
        <![CDATA[<p>Disaster recovery focuses on restoring IT systems after an outage or catastrophic event. In this episode, you will learn how to audit DR plans, assess backup infrastructure, evaluate recovery site readiness, and verify testing procedures. DR planning is a key area of the CISA exam, especially for questions on system availability and continuity. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Disaster recovery focuses on restoring IT systems after an outage or catastrophic event. In this episode, you will learn how to audit DR plans, assess backup infrastructure, evaluate recovery site readiness, and verify testing procedures. DR planning is a key area of the CISA exam, especially for questions on system availability and continuity. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:23:27 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/0413687d/a9c569ff.mp3" length="44101576" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1102</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Disaster recovery focuses on restoring IT systems after an outage or catastrophic event. In this episode, you will learn how to audit DR plans, assess backup infrastructure, evaluate recovery site readiness, and verify testing procedures. DR planning is a key area of the CISA exam, especially for questions on system availability and continuity. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0413687d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 65: Overview of Domain 5 – Protection of Information Assets</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>Episode 65: Overview of Domain 5 – Protection of Information Assets</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">010ec75b-5306-4cb2-80b7-10e567dfe39a</guid>
      <link>https://share.transistor.fm/s/9cb564ee</link>
      <description>
        <![CDATA[<p>Domain 5 is all about securing information against unauthorized access, alteration, or loss. This episode provides a strategic overview of confidentiality, integrity, and availability principles and introduces the areas covered by this domain. You will see how security audits connect with governance, operations, and compliance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Domain 5 is all about securing information against unauthorized access, alteration, or loss. This episode provides a strategic overview of confidentiality, integrity, and availability principles and introduces the areas covered by this domain. You will see how security audits connect with governance, operations, and compliance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:23:59 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9cb564ee/03e5b897.mp3" length="42262641" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1056</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Domain 5 is all about securing information against unauthorized access, alteration, or loss. This episode provides a strategic overview of confidentiality, integrity, and availability principles and introduces the areas covered by this domain. You will see how security audits connect with governance, operations, and compliance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9cb564ee/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 66: Information Asset Security Frameworks, Standards, and Guidelines</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>Episode 66: Information Asset Security Frameworks, Standards, and Guidelines</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7dc062e2-9c15-432f-993f-69c3b01f82df</guid>
      <link>https://share.transistor.fm/s/29d360ae</link>
      <description>
        <![CDATA[<p>Security frameworks provide the structure for implementing effective controls. In this episode, you will learn how to evaluate ISO 27001, NIST, COBIT, and organizational guidelines. You will also explore how auditors assess alignment with policies and determine whether information protection is governed effectively. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security frameworks provide the structure for implementing effective controls. In this episode, you will learn how to evaluate ISO 27001, NIST, COBIT, and organizational guidelines. You will also explore how auditors assess alignment with policies and determine whether information protection is governed effectively. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:30:15 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/29d360ae/dd200e95.mp3" length="44332524" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1108</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security frameworks provide the structure for implementing effective controls. In this episode, you will learn how to evaluate ISO 27001, NIST, COBIT, and organizational guidelines. You will also explore how auditors assess alignment with policies and determine whether information protection is governed effectively. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/29d360ae/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 67: Physical and Environmental Controls</title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Episode 67: Physical and Environmental Controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3fcba99a-cd80-4f5c-af43-7074d4d909c2</guid>
      <link>https://share.transistor.fm/s/9f28f892</link>
      <description>
        <![CDATA[<p>Physical security is a foundational element of protecting information systems. This episode covers perimeter defenses, badge access, fire suppression, climate control, and secure equipment disposal. You will learn how to evaluate the effectiveness of these controls and how questions about physical risks show up on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Physical security is a foundational element of protecting information systems. This episode covers perimeter defenses, badge access, fire suppression, climate control, and secure equipment disposal. You will learn how to evaluate the effectiveness of these controls and how questions about physical risks show up on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:30:45 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9f28f892/a5c58880.mp3" length="42615727" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1065</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Physical security is a foundational element of protecting information systems. This episode covers perimeter defenses, badge access, fire suppression, climate control, and secure equipment disposal. You will learn how to evaluate the effectiveness of these controls and how questions about physical risks show up on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9f28f892/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 68: Identity and Access Management (IAM)</title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Episode 68: Identity and Access Management (IAM)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fcdf99a6-11b0-40b1-8b89-c9dbce6931e1</guid>
      <link>https://share.transistor.fm/s/22f6b350</link>
      <description>
        <![CDATA[<p>Access control is a critical concept tested throughout the CISA exam. In this episode, you will learn how to audit identity provisioning, authentication mechanisms, access reviews, and privilege management. Understanding IAM controls will help you confidently address scenarios involving security, compliance, and fraud prevention. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Access control is a critical concept tested throughout the CISA exam. In this episode, you will learn how to audit identity provisioning, authentication mechanisms, access reviews, and privilege management. Understanding IAM controls will help you confidently address scenarios involving security, compliance, and fraud prevention. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:31:44 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/22f6b350/e082feb9.mp3" length="45081687" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1126</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Access control is a critical concept tested throughout the CISA exam. In this episode, you will learn how to audit identity provisioning, authentication mechanisms, access reviews, and privilege management. Understanding IAM controls will help you confidently address scenarios involving security, compliance, and fraud prevention. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/22f6b350/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 69: Network and Endpoint Security</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>Episode 69: Network and Endpoint Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7197f270-09d0-427c-a36f-859aac307266</guid>
      <link>https://share.transistor.fm/s/cdd60e8b</link>
      <description>
        <![CDATA[<p>Network and endpoint security controls are essential for protecting IT infrastructure. This episode explains how to audit firewalls, intrusion detection systems, antivirus software, and patching procedures. You will also learn how to assess monitoring practices and system hardening strategies for Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Network and endpoint security controls are essential for protecting IT infrastructure. This episode explains how to audit firewalls, intrusion detection systems, antivirus software, and patching procedures. You will also learn how to assess monitoring practices and system hardening strategies for Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:32:23 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cdd60e8b/fa6f90ae.mp3" length="43446415" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1086</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Network and endpoint security controls are essential for protecting IT infrastructure. This episode explains how to audit firewalls, intrusion detection systems, antivirus software, and patching procedures. You will also learn how to assess monitoring practices and system hardening strategies for Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cdd60e8b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 70: Data Loss Prevention</title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>Episode 70: Data Loss Prevention</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff5ccb9e-e785-4594-9e61-b2a7d897d341</guid>
      <link>https://share.transistor.fm/s/547aebad</link>
      <description>
        <![CDATA[<p>Data loss prevention (DLP) tools and policies help prevent unauthorized exposure of sensitive information. In this episode, you will learn how to evaluate DLP strategy, endpoint protections, outbound filtering, and audit logging. This is a highly tested topic that connects information protection with compliance and incident response. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data loss prevention (DLP) tools and policies help prevent unauthorized exposure of sensitive information. In this episode, you will learn how to evaluate DLP strategy, endpoint protections, outbound filtering, and audit logging. This is a highly tested topic that connects information protection with compliance and incident response. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:32:55 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/547aebad/948cc6c0.mp3" length="43327288" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1083</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data loss prevention (DLP) tools and policies help prevent unauthorized exposure of sensitive information. In this episode, you will learn how to evaluate DLP strategy, endpoint protections, outbound filtering, and audit logging. This is a highly tested topic that connects information protection with compliance and incident response. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/547aebad/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 71: Data Encryption Methods and Controls</title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>Episode 71: Data Encryption Methods and Controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ddf60759-098a-4c1f-9501-5d6817be11e1</guid>
      <link>https://share.transistor.fm/s/53d84305</link>
      <description>
        <![CDATA[<p>Encryption is one of the most powerful tools for protecting sensitive data. This episode explains how to audit encryption in transit and at rest, evaluate key management practices, and assess alignment with organizational policies and legal requirements. These concepts are essential for Domain 5 and appear frequently in security-related CISA exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Encryption is one of the most powerful tools for protecting sensitive data. This episode explains how to audit encryption in transit and at rest, evaluate key management practices, and assess alignment with organizational policies and legal requirements. These concepts are essential for Domain 5 and appear frequently in security-related CISA exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:33:31 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/53d84305/d95f2916.mp3" length="47016838" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1175</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Encryption is one of the most powerful tools for protecting sensitive data. This episode explains how to audit encryption in transit and at rest, evaluate key management practices, and assess alignment with organizational policies and legal requirements. These concepts are essential for Domain 5 and appear frequently in security-related CISA exam questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/53d84305/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 72: Public Key Infrastructure (PKI)</title>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>Episode 72: Public Key Infrastructure (PKI)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d215abef-aa96-4d78-bbb1-b67e83b347d6</guid>
      <link>https://share.transistor.fm/s/77d3163d</link>
      <description>
        <![CDATA[<p>Public Key Infrastructure supports digital trust by enabling secure authentication and communication. In this episode, you will learn how to audit PKI components, such as certificate authorities, digital signatures, and key lifecycles. Understanding how PKI works and how to evaluate its controls is vital for passing Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Public Key Infrastructure supports digital trust by enabling secure authentication and communication. In this episode, you will learn how to audit PKI components, such as certificate authorities, digital signatures, and key lifecycles. Understanding how PKI works and how to evaluate its controls is vital for passing Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:34:12 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/77d3163d/5efde90a.mp3" length="44353389" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1108</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Public Key Infrastructure supports digital trust by enabling secure authentication and communication. In this episode, you will learn how to audit PKI components, such as certificate authorities, digital signatures, and key lifecycles. Understanding how PKI works and how to evaluate its controls is vital for passing Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/77d3163d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 73: Cloud and Virtualized Environments</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>Episode 73: Cloud and Virtualized Environments</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">abe72763-b9bb-45a1-a3d9-7bfc1234e538</guid>
      <link>https://share.transistor.fm/s/fb5c4df3</link>
      <description>
        <![CDATA[<p>Cloud and virtual systems require unique controls and audit approaches. This episode focuses on how to evaluate cloud security, shared responsibility models, virtual machine management, and containerization. You will also explore how to assess compliance and data protection within cloud-based infrastructures. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cloud and virtual systems require unique controls and audit approaches. This episode focuses on how to evaluate cloud security, shared responsibility models, virtual machine management, and containerization. You will also explore how to assess compliance and data protection within cloud-based infrastructures. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:34:50 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/fb5c4df3/d4e0ff0a.mp3" length="43030551" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1075</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cloud and virtual systems require unique controls and audit approaches. This episode focuses on how to evaluate cloud security, shared responsibility models, virtual machine management, and containerization. You will also explore how to assess compliance and data protection within cloud-based infrastructures. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fb5c4df3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 74: Mobile, Wireless, and IoT Device Security</title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>Episode 74: Mobile, Wireless, and IoT Device Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">73ecb2f9-6862-4298-a8f7-0e223af65f7c</guid>
      <link>https://share.transistor.fm/s/cc85b3cf</link>
      <description>
        <![CDATA[<p>Endpoint diversity brings complexity to audits. In this episode, you will learn how to evaluate controls for mobile devices, wireless networks, and Internet of Things technologies. Topics include encryption, mobile device management, authentication, and endpoint hardening, all of which are relevant to CISA Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Endpoint diversity brings complexity to audits. In this episode, you will learn how to evaluate controls for mobile devices, wireless networks, and Internet of Things technologies. Topics include encryption, mobile device management, authentication, and endpoint hardening, all of which are relevant to CISA Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:35:25 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cc85b3cf/0ed9bc0f.mp3" length="44805839" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1120</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Endpoint diversity brings complexity to audits. In this episode, you will learn how to evaluate controls for mobile devices, wireless networks, and Internet of Things technologies. Topics include encryption, mobile device management, authentication, and endpoint hardening, all of which are relevant to CISA Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cc85b3cf/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 75: Security Awareness Training and Programs</title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>Episode 75: Security Awareness Training and Programs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a9e4a832-5051-472c-b50a-18c4e4233c26</guid>
      <link>https://share.transistor.fm/s/f00fc82e</link>
      <description>
        <![CDATA[<p>Human error is a top cause of security breaches. This episode covers how to evaluate security awareness training programs, including content quality, delivery methods, tracking, and feedback mechanisms. You will also learn how to link training effectiveness with audit findings and policy compliance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Human error is a top cause of security breaches. This episode covers how to evaluate security awareness training programs, including content quality, delivery methods, tracking, and feedback mechanisms. You will also learn how to link training effectiveness with audit findings and policy compliance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:36:12 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f00fc82e/89ec62c7.mp3" length="42713953" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1067</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Human error is a top cause of security breaches. This episode covers how to evaluate security awareness training programs, including content quality, delivery methods, tracking, and feedback mechanisms. You will also learn how to link training effectiveness with audit findings and policy compliance. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f00fc82e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 76: Information System Attack Methods and Techniques</title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>Episode 76: Information System Attack Methods and Techniques</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3c564b7b-bb11-48e1-9614-53b45dcf39c1</guid>
      <link>https://share.transistor.fm/s/cf9d8cb4</link>
      <description>
        <![CDATA[<p>To audit effectively, you must understand how systems are attacked. This episode introduces common techniques such as phishing, malware, denial of service, and SQL injection. You will learn how to assess organizational preparedness and how this knowledge applies to audit procedures and CISA scenario questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>To audit effectively, you must understand how systems are attacked. This episode introduces common techniques such as phishing, malware, denial of service, and SQL injection. You will learn how to assess organizational preparedness and how this knowledge applies to audit procedures and CISA scenario questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:39:31 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cf9d8cb4/3f820e85.mp3" length="44151740" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1103</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>To audit effectively, you must understand how systems are attacked. This episode introduces common techniques such as phishing, malware, denial of service, and SQL injection. You will learn how to assess organizational preparedness and how this knowledge applies to audit procedures and CISA scenario questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cf9d8cb4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 77: Security Testing Tools and Techniques</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>Episode 77: Security Testing Tools and Techniques</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">380dc566-a8db-4b76-bf03-23ab83e4268b</guid>
      <link>https://share.transistor.fm/s/6448760d</link>
      <description>
        <![CDATA[<p>Security testing reveals weaknesses before attackers can exploit them. This episode explains how to audit vulnerability scanning, penetration testing, static code analysis, and system hardening. You will also learn how to interpret test results and validate remediation, which are common elements in Domain 5 questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security testing reveals weaknesses before attackers can exploit them. This episode explains how to audit vulnerability scanning, penetration testing, static code analysis, and system hardening. You will also learn how to interpret test results and validate remediation, which are common elements in Domain 5 questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:40:10 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/6448760d/797cbd1e.mp3" length="44776578" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1119</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security testing reveals weaknesses before attackers can exploit them. This episode explains how to audit vulnerability scanning, penetration testing, static code analysis, and system hardening. You will also learn how to interpret test results and validate remediation, which are common elements in Domain 5 questions. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 78: Security Monitoring Tools and Techniques</title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Episode 78: Security Monitoring Tools and Techniques</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6edbd664-b8d8-481c-ae93-8176dff01a2a</guid>
      <link>https://share.transistor.fm/s/9fac94dc</link>
      <description>
        <![CDATA[<p>Ongoing monitoring is vital for detecting and responding to threats. In this episode, you will explore how to evaluate log management, SIEM systems, network monitoring tools, and intrusion detection. Auditors must assess coverage, alerting capabilities, and response documentation to support Domain 5 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ongoing monitoring is vital for detecting and responding to threats. In this episode, you will explore how to evaluate log management, SIEM systems, network monitoring tools, and intrusion detection. Auditors must assess coverage, alerting capabilities, and response documentation to support Domain 5 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:41:05 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/9fac94dc/1ac3ec8c.mp3" length="45114083" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1127</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Ongoing monitoring is vital for detecting and responding to threats. In this episode, you will explore how to evaluate log management, SIEM systems, network monitoring tools, and intrusion detection. Auditors must assess coverage, alerting capabilities, and response documentation to support Domain 5 objectives. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9fac94dc/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 79: Security Incident Response Management</title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>Episode 79: Security Incident Response Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23849e8d-d1c2-49db-8d5f-b2584c7f0002</guid>
      <link>https://share.transistor.fm/s/19855192</link>
      <description>
        <![CDATA[<p>Incident response is a structured process that minimizes damage and recovers operations. This episode covers detection, escalation, containment, recovery, and reporting. You will learn how to evaluate incident handling procedures, assess team readiness, and align response plans with audit requirements. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Incident response is a structured process that minimizes damage and recovers operations. This episode covers detection, escalation, containment, recovery, and reporting. You will learn how to evaluate incident handling procedures, assess team readiness, and align response plans with audit requirements. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:45:36 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/19855192/7010a103.mp3" length="41185264" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1029</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Incident response is a structured process that minimizes damage and recovers operations. This episode covers detection, escalation, containment, recovery, and reporting. You will learn how to evaluate incident handling procedures, assess team readiness, and align response plans with audit requirements. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/19855192/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 80: Evidence Collection and Digital Forensics</title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>Episode 80: Evidence Collection and Digital Forensics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7e6290bb-62f6-4e51-84cb-9d6b8768c9ac</guid>
      <link>https://share.transistor.fm/s/642431c5</link>
      <description>
        <![CDATA[<p>Auditors may need to evaluate how evidence is preserved and used in investigations. This episode introduces forensic readiness, chain of custody, data integrity controls, and tool validation. You will also explore how forensic practices align with legal requirements and audit objectives in Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Auditors may need to evaluate how evidence is preserved and used in investigations. This episode introduces forensic readiness, chain of custody, data integrity controls, and tool validation. You will also explore how forensic practices align with legal requirements and audit objectives in Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:46:16 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/642431c5/8ebe38b3.mp3" length="39172794" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>979</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Auditors may need to evaluate how evidence is preserved and used in investigations. This episode introduces forensic readiness, chain of custody, data integrity controls, and tool validation. You will also explore how forensic practices align with legal requirements and audit objectives in Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 81: Planning Effective Information Systems Audits</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>Episode 81: Planning Effective Information Systems Audits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3a962ef3-f4b3-437e-8e98-e1dc1ed2eb0e</guid>
      <link>https://share.transistor.fm/s/8e7a006e</link>
      <description>
        <![CDATA[<p>Audit planning is the foundation of a successful engagement. In this episode, you will learn how to define audit scope, assess risk, allocate resources, and align objectives with organizational priorities. The CISA exam emphasizes your ability to create structured, risk-based audit plans that support clear execution. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Audit planning is the foundation of a successful engagement. In this episode, you will learn how to define audit scope, assess risk, allocate resources, and align objectives with organizational priorities. The CISA exam emphasizes your ability to create structured, risk-based audit plans that support clear execution. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:46:46 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/8e7a006e/42cce792.mp3" length="35954513" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>898</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Audit planning is the foundation of a successful engagement. In this episode, you will learn how to define audit scope, assess risk, allocate resources, and align objectives with organizational priorities. The CISA exam emphasizes your ability to create structured, risk-based audit plans that support clear execution. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8e7a006e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 82: Conducting Audits According to IS Audit Standards</title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Episode 82: Conducting Audits According to IS Audit Standards</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0014f897-e6ed-4f68-b031-b7981032e772</guid>
      <link>https://share.transistor.fm/s/59a28016</link>
      <description>
        <![CDATA[<p>This episode focuses on ISACA's audit standards and how to apply them during each phase of the audit process. You will learn how to ensure consistency, quality, and ethical conduct in your audits. Key topics include evidence collection, documentation, communication, and stakeholder engagement, all of which are tested on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode focuses on ISACA's audit standards and how to apply them during each phase of the audit process. You will learn how to ensure consistency, quality, and ethical conduct in your audits. Key topics include evidence collection, documentation, communication, and stakeholder engagement, all of which are tested on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:47:45 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/59a28016/34401e23.mp3" length="35033962" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>875</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This episode focuses on ISACA's audit standards and how to apply them during each phase of the audit process. You will learn how to ensure consistency, quality, and ethical conduct in your audits. Key topics include evidence collection, documentation, communication, and stakeholder engagement, all of which are tested on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/59a28016/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 83: Applying Project Management in IS Audits</title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>Episode 83: Applying Project Management in IS Audits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2f1b9f2c-8842-46ba-b3a3-be97ed8fb7d6</guid>
      <link>https://share.transistor.fm/s/ab786edf</link>
      <description>
        <![CDATA[<p>Auditors often lead projects that require formal planning and control. This episode explains how to apply project management principles within the audit context. Topics include scheduling, resourcing, risk management, and change tracking, all of which help auditors deliver results efficiently and are emphasized in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Auditors often lead projects that require formal planning and control. This episode explains how to apply project management principles within the audit context. Topics include scheduling, resourcing, risk management, and change tracking, all of which help auditors deliver results efficiently and are emphasized in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:48:24 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ab786edf/744f3c04.mp3" length="36579357" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>914</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Auditors often lead projects that require formal planning and control. This episode explains how to apply project management principles within the audit context. Topics include scheduling, resourcing, risk management, and change tracking, all of which help auditors deliver results efficiently and are emphasized in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ab786edf/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 84: Communicating Audit Results and Recommendations</title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>Episode 84: Communicating Audit Results and Recommendations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fe033bc4-92aa-4eda-9bfe-6fd1ad2e4c03</guid>
      <link>https://share.transistor.fm/s/21cd67b4</link>
      <description>
        <![CDATA[<p>Effective communication is a key skill for audit professionals. This episode covers how to present findings clearly, structure audit reports, and develop actionable recommendations. You will also learn how to handle disagreements with stakeholders and follow up on implementation, all of which are part of ISACA’s expectations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Effective communication is a key skill for audit professionals. This episode covers how to present findings clearly, structure audit reports, and develop actionable recommendations. You will also learn how to handle disagreements with stakeholders and follow up on implementation, all of which are part of ISACA’s expectations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:49:21 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/21cd67b4/6b254f12.mp3" length="36794613" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>919</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Effective communication is a key skill for audit professionals. This episode covers how to present findings clearly, structure audit reports, and develop actionable recommendations. You will also learn how to handle disagreements with stakeholders and follow up on implementation, all of which are part of ISACA’s expectations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/21cd67b4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 85: Conducting Post-Audit Follow-Up</title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>Episode 85: Conducting Post-Audit Follow-Up</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bb99e625-0d7a-46c0-a2f1-de7685206de8</guid>
      <link>https://share.transistor.fm/s/ef0a74a0</link>
      <description>
        <![CDATA[<p>The audit is not complete until findings have been addressed. This episode focuses on follow-up activities, including how to verify remediation, reassess risk, and update stakeholders. You will learn how to document follow-up results and integrate them into future audit planning, a key topic for CISA candidates. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The audit is not complete until findings have been addressed. This episode focuses on follow-up activities, including how to verify remediation, reassess risk, and update stakeholders. You will learn how to document follow-up results and integrate them into future audit planning, a key topic for CISA candidates. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:49:55 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ef0a74a0/adb852ea.mp3" length="37940850" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>948</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The audit is not complete until findings have been addressed. This episode focuses on follow-up activities, including how to verify remediation, reassess risk, and update stakeholders. You will learn how to document follow-up results and integrate them into future audit planning, a key topic for CISA candidates. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ef0a74a0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 86: Utilizing Data Analytics in Auditing</title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>Episode 86: Utilizing Data Analytics in Auditing</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ca082fb6-e8a4-455d-a91e-daecda5c69f6</guid>
      <link>https://share.transistor.fm/s/a7d2cdd6</link>
      <description>
        <![CDATA[<p>Data analytics is transforming how audits are conducted. In this episode, you will explore how to apply analytic tools for risk assessment, control testing, and anomaly detection. You will also learn how to evaluate data quality and integrate analytics into audit workflows, aligning with CISA’s emphasis on technology-enabled audits. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data analytics is transforming how audits are conducted. In this episode, you will explore how to apply analytic tools for risk assessment, control testing, and anomaly detection. You will also learn how to evaluate data quality and integrate analytics into audit workflows, aligning with CISA’s emphasis on technology-enabled audits. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:50:28 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/a7d2cdd6/ca2b7c3c.mp3" length="41070324" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1026</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data analytics is transforming how audits are conducted. In this episode, you will explore how to apply analytic tools for risk assessment, control testing, and anomaly detection. You will also learn how to evaluate data quality and integrate analytics into audit workflows, aligning with CISA’s emphasis on technology-enabled audits. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a7d2cdd6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 87: Evaluating Automation and Decision-Making Systems</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>Episode 87: Evaluating Automation and Decision-Making Systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef8bc4d6-4a52-4f6c-9a71-060ac1cdec72</guid>
      <link>https://share.transistor.fm/s/810498d6</link>
      <description>
        <![CDATA[<p>Automated systems introduce unique risks and controls. This episode teaches you how to audit robotic process automation, decision engines, AI tools, and algorithmic logic. You will learn how to assess governance, bias, and control design in technology-driven environments, which are increasingly tested on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Automated systems introduce unique risks and controls. This episode teaches you how to audit robotic process automation, decision engines, AI tools, and algorithmic logic. You will learn how to assess governance, bias, and control design in technology-driven environments, which are increasingly tested on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:51:08 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/810498d6/ee44ea8a.mp3" length="43224917" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1080</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Automated systems introduce unique risks and controls. This episode teaches you how to audit robotic process automation, decision engines, AI tools, and algorithmic logic. You will learn how to assess governance, bias, and control design in technology-driven environments, which are increasingly tested on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/810498d6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 88: Quality Assurance and Improvement of Audit Processes</title>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>Episode 88: Quality Assurance and Improvement of Audit Processes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8b51cdb-598b-418e-beee-aff977aa6d44</guid>
      <link>https://share.transistor.fm/s/dbf98824</link>
      <description>
        <![CDATA[<p>Audit functions must be continuously evaluated and improved. This episode covers quality assurance techniques including internal assessments, external reviews, performance metrics, and lessons learned. You will learn how to audit the audit function itself and ensure compliance with professional standards. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Audit functions must be continuously evaluated and improved. This episode covers quality assurance techniques including internal assessments, external reviews, performance metrics, and lessons learned. You will learn how to audit the audit function itself and ensure compliance with professional standards. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:51:58 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/dbf98824/5ca6075b.mp3" length="40458030" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1011</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Audit functions must be continuously evaluated and improved. This episode covers quality assurance techniques including internal assessments, external reviews, performance metrics, and lessons learned. You will learn how to audit the audit function itself and ensure compliance with professional standards. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dbf98824/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 89: Evaluating IT Strategy Alignment</title>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>Episode 89: Evaluating IT Strategy Alignment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ad390606-574c-4cf5-a573-db37ab863666</guid>
      <link>https://share.transistor.fm/s/25ead1ce</link>
      <description>
        <![CDATA[<p>IT strategy must support business goals and risk tolerance. In this episode, you will learn how to assess whether IT initiatives are aligned with enterprise objectives, supported by governance, and tracked with appropriate metrics. Strategic alignment is a frequent theme in Domain 2 and appears in exam scenarios involving IT oversight. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>IT strategy must support business goals and risk tolerance. In this episode, you will learn how to assess whether IT initiatives are aligned with enterprise objectives, supported by governance, and tracked with appropriate metrics. Strategic alignment is a frequent theme in Domain 2 and appears in exam scenarios involving IT oversight. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:52:22 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/25ead1ce/7fd21242.mp3" length="42783953" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1069</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>IT strategy must support business goals and risk tolerance. In this episode, you will learn how to assess whether IT initiatives are aligned with enterprise objectives, supported by governance, and tracked with appropriate metrics. Strategic alignment is a frequent theme in Domain 2 and appears in exam scenarios involving IT oversight. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/25ead1ce/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 90: Evaluating IT Governance Effectiveness</title>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>Episode 90: Evaluating IT Governance Effectiveness</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">05df44e3-dffe-44b5-95fb-614cf9665c93</guid>
      <link>https://share.transistor.fm/s/ef7efcee</link>
      <description>
        <![CDATA[<p>Strong governance ensures that IT delivers value and manages risk. This episode explains how to evaluate governance frameworks, board oversight, decision-making processes, and policy enforcement. You will also explore the relationship between governance maturity and audit planning as emphasized in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Strong governance ensures that IT delivers value and manages risk. This episode explains how to evaluate governance frameworks, board oversight, decision-making processes, and policy enforcement. You will also explore the relationship between governance maturity and audit planning as emphasized in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:53:09 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/ef7efcee/7ba5dc11.mp3" length="43192514" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1079</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Strong governance ensures that IT delivers value and manages risk. This episode explains how to evaluate governance frameworks, board oversight, decision-making processes, and policy enforcement. You will also explore the relationship between governance maturity and audit planning as emphasized in the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ef7efcee/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 91: Evaluating IT Resource and Project Management Alignment</title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>Episode 91: Evaluating IT Resource and Project Management Alignment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">272ea8e6-feaa-4a73-b83d-2e427cfdc482</guid>
      <link>https://share.transistor.fm/s/cb8f054c</link>
      <description>
        <![CDATA[<p>To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through how to evaluate resource allocation, project portfolio oversight, scheduling practices, and strategic alignment. You will also learn how to identify gaps in resource governance that auditors are expected to flag. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through how to evaluate resource allocation, project portfolio oversight, scheduling practices, and strategic alignment. You will also learn how to identify gaps in resource governance that auditors are expected to flag. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:56:20 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/cb8f054c/a4bf31cb.mp3" length="41894768" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1047</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>To succeed on the CISA exam, you must be able to assess whether IT resources and project management practices support enterprise objectives. This episode walks through how to evaluate resource allocation, project portfolio oversight, scheduling practices, and strategic alignment. You will also learn how to identify gaps in resource governance that auditors are expected to flag. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cb8f054c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 92: Evaluating Ownership of IT Risks, Controls, and Standards</title>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:title>Episode 92: Evaluating Ownership of IT Risks, Controls, and Standards</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ec02bd04-6cf0-4813-9829-4fe7f207d478</guid>
      <link>https://share.transistor.fm/s/b81b84aa</link>
      <description>
        <![CDATA[<p>Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for IT risks, control implementation, and compliance with internal standards. Understanding ownership structure is a critical aspect of governance and frequently appears in CISA scenarios that test accountability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for IT risks, control implementation, and compliance with internal standards. Understanding ownership structure is a critical aspect of governance and frequently appears in CISA scenarios that test accountability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:56:53 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b81b84aa/d2ccbeee.mp3" length="44989757" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1124</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Effective risk management requires clearly assigned ownership. In this episode, you will learn how to evaluate whether an organization has defined responsibility for IT risks, control implementation, and compliance with internal standards. Understanding ownership structure is a critical aspect of governance and frequently appears in CISA scenarios that test accountability. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b81b84aa/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 93: Evaluating IT Key Performance and Risk Indicators</title>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:title>Episode 93: Evaluating IT Key Performance and Risk Indicators</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5fe49e0b-25b2-4723-9fee-ee7f6fa8cb35</guid>
      <link>https://share.transistor.fm/s/66324cc1</link>
      <description>
        <![CDATA[<p>Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monitored, and used to guide decision-making. You will learn how auditors validate metric accuracy, relevance, and consistency with business goals, all of which are crucial for mastering Domain 2. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monitored, and used to guide decision-making. You will learn how auditors validate metric accuracy, relevance, and consistency with business goals, all of which are crucial for mastering Domain 2. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:57:32 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/66324cc1/cc8d148d.mp3" length="42432884" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1060</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Key performance and risk indicators provide insight into IT effectiveness and exposure. This episode teaches you how to evaluate how KPIs and KRIs are selected, monitored, and used to guide decision-making. You will learn how auditors validate metric accuracy, relevance, and consistency with business goals, all of which are crucial for mastering Domain 2. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/66324cc1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 94: Evaluating IT Vendor Selection and Contract Management</title>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:title>Episode 94: Evaluating IT Vendor Selection and Contract Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f3669484-49a7-41bc-a61b-42302133f6a9</guid>
      <link>https://share.transistor.fm/s/eb9ee1bd</link>
      <description>
        <![CDATA[<p>Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you will learn how to evaluate procurement criteria, due diligence processes, contract terms, and ongoing monitoring practices. These concepts are frequently tested on the CISA exam in questions involving third-party risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you will learn how to evaluate procurement criteria, due diligence processes, contract terms, and ongoing monitoring practices. These concepts are frequently tested on the CISA exam in questions involving third-party risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:58:14 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/eb9ee1bd/9c5a6905.mp3" length="47410783" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1185</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Auditors play an essential role in verifying that vendor selection and contract oversight meet organizational, legal, and regulatory expectations. In this episode, you will learn how to evaluate procurement criteria, due diligence processes, contract terms, and ongoing monitoring practices. These concepts are frequently tested on the CISA exam in questions involving third-party risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/eb9ee1bd/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 95: Evaluating Supply Chain Risk and Integrity Issues</title>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:title>Episode 95: Evaluating Supply Chain Risk and Integrity Issues</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c15f8f94-bc34-458e-804e-e740e221b64b</guid>
      <link>https://share.transistor.fm/s/36f002c7</link>
      <description>
        <![CDATA[<p>Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersecurity posture, and fraud potential. You will also learn how to verify controls over third-party access and subcontractors, all of which are relevant for audit scenarios on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersecurity posture, and fraud potential. You will also learn how to verify controls over third-party access and subcontractors, all of which are relevant for audit scenarios on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:58:46 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/36f002c7/9e3c4f0e.mp3" length="45179921" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1129</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Modern IT environments rely on complex supply chains that must be evaluated for risk. This episode explores how to assess supplier integrity, dependency risk, cybersecurity posture, and fraud potential. You will also learn how to verify controls over third-party access and subcontractors, all of which are relevant for audit scenarios on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/36f002c7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 96: Evaluating End-User Support Processes</title>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:title>Episode 96: Evaluating End-User Support Processes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c248ba66-8bea-49a4-9c7f-d7c369728728</guid>
      <link>https://share.transistor.fm/s/b1134a69</link>
      <description>
        <![CDATA[<p>Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution, escalation paths, and training services. You will also learn how to evaluate whether support metrics align with service level expectations and risk management goals. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution, escalation paths, and training services. You will also learn how to evaluate whether support metrics align with service level expectations and risk management goals. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:59:21 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b1134a69/fb4df5f1.mp3" length="42959501" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1073</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Supporting end users requires processes that are responsive, secure, and well-documented. This episode focuses on how to audit help desk operations, ticket resolution, escalation paths, and training services. You will also learn how to evaluate whether support metrics align with service level expectations and risk management goals. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b1134a69/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 97: Evaluating Enterprise Architecture Alignment</title>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:title>Episode 97: Evaluating Enterprise Architecture Alignment</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b432669f-8f57-4b85-aa15-86f0ffdb281d</guid>
      <link>https://share.transistor.fm/s/b0323e95</link>
      <description>
        <![CDATA[<p>Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, governance processes, technology standards, and decision-making roles. You will also explore how to audit EA for strategic alignment and integration with enterprise risk management. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, governance processes, technology standards, and decision-making roles. You will also explore how to audit EA for strategic alignment and integration with enterprise risk management. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 12:59:59 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/b0323e95/f53a2509.mp3" length="43544651" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1088</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Enterprise architecture must align with organizational strategy to ensure long-term IT value. This episode teaches you how to assess architectural documentation, governance processes, technology standards, and decision-making roles. You will also explore how to audit EA for strategic alignment and integration with enterprise risk management. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b0323e95/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 98: Evaluating IT Operations and Maintenance Practices</title>
      <itunes:episode>98</itunes:episode>
      <podcast:episode>98</podcast:episode>
      <itunes:title>Episode 98: Evaluating IT Operations and Maintenance Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">980fba0c-07ed-43de-9da1-47afecf0f87a</guid>
      <link>https://share.transistor.fm/s/d8491808</link>
      <description>
        <![CDATA[<p>Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenance routines, service management processes, and monitoring controls. The CISA exam frequently tests your ability to identify deficiencies in daily IT operations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenance routines, service management processes, and monitoring controls. The CISA exam frequently tests your ability to identify deficiencies in daily IT operations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 13:00:45 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/d8491808/7f3a18af.mp3" length="50273799" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1256</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Operations and maintenance are critical to IT service delivery and risk control. In this episode, you will learn how to audit operational support, preventive maintenance routines, service management processes, and monitoring controls. The CISA exam frequently tests your ability to identify deficiencies in daily IT operations. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d8491808/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 99: Evaluating Data Governance Program</title>
      <itunes:episode>99</itunes:episode>
      <podcast:episode>99</podcast:episode>
      <itunes:title>Episode 99: Evaluating Data Governance Program</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">43bb5de8-7129-44b6-a7d8-c2e3fade9844</guid>
      <link>https://share.transistor.fm/s/5f98995f</link>
      <description>
        <![CDATA[<p>Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle controls. You will learn how auditors assess alignment with policies and regulatory requirements, making this a key episode for Domain 2 and Domain 5 exam success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle controls. You will learn how auditors assess alignment with policies and regulatory requirements, making this a key episode for Domain 2 and Domain 5 exam success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 13:01:16 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/5f98995f/beb43e0d.mp3" length="46876820" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1171</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Data governance defines how information is managed, secured, and used. This episode covers how to evaluate data ownership, stewardship, classification, and lifecycle controls. You will learn how auditors assess alignment with policies and regulatory requirements, making this a key episode for Domain 2 and Domain 5 exam success. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5f98995f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 100: Evaluating Privacy and Data Classification Programs</title>
      <itunes:episode>100</itunes:episode>
      <podcast:episode>100</podcast:episode>
      <itunes:title>Episode 100: Evaluating Privacy and Data Classification Programs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fb513d58-a294-4617-a354-e2f07063fd6d</guid>
      <link>https://share.transistor.fm/s/c343d806</link>
      <description>
        <![CDATA[<p>Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classification schemes, and data-handling procedures. You will also learn how to assess program maturity and legal compliance, which are critical for high-scoring performance on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classification schemes, and data-handling procedures. You will also learn how to assess program maturity and legal compliance, which are critical for high-scoring performance on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 13:01:54 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/c343d806/03691593.mp3" length="50848496" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1271</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Privacy and data classification are integral to protecting information assets. This episode explains how to audit privacy frameworks, policy enforcement, classification schemes, and data-handling procedures. You will also learn how to assess program maturity and legal compliance, which are critical for high-scoring performance on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c343d806/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management</title>
      <itunes:episode>101</itunes:episode>
      <podcast:episode>101</podcast:episode>
      <itunes:title>Episode 101: Evaluating Policies Related to IT Asset Lifecycle Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4ca75abe-c320-4845-bde3-6c7d66ff9ddc</guid>
      <link>https://share.transistor.fm/s/570bcaa3</link>
      <description>
        <![CDATA[<p>IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage, reassignment, retirement, and data sanitization. These areas are tested in Domain 4 and require auditors to verify asset traceability, accountability, and risk mitigation. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage, reassignment, retirement, and data sanitization. These areas are tested in Domain 4 and require auditors to verify asset traceability, accountability, and risk mitigation. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 13:02:19 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/570bcaa3/fcf9f8b8.mp3" length="48210138" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1205</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>IT assets require controls from acquisition through disposal. In this episode, you will learn how to evaluate lifecycle policies, including procurement, tagging, usage, reassignment, retirement, and data sanitization. These areas are tested in Domain 4 and require auditors to verify asset traceability, accountability, and risk mitigation. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/570bcaa3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 102: Evaluating Shadow IT Risks and Controls</title>
      <itunes:episode>102</itunes:episode>
      <podcast:episode>102</podcast:episode>
      <itunes:title>Episode 102: Evaluating Shadow IT Risks and Controls</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">069d6a50-af8d-4932-b39a-693f3f7d0821</guid>
      <link>https://share.transistor.fm/s/af075c2c</link>
      <description>
        <![CDATA[<p>Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will also learn how to identify detection methods, review compensating controls, and evaluate policies to reduce shadow IT exposure—skills that frequently appear on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will also learn how to identify detection methods, review compensating controls, and evaluate policies to reduce shadow IT exposure—skills that frequently appear on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 13:03:13 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/af075c2c/d6922547.mp3" length="46134950" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1153</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Shadow IT introduces risk outside of sanctioned governance. This episode teaches you how to audit unsanctioned applications, unauthorized system use, and spreadsheet-based end-user tools. You will also learn how to identify detection methods, review compensating controls, and evaluate policies to reduce shadow IT exposure—skills that frequently appear on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/af075c2c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 103: Evaluating Threat and Vulnerability Management</title>
      <itunes:episode>103</itunes:episode>
      <podcast:episode>103</podcast:episode>
      <itunes:title>Episode 103: Evaluating Threat and Vulnerability Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7a3862dd-b65e-4e76-8b36-690d56119a80</guid>
      <link>https://share.transistor.fm/s/e149756a</link>
      <description>
        <![CDATA[<p>Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candidates in Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candidates in Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 13:03:46 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/e149756a/93807400.mp3" length="47780671" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1194</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Organizations must proactively manage threats and vulnerabilities to remain secure. This episode covers how to audit threat intelligence collection, vulnerability assessments, scanning schedules, remediation timelines, and patch prioritization. You will also learn how to tie findings to control effectiveness and audit risk—core tasks for CISA candidates in Domain 5. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e149756a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 104: Providing Guidance on Information Systems Quality Improvement</title>
      <itunes:episode>104</itunes:episode>
      <podcast:episode>104</podcast:episode>
      <itunes:title>Episode 104: Providing Guidance on Information Systems Quality Improvement</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cde99f91-0295-4d0c-b37d-3426bd122e98</guid>
      <link>https://share.transistor.fm/s/f26c93ac</link>
      <description>
        <![CDATA[<p>Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement programs, recommend control enhancements, and review post-audit actions. You will also explore how these contributions strengthen governance and demonstrate audit value on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement programs, recommend control enhancements, and review post-audit actions. You will also explore how these contributions strengthen governance and demonstrate audit value on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 13:04:28 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f26c93ac/15178b37.mp3" length="46978204" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1174</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Auditors are expected to identify improvement opportunities and support quality initiatives. In this episode, you will learn how to evaluate continuous improvement programs, recommend control enhancements, and review post-audit actions. You will also explore how these contributions strengthen governance and demonstrate audit value on the CISA exam. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f26c93ac/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode 105: Evaluating Risks of Emerging Technologies and Practices</title>
      <itunes:episode>105</itunes:episode>
      <podcast:episode>105</podcast:episode>
      <itunes:title>Episode 105: Evaluating Risks of Emerging Technologies and Practices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a91e32a3-965c-4e01-8331-5bc0efc38575</guid>
      <link>https://share.transistor.fm/s/05c3da79</link>
      <description>
        <![CDATA[<p>Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blockchain, edge computing, and evolving regulatory landscapes. You will learn how to audit control readiness, policy alignment, and adoption strategies—essential knowledge for CISA questions on innovation risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blockchain, edge computing, and evolving regulatory landscapes. You will learn how to audit control readiness, policy alignment, and adoption strategies—essential knowledge for CISA questions on innovation risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </content:encoded>
      <pubDate>Sun, 06 Jul 2025 13:04:54 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/05c3da79/a1b2ed17.mp3" length="46813104" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>1170</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Staying ahead of risk means understanding new technologies and trends. This episode focuses on how to evaluate emerging threats related to artificial intelligence, blockchain, edge computing, and evolving regulatory landscapes. You will learn how to audit control readiness, policy alignment, and adoption strategies—essential knowledge for CISA questions on innovation risk. Ready to start your journey with confidence? Learn more at BareMetalCyber.com.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/05c3da79/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Welcome to the ISACA CISA Certification</title>
      <itunes:title>Welcome to the ISACA CISA Certification</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">4327c286-6327-43f0-b933-bdfbea26ff79</guid>
      <link>https://share.transistor.fm/s/f4fa4acd</link>
      <description>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 22:42:32 -0500</pubDate>
      <author>Dr Jason Edwards</author>
      <enclosure url="https://media.transistor.fm/f4fa4acd/29c34587.mp3" length="3942399" type="audio/mpeg"/>
      <itunes:author>Dr Jason Edwards</itunes:author>
      <itunes:duration>99</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Dive into a fast, no-fluff overview of what this podcast delivers, who it’s for, and how each episode helps you level up with practical, real-world takeaways. In this trailer, you’ll hear the show’s promise, the format you can expect, and a sneak peek at the kinds of stories, tips, and expert insights coming your way. Hit follow to get new episodes as they drop and start listening smarter from day one.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISA, audit planning, IT governance, risk management, information security, system implementation, business continuity, data analytics, compliance, control assessment, cybersecurity, ISACA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f4fa4acd/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
  </channel>
</rss>
