<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/723399.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Cybersecurity Risk</title>

  <lastBuildDate>Thu, 26 Mar 2026 16:26:58 -0400</lastBuildDate>
  <link>https://www.execcybered.com/podcast</link>
  <language>en</language>
  <copyright>© 2026 E|CE - Executive Cyber Education</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>747bde03-d267-5cdc-a8fc-f6d2579eeee2</podcast:guid>
  <itunes:author>Dr. Bill Souza</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p><b>Feeling overwhelmed by cyber risk?</b> You're not alone. In today's digital world, cyber threats are a complex issue and a strategic opportunity to strengthen your organization's resilience.<br><br></p><p>This podcast dives deep into the world of <b>cyber governance and risk management</b>. We'll have open conversations with experts to help you take your organization's cybersecurity posture from "as-is" to the next level.<br><br></p><p><b>Here's what you'll learn:</b></p><ul><li><b>Program and control assessments:</b> Identify weaknesses in your current defenses.</li><li><b>Risk identification and mitigation:</b> Proactively address threats before they strike.</li><li><b>Building a risk register:</b> Track and prioritize your organization's vulnerabilities.</li><li><b>Crafting effective mitigation plans:</b> Develop strategies to minimize cyber risk.</li><li><b>And much more!</b></li></ul><p><br></p><p><b>Join us and learn how to navigate the ever-evolving cyber landscape with confidence.</b></p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>governance, risk, cyber risk, strategy, NIST CSF, NIST</itunes:keywords>
  <itunes:owner>
    <itunes:name>Dr. Bill Souza</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/mqaitth1shzhmtql0ylbqukv3cu1?.jpg</url>
     <title>Cybersecurity Risk</title>
     <link>https://www.execcybered.com/podcast</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/mqaitth1shzhmtql0ylbqukv3cu1?.jpg" />
  <itunes:category text="Technology" />
  <itunes:category text="Business">
    <itunes:category text="Management" />
  </itunes:category>
  <itunes:category text="Education">
    <itunes:category text="Courses" />
  </itunes:category>
  <item>
    <itunes:title>Seize Control: How CTEM Can Fortify Your Organization’s Defense</itunes:title>
    <title>Seize Control: How CTEM Can Fortify Your Organization’s Defense</title>
    <itunes:summary><![CDATA[Send us Fan Mail In this episode, I will dive into Continuous Threat Exposure Management (CTEM) and how it revolutionizes vulnerability prioritization. I discuss the essential steps—scoping, discovery, prioritization, validation, and mobilization—required for effective risk management. Learn how to align your security efforts with mission-based goals and leverage CTEM to protect your organization's critical assets. Gain insights into overcoming implementation challenges and the necessity of i...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In this episode, I will dive into Continuous Threat Exposure Management (CTEM) and how it revolutionizes vulnerability prioritization. I discuss the essential steps—scoping, discovery, prioritization, validation, and mobilization—required for effective risk management. Learn how to align your security efforts with mission-based goals and leverage CTEM to protect your organization&apos;s critical assets. Gain insights into overcoming implementation challenges and the necessity of integrating various security tools while maintaining strategic oversight.</p><p>00:00 Introduction and Viewer Question</p><p>00:37 Understanding Risk Reduction Beyond Tools</p><p>02:54 The Importance of Prioritization</p><p>03:05 Five Steps to Effective Risk Management</p><p>06:06 Challenges and Considerations in CTEM Implementation</p><p>07:39 The Human Element in Risk Management</p><p>09:12 Conclusion and Final Thoughts</p><p><br/></p><blockquote><b>Do you want to succeed in your next Cybersecurity Risk Assessment?</b><b>Here is a quick start guide:</b> <a href='https://www.execcybered.com/ECE/3-step-framework-sp/3-step-framework/'>https://www.execcybered.com/ECE/3-step-framework-sp/3-step-framework/</a></blockquote>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In this episode, I will dive into Continuous Threat Exposure Management (CTEM) and how it revolutionizes vulnerability prioritization. I discuss the essential steps—scoping, discovery, prioritization, validation, and mobilization—required for effective risk management. Learn how to align your security efforts with mission-based goals and leverage CTEM to protect your organization&apos;s critical assets. Gain insights into overcoming implementation challenges and the necessity of integrating various security tools while maintaining strategic oversight.</p><p>00:00 Introduction and Viewer Question</p><p>00:37 Understanding Risk Reduction Beyond Tools</p><p>02:54 The Importance of Prioritization</p><p>03:05 Five Steps to Effective Risk Management</p><p>06:06 Challenges and Considerations in CTEM Implementation</p><p>07:39 The Human Element in Risk Management</p><p>09:12 Conclusion and Final Thoughts</p><p><br/></p><blockquote><b>Do you want to succeed in your next Cybersecurity Risk Assessment?</b><b>Here is a quick start guide:</b> <a href='https://www.execcybered.com/ECE/3-step-framework-sp/3-step-framework/'>https://www.execcybered.com/ECE/3-step-framework-sp/3-step-framework/</a></blockquote>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17754913-seize-control-how-ctem-can-fortify-your-organization-s-defense.mp3" length="8550928" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17754913</guid>
    <pubDate>Fri, 29 Aug 2025 08:00:00 -0400</pubDate>
    <itunes:duration>709</itunes:duration>
    <itunes:keywords>CTEM, Cybersecurity, Threat Exposure Management, Continuous Threat Exposure Management, Risk Management, Vulnerability Management, CVSS, CVE, Proactive Cybersecurity, Mission-Based Cybersecurity, Asset Criticality, Attack Path Analysis, Threat Intelligenc</itunes:keywords>
    <itunes:episode>108</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Unexpected Role of Impact in Cybersecurity Risk – A Must Know!</itunes:title>
    <title>The Unexpected Role of Impact in Cybersecurity Risk – A Must Know!</title>
    <itunes:summary><![CDATA[Send us Fan Mail Understanding Impact Assessment in Cybersecurity: A Deep Dive  In this video, I tackle the questions: Does impact assessment exist in cybersecurity, and how is it conducted? I break down the fundamental formula of cybersecurity risk, which includes threat, vulnerability, and impact. The different types of impact—financial, reputational, and operational—and how to classify them. Discover the importance of context in impact analysis across device-level, application-level, and o...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Understanding Impact Assessment in Cybersecurity: A Deep Dive<br/><br/>In this video, I tackle the questions: Does impact assessment exist in cybersecurity, and how is it conducted? I break down the fundamental formula of cybersecurity risk, which includes threat, vulnerability, and impact. The different types of impact—financial, reputational, and operational—and how to classify them. Discover the importance of context in impact analysis across device-level, application-level, and organizational-level ecosystems.<br/><br/>00:00 Introduction and Viewer Questions<br/>00:08 Understanding Impact Assessment in Cybersecurity<br/>00:33 Breaking Down the Impact Formula<br/>01:10 Contextualizing Impact in Cybersecurity<br/>01:54 Layers of Impact Analysis<br/>03:32 Operational, Financial, and Reputational Impact<br/>05:12 Standalone vs. Integrated Impact Assessment<br/>05:37 Conclusion and Final Thoughts<br/><br/>Cyber Risk Assessment - 3-Step Framework: https://www.execcybered.com/ECE/3-step-framework-sp/3-step-framework/</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Understanding Impact Assessment in Cybersecurity: A Deep Dive<br/><br/>In this video, I tackle the questions: Does impact assessment exist in cybersecurity, and how is it conducted? I break down the fundamental formula of cybersecurity risk, which includes threat, vulnerability, and impact. The different types of impact—financial, reputational, and operational—and how to classify them. Discover the importance of context in impact analysis across device-level, application-level, and organizational-level ecosystems.<br/><br/>00:00 Introduction and Viewer Questions<br/>00:08 Understanding Impact Assessment in Cybersecurity<br/>00:33 Breaking Down the Impact Formula<br/>01:10 Contextualizing Impact in Cybersecurity<br/>01:54 Layers of Impact Analysis<br/>03:32 Operational, Financial, and Reputational Impact<br/>05:12 Standalone vs. Integrated Impact Assessment<br/>05:37 Conclusion and Final Thoughts<br/><br/>Cyber Risk Assessment - 3-Step Framework: https://www.execcybered.com/ECE/3-step-framework-sp/3-step-framework/</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17695816-the-unexpected-role-of-impact-in-cybersecurity-risk-a-must-know.mp3" length="4112521" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17695816</guid>
    <pubDate>Tue, 19 Aug 2025 03:00:00 -0400</pubDate>
    <itunes:duration>339</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>107</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Missed Vulnerabilities: How to Fix and Prevent Them in Future Assessments</itunes:title>
    <title>Missed Vulnerabilities: How to Fix and Prevent Them in Future Assessments</title>
    <itunes:summary><![CDATA[Send us Fan Mail It's a common, yet unsettling, scenario in cybersecurity risk assessment: discovering a crucial component was overlooked after an assessment is complete. The question often arises: "How do you handle missing risks in a risk assessment? What can you do in the situation, and how can you prevent this from happening again?" Let's unpack this compound query, focusing on mission-based cyber risk management and practical prevention strategies. Dr. B.  ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>It&apos;s a common, yet unsettling, scenario in <b>cybersecurity risk assessment</b>: discovering a crucial component was overlooked after an assessment is complete. The question often arises: &quot;How do you handle missing risks in a risk assessment? What can you do in the situation, and how can you prevent this from happening again?&quot;</p><p>Let&apos;s unpack this compound query, focusing on <b>mission-based cyber risk management</b> and practical prevention strategies.</p><p>Dr. B. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>It&apos;s a common, yet unsettling, scenario in <b>cybersecurity risk assessment</b>: discovering a crucial component was overlooked after an assessment is complete. The question often arises: &quot;How do you handle missing risks in a risk assessment? What can you do in the situation, and how can you prevent this from happening again?&quot;</p><p>Let&apos;s unpack this compound query, focusing on <b>mission-based cyber risk management</b> and practical prevention strategies.</p><p>Dr. B. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17562229-missed-vulnerabilities-how-to-fix-and-prevent-them-in-future-assessments.mp3" length="5800254" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17562229</guid>
    <pubDate>Thu, 31 Jul 2025 00:00:00 -0400</pubDate>
    <itunes:duration>480</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>106</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Navigating the Human Element in Cybersecurity Risk Assessment</itunes:title>
    <title>Navigating the Human Element in Cybersecurity Risk Assessment</title>
    <itunes:summary><![CDATA[Send us Fan Mail As cybersecurity professionals, we often dive deep into the intricacies of networks, code, and vulnerabilities. We assume that identifying assets, scanning for weaknesses, and generating reports are the core of cybersecurity risk assessment. But if you've ever spent a day in a corporate environment, you know the biggest challenge isn't the technology; it's the people. Today, let's explore two critical points: how we got here and, more importantly, how we get out of it. Dr. B....]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>As cybersecurity professionals, we often dive deep into the intricacies of networks, code, and vulnerabilities. We assume that identifying assets, scanning for weaknesses, and generating reports are the core of <b>cybersecurity risk assessment</b>. But if you&apos;ve ever spent a day in a corporate environment, you know the biggest challenge isn&apos;t the technology; it&apos;s the <b>people</b>.</p><p>Today, let&apos;s explore two critical points: <b>how we got here</b> and, more importantly, <b>how we get out of it</b>.</p><p>Dr. B. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>As cybersecurity professionals, we often dive deep into the intricacies of networks, code, and vulnerabilities. We assume that identifying assets, scanning for weaknesses, and generating reports are the core of <b>cybersecurity risk assessment</b>. But if you&apos;ve ever spent a day in a corporate environment, you know the biggest challenge isn&apos;t the technology; it&apos;s the <b>people</b>.</p><p>Today, let&apos;s explore two critical points: <b>how we got here</b> and, more importantly, <b>how we get out of it</b>.</p><p>Dr. B. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17562225-navigating-the-human-element-in-cybersecurity-risk-assessment.mp3" length="6061350" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17562225</guid>
    <pubDate>Fri, 25 Jul 2025 08:00:00 -0400</pubDate>
    <itunes:duration>501</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>105</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mastering Cyber Asset Sampling: Optimize Your Assessment Process</itunes:title>
    <title>Mastering Cyber Asset Sampling: Optimize Your Assessment Process</title>
    <itunes:summary><![CDATA[Send us Fan Mail Cyber Asset Assessment: Understanding the Importance of Sampling  In this episode, I dive into the crucial step of sampling in cyber asset assessment. Learn why sampling is essential, especially when dealing with large environments and limited resources. Discover the various types of sampling methods, including probability and non-probability sampling, and understand how to statistically correlate your sample size to the total population of your cyber assets. Perfect for anyo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Cyber Asset Assessment: Understanding the Importance of Sampling<br/><br/>In this episode, I dive into the crucial step of sampling in cyber asset assessment. Learn why sampling is essential, especially when dealing with large environments and limited resources. Discover the various types of sampling methods, including probability and non-probability sampling, and understand how to statistically correlate your sample size to the total population of your cyber assets. Perfect for anyone looking to efficiently and effectively assess their organization&apos;s cyber assets.<br/><br/>00:00 Introduction to Cyber Asset Assessment<br/>00:26 Understanding Sampling in Large Environments<br/>01:23 Statistical Ties and Inference in Sampling<br/>02:30 Why Sampling is Essential<br/>03:12 Types of Sampling Methods<br/>04:25 Implementing Non-Probability Sampling<br/>05:32 Final Thoughts on Sampling</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Cyber Asset Assessment: Understanding the Importance of Sampling<br/><br/>In this episode, I dive into the crucial step of sampling in cyber asset assessment. Learn why sampling is essential, especially when dealing with large environments and limited resources. Discover the various types of sampling methods, including probability and non-probability sampling, and understand how to statistically correlate your sample size to the total population of your cyber assets. Perfect for anyone looking to efficiently and effectively assess their organization&apos;s cyber assets.<br/><br/>00:00 Introduction to Cyber Asset Assessment<br/>00:26 Understanding Sampling in Large Environments<br/>01:23 Statistical Ties and Inference in Sampling<br/>02:30 Why Sampling is Essential<br/>03:12 Types of Sampling Methods<br/>04:25 Implementing Non-Probability Sampling<br/>05:32 Final Thoughts on Sampling</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17502616-mastering-cyber-asset-sampling-optimize-your-assessment-process.mp3" length="4540060" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17502616</guid>
    <pubDate>Mon, 14 Jul 2025 12:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/723399/17502616/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/723399/17502616/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/723399/17502616/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/723399/17502616/transcript.vtt" type="text/vtt" />
    <itunes:duration>375</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>104</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unlocking the True Goal of Security: What You&#39;re Really Protecting</itunes:title>
    <title>Unlocking the True Goal of Security: What You&#39;re Really Protecting</title>
    <itunes:summary><![CDATA[Send us Fan Mail In this episode, I dive into the essential first steps for a successful cybersecurity risk assessment. Unlike traditional methods, we emphasize the importance of aligning cyber protection with corporate objectives and mission-critical assets. Learn why it's crucial to go beyond regulatory requirements and how to accurately identify and cross-check your assets, from application servers to firewalls. Stay tuned for upcoming videos where we break down the comprehensive process f...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In this episode, I dive into the essential first steps for a successful cybersecurity risk assessment. Unlike traditional methods, we emphasize the importance of aligning cyber protection with corporate objectives and mission-critical assets. Learn why it&apos;s crucial to go beyond regulatory requirements and how to accurately identify and cross-check your assets, from application servers to firewalls. Stay tuned for upcoming videos where we break down the comprehensive process for a cyber assessment in organizations of any size.</p><p>00:00 Introduction: Protecting Property vs. Cybersecurity</p><p>00:27 Misconceptions in Cybersecurity</p><p>01:21 Regulatory vs. Non-Regulatory Importance</p><p>02:13 Identifying Critical Assets</p><p>02:31 Steps for Cybersecurity Risk Assessment</p><p>02:54 Validating and Cross-Checking Assets</p><p>03:34 Conclusion and Upcoming Videos</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In this episode, I dive into the essential first steps for a successful cybersecurity risk assessment. Unlike traditional methods, we emphasize the importance of aligning cyber protection with corporate objectives and mission-critical assets. Learn why it&apos;s crucial to go beyond regulatory requirements and how to accurately identify and cross-check your assets, from application servers to firewalls. Stay tuned for upcoming videos where we break down the comprehensive process for a cyber assessment in organizations of any size.</p><p>00:00 Introduction: Protecting Property vs. Cybersecurity</p><p>00:27 Misconceptions in Cybersecurity</p><p>01:21 Regulatory vs. Non-Regulatory Importance</p><p>02:13 Identifying Critical Assets</p><p>02:31 Steps for Cybersecurity Risk Assessment</p><p>02:54 Validating and Cross-Checking Assets</p><p>03:34 Conclusion and Upcoming Videos</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17459727-unlocking-the-true-goal-of-security-what-you-re-really-protecting.mp3" length="2777455" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17459727</guid>
    <pubDate>Mon, 07 Jul 2025 01:00:00 -0400</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>228</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>103</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Aggregate Risk Demystified: The Formula Every Business Needs</itunes:title>
    <title>Aggregate Risk Demystified: The Formula Every Business Needs</title>
    <itunes:summary><![CDATA[Send us Fan Mail How to Aggregate Vulnerability Risks Efficiently for Your IT Environment In this episode, we'll explore the comprehensive approach to scanning and evaluating the entire ecosystem of your application, including databases, firewalls, and routers. Discover a simple yet effective formula to aggregate the risks from hundreds of vulnerabilities and learn how to categorize these risks to support your corporate objectives and mission. This technique is especially useful for small to ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>How to Aggregate Vulnerability Risks Efficiently for Your IT Environment</p><p>In this episode, we&apos;ll explore the comprehensive approach to scanning and evaluating the entire ecosystem of your application, including databases, firewalls, and routers. Discover a simple yet effective formula to aggregate the risks from hundreds of vulnerabilities and learn how to categorize these risks to support your corporate objectives and mission. This technique is especially useful for small to midsize companies without automated tools. Gain insights into the subjectivity and adjustments needed to fine-tune the risk levels applicable to your organization&apos;s risk appetite. Stay tuned for essential tips on incorporating vulnerability, aging, and external exposure into your risk assessment framework.</p><p>00:00 Introduction to Environment Scanning</p><p>00:55 Challenges in Vulnerability Management</p><p>01:54 Formula for Aggregating Risk</p><p>03:28 Adjusting Risk Based on Vulnerability</p><p>06:38 Final Thoughts and Next Steps</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>How to Aggregate Vulnerability Risks Efficiently for Your IT Environment</p><p>In this episode, we&apos;ll explore the comprehensive approach to scanning and evaluating the entire ecosystem of your application, including databases, firewalls, and routers. Discover a simple yet effective formula to aggregate the risks from hundreds of vulnerabilities and learn how to categorize these risks to support your corporate objectives and mission. This technique is especially useful for small to midsize companies without automated tools. Gain insights into the subjectivity and adjustments needed to fine-tune the risk levels applicable to your organization&apos;s risk appetite. Stay tuned for essential tips on incorporating vulnerability, aging, and external exposure into your risk assessment framework.</p><p>00:00 Introduction to Environment Scanning</p><p>00:55 Challenges in Vulnerability Management</p><p>01:54 Formula for Aggregating Risk</p><p>03:28 Adjusting Risk Based on Vulnerability</p><p>06:38 Final Thoughts and Next Steps</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17401633-aggregate-risk-demystified-the-formula-every-business-needs.mp3" length="5185828" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17401633</guid>
    <pubDate>Thu, 26 Jun 2025 01:00:00 -0400</pubDate>
    <itunes:duration>428</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>102</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unpacking Trump’s Cybersecurity Orders: Key Updates and What They Mean for National Security</itunes:title>
    <title>Unpacking Trump’s Cybersecurity Orders: Key Updates and What They Mean for National Security</title>
    <itunes:summary><![CDATA[Send us Fan Mail President Trump Amends Cybersecurity Executive Orders: Key Impacts and Analysis In this episode, we delve into President Trump's recent amendments to Executive Orders 13694 and 14144, primarily focusing on enhancing national cybersecurity. We outline six key areas of impact, including specific threat identification, secure software development, post-quantum cryptography preparations, AI in cyber defense, modernizing federal systems, and defining scope in sanctions and applica...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>President Trump Amends Cybersecurity Executive Orders: Key Impacts and Analysis</p><p>In this episode, we delve into President Trump&apos;s recent amendments to Executive Orders 13694 and 14144, primarily focusing on enhancing national cybersecurity. We outline six key areas of impact, including specific threat identification, secure software development, post-quantum cryptography preparations, AI in cyber defense, modernizing federal systems, and defining scope in sanctions and applications. These proactive measures aim to strengthen the U.S. cybersecurity posture against foreign threats. Join the discussion and share your thoughts on these crucial changes.</p><p>00:00 Introduction to Cybersecurity Amendments</p><p>00:55 Key Fact 1: Updated Policy and Threat Landscape</p><p>02:21 Key Fact 2: Enhancing Secure Software Development</p><p>04:30 Key Fact 3: Preparing for Post-Quantum Cryptography</p><p>06:44 Key Fact 4: Promoting Security with AI</p><p>08:59 Key Fact 5: Modernizing Federal Systems</p><p>11:10 Key Fact 6: Scope of Applications and Sanctions</p><p>13:08 Conclusion and Final Thoughts</p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>President Trump Amends Cybersecurity Executive Orders: Key Impacts and Analysis</p><p>In this episode, we delve into President Trump&apos;s recent amendments to Executive Orders 13694 and 14144, primarily focusing on enhancing national cybersecurity. We outline six key areas of impact, including specific threat identification, secure software development, post-quantum cryptography preparations, AI in cyber defense, modernizing federal systems, and defining scope in sanctions and applications. These proactive measures aim to strengthen the U.S. cybersecurity posture against foreign threats. Join the discussion and share your thoughts on these crucial changes.</p><p>00:00 Introduction to Cybersecurity Amendments</p><p>00:55 Key Fact 1: Updated Policy and Threat Landscape</p><p>02:21 Key Fact 2: Enhancing Secure Software Development</p><p>04:30 Key Fact 3: Preparing for Post-Quantum Cryptography</p><p>06:44 Key Fact 4: Promoting Security with AI</p><p>08:59 Key Fact 5: Modernizing Federal Systems</p><p>11:10 Key Fact 6: Scope of Applications and Sanctions</p><p>13:08 Conclusion and Final Thoughts</p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17314407-unpacking-trump-s-cybersecurity-orders-key-updates-and-what-they-mean-for-national-security.mp3" length="9986020" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17314407</guid>
    <pubDate>Thu, 12 Jun 2025 01:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/723399/17314407/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/723399/17314407/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/723399/17314407/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/723399/17314407/transcript.vtt" type="text/vtt" />
    <itunes:duration>828</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>101</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Optimizing SIEM Storage Costs: Effective Logging Strategies</itunes:title>
    <title>Optimizing SIEM Storage Costs: Effective Logging Strategies</title>
    <itunes:summary><![CDATA[Send us Fan Mail Optimizing SIEM Storage Costs: Effective Logging Strategies  Is storage really as cheap as people think? This episode delves into the true cost of storage in the context of Security Information and Event Management (SIEM) systems. We explore traditional logging practices and their impact on storage, especially with the rise of cloud computing and hybrid environments. The key focus is on identifying critical applications and underlying architectures to optimize logging process...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Optimizing SIEM Storage Costs: Effective Logging Strategies<br/><br/>Is storage really as cheap as people think? This episode delves into the true cost of storage in the context of Security Information and Event Management (SIEM) systems. We explore traditional logging practices and their impact on storage, especially with the rise of cloud computing and hybrid environments. The key focus is on identifying critical applications and underlying architectures to optimize logging processes, thus controlling operational costs without compromising security. Learn about the importance of strategic log triage and maintaining an efficient security posture in a complex IT landscape.<br/><br/>00:00 Introduction: Is Storage Really Cheap?<br/>00:20 Understanding SIEM and Log Management<br/>01:08 Strategies for Managing Operational Costs<br/>01:46 Critical vs. Less Critical Systems<br/>02:30 The Importance of a Triage Process<br/>03:06 Conclusion: Balancing Cost and Security</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Optimizing SIEM Storage Costs: Effective Logging Strategies<br/><br/>Is storage really as cheap as people think? This episode delves into the true cost of storage in the context of Security Information and Event Management (SIEM) systems. We explore traditional logging practices and their impact on storage, especially with the rise of cloud computing and hybrid environments. The key focus is on identifying critical applications and underlying architectures to optimize logging processes, thus controlling operational costs without compromising security. Learn about the importance of strategic log triage and maintaining an efficient security posture in a complex IT landscape.<br/><br/>00:00 Introduction: Is Storage Really Cheap?<br/>00:20 Understanding SIEM and Log Management<br/>01:08 Strategies for Managing Operational Costs<br/>01:46 Critical vs. Less Critical Systems<br/>02:30 The Importance of a Triage Process<br/>03:06 Conclusion: Balancing Cost and Security</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17294095-optimizing-siem-storage-costs-effective-logging-strategies.mp3" length="2535756" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17294095</guid>
    <pubDate>Fri, 06 Jun 2025 14:00:00 -0400</pubDate>
    <itunes:duration>208</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>100</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>One Insight from 1978 Could Change Your Cybersecurity Strategy</itunes:title>
    <title>One Insight from 1978 Could Change Your Cybersecurity Strategy</title>
    <itunes:summary><![CDATA[Send us Fan Mail The Importance of Managerial Controls in Cybersecurity: Insights from 1978 In this episode of Doctor's Advice, Dr. B discusses the critical idea presented by Steward Madnick in 1978, emphasizing that computer security can't rely solely on technical measures. Dr. B explains how operational computer security requires managerial controls, such as policies, standards, and procedures. The conversation highlights the importance of prioritizing the protection of systems that align w...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The Importance of Managerial Controls in Cybersecurity: Insights from 1978</p><p>In this episode of Doctor&apos;s Advice, Dr. B discusses the critical idea presented by Steward Madnick in 1978, emphasizing that computer security can&apos;t rely solely on technical measures. Dr. B explains how operational computer security requires managerial controls, such as policies, standards, and procedures. The conversation highlights the importance of prioritizing the protection of systems that align with corporate objectives and customer service rather than randomly patching vulnerabilities. Dr. B urges examining internal processes and adapting strategies to focus on mission-based cybersecurity, especially in today&apos;s environment where deploying numerous systems and services through cloud computing has become remarkably easy.</p><p>00:00 Introduction to Computer Security</p><p>00:32 Madnick&apos;s 1978 Insight on Managerial Controls</p><p>01:27 The Importance of Prioritizing Vulnerabilities</p><p>03:28 Mission-Based Cybersecurity</p><p>03:37 Challenges in Modern Cybersecurity</p><p>04:29 The Need for Strategic Cybersecurity</p><p>04:53 Criticality of Production Systems</p><p>05:33 Reflecting on 1978 Principles in 2025</p><p>06:23 Final Thoughts and Call to Action</p><p>07:25 Conclusion and Subscription Reminder</p><p><br/>Dr. B. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The Importance of Managerial Controls in Cybersecurity: Insights from 1978</p><p>In this episode of Doctor&apos;s Advice, Dr. B discusses the critical idea presented by Steward Madnick in 1978, emphasizing that computer security can&apos;t rely solely on technical measures. Dr. B explains how operational computer security requires managerial controls, such as policies, standards, and procedures. The conversation highlights the importance of prioritizing the protection of systems that align with corporate objectives and customer service rather than randomly patching vulnerabilities. Dr. B urges examining internal processes and adapting strategies to focus on mission-based cybersecurity, especially in today&apos;s environment where deploying numerous systems and services through cloud computing has become remarkably easy.</p><p>00:00 Introduction to Computer Security</p><p>00:32 Madnick&apos;s 1978 Insight on Managerial Controls</p><p>01:27 The Importance of Prioritizing Vulnerabilities</p><p>03:28 Mission-Based Cybersecurity</p><p>03:37 Challenges in Modern Cybersecurity</p><p>04:29 The Need for Strategic Cybersecurity</p><p>04:53 Criticality of Production Systems</p><p>05:33 Reflecting on 1978 Principles in 2025</p><p>06:23 Final Thoughts and Call to Action</p><p>07:25 Conclusion and Subscription Reminder</p><p><br/>Dr. B. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/17267600-one-insight-from-1978-could-change-your-cybersecurity-strategy.mp3" length="5683935" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17267600</guid>
    <pubDate>Mon, 02 Jun 2025 11:00:00 -0400</pubDate>
    <itunes:duration>470</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>99</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>The DeepSeek Deception -  A Story of Skepticism, Cybersecurity, and the Pursuit of Truth</itunes:title>
    <title>The DeepSeek Deception -  A Story of Skepticism, Cybersecurity, and the Pursuit of Truth</title>
    <itunes:summary><![CDATA[Send us Fan Mail The world is awash in information, but clarity is a rare commodity. We're bombarded with headlines, statistics, and pronouncements, all vying for our attention and belief. But in this age of information overload, a healthy dose of skepticism is not just valuable; it's essential. This is especially true in the realm of cybersecurity, where threats are constantly evolving, and the stakes are higher than ever.  Take a listen.  Dr. B. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The world is awash in information, but clarity is a rare commodity. We&apos;re bombarded with headlines, statistics, and pronouncements, all vying for our attention and belief. But in this age of information overload, a healthy dose of skepticism is not just valuable; it&apos;s essential. This is especially true in the realm of cybersecurity, where threats are constantly evolving, and the stakes are higher than ever.<br/><br/>Take a listen.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The world is awash in information, but clarity is a rare commodity. We&apos;re bombarded with headlines, statistics, and pronouncements, all vying for our attention and belief. But in this age of information overload, a healthy dose of skepticism is not just valuable; it&apos;s essential. This is especially true in the realm of cybersecurity, where threats are constantly evolving, and the stakes are higher than ever.<br/><br/>Take a listen.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16537685-the-deepseek-deception-a-story-of-skepticism-cybersecurity-and-the-pursuit-of-truth.mp3" length="3228866" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16537685</guid>
    <pubDate>Fri, 31 Jan 2025 03:00:00 -0500</pubDate>
    <itunes:duration>265</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>98</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The AI Revolution: Humanity&#39;s Next Great Leap in Cybersecurity</itunes:title>
    <title>The AI Revolution: Humanity&#39;s Next Great Leap in Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail Ready to explore the fascinating intersection of AI and cybersecurity? My latest podcast episode is live, and it's packed with insights you won't want to miss!  **In this episode, we delve into:**  - **The AI Advantage:** Discover how AI is revolutionizing threat detection, prediction, and response, acting as a tireless guardian in the digital realm. - **The Human Element:** Understand why AI is not a magic bullet and how human intelligence remains crucial for setting the mis...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Ready to explore the fascinating intersection of AI and cybersecurity? My latest podcast episode is live, and it&apos;s packed with insights you won&apos;t want to miss!<br/><br/>**In this episode, we delve into:**<br/><br/>- **The AI Advantage:** Discover how AI is revolutionizing threat detection, prediction, and response, acting as a tireless guardian in the digital realm.<br/>- **The Human Element:** Understand why AI is not a magic bullet and how human intelligence remains crucial for setting the mission, guiding the strategy, and ensuring ethical AI implementation.<br/>- **Mission-Based Cybersecurity:** Learn how to align your cybersecurity strategy with your organization&apos;s core purpose, prioritizing the protection of what truly matters.<br/>- **The Future of Skills:** Explore cybersecurity professionals&apos; evolving role in the AI age and the essential human skills that will be in high demand.<br/><br/>**Listen now and discover:**<br/><br/>- How to leverage AI to amplify your cybersecurity capabilities.<br/>- Why mission-based cybersecurity is essential for protecting what matters most.<br/>- What skills do you need to develop to thrive in the AI-powered future of cybersecurity?</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Ready to explore the fascinating intersection of AI and cybersecurity? My latest podcast episode is live, and it&apos;s packed with insights you won&apos;t want to miss!<br/><br/>**In this episode, we delve into:**<br/><br/>- **The AI Advantage:** Discover how AI is revolutionizing threat detection, prediction, and response, acting as a tireless guardian in the digital realm.<br/>- **The Human Element:** Understand why AI is not a magic bullet and how human intelligence remains crucial for setting the mission, guiding the strategy, and ensuring ethical AI implementation.<br/>- **Mission-Based Cybersecurity:** Learn how to align your cybersecurity strategy with your organization&apos;s core purpose, prioritizing the protection of what truly matters.<br/>- **The Future of Skills:** Explore cybersecurity professionals&apos; evolving role in the AI age and the essential human skills that will be in high demand.<br/><br/>**Listen now and discover:**<br/><br/>- How to leverage AI to amplify your cybersecurity capabilities.<br/>- Why mission-based cybersecurity is essential for protecting what matters most.<br/>- What skills do you need to develop to thrive in the AI-powered future of cybersecurity?</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16525179-the-ai-revolution-humanity-s-next-great-leap-in-cybersecurity.mp3" length="5464164" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16525179</guid>
    <pubDate>Thu, 30 Jan 2025 01:00:00 -0500</pubDate>
    <itunes:duration>452</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>97</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Cybersecurity is Everyone&#39;s Responsibility</itunes:title>
    <title>Why Cybersecurity is Everyone&#39;s Responsibility</title>
    <itunes:summary><![CDATA[Send us Fan Mail 🛡️ Cybersecurity is EVERYONE'S Responsibility! 🛡️  Think cybersecurity is just for the IT department? Think again!  In this episode, we break down the dangerous misconception that cybersecurity is just about firewalls and antivirus software. It's about protecting your organization's mission, values, and people.  **Here's what you'll learn:**  - **Why cybersecurity is a shared responsibility** - from the marketing team to the receptionist, everyone has a role to play. - **How ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>🛡️ Cybersecurity is EVERYONE&apos;S Responsibility! 🛡️<br/><br/>Think cybersecurity is just for the IT department? Think again!<br/><br/>In this episode, we break down the dangerous misconception that cybersecurity is just about firewalls and antivirus software. It&apos;s about protecting your organization&apos;s mission, values, and people.<br/><br/>**Here&apos;s what you&apos;ll learn:**<br/><br/>- **Why cybersecurity is a shared responsibility** - from the marketing team to the receptionist, everyone has a role to play.<br/>- **How to break down silos and foster collaboration** between departments to strengthen your security posture.<br/>- **Practical strategies for building a security-conscious culture** where employees are empowered to identify and report threats.<br/>- **Real-world examples and case studies** that illustrate the importance of a security-first mindset.<br/><br/>Don&apos;t wait for a breach to happen! Take ownership of cybersecurity and protect what matters most.<br/><br/>Dr. B. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>🛡️ Cybersecurity is EVERYONE&apos;S Responsibility! 🛡️<br/><br/>Think cybersecurity is just for the IT department? Think again!<br/><br/>In this episode, we break down the dangerous misconception that cybersecurity is just about firewalls and antivirus software. It&apos;s about protecting your organization&apos;s mission, values, and people.<br/><br/>**Here&apos;s what you&apos;ll learn:**<br/><br/>- **Why cybersecurity is a shared responsibility** - from the marketing team to the receptionist, everyone has a role to play.<br/>- **How to break down silos and foster collaboration** between departments to strengthen your security posture.<br/>- **Practical strategies for building a security-conscious culture** where employees are empowered to identify and report threats.<br/>- **Real-world examples and case studies** that illustrate the importance of a security-first mindset.<br/><br/>Don&apos;t wait for a breach to happen! Take ownership of cybersecurity and protect what matters most.<br/><br/>Dr. B. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16454270-why-cybersecurity-is-everyone-s-responsibility.mp3" length="6255328" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16454270</guid>
    <pubDate>Thu, 23 Jan 2025 01:00:00 -0500</pubDate>
    <itunes:duration>518</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>96</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Risk Appetite</itunes:title>
    <title>Cyber Risk Appetite</title>
    <itunes:summary><![CDATA[Send us Fan Mail Forget the magic numbers. Cyber risk appetite isn't about finding a one-size-fits-all percentage of revenue. It's about protecting your company's dreams. In this episode, we dive deep into the WHY behind cyber risk appetite. We explore how a strong understanding of risk tolerance can safeguard your mission, reputation, and customer trust.  Discover:   The crucial factors that shape your cyber risk appetite (hint: it's more than just revenue!).Why a mission-driven approach to ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Forget the magic numbers. Cyber risk appetite isn&apos;t about finding a one-size-fits-all percentage of revenue. It&apos;s about protecting your company&apos;s dreams. In this episode, we dive deep into the <b>WHY</b> behind cyber risk appetite. We explore how a strong understanding of risk tolerance can safeguard your mission, reputation, and customer trust.</p><p><b><br/>Discover:<br/></b><br/></p><ul><li>The crucial factors that shape your cyber risk appetite (hint: it&apos;s more than just revenue!).</li><li>Why a mission-driven approach to cybersecurity is essential in today&apos;s threat landscape.</li><li>How to build a robust risk management plan that aligns with your business goals.</li><li>Don&apos;t just mitigate threats - empower your vision. Watch now and learn how to own your cyber risk appetite truly.</li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Forget the magic numbers. Cyber risk appetite isn&apos;t about finding a one-size-fits-all percentage of revenue. It&apos;s about protecting your company&apos;s dreams. In this episode, we dive deep into the <b>WHY</b> behind cyber risk appetite. We explore how a strong understanding of risk tolerance can safeguard your mission, reputation, and customer trust.</p><p><b><br/>Discover:<br/></b><br/></p><ul><li>The crucial factors that shape your cyber risk appetite (hint: it&apos;s more than just revenue!).</li><li>Why a mission-driven approach to cybersecurity is essential in today&apos;s threat landscape.</li><li>How to build a robust risk management plan that aligns with your business goals.</li><li>Don&apos;t just mitigate threats - empower your vision. Watch now and learn how to own your cyber risk appetite truly.</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16385691-cyber-risk-appetite.mp3" length="6956505" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16385691</guid>
    <pubDate>Thu, 09 Jan 2025 01:00:00 -0500</pubDate>
    <itunes:duration>576</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>95</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity in the Age of AI- Back to Basics</itunes:title>
    <title>Cybersecurity in the Age of AI- Back to Basics</title>
    <itunes:summary><![CDATA[Send us Fan Mail An article from Gartner named "AI in Cybersecurity: Define Your Direction" explores the impact of AI, particularly generative AI (GenAI), on the cybersecurity landscape. While acknowledging the transformative potential of AI and the hype surrounding it, the article emphasizes that this technology also introduces new risks and challenges.   Dr. B.  ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>An article from Gartner named &quot;AI in Cybersecurity: Define Your Direction&quot; explores the impact of AI, particularly generative AI (GenAI), on the cybersecurity landscape. While acknowledging the transformative potential of AI and the hype surrounding it, the article emphasizes that this technology also introduces new risks and challenges. <br/><br/>Dr. B. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>An article from Gartner named &quot;AI in Cybersecurity: Define Your Direction&quot; explores the impact of AI, particularly generative AI (GenAI), on the cybersecurity landscape. While acknowledging the transformative potential of AI and the hype surrounding it, the article emphasizes that this technology also introduces new risks and challenges. <br/><br/>Dr. B. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16069645-cybersecurity-in-the-age-of-ai-back-to-basics.mp3" length="2616262" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16069645</guid>
    <pubDate>Thu, 19 Dec 2024 01:00:00 -0500</pubDate>
    <itunes:duration>214</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>94</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk Management A CISO&#39;s Guide to Leadership in an Evolving Threat Landscape</itunes:title>
    <title>Cybersecurity Risk Management A CISO&#39;s Guide to Leadership in an Evolving Threat Landscape</title>
    <itunes:summary><![CDATA[Send us Fan Mail Cybersecurity risk management has taken center stage for organizations across all industries in the wake of recent high-profile cyberattacks, such as the SolarWinds breach and the Colonial Pipeline ransomware incident. As a CISO, you know firsthand the challenges and complexities that organizations face in navigating this ever-evolving threat landscape. Today, I'll share insights and leadership advice on how to build a robust and resilient cybersecurity program using four key...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Cybersecurity risk management has taken center stage for organizations across all industries in the wake of recent high-profile cyberattacks, such as the SolarWinds breach and the Colonial Pipeline ransomware incident. As a CISO, you know firsthand the challenges and complexities that organizations face in navigating this ever-evolving threat landscape. Today, I&apos;ll share insights and leadership advice on how to build a robust and resilient cybersecurity program using four key thematic words: Align, Agency, Awareness, and Adaptability.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Cybersecurity risk management has taken center stage for organizations across all industries in the wake of recent high-profile cyberattacks, such as the SolarWinds breach and the Colonial Pipeline ransomware incident. As a CISO, you know firsthand the challenges and complexities that organizations face in navigating this ever-evolving threat landscape. Today, I&apos;ll share insights and leadership advice on how to build a robust and resilient cybersecurity program using four key thematic words: Align, Agency, Awareness, and Adaptability.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16069587-cybersecurity-risk-management-a-ciso-s-guide-to-leadership-in-an-evolving-threat-landscape.mp3" length="2992827" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16069587</guid>
    <pubDate>Thu, 12 Dec 2024 01:00:00 -0500</pubDate>
    <itunes:duration>246</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>93</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Stronger Cybersecurity and Smarter Spending</itunes:title>
    <title>Stronger Cybersecurity and Smarter Spending</title>
    <itunes:summary><![CDATA[Send us Fan Mail The Cyber Defense Matrix (CDM) model tackles the difficulties of cost-effective and resilient cybersecurity planning by offering a structured framework to select and implement the most critical security controls, considering factors like budget, risk tolerance, and usability constraints.  Dr. B. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The Cyber Defense Matrix (CDM) model tackles the difficulties of cost-effective and resilient cybersecurity planning by offering a structured framework to select and implement the most critical security controls, considering factors like budget, risk tolerance, and usability constraints.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The Cyber Defense Matrix (CDM) model tackles the difficulties of cost-effective and resilient cybersecurity planning by offering a structured framework to select and implement the most critical security controls, considering factors like budget, risk tolerance, and usability constraints.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16031883-stronger-cybersecurity-and-smarter-spending.mp3" length="4185798" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16031883</guid>
    <pubDate>Thu, 05 Dec 2024 01:00:00 -0500</pubDate>
    <itunes:duration>345</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>92</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Compliance: Hype or Bust?</itunes:title>
    <title>Cybersecurity Compliance: Hype or Bust?</title>
    <itunes:summary><![CDATA[Send us Fan Mail In cybersecurity, organizations are constantly grappling with the question of compliance. Is it merely a checkbox exercise, a source of unnecessary overhead, or a fundamental pillar of a robust security posture? The debate surrounding cybersecurity compliance often centers on the perceived tension between agility and adherence to regulatory frameworks. Here, I aim to dive into this complex issue, examining the arguments for and against compliance and ultimately providing insi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In cybersecurity, organizations are constantly grappling with the question of compliance. Is it merely a checkbox exercise, a source of unnecessary overhead, or a fundamental pillar of a robust security posture? The debate surrounding cybersecurity compliance often centers on the perceived tension between agility and adherence to regulatory frameworks. Here, I aim to dive into this complex issue, examining the arguments for and against compliance and ultimately providing insights to help organizations strike a balance between security and operational efficiency.<br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In cybersecurity, organizations are constantly grappling with the question of compliance. Is it merely a checkbox exercise, a source of unnecessary overhead, or a fundamental pillar of a robust security posture? The debate surrounding cybersecurity compliance often centers on the perceived tension between agility and adherence to regulatory frameworks. Here, I aim to dive into this complex issue, examining the arguments for and against compliance and ultimately providing insights to help organizations strike a balance between security and operational efficiency.<br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16031665-cybersecurity-compliance-hype-or-bust.mp3" length="3232216" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16031665</guid>
    <pubDate>Thu, 28 Nov 2024 01:00:00 -0500</pubDate>
    <itunes:duration>266</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>91</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Expert as the Instrument</itunes:title>
    <title>Expert as the Instrument</title>
    <itunes:summary><![CDATA[Send us Fan Mail In cybersecurity, organizations face a relentless barrage of threats that can compromise their sensitive data, disrupt operations, and tarnish their reputation. While quantitative data and automated tools play a crucial role in identifying and mitigating risks, the value of human expertise remains paramount. As D. Hubbard eloquently stated in 2014, "The expert is the instrument,” emphasizing the irreplaceable role of experienced professionals in navigating the complexities of...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In cybersecurity, organizations face a relentless barrage of threats that can compromise their sensitive data, disrupt operations, and tarnish their reputation. While quantitative data and automated tools play a crucial role in identifying and mitigating risks, the value of human expertise remains paramount. As D. Hubbard eloquently stated in 2014, &quot;The expert is the instrument,” emphasizing the irreplaceable role of experienced professionals in navigating the complexities of cybersecurity. This podcast explores the significance of expert judgment in risk management, highlighting its ability to provide context, insight, and adaptability that quantitative data alone cannot replicate.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In cybersecurity, organizations face a relentless barrage of threats that can compromise their sensitive data, disrupt operations, and tarnish their reputation. While quantitative data and automated tools play a crucial role in identifying and mitigating risks, the value of human expertise remains paramount. As D. Hubbard eloquently stated in 2014, &quot;The expert is the instrument,” emphasizing the irreplaceable role of experienced professionals in navigating the complexities of cybersecurity. This podcast explores the significance of expert judgment in risk management, highlighting its ability to provide context, insight, and adaptability that quantitative data alone cannot replicate.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16017156-expert-as-the-instrument.mp3" length="3326540" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16017156</guid>
    <pubDate>Thu, 21 Nov 2024 01:00:00 -0500</pubDate>
    <itunes:duration>273</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>90</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk Management Governance Process</itunes:title>
    <title>Cybersecurity Risk Management Governance Process</title>
    <itunes:summary><![CDATA[Send us Fan Mail Organizations face an ever-increasing array of cyber threats. A proactive and strategic approach to cybersecurity risk management is essential to counter these risks. This process not only safeguards an organization's valuable digital assets but also elevates the visibility and influence of the cybersecurity team. The cybersecurity team can demonstrate its indispensable value by strategically aligning risk management practices with the core business objectives. This alignment...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Organizations face an ever-increasing array of cyber threats. A proactive and strategic approach to cybersecurity risk management is essential to counter these risks. This process not only safeguards an organization&apos;s valuable digital assets but also elevates the visibility and influence of the cybersecurity team.</p><p>The cybersecurity team can demonstrate its indispensable value by strategically aligning risk management practices with the core business objectives. This alignment ensures that security measures are not seen as mere roadblocks but as enablers of business growth and continuity. It showcases the team&apos;s expertise in understanding and mitigating risks that could potentially impact the organization&apos;s bottom line and reputation, ultimately contributing to its continued success.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Organizations face an ever-increasing array of cyber threats. A proactive and strategic approach to cybersecurity risk management is essential to counter these risks. This process not only safeguards an organization&apos;s valuable digital assets but also elevates the visibility and influence of the cybersecurity team.</p><p>The cybersecurity team can demonstrate its indispensable value by strategically aligning risk management practices with the core business objectives. This alignment ensures that security measures are not seen as mere roadblocks but as enablers of business growth and continuity. It showcases the team&apos;s expertise in understanding and mitigating risks that could potentially impact the organization&apos;s bottom line and reputation, ultimately contributing to its continued success.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/16017021-cybersecurity-risk-management-governance-process.mp3" length="6207999" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16017021</guid>
    <pubDate>Thu, 14 Nov 2024 01:00:00 -0500</pubDate>
    <itunes:duration>514</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>89</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity and Emerging Technologies</itunes:title>
    <title>Cybersecurity and Emerging Technologies</title>
    <itunes:summary><![CDATA[Send us Fan Mail The rapid advancement of technology brings unprecedented opportunities and significant cybersecurity risks. The World Economic Forum's (WEF) October 2024 white paper, "Navigating Cyber Resilience in the Age of Emerging Technologies: Collaborative Solutions for Complex Challenges," offers a deep dive into these evolving risks and proposes a shift towards a more resilient approach to cybersecurity.  Dr. B. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The rapid advancement of technology brings unprecedented opportunities and significant cybersecurity risks. The World Economic Forum&apos;s (WEF) October 2024 white paper, &quot;Navigating Cyber Resilience in the Age of Emerging Technologies: Collaborative Solutions for Complex Challenges,&quot; offers a deep dive into these evolving risks and proposes a shift towards a more resilient approach to cybersecurity.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The rapid advancement of technology brings unprecedented opportunities and significant cybersecurity risks. The World Economic Forum&apos;s (WEF) October 2024 white paper, &quot;Navigating Cyber Resilience in the Age of Emerging Technologies: Collaborative Solutions for Complex Challenges,&quot; offers a deep dive into these evolving risks and proposes a shift towards a more resilient approach to cybersecurity.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15947509-cybersecurity-and-emerging-technologies.mp3" length="3379546" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15947509</guid>
    <pubDate>Thu, 07 Nov 2024 01:00:00 -0500</pubDate>
    <itunes:duration>278</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>88</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Human Factor vs. the Algorithm</itunes:title>
    <title>The Human Factor vs. the Algorithm</title>
    <itunes:summary><![CDATA[Send us Fan Mail Organizations grapple with a complex challenge: striking the right balance between human expertise and algorithmic insights. As highlighted by Hubbard (2014), a prevailing trend is the tendency for individuals within organizations, including senior management, to overvalue their own opinions and ideas, even when confronted with data-driven insights generated by sophisticated algorithms. This phenomenon, often referred to as the "expertise paradox," can have significant implic...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Organizations grapple with a complex challenge: striking the right balance between human expertise and algorithmic insights. As highlighted by Hubbard (2014), a prevailing trend is the tendency for individuals within organizations, including senior management, to overvalue their own opinions and ideas, even when confronted with data-driven insights generated by sophisticated algorithms. This phenomenon, often referred to as the &quot;expertise paradox,&quot; can have significant implications for cybersecurity risk management.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Organizations grapple with a complex challenge: striking the right balance between human expertise and algorithmic insights. As highlighted by Hubbard (2014), a prevailing trend is the tendency for individuals within organizations, including senior management, to overvalue their own opinions and ideas, even when confronted with data-driven insights generated by sophisticated algorithms. This phenomenon, often referred to as the &quot;expertise paradox,&quot; can have significant implications for cybersecurity risk management.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15947408-the-human-factor-vs-the-algorithm.mp3" length="2867954" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15947408</guid>
    <pubDate>Thu, 24 Oct 2024 01:00:00 -0400</pubDate>
    <itunes:duration>235</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>87</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Cybersecurity Analysis Placebo: Measuring for the Illusion of Control</itunes:title>
    <title>The Cybersecurity Analysis Placebo: Measuring for the Illusion of Control</title>
    <itunes:summary><![CDATA[Send us Fan Mail The adage "what gets measured gets managed" holds significant weight in cybersecurity. Organizations invest heavily in metrics, Key Performance Indicators (KPIs), and risk assessments, aiming to quantify their cybersecurity posture and demonstrate progress. However, a growing concern emerges: the "analysis placebo" effect, as highlighted by Hubbard (2014). This phenomenon suggests that the act of measuring itself can create a false sense of security, leading organizations to ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The adage &quot;what gets measured gets managed&quot; holds significant weight in cybersecurity. Organizations invest heavily in metrics, Key Performance Indicators (KPIs), and risk assessments, aiming to quantify their cybersecurity posture and demonstrate progress. However, a growing concern emerges: the &quot;analysis placebo&quot; effect, as highlighted by Hubbard (2014). This phenomenon suggests that the act of measuring itself can create a false sense of security, leading organizations to believe they are effectively managing risks when, in reality, they may be overlooking critical vulnerabilities.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The adage &quot;what gets measured gets managed&quot; holds significant weight in cybersecurity. Organizations invest heavily in metrics, Key Performance Indicators (KPIs), and risk assessments, aiming to quantify their cybersecurity posture and demonstrate progress. However, a growing concern emerges: the &quot;analysis placebo&quot; effect, as highlighted by Hubbard (2014). This phenomenon suggests that the act of measuring itself can create a false sense of security, leading organizations to believe they are effectively managing risks when, in reality, they may be overlooking critical vulnerabilities.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15907756-the-cybersecurity-analysis-placebo-measuring-for-the-illusion-of-control.mp3" length="3904049" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15907756</guid>
    <pubDate>Thu, 24 Oct 2024 01:00:00 -0400</pubDate>
    <itunes:duration>322</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>86</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Risk Management for SMBs</itunes:title>
    <title>Risk Management for SMBs</title>
    <itunes:summary><![CDATA[Send us Fan Mail Cybersecurity is no longer a luxury but a necessity for small and midsize businesses (SMBs). Cyber threats are becoming increasingly sophisticated, and SMBs are often seen as easy targets due to their perceived lack of resources and security measures. However, with the right approach, SMBs can implement robust cybersecurity risk management programs that are both effective and affordable.  Dr. B. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Cybersecurity is no longer a luxury but a necessity for small and midsize businesses (SMBs). Cyber threats are becoming increasingly sophisticated, and SMBs are often seen as easy targets due to their perceived lack of resources and security measures. However, with the right approach, SMBs can implement robust cybersecurity risk management programs that are both effective and affordable.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Cybersecurity is no longer a luxury but a necessity for small and midsize businesses (SMBs). Cyber threats are becoming increasingly sophisticated, and SMBs are often seen as easy targets due to their perceived lack of resources and security measures. However, with the right approach, SMBs can implement robust cybersecurity risk management programs that are both effective and affordable.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15907696-risk-management-for-smbs.mp3" length="3903951" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15907696</guid>
    <pubDate>Thu, 17 Oct 2024 01:00:00 -0400</pubDate>
    <itunes:duration>322</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>85</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 must-do’s for effective cyber risk management</itunes:title>
    <title>5 must-do’s for effective cyber risk management</title>
    <itunes:summary><![CDATA[Send us Fan Mail Establishing a robust cybersecurity risk management program is paramount for any organization. As a CISO, the task of safeguarding critical assets and sensitive data can be daunting. However, leveraging the Cyber Defense Matrix (CDM) as a strategic framework can lay a solid foundation for your cybersecurity program and proactively mitigate risks. This article outlines the first five crucial steps I would take if tasked with setting up a cyber risk management program, emphasiz...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Establishing a robust cybersecurity risk management program is paramount for any organization. As a CISO, the task of safeguarding critical assets and sensitive data can be daunting. However, leveraging the Cyber Defense Matrix (CDM) as a strategic framework can lay a solid foundation for your cybersecurity program and proactively mitigate risks. This article outlines the first five crucial steps I would take if tasked with setting up a cyber risk management program, emphasizing the integration of the CDM for optimal effectiveness.<br/><br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Establishing a robust cybersecurity risk management program is paramount for any organization. As a CISO, the task of safeguarding critical assets and sensitive data can be daunting. However, leveraging the Cyber Defense Matrix (CDM) as a strategic framework can lay a solid foundation for your cybersecurity program and proactively mitigate risks. This article outlines the first five crucial steps I would take if tasked with setting up a cyber risk management program, emphasizing the integration of the CDM for optimal effectiveness.<br/><br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15904983-5-must-do-s-for-effective-cyber-risk-management.mp3" length="2804032" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15904983</guid>
    <pubDate>Fri, 11 Oct 2024 01:00:00 -0400</pubDate>
    <itunes:duration>230</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>83</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>2024 ISACA State of Cybersecurity</itunes:title>
    <title>2024 ISACA State of Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail Today, I discuss and present the report's findings and share some of my thoughts on each finding from this survey.   Thanks. Dr. B. ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Today, I discuss and present the report&apos;s findings and share some of my thoughts on each finding from this survey. <br/><br/>Thanks.<br/>Dr. B.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Today, I discuss and present the report&apos;s findings and share some of my thoughts on each finding from this survey. <br/><br/>Thanks.<br/>Dr. B.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15905268-2024-isaca-state-of-cybersecurity.mp3" length="7361222" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15905268</guid>
    <pubDate>Thu, 10 Oct 2024 15:00:00 -0400</pubDate>
    <itunes:duration>610</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>84</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Endpoint Security</itunes:title>
    <title>Endpoint Security</title>
    <itunes:summary><![CDATA[Send us Fan Mail Endpoints such as laptops, desktops, mobile devices, and servers remain a prime target for attackers. These devices, serving as gateways to critical business data and systems, are constantly under siege from malware, ransomware, phishing attacks, and other sophisticated threats. As a CISO, safeguarding your organization's endpoints is a matter of cybersecurity and a strategic financial imperative. Here, I will discuss endpoint security, exploring how solutions like antivirus,...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Endpoints such as laptops, desktops, mobile devices, and servers remain a prime target for attackers. These devices, serving as gateways to critical business data and systems, are constantly under siege from malware, ransomware, phishing attacks, and other sophisticated threats. As a CISO, safeguarding your organization&apos;s endpoints is a matter of cybersecurity and a strategic financial imperative. Here, I will discuss endpoint security, exploring how solutions like antivirus, Endpoint Detection and Response (EDR), and device management align with the Cyber Defense Matrix to protect your organization&apos;s assets and financial well-being.<br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Endpoints such as laptops, desktops, mobile devices, and servers remain a prime target for attackers. These devices, serving as gateways to critical business data and systems, are constantly under siege from malware, ransomware, phishing attacks, and other sophisticated threats. As a CISO, safeguarding your organization&apos;s endpoints is a matter of cybersecurity and a strategic financial imperative. Here, I will discuss endpoint security, exploring how solutions like antivirus, Endpoint Detection and Response (EDR), and device management align with the Cyber Defense Matrix to protect your organization&apos;s assets and financial well-being.<br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15854775-endpoint-security.mp3" length="3117442" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15854775</guid>
    <pubDate>Thu, 10 Oct 2024 01:00:00 -0400</pubDate>
    <itunes:duration>256</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>82</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Bolstering Application Security</itunes:title>
    <title>Bolstering Application Security</title>
    <itunes:summary><![CDATA[Send us Fan Mail Applications have become the lifeblood of businesses, driving innovation and operational efficiency. However, this reliance on applications also exposes organizations to a myriad of cyber threats. Attackers are increasingly targeting vulnerabilities within applications to gain unauthorized access, exfiltrate sensitive data, and disrupt critical business functions. As a CISO, safeguarding your organization's application portfolio is paramount. Here, we dive into the domain of ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Applications have become the lifeblood of businesses, driving innovation and operational efficiency. However, this reliance on applications also exposes organizations to a myriad of cyber threats. Attackers are increasingly targeting vulnerabilities within applications to gain unauthorized access, exfiltrate sensitive data, and disrupt critical business functions. As a CISO, safeguarding your organization&apos;s application portfolio is paramount. Here, we dive into the domain of application security, exploring best practices, the role of the Cyber Defense Matrix, and actionable strategies to fortify your defenses against application-level attacks.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Applications have become the lifeblood of businesses, driving innovation and operational efficiency. However, this reliance on applications also exposes organizations to a myriad of cyber threats. Attackers are increasingly targeting vulnerabilities within applications to gain unauthorized access, exfiltrate sensitive data, and disrupt critical business functions. As a CISO, safeguarding your organization&apos;s application portfolio is paramount. Here, we dive into the domain of application security, exploring best practices, the role of the Cyber Defense Matrix, and actionable strategies to fortify your defenses against application-level attacks.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15854757-bolstering-application-security.mp3" length="3530623" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15854757</guid>
    <pubDate>Thu, 03 Oct 2024 01:00:00 -0400</pubDate>
    <itunes:duration>290</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>81</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Network Security as a Financial Strategy</itunes:title>
    <title>Network Security as a Financial Strategy</title>
    <itunes:summary><![CDATA[Send us Fan Mail As CISOs, you are entrusted with safeguarding our organizations' digital assets. However, this responsibility extends beyond mere technical implementation; it encompasses a financial imperative. In today's threat landscape, network security vulnerabilities can lead to devastating financial losses, from data breaches and regulatory fines to operational disruptions and reputational damage. Here, I’ll dive into the critical role of network security within the Cyber Defense Matri...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>As CISOs, you are entrusted with safeguarding our organizations&apos; digital assets. However, this responsibility extends beyond mere technical implementation; it encompasses a financial imperative. In today&apos;s threat landscape, network security vulnerabilities can lead to devastating financial losses, from data breaches and regulatory fines to operational disruptions and reputational damage.</p><p>Here, I’ll dive into the critical role of network security within the Cyber Defense Matrix framework. We&apos;ll explore how robust network security controls, such as firewalls, intrusion detection systems (IDS), and segmentation, mitigate cyber risks and contribute to a fiscally responsible security strategy.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>As CISOs, you are entrusted with safeguarding our organizations&apos; digital assets. However, this responsibility extends beyond mere technical implementation; it encompasses a financial imperative. In today&apos;s threat landscape, network security vulnerabilities can lead to devastating financial losses, from data breaches and regulatory fines to operational disruptions and reputational damage.</p><p>Here, I’ll dive into the critical role of network security within the Cyber Defense Matrix framework. We&apos;ll explore how robust network security controls, such as firewalls, intrusion detection systems (IDS), and segmentation, mitigate cyber risks and contribute to a fiscally responsible security strategy.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15794751-network-security-as-a-financial-strategy.mp3" length="3072662" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15794751</guid>
    <pubDate>Thu, 26 Sep 2024 23:00:00 -0400</pubDate>
    <itunes:duration>252</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>80</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>IAM - The Keys to Your Cybersecurity Kingdom</itunes:title>
    <title>IAM - The Keys to Your Cybersecurity Kingdom</title>
    <itunes:summary><![CDATA[Send us Fan Mail The critical role of Identity and Access Management (IAM) in today's complex digital landscape. IAM is essential for controlling access to valuable assets, both in the cloud and traditional datacenters. The cloud's dynamic nature requires a robust IAM strategy incorporating centralized identity management, dynamic authorization, and strong authentication, including multi-factor authentication (MFA). For datacenters, best practices include privileged access management (PAM), n...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The critical role of Identity and Access Management (IAM) in today&apos;s complex digital landscape. IAM is essential for controlling access to valuable assets, both in the cloud and traditional datacenters. The cloud&apos;s dynamic nature requires a robust IAM strategy incorporating centralized identity management, dynamic authorization, and strong authentication, including multi-factor authentication (MFA). For datacenters, best practices include privileged access management (PAM), network segmentation, and regular audits.<br/><br/>This podcast highlights IAM&apos;s integral role within the Cyber Defense Matrix, supporting functions like Identify, Protect, Detect, Respond, and Recover. It also underscores the financial benefits of a strong IAM strategy, mitigating the risk of costly data breaches and streamlining operations through automation. The author concludes by positioning IAM not just as a best practice but as a strategic imperative for CISOs, enabling innovation while safeguarding digital assets.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>The critical role of Identity and Access Management (IAM) in today&apos;s complex digital landscape. IAM is essential for controlling access to valuable assets, both in the cloud and traditional datacenters. The cloud&apos;s dynamic nature requires a robust IAM strategy incorporating centralized identity management, dynamic authorization, and strong authentication, including multi-factor authentication (MFA). For datacenters, best practices include privileged access management (PAM), network segmentation, and regular audits.<br/><br/>This podcast highlights IAM&apos;s integral role within the Cyber Defense Matrix, supporting functions like Identify, Protect, Detect, Respond, and Recover. It also underscores the financial benefits of a strong IAM strategy, mitigating the risk of costly data breaches and streamlining operations through automation. The author concludes by positioning IAM not just as a best practice but as a strategic imperative for CISOs, enabling innovation while safeguarding digital assets.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15781230-iam-the-keys-to-your-cybersecurity-kingdom.mp3" length="3614031" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15781230</guid>
    <pubDate>Mon, 23 Sep 2024 01:00:00 -0400</pubDate>
    <itunes:duration>297</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>79</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The CISO&#39;s Financial Imperative</itunes:title>
    <title>The CISO&#39;s Financial Imperative</title>
    <itunes:summary><![CDATA[Send us Fan Mail In the boardroom and the server room, today's CISO faces a dual challenge: safeguarding the organization's digital assets while demonstrating the tangible value of cybersecurity investments. The Cyber Defense Matrix emerges as a strategic bridge between these imperatives, offering a structured framework to identify security gaps, prioritize spending, and align defensive strategies with business goals. This podcast explores how CISOs can leverage the Cyber Defense Matrix to ma...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In the boardroom and the server room, today&apos;s CISO faces a dual challenge: safeguarding the organization&apos;s digital assets while demonstrating the tangible value of cybersecurity investments. The Cyber Defense Matrix emerges as a strategic bridge between these imperatives, offering a structured framework to identify security gaps, prioritize spending, and align defensive strategies with business goals.</p><p>This podcast explores how CISOs can leverage the Cyber Defense Matrix to make informed financial decisions, ensuring that every dollar spent on cybersecurity contributes to a resilient and risk-aware enterprise.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>In the boardroom and the server room, today&apos;s CISO faces a dual challenge: safeguarding the organization&apos;s digital assets while demonstrating the tangible value of cybersecurity investments. The Cyber Defense Matrix emerges as a strategic bridge between these imperatives, offering a structured framework to identify security gaps, prioritize spending, and align defensive strategies with business goals.</p><p>This podcast explores how CISOs can leverage the Cyber Defense Matrix to make informed financial decisions, ensuring that every dollar spent on cybersecurity contributes to a resilient and risk-aware enterprise.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15779321-the-ciso-s-financial-imperative.mp3" length="3396144" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15779321</guid>
    <pubDate>Thu, 19 Sep 2024 11:00:00 -0400</pubDate>
    <itunes:duration>279</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>78</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Measuring Success</itunes:title>
    <title>Measuring Success</title>
    <itunes:summary><![CDATA[Send us Fan Mail Today, we’re tackling a crucial topic for any Chief Information Security Officer—how to validate your Cyber Defense Matrix using Key Performance Indicators or KPIs. This episode is for you if you're looking for actionable ways to measure and enhance your security posture. The Cyber Defense Matrix is an invaluable framework for organizing and understanding your cybersecurity strategy. But its true power comes into focus when its effectiveness is quantifiable. Today, we'll expl...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Today, we’re tackling a crucial topic for any Chief Information Security Officer—how to validate your Cyber Defense Matrix using Key Performance Indicators or KPIs. This episode is for you if you&apos;re looking for actionable ways to measure and enhance your security posture.</p><p>The Cyber Defense Matrix is an invaluable framework for organizing and understanding your cybersecurity strategy. But its true power comes into focus when its effectiveness is quantifiable. Today, we&apos;ll explore some fundamental KPIs and see how they align with the layers of the matrix, giving you the tools to validate your security measures in a practical and powerful way.<br/><br/>Advisory Services: <a href='https://www.execcybered.com/advisory-services'>https://www.execcybered.com/advisory-services</a><br/>White Paper: <a href='https://www.execcybered.com/cybersecurity-metrics'>https://www.execcybered.com/cybersecurity-metrics</a><br/><br/>&gt;&gt;<a href='https://execcybered.hbportal.co/public/66afc1d4df03780026fedb2a/1-Schedule_an_intro_call'>Schedule Call</a>&lt;&lt;</p><p>Dr. Bill Souza</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Today, we’re tackling a crucial topic for any Chief Information Security Officer—how to validate your Cyber Defense Matrix using Key Performance Indicators or KPIs. This episode is for you if you&apos;re looking for actionable ways to measure and enhance your security posture.</p><p>The Cyber Defense Matrix is an invaluable framework for organizing and understanding your cybersecurity strategy. But its true power comes into focus when its effectiveness is quantifiable. Today, we&apos;ll explore some fundamental KPIs and see how they align with the layers of the matrix, giving you the tools to validate your security measures in a practical and powerful way.<br/><br/>Advisory Services: <a href='https://www.execcybered.com/advisory-services'>https://www.execcybered.com/advisory-services</a><br/>White Paper: <a href='https://www.execcybered.com/cybersecurity-metrics'>https://www.execcybered.com/cybersecurity-metrics</a><br/><br/>&gt;&gt;<a href='https://execcybered.hbportal.co/public/66afc1d4df03780026fedb2a/1-Schedule_an_intro_call'>Schedule Call</a>&lt;&lt;</p><p>Dr. Bill Souza</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15761345-measuring-success.mp3" length="8670010" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15761345</guid>
    <pubDate>Mon, 16 Sep 2024 12:00:00 -0400</pubDate>
    <podcast:soundbite startTime="0.0" duration="30.0" />
    <itunes:duration>719</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>77</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk Assessment - Unreliable</itunes:title>
    <title>Cybersecurity Risk Assessment - Unreliable</title>
    <itunes:summary><![CDATA[Send us Fan Mail Cybersecurity risk assessment is a very effective tool; however, it can not be done using a survey instrument. Here are my thoughts on the matter.   🎓 FREE MASTERCLASS: Learn all about cybersecurity project success, from pitch to approval! Join me: https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval. 🚀 Connect with us on: 👥LinkedIn: https://www.linkedin.com/company/exceccybered/ 📺YouTube: https://bit.ly/3BGOtPA 🔒 Secure your knowled...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Cybersecurity risk assessment is a very effective tool; however, it can not be done using a survey instrument. Here are my thoughts on the matter. <br/><br/><b>🎓 FREE MASTERCLASS: Learn all about cybersecurity project success, from pitch to approval! Join me: </b><a href='https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval'><b>https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval</b></a><b>. 🚀</b></p><p><b>Connect with us on:</b></p><ul><li><b>👥LinkedIn: </b><a href='https://www.linkedin.com/company/exceccybered/'><b>https://www.linkedin.com/company/exceccybered/</b></a><b> </b></li><li><b>📺YouTube: </b><a href='https://bit.ly/3BGOtPA'><b>https://bit.ly/3BGOtPA</b></a><b> </b></li></ul><p><b>🔒 Secure your knowledge and stay informed! 🌟</b></p><p>Thank you.<br/>Dr. Bill Souza</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Cybersecurity risk assessment is a very effective tool; however, it can not be done using a survey instrument. Here are my thoughts on the matter. <br/><br/><b>🎓 FREE MASTERCLASS: Learn all about cybersecurity project success, from pitch to approval! Join me: </b><a href='https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval'><b>https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval</b></a><b>. 🚀</b></p><p><b>Connect with us on:</b></p><ul><li><b>👥LinkedIn: </b><a href='https://www.linkedin.com/company/exceccybered/'><b>https://www.linkedin.com/company/exceccybered/</b></a><b> </b></li><li><b>📺YouTube: </b><a href='https://bit.ly/3BGOtPA'><b>https://bit.ly/3BGOtPA</b></a><b> </b></li></ul><p><b>🔒 Secure your knowledge and stay informed! 🌟</b></p><p>Thank you.<br/>Dr. Bill Souza</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/15181592-cybersecurity-risk-assessment-unreliable.mp3" length="5000274" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15181592</guid>
    <pubDate>Mon, 03 Jun 2024 00:00:00 -0400</pubDate>
    <itunes:duration>413</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>76</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk Assessment - Device (Protect)</itunes:title>
    <title>Cybersecurity Risk Assessment - Device (Protect)</title>
    <itunes:summary><![CDATA[Send us Fan Mail Read more: https://buff.ly/3UST8aE  FREE MASTERCLASS https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Read more: <a href='https://buff.ly/3UST8aE'>https://buff.ly/3UST8aE</a><br/><br/>FREE MASTERCLASS</p><p><a href='https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval'>https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Read more: <a href='https://buff.ly/3UST8aE'>https://buff.ly/3UST8aE</a><br/><br/>FREE MASTERCLASS</p><p><a href='https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval'>https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14580590-cybersecurity-risk-assessment-device-protect.mp3" length="11514139" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14580590</guid>
    <pubDate>Mon, 25 Mar 2024 00:00:00 -0400</pubDate>
    <itunes:duration>956</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk Assessment - Device (Identify)</itunes:title>
    <title>Cybersecurity Risk Assessment - Device (Identify)</title>
    <itunes:summary><![CDATA[Send us Fan Mail Read more: https://www.execcybered.com/blog/cybersecurity-risk-assessment-device-identify  FREE MASTERCLASS https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Read more: https://www.execcybered.com/blog/cybersecurity-risk-assessment-device-identify<br/><br/>FREE MASTERCLASS</p><p><a href='https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval'>https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval</a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p><p>Read more: https://www.execcybered.com/blog/cybersecurity-risk-assessment-device-identify<br/><br/>FREE MASTERCLASS</p><p><a href='https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval'>https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval</a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14580576-cybersecurity-risk-assessment-device-identify.mp3" length="15431568" type="audio/mpeg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14580576</guid>
    <pubDate>Mon, 26 Feb 2024 15:00:00 -0500</pubDate>
    <itunes:duration>1282</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity is a Business Issue</itunes:title>
    <title>Cybersecurity is a Business Issue</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Alarmed by "Have you heard cybersecurity is a business issue?" But WORRIED your education left you UNPREPARED to face it? Colleges and certificate programs rarely teach business, communication, or sales skills crucial for cybersecurity careers. Don't fret! My YouTube video talks about the essential soft skills missing from your education. Learn how to navigate business dynamics, communicate effectively, and even close deals in the cybersecurity field with my free trai...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Alarmed by &quot;Have you heard cybersecurity is a business issue?&quot; But WORRIED your education left you UNPREPARED to face it? Colleges and certificate programs rarely teach business, communication, or sales skills crucial for cybersecurity careers.</p><p>Don&apos;t fret! My YouTube video talks about the essential soft skills missing from your education. Learn how to navigate business dynamics, communicate effectively, and even close deals in the cybersecurity field with my free training below. Stop feeling powerless and unlock your true career potential!</p><p>Click the link in the description to watch now and master the skills to thrive in the competitive cybersecurity landscape.</p><p>#cybersecurity #careers #education #skills #business #communication #sales #softkills #youtube #video #learning #development #opportunity #success</p><h2><strong>FREE MASTERCLASS<br/></strong></h2><p><a href='https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval'>https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval</a></p><p> </p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Alarmed by &quot;Have you heard cybersecurity is a business issue?&quot; But WORRIED your education left you UNPREPARED to face it? Colleges and certificate programs rarely teach business, communication, or sales skills crucial for cybersecurity careers.</p><p>Don&apos;t fret! My YouTube video talks about the essential soft skills missing from your education. Learn how to navigate business dynamics, communicate effectively, and even close deals in the cybersecurity field with my free training below. Stop feeling powerless and unlock your true career potential!</p><p>Click the link in the description to watch now and master the skills to thrive in the competitive cybersecurity landscape.</p><p>#cybersecurity #careers #education #skills #business #communication #sales #softkills #youtube #video #learning #development #opportunity #success</p><h2><strong>FREE MASTERCLASS<br/></strong></h2><p><a href='https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval'>https://www.execcybered.com/cybersecurity-project-success-from-pitch-to-approval</a></p><p> </p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565548-cybersecurity-is-a-business-issue.mp3" length="10387500" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kj36zqr4ln82e6et6den3o8i3qyr?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2148503418</guid>
    <pubDate>Tue, 06 Feb 2024 05:00:00 -0500</pubDate>
    <itunes:duration>862</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Zone Defense</itunes:title>
    <title>Zone Defense</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Zone Defense - Another strategy to add to your cybersecurity program. How to defend your organization from cybersecurity breaches and today's cyber attacks. One quick sec cybersecurity rule to add to your strategy arsenal is discussed here.       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Zone Defense - Another strategy to add to your cybersecurity program.</p><p>How to defend your organization from cybersecurity breaches and today&apos;s cyber attacks. One quick sec cybersecurity rule to add to your strategy arsenal is discussed here.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Zone Defense - Another strategy to add to your cybersecurity program.</p><p>How to defend your organization from cybersecurity breaches and today&apos;s cyber attacks. One quick sec cybersecurity rule to add to your strategy arsenal is discussed here.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565549-zone-defense.mp3" length="7433322" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/vrg0hp24nqbppoxhapl3g4so3qes?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2148483024</guid>
    <pubDate>Tue, 30 Jan 2024 05:00:00 -0500</pubDate>
    <itunes:duration>616</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Emerging Threats - Risk Management</itunes:title>
    <title>Emerging Threats - Risk Management</title>
    <itunes:summary><![CDATA[Send us Fan Mail         In this week's podcast, I discuss the required steps to establish a risk or vulnerability program in your organization. Check it out!       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In this week&apos;s podcast, I discuss the required steps to establish a risk or vulnerability program in your organization. Check it out!</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In this week&apos;s podcast, I discuss the required steps to establish a risk or vulnerability program in your organization. Check it out!</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565551-emerging-threats-risk-management.mp3" length="19075306" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/n2s1qxewmkeb31qbzg3k42on8eg8?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2148460717</guid>
    <pubDate>Mon, 22 Jan 2024 08:00:00 -0500</pubDate>
    <itunes:duration>1586</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Corporate Series - Policy and Governance</itunes:title>
    <title>AI Corporate Series - Policy and Governance</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Areas to Address:Adoption challengesRisksGovernanceRoles and responsibilities  Scope to Consider:Can the users use Generative Artificial Intelligence (GAI)? (External GAI vs. Internal GAI)Which department is responsible for documenting the need for GAI and aligning it with corporate objectives?Third-party &amp; GAI, including software featuresPrivacyContractual obligationsResponsible AIRegulatoryOutput qualityInherited bias  Governance:Who is responsible?Who...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1 class='ql-heading'>Areas to Address:</h1><ol><li>Adoption challenges</li><li>Risks</li><li>Governance</li><li>Roles and responsibilities</li></ol><p> </p><h2 class='ql-heading'>Scope to Consider:</h2><ul><li>Can the users use Generative Artificial Intelligence (GAI)? (External GAI vs. Internal GAI)</li><li>Which department is responsible for documenting the need for GAI and aligning it with corporate objectives?</li><li>Third-party &amp; GAI, including software features</li><li>Privacy</li><li>Contractual obligations</li><li>Responsible AI</li><li>Regulatory</li><li>Output quality</li><li>Inherited bias</li></ul><p> </p><h2 class='ql-heading'>Governance:</h2><ul><li class='ql-block'>Who is responsible?</li><li class='ql-block'>Who should be part of the governance team?</li><li class='ql-block'>What are the roles and responsibilities?</li></ul>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1 class='ql-heading'>Areas to Address:</h1><ol><li>Adoption challenges</li><li>Risks</li><li>Governance</li><li>Roles and responsibilities</li></ol><p> </p><h2 class='ql-heading'>Scope to Consider:</h2><ul><li>Can the users use Generative Artificial Intelligence (GAI)? (External GAI vs. Internal GAI)</li><li>Which department is responsible for documenting the need for GAI and aligning it with corporate objectives?</li><li>Third-party &amp; GAI, including software features</li><li>Privacy</li><li>Contractual obligations</li><li>Responsible AI</li><li>Regulatory</li><li>Output quality</li><li>Inherited bias</li></ul><p> </p><h2 class='ql-heading'>Governance:</h2><ul><li class='ql-block'>Who is responsible?</li><li class='ql-block'>Who should be part of the governance team?</li><li class='ql-block'>What are the roles and responsibilities?</li></ul>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565552-ai-corporate-series-policy-and-governance.mp3" length="8513913" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/h4fvs437jwjgcnjle63i2rn7zch8?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147968589</guid>
    <pubDate>Thu, 22 Jun 2023 05:00:00 -0400</pubDate>
    <itunes:duration>706</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unveiling the Intersection The Impact of COVID-19, the Green Transition, the Rise of AI, Microeconomic Uncertainties, and Cybersecurity</itunes:title>
    <title>Unveiling the Intersection The Impact of COVID-19, the Green Transition, the Rise of AI, Microeconomic Uncertainties, and Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail         In an interconnected world, the impact of various global trends is not limited to individual domains. The convergence of COVID-19, the green transition, the rise of AI, microeconomic uncertainties, and cybersecurity have created a complex landscape with challenges and opportunities. Let's explore the intricate relationship between these forces, shedding light on cybersecurity's significant role in this new era. Read more here: https://www.execcybered.com/blog/unveilin...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In an interconnected world, the impact of various global trends is not limited to individual domains. The convergence of COVID-19, the green transition, the rise of AI, microeconomic uncertainties, and cybersecurity have created a complex landscape with challenges and opportunities. Let&apos;s explore the intricate relationship between these forces, shedding light on cybersecurity&apos;s significant role in this new era. Read more here: https://www.execcybered.com/blog/unveiling-the-intersection-the-impact-of-covid-19-the-green-transition-the-rise-of-ai-microeconomic-uncertainties-and-cybersecurity</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In an interconnected world, the impact of various global trends is not limited to individual domains. The convergence of COVID-19, the green transition, the rise of AI, microeconomic uncertainties, and cybersecurity have created a complex landscape with challenges and opportunities. Let&apos;s explore the intricate relationship between these forces, shedding light on cybersecurity&apos;s significant role in this new era. Read more here: https://www.execcybered.com/blog/unveiling-the-intersection-the-impact-of-covid-19-the-green-transition-the-rise-of-ai-microeconomic-uncertainties-and-cybersecurity</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565553-unveiling-the-intersection-the-impact-of-covid-19-the-green-transition-the-rise-of-ai-microeconomic-uncertainties-and-cybersecurity.mp3" length="3811429" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nrhf7ee4rigmxew14giznx5856lm?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147961563</guid>
    <pubDate>Thu, 15 Jun 2023 05:00:00 -0400</pubDate>
    <itunes:duration>314</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Upskilling and Reskilling in Cybersecurity</itunes:title>
    <title>Upskilling and Reskilling in Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail         With increasingly sophisticated cyber threats, organizations must prioritize protecting their sensitive data and networks. As a result, the demand for skilled cybersecurity professionals has skyrocketed, creating a unique opportunity for individuals to upskill or reskill in this high-demand field. Today, I will explore the significance of upskilling and reskilling in cybersecurity and provide valuable insights into navigating this dynamic industry effectively. Want to...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>With increasingly sophisticated cyber threats, organizations must prioritize protecting their sensitive data and networks. As a result, the demand for skilled cybersecurity professionals has skyrocketed, creating a unique opportunity for individuals to upskill or reskill in this high-demand field. Today, I will explore the significance of upskilling and reskilling in cybersecurity and provide valuable insights into navigating this dynamic industry effectively. Want to read more? Go to our block at https://www.execcybered.com/blog/upskilling-and-reskilling-in-cybersecurity-unlocking-the-path-to-professional-excellence</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>With increasingly sophisticated cyber threats, organizations must prioritize protecting their sensitive data and networks. As a result, the demand for skilled cybersecurity professionals has skyrocketed, creating a unique opportunity for individuals to upskill or reskill in this high-demand field. Today, I will explore the significance of upskilling and reskilling in cybersecurity and provide valuable insights into navigating this dynamic industry effectively. Want to read more? Go to our block at https://www.execcybered.com/blog/upskilling-and-reskilling-in-cybersecurity-unlocking-the-path-to-professional-excellence</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565554-upskilling-and-reskilling-in-cybersecurity.mp3" length="3687736" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tvroonsljo7jo5xhdaniry01sr4t?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147961561</guid>
    <pubDate>Fri, 09 Jun 2023 05:00:00 -0400</pubDate>
    <itunes:duration>304</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>ChatGPT</itunes:title>
    <title>ChatGPT</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Have you heard? ChatGPT 4.0 is here, so what is your corporate strategy? Let me give you a few pointers to think about.       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Have you heard? ChatGPT 4.0 is here, so what is your corporate strategy? Let me give you a few pointers to think about.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Have you heard? ChatGPT 4.0 is here, so what is your corporate strategy? Let me give you a few pointers to think about.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565555-chatgpt.mp3" length="5552884" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i5rij38hwlx9mv1v048hf9vvljqt?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147904429</guid>
    <pubDate>Thu, 27 Apr 2023 05:00:00 -0400</pubDate>
    <itunes:duration>459</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 Cybersecurity Controls - Reduce 85% of Cyber Risk</itunes:title>
    <title>5 Cybersecurity Controls - Reduce 85% of Cyber Risk</title>
    <itunes:summary><![CDATA[Send us Fan Mail         5 Cybersecurity Controls - Reduce 85% of Cyber Risk       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>5 Cybersecurity Controls - Reduce 85% of Cyber Risk</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>5 Cybersecurity Controls - Reduce 85% of Cyber Risk</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565556-5-cybersecurity-controls-reduce-85-of-cyber-risk.mp3" length="3538618" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/20xr9gifc6572itbbpohfuk7q7co?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147904426</guid>
    <pubDate>Thu, 20 Apr 2023 05:00:00 -0400</pubDate>
    <itunes:duration>291</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Hard Look</itunes:title>
    <title>A Hard Look</title>
    <itunes:summary><![CDATA[Send us Fan Mail         A Hard Look Honest communication between board members and information officers is critical to good cybersecurity. Cyber experts must relay their insights through non-technical storytelling and make a pertinent business case. Business leaders should aim for a cyber-aware culture permeating an entire organization. Read more: https://www.weforum.org/agenda/2022/12/cybersecurity-board-collaboration/ ========== How can a vCISO help your organization? The CISO role is all ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>A Hard Look Honest communication between board members and information officers is critical to good cybersecurity. Cyber experts must relay their insights through non-technical storytelling and make a pertinent business case. Business leaders should aim for a cyber-aware culture permeating an entire organization.</p><p>Read more: <a href='https://www.weforum.org/agenda/2022/12/cybersecurity-board-collaboration/'>https://www.weforum.org/agenda/2022/12/cybersecurity-board-collaboration/</a></p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>A Hard Look Honest communication between board members and information officers is critical to good cybersecurity. Cyber experts must relay their insights through non-technical storytelling and make a pertinent business case. Business leaders should aim for a cyber-aware culture permeating an entire organization.</p><p>Read more: <a href='https://www.weforum.org/agenda/2022/12/cybersecurity-board-collaboration/'>https://www.weforum.org/agenda/2022/12/cybersecurity-board-collaboration/</a></p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565557-a-hard-look.mp3" length="4589601" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2705icm0e3r0q9e0uqo77otusybg?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859983</guid>
    <pubDate>Thu, 13 Apr 2023 05:00:00 -0400</pubDate>
    <itunes:duration>379</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threat Modeling</itunes:title>
    <title>Threat Modeling</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Is your organization using threat intelligence to run threat modeling? If not, that’s a miss-opportunity. Your organization should establish desktop exercises or an informal cross-functional team to run threat modeling scenarios. This team would do the following four steps: Identify and characterize the systems supporting the organization's mission and objectives as a starting point. Identify the cybersecurity stack capabilities protecting these systems. Identify and ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Is your organization using threat intelligence to run threat modeling?</p><p>If not, that’s a miss-opportunity. Your organization should establish desktop exercises or an informal cross-functional team to run threat modeling scenarios. This team would do the following four steps: Identify and characterize the systems supporting the organization&apos;s mission and objectives as a starting point. Identify the cybersecurity stack capabilities protecting these systems. Identify and select the attack vectors to be included in the model. The most plausible is not every scenario. Analyze the threat model. Any gaps identified should be reported to management as potential vulnerabilities must be addressed. Bonus Point: Map the identified vulnerabilities to the cybersecurity risks to the mission and corporate objectives being reported to the executive leadership or board of directors.</p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Is your organization using threat intelligence to run threat modeling?</p><p>If not, that’s a miss-opportunity. Your organization should establish desktop exercises or an informal cross-functional team to run threat modeling scenarios. This team would do the following four steps: Identify and characterize the systems supporting the organization&apos;s mission and objectives as a starting point. Identify the cybersecurity stack capabilities protecting these systems. Identify and select the attack vectors to be included in the model. The most plausible is not every scenario. Analyze the threat model. Any gaps identified should be reported to management as potential vulnerabilities must be addressed. Bonus Point: Map the identified vulnerabilities to the cybersecurity risks to the mission and corporate objectives being reported to the executive leadership or board of directors.</p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565558-threat-modeling.mp3" length="3537919" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fn7qgtwhf7dhhhdch316p4qd11rq?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859982</guid>
    <pubDate>Thu, 06 Apr 2023 05:00:00 -0400</pubDate>
    <itunes:duration>291</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Neglected NIST Concepts</itunes:title>
    <title>Neglected NIST Concepts</title>
    <itunes:summary><![CDATA[Send us Fan Mail         The Neglected Pages of NIST When you download a NIST document, whether NIST 800-53, NIST 800-39, NIST 800-37, or the NIST Cybersecurity Framework, what page do you start reading first? ========== How can a vCISO help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the ini...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The Neglected Pages of NIST</p><p>When you download a NIST document, whether NIST 800-53, NIST 800-39, NIST 800-37, or the NIST Cybersecurity Framework, what page do you start reading first?</p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The Neglected Pages of NIST</p><p>When you download a NIST document, whether NIST 800-53, NIST 800-39, NIST 800-37, or the NIST Cybersecurity Framework, what page do you start reading first?</p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565559-neglected-nist-concepts.mp3" length="3996854" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6kglhhohgu5ddbv522v39funw96a?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859981</guid>
    <pubDate>Thu, 30 Mar 2023 05:00:00 -0400</pubDate>
    <itunes:duration>330</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Financial Institutions - Theft of Funds</itunes:title>
    <title>Financial Institutions - Theft of Funds</title>
    <itunes:summary><![CDATA[Send us Fan Mail         How a vCISO can help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization. ========== How can a vCISO help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potent...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>How a vCISO can help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>How a vCISO can help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565560-financial-institutions-theft-of-funds.mp3" length="2700377" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/90kk1kn2c409f1vw9lc6npxgt2ig?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859980</guid>
    <pubDate>Thu, 23 Mar 2023 05:00:00 -0400</pubDate>
    <itunes:duration>221</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Financial Institutions - Theft of Information</itunes:title>
    <title>Financial Institutions - Theft of Information</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Theft of Information is present in every organization and varies widely concerning value. The value of information is directly related to its criticality to the business. However, information can be further characterized along a continuum of data, information, and knowledge that reflects variances. “Data becomes information when endowed with relevance and purpose;” there are numerous motivating factors for threat actors and criminals to steal data, such as aiding in t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Theft of Information is present in every organization and varies widely concerning value. The value of information is directly related to its criticality to the business. However, information can be further characterized along a continuum of data, information, and knowledge that reflects variances.</p><p>“Data becomes information when endowed with relevance and purpose;” there are numerous motivating factors for threat actors and criminals to steal data, such as aiding in the theft of funds, disrupting operations, and increasing capabilities for further data theft. While the value of financial or physical assets is typically straightforward and quantifiable, the value of various forms of information is harder to measure. Information theft is unique compared to other types of theft; information theft generally does not result in depriving the asset owner of the asset because the theft is usually executed as a data copy or as an action intended to deprive legitimate users of accessing the system or data.</p><p>Organizations must understand where their crown jewels are in the organization so they can be protected accordingly. </p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Theft of Information is present in every organization and varies widely concerning value. The value of information is directly related to its criticality to the business. However, information can be further characterized along a continuum of data, information, and knowledge that reflects variances.</p><p>“Data becomes information when endowed with relevance and purpose;” there are numerous motivating factors for threat actors and criminals to steal data, such as aiding in the theft of funds, disrupting operations, and increasing capabilities for further data theft. While the value of financial or physical assets is typically straightforward and quantifiable, the value of various forms of information is harder to measure. Information theft is unique compared to other types of theft; information theft generally does not result in depriving the asset owner of the asset because the theft is usually executed as a data copy or as an action intended to deprive legitimate users of accessing the system or data.</p><p>Organizations must understand where their crown jewels are in the organization so they can be protected accordingly. </p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565561-financial-institutions-theft-of-information.mp3" length="2700389" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/z1e13h27e9k5w7j68l6mn681imrf?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859978</guid>
    <pubDate>Thu, 16 Mar 2023 05:00:00 -0400</pubDate>
    <itunes:duration>221</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Operational and Strategic Perspective</itunes:title>
    <title>Operational and Strategic Perspective</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Do you have an operational or strategic view when protecting your organization's systems? ========== How can a vCISO help your organization? The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization. Let E|CE help your Small Business Contact us: ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Do you have an operational or strategic view when protecting your organization&apos;s systems?</p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Do you have an operational or strategic view when protecting your organization&apos;s systems?</p><p>==========<br/>How can a vCISO help your organization?</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved.</p><p>The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><p>Contact us: https://www.execcybered.com/contact</p><p>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #vciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565562-operational-and-strategic-perspective.mp3" length="2350855" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xer9k0xkvrw5uzmkqj37llkn8o6j?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859976</guid>
    <pubDate>Thu, 09 Mar 2023 05:00:00 -0500</pubDate>
    <itunes:duration>192</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Acronyms, Jargons, and Idioms</itunes:title>
    <title>Acronyms, Jargons, and Idioms</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Acronyms, Jargons &amp; Idioms Impacting Communication Between Board, C-Suite, and Specialists. Communication is a two-way street, and company executives must be prepared to ask their own questions exploring the data being presented to them. The questions can be simple and direct, such as Can you elaborate on how this presented data impacts our company's objective(s)? What percentage of these vulnerabilities impact the systems supporting our company's mission and obje...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Acronyms, Jargons &amp; Idioms Impacting Communication Between Board, C-Suite, and Specialists. Communication is a two-way street, and company executives must be prepared to ask their own questions exploring the data being presented to them. The questions can be simple and direct, such as Can you elaborate on how this presented data impacts our company&apos;s objective(s)? What percentage of these vulnerabilities impact the systems supporting our company&apos;s mission and objectives? These simple questions will ignite an insightful discussion and provide the information you may want to make educated decisions.</p><p>==========</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><ul><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/ </a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza </a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/ </a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA </a></li></ul><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p>www.execcybered.com</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Acronyms, Jargons &amp; Idioms Impacting Communication Between Board, C-Suite, and Specialists. Communication is a two-way street, and company executives must be prepared to ask their own questions exploring the data being presented to them. The questions can be simple and direct, such as Can you elaborate on how this presented data impacts our company&apos;s objective(s)? What percentage of these vulnerabilities impact the systems supporting our company&apos;s mission and objectives? These simple questions will ignite an insightful discussion and provide the information you may want to make educated decisions.</p><p>==========</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><ul><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/ </a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza </a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/ </a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA </a></li></ul><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p>www.execcybered.com</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565563-acronyms-jargons-and-idioms.mp3" length="2851763" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/z8ces4yejod4nl2q6rjnz7dzc4q3?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859975</guid>
    <pubDate>Thu, 02 Mar 2023 05:00:00 -0500</pubDate>
    <itunes:duration>234</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mission-Centric Risk Metrics</itunes:title>
    <title>Mission-Centric Risk Metrics</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Mission-Centric Cyber Risk Metrics Understanding what to measure in a mission-critical risk program is important, so today, I'll discuss a framework you can use. 1. Identify the system's environment (production, development, test, etc.) 2. System's criticality 3. Business Area ownership 4. Solution(s) being hosted on the identified systems 5. Top controls being violated 6. Vulnerabilities identified 7. Minimum Security Baselines non-conformance 8. Internal audit findi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Mission-Centric Cyber Risk Metrics Understanding what to measure in a mission-critical risk program is important, so today, I&apos;ll discuss a framework you can use.</p><p>1. Identify the system&apos;s environment (production, development, test, etc.) 2. System&apos;s criticality 3. Business Area ownership 4. Solution(s) being hosted on the identified systems 5. Top controls being violated 6. Vulnerabilities identified 7. Minimum Security Baselines non-conformance 8. Internal audit findings 9. Penetration test findings 10. Threat hunts.</p><p>These data points will assist your organization in understanding how much risk exposure your mission-supporting solutions may be exposed to. </p><p>==========</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><ul><li>Linkedin:<span> </span><a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter:<span> </span><a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram:<span> </span><a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube:<span> </span><a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p>www.execcybered.com</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Mission-Centric Cyber Risk Metrics Understanding what to measure in a mission-critical risk program is important, so today, I&apos;ll discuss a framework you can use.</p><p>1. Identify the system&apos;s environment (production, development, test, etc.) 2. System&apos;s criticality 3. Business Area ownership 4. Solution(s) being hosted on the identified systems 5. Top controls being violated 6. Vulnerabilities identified 7. Minimum Security Baselines non-conformance 8. Internal audit findings 9. Penetration test findings 10. Threat hunts.</p><p>These data points will assist your organization in understanding how much risk exposure your mission-supporting solutions may be exposed to. </p><p>==========</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><ul><li>Linkedin:<span> </span><a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter:<span> </span><a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram:<span> </span><a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube:<span> </span><a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p>www.execcybered.com</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565564-mission-centric-risk-metrics.mp3" length="3309426" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5xpcp30jekthz6y88rksc8kulbey?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859974</guid>
    <pubDate>Thu, 23 Feb 2023 05:00:00 -0500</pubDate>
    <itunes:duration>272</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Expanding Cyber Risk Beyond IT</itunes:title>
    <title>Expanding Cyber Risk Beyond IT</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Retail banking takes care of regular daily banking, for which most people know banks. This includes providing checking and saving services and issuing credit cards. Retail banking divisions may also be in charge of providing loans, mortgages, and other financings. Some other products and services may be offered under retail banking divisions: Lines of credit, Investment management and accounts, Insurance Retirement, and education accounts. Ask a simple, broad, and ope...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Retail banking takes care of regular daily banking, for which most people know banks. This includes providing checking and saving services and issuing credit cards. Retail banking divisions may also be in charge of providing loans, mortgages, and other financings. Some other products and services may be offered under retail banking divisions: Lines of credit, Investment management and accounts, Insurance Retirement, and education accounts. Ask a simple, broad, and open-ended question; what do you perceive as your cybersecurity risk? This question probes for a direct answer to an intentional board and open-ended question. You don’t need to know or even judge the merit of any answer, but you do need to judge the organization’s ability to provide a sufficient answer. </p><p>==========</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><ul><li>Linkedin:<span> </span><a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter:<span> </span><a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram:<span> </span><a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube:<span> </span><a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p>www.execcybered.com</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Retail banking takes care of regular daily banking, for which most people know banks. This includes providing checking and saving services and issuing credit cards. Retail banking divisions may also be in charge of providing loans, mortgages, and other financings. Some other products and services may be offered under retail banking divisions: Lines of credit, Investment management and accounts, Insurance Retirement, and education accounts. Ask a simple, broad, and open-ended question; what do you perceive as your cybersecurity risk? This question probes for a direct answer to an intentional board and open-ended question. You don’t need to know or even judge the merit of any answer, but you do need to judge the organization’s ability to provide a sufficient answer. </p><p>==========</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><ul><li>Linkedin:<span> </span><a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter:<span> </span><a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram:<span> </span><a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube:<span> </span><a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p>www.execcybered.com</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565565-expanding-cyber-risk-beyond-it.mp3" length="3097525" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/buull14cwnhrm6q5cbohqeb37i5x?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859973</guid>
    <pubDate>Thu, 16 Feb 2023 05:00:00 -0500</pubDate>
    <itunes:duration>255</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Three Cybersecurity Checkups</itunes:title>
    <title>Three Cybersecurity Checkups</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Technologies and the methods used to hack into them continuously evolve. If you’re looking for an effective and efficient way to check the cybersecurity health of your organization, I suggest the following three checkups: Vulnerability and Penetration: Test Once you know the mission-critical systems in your organization, I suggest performing these two cybersecurity tests on a continuous basis.Vulnerability Scans &amp; Software Updates Scanning: your mission-critical s...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Technologies and the methods used to hack into them continuously evolve. If you’re looking for an effective and efficient way to check the cybersecurity health of your organization, I suggest the following three checkups:</p><ol><li>Vulnerability and Penetration: Test Once you know the mission-critical systems in your organization, I suggest performing these two cybersecurity tests on a continuous basis.</li><li>Vulnerability Scans &amp; Software Updates Scanning: your mission-critical systems for vulnerabilities and then prioritizing and patching them is a critical practice to maintain cybersecurity hygiene.</li><li>Risk Assessments: A holistic approach will require that your team consider the results of your penetration test, vulnerability scans, and other vulnerability and threat information and develop an educated conclusion of the organization’s risks.</li></ol><p>==========</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><ul><li>Linkedin:<span> </span><a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter:<span> </span><a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram:<span> </span><a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube:<span> </span><a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p>www.execcybered.com</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Technologies and the methods used to hack into them continuously evolve. If you’re looking for an effective and efficient way to check the cybersecurity health of your organization, I suggest the following three checkups:</p><ol><li>Vulnerability and Penetration: Test Once you know the mission-critical systems in your organization, I suggest performing these two cybersecurity tests on a continuous basis.</li><li>Vulnerability Scans &amp; Software Updates Scanning: your mission-critical systems for vulnerabilities and then prioritizing and patching them is a critical practice to maintain cybersecurity hygiene.</li><li>Risk Assessments: A holistic approach will require that your team consider the results of your penetration test, vulnerability scans, and other vulnerability and threat information and develop an educated conclusion of the organization’s risks.</li></ol><p>==========</p><p>The CISO role is all about the strategy, leadership, management, and communication of how potential threats will be assessed and solved. The CISO will absorb the big picture and dismantle it and restructure it to ensure it meets the initiatives of the department and the organization.</p><p>Let E|CE help your Small Business</p><ul><li>Linkedin:<span> </span><a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter:<span> </span><a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram:<span> </span><a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube:<span> </span><a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance #cybersecurity #chiefinformationsecurityofficer #ceos #chiefexecutiveofficer #cybersecurityawarenessmonth #cybersecuritystrategy #cybersecurityculture #cybersecurityawarenesstraining #cybersecuritythreats #cyberattacks #cybersecurityleadership #insiderthreats #insiderrisk #informationsecurity #businessstrategy #securitymanagement #leadership</p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p>www.execcybered.com</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565566-three-cybersecurity-checkups.mp3" length="4661106" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xaamvt0ion4xcqesulxcikbsrhg7?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147859971</guid>
    <pubDate>Thu, 09 Feb 2023 05:00:00 -0500</pubDate>
    <itunes:duration>385</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity - A Core Business Risk</itunes:title>
    <title>Cybersecurity - A Core Business Risk</title>
    <itunes:summary><![CDATA[Send us Fan Mail          Do you believe these are business challenges? UpskillingLow morale or quiet quittingHiring and talent retentionKeeping up with technology and toolsIf so, why aren’t you considering cybersecurity as a core business challenge? It takes 280 on average days to identify and contain a data breach, and the average cost is $3.86 million. Stolen or compromised employee credentials initiate the lion’s share of those breaches. Small business advisory boards and panels must star...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1><br/></h1><p>Do you believe these are business challenges?</p><ul><li>Upskilling</li><li>Low morale or quiet quitting</li><li>Hiring and talent retention</li><li>Keeping up with technology and tools</li></ul><p>If so, why aren’t you considering cybersecurity as a core business challenge?</p><p>It takes 280 on average days to identify and contain a data breach, and the average cost is $3.86 million. Stolen or compromised employee credentials initiate the lion’s share of those breaches.</p><p>Small business advisory boards and panels must start pushing management to treat cybersecurity as a business risk.</p><p>========</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance</p><p>========</p><p>Let E|CE help your Small Business</p><p>*** Book a Call ***</p><p><a href='https://booking.execcybered.com/#/customer/drbillsouzaexeccybered'>https://booking.execcybered.com/#/customer/drbillsouzaexeccybered</a></p><ul><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/><br/></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1><br/></h1><p>Do you believe these are business challenges?</p><ul><li>Upskilling</li><li>Low morale or quiet quitting</li><li>Hiring and talent retention</li><li>Keeping up with technology and tools</li></ul><p>If so, why aren’t you considering cybersecurity as a core business challenge?</p><p>It takes 280 on average days to identify and contain a data breach, and the average cost is $3.86 million. Stolen or compromised employee credentials initiate the lion’s share of those breaches.</p><p>Small business advisory boards and panels must start pushing management to treat cybersecurity as a business risk.</p><p>========</p><p>#cybersecurity #cyberrisk #cyberriskmanagement #risk #riskmanagement #smallbusiness #smaillbusinesses #ceo #cio #ciso #ece #governance #cybergovernance</p><p>========</p><p>Let E|CE help your Small Business</p><p>*** Book a Call ***</p><p><a href='https://booking.execcybered.com/#/customer/drbillsouzaexeccybered'>https://booking.execcybered.com/#/customer/drbillsouzaexeccybered</a></p><ul><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/><br/></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565568-cybersecurity-a-core-business-risk.mp3" length="4054050" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u2a8jhc6r4yjbg9z0cfppuozj4n9?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858131</guid>
    <pubDate>Thu, 02 Feb 2023 00:00:00 -0500</pubDate>
    <itunes:duration>333</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>55</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Worthy Mention - Antivirus Software</itunes:title>
    <title>A Worthy Mention - Antivirus Software</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Antivirus has become a necessary tool for preventing cyber incidents; while the market is crowded, you need to look for antivirus software that fits your organization’s needs. NIST has guidance that you can leverage; NIST 800-83 recommends key capabilities that an antivirus software must have: Scanning startup files and boot recordsReal-time scanning of emails and email attachments for malwareBehavior monitoring of emails, browsers, and instant messaging softwareScann...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Antivirus has become a necessary tool for preventing cyber incidents; while the market is crowded, you need to look for antivirus software that fits your organization’s needs. NIST has guidance that you can leverage; NIST 800-83 recommends key capabilities that an antivirus software must have:</p><ul><li>Scanning startup files and boot records</li><li>Real-time scanning of emails and email attachments for malware</li><li>Behavior monitoring of emails, browsers, and instant messaging software</li><li>Scanning for known malware</li><li>Disinfecting files</li><li>Quarantining files</li><li>Identifying common types of malware and attacker tools</li></ul><p>NIST also recommends that organizations deploy antivirus software from a host and network-based perspective.</p><p>NIST 800-83: <a href='https://csrc.nist.gov/publications/detail/sp/800-83/rev-1/final'>https://csrc.nist.gov/publications/detail/sp/800-83/rev-1/final</a></p><p>========</p><p>Let E|CE help your Small Business</p><p>*** Book a Call ***</p><p><a href='https://booking.execcybered.com/#/customer/drbillsouzaexeccybered'>https://booking.execcybered.com/#/customer/drbillsouzaexeccybered</a><br/><br/></p><ul><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p><br/></p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Antivirus has become a necessary tool for preventing cyber incidents; while the market is crowded, you need to look for antivirus software that fits your organization’s needs. NIST has guidance that you can leverage; NIST 800-83 recommends key capabilities that an antivirus software must have:</p><ul><li>Scanning startup files and boot records</li><li>Real-time scanning of emails and email attachments for malware</li><li>Behavior monitoring of emails, browsers, and instant messaging software</li><li>Scanning for known malware</li><li>Disinfecting files</li><li>Quarantining files</li><li>Identifying common types of malware and attacker tools</li></ul><p>NIST also recommends that organizations deploy antivirus software from a host and network-based perspective.</p><p>NIST 800-83: <a href='https://csrc.nist.gov/publications/detail/sp/800-83/rev-1/final'>https://csrc.nist.gov/publications/detail/sp/800-83/rev-1/final</a></p><p>========</p><p>Let E|CE help your Small Business</p><p>*** Book a Call ***</p><p><a href='https://booking.execcybered.com/#/customer/drbillsouzaexeccybered'>https://booking.execcybered.com/#/customer/drbillsouzaexeccybered</a><br/><br/></p><ul><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p><br/></p><p>Thanks.</p><p>Dr. Bill Souza</p><p>CEO | Founder</p><p><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565569-a-worthy-mention-antivirus-software.mp3" length="2934741" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/il4qibhgr3shzd52xi4qhex96t3z?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858132</guid>
    <pubDate>Thu, 26 Jan 2023 05:00:00 -0500</pubDate>
    <itunes:duration>240</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>54</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Greater than Cybersecurity</itunes:title>
    <title>Greater than Cybersecurity</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Greater than Cybersecurity  When we realize that our cybersecurity challenges are complex and intertwined with conscious living people who view their actions in light of stories with emotions and ideas attached, one sees the need for many different perspectives. Therefore, the solution for your cybersecurity challenges will require knowledge beyond its discipline; it will involve communication, marketing, business, psychology, and sociology, among others.   Howev...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Greater than Cybersecurity<br/><br/>When we realize that our cybersecurity challenges are complex and intertwined with conscious living people who view their actions in light of stories with emotions and ideas attached, one sees the need for many different perspectives. Therefore, the solution for your cybersecurity challenges will require knowledge beyond its discipline; it will involve communication, marketing, business, psychology, and sociology, among others. <br/><br/>However, as an industry, we tend to become insular; as subject matter experts, we can’t know everything, so the first impulse is to specialize, narrowing our point of view to a defined subject. <br/><br/>When cybersecurity reports are published depicting the most significant cybersecurity events of the year, they rarely focus on the critical narratives that accompanied those events or what actions, or lack thereof, led to those events.<br/><br/>It is not enough to assess what controls or tools are deployed in an organization. You need to understand the governance and management oversight of these controls and tools to ensure that they are effectively being used as prescribed; otherwise, you only see half of the story. <br/><br/>Be critical, think critically, and have the right strategy in place. <br/><br/>========<br/><br/>Let E|CE help your Small Business<br/><br/>*** Book a Call ***<br/>https://booking.execcybered.com/#/customer/drbillsouzaexeccybered<br/><br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Greater than Cybersecurity<br/><br/>When we realize that our cybersecurity challenges are complex and intertwined with conscious living people who view their actions in light of stories with emotions and ideas attached, one sees the need for many different perspectives. Therefore, the solution for your cybersecurity challenges will require knowledge beyond its discipline; it will involve communication, marketing, business, psychology, and sociology, among others. <br/><br/>However, as an industry, we tend to become insular; as subject matter experts, we can’t know everything, so the first impulse is to specialize, narrowing our point of view to a defined subject. <br/><br/>When cybersecurity reports are published depicting the most significant cybersecurity events of the year, they rarely focus on the critical narratives that accompanied those events or what actions, or lack thereof, led to those events.<br/><br/>It is not enough to assess what controls or tools are deployed in an organization. You need to understand the governance and management oversight of these controls and tools to ensure that they are effectively being used as prescribed; otherwise, you only see half of the story. <br/><br/>Be critical, think critically, and have the right strategy in place. <br/><br/>========<br/><br/>Let E|CE help your Small Business<br/><br/>*** Book a Call ***<br/>https://booking.execcybered.com/#/customer/drbillsouzaexeccybered<br/><br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565570-greater-than-cybersecurity.mp3" length="2237848" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/aghc542j9bt2a9l223gzgya6v6sy?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858133</guid>
    <pubDate>Thu, 19 Jan 2023 05:00:00 -0500</pubDate>
    <itunes:duration>182</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>53</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Protective Techology</itunes:title>
    <title>Protective Techology</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Protective Technology The last item I want to mention under the Protect function that supports the  attack surface reduction and limits the cyber events' impact on your systems is “protective technologies.”   Remember, protecting your organization involves six critical cybersecurity categories: Access ControlAwareness and TrainingData SecurityInformation Protection Processes and ProceduresMaintenance Protective Technologies The restriction of removable ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Protective Technology<br/>The last item I want to mention under the Protect function that supports the  attack surface reduction and limits the cyber events&apos; impact on your systems is “protective technologies.” <br/><br/>Remember, protecting your organization involves six critical cybersecurity categories:</p><ul><li>Access Control</li><li>Awareness and Training</li><li>Data Security</li><li>Information Protection Processes and Procedures</li><li>Maintenance </li><li>Protective Technologies</li></ul><p><br/>The restriction of removable media according to policy is a good first step. Restricting the use of USB drives and external hard drives are the first ones that come to mind; however, if we holistically see this category, we can include company or vendor-specific support equipment, such as tablets and laptops that are used in your data center to support diagnose or troubleshoot your equipment. <br/><br/>Second, and perhaps most prevalent in small businesses or micro-businesses, is to ensure your systems are single function; therefore, avoiding, for example, hosting an email server and web servers on the same device. An attack on one device would cause an interruption of service for both services.<br/><br/>Lastly, you can implement mechanisms to achieve business resilience; technology will fail, so having technology and the right architecture in place will minimize the impact to your business, such as:<br/>Implementing load balancing, which will distribute workload across various systems<br/>Hot-swap, which allows you to make maintenance repairs while your system continues to function<br/><br/>These are a few strategies that will turn your business more resilient. <br/><br/>========<br/><br/>*** Book a Call ***<br/>https://booking.execcybered.com/#/customer/drbillsouzaexeccybered<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Protective Technology<br/>The last item I want to mention under the Protect function that supports the  attack surface reduction and limits the cyber events&apos; impact on your systems is “protective technologies.” <br/><br/>Remember, protecting your organization involves six critical cybersecurity categories:</p><ul><li>Access Control</li><li>Awareness and Training</li><li>Data Security</li><li>Information Protection Processes and Procedures</li><li>Maintenance </li><li>Protective Technologies</li></ul><p><br/>The restriction of removable media according to policy is a good first step. Restricting the use of USB drives and external hard drives are the first ones that come to mind; however, if we holistically see this category, we can include company or vendor-specific support equipment, such as tablets and laptops that are used in your data center to support diagnose or troubleshoot your equipment. <br/><br/>Second, and perhaps most prevalent in small businesses or micro-businesses, is to ensure your systems are single function; therefore, avoiding, for example, hosting an email server and web servers on the same device. An attack on one device would cause an interruption of service for both services.<br/><br/>Lastly, you can implement mechanisms to achieve business resilience; technology will fail, so having technology and the right architecture in place will minimize the impact to your business, such as:<br/>Implementing load balancing, which will distribute workload across various systems<br/>Hot-swap, which allows you to make maintenance repairs while your system continues to function<br/><br/>These are a few strategies that will turn your business more resilient. <br/><br/>========<br/><br/>*** Book a Call ***<br/>https://booking.execcybered.com/#/customer/drbillsouzaexeccybered<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565571-protective-techology.mp3" length="3379508" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/j8mqsj3db92nb24sxl2b0v4s0j74?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858134</guid>
    <pubDate>Thu, 12 Jan 2023 05:00:00 -0500</pubDate>
    <itunes:duration>276</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>52</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Information Protection - Processes &amp; Procedures</itunes:title>
    <title>Information Protection - Processes &amp; Procedures</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Ideally and preferably, your cybersecurity program should follow established policies, standards, and procedures. These documents will govern all organization members, including staff, vendors, volunteers, and anyone working on the organization’s behalf.  The first step towards information protection is to develop and maintain a baseline configuration for IT and OT systems if this applies to your organization that incorporates appropriate cybersecurity principles, suc...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Ideally and preferably, your cybersecurity program should follow established policies, standards, and procedures. These documents will govern all organization members, including staff, vendors, volunteers, and anyone working on the organization’s behalf.<br/><br/>The first step towards information protection is to develop and maintain a baseline configuration for IT and OT systems if this applies to your organization that incorporates appropriate cybersecurity principles, such as least privilege. <br/><br/>The baseline configurations are documented, formally reviewed, and agreed-upon sets of specifications for IT systems or configuration items within those systems. It serves as the basis for all future changes to the systems, and it is considered the stable version of any system. <br/><br/>However, changes will occur over time, so a method is imperative to manage system changes. This task is part of a much larger discipline known as configuration management. Configuration management addresses the methods for controlling asset changes throughout the assets’ lifecycle. <br/><br/>There are three roles your organization should consider in the change management process:<br/>Configuration manager<br/>Baseline manager<br/>Verification manager<br/><br/>Once your organization establishes good baseline practices, the challenge is to keep track of all the changes required for the business; therefore, I suggest using a standard exception process to document the exceptions to the baseline while calculating the risk and requiring sign-offs. <br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Ideally and preferably, your cybersecurity program should follow established policies, standards, and procedures. These documents will govern all organization members, including staff, vendors, volunteers, and anyone working on the organization’s behalf.<br/><br/>The first step towards information protection is to develop and maintain a baseline configuration for IT and OT systems if this applies to your organization that incorporates appropriate cybersecurity principles, such as least privilege. <br/><br/>The baseline configurations are documented, formally reviewed, and agreed-upon sets of specifications for IT systems or configuration items within those systems. It serves as the basis for all future changes to the systems, and it is considered the stable version of any system. <br/><br/>However, changes will occur over time, so a method is imperative to manage system changes. This task is part of a much larger discipline known as configuration management. Configuration management addresses the methods for controlling asset changes throughout the assets’ lifecycle. <br/><br/>There are three roles your organization should consider in the change management process:<br/>Configuration manager<br/>Baseline manager<br/>Verification manager<br/><br/>Once your organization establishes good baseline practices, the challenge is to keep track of all the changes required for the business; therefore, I suggest using a standard exception process to document the exceptions to the baseline while calculating the risk and requiring sign-offs. <br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565572-information-protection-processes-procedures.mp3" length="4531634" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xjxbtj3ryiqvlz9fuj0hnxqqhv91?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858135</guid>
    <pubDate>Thu, 05 Jan 2023 05:00:00 -0500</pubDate>
    <itunes:duration>373</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>51</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Protect - Data Security</itunes:title>
    <title>Protect - Data Security</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Data Security The third of the six critical cybersecurity categories I presented previously is “data security.” An organization's most valuable asset is data; hackers seek data sources to steal from businesses, governments, and non-profit organizations, including small and midsized companies. Data must be protected in transit and at rest.   The NIST CSF addresses data security in its Protect function under its data security category (PR.DS). The first and second ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Data Security<br/>The third of the six critical cybersecurity categories I presented previously is “data security.” An organization&apos;s most valuable asset is data; hackers seek data sources to steal from businesses, governments, and non-profit organizations, including small and midsized companies. Data must be protected in transit and at rest. <br/><br/>The NIST CSF addresses data security in its Protect function under its data security category (PR.DS). The first and second subcategories handle data in transit and data at rest, respectively. Organizations must implement security controls to address the integrity and confidentiality of the data. However, when putting this advice into practice, the challenge becomes how to protect against all the vulnerabilities; at the time of this recording, the Common Vulnerability Exposure (CVE) contains 183,630 CVE records.<br/><br/>One approach proposed by Scott Musman is to protect against the attack effects, which he classifies as the following categories:<br/>Degradation<br/>Interruption<br/>Modification<br/>Fabrication<br/>Interception<br/>Unauthorized use<br/>The proposed concept is that regardless of the vulnerability of the 183,630, the impact will be one of the categories listed.<br/><br/>The other area that NIST CSF addresses under data security is environment segmentation, keeping the development and testing environments separate from the production environment. Not only by installing a DEV or TST system in production but also by avoiding the communication between these environments.<br/><br/>Last but not least, NIST CSF addresses hardware integrity. Not every company will need to implement this control, so I suggest adopting an ISO 27001 practice: create a spreadsheet with all the NIST CSF controls from the informative reference column and mark them as implemented or justify why it was not implemented. This practice will give you a good inventory of what you have implemented and a business justification for why not. <br/><br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Data Security<br/>The third of the six critical cybersecurity categories I presented previously is “data security.” An organization&apos;s most valuable asset is data; hackers seek data sources to steal from businesses, governments, and non-profit organizations, including small and midsized companies. Data must be protected in transit and at rest. <br/><br/>The NIST CSF addresses data security in its Protect function under its data security category (PR.DS). The first and second subcategories handle data in transit and data at rest, respectively. Organizations must implement security controls to address the integrity and confidentiality of the data. However, when putting this advice into practice, the challenge becomes how to protect against all the vulnerabilities; at the time of this recording, the Common Vulnerability Exposure (CVE) contains 183,630 CVE records.<br/><br/>One approach proposed by Scott Musman is to protect against the attack effects, which he classifies as the following categories:<br/>Degradation<br/>Interruption<br/>Modification<br/>Fabrication<br/>Interception<br/>Unauthorized use<br/>The proposed concept is that regardless of the vulnerability of the 183,630, the impact will be one of the categories listed.<br/><br/>The other area that NIST CSF addresses under data security is environment segmentation, keeping the development and testing environments separate from the production environment. Not only by installing a DEV or TST system in production but also by avoiding the communication between these environments.<br/><br/>Last but not least, NIST CSF addresses hardware integrity. Not every company will need to implement this control, so I suggest adopting an ISO 27001 practice: create a spreadsheet with all the NIST CSF controls from the informative reference column and mark them as implemented or justify why it was not implemented. This practice will give you a good inventory of what you have implemented and a business justification for why not. <br/><br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565573-protect-data-security.mp3" length="5371099" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/whup1zm80r1iaf9glotru6zkm9wa?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858136</guid>
    <pubDate>Thu, 29 Dec 2022 05:00:00 -0500</pubDate>
    <itunes:duration>443</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>50</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Protect - Awareness and Training</itunes:title>
    <title>Protect - Awareness and Training</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Securing and protecting your organization also takes a village to make happen, so cybersecurity awareness and training become very important; there’s so much technology can do to protect against phishing and its infinite variations, including the most efficient one, the Business Email Compromise (BEC); the FBI calls it “one of the most financially damaging online crimes.”  The NIST Framework addresses awareness and training in its Protect function under the category P...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Securing and protecting your organization also takes a village to make happen, so cybersecurity awareness and training become very important; there’s so much technology can do to protect against phishing and its infinite variations, including the most efficient one, the Business Email Compromise (BEC); the FBI calls it “one of the most financially damaging online crimes.”<br/><br/>The NIST Framework addresses awareness and training in its Protect function under the category PR.AT, and it is also one of the top goals of the National Initiative for Cybersecurity Education (NICE). However, cybersecurity awareness has been a challenge for every organization because training individuals with several different skill levels and interest is complex.<br/><br/>The diffusion of innovation principle tells us that the adoption rate of an innovation or idea is compatible with the values, beliefs, and past experiences of individuals in the social system. So, are you connecting to your audience? <br/><br/>Here is what the diffusion of innovation principle tells us as well; <br/><br/>On the bell curve, all population sits in the standard deviation; you will always have high, low, and average performers. The first 2.5% will be innovators, the big idea people; the next 12 to 13% will be the early adopters; these individuals will be excited with a new idea, process, or product that aligns with their own values and beliefs; the next approximately 68% are the early majority, late majority, which is your average individuals, with the last about 16% being the lagging performers, these individuals will adopt the idea or process because they don’t have a choice.  <br/><br/>You need to gain the majority’s attention to achieve cybersecurity training penetration. To do that, you need to aim for your innovators and early adopters because most will not try something new if someone else hasn’t tried it. <br/><br/>You need to understand your audience.<br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Securing and protecting your organization also takes a village to make happen, so cybersecurity awareness and training become very important; there’s so much technology can do to protect against phishing and its infinite variations, including the most efficient one, the Business Email Compromise (BEC); the FBI calls it “one of the most financially damaging online crimes.”<br/><br/>The NIST Framework addresses awareness and training in its Protect function under the category PR.AT, and it is also one of the top goals of the National Initiative for Cybersecurity Education (NICE). However, cybersecurity awareness has been a challenge for every organization because training individuals with several different skill levels and interest is complex.<br/><br/>The diffusion of innovation principle tells us that the adoption rate of an innovation or idea is compatible with the values, beliefs, and past experiences of individuals in the social system. So, are you connecting to your audience? <br/><br/>Here is what the diffusion of innovation principle tells us as well; <br/><br/>On the bell curve, all population sits in the standard deviation; you will always have high, low, and average performers. The first 2.5% will be innovators, the big idea people; the next 12 to 13% will be the early adopters; these individuals will be excited with a new idea, process, or product that aligns with their own values and beliefs; the next approximately 68% are the early majority, late majority, which is your average individuals, with the last about 16% being the lagging performers, these individuals will adopt the idea or process because they don’t have a choice.  <br/><br/>You need to gain the majority’s attention to achieve cybersecurity training penetration. To do that, you need to aim for your innovators and early adopters because most will not try something new if someone else hasn’t tried it. <br/><br/>You need to understand your audience.<br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565574-protect-awareness-and-training.mp3" length="3759676" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rw5tarn06ntorkiz2hwxtxxzm5af?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858137</guid>
    <pubDate>Thu, 22 Dec 2022 05:00:00 -0500</pubDate>
    <itunes:duration>308</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>49</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Education</itunes:title>
    <title>Education</title>
    <itunes:summary><![CDATA[Send us Fan Mail         The problem educational narrative about “college” has created a false dichotomy between the two well-discussed college purposes. Some say college is about preparing a person for work – to help them get better employment or career. The other camp says college is about preparing an individual for success in life. Many of us see the purpose of college as both a job-driven and a career-driven purpose. However, our conversation is incredibly stuck in the either/or debate o...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The problem educational narrative about “college” has created a false dichotomy between the two well-discussed college purposes. Some say college is about preparing a person for work – to help them get better employment or career. The other camp says college is about preparing an individual for success in life. Many of us see the purpose of college as both a job-driven and a career-driven purpose. However, our conversation is incredibly stuck in the either/or debate on these two beliefs.<br/><br/>“Don’t let schooling interfere with your education”- Mark Twain.<br/><br/>The other discussion is the never-ending comparison between college degrees and certifications; similar to the purpose of college; this discussion seems endless. Several other variables are not considered or at least not openly discussed when this topic is brought up. <br/><br/>The bottom line, it depends on the stage of your life at the moment, what career you are pursuing, and various other factors that affect this decision. The only wrong decision is not seeking education. <br/><br/></p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p><br/></p><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The problem educational narrative about “college” has created a false dichotomy between the two well-discussed college purposes. Some say college is about preparing a person for work – to help them get better employment or career. The other camp says college is about preparing an individual for success in life. Many of us see the purpose of college as both a job-driven and a career-driven purpose. However, our conversation is incredibly stuck in the either/or debate on these two beliefs.<br/><br/>“Don’t let schooling interfere with your education”- Mark Twain.<br/><br/>The other discussion is the never-ending comparison between college degrees and certifications; similar to the purpose of college; this discussion seems endless. Several other variables are not considered or at least not openly discussed when this topic is brought up. <br/><br/>The bottom line, it depends on the stage of your life at the moment, what career you are pursuing, and various other factors that affect this decision. The only wrong decision is not seeking education. <br/><br/></p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p><br/></p><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565575-education.mp3" length="4047023" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ofawlq79ymn6690nbwh3tdwz398t?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858138</guid>
    <pubDate>Thu, 15 Dec 2022 05:00:00 -0500</pubDate>
    <itunes:duration>332</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>48</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Addressing the Highest Risks Podcast</itunes:title>
    <title>Addressing the Highest Risks Podcast</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Addressing the Highest Risks  As we conclude the risk assessment and governance process, the last part will deal with the organization's highest risks, not the highest vulnerability, but rather the highest risks. This work could take the form of desktop exercises or brainstorming sessions. NIST cover this effort in the subcategory ID.RA-6 “Risk responses are identified and prioritized.”   The process NIST lays out are: Implement a process to ensure the security p...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Addressing the Highest Risks<br/><br/>As we conclude the risk assessment and governance process, the last part will deal with the organization&apos;s highest risks, not the highest vulnerability, but rather the highest risks. This work could take the form of desktop exercises or brainstorming sessions. NIST cover this effort in the subcategory ID.RA-6 “Risk responses are identified and prioritized.” <br/><br/>The process NIST lays out are:</p><ul><li>Implement a process to ensure the security program&apos;s plan of action and milestones (POA&amp;M) are developed and maintained and that remediation plans are appropriate for the type of risk. </li><li>Review the POA&amp;M for consistency with the organization’s risk management strategy.</li></ul><p><br/>Make sure each action in this process has an owner assigned, and each action is viewed from an organizational perspective. When running scenario-based testing, make sure that representatives from each affected business area are involved in the exercise to ensure a common understanding. <br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Addressing the Highest Risks<br/><br/>As we conclude the risk assessment and governance process, the last part will deal with the organization&apos;s highest risks, not the highest vulnerability, but rather the highest risks. This work could take the form of desktop exercises or brainstorming sessions. NIST cover this effort in the subcategory ID.RA-6 “Risk responses are identified and prioritized.” <br/><br/>The process NIST lays out are:</p><ul><li>Implement a process to ensure the security program&apos;s plan of action and milestones (POA&amp;M) are developed and maintained and that remediation plans are appropriate for the type of risk. </li><li>Review the POA&amp;M for consistency with the organization’s risk management strategy.</li></ul><p><br/>Make sure each action in this process has an owner assigned, and each action is viewed from an organizational perspective. When running scenario-based testing, make sure that representatives from each affected business area are involved in the exercise to ensure a common understanding. <br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565576-addressing-the-highest-risks-podcast.mp3" length="3897333" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i5lc9eypx2ce3a3jesyytnct77x5?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858139</guid>
    <pubDate>Thu, 08 Dec 2022 05:00:00 -0500</pubDate>
    <itunes:duration>320</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>47</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk Assessment</itunes:title>
    <title>Cybersecurity Risk Assessment</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Cybersecurity Risk Assessment  Risk assessment is not necessarily scanning your network aimlessly; what should you expect from your team? First and foremost, adopt a risk assessment framework; it will be a helpful guide for determining what is assessed, who needs to be involved, and the criteria for developing risk criteria.   Some of the frameworks you should consider are: OCTAVE from Carnegie Mellon University NIST 800-30 Guide for Conducting Risk Assessments I...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cybersecurity Risk Assessment<br/><br/>Risk assessment is not necessarily scanning your network aimlessly; what should you expect from your team? First and foremost, adopt a risk assessment framework; it will be a helpful guide for determining what is assessed, who needs to be involved, and the criteria for developing risk criteria. <br/><br/>Some of the frameworks you should consider are:<br/>OCTAVE from Carnegie Mellon University<br/>NIST 800-30 Guide for Conducting Risk Assessments<br/>ISO 27005:2011 or the latest version<br/><br/>Identifying vulnerabilities in your organization is a fundamental first step of this process. It aligns with the NIST CSF subcategory ID.RA-1 Asset vulnerabilities are identified and documented. Also, ensure that you have qualified staff managing, operating, and overseeing the vulnerability management program trained in all the automated tools and methodologies to identify vulnerabilities. <br/><br/>The next step will be for your team to identify the threats to your organization, both internal and external. This activity aligns with NIST CSF ID.RA-3 “Threats, both internal and external, are identified and documented.” Your team won’t be able to protect the organization against every threat, so identifying the most critical threats against your organization is crucial for your cybersecurity strategy.<br/><br/>Remember, you may find vulnerabilities without an active or published exploit; therefore, it is up to you and your team to prioritize accordingly, which takes to NIST CSF ID.RA-5 “Threats, vulnerabilities, likelyhoods, and impacts are used to determine risk.” Now that you know the vulnerabilities and threats you face and the likelihood, focus on the vulnerabilities with the highest risk to your critical cyber assets. <br/> <br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cybersecurity Risk Assessment<br/><br/>Risk assessment is not necessarily scanning your network aimlessly; what should you expect from your team? First and foremost, adopt a risk assessment framework; it will be a helpful guide for determining what is assessed, who needs to be involved, and the criteria for developing risk criteria. <br/><br/>Some of the frameworks you should consider are:<br/>OCTAVE from Carnegie Mellon University<br/>NIST 800-30 Guide for Conducting Risk Assessments<br/>ISO 27005:2011 or the latest version<br/><br/>Identifying vulnerabilities in your organization is a fundamental first step of this process. It aligns with the NIST CSF subcategory ID.RA-1 Asset vulnerabilities are identified and documented. Also, ensure that you have qualified staff managing, operating, and overseeing the vulnerability management program trained in all the automated tools and methodologies to identify vulnerabilities. <br/><br/>The next step will be for your team to identify the threats to your organization, both internal and external. This activity aligns with NIST CSF ID.RA-3 “Threats, both internal and external, are identified and documented.” Your team won’t be able to protect the organization against every threat, so identifying the most critical threats against your organization is crucial for your cybersecurity strategy.<br/><br/>Remember, you may find vulnerabilities without an active or published exploit; therefore, it is up to you and your team to prioritize accordingly, which takes to NIST CSF ID.RA-5 “Threats, vulnerabilities, likelyhoods, and impacts are used to determine risk.” Now that you know the vulnerabilities and threats you face and the likelihood, focus on the vulnerabilities with the highest risk to your critical cyber assets. <br/> <br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565577-cybersecurity-risk-assessment.mp3" length="4269013" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qwrhuwe5f883gfwv7lzd0h2yn2xl?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858140</guid>
    <pubDate>Thu, 01 Dec 2022 05:00:00 -0500</pubDate>
    <itunes:duration>351</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>46</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Governance</itunes:title>
    <title>Cybersecurity Governance</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Cybersecurity Governance  Once you have your hardware and software inventories, the next step might not be obvious. Still, before performing a risk assessment, you’ll need to establish a governance structure to report risk and regulatory, legal, and operational requirements.  This particular governance requirement is covered in the NIST CSF subcategory ID.GV-4 “governance and risk management processes address cybersecurity risk.”  As cybersecurity risk continues to es...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cybersecurity Governance<br/><br/>Once you have your hardware and software inventories, the next step might not be obvious. Still, before performing a risk assessment, you’ll need to establish a governance structure to report risk and regulatory, legal, and operational requirements.<br/><br/>This particular governance requirement is covered in the NIST CSF subcategory ID.GV-4 “governance and risk management processes address cybersecurity risk.”<br/><br/>As cybersecurity risk continues to escalate to the board of directors and C-suite level executives for managing cyber threats by shareholders and other stakeholders, a reporting structure needs to be in place. Regardless of your company’s size, developing and implementing a system for informing top decision-makers of cybersecurity risks will likely play an ever-more important role in your role as a cybersecurity executive.<br/><br/>Depending on the size of your organization, this can be accomplished in several different ways; here are two approaches: <br/>Internal governance committees comprise cybersecurity, IT, and business area executives.<br/>An internal or external information risk steering committee that reports the risk program’s strategic direction. <br/><br/>Even if your organization is small and you outsource your cybersecurity to a vendor, you still require cybersecurity governance that keeps top management informed about the risk profile.<br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cybersecurity Governance<br/><br/>Once you have your hardware and software inventories, the next step might not be obvious. Still, before performing a risk assessment, you’ll need to establish a governance structure to report risk and regulatory, legal, and operational requirements.<br/><br/>This particular governance requirement is covered in the NIST CSF subcategory ID.GV-4 “governance and risk management processes address cybersecurity risk.”<br/><br/>As cybersecurity risk continues to escalate to the board of directors and C-suite level executives for managing cyber threats by shareholders and other stakeholders, a reporting structure needs to be in place. Regardless of your company’s size, developing and implementing a system for informing top decision-makers of cybersecurity risks will likely play an ever-more important role in your role as a cybersecurity executive.<br/><br/>Depending on the size of your organization, this can be accomplished in several different ways; here are two approaches: <br/>Internal governance committees comprise cybersecurity, IT, and business area executives.<br/>An internal or external information risk steering committee that reports the risk program’s strategic direction. <br/><br/>Even if your organization is small and you outsource your cybersecurity to a vendor, you still require cybersecurity governance that keeps top management informed about the risk profile.<br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565578-cybersecurity-governance.mp3" length="2535271" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6hwfe92hj1m99738yn5d67kz89of?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858141</guid>
    <pubDate>Thu, 24 Nov 2022 05:00:00 -0500</pubDate>
    <itunes:duration>206</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>45</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk Management - Software Platforms</itunes:title>
    <title>Cybersecurity Risk Management - Software Platforms</title>
    <itunes:summary><![CDATA[Send us Fan Mail         The NIST CSF subcategory ID.AM-2 deals with the inventory of software platforms and applications used in your organization. Most organizations will that creating an inventory of software to be a bit more challenging than creating one for hardware.   When developing the inventory, make sure to take a holistic view of your organization’s operations and functions to build a comprehensive list of the software used in each line of operations.   Similar to the approach used...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The NIST CSF subcategory ID.AM-2 deals with the inventory of software platforms and applications used in your organization. Most organizations will that creating an inventory of software to be a bit more challenging than creating one for hardware. <br/><br/>When developing the inventory, make sure to take a holistic view of your organization’s operations and functions to build a comprehensive list of the software used in each line of operations. <br/><br/>Similar to the approach used for hardware, automation will play a critical role in the software inventory. Running vulnerability management or scanning software should provide visibility into each scanned system&apos;s software. <br/><br/>A recommended inventory management approach would be to keep the hardware inventory and software inventory in a single location or file to facilitate the identification of critical issues if they arise. <br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The NIST CSF subcategory ID.AM-2 deals with the inventory of software platforms and applications used in your organization. Most organizations will that creating an inventory of software to be a bit more challenging than creating one for hardware. <br/><br/>When developing the inventory, make sure to take a holistic view of your organization’s operations and functions to build a comprehensive list of the software used in each line of operations. <br/><br/>Similar to the approach used for hardware, automation will play a critical role in the software inventory. Running vulnerability management or scanning software should provide visibility into each scanned system&apos;s software. <br/><br/>A recommended inventory management approach would be to keep the hardware inventory and software inventory in a single location or file to facilitate the identification of critical issues if they arise. <br/><br/>========<br/><br/>*** FREE GUIDE ***<br/>https://www.execcybered.com/asset-management<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565579-cybersecurity-risk-management-software-platforms.mp3" length="2876489" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5udbi6g6oir4kxgm2wueaqk2wzk3?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858142</guid>
    <pubDate>Thu, 17 Nov 2022 05:00:00 -0500</pubDate>
    <itunes:duration>235</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>44</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk Management - Physical Devices</itunes:title>
    <title>Cybersecurity Risk Management - Physical Devices</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Cybersecurity Risk Management - Physical Devices  The risk management process entails four fundamental concepts, which can be further broken down; however, the fundamental concepts are:   Frame risk Assess risk Respond to risk once determined Monitor risk on an ongoing basis  However, before getting here, other fundamental steps must be in place, and one that I have discussed here in the past has been asset management. Today I want to give you a bit more detail on thi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cybersecurity Risk Management - Physical Devices<br/><br/>The risk management process entails four fundamental concepts, which can be further broken down; however, the fundamental concepts are: <br/><br/>Frame risk<br/>Assess risk<br/>Respond to risk once determined<br/>Monitor risk on an ongoing basis<br/><br/>However, before getting here, other fundamental steps must be in place, and one that I have discussed here in the past has been asset management. Today I want to give you a bit more detail on this process. <br/><br/>First, inventory every physical device and system you have and keep an inventory of them; this is one of the most important yet least practiced cybersecurity tasks conducted worldwide. Small and mid-sized businesses can start with a simple Excel or Google spreadsheet, while larger organizations can leverage a configuration management database (CMDB). <br/><br/>The approach can be as simple as brainstorming with your team a list of system types, such as:<br/><br/>End-user devices: laptops and phones<br/>Servers: virtuals and physical servers<br/>Cloud platforms: SaaS, PaaS, and IaaS<br/><br/>You should tie the software inventory into the hardware asset inventory where possible. Make sure to include critical information, such as:<br/><br/>Network address<br/>Hardware address<br/>Machine name<br/>Data asset owner<br/>Department<br/><br/>Along with the traditional IT devices, consider as part of your team brainstorming devices such as VoIP phones, printers, HVAC systems, and any IoT devices connected to the network that could become an attack vector. <br/><br/>Detection of new authorized and unauthorized devices is critical for the program; therefore, some automation is necessary, which will vary depending on the size of your organization. It can be as simple as monitoring the DHCP server for IP assigning or systems that can scan the network and monitor it on a 24/7 basis or at periodic intervals determined by your organization. <br/><br/>========<br/><br/>* FREE GUIDE *<br/><a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqblhuaDlhQ0RNenZuMU5UN0xnOERTbjRHNHpoZ3xBQ3Jtc0tsc1pQVnU2OG9EYnhyTEg4aXhMalJDeVB2cnFZbmZYWDNoOWpFT2owcVduTENXb3lNZWJHcjVKXzN0ekpzMnVZTGdlQlVjaXpyZWpCZjZ5LVF4cTYxcm41X3RsTmppN2xXU0FXYnFGQXdDQ1prd2ZsTQ&amp;q=https%3A%2F%2Fwww.execcybered.com%2Fasset-management&amp;v=-W4-yLXKj-Y'>https://www.execcybered.com/asset-man...</a><br/><br/>Blog: <a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjFyUS1BemdndkY3N0F5bWVPRXJuRDVyQm9BUXxBQ3Jtc0trZEstOF8tbFBlOTBQNW5KdGo5ZHd4QXNjZS1pSmIwVE5XLUFXenhobGJpLUNmeGstV1U1UVdPNFdvSVpvQVdncFFRUkxiaEcxQ201cFVyRHJPdTV2cnNMS1ZRZGF1QVJGRHBJUG5KS3NsYWhiR3lJYw&amp;q=https%3A%2F%2Fwww.execcybered.com%2Fblog&amp;v=-W4-yLXKj-Y'>https://www.execcybered.com/blog</a><br/>Training: <a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXhqckNaVmpLNnh5WGVjRjFYaHdXUlZmSHNfZ3xBQ3Jtc0ttOGFVWWZ2bjhMQzBoZ2VKYklMX3VUbXlDOGREdlV4dlVqLW4xVFZYN0ZXcnJFNUVvaVFyMGdTdW5VdTM1YnNnUFByVVFnZTZKdmhLNUdkX0lsOWs3NkxGR1ZLWVl6Qlk0REw3Q2FpdFNseWEyeW9abw&amp;q=https%3A%2F%2Fwww.execcybered.com%2Fiso27001foundationcourse&amp;v=-W4-yLXKj-Y'>https://www.execcybered.com/iso27001f...</a><br/>Linkedin: <a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWxFNmhwNlZXeGpmVE5yWUltV19XUTdOVERMUXxBQ3Jtc0trVmNWc05OV21zR2dMT1dZa1FsLUJLZG9hZ2VRc0dWUXhTX3A5aVZBNTB2Vlozc1ZMTUdsbWdiNzhQUGtEQW5RNjhWcDBWRjR4SkJPSC1KV2UzaG4ydU5mSER6ZzZ6ckpfbVdWNUVJNlVZaXhMRzdaRQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fexceccybered%2F&amp;v=-W4-yLXKj-Y'>https://www.linkedin.com/company/exce...</a><br/>Twitter: <a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbGp0aF9ldndqUGluckRDaHhjYU1pa0NyNHo1d3xBQ3Jtc0trVWhKMXYxaHYzTGxjUzh0cnJvUV9HdHRPdGhyYjUxX21MNVR0em0zdk5ZZm4tOVNXUkN5aTUyYmNXeWpYcDFsM2hGM0g4TFBTX09VeERVclNYTlR0eUpNeExmVVZzbTNITEdmTXhZQTI0MWFCamZkQQ&amp;q=https%3A&lt;/truncato-artificial-root&gt;'></a></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cybersecurity Risk Management - Physical Devices<br/><br/>The risk management process entails four fundamental concepts, which can be further broken down; however, the fundamental concepts are: <br/><br/>Frame risk<br/>Assess risk<br/>Respond to risk once determined<br/>Monitor risk on an ongoing basis<br/><br/>However, before getting here, other fundamental steps must be in place, and one that I have discussed here in the past has been asset management. Today I want to give you a bit more detail on this process. <br/><br/>First, inventory every physical device and system you have and keep an inventory of them; this is one of the most important yet least practiced cybersecurity tasks conducted worldwide. Small and mid-sized businesses can start with a simple Excel or Google spreadsheet, while larger organizations can leverage a configuration management database (CMDB). <br/><br/>The approach can be as simple as brainstorming with your team a list of system types, such as:<br/><br/>End-user devices: laptops and phones<br/>Servers: virtuals and physical servers<br/>Cloud platforms: SaaS, PaaS, and IaaS<br/><br/>You should tie the software inventory into the hardware asset inventory where possible. Make sure to include critical information, such as:<br/><br/>Network address<br/>Hardware address<br/>Machine name<br/>Data asset owner<br/>Department<br/><br/>Along with the traditional IT devices, consider as part of your team brainstorming devices such as VoIP phones, printers, HVAC systems, and any IoT devices connected to the network that could become an attack vector. <br/><br/>Detection of new authorized and unauthorized devices is critical for the program; therefore, some automation is necessary, which will vary depending on the size of your organization. It can be as simple as monitoring the DHCP server for IP assigning or systems that can scan the network and monitor it on a 24/7 basis or at periodic intervals determined by your organization. <br/><br/>========<br/><br/>* FREE GUIDE *<br/><a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqblhuaDlhQ0RNenZuMU5UN0xnOERTbjRHNHpoZ3xBQ3Jtc0tsc1pQVnU2OG9EYnhyTEg4aXhMalJDeVB2cnFZbmZYWDNoOWpFT2owcVduTENXb3lNZWJHcjVKXzN0ekpzMnVZTGdlQlVjaXpyZWpCZjZ5LVF4cTYxcm41X3RsTmppN2xXU0FXYnFGQXdDQ1prd2ZsTQ&amp;q=https%3A%2F%2Fwww.execcybered.com%2Fasset-management&amp;v=-W4-yLXKj-Y'>https://www.execcybered.com/asset-man...</a><br/><br/>Blog: <a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjFyUS1BemdndkY3N0F5bWVPRXJuRDVyQm9BUXxBQ3Jtc0trZEstOF8tbFBlOTBQNW5KdGo5ZHd4QXNjZS1pSmIwVE5XLUFXenhobGJpLUNmeGstV1U1UVdPNFdvSVpvQVdncFFRUkxiaEcxQ201cFVyRHJPdTV2cnNMS1ZRZGF1QVJGRHBJUG5KS3NsYWhiR3lJYw&amp;q=https%3A%2F%2Fwww.execcybered.com%2Fblog&amp;v=-W4-yLXKj-Y'>https://www.execcybered.com/blog</a><br/>Training: <a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXhqckNaVmpLNnh5WGVjRjFYaHdXUlZmSHNfZ3xBQ3Jtc0ttOGFVWWZ2bjhMQzBoZ2VKYklMX3VUbXlDOGREdlV4dlVqLW4xVFZYN0ZXcnJFNUVvaVFyMGdTdW5VdTM1YnNnUFByVVFnZTZKdmhLNUdkX0lsOWs3NkxGR1ZLWVl6Qlk0REw3Q2FpdFNseWEyeW9abw&amp;q=https%3A%2F%2Fwww.execcybered.com%2Fiso27001foundationcourse&amp;v=-W4-yLXKj-Y'>https://www.execcybered.com/iso27001f...</a><br/>Linkedin: <a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWxFNmhwNlZXeGpmVE5yWUltV19XUTdOVERMUXxBQ3Jtc0trVmNWc05OV21zR2dMT1dZa1FsLUJLZG9hZ2VRc0dWUXhTX3A5aVZBNTB2Vlozc1ZMTUdsbWdiNzhQUGtEQW5RNjhWcDBWRjR4SkJPSC1KV2UzaG4ydU5mSER6ZzZ6ckpfbVdWNUVJNlVZaXhMRzdaRQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fexceccybered%2F&amp;v=-W4-yLXKj-Y'>https://www.linkedin.com/company/exce...</a><br/>Twitter: <a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbGp0aF9ldndqUGluckRDaHhjYU1pa0NyNHo1d3xBQ3Jtc0trVWhKMXYxaHYzTGxjUzh0cnJvUV9HdHRPdGhyYjUxX21MNVR0em0zdk5ZZm4tOVNXUkN5aTUyYmNXeWpYcDFsM2hGM0g4TFBTX09VeERVclNYTlR0eUpNeExmVVZzbTNITEdmTXhZQTI0MWFCamZkQQ&amp;q=https%3A&lt;/truncato-artificial-root&gt;'></a></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565580-cybersecurity-risk-management-physical-devices.mp3" length="4911363" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zlnwfb7xonewju123w3sum2gdjm8?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858143</guid>
    <pubDate>Thu, 10 Nov 2022 05:00:00 -0500</pubDate>
    <itunes:duration>404</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>43</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Questions Boards Should Ask</itunes:title>
    <title>Questions Boards Should Ask</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Questions Boards Should Ask The challenge for directors or investors is determining the organizational overall cybersecurity maturity relative to the risk. The board of directors, in particular, has an oversight problem to solve, not a management problem.  To quickly explore organizational thinking and cybersecurity management, here are five questions to get the discussion started in the effort to provide oversight and due diligence.  *** FREE GUIDE *** https://www.ex...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Questions Boards Should Ask<br/>The challenge for directors or investors is determining the organizational overall cybersecurity maturity relative to the risk. The board of directors, in particular, has an oversight problem to solve, not a management problem.<br/><br/>To quickly explore organizational thinking and cybersecurity management, here are five questions to get the discussion started in the effort to provide oversight and due diligence.<br/><br/>*** FREE GUIDE ***</p><p><a href='https://www.execcybered.com/asset-management'>https://www.execcybered.com/asset-management</a></p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Questions Boards Should Ask<br/>The challenge for directors or investors is determining the organizational overall cybersecurity maturity relative to the risk. The board of directors, in particular, has an oversight problem to solve, not a management problem.<br/><br/>To quickly explore organizational thinking and cybersecurity management, here are five questions to get the discussion started in the effort to provide oversight and due diligence.<br/><br/>*** FREE GUIDE ***</p><p><a href='https://www.execcybered.com/asset-management'>https://www.execcybered.com/asset-management</a></p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li><li>Youtube: <a href='https://bit.ly/3BGOtPA'>https://bit.ly/3BGOtPA</a></li></ul><p>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565581-questions-boards-should-ask.mp3" length="3806797" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o5eifwugh8wu1f7eg0czq59e5het?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858144</guid>
    <pubDate>Thu, 03 Nov 2022 05:00:00 -0400</pubDate>
    <itunes:duration>312</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>42</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Confidence vs Performance</itunes:title>
    <title>Cybersecurity Confidence vs Performance</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Cybersecurity Confidence vs. Performance  Several studies conducted in other fields showed how spending effort on analysis improved confidence even when the actual performance was not improved.  A study by the University of Chicago in 2008 tracked the probability of outcomes of sporting events as assigned by participants. These participants were given varying amounts of information about the teams, except the team’s name or players. As fans were given more information...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cybersecurity Confidence vs. Performance<br/><br/>Several studies conducted in other fields showed how spending effort on analysis improved confidence even when the actual performance was not improved. <br/>A study by the University of Chicago in 2008 tracked the probability of outcomes of sporting events as assigned by participants. These participants were given varying amounts of information about the teams, except the team’s name or players. As fans were given more information, their confidence in picking the winner increased, despite the chance of picking the winner remaining nearly flat no matter how much information was provided.<br/><br/>Imagine how many metrics and measures we have in cybersecurity; is your confidence level increasing or your performance on the outcome? <br/><br/>Don’t be so quick to accept metrics and measures labeled “best practices;” best practice does not mean it was measured and scientifically proven to be the best performer among a set of practices. <br/><br/>Focus on reducing risk; are your metrics and measures driving a reduction in risk to the company&apos;s mission? <br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cybersecurity Confidence vs. Performance<br/><br/>Several studies conducted in other fields showed how spending effort on analysis improved confidence even when the actual performance was not improved. <br/>A study by the University of Chicago in 2008 tracked the probability of outcomes of sporting events as assigned by participants. These participants were given varying amounts of information about the teams, except the team’s name or players. As fans were given more information, their confidence in picking the winner increased, despite the chance of picking the winner remaining nearly flat no matter how much information was provided.<br/><br/>Imagine how many metrics and measures we have in cybersecurity; is your confidence level increasing or your performance on the outcome? <br/><br/>Don’t be so quick to accept metrics and measures labeled “best practices;” best practice does not mean it was measured and scientifically proven to be the best performer among a set of practices. <br/><br/>Focus on reducing risk; are your metrics and measures driving a reduction in risk to the company&apos;s mission? <br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/>Youtube: https://bit.ly/3BGOtPA<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565582-cybersecurity-confidence-vs-performance.mp3" length="2560570" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/e2wpa1b9vu5u08fk5pjoyuoy19gw?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858145</guid>
    <pubDate>Thu, 27 Oct 2022 05:00:00 -0400</pubDate>
    <itunes:duration>210</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The MOST Important Cybersecurity Principle</itunes:title>
    <title>The MOST Important Cybersecurity Principle</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Asset management is most commonly associated with cybersecurity hygiene, which is associated with patching, anti-virus, access control, and other asset-specific protections. However, there are three NIST CSF sub-categories that I want to bring to your attention and how they align with a mission-based cybersecurity risk program.   ID.AM-1: Physical devices and systems within the organization are inventoried. ID.AM-2: Software platforms and applications within the organ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Asset management is most commonly associated with cybersecurity hygiene, which is associated with patching, anti-virus, access control, and other asset-specific protections. However, there are three NIST CSF sub-categories that I want to bring to your attention and how they align with a mission-based cybersecurity risk program. <br/><br/>ID.AM-1: Physical devices and systems within the organization are inventoried.<br/>ID.AM-2: Software platforms and applications within the organization are inventoried.<br/>ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value.<br/><br/>These three sub-categories are the foundation of your organization&apos;s cybersecurity program, specifically, your cybersecurity risk program. <br/>Some factors to keep in mind when developing a priority methodology:<br/><br/></p><ul><li>The role the asset plays in generating revenue</li><li>The asset&apos;s importance to ongoing operations</li><li>The asset&apos;s cost to replace or protect</li><li>The reputation or legal damage the asset would cause if compromised.</li></ul><p><br/>Bottom line, the methodology decision will be up to every organization; however, be consistent in your assessment and prioritization. <br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Asset management is most commonly associated with cybersecurity hygiene, which is associated with patching, anti-virus, access control, and other asset-specific protections. However, there are three NIST CSF sub-categories that I want to bring to your attention and how they align with a mission-based cybersecurity risk program. <br/><br/>ID.AM-1: Physical devices and systems within the organization are inventoried.<br/>ID.AM-2: Software platforms and applications within the organization are inventoried.<br/>ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value.<br/><br/>These three sub-categories are the foundation of your organization&apos;s cybersecurity program, specifically, your cybersecurity risk program. <br/>Some factors to keep in mind when developing a priority methodology:<br/><br/></p><ul><li>The role the asset plays in generating revenue</li><li>The asset&apos;s importance to ongoing operations</li><li>The asset&apos;s cost to replace or protect</li><li>The reputation or legal damage the asset would cause if compromised.</li></ul><p><br/>Bottom line, the methodology decision will be up to every organization; however, be consistent in your assessment and prioritization. <br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565583-the-most-important-cybersecurity-principle.mp3" length="4882443" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qypref83om2x6ny2ubffpobd498v?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858146</guid>
    <pubDate>Thu, 20 Oct 2022 00:00:00 -0400</pubDate>
    <itunes:duration>403</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 Focus Areas - Third-Party Risk Measurements</itunes:title>
    <title>5 Focus Areas - Third-Party Risk Measurements</title>
    <itunes:summary><![CDATA[Send us Fan Mail         There are two types of third-party risk: product vendors and service providers. Product vendors outsource software, platform, and infrastructure, known as SaaS, PaaS, and IaaS. According to some estimates, only 40% of applications are hosted on-premises.  The service providers are consulting third-party vendors, such as management consultants, IT consultants, Cybersecurity consultants, and managed service consultants. However, regardless of the type of third-party ven...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are two types of third-party risk: product vendors and service providers. Product vendors outsource software, platform, and infrastructure, known as SaaS, PaaS, and IaaS. According to some estimates, only 40% of applications are hosted on-premises.<br/><br/>The service providers are consulting third-party vendors, such as management consultants, IT consultants, Cybersecurity consultants, and managed service consultants. However, regardless of the type of third-party vendor, these are the five focus areas your third-party risk management program should focus on:<br/><br/></p><ol><li>Data access: who has access to your data? What kind of data is it? How is it stored? This is a confidentiality issue. Reviewing and discussing your providers&apos; policy,  procedures, and contractual language is essential. This is an area you should involve your legal team. </li><li>Security program transparency: where is the data center? What are physical controls in place? Make sure these questions are asked and, if possible, validated to a degree, such as by a third-party assessor. </li><li>Location of data regulation: most providers do not disclose where their data centers are, and that becomes a challenge if your data has a regulation regarding the location of the data. Two examples are that Israeli banking data can’t be stored outside of Israel; similarly, the Federal Information Security Management Act (FISMA) requires that customer data be kept within the United States. </li><li>Privacy policies: Ensure the provider’s privacy policy aligns with your organization’s privacy policies. </li><li>Disaster recovery: how do the providers handle disaster recovery from an outage to a compromise? </li></ol><p><br/>These 5 focus areas should be embedded into your cybersecurity assessment and be addressed in your analysis and conclusion of any assessed vendor. <br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are two types of third-party risk: product vendors and service providers. Product vendors outsource software, platform, and infrastructure, known as SaaS, PaaS, and IaaS. According to some estimates, only 40% of applications are hosted on-premises.<br/><br/>The service providers are consulting third-party vendors, such as management consultants, IT consultants, Cybersecurity consultants, and managed service consultants. However, regardless of the type of third-party vendor, these are the five focus areas your third-party risk management program should focus on:<br/><br/></p><ol><li>Data access: who has access to your data? What kind of data is it? How is it stored? This is a confidentiality issue. Reviewing and discussing your providers&apos; policy,  procedures, and contractual language is essential. This is an area you should involve your legal team. </li><li>Security program transparency: where is the data center? What are physical controls in place? Make sure these questions are asked and, if possible, validated to a degree, such as by a third-party assessor. </li><li>Location of data regulation: most providers do not disclose where their data centers are, and that becomes a challenge if your data has a regulation regarding the location of the data. Two examples are that Israeli banking data can’t be stored outside of Israel; similarly, the Federal Information Security Management Act (FISMA) requires that customer data be kept within the United States. </li><li>Privacy policies: Ensure the provider’s privacy policy aligns with your organization’s privacy policies. </li><li>Disaster recovery: how do the providers handle disaster recovery from an outage to a compromise? </li></ol><p><br/>These 5 focus areas should be embedded into your cybersecurity assessment and be addressed in your analysis and conclusion of any assessed vendor. <br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565584-5-focus-areas-third-party-risk-measurements.mp3" length="3466185" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/l5su3m2s5d7ko5ct68hflhfhe2jf?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858147</guid>
    <pubDate>Thu, 13 Oct 2022 00:00:00 -0400</pubDate>
    <itunes:duration>283</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 Must-Have Cybersecurity Strategies for Small Businesses</itunes:title>
    <title>5 Must-Have Cybersecurity Strategies for Small Businesses</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Cyber attacks targetting small businesses that often do not have the resources to defend against devastating attacks like ransomware have grown. As a small business CEO or CIO, you have likely come across outdated security advice that does not help prevent the most common attacks. The security landscape has changed, and your cybersecurity knowledge needs to evolve with it. Here are 5 tips to get you started:  Establish a culture of [cyber] security  Talk about cyberse...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cyber attacks targetting small businesses that often do not have the resources to defend against devastating attacks like ransomware have grown. As a small business CEO or CIO, you have likely come across outdated security advice that does not help prevent the most common attacks. The security landscape has changed, and your cybersecurity knowledge needs to evolve with it. Here are 5 tips to get you started:<br/><br/>Establish a culture of [cyber] security <br/>Talk about cybersecurity to leadership and staff, communicate cybersecurity program initiatives in your regular communications, and set measurable quarterly cybersecurity goals are just a few examples.<br/><br/>Hire a vCISO or part-time CISO <br/>Due to the ever-changing nature of the cybersecurity threat environment, consider having a part-time CISO (vCISO) on a retainer to assist your organization with all cybersecurity initiatives. A vCISO can lead your staff in developing DRP, IRP, Acceptable Use Policy, Cybersecurity Policy, Remote Access requirements, etc.<br/><br/>Develop and implement an incident response plan (IRP)<br/>An incident response plan (IRP) has different objectives depending on the author; if the authoring source is IT, the IRP will focus on service restoration; however, investigating a cyber incident and potentially a forensic investigation will be a cybersecurity function, where a vCISO could assist your organization.<br/><br/>Perform regular tabletop exercises<br/>Regular simulation exercises, such as tabletop exercises, will condition your team to respond appropriately to incidents.<br/><br/>Support IT Leaders<br/>There are places where the support of a vCISO, CIO, and CEO is critical, especially when a good cybersecurity program will require the help of every staff member in your organization. For example, don’t rely on the IT team to persuade busy employees to use Multi-Factor Authentication (MFA); instead, have your vCISO or CEO make the announcement.<br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Cyber attacks targetting small businesses that often do not have the resources to defend against devastating attacks like ransomware have grown. As a small business CEO or CIO, you have likely come across outdated security advice that does not help prevent the most common attacks. The security landscape has changed, and your cybersecurity knowledge needs to evolve with it. Here are 5 tips to get you started:<br/><br/>Establish a culture of [cyber] security <br/>Talk about cybersecurity to leadership and staff, communicate cybersecurity program initiatives in your regular communications, and set measurable quarterly cybersecurity goals are just a few examples.<br/><br/>Hire a vCISO or part-time CISO <br/>Due to the ever-changing nature of the cybersecurity threat environment, consider having a part-time CISO (vCISO) on a retainer to assist your organization with all cybersecurity initiatives. A vCISO can lead your staff in developing DRP, IRP, Acceptable Use Policy, Cybersecurity Policy, Remote Access requirements, etc.<br/><br/>Develop and implement an incident response plan (IRP)<br/>An incident response plan (IRP) has different objectives depending on the author; if the authoring source is IT, the IRP will focus on service restoration; however, investigating a cyber incident and potentially a forensic investigation will be a cybersecurity function, where a vCISO could assist your organization.<br/><br/>Perform regular tabletop exercises<br/>Regular simulation exercises, such as tabletop exercises, will condition your team to respond appropriately to incidents.<br/><br/>Support IT Leaders<br/>There are places where the support of a vCISO, CIO, and CEO is critical, especially when a good cybersecurity program will require the help of every staff member in your organization. For example, don’t rely on the IT team to persuade busy employees to use Multi-Factor Authentication (MFA); instead, have your vCISO or CEO make the announcement.<br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565585-5-must-have-cybersecurity-strategies-for-small-businesses.mp3" length="3238368" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/re13til2j7nm0yens4zwwkuekxqu?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858148</guid>
    <pubDate>Thu, 06 Oct 2022 00:00:00 -0400</pubDate>
    <itunes:duration>264</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Third-Party Risk Management</itunes:title>
    <title>Third-Party Risk Management</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Third-Party Risk Management  The third-party outsourcing trend will continue to grow in the coming years, which places third-party risk as a significant concern for organizations, large or small. Depending on which statistics you read, 39-63% of breaches are caused by third parties. One of the most notorious breaches is the case of Target, where the HVAC vendor’s credential was stolen, resulting in the retailer's breach of 40 million credit and debit card numbers and ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Third-Party Risk Management<br/><br/>The third-party outsourcing trend will continue to grow in the coming years, which places third-party risk as a significant concern for organizations, large or small. Depending on which statistics you read, 39-63% of breaches are caused by third parties. One of the most notorious breaches is the case of Target, where the HVAC vendor’s credential was stolen, resulting in the retailer&apos;s breach of 40 million credit and debit card numbers and 70 million records of personal information stolen. <br/><br/>How you manage this risk vector is the inspiration of several books and articles; however, it will all start in the contract and what you were able to negotiate upfront; then a mixed methodology assessment, where you use qualitative and quantitative elements to assess the vendor based on industry-accepted standards, such as NIST CSF or ISO 27001. <br/><br/>I would use caution in leveraging Service Organization Control (SOC) 2 reports; these reports vary by organization and may not cover all cybersecurity controls you may be looking for. <br/><br/>Once the assessment is complete, work with the vendor to mitigate any findings; if not possible, enter the findings in your cybersecurity standard exception program or a vendor exception program. <br/><br/>It will be the responsibility of the business to accept or reject the amount of risk proposed by this third-party vendor relationship. <br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Third-Party Risk Management<br/><br/>The third-party outsourcing trend will continue to grow in the coming years, which places third-party risk as a significant concern for organizations, large or small. Depending on which statistics you read, 39-63% of breaches are caused by third parties. One of the most notorious breaches is the case of Target, where the HVAC vendor’s credential was stolen, resulting in the retailer&apos;s breach of 40 million credit and debit card numbers and 70 million records of personal information stolen. <br/><br/>How you manage this risk vector is the inspiration of several books and articles; however, it will all start in the contract and what you were able to negotiate upfront; then a mixed methodology assessment, where you use qualitative and quantitative elements to assess the vendor based on industry-accepted standards, such as NIST CSF or ISO 27001. <br/><br/>I would use caution in leveraging Service Organization Control (SOC) 2 reports; these reports vary by organization and may not cover all cybersecurity controls you may be looking for. <br/><br/>Once the assessment is complete, work with the vendor to mitigate any findings; if not possible, enter the findings in your cybersecurity standard exception program or a vendor exception program. <br/><br/>It will be the responsibility of the business to accept or reject the amount of risk proposed by this third-party vendor relationship. <br/><br/>========<br/><br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/iso27001foundationcourse<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565586-third-party-risk-management.mp3" length="4713038" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nk2180x3m5tqoxhddkqxp918114k?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858149</guid>
    <pubDate>Thu, 29 Sep 2022 05:00:00 -0400</pubDate>
    <itunes:duration>388</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Chasing Perfection</itunes:title>
    <title>Chasing Perfection</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Chasing Perfection Pursuing perfection takes a lot of resources, financially and people. In Cybersecurity risk management, there are two key questions:  When will enough be enough? What is the correct amount of time and effort should your organization spend to achieve a reasonable level of cybersecurity against an attacker?The answer to these questions will be your risk tolerance. Chasing perfection has challenges and may not get you where you want to be. Ch...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Chasing Perfection</h1><p><br/>Pursuing perfection takes a lot of resources, financially and people. In Cybersecurity risk management, there are two key questions: </p><ul><li>When will enough be enough? </li><li>What is the correct amount of time and effort should your organization spend to achieve a reasonable level of cybersecurity against an attacker?</li></ul><p>The answer to these questions will be your risk tolerance. Chasing perfection has challenges and may not get you where you want to be. Chasing perfection may also risk missing the big picture, leaving security gaps in other areas of your organization, and burning out your staff.</p><p>A holistic and mission-driven approach to cybersecurity, with reasonable and measurable goals, will help secure your organization. To get you started, keep in mind three questions:</p><ol><li>What are your organization’s cybersecurity risks?</li><li>How are you managing the organization’s cybersecurity risks?</li><li>How are you measuring your cybersecurity risk reduction?</li></ol><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Chasing Perfection</h1><p><br/>Pursuing perfection takes a lot of resources, financially and people. In Cybersecurity risk management, there are two key questions: </p><ul><li>When will enough be enough? </li><li>What is the correct amount of time and effort should your organization spend to achieve a reasonable level of cybersecurity against an attacker?</li></ul><p>The answer to these questions will be your risk tolerance. Chasing perfection has challenges and may not get you where you want to be. Chasing perfection may also risk missing the big picture, leaving security gaps in other areas of your organization, and burning out your staff.</p><p>A holistic and mission-driven approach to cybersecurity, with reasonable and measurable goals, will help secure your organization. To get you started, keep in mind three questions:</p><ol><li>What are your organization’s cybersecurity risks?</li><li>How are you managing the organization’s cybersecurity risks?</li><li>How are you measuring your cybersecurity risk reduction?</li></ol><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565587-chasing-perfection.mp3" length="3387608" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yk8nmmldm7zi6yo4m6xqtc27s9az?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858150</guid>
    <pubDate>Thu, 22 Sep 2022 05:00:00 -0400</pubDate>
    <itunes:duration>276</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Risk &amp; Budget Challenges</itunes:title>
    <title>Cybersecurity Risk &amp; Budget Challenges</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Amid a global financial crisis and potentially facing cybersecurity budget challenges, you are now facing a tough decision; how to do more with less. What if I told you that you can; change the focus of your cybersecurity risk management program from a threat/vulnerability-centric focus to a mission-centric focus. Using the same people, processes, and technologies you have but targeting critical systems in your organization. This change in strategy will allow your cyb...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Amid a global financial crisis and potentially facing cybersecurity budget challenges, you are now facing a tough decision; how to do more with less. What if I told you that you can; change the focus of your cybersecurity risk management program from a threat/vulnerability-centric focus to a mission-centric focus. Using the same people, processes, and technologies you have but targeting critical systems in your organization.</p><p>This change in strategy will allow your cybersecurity organization to provide valuable services by redirecting the same resources to a mission-centric approach, hence, innovating your cybersecurity strategy while being a good steward of your financial resources.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p><br/></p><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Amid a global financial crisis and potentially facing cybersecurity budget challenges, you are now facing a tough decision; how to do more with less. What if I told you that you can; change the focus of your cybersecurity risk management program from a threat/vulnerability-centric focus to a mission-centric focus. Using the same people, processes, and technologies you have but targeting critical systems in your organization.</p><p>This change in strategy will allow your cybersecurity organization to provide valuable services by redirecting the same resources to a mission-centric approach, hence, innovating your cybersecurity strategy while being a good steward of your financial resources.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p><br/></p><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565588-cybersecurity-risk-budget-challenges.mp3" length="2127671" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mgk0j1xwedsr45ndhc4u0x25o3qu?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858151</guid>
    <pubDate>Thu, 15 Sep 2022 05:00:00 -0400</pubDate>
    <itunes:duration>171</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 Rules for Cybersecurity Risk Metrics</itunes:title>
    <title>5 Rules for Cybersecurity Risk Metrics</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Rules for Effective Cybersecurity MetricsFirst, you must establish agreement among your leadership on the actual risk(s) to measure, then select which data will provide the most accurate representation of the risk. The following are 5 fundamental rules for measuring cybersecurity risk: Select informative measures with actionable value to leadershipResearch other subject matter experts have done and workedKeep the math simple and clearDevelop a standard reporting forma...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Rules for Effective Cybersecurity Metrics</h1><p>First, you must establish agreement among your leadership on the actual risk(s) to measure, then select which data will provide the most accurate representation of the risk.</p><p>The following are 5 fundamental rules for measuring cybersecurity risk:</p><ol><li>Select informative measures with actionable value to leadership</li><li>Research other subject matter experts have done and worked</li><li>Keep the math simple and clear</li><li>Develop a standard reporting format and reporting governance</li><li>Keep consistent and allow your measures and metrics to mature over time</li></ol><p>Bonus rule: Gain buy-in from your stakeholders.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Rules for Effective Cybersecurity Metrics</h1><p>First, you must establish agreement among your leadership on the actual risk(s) to measure, then select which data will provide the most accurate representation of the risk.</p><p>The following are 5 fundamental rules for measuring cybersecurity risk:</p><ol><li>Select informative measures with actionable value to leadership</li><li>Research other subject matter experts have done and worked</li><li>Keep the math simple and clear</li><li>Develop a standard reporting format and reporting governance</li><li>Keep consistent and allow your measures and metrics to mature over time</li></ol><p>Bonus rule: Gain buy-in from your stakeholders.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565589-5-rules-for-cybersecurity-risk-metrics.mp3" length="3943306" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/n2v2j94o19q2m64u8agiz296avh7?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858152</guid>
    <pubDate>Thu, 08 Sep 2022 05:00:00 -0400</pubDate>
    <itunes:duration>323</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Mission-Centric Risk Assessment - Preparation</itunes:title>
    <title>Mission-Centric Risk Assessment - Preparation</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Mission Centric Risk AssessmentIn a mission-based risk assessment, the question is, how do you perform one?  A four-layer approach will be a good start:  Mission layerOperational layerApplication layerInfrastructure layer======== Blog: https://www.execcybered.com/blog Training: https://www.execcybered.com/iso27001foundationcourse Linkedin: https://www.linkedin.com/company/exceccybered/ Twitter: https://twitter.com/DrBillSouza Instagram: https://www.instagram...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Mission Centric Risk Assessment</h1><p>In a mission-based risk assessment, the question is, how do you perform one? </p><p>A four-layer approach will be a good start: </p><ol><li>Mission layer</li><li>Operational layer</li><li>Application layer</li><li>Infrastructure layer</li></ol><p>========</p><p>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a><br/>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a><br/>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a><br/>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a><br/>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></p><p><br/></p><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Mission Centric Risk Assessment</h1><p>In a mission-based risk assessment, the question is, how do you perform one? </p><p>A four-layer approach will be a good start: </p><ol><li>Mission layer</li><li>Operational layer</li><li>Application layer</li><li>Infrastructure layer</li></ol><p>========</p><p>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a><br/>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a><br/>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a><br/>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a><br/>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></p><p><br/></p><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565590-mission-centric-risk-assessment-preparation.mp3" length="5112897" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0g82uwuarrnlapqhs1f3piayuqh6?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858153</guid>
    <pubDate>Thu, 01 Sep 2022 05:00:00 -0400</pubDate>
    <itunes:duration>420</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Top 2 Measurement Challenges</itunes:title>
    <title>Top 2 Measurement Challenges</title>
    <itunes:summary><![CDATA[Send us Fan Mail         When measuring risk in your organization, you’ll typically discover two challenges: First, top key risk measures that do not have supporting data (aspirational). Second, you’ll be developing middle to low measures with supporting data that do not entirely address the risk.  The lack of data to calculate a particular measure is no reason not to measure the risk; these are your aspirational measures; setting an organizational ambition or goal for your cybersecurity...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>When measuring risk in your organization, you’ll typically discover two challenges: First, top key risk measures that do not have supporting data (aspirational). Second, you’ll be developing middle to low measures with supporting data that do not entirely address the risk. </p><p>The lack of data to calculate a particular measure is no reason not to measure the risk; these are your aspirational measures; setting an organizational ambition or goal for your cybersecurity program to report over time is a good strategy; allow your cybersecurity program mature.</p><p>To calculate the percentage of assets identified as critical will require two data points, first, the total number of assets, and second, the total number of critical assets; if you don’t have these numbers, you can start by collecting secondary data and establishing secondary measures that will drive towards the aspirational goal of calculating the percentage of assets identified as critical.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>When measuring risk in your organization, you’ll typically discover two challenges: First, top key risk measures that do not have supporting data (aspirational). Second, you’ll be developing middle to low measures with supporting data that do not entirely address the risk. </p><p>The lack of data to calculate a particular measure is no reason not to measure the risk; these are your aspirational measures; setting an organizational ambition or goal for your cybersecurity program to report over time is a good strategy; allow your cybersecurity program mature.</p><p>To calculate the percentage of assets identified as critical will require two data points, first, the total number of assets, and second, the total number of critical assets; if you don’t have these numbers, you can start by collecting secondary data and establishing secondary measures that will drive towards the aspirational goal of calculating the percentage of assets identified as critical.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565591-top-2-measurement-challenges.mp3" length="2788697" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9ji0arq56dr6x0pjjjvrgebr3v85?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858154</guid>
    <pubDate>Thu, 25 Aug 2022 05:00:00 -0400</pubDate>
    <itunes:duration>227</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Report BoD</itunes:title>
    <title>Cybersecurity Report BoD</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Cybersecurity Report Framework to the Board of Directors There is a three-point framework to keep in mind when preparing a report to the Board, especially if you are a small to medium-size business with annual revenue between $100M to $700M with [potentially] no CISO in your organization. What are key risks the Board should be aware of at a high level? What should they be offered a deeper understanding of?How do these risks align with the organization's strategic init...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Cybersecurity Report Framework to the Board of Directors</h1><p><br/>There is a three-point framework to keep in mind when preparing a report to the Board, especially if you are a small to medium-size business with annual revenue between $100M to $700M with [potentially] no CISO in your organization.</p><ol><li>What are key risks the Board should be aware of at a high level? What should they be offered a deeper understanding of?</li><li>How do these risks align with the organization&apos;s strategic initiatives?</li><li>What is your opinion? What do you recommend? - A solution.</li></ol><p>One key factor to remember is to be prepared to answer how your organization compares to others in the industry. I suggest discussing with other organizations in the same industry and of similar size.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Cybersecurity Report Framework to the Board of Directors</h1><p><br/>There is a three-point framework to keep in mind when preparing a report to the Board, especially if you are a small to medium-size business with annual revenue between $100M to $700M with [potentially] no CISO in your organization.</p><ol><li>What are key risks the Board should be aware of at a high level? What should they be offered a deeper understanding of?</li><li>How do these risks align with the organization&apos;s strategic initiatives?</li><li>What is your opinion? What do you recommend? - A solution.</li></ol><p>One key factor to remember is to be prepared to answer how your organization compares to others in the industry. I suggest discussing with other organizations in the same industry and of similar size.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565592-cybersecurity-report-bod.mp3" length="1603438" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ss25m2u1ub71c711a5j6dtrysv2i?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858155</guid>
    <pubDate>Thu, 18 Aug 2022 05:00:00 -0400</pubDate>
    <itunes:duration>128</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Business Value</itunes:title>
    <title>Business Value</title>
    <itunes:summary><![CDATA[Send us Fan Mail         How do you understand a digital asset's business value? First, let’s define what a digital asset is; a digital asset is a system, process, data, and technology that is used. A cyber event could affect one or more of these digital assets, resulting in a loss for the business. These digital assets have a hierarchical relationship: OrganizationFunctionBusiness UnitOwn &amp; UseBusiness ProcessOwn &amp; UseSystemSupportsTechnology Process &amp; StoreData TypeUndersta...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>How do you understand a digital asset&apos;s business value?</p><p>First, let’s define what a digital asset is; a digital asset is a system, process, data, and technology that is used. A cyber event could affect one or more of these digital assets, resulting in a loss for the business.</p><p>These digital assets have a hierarchical relationship:</p><ul><li>Organization<ul><li>Function</li></ul></li><li>Business Unit<ul><li>Own &amp; Use</li></ul></li><li>Business Process<ul><li>Own &amp; Use</li></ul></li><li>System<ul><li>Supports</li></ul></li><li>Technology <ul><li>Process &amp; Store</li></ul></li><li>Data Type</li></ul><p>Understanding this hierarchy in your organization will lead you to the critical systems in your organization. </p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>How do you understand a digital asset&apos;s business value?</p><p>First, let’s define what a digital asset is; a digital asset is a system, process, data, and technology that is used. A cyber event could affect one or more of these digital assets, resulting in a loss for the business.</p><p>These digital assets have a hierarchical relationship:</p><ul><li>Organization<ul><li>Function</li></ul></li><li>Business Unit<ul><li>Own &amp; Use</li></ul></li><li>Business Process<ul><li>Own &amp; Use</li></ul></li><li>System<ul><li>Supports</li></ul></li><li>Technology <ul><li>Process &amp; Store</li></ul></li><li>Data Type</li></ul><p>Understanding this hierarchy in your organization will lead you to the critical systems in your organization. </p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565593-business-value.mp3" length="2263965" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/l7iupwg63ohl02b4iyom3ur17nqq?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858156</guid>
    <pubDate>Thu, 11 Aug 2022 05:00:00 -0400</pubDate>
    <itunes:duration>183</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SMB 4 Risk Management Pillars</itunes:title>
    <title>SMB 4 Risk Management Pillars</title>
    <itunes:summary><![CDATA[Send us Fan Mail         NIST has developed a cybersecurity risk management framework that addresses the issue as a comprehensive process that requires organizations to: Frame riskAssess the vulnerabilitiesRespond to risk once determinedMonitor risk on an ongoing basisThese four pillars must be addressed by all small and midsize businesses. A small and midsize business (SMB) is a business that, due to its size, has different IT requirements — and often faces different IT challenges — than do ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>NIST has developed a cybersecurity risk management framework that addresses the issue as a comprehensive process that requires organizations to:</p><ol><li>Frame risk</li><li>Assess the vulnerabilities</li><li>Respond to risk once determined</li><li>Monitor risk on an ongoing basis</li></ol><p>These four pillars must be addressed by all small and midsize businesses. A small and midsize business (SMB) is a business that, due to its size, has different IT requirements — and often faces different IT challenges — than do large enterprises, and whose IT resources (usually budget and staff) are often highly constrained.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/ </a></li></ul><p>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>NIST has developed a cybersecurity risk management framework that addresses the issue as a comprehensive process that requires organizations to:</p><ol><li>Frame risk</li><li>Assess the vulnerabilities</li><li>Respond to risk once determined</li><li>Monitor risk on an ongoing basis</li></ol><p>These four pillars must be addressed by all small and midsize businesses. A small and midsize business (SMB) is a business that, due to its size, has different IT requirements — and often faces different IT challenges — than do large enterprises, and whose IT resources (usually budget and staff) are often highly constrained.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/ </a></li></ul><p>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565594-smb-4-risk-management-pillars.mp3" length="2234852" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zg5lf03w0tfosgd2n3f2ou18i1im?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858157</guid>
    <pubDate>Thu, 04 Aug 2022 05:00:00 -0400</pubDate>
    <itunes:duration>181</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Risk Owners</itunes:title>
    <title>Risk Owners</title>
    <itunes:summary><![CDATA[Send us Fan Mail         There are many stakeholders in cybersecurity, and it makes sense to outline roles and responsibilities in terms of how each role impacts cyber resiliency. The board of directorsFebruary 21, 2018, SEC guidance requires board oversight in terms of cyber (https://www.sec.gov/rules/interp/2018/33-10459.pdf).Chief Information Security Officer (CISO)There are two types of CISOs; a governance CISO and an Operational CISO.Data Privacy Officer (DPO)General Data Protection Regu...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are many stakeholders in cybersecurity, and it makes sense to outline roles and responsibilities in terms of how each role impacts cyber resiliency.</p><ol><li>The board of directors<ol><li>February 21, 2018, SEC guidance requires board oversight in terms of cyber (https://www.sec.gov/rules/interp/2018/33-10459.pdf).</li></ol></li><li>Chief Information Security Officer (CISO)<ol><li>There are two types of CISOs; a governance CISO and an Operational CISO.</li></ol></li><li>Data Privacy Officer (DPO)<ol><li>General Data Protection Regulation (GDPR) requires that organizations process privacy data to have a DPO.</li></ol></li><li>Compliance Manager or Officer<ol><li>This is an individual with the responsibility to ensure the company complies with its outside regulatory obligations and internal policies.</li></ol></li><li>Auditors<ol><li>Auditors are responsible for developing, planning, and executing IT audit programs based on risk assessments.</li></ol></li><li>Legal team<ol><li>The legal team will be involved in cyber when a breach occurs and most likely will review all external communications before they are released to the media or regulatory authorities.</li></ol></li></ol><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are many stakeholders in cybersecurity, and it makes sense to outline roles and responsibilities in terms of how each role impacts cyber resiliency.</p><ol><li>The board of directors<ol><li>February 21, 2018, SEC guidance requires board oversight in terms of cyber (https://www.sec.gov/rules/interp/2018/33-10459.pdf).</li></ol></li><li>Chief Information Security Officer (CISO)<ol><li>There are two types of CISOs; a governance CISO and an Operational CISO.</li></ol></li><li>Data Privacy Officer (DPO)<ol><li>General Data Protection Regulation (GDPR) requires that organizations process privacy data to have a DPO.</li></ol></li><li>Compliance Manager or Officer<ol><li>This is an individual with the responsibility to ensure the company complies with its outside regulatory obligations and internal policies.</li></ol></li><li>Auditors<ol><li>Auditors are responsible for developing, planning, and executing IT audit programs based on risk assessments.</li></ol></li><li>Legal team<ol><li>The legal team will be involved in cyber when a breach occurs and most likely will review all external communications before they are released to the media or regulatory authorities.</li></ol></li></ol><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.</p><p>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565595-risk-owners.mp3" length="3757203" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/oeanngut9y1sr7xsx0fp3qnd4gdq?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858158</guid>
    <pubDate>Thu, 28 Jul 2022 05:00:00 -0400</pubDate>
    <itunes:duration>309</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>NISTIR 8286D</itunes:title>
    <title>NISTIR 8286D</title>
    <itunes:summary><![CDATA[Send us Fan Mail         The initial public draft of NIST IR 8286D provides comprehensive asset confidentiality and integrity impact analyses to accurately identify and manage asset risk propagation from system to organization and from organization to enterprise, which in turn better informs Enterprise Risk Management deliberations. This document adds expanded BIA protocols to inform risk prioritization and response by quantifying the organizational impact and enterprise consequences of compr...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The initial public draft of NIST IR 8286D provides comprehensive asset confidentiality and integrity impact analyses to accurately identify and manage asset risk propagation from system to organization and from organization to enterprise, which in turn better informs Enterprise Risk Management deliberations. This document adds expanded BIA protocols to inform risk prioritization and response by quantifying the organizational impact and enterprise consequences of compromised IT Assets.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p><br/></p><p>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The initial public draft of NIST IR 8286D provides comprehensive asset confidentiality and integrity impact analyses to accurately identify and manage asset risk propagation from system to organization and from organization to enterprise, which in turn better informs Enterprise Risk Management deliberations. This document adds expanded BIA protocols to inform risk prioritization and response by quantifying the organizational impact and enterprise consequences of compromised IT Assets.</p><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p><br/></p><p>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565596-nistir-8286d.mp3" length="3638442" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/omnx9jpsy5jqmzaj8jbyr05dss5g?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858159</guid>
    <pubDate>Thu, 21 Jul 2022 05:00:00 -0400</pubDate>
    <itunes:duration>298</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Frameworks - 3 Common Pitfalls</itunes:title>
    <title>Cyber Frameworks - 3 Common Pitfalls</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Choosing a Cybersecurity FrameworkThree common pitfalls of cybersecurity or risk frameworks: Finding the “perfect” framework. No single framework fits an organization’s risk profile perfectly. Frameworks like ISO 27001, ISO 3100, NIST CSF, NIST RMF, COBIT, and many others. Using custom frameworks that do not map to regulators or industry standards.Failing to assign a single project leader with appropriate deadlines and resources. ======== Blog: https://www.e...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Choosing a Cybersecurity Framework</h1><p>Three common pitfalls of cybersecurity or risk frameworks:</p><ol><li>Finding the “perfect” framework. No single framework fits an organization’s risk profile perfectly. Frameworks like ISO 27001, ISO 3100, NIST CSF, NIST RMF, COBIT, and many others. </li><li>Using custom frameworks that do not map to regulators or industry standards.</li><li>Failing to assign a single project leader with appropriate deadlines and resources. </li></ol><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder</p><p><br/></p><p><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <h1>Choosing a Cybersecurity Framework</h1><p>Three common pitfalls of cybersecurity or risk frameworks:</p><ol><li>Finding the “perfect” framework. No single framework fits an organization’s risk profile perfectly. Frameworks like ISO 27001, ISO 3100, NIST CSF, NIST RMF, COBIT, and many others. </li><li>Using custom frameworks that do not map to regulators or industry standards.</li><li>Failing to assign a single project leader with appropriate deadlines and resources. </li></ol><p>========</p><ul><li>Blog: <a href='https://www.execcybered.com/blog'>https://www.execcybered.com/blog</a></li><li>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></li><li>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></li><li>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></li><li>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></li></ul><p>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder</p><p><br/></p><p><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565597-cyber-frameworks-3-common-pitfalls.mp3" length="2235634" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nuh3x7yfg106mindwp0gfr2hiap0?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858160</guid>
    <pubDate>Thu, 14 Jul 2022 05:00:00 -0400</pubDate>
    <itunes:duration>181</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity - 5 Measures &amp; Metrics</itunes:title>
    <title>Cybersecurity - 5 Measures &amp; Metrics</title>
    <itunes:summary><![CDATA[Send us Fan Mail         There are several measurements or metrics an organization can put in place to monitor; some of them can be turned into Key Risk Indicators (KRIs) and Key Performance Indicators (KPIs).  ======== Training: https://www.execcybered.com/iso27001foundationcourse Linkedin: https://www.linkedin.com/company/exceccybered/ Twitter: https://twitter.com/DrBillSouza Instagram: https://www.instagram.com/drbillsouza/         ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are several measurements or metrics an organization can put in place to monitor; some of them can be turned into Key Risk Indicators (KRIs) and Key Performance Indicators (KPIs).<br/><br/>========<br/>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a><br/>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a><br/>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a><br/>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a><br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are several measurements or metrics an organization can put in place to monitor; some of them can be turned into Key Risk Indicators (KRIs) and Key Performance Indicators (KPIs).<br/><br/>========<br/>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a><br/>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a><br/>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a><br/>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a><br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565598-cybersecurity-5-measures-metrics.mp3" length="4294251" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cytw9759ss10yx25ri5pjglegs1e?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858161</guid>
    <pubDate>Thu, 07 Jul 2022 05:00:00 -0400</pubDate>
    <itunes:duration>353</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Risk Assessment - What to Assess</itunes:title>
    <title>Risk Assessment - What to Assess</title>
    <itunes:summary><![CDATA[Send us Fan Mail         These 3 steps you can take to perform a risk assessment: Identify and document the scope and assets to be assessed. I suggest starting with your critical assets.Identify and collect your assessment data.Vulnerability scan (including applications)Minimum security baseline scanAccess management at the OS and application levelsStandard exceptions against your scoped systemsSecurity information and event management (SIEM) logging and alertingAnalyze and report The most im...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>These 3 steps you can take to perform a risk assessment:</p><ol><li>Identify and document the scope and assets to be assessed. I suggest starting with your critical assets.</li><li>Identify and collect your assessment data.<ol><li>Vulnerability scan (including applications)</li><li>Minimum security baseline scan</li><li>Access management at the OS and application levels</li><li>Standard exceptions against your scoped systems</li><li>Security information and event management (SIEM) logging and alerting</li></ol></li><li>Analyze and report<br/>The most important part is the analysis, since quantitative data alone may not provide the correct information.</li></ol><p>========</p><p>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></p><p>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></p><p>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></p><p>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></p><p>Author: Dr. Bill Souza | Jun 28, 2022 </p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>These 3 steps you can take to perform a risk assessment:</p><ol><li>Identify and document the scope and assets to be assessed. I suggest starting with your critical assets.</li><li>Identify and collect your assessment data.<ol><li>Vulnerability scan (including applications)</li><li>Minimum security baseline scan</li><li>Access management at the OS and application levels</li><li>Standard exceptions against your scoped systems</li><li>Security information and event management (SIEM) logging and alerting</li></ol></li><li>Analyze and report<br/>The most important part is the analysis, since quantitative data alone may not provide the correct information.</li></ol><p>========</p><p>Training: <a href='https://www.execcybered.com/iso27001foundationcourse'>https://www.execcybered.com/iso27001foundationcourse</a></p><p>Linkedin: <a href='https://www.linkedin.com/company/exceccybered/'>https://www.linkedin.com/company/exceccybered/</a></p><p>Twitter: <a href='https://twitter.com/DrBillSouza'>https://twitter.com/DrBillSouza</a></p><p>Instagram: <a href='https://www.instagram.com/drbillsouza/'>https://www.instagram.com/drbillsouza/</a></p><p>Author: Dr. Bill Souza | Jun 28, 2022 </p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565599-risk-assessment-what-to-assess.mp3" length="2988654" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1qr8e0nig9giix9vhc5bpwcvkl4g?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858162</guid>
    <pubDate>Tue, 28 Jun 2022 09:00:00 -0400</pubDate>
    <itunes:duration>244</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What to Focus First</itunes:title>
    <title>What to Focus First</title>
    <itunes:summary><![CDATA[Send us Fan Mail         What to Focus on FIRST Mission-based cybersecurity Systems supporting the mission, vision, and servicesRegulatory systems - PCI, HIPAA, SOX, GDPRPrioritizing remediation is based on quantifying the three primary financial impacts: Business interruption costData exfiltration costRegulatory cost=== Blog: https://www.execcybered.com/blog Training: https://www.execcybered.com/store Linkedin: https://www.linkedin.com/company/exceccybered/ Twitter: https://twitter.com/DrBil...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>What to Focus on FIRST<br/>Mission-based cybersecurity</p><ul><li>Systems supporting the mission, vision, and services</li><li>Regulatory systems - PCI, HIPAA, SOX, GDPR</li></ul><p>Prioritizing remediation is based on quantifying the three primary financial impacts:</p><ol><li>Business interruption cost</li><li>Data exfiltration cost</li><li>Regulatory cost</li></ol><p>===<br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/store<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>What to Focus on FIRST<br/>Mission-based cybersecurity</p><ul><li>Systems supporting the mission, vision, and services</li><li>Regulatory systems - PCI, HIPAA, SOX, GDPR</li></ul><p>Prioritizing remediation is based on quantifying the three primary financial impacts:</p><ol><li>Business interruption cost</li><li>Data exfiltration cost</li><li>Regulatory cost</li></ol><p>===<br/>Blog: https://www.execcybered.com/blog<br/>Training: https://www.execcybered.com/store<br/>Linkedin: https://www.linkedin.com/company/exceccybered/<br/>Twitter: https://twitter.com/DrBillSouza<br/>Instagram: https://www.instagram.com/drbillsouza/<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>www.execcybered.com</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565600-what-to-focus-first.mp3" length="2191183" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gtrink39ygisowxhv8j9pql2byyj?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858163</guid>
    <pubDate>Mon, 27 Jun 2022 07:00:00 -0400</pubDate>
    <itunes:duration>178</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Improving Risk Program - 5 Tips</itunes:title>
    <title>Improving Risk Program - 5 Tips</title>
    <itunes:summary><![CDATA[Send us Fan Mail         There are some simple rules that you can start today to ensure improvements to your cyber risk program. Define the problemDefine riskDefine criticalIdentify and inventory critical assets or systemsIdentify risksThese rules apply to small, medium, and large businesses with corresponding difficulty levels.  Thanks. Dr. Bill Souza CEO | Founder E|CE - Executive Cyber Education https://www.execcybered.com          ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are some simple rules that you can start today to ensure improvements to your cyber risk program.</p><ol><li>Define the problem</li><li>Define risk</li><li>Define critical</li><li>Identify and inventory critical assets or systems</li><li>Identify risks</li></ol><p>These rules apply to small, medium, and large businesses with corresponding difficulty levels.<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> <br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are some simple rules that you can start today to ensure improvements to your cyber risk program.</p><ol><li>Define the problem</li><li>Define risk</li><li>Define critical</li><li>Identify and inventory critical assets or systems</li><li>Identify risks</li></ol><p>These rules apply to small, medium, and large businesses with corresponding difficulty levels.<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO | Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> <br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565601-improving-risk-program-5-tips.mp3" length="2438878" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c37kpkhozsowwj5n7bshfpaljqj8?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858164</guid>
    <pubDate>Mon, 27 Jun 2022 06:00:00 -0400</pubDate>
    <itunes:duration>198</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tackling Risk Probability and Impact</itunes:title>
    <title>Tackling Risk Probability and Impact</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Today I’ll discuss risk probability and impact and give you some examples to build your own impact and probability table. ProbabilityImpactThanks. Dr. Bill Souza CEO/Founder E|CE - Executive Cyber Education https://www.execcybered.com        ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today I’ll discuss risk probability and impact and give you some examples to build your own impact and probability table.</p><ul><li>Probability</li><li>Impact</li></ul><p>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> </p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today I’ll discuss risk probability and impact and give you some examples to build your own impact and probability table.</p><ul><li>Probability</li><li>Impact</li></ul><p>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> </p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565602-tackling-risk-probability-and-impact.mp3" length="5904580" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cv63enjeolt88qaacctp79ksbbcr?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858165</guid>
    <pubDate>Thu, 14 Oct 2021 01:00:00 -0400</pubDate>
    <itunes:duration>489</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 Cybersecurity Challenges</itunes:title>
    <title>5 Cybersecurity Challenges</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Today I’ll touch on the topic of Cyber Risk &amp; Cyber Investment challenges. ImprovingExploitsAttack pathsAttacker behaviorInvestmentThanks. Dr. Bill Souza CEO/Founder E|CE - Executive Cyber Education https://www.execcybered.com        ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today I’ll touch on the topic of Cyber Risk &amp; Cyber Investment challenges.</p><ul><li>Improving</li><li>Exploits</li><li>Attack paths</li><li>Attacker behavior</li><li>Investment</li></ul><p>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> </p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today I’ll touch on the topic of Cyber Risk &amp; Cyber Investment challenges.</p><ul><li>Improving</li><li>Exploits</li><li>Attack paths</li><li>Attacker behavior</li><li>Investment</li></ul><p>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> </p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565603-5-cybersecurity-challenges.mp3" length="5443446" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/f7ays41enifvtlkf3yrcwvrjcdd8?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858166</guid>
    <pubDate>Sun, 26 Sep 2021 10:00:00 -0400</pubDate>
    <itunes:duration>450</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Lacking Basic Cybersecurity Practices</itunes:title>
    <title>Lacking Basic Cybersecurity Practices</title>
    <itunes:summary><![CDATA[Send us Fan Mail         The show today is based on an article titled, “Global utilities lacking basic cybersecurity practices.” Although the article was focused on utilities, the guidance is applicable to every industry, so I will touch on a few recommendations that could be useful to you as well, regardless of industry.  Links mentioned on the show: Article: Global utilities lacking basic cybersecurity practices says expert (powerengineeringint.com) Webinar: https://www.execcybered.com/nist...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The show today is based on an article titled, “Global utilities lacking basic cybersecurity practices.” Although the article was focused on utilities, the guidance is applicable to every industry, so I will touch on a few recommendations that could be useful to you as well, regardless of industry.<br/><br/>Links mentioned on the show:<br/>Article: <a href='https://www.powerengineeringint.com/digitalization/cybersecurity/global-utilities-lacking-basic-cybersecurity-practices-says-expert/'>Global utilities lacking basic cybersecurity practices says expert (powerengineeringint.com)</a><br/>Webinar: <a href='https://www.execcybered.com/nist-csf-replay'>https://www.execcybered.com/nist-csf-replay</a><br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> <br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>The show today is based on an article titled, “Global utilities lacking basic cybersecurity practices.” Although the article was focused on utilities, the guidance is applicable to every industry, so I will touch on a few recommendations that could be useful to you as well, regardless of industry.<br/><br/>Links mentioned on the show:<br/>Article: <a href='https://www.powerengineeringint.com/digitalization/cybersecurity/global-utilities-lacking-basic-cybersecurity-practices-says-expert/'>Global utilities lacking basic cybersecurity practices says expert (powerengineeringint.com)</a><br/>Webinar: <a href='https://www.execcybered.com/nist-csf-replay'>https://www.execcybered.com/nist-csf-replay</a><br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> <br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565604-lacking-basic-cybersecurity-practices.mp3" length="5390806" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lr385zvdsbi50vxqjyoqnwntudds?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858167</guid>
    <pubDate>Thu, 09 Sep 2021 01:00:00 -0400</pubDate>
    <itunes:duration>446</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Basics - What you Need to Know</itunes:title>
    <title>Cybersecurity Basics - What you Need to Know</title>
    <itunes:summary><![CDATA[Send us Fan Mail         We are so focused on the threats and the vulnerabilities that allowed a hack to occur, that we forget the basics. The protection necessary to prevent or slow down these attacks already exists, and they exist for a long time.  Thanks. Dr. Bill Souza CEO/Founder E|CE - Executive Cyber Education https://www.execcybered.com          ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>We are so focused on the threats and the vulnerabilities that allowed a hack to occur, that we forget the basics. The protection necessary to prevent or slow down these attacks already exists, and they exist for a long time.<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> <br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>We are so focused on the threats and the vulnerabilities that allowed a hack to occur, that we forget the basics. The protection necessary to prevent or slow down these attacks already exists, and they exist for a long time.<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com/'>https://www.execcybered.com</a> <br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565605-cybersecurity-basics-what-you-need-to-know.mp3" length="7883842" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/v31r2t5qg948ynjo5kf3siwtaayl?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858168</guid>
    <pubDate>Thu, 26 Aug 2021 01:00:00 -0400</pubDate>
    <itunes:duration>653</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Exceptions - Part 3 (FINAL)</itunes:title>
    <title>Cybersecurity Exceptions - Part 3 (FINAL)</title>
    <itunes:summary><![CDATA[Send us Fan Mail         In today's episode, I will discuss exceptions tracking and expirations. This is the last episode in a three-part series on cybersecurity standard exceptions.  Thanks. Dr. Bill Souza CEO/Founder E|CE - Executive Cyber Education https://www.execcybered.com        ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In today&apos;s episode, I will discuss exceptions tracking and expirations. This is the last episode in a three-part series on cybersecurity standard exceptions.<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com'>https://www.execcybered.com</a> </p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In today&apos;s episode, I will discuss exceptions tracking and expirations. This is the last episode in a three-part series on cybersecurity standard exceptions.<br/><br/>Thanks.<br/>Dr. Bill Souza<br/>CEO/Founder<br/>E|CE - Executive Cyber Education<br/><a href='https://www.execcybered.com'>https://www.execcybered.com</a> </p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565606-cybersecurity-exceptions-part-3-final.mp3" length="4263891" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yknfid2gnwg719kiro61vudhigod?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858169</guid>
    <pubDate>Thu, 19 Aug 2021 01:00:00 -0400</pubDate>
    <itunes:duration>352</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Exceptions - Part 2</itunes:title>
    <title>Cybersecurity Exceptions - Part 2</title>
    <itunes:summary><![CDATA[Send us Fan Mail         As I mentioned in my previous episode, there’s much more to discuss on cybersecurity exceptions, such as the risk they pose to the organization and the hidden dangers of cumulative risk.   Blog: https://www.execcybered.com/blog/cybersecurity-exceptions-part-2  Thanks. Dr. Bill Souza Founder &amp; CEO E|CE - Executive Cyber Education www.execcybered.com       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>As I mentioned in my previous episode, there’s much more to discuss on cybersecurity exceptions, such as the risk they pose to the organization and the hidden dangers of cumulative risk. <br/><br/>Blog: <a href='https://www.execcybered.com/blog/cybersecurity-exceptions-part-2'>https://www.execcybered.com/blog/cybersecurity-exceptions-part-2</a><br/><br/>Thanks.<br/>Dr. Bill Souza<br/>Founder &amp; CEO<br/>E|CE - Executive Cyber Education<br/>www.execcybered.com</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>As I mentioned in my previous episode, there’s much more to discuss on cybersecurity exceptions, such as the risk they pose to the organization and the hidden dangers of cumulative risk. <br/><br/>Blog: <a href='https://www.execcybered.com/blog/cybersecurity-exceptions-part-2'>https://www.execcybered.com/blog/cybersecurity-exceptions-part-2</a><br/><br/>Thanks.<br/>Dr. Bill Souza<br/>Founder &amp; CEO<br/>E|CE - Executive Cyber Education<br/>www.execcybered.com</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565607-cybersecurity-exceptions-part-2.mp3" length="4175163" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7enp7jk7qyypr4ugqdaw2ztzjkma?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858170</guid>
    <pubDate>Thu, 12 Aug 2021 01:00:00 -0400</pubDate>
    <itunes:duration>344</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Exceptions - Part 1</itunes:title>
    <title>Cybersecurity Exceptions - Part 1</title>
    <itunes:summary><![CDATA[Send us Fan Mail         If your cybersecurity standards were written to protect the organization, why do you have security exceptions? Your standard development team writes an excellent standard; it follows all the best practices of the NIST Cybersecurity Framework, the ISO 27001, or any other industry-recognized standards and frameworks, but most of all, it is common sense, right? Anyone working on or with a cybersecurity team in a large organization knows this does not happen! Exceptions h...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>If your cybersecurity standards were written to protect the organization, why do you have security exceptions? Your standard development team writes an excellent standard; it follows all the best practices of the NIST Cybersecurity Framework, the ISO 27001, or any other industry-recognized standards and frameworks, but most of all, it is common sense, right? Anyone working on or with a cybersecurity team in a large organization knows this does not happen! Exceptions happen.<br/><br/>Dr. Bill Souza<br/>Founder &amp; CEO<br/>E|CE<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>If your cybersecurity standards were written to protect the organization, why do you have security exceptions? Your standard development team writes an excellent standard; it follows all the best practices of the NIST Cybersecurity Framework, the ISO 27001, or any other industry-recognized standards and frameworks, but most of all, it is common sense, right? Anyone working on or with a cybersecurity team in a large organization knows this does not happen! Exceptions happen.<br/><br/>Dr. Bill Souza<br/>Founder &amp; CEO<br/>E|CE<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565608-cybersecurity-exceptions-part-1.mp3" length="4126910" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8ume182v6a7ppsfnfczyji0rw6na?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858171</guid>
    <pubDate>Thu, 05 Aug 2021 01:00:00 -0400</pubDate>
    <itunes:duration>340</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity - Asset Classification</itunes:title>
    <title>Cybersecurity - Asset Classification</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Asset classification is the foundation of everything else to come in cybersecurity; it will help your organization, for example, small or large, to better understand, manage, identify, and classify your assets.  Episode: Cybersecurity - Asset Classification (execcybered.com)  Dr. Bill Souza Founder &amp; CEO Executive Cyber Education       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Asset classification is the foundation of everything else to come in cybersecurity; it will help your organization, for example, small or large, to better understand, manage, identify, and classify your assets.<br/><br/>Episode: <a href='https://www.execcybered.com/blog/cybersecurity-asset-classification'>Cybersecurity - Asset Classification (execcybered.com)</a><br/><br/>Dr. Bill Souza<br/>Founder &amp; CEO<br/>Executive Cyber Education</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Asset classification is the foundation of everything else to come in cybersecurity; it will help your organization, for example, small or large, to better understand, manage, identify, and classify your assets.<br/><br/>Episode: <a href='https://www.execcybered.com/blog/cybersecurity-asset-classification'>Cybersecurity - Asset Classification (execcybered.com)</a><br/><br/>Dr. Bill Souza<br/>Founder &amp; CEO<br/>Executive Cyber Education</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565609-cybersecurity-asset-classification.mp3" length="4558894" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/knsn63jew4w1l9n4etwnw882coxz?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858172</guid>
    <pubDate>Fri, 30 Jul 2021 09:00:00 -0400</pubDate>
    <itunes:duration>376</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Zero-Sum Game</itunes:title>
    <title>Zero-Sum Game</title>
    <itunes:summary><![CDATA[Send us Fan Mail         In this episode, I will discuss three challenging areas where cybersecurity education is falling short in preparing students and professionals to succeed in the field.       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In this episode, I will discuss three challenging areas where cybersecurity education is falling short in preparing students and professionals to succeed in the field.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In this episode, I will discuss three challenging areas where cybersecurity education is falling short in preparing students and professionals to succeed in the field.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565610-zero-sum-game.mp3" length="7063467" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9wxisk8rk9d4ob45dgba8elfqc9i?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858173</guid>
    <pubDate>Thu, 31 Dec 2020 04:00:00 -0500</pubDate>
    <itunes:duration>585</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Investment &amp; Risk Strategy</itunes:title>
    <title>Cybersecurity Investment &amp; Risk Strategy</title>
    <itunes:summary><![CDATA[Send us Fan Mail         In this episode, I discuss how to leverage your risk framework to make sound cybersecurity investment decisions. I addressed two critical questions that you will need to know the answers; first, how can you tell your program is doing the right thing? and second, How can you tell you are protecting the organization in a financially healthy way?  Dr. B. Executive Cyber Education www.execcybered.com  eBook: https://www.execcybered.com/risk-identification-ebook         ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In this episode, I discuss how to leverage your risk framework to make sound cybersecurity investment decisions. I addressed two critical questions that you will need to know the answers; first, how can you tell your program is doing the right thing? and second, How can you tell you are protecting the organization in a financially healthy way?<br/><br/>Dr. B.<br/>Executive Cyber Education<br/><a href='https://www.execcybered.com'>www.execcybered.com</a><br/><br/>eBook: <a href='https://www.execcybered.com/risk-identification-ebook'>https://www.execcybered.com/risk-identification-ebook</a><br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In this episode, I discuss how to leverage your risk framework to make sound cybersecurity investment decisions. I addressed two critical questions that you will need to know the answers; first, how can you tell your program is doing the right thing? and second, How can you tell you are protecting the organization in a financially healthy way?<br/><br/>Dr. B.<br/>Executive Cyber Education<br/><a href='https://www.execcybered.com'>www.execcybered.com</a><br/><br/>eBook: <a href='https://www.execcybered.com/risk-identification-ebook'>https://www.execcybered.com/risk-identification-ebook</a><br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565611-cybersecurity-investment-risk-strategy.mp3" length="7134955" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tebforhgexfjaryiklt1oc3973yt?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858174</guid>
    <pubDate>Tue, 04 Aug 2020 21:00:00 -0400</pubDate>
    <itunes:duration>591</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Critical Systems: Asking the Right Questions</itunes:title>
    <title>Critical Systems: Asking the Right Questions</title>
    <itunes:summary><![CDATA[Send us Fan Mail         To get results you need to ask the right question, collect the data, analyze, and develop a robust and factual interpretation. This episode will guide you through the thought process and give you some ideas on how to develop a strong argument on where you should focus your cybersecurity investments and tools.  Infographic: https://executive-cyber-education.mykajabi.com/identification-analysis  Dr. B.         ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>To get results you need to ask the right question, collect the data, analyze, and develop a robust and factual interpretation. This episode will guide you through the thought process and give you some ideas on how to develop a strong argument on where you should focus your cybersecurity investments and tools.<br/><br/>Infographic: <a href='https://executive-cyber-education.mykajabi.com/identification-analysis'>https://executive-cyber-education.mykajabi.com/identification-analysis</a><br/><br/>Dr. B.<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>To get results you need to ask the right question, collect the data, analyze, and develop a robust and factual interpretation. This episode will guide you through the thought process and give you some ideas on how to develop a strong argument on where you should focus your cybersecurity investments and tools.<br/><br/>Infographic: <a href='https://executive-cyber-education.mykajabi.com/identification-analysis'>https://executive-cyber-education.mykajabi.com/identification-analysis</a><br/><br/>Dr. B.<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565612-critical-systems-asking-the-right-questions.mp3" length="11610993" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zhcaxxdgwyngzhcqe4vo6a8y5t0b?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858175</guid>
    <pubDate>Sun, 14 Jun 2020 17:00:00 -0400</pubDate>
    <itunes:duration>964</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Risk Identification</itunes:title>
    <title>Cyber Risk Identification</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Today’s episode I will discuss a strategy to identify critical systems in your organization. The steps I will discuss today will make sure your program is objective and repeatable.  The eBook mentioned in this podcast can be downloaded here: https://executive-cyber-education.mykajabi.com/risk-identification-ebook  Thanks. Dr. B. https://execcybered.com/podcast-1       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode I will discuss a strategy to identify critical systems in your organization. The steps I will discuss today will make sure your program is objective and repeatable.<br/><br/>The eBook mentioned in this podcast can be downloaded here:<br/><a href='https://executive-cyber-education.mykajabi.com/risk-identification-ebook'>https://executive-cyber-education.mykajabi.com/risk-identification-ebook</a><br/><br/>Thanks.<br/>Dr. B.<br/><a href='https://execcybered.com/podcast-1'>https://execcybered.com/podcast-1</a></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode I will discuss a strategy to identify critical systems in your organization. The steps I will discuss today will make sure your program is objective and repeatable.<br/><br/>The eBook mentioned in this podcast can be downloaded here:<br/><a href='https://executive-cyber-education.mykajabi.com/risk-identification-ebook'>https://executive-cyber-education.mykajabi.com/risk-identification-ebook</a><br/><br/>Thanks.<br/>Dr. B.<br/><a href='https://execcybered.com/podcast-1'>https://execcybered.com/podcast-1</a></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565613-cyber-risk-identification.mp3" length="11557665" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9uhqhkmewwoijoobkiylgroc6hgs?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858176</guid>
    <pubDate>Mon, 08 Jun 2020 23:00:00 -0400</pubDate>
    <itunes:duration>960</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Key Risk Indicators</itunes:title>
    <title>Key Risk Indicators</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Today’s episode we will discuss how to identify KRIs (key risk indicators). I’ll discuss a simple and effective way to do it; there seems to be a lot of confusion on what to measure and for a long time, subject matter experts believe we can’t measure Cybersecurity.       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode we will discuss how to identify KRIs (key risk indicators). I’ll discuss a simple and effective way to do it; there seems to be a lot of confusion on what to measure and for a long time, subject matter experts believe we can’t measure Cybersecurity.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode we will discuss how to identify KRIs (key risk indicators). I’ll discuss a simple and effective way to do it; there seems to be a lot of confusion on what to measure and for a long time, subject matter experts believe we can’t measure Cybersecurity.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565614-key-risk-indicators.mp3" length="9435465" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8dlbng125w1vhu1wsjwvsiqovxmq?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858177</guid>
    <pubDate>Sat, 25 Apr 2020 22:00:00 -0400</pubDate>
    <itunes:duration>783</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tail Risks: What are you going to do differently?</itunes:title>
    <title>Tail Risks: What are you going to do differently?</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Today’s episode, we will discuss “tail risk” and the impact it may have on organizations when it’s realized. Given our current environment, it seems entirely appropriate for us to have this meaningful discussion.       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode, we will discuss “tail risk” and the impact it may have on organizations when it’s realized. Given our current environment, it seems entirely appropriate for us to have this meaningful discussion.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode, we will discuss “tail risk” and the impact it may have on organizations when it’s realized. Given our current environment, it seems entirely appropriate for us to have this meaningful discussion.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565615-tail-risks-what-are-you-going-to-do-differently.mp3" length="12163963" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9qwe3byo0dmfs0ffhjneczs137k0?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858178</guid>
    <pubDate>Tue, 07 Apr 2020 22:00:00 -0400</pubDate>
    <itunes:duration>1010</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Risk Formula: What&#39;s wrong with it?</itunes:title>
    <title>Risk Formula: What&#39;s wrong with it?</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Today’s episode we will discuss the popular risk formula, “Risk =  Threat x Vulnerability x Consequence/Impact and its limitations to actually provide accurate information for a cybersecurity investment or tactical decision. I will be leveraging the “Risk Analysis and Management for Critical Asset Protection (RAMCAP) framework that was also used by the Department of Homeland Security.       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode we will discuss the popular risk formula, “Risk =  Threat x Vulnerability x Consequence/Impact and its limitations to actually provide accurate information for a cybersecurity investment or tactical decision. I will be leveraging the “Risk Analysis and Management for Critical Asset Protection (RAMCAP) framework that was also used by the Department of Homeland Security.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode we will discuss the popular risk formula, “Risk =  Threat x Vulnerability x Consequence/Impact and its limitations to actually provide accurate information for a cybersecurity investment or tactical decision. I will be leveraging the “Risk Analysis and Management for Critical Asset Protection (RAMCAP) framework that was also used by the Department of Homeland Security.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565616-risk-formula-what-s-wrong-with-it.mp3" length="9649283" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rhsp3bi7q6b3y5ny4e3393smfg8v?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858179</guid>
    <pubDate>Sun, 01 Mar 2020 12:00:00 -0500</pubDate>
    <itunes:duration>801</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threat Reports: What&#39;s Missing</itunes:title>
    <title>Threat Reports: What&#39;s Missing</title>
    <itunes:summary><![CDATA[Send us Fan Mail         I will discuss “Threat Reports,” specifically eight 2019 reports; the 2019 data breach investigations report by Verizon; 2019 data breach investigations report (executive summary) by Verizon; 2019 annual report, state of cyber security by security in depth; cyber security report by darkmatter; Q2 2019 Cybersecurity threatscape by Positive Technologies; 2019 Cyber Security Risk Report by Aon; the 2019 global threat report by CrowdStrike; and cyber trendscape 2020 by fi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>I will discuss “Threat Reports,” specifically eight 2019 reports; the 2019 data breach investigations report by Verizon; 2019 data breach investigations report (executive summary) by Verizon; 2019 annual report, state of cyber security by security in depth; cyber security report by darkmatter; Q2 2019 Cybersecurity threatscape by Positive Technologies; 2019 Cyber Security Risk Report by Aon; the 2019 global threat report by CrowdStrike; and cyber trendscape 2020 by fireeye. My discussion will focus on what these reports don’t say and how to use them in your Cybersecurity organization.<br/><br/>Dr. B.<br/>www.execcybered.com<br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>I will discuss “Threat Reports,” specifically eight 2019 reports; the 2019 data breach investigations report by Verizon; 2019 data breach investigations report (executive summary) by Verizon; 2019 annual report, state of cyber security by security in depth; cyber security report by darkmatter; Q2 2019 Cybersecurity threatscape by Positive Technologies; 2019 Cyber Security Risk Report by Aon; the 2019 global threat report by CrowdStrike; and cyber trendscape 2020 by fireeye. My discussion will focus on what these reports don’t say and how to use them in your Cybersecurity organization.<br/><br/>Dr. B.<br/>www.execcybered.com<br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565617-threat-reports-what-s-missing.mp3" length="10558961" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/g2v4v4nfsckxplsisovizojnuqoq?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858180</guid>
    <pubDate>Thu, 16 Jan 2020 22:00:00 -0500</pubDate>
    <itunes:duration>876</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Controls Selection</itunes:title>
    <title>Security Controls Selection</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Today’s episode we will discuss a strategy to select controls to assess, this strategy can be used to select any controls for your assessment, as a framework for security control selection, this approach is standard or regulatory standard agnostic. The steps we will discuss today will make sure your control selection is objective and repeatable.       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode we will discuss a strategy to select controls to assess, this strategy can be used to select any controls for your assessment, as a framework for security control selection, this approach is standard or regulatory standard agnostic. The steps we will discuss today will make sure your control selection is objective and repeatable.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode we will discuss a strategy to select controls to assess, this strategy can be used to select any controls for your assessment, as a framework for security control selection, this approach is standard or regulatory standard agnostic. The steps we will discuss today will make sure your control selection is objective and repeatable.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565618-security-controls-selection.mp3" length="11200941" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ngrpk3lxqzztc95ux9cp1jijdawq?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858181</guid>
    <pubDate>Mon, 23 Dec 2019 20:00:00 -0500</pubDate>
    <itunes:duration>930</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Assessments: System Selection</itunes:title>
    <title>Assessments: System Selection</title>
    <itunes:summary><![CDATA[Send us Fan Mail         Today’s episode we will discuss a strategy to select an environment to assess, this strategy can be used from your first assessment to developing an assessment calendar. The steps we will discuss today will make sure your assessment selection is objective and repeatable.  Dr. B. www.execcybered.com         ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode we will discuss a strategy to select an environment to assess, this strategy can be used from your first assessment to developing an assessment calendar. The steps we will discuss today will make sure your assessment selection is objective and repeatable.<br/><br/>Dr. B.<br/><a href='http://www.execcybered.com'>www.execcybered.com</a><br/><br/></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>Today’s episode we will discuss a strategy to select an environment to assess, this strategy can be used from your first assessment to developing an assessment calendar. The steps we will discuss today will make sure your assessment selection is objective and repeatable.<br/><br/>Dr. B.<br/><a href='http://www.execcybered.com'>www.execcybered.com</a><br/><br/></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565619-assessments-system-selection.mp3" length="7402323" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3t4u0ul11qh4afaf0nam47pb57ti?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858182</guid>
    <pubDate>Mon, 09 Dec 2019 21:00:00 -0500</pubDate>
    <itunes:duration>613</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Risk &amp; Cyber Governance Overall Program</itunes:title>
    <title>Cyber Risk &amp; Cyber Governance Overall Program</title>
    <itunes:summary><![CDATA[Send us Fan Mail         In this episode, we discuss an overview of our cybersecurity risk and governance program. Here I'll discuss what we are trying to achieve in the next several podcasts. Starting from choosing an environment and business organizations to establishing a residual risk for your cybersecurity organization that you can trust.  Our overview will touch on environment selection, security controls, control assessments, risk identification, and much more.       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In this episode, we discuss an overview of our cybersecurity risk and governance program. Here I&apos;ll discuss what we are trying to achieve in the next several podcasts. Starting from choosing an environment and business organizations to establishing a residual risk for your cybersecurity organization that you can trust. <br/>Our overview will touch on environment selection, security controls, control assessments, risk identification, and much more.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>In this episode, we discuss an overview of our cybersecurity risk and governance program. Here I&apos;ll discuss what we are trying to achieve in the next several podcasts. Starting from choosing an environment and business organizations to establishing a residual risk for your cybersecurity organization that you can trust. <br/>Our overview will touch on environment selection, security controls, control assessments, risk identification, and much more.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565620-cyber-risk-cyber-governance-overall-program.mp3" length="12146087" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/005kkpshy521pgoosvmoy1xnvu5j?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858183</guid>
    <pubDate>Sun, 01 Dec 2019 19:00:00 -0500</pubDate>
    <itunes:duration>1009</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Program Assessments</itunes:title>
    <title>Program Assessments</title>
    <itunes:summary><![CDATA[Send us Fan Mail         There are six-step in a cybersecurity program assessment framework. I will discuss each step of the framework and how it will help you to achieve a comprehensive assessment. A cybersecurity program assessment is a process, that you will design to provide your company or department with a comprehensive review of the tools, processes they implemented, policies, standards, procedures, and practices in place at your organization.  Dr. B. www.execcybered.com       ]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are six-step in a cybersecurity program assessment framework. I will discuss each step of the framework and how it will help you to achieve a comprehensive assessment. A cybersecurity program assessment is a process, that you will design to provide your company or department with a comprehensive review of the tools, processes they implemented, policies, standards, procedures, and practices in place at your organization.<br/><br/>Dr. B.<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>There are six-step in a cybersecurity program assessment framework. I will discuss each step of the framework and how it will help you to achieve a comprehensive assessment. A cybersecurity program assessment is a process, that you will design to provide your company or department with a comprehensive review of the tools, processes they implemented, policies, standards, procedures, and practices in place at your organization.<br/><br/>Dr. B.<br/><a href='http://www.execcybered.com'>www.execcybered.com</a></p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565621-program-assessments.mp3" length="23918727" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gexi6mzs16hii7b7habdud7ykc23?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858184</guid>
    <pubDate>Mon, 18 Nov 2019 22:00:00 -0500</pubDate>
    <itunes:duration>1990</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Introduction to Executive Cyber Education Podcast</itunes:title>
    <title>Introduction to Executive Cyber Education Podcast</title>
    <itunes:summary><![CDATA[Send us Fan Mail         I'm Dr. B and I have a particular view on cybersecurity's governance, risk, and compliance role in the organization; in this podcast show, I will share with you this view. Cyber risk plays a big role in the overall cybersecurity strategy of any organization and I'll take you through this journey, so you can also understand how to leverage this knowledge to make your business more resilient or expand your current knowledge on this subject.  www.execcybered.com Dr. B.  ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>I&apos;m Dr. B and I have a particular view on cybersecurity&apos;s governance, risk, and compliance role in the organization; in this podcast show, I will share with you this view. Cyber risk plays a big role in the overall cybersecurity strategy of any organization and I&apos;ll take you through this journey, so you can also understand how to leverage this knowledge to make your business more resilient or expand your current knowledge on this subject.<br/><br/><a href='http://www.execcybered.com'>www.execcybered.com</a><br/>Dr. B.</p>      ]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/723399/fan_mail/new">Send us Fan Mail</a></p>        <p>I&apos;m Dr. B and I have a particular view on cybersecurity&apos;s governance, risk, and compliance role in the organization; in this podcast show, I will share with you this view. Cyber risk plays a big role in the overall cybersecurity strategy of any organization and I&apos;ll take you through this journey, so you can also understand how to leverage this knowledge to make your business more resilient or expand your current knowledge on this subject.<br/><br/><a href='http://www.execcybered.com'>www.execcybered.com</a><br/>Dr. B.</p>      ]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/723399/episodes/14565567-introduction-to-executive-cyber-education-podcast.mp3" length="3270872" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ldfn6ivxw04szolfe3hv17ytqure?.jpg" />
    <itunes:author>Dr. Bill Souza</itunes:author>
    <guid isPermaLink="false">Kajabi-2147858185</guid>
    <pubDate>Sun, 17 Nov 2019 17:00:00 -0500</pubDate>
    <itunes:duration>269</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
