CISSP Cyber Training Podcast - CISSP Training Program

Auteur(s): Shon Gerber vCISO CISSP Cybersecurity Consultant and Entrepreneur
  • Résumé

  • Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journey—let’s ride into excellence together! 🚀

    © 2025 CISSP Cyber Training Podcast - CISSP Training Program
    Voir plus Voir moins
Épisodes
  • CCT 241: Practice CISSP Questions - Transborder Data Flows and the CISSP (Domain 1.5)
    May 1 2025

    Send us a text

    The cybersecurity talent gap is widening at an alarming rate. According to the 2023 ISC² Global Workforce Study, we're facing a shortfall of 5.5 million cybersecurity professionals by 2024, with the workforce needing to grow 12.6% annually just to keep pace with demand. Yet growth is stalling at only 8.7%, creating both challenges and unprecedented opportunities for those pursuing cybersecurity careers.

    What might surprise aspiring security professionals is that technical skills alone won't secure your future. As Sean Gerber emphasizes, "You can give me the smartest person in the world that understands security, and if they don't have critical thinking skills and communication skills, it makes it extremely challenging to put them in front of somebody to explain what's going on." This insight reveals why soft skills have become the hidden differentiator in cybersecurity hiring. While certifications like CISSP remain essential credentials, employers increasingly seek professionals who can translate complex technical concepts into business language.

    This episode dives deep into Domain 1.5 of the CISSP exam, exploring the complexities of breach notification and trans-border data flows. Through practical examples and challenging questions, we examine how to navigate conflicting international regulations like GDPR and China's data localization laws, implement appropriate anonymization techniques to prevent re-identification attacks, and develop strategic approaches to vulnerability management across global operations. Each scenario challenges listeners to think beyond technical solutions to consider legal, ethical, and business implications – precisely the mindset required to excel as a cybersecurity leader.

    Whether you're preparing for the CISSP exam or looking to advance your security career, this episode provides actionable insights on balancing compliance requirements with business objectives in our increasingly interconnected world. Join us to strengthen both your technical knowledge and the crucial soft skills that will set you apart in a competitive job market where communication might be your most valuable security asset.

    Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

    Voir plus Voir moins
    25 min
  • CCT Vendor 02: AI in Cybersecurity: Protecting Financial Institutions - NextPeak.net
    Apr 30 2025

    Send us a text

    The rapid evolution of artificial intelligence and machine learning has created a pivotal moment for financial institutions. As these organizations race to implement AI solutions, they face both transformative opportunities and significant cybersecurity challenges that demand immediate attention.

    Sean Gerber draws from over 20 years of cybersecurity experience to demystify the complex intersection of AI, machine learning, and financial security. With his straightforward approach, Sean breaks down the fundamental differences between AI (the broader field) and ML (the subset that enables systems to learn from data without explicit programming), making these concepts accessible even to those without technical backgrounds.

    The central message resonates clearly throughout: AI must be developed and employed with a secure design approach from day one. Financial institutions that implement security as an afterthought rather than a foundation will inevitably face costly remediation down the road. Sean outlines practical security considerations including data anonymization, network segmentation, intellectual property protection, and AI-specific policies that organizations should implement immediately.

    Through real-world examples from JP Morgan, Bank of America, and Capital One, we see how leading financial institutions are already leveraging AI for legal contract reviews, fraud detection, customer engagement, and risk assessment—all while implementing varying degrees of security controls to protect their systems and data.

    Looking toward the future, Sean previews emerging trends including generative AI for threat analysis, federated learning approaches, and quantum-aware AI security that will reshape financial cybersecurity within the next five years. His practical action items emphasize building multidisciplinary teams spanning AI, cybersecurity, legal and business domains to ensure comprehensive implementation.

    Whether you're a CISO at a major bank or a security professional preparing for emerging challenges, this episode provides the strategic framework needed to navigate AI implementation securely. The message is clear: investing time and resources in proper security foundations now will determine whether AI becomes your competitive advantage or your greatest vulnerability.

    Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

    Voir plus Voir moins
    31 min
  • CCT 240: Cybersecurity Documentation: Policies, Standards, and Procedures (CISSP Domain 1.7)
    Apr 28 2025

    Send us a text

    Ever wonder why organizations with robust cybersecurity teams still fall victim to devastating attacks? The answer often lies not in fancy technology but in something far more fundamental: documentation.

    In this eye-opening episode, Shon Gerber takes listeners into the critical world of cybersecurity documentation hierarchy, revealing how properly structured policies, standards, procedures, and guidelines form an organization's first and most important line of defense against threats.

    The stakes couldn't be higher. As Shon reveals, cybercriminals stole a record-breaking $6.6 billion from US entities last year - a shocking 33% increase from the previous year. Business Email Compromise alone accounted for $2.7 billion in losses, while individuals over 60 remain the most vulnerable demographic.

    What separates organizations that survive these threats from those that don't? Proper documentation that actually works rather than gathering digital dust. Shon breaks down the hierarchical relationship between different types of security documentation, providing real-world examples from healthcare and financial institutions to illustrate how these documents should build upon each other to create comprehensive protection.

    You'll learn why policies should represent management intent, standards should specify requirements, procedures should provide step-by-step guidance, and guidelines should offer flexibility - all while avoiding common pitfalls that render documentation useless. Shon provides practical advice on creating documentation that's clear, accessible, and actually used rather than just created to appease auditors.

    Whether you're preparing for the CISSP exam or working to strengthen your organization's security posture, this episode provides invaluable insights into creating documentation that transforms from a bureaucratic burden into powerful protection. Subscribe to CISSP Cyber Training for more expert guidance on mastering cybersecurity essentials and advancing your career in the field.

    Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

    Voir plus Voir moins
    50 min

Ce que les auditeurs disent de CISSP Cyber Training Podcast - CISSP Training Program

Moyenne des évaluations de clients
Au global
  • 5 out of 5 stars
  • 5 étoiles
    1
  • 4 étoiles
    0
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    0
Performance
  • 5 out of 5 stars
  • 5 étoiles
    1
  • 4 étoiles
    0
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    0
Histoire
  • 5 out of 5 stars
  • 5 étoiles
    1
  • 4 étoiles
    0
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    0

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.

Classer par :
Filtrer
  • Au global
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Histoire
    5 out of 5 stars

CISSP mindset

Super efficient, also amazing at simplifying down complex CISSP ideas. Also after a lecture he provides practice question so you can confirm whether you have understood the material or not. Another big plus is he really does cover the mindset of CISSP and provides guidance on how to interpret a question.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Vous avez donné votre avis sur cette évaluation.

Vous avez donné votre avis sur cette évaluation.