All Episodes

Displaying 41 - 60 of 60 in total

Episode 41 — Retain and dispose of data safely with automation, approvals, and audit evidence

This episode explains data retention and disposal as lifecycle controls that reduce legal exposure, breach impact, and storage sprawl while preserving what the busines...

Episode 42 — Define recovery objectives that fit business reality: RPO, RTO, and scope decisions

This episode teaches recovery objectives as decision tools that shape how resilient your environment truly is, and how exam questions often test whether you can match ...

Episode 43 — Protect backups as high-value targets: access controls, encryption, and isolation strategy

This episode explains why backups are prime targets for attackers and how protecting them requires stronger controls than ordinary storage because backups can recreate...

Episode 44 — Prove recoverability with restore tests, integrity checks, and documented results

This episode focuses on proving recoverability, because the exam frequently distinguishes “we have backups” from “we can restore correctly under pressure.” You’ll defi...

Episode 45 — Secure the software lifecycle end-to-end: design, build, deploy, and operate safely

This episode explains securing the software lifecycle as a continuous set of controls that start at design and extend through build, deployment, and ongoing operation,...

Episode 46 — Reduce application risk by managing dependencies and patching weak components quickly

This episode focuses on dependency risk because modern applications rely on third-party libraries, frameworks, containers, and services that can introduce critical vul...

Episode 47 — Detect and remediate weaknesses with testing evidence, prioritization, and closure proof

This episode explains application and system weakness management as a lifecycle that depends on testing evidence, risk-based prioritization, and verified closure rathe...

Episode 48 — Evaluate service providers with due diligence that matches risk and criticality

This episode teaches third-party due diligence as a risk-matching exercise, because the exam often tests whether you can scale scrutiny based on the provider’s access,...

Episode 49 — Enforce provider accountability through contracts, controls, and ongoing assurance reviews

This episode explains how to enforce service provider accountability after selection, because third-party risk management fails when controls exist only during onboard...

Episode 50 — Monitor third-party risk continuously with signals, assessments, and escalation triggers

This episode focuses on continuous third-party risk monitoring, because provider posture can change quickly due to acquisitions, new products, outages, or security inc...

Episode 51 — Build awareness programs that change behavior, not just complete training requirements

This episode focuses on designing security awareness programs that produce measurable behavior change, which is often the underlying goal behind exam questions that re...

Episode 52 — Measure training effectiveness with metrics tied to real risk reduction outcomes

This episode teaches how to measure security training effectiveness in ways that connect to real risk reduction, which is what exam scenarios often want when they ask ...

Episode 53 — Reinforce skills over time with role-based focus, coaching, and timely feedback

This episode focuses on reinforcement, because durable security improvement requires repeated practice, coaching, and timely feedback rather than one-time annual train...

Episode 54 — Build incident response readiness with roles, playbooks, and communications discipline

This episode builds incident response readiness as a structured capability that can be executed under stress, which aligns with exam questions that test process clarit...

Episode 55 — Execute incident response under pressure: detection, containment, and evidence handling

This episode focuses on executing incident response under pressure, emphasizing detection confirmation, rapid containment, and careful evidence handling so actions are...

Episode 56 — Improve response capability with lessons learned and continuous program refinement

This episode explains how to improve incident response capability using lessons learned, because the exam often expects you to treat response as a program that matures...

Episode 57 — Plan penetration tests safely: scope control, rules of engagement, and reporting clarity

This episode teaches how to plan penetration tests safely and effectively, focusing on scope control, rules of engagement, and reporting clarity that protect operation...

Episode 58 — Translate pen test findings into remediation priorities and measurable control improvements

This episode focuses on turning penetration test findings into remediation priorities and measurable improvements, because the real value of testing is how it strength...

Episode 59 — Validate resilience after fixes with retesting and durable closure evidence

This final episode focuses on validating resilience after fixes, emphasizing retesting and durable closure evidence so improvements persist beyond a single remediation...

Welcome to the GIAC GCCC Audio Course

If you build, run, or defend systems for a living, you already know the truth: security isn’t one thing you do. It’s a chain of decisions—design, build, deploy, operat...

Broadcast by