allfeeds.ai

 

CISSP Cyber Training Podcast - CISSP Training Program  

CISSP Cyber Training Podcast - CISSP Training Program

Author: Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable security strategies and tips that you can implement right away, giving you an edge in the cybersecurity realm. Tune in and take the reins of your cybersecurity journeylets ride into excellence together!
Be a guest on this podcast

Language: en

Genres: Courses, Education

Contact email: Get it

Feed URL: Get it

iTunes ID: Get it


Get all podcast data

Listen Now...

CCT 342: US Govt and Mythos - CISSP EOL-EOS - Board Translation - Segment 1
Episode 342
Monday, 20 April, 2026

Send us Fan MailThe next wave of AI in cybersecurity is not a theory project, it’s an operational deadline. I open with a timely look at reporting that the White House wants federal agencies to get access to Anthropic’s Claude Mythos, and why that scramble matters for every security team. If Mythos can help uncover vulnerabilities and accelerate exploit development, the same capability that strengthens defense can also supercharge attackers. We talk about why the government wants guardrails, why supply chain risk becomes a bigger deal, and why the gap between AI leaders may be measured in months, not years.From there, I shift into practical CISSP Domain 2.5 fundamentals: appropriate asset retention, end of life, and end of support. We walk through what “end of life” really means, why unsupported systems become high-value targets, and how to build a real end-of-life process with asset inventory, sunsetting plans, data migration, continuity planning, and secure disposal. I also share why documentation isn’t busywork, especially when legal hold and chain of custody can block normal modernization efforts, and how retention policies can reduce both compliance exposure and litigation risk.Finally, I kick off a boardroom cybersecurity series built for senior security professionals and aspiring CISOs. The core idea is simple: boards don’t make decisions in CVSS scores or alert counts, they make decisions in revenue impact, downtime, safety, and recovery time. I explain how to translate technical risk into business language, what boards actually want to know, and how strong executive communication turns a security leader into a strategic advisor. Subscribe, share this with a teammate, and leave a review so more CISSP and cybersecurity leaders can find the show.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox!  Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!

 

We also recommend:


English Everywhere(Work Chat Video)
RTHK.HK

Baird Tech Bytes
Charles Rocha

PlanPlus_Online_Training_by_Dave
keithc17

Working and Learning In Sport and Fitness - for iPad/Mac/PC
The Open University

Exploring oak woodland - for iPod/iPhone
The Open University

Mindy Body Connection (Video)
UCTV

Cirque et Jonglages
Philippe Bouzonnet

the movie
the Movie

Parlons Web

Catholic Youth Ministry Podcast
Edmund Mitchell

Lyric Life
Mark Scarbrough