Certified: The ISC(2) CGRC Audio Course

Varighed i alt:9 h 49 min
Welcome to Certified: The ISC(2) CGRC Audio Course
Certified: The ISC(2) CGRC Audio Course
01:00
Episode 1 — Official ISC2 CGRC Exam Outline June 15, 2024: Format, Scoring, Policies
Certified: The ISC(2) CGRC Audio Course
15:46
Episode 2 — Spoken Audio-Only Study Plan for CGRC: Timeboxing, Sequencing, and Retention
Certified: The ISC(2) CGRC Audio Course
14:29
Episode 3 — Exam-Day Tactics for CGRC: Mental Models, Pacing, and Elimination Strategy
Certified: The ISC(2) CGRC Audio Course
14:45
Episode 4 — Master Governance, Risk Management, and Compliance Principles for Security Programs
Certified: The ISC(2) CGRC Audio Course
14:52
Episode 5 — Align Security and Privacy Governance With Organizational Objectives and Integrity
Certified: The ISC(2) CGRC Audio Course
14:24
Episode 6 — Compare Risk Frameworks Using NIST, COBIT, and ISO/IEC Without Confusion
Certified: The ISC(2) CGRC Audio Course
15:53
Episode 7 — Operationalize Compliance Frameworks Using Standards, Guidelines, and Mandates
Certified: The ISC(2) CGRC Audio Course
16:03
Episode 8 — Walk the SDLC With Security and Privacy Integrated at Every Stage
Certified: The ISC(2) CGRC Audio Course
16:09
Episode 9 — Translate Requirements Gathering Into Security and Privacy Controls That Stick
Certified: The ISC(2) CGRC Audio Course
15:01
Episode 10 — Track Information Lifecycles: Retention, Disposal, Destruction, and Data Flow
Certified: The ISC(2) CGRC Audio Course
14:16
Episode 11 — Apply Marking and Handling Rules to Each Data Type End-to-End
Certified: The ISC(2) CGRC Audio Course
17:33
Episode 12 — Balance Confidentiality, Integrity, Availability, Non-Repudiation, and Privacy Tradeoffs
Certified: The ISC(2) CGRC Audio Course
19:22
Episode 13 — Define System Assets and Boundaries to Prevent Hidden Scope and Risk
Certified: The ISC(2) CGRC Audio Course
15:44
Episode 14 — Understand Security and Privacy Control Categories and Requirement Drivers
Certified: The ISC(2) CGRC Audio Course
18:12
Episode 15 — Assign Roles and Responsibilities for Compliance Activities With Clear Ownership
Certified: The ISC(2) CGRC Audio Course
18:11
Episode 16 — Establish a Compliance Program for the Applicable Framework From Scratch
Certified: The ISC(2) CGRC Audio Course
16:02
Episode 17 — Interpret ISO/IEC, FedRAMP, PCI DSS, and CMMC Without Overreach
Certified: The ISC(2) CGRC Audio Course
16:10
Episode 18 — Navigate FISMA, HIPAA, Executive Orders, and GDPR Security-Privacy Expectations
Certified: The ISC(2) CGRC Audio Course
17:39
Episode 19 — Describe the System Precisely: Name, Scope, Purpose, and Functionality
Certified: The ISC(2) CGRC Audio Course
20:40
Episode 20 — Document System Scope So Interconnections and Dependencies Don’t Surprise You
Certified: The ISC(2) CGRC Audio Course
17:57
Episode 21 — Identify Information Types Processed, Stored, and Transmitted With Confidence
Certified: The ISC(2) CGRC Audio Course
14:51
Episode 22 — Define Security Objectives per Information Type Using FIPS and ISO/IEC Logic
Certified: The ISC(2) CGRC Audio Course
14:13
Episode 23 — Incorporate Privacy Compliance Requirements Into Security Objectives Without Mixing Terms
Certified: The ISC(2) CGRC Audio Course
15:48
Episode 24 — Determine System Risk Impact Level Using the Selected Framework’s Rules
Certified: The ISC(2) CGRC Audio Course
14:05
Episode 25 — Identify Baseline Controls and Explain Why They Exist in the Framework
Certified: The ISC(2) CGRC Audio Course
14:21
Episode 26 — Document Inherited Controls Clearly Across Shared Services and Common Environments
Certified: The ISC(2) CGRC Audio Course
13:10
Episode 27 — Determine Applicability of Baseline and Inherited Controls Without Double-Counting
Certified: The ISC(2) CGRC Audio Course
12:26
Episode 28 — Tailor Controls to System Context While Preserving Framework Intent and Traceability
Certified: The ISC(2) CGRC Audio Course
12:28
Episode 29 — Select Control Enhancements Using Overlays, Security Practices, and Mitigating Controls
Certified: The ISC(2) CGRC Audio Course
12:37
Episode 30 — Identify Data Handling and Marking Requirements That Drive Control Choices
Certified: The ISC(2) CGRC Audio Course
12:29
Episode 31 — Write Control Selection Documentation That Is Testable, Defensible, and Complete
Certified: The ISC(2) CGRC Audio Course
15:01
Episode 32 — Design Continued Compliance Strategy Using Continuous Monitoring and Vulnerability Management
Certified: The ISC(2) CGRC Audio Course
14:03
Episode 33 — Allocate Controls Across Owners and Secure Stakeholder Agreement Without Gaps
Certified: The ISC(2) CGRC Audio Course
12:27
Episode 34 — Design an Implementation Strategy: Resourcing, Funding, Timeline, and Effectiveness Measures
Certified: The ISC(2) CGRC Audio Course
12:56
Episode 35 — Align Control Implementation With Organizational Expectations and Compliance Requirements
Certified: The ISC(2) CGRC Audio Course
12:12
Episode 36 — Identify Control Types: Management, Technical, Common, and Operational Controls
Certified: The ISC(2) CGRC Audio Course
12:01
Episode 37 — Set Frequency for Documentation Reviews and Training That Meets Requirements
Certified: The ISC(2) CGRC Audio Course
12:02
Episode 38 — Implement Selected Controls Consistently With the Chosen Compliance Baseline
Certified: The ISC(2) CGRC Audio Course
18:12
Episode 39 — Implement Compensating and Alternate Controls Without Breaking Compliance Intent
Certified: The ISC(2) CGRC Audio Course
13:44