PodcastsEducaciónInfosecTrain

InfosecTrain

InfosecTrain
InfosecTrain
Último episodio

1506 episodios

  • InfosecTrain

    How to Become a GRC Auditor: The Complete Roadmap 2026

    13/03/2026 | 48 min
    Is an IT Auditor just a "hacker with a clipboard"? Not even close. In a world where regulatory fines are skyrocketing and AI is rewriting the rules of governance, the role of a GRC Auditor has shifted from "ticking boxes" to becoming a critical pillar of business resilience.
    In this episode of InfosecTrain Tech Talk, we break down the complete roadmap for anyone looking to enter or level up in the world of IT Audit. We move past the jargon to explain why technical knowledge is only half the battle and why "Business Context" is the ultimate tool in an auditor's arsenal.
    What You’ll Learn in This Episode:
    The IT Audit Myth: Why IT auditing is not about penetration testing or hacking, but about providing "Assurance".

    The "Trust but Verify" Principle: How to maintain professional skepticism without being cynical.

    Root Cause Analysis: Why you should always ask "Why" five times to find the real problem.

    The Framework Overlap: Navigating ISO 27001, NIST, and SOC 2 without getting lost in the paperwork.

    Top 11 IT Risks: A deep dive into strategy, governance, and the often-overlooked CMDB (Configuration Management Database).

    The Certification Ladder: Which "C" should you chase first? Comparing CISA, CIA, CISM, and CISSP.

    🎧 Success in audit isn't just about what you find; it's about how you communicate it. Learn how to translate a technical finding into a business impact that the Board of Directors actually cares about.
    Watch the full episode on YouTube: https://www.youtube.com/watch?v=0KrocbLvlzw
  • InfosecTrain

    The CISOs Nightmare: Why 2026 is No Longer About the Hacker

    11/03/2026 | 1 h 8 min
    What keeps a CISO up at night? Hint: It’s probably not what you think. While the headlines scream about "genius hackers", the real battle in 2026 is being fought over resilience, identity, and the psychological warfare of AI-driven scams.
    In this episode of InfosecTrain Tech Talk: Real World Decoded, we sit down with seasoned risk professional Nizamuddin Khaja to peel back the curtain on the modern security leadership mindset. We move past the technical jargon to explore why cybersecurity is a "decision-making problem" rather than a "technology problem".

    Key Discussion Points:
    The Resilience Shift: Why the question is no longer "Will we be hacked?" but "How fast can we recover?"

    The Invisible Boundary: Managing the nightmare of vendor and supply chain risks in a borderless digital world.

    Human Psychology vs. Intelligence: Why even the smartest employees fall for phishing and how hackers exploit "urgency".

    The 24-Hour War Room: A CISO's step-by-step checklist for the first 24 hours of a major airline or bank breach.

    The Rise of the "Deepfake" Scam: How voice cloning and $25M impersonation frauds are changing the threat landscape.

    A Passwordless Future: Is the era of the "Secret Question" finally over?.

    🤚 Stop. Think. Act. Learn the "Verification Discipline" that every digital citizen needs to survive the next five years of AI evolution.

    Watch the full episode on YouTube: https://youtu.be/LPnlRbplGJE?si=DPHCZD6DaSpAMsKR
  • InfosecTrain

    Mastering IAPP AIGP | Roadmap to AI Governance Excellence

    09/03/2026 | 38 min
    Is AI Governance the new "must-have" for cybersecurity professionals? As AI transitions from a luxury to a corporate mandate, the need for certified experts to manage risk and compliance is skyrocketing. In this episode, we break down everything you need to know about the IAPP AIGP certification, the globally recognized gold standard for governing artificial intelligence.
    Join the experts at InfosecTrain as we navigate the intersection of AI, data privacy (GDPR), and information security. Whether you are a risk manager, a privacy officer, or a tech enthusiast, this guide provides the strategy and mindset needed to master the AIGP exam and lead in the AI-driven IT service industry.

    Inside This Episode:
    The AIGP Value Proposition: Why AIGP is becoming a de facto requirement for AI governance roles.

    Beyond the Code: Why you don’t need to be a developer to excel in AI governance.

    The Three Pillars: Understanding the critical intersection of Privacy, AI Governance, and Information Security.

    Exam Flavors & Bias: A deep dive into temporal bias, sampling bias, and how they impact regulatory compliance.

    Governance Models: Comparing Centralized, Decentralized, and Hybrid models for your organization.

    The "Black Box" Challenge: Tackling explainability and automated decision-making under GDPR.

    Pro Exam Tips: How to handle case studies and the mindset of an AI Risk Manager.

    🎧 Elevate your career with world-class training in AI, Cloud, and Cybersecurity.

    📺 Watch the full episode on YouTube: https://youtu.be/36d8ykIHbNI?si=mEIIz8rCaiYnXByK
  • InfosecTrain

    Mastering Claude AI | The Thoughtful Assistant for Research & Writing

    06/03/2026 | 54 min
    Can an AI actually help you think more clearly, not just write faster? In this episode, we dive deep into Claude AI, the powerhouse model from Anthropic that is redefining how professionals approach research and long-form content. While other tools focus on speed, Claude specializes in nuance, structured reasoning, and safety. Whether you are a researcher, a writer, or a cybersecurity professional, this session from InfosecTrain will show you how to move beyond basic prompts and unlock high-level workflows.

    Watch the full episode on YouTube: https://youtu.be/sMvv5AwWcxw?si=NI6hUZsQXMRUg_aS

    What You’ll Learn:
    The Claude Family: A breakdown of the Haiku, Sonnet, and Opus models and which one is right for your task.

    The 200k Context Window: How to "interrogate" massive documents and PDFs to synthesize complex data in seconds.

    Constitutional AI: Why Claude’s ethical framework makes it the most "trustworthy" writing partner for enterprise use.

    Workflow Mastery: Practical tips for drafting reports, refining arguments, and producing polished, professional-grade summaries.

    🎧 Stop fighting with generic AI outputs. Learn how to use Claude to become a more effective, thoughtful, and high-impact researcher.
  • InfosecTrain

    Master the CompTIA Security+ in 2026

    05/03/2026 | 1 h 34 min
    Are you ready to earn one of the most respected certifications in cybersecurity? In this episode, we break down the fundamental concepts, practical demonstrations, and exam-passing strategies for the 2026 CompTIA Security+ (SY0-701).
    We move beyond theory into practice, demonstrating how integrity is protected through MD5 hashing and how phishing attacks are launched using tools like ZFisher. We also clarify common exam pitfalls, such as the difference between tailgating and piggybacking, and why "Risk Acceptance" is often a calculated business decision rather than a security failure. Whether you're struggling with PKI architecture or trying to distinguish between MAC, DAC, and RBAC, this episode is your ultimate audio study guide.

    🔍 What You’ll Learn:
    InfoSec vs. CyberSec: Defining the boundaries between physical data protection and digital-only defense.
    The CIA Triad in Action: A practical look at Confidentiality, Integrity, and Availability and why an account lockout is actually an Availability breach.
    Classifying Controls: Distinguishing between Managerial (Policies), Operational (People), Technical (Tools), and Physical Controls.
    Non-Repudiation Explained: Why digital signatures are the courtroom equivalent of a physical signature in the digital realm.
    Tailgating vs. Piggybacking: The critical distinction between an unaware victim and a fooled victim in social engineering.
    Live Phishing Demo: Watching how attackers use ZFisher to clone social media login pages and steal credentials in real time.
    PKI & Certificates: A deep dive into Public Key Infrastructure, CSRs (Certificate Signing Requests), and the role of Certificate Authorities (CAs).
    Biometric Accuracy: Understanding FAR (False Acceptance), FRR (False Rejection), and why the CER (Crossover Error Rate) is the golden metric for accuracy.
    Risk Treatment Strategies: Navigating Avoidance, Transference, Acceptance, and Mitigation and the Reality of Residual Risk.
    Containers vs. Virtualization: Why 2026 is the year of lightweight container security and how to manage images via Docker Hub.

    🎧 CompTIA Security+ loves practical scenarios. Don't just memorize definitions; understand the 'why'. Why is a locked account an Availability issue? Why is a legacy system better mitigated than avoided? Master the logic, and the exam becomes easy.

Más podcasts de Educación

Acerca de InfosecTrain

InfosecTrain is one of the finest Security and Technology Training and Consulting organization, focusing on a range of IT Security Trainings and Information Security Services. InfosecTrain was established in the year 2016 by a team of experienced and enthusiastic professionals, who have more than 15 years of industry experience. We provide professional training, certification & consulting services related to all areas of Information Technology and Cyber Security. Website: https://www.infosectrain.com
Sitio web del podcast

Escucha InfosecTrain, BRIAN TRACY - SEMINARIO FENIX (ALTA CALIDAD) y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app
Aplicaciones
Redes sociales
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/14/2026 - 12:41:43 AM