Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Technology
Health & Fitness
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/6a/9c/94/6a9c9407-325a-3fd2-5f58-a9de8ffd643c/mza_1645455800644216760.jpg/600x600bb.jpg
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
288 episodes
4 days ago
Send us a text The fastest way to lose trust is to let AI adoption outrun your governance. We open with a blunt look at AI sprawl and shadow AI—how unsanctioned tools slip past weak policies, create data exposure, and strain legacy controls—then lay out a practical path for teams that don’t have a big‑tech budget: continuous discovery via proxies or CASB‑like tools, real‑time monitoring through a trusted partner, and risk assessments that focus on business impact, not buzzwords. The goal isn’...
Show more...
Courses
Education
RSS
All content for CISSP Cyber Training Podcast - CISSP Training Program is the property of Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text The fastest way to lose trust is to let AI adoption outrun your governance. We open with a blunt look at AI sprawl and shadow AI—how unsanctioned tools slip past weak policies, create data exposure, and strain legacy controls—then lay out a practical path for teams that don’t have a big‑tech budget: continuous discovery via proxies or CASB‑like tools, real‑time monitoring through a trusted partner, and risk assessments that focus on business impact, not buzzwords. The goal isn’...
Show more...
Courses
Education
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/6a/9c/94/6a9c9407-325a-3fd2-5f58-a9de8ffd643c/mza_1645455800644216760.jpg/600x600bb.jpg
CCT 285: Practice CISSP Questions - Evaluate and Apply Security Governance Principles (Domain 1.3)
CISSP Cyber Training Podcast - CISSP Training Program
27 minutes
4 days ago
CCT 285: Practice CISSP Questions - Evaluate and Apply Security Governance Principles (Domain 1.3)
Send us a text The fastest way to lose trust is to let AI adoption outrun your governance. We open with a blunt look at AI sprawl and shadow AI—how unsanctioned tools slip past weak policies, create data exposure, and strain legacy controls—then lay out a practical path for teams that don’t have a big‑tech budget: continuous discovery via proxies or CASB‑like tools, real‑time monitoring through a trusted partner, and risk assessments that focus on business impact, not buzzwords. The goal isn’...
CISSP Cyber Training Podcast - CISSP Training Program
Send us a text The fastest way to lose trust is to let AI adoption outrun your governance. We open with a blunt look at AI sprawl and shadow AI—how unsanctioned tools slip past weak policies, create data exposure, and strain legacy controls—then lay out a practical path for teams that don’t have a big‑tech budget: continuous discovery via proxies or CASB‑like tools, real‑time monitoring through a trusted partner, and risk assessments that focus on business impact, not buzzwords. The goal isn’...