Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/3a/fe/76/3afe76f7-ce2b-7984-fd14-84dcfa90a390/mza_10838360102750420844.jpg/600x600bb.jpg
The Art of Cybersecurity: Real-World Risk & Compliance Strategies
Cheri Hotman
25 episodes
4 days ago
Cybersecurity is as much art as it is science or technology. It must be creatively designed, right-sized, implemented, and sustained—all within stealthy constraints: finite time, budget, resources. Meanwhile, customers demand this framework, that standard, and yet another security questionnaire. It’s a lot to juggle—balancing security that genuinely protects people and data with the theater that often slips into meaningless checkbox exercises. On this podcast, expect sharp, unfiltered conversations about the realities of cyber and what it truly takes to do it right—and make it actually matter.
Show more...
Technology
RSS
All content for The Art of Cybersecurity: Real-World Risk & Compliance Strategies is the property of Cheri Hotman and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cybersecurity is as much art as it is science or technology. It must be creatively designed, right-sized, implemented, and sustained—all within stealthy constraints: finite time, budget, resources. Meanwhile, customers demand this framework, that standard, and yet another security questionnaire. It’s a lot to juggle—balancing security that genuinely protects people and data with the theater that often slips into meaningless checkbox exercises. On this podcast, expect sharp, unfiltered conversations about the realities of cyber and what it truly takes to do it right—and make it actually matter.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/23016454/23016454-1748045604265-4e804e92cef1c.jpg
Beyond the Checklist CMMC with Integrity
The Art of Cybersecurity: Real-World Risk & Compliance Strategies
36 minutes 37 seconds
1 month ago
Beyond the Checklist CMMC with Integrity

In this episode, Cheri Hotman unpacks the real story behind CMMC—and why it’s far more than a compliance checklist. Drawing on highlights from her recent Dallas talk, Cheri emphasizes that passing an audit is never the end goal. Instead, CMMC is about protecting sensitive government data, earning customer trust, and building integrity into every layer of your security program.

Cheri breaks down the biggest pitfalls she sees—like over- or under-scoping, documentation theater, and trying to “DIY” without the right expertise. She shares why companies must approach CMMC as an ongoing cycle of protection, monitoring, and improvement—not a one-time project.

If you’re navigating CMMC, you’ll walk away with:

  • Clear insight into what the DoD really expects (hint: it’s not just a perfect score).

  • Strategies to scope effectively and avoid wasted effort.

  • How to balance third-party support with true internal ownership.

  • The importance of building trust and integrity over “just passing.”

CMMC is a chance to strengthen your security posture and stand out in the market—don’t miss it.

The Art of Cybersecurity: Real-World Risk & Compliance Strategies
Cybersecurity is as much art as it is science or technology. It must be creatively designed, right-sized, implemented, and sustained—all within stealthy constraints: finite time, budget, resources. Meanwhile, customers demand this framework, that standard, and yet another security questionnaire. It’s a lot to juggle—balancing security that genuinely protects people and data with the theater that often slips into meaningless checkbox exercises. On this podcast, expect sharp, unfiltered conversations about the realities of cyber and what it truly takes to do it right—and make it actually matter.