All Episodes

Displaying 21 - 40 of 58 in total

Episode 21 — Write messages people remember and act on under real pressure

Clear written communication is a primary defensive tool during both steady-state operations and high-pressure security incidents. This episode focuses on the art of wr...

Episode 22 — Facilitate decisive meetings that resolve issues and move work forward

Meetings are often the place where security projects go to stall, and this episode provides the facilitation techniques needed to keep work moving forward. We explore ...

Episode 23 — Earn credibility and trust by modeling consistency, candor, and follow-through

Trust is the foundation of a security leader's influence, and this episode discusses how to build and maintain it through consistent professional behavior. We define i...

Episode 24 — Set direction and priorities that focus teams on measurable outcomes

Strategic direction requires more than just a destination; it requires a prioritized plan that focuses the organization’s energy on the most impactful outcomes. This s...

Episode 25 — Drive change with executive sponsorship and visible early wins

Driving organizational change is one of the most difficult tasks a security leader faces, and this episode details how to leverage executive sponsorship and early wins...

Episode 26 — Overcome resistance empathetically while defending non-negotiable standards

This episode addresses the delicate balance between maintaining high security standards and addressing the human element of organizational friction. We define empathet...

Episode 27 — Sustain momentum using cadence, recognition, and transparent progress signals

Long-term strategic success requires a commitment to sustaining momentum through consistent management cadences and the use of transparent progress signals. This sessi...

Episode 28 — Exam acronyms: quick audio reference for fast last-mile recall

The GSTRT exam and the broader field of cybersecurity strategy are dense with acronyms that can be confusing under the pressure of a timed certification attempt. This ...

Episode 29 — Ground every policy in clear, durable guiding principles that endure

Durable security policies are those built upon a foundation of core guiding principles that remain relevant even as specific technologies and threats evolve. This epis...

Episode 30 — Choose the right policy types to reduce ambiguity and rework

Not all governing documents are created equal, and this episode teaches you how to choose the right policy types to match the organization’s needs and to reduce admini...

Episode 31 — Draft clear, enforceable policies people can follow without confusion

The primary failure of many security programs is the presence of policies that are either too vague to be enforced or too complex for the workforce to follow. This epi...

Episode 32 — Define procedures that truly work in day-to-day operational realities

While policies define "what" must be done, procedures explain exactly "how" to do it, and this session focuses on creating procedures that reflect the actual operation...

Episode 33 — Standardize with practical guidelines that scale across teams and tools

Guidelines provide the flexible advice and best practices that allow a security program to scale across diverse teams and a wide variety of technical tools. This episo...

Episode 34 — Win stakeholder policy buy-in through collaboration and early validation

A security policy is only effective if it is accepted by the stakeholders who must live by its rules, making early buy-in a critical component of the governance lifecy...

Episode 35 — Validate policies pre-release using pilots, feedback, and risk checks

Before a security policy is released organization-wide, it must undergo a rigorous validation process to ensure it is technically sound and operationally viable. This ...

Episode 36 — Govern policy lifecycles with ownership, cadence, and measured accountability

Effective governance requires treating security documentation as a living asset rather than a one-time project, which is why establishing a formal policy lifecycle is ...

Episode 37 — Measure adoption and compliance with meaningful, decision-ready indicators

A policy's value is non-existent if it is not followed, making the measurement of adoption and compliance a primary duty of the security strategist. This session explo...

Episode 38 — Handle exceptions and waivers without eroding control effectiveness

In the real world of business operations, a perfect "one-size-fits-all" policy is rare, making the formal management of exceptions and waivers a critical skill for any...

Episode 39 — Audit policies for gaps and drift to restore intended outcomes

Policies can lose their effectiveness over time due to technical changes or shifting business priorities, a phenomenon known as policy drift. This episode focuses on t...

Episode 40 — Retire or refresh policies systematically to keep the corpus current

A lean and current policy corpus is far more effective than a bloated one filled with outdated rules, and this episode covers the systematic retirement and refreshing ...

Broadcast by