DiscoverMaking Information Security Practical and Easy to Understand
Making Information Security Practical and Easy to Understand
Claim Ownership

Making Information Security Practical and Easy to Understand

Author: Yossy's Security & AI Lab _Global

Subscribed: 0Played: 0
Share

Description

This podcast shares practical insights on information security, privacy protection, corporate IT, and AI governance, based on real experience supporting small and mid-sized companies in Japan.

Topics include ISMS (ISO/IEC 27001), AIMS (AI Management Systems), incident response, and responsible AI use — all explained from an operational, in-house perspective rather than theory alone.

One unique focus of this podcast is Japan’s Privacy Mark (P-Mark), a Japanese privacy management system that is widely used in Japan but not well known internationally. In this podcast, I explain what P-Mark is,
19 Episodes
Reverse
When using AI at work,have you ever felt,“AI sounds useful, but it feels a little scary”?What if sensitive information is entered?What if AI gives wrong answers?What if we share something outside the company by mistake?In this episode, we talk about risk assessment,an important concept in AIMS (AI Management Systems).Risk assessment does not mean complex documents.It simply means:👉 Thinking in advance about what could go wrong.How are we using AI?What problems could happen?What simple controls can we put in place?When we organize risks step by step,fear becomes smaller.AI changes from something “uncertain and scary”to something “manageable and controllable.”This episode helps you feel that“If we organize risks, AI is not scary.”
As AI becomes part of daily work,questions like these often appear:If AI makes a mistake, who is responsible?Is it the staff member?Is it the company?Is it the tool or the vendor?In this episode, we explore accountability,an important concept in AIMS (AI Management Systems).Accountability does not mean legal language.It simply means:👉 Being clear about who takes responsibility.Who is the owner of AI usage?Who makes the final decision?Who explains the situation if a problem happens?When these points are clear,AI can be used more safely and confidently.This episode follows the previous topic of transparencyand helps you move from“being able to explain AI use”to“being ready to take responsibility for AI use.”If you want to use AI in a healthy and sustainable way,this episode is for you.
As AI becomes more common in the workplace,questions like these often come up:“Was this created by AI?”“How much should we explain?”In this episode, we explore transparency,a key concept in AIMS (AI Management Systems),from a practical, real-world perspective.Transparency does not mean technical explanations.It simply means being able to explain how AI is used.Where AI is usedWhere humans are involvedWho makes the final decisionBeing clear about these points builds trustboth inside and outside the organization.This episode is especially helpful if you are thinking abouthow to explain AI usage after setting internal AI rules.
AI is becoming part of everyday work.But many people feel unsure and think:“AI is useful, but is it really safe to use this way?”In this episode,I explain what AIMS (AI Management System) isin a simple and practical way.You’ll learn:What AIMS actually meansWhy companies are starting to care about ISO/IEC 42001How AIMS helps organizations use AI safely and responsiblyAIMS is not about restricting AI.It is about creating clear rules and shared responsibilityso AI can be used with confidence.This episode is a beginner-friendly introductionfor anyone who is starting to think about AI governanceor company-wide AI rules.
As AI use grows inside companies, many people start asking:“Do we need internal AI rules?”“But where should we even start?”In this episode, we build on the previous discussion about making AI risks visible,and focus on the next step:how to turn those risks into simple, practical internal AI rules.This is not about creating long or strict policies.Instead, we talk about a realistic approach for small and mid-sized companies:What kinds of AI use are acceptableWhat information should not be entered into AI toolsWho is responsible for the final decisionUsing the AIMS (AI Management System) mindset as a reference,this episode explains how to create “rules that help people act,” not rules that stop them.If you are involved in AI usage, internal controls, or information security,and feel unsure about AI rules, this episode is for you.Key message:Perfect rules are not necessary. Practical rules are.
in this episode,we talk about how to make AI risks visible in daily work.Many people use AI tools like ChatGPT or Copilot at work,but often feel unsure:“Is this safe?”“Are we using AI in the right way?”In this episode,we explain AI risk in a simple and practical way,from an information security point of view.You will learn:Where AI is being used in your workWhat kind of data is involvedWho should check AI outputsWe also introduce the basic idea of AIMS (ISO/IEC 42001)and why “visibility” is important for safe AI use.This podcast is for small and mid-sized companies,and for anyone who wants to use AI with confidence, not fear.No technical knowledge is required.Let’s take the first step toward safe and responsible AI use—together.
AIMS-02. What Is AIMS?

AIMS-02. What Is AIMS?

2026-01-0404:05

As more companies start using AI in their daily work, have you ever felt this way?“It looks useful, but… is this really okay?”In this episode, we explain what AIMS (AI Management System) is in a simple and practical way, avoiding unnecessary technical jargon as much as possible.AIMS is not a set of rules to control or restrict AI.It is a way of thinking that helps people and organizations use AI safely and responsibly.In this episode, we focus on the idea of transparency, such as:How should we explain that we are using AI?How much responsibility should humans keep?You don’t need to create perfect rules from the beginning.First, it’s enough to be able to say:“This is how we are using AI.”That alone is a very good starting point.This episode is recommended as an entry point for anyone who feels a bit uneasy about using AI at work.
In this episode,we talk about how to start using AI at workwithout breaking information security.Many people feel excited about AI,but at the same time,they feel worried or unsure.Questions like:How much can we use AI at work?Is there a risk of data leakage?What if the AI gives the wrong answer?These are very natural concerns.In this episode,I explain AI usage from an information security point of view,in a simple and practical way.This is not about technical theory.Instead,we focus on the real confusion people feelin their daily work.You will learn:What kind of information you should not input into AIWhy AI output should be treated as a reference, not an answerWhy clear usage rules are safer than banning AI completelyThis is the first episode of a series.We will slowly and gently explorehow organizations can use AI responsibly,and how we can work with AI in a safe and realistic way.If you are feeling unsure about using AI at work,this episode is a good place to start.
When you start ISMS or the Privacy Mark, it’s easy to jump into tasks like policies, documents, and risk assessments.But before that, there is one important first step.In this episode, we talk about what to do first when you’re ready to begin.The answer is simple:Find your “partners” first.You can create rules on paper, but operations only work when people move.Why “one-person security” often leads to failureHow to find supporters—even if they are not security expertsHow to involve people by starting with small conversationsHow a simple message to your manager can change the situationIf you feel like you might end up doing everything alone, this episode will give you helpful hints.
Many people in small and mid-sized companies wonder:“How do other companies handle ISMS or the Privacy Mark in real life?”In this episode, we share the real-world situation we often see in the field.This is not about finding the “perfect answer.”The key message is:“Not the perfect answer, but the best fit.”One-person security roles are commonMany companies run ISMS or P-Mark as a side taskWhat works is building a simple process step by stepOther companies’ examples are not “answers,” but “materials”If you feel stuck or unsure, this episode will help you feel more confident and calm.
Many people working in IT or administration feel this challenge:“I understand the importance of information security,but top management doesn’t seem very interested.”In this episode, we talk about how to involve executives in information security,from a practical, real-world perspective.This is not about explaining detailed rules or standards.Instead, we focus on how to speak in the language of management:Trust and reputationBusiness riskResponsibility when something goes wrongRather than “convincing” management,this episode shares tips on thinking together and creating a shared sense of responsibility.If you struggle with explaining ISMS, P-Mark, or security initiatives to executives,this episode will give you helpful hints.
“Can one IT person really handle ISMS or the Privacy Mark?”This is a very common question.In this episode,I talk about this issue from a key risk perspective: over-reliance on one person.You’ll hear about:Why running security certification alone is riskyWhat actually happens when knowledge stays with one personHow to build a more sustainable, shared security setupInformation security is not something one person should carry alone.It works best when responsibilities are shared across the organization,not concentrated in one individual.This episode is especially helpful if:You are the only IT or security person in your companyYou are worried about handover, continuity, or burnoutYou want a realistic way to run ISMS or Privacy Mark operations
Security is important —but explaining it to management is often the hardest part.In this episode,I talk about how to communicate information securityin a way that actually makes sense to executives.We cover:How to frame security as a business topicQuestions that really get management thinkingA realistic, step-by-step way to get approvalThis episode is for anyone who feels“stuck in the middle” between the field and management.
Many companies think about security certifications like ISMS or the Privacy Mark and wonder:“Isn’t this still too early for a company our size?”In this episode, Yoshida shares a practical, real-world perspective on that question.Instead of focusing on certification requirements,this episode explores:Why “too early” is often a misunderstandingWhy small and mid-sized companies can actually move fasterHow cloud and SaaS tools change security risks for everyoneWhat you can think about before certification becomes urgentThis is not about forcing certification.It’s about thinking early, calmly, and realisticallyso security doesn’t become a last-minute crisis.If you’re unsure when to start thinking about ISMS or security governance,this episode is for you.
What actually changes in a company after getting ISMS, the Privacy Mark, or PIMS?In this episode, I talk about the real changes that happen after certification,based on practical experience with ISMS, the Privacy Mark, and PIMS (ISO/IEC 27701).Getting certified does not suddenly change everything overnight.But over time, clear and meaningful changes begin to appear.For example:Less uncertainty and more confidence inside the companyClear rules and shared responsibilityIncreased trust from customers and business partnersPositive effects on hiring and company reputationInstead of listing theoretical benefits,this episode focuses on what really changes in daily operations and culture.If you are thinking about certification,or already running ISMS, the Privacy Mark, or PIMS,this episode will help you understand what comes after getting certified.
How hard are ISMS, the Privacy Mark, or PIMS in real life?In this episode, I talk about the real effort behind security and privacy certifications, based on practical experience.I often hear questions like:Can one IT person handle ISMS or the Privacy Mark?How long does it take to get certified?How much work is required to keep it running?And can you actually fail the audit?Instead of theory,this episode focuses on what companies really face in daily operations.I also explain how to think about choosing between ISMS and the Privacy Mark:ISMS is often suitable for BtoB, IT-focused, or international businessThe Privacy Mark works well for BtoC and domestic services in JapanAnd just briefly, I touch on PIMS (ISO/IEC 27701)as a possible option for companies that are considering global expansion.The goal of this episode is not to tell you what to get,but to help you build a clear way of thinking about security and privacy management.If you feel unsure or overwhelmed by ISMS, the Privacy Mark, or PIMS,this episode will give you a realistic starting point.
ISMS or the Privacy Mark — which one fits your company?In this episode, I explain the practical differences between ISMS and the Privacy Mark, especially for small and mid-sized companies in Japan.ISMS is based on an international standard and focuses on managing all types of information, including business data, IT systems, and internal documents.The Privacy Mark, on the other hand, is a Japan-only certification that focuses specifically on personal data protection, and is widely recognized in domestic B2C businesses.I also briefly introduce PIMS (ISO/IEC 27701) as an option for companies that are planning to expand globally, and explain how it works together with ISMS.Rather than talking about theory, this episode focuses on:How to think about choosing a certificationWhat kind of businesses ISMS or the Privacy Mark fit bestWhy there is no “better” certification — only a better fitThe goal is not to tell you what to get,but to help you choose a certification that matches your business and the trust you want to build.If you are unsure whether ISMS, the Privacy Mark, or PIMS is right for your company,this episode will give you a clear and realistic way to think about it.
Why do companies need ISMS or the Privacy Mark, or ISO27701 PIMS?In this episode, I talk about why information security certifications matter, not as a formality, but as a way to protect trust.Many companies start thinking about ISMS or the Privacy Mark or PIMS because of outside pressure:A client asks about security certificationOther companies already have itOr there is a vague feeling of risk around personal dataBut the real question is not“Should we get certified?”It is:“How do we protect trust in our company?”In this podcast, I share a practical, real-world perspective from working with corporate IT and information security:Who ISMS and the Privacy Mark are really forWhy company size doesn’t matter as much as people thinkHow these systems help teams act with confidence, not fearISMS and the Privacy Mark are not goals by themselves.They are tools to turn worries into actions, and actions into trust.If you’re not sure whether your company really needs them,this episode is a good place to start thinking.
When an information leak happens, many teams feel overwhelmed and don’t know where to start.Confusion and anxiety often come before clear action.In this episode, we focus on the very first step of information leakage response, explained from a small and mid-sized business perspective.This is not about technical details or scary incident stories.Instead, we talk about how to stay calm and make the right decisions when something happens.Key points in this episode:The first step is not finding the cause or assigning blameWhat matters most is organizing facts without emotionYou should not handle incidents alone — preparation starts before an incidentPerfect controls are less important than being ready to actThis episode is especially for:Corporate or admin staff who also handle IT or securityOne-person IT or security managersAnyone feeling anxious about information leakage responseThose new to ISMS or the Privacy Mark (P-Mark)“What really matters is preparation before an incident happens.”After listening, we hope you feel a little more confident and think,“Okay, I could handle this if it happened.”
Comments