Certified: The CISSP Prepcast

Welcome to The Bare Metal Cyber CISSP Prepcast — your essential guide to mastering the CISSP certification. Whether you're just starting your cybersecurity journey or preparing for exam day, this podcast delivers expert insights, practical strategies, and clear explanations to help you succeed. Designed by professionals who’ve walked the path, each episode helps you build confidence, sharpen your skills, and move one step closer to certification success.

Episode 1: What Is the CISSP and Why It Matters

In this foundational episode, we introduce the Certified Information Systems Security Professional—better known as the CISSP. You’ll learn what the certification represents, who it’s designed for, and why it continues to be considered the gold standard for cybersecurity professionals around the world. We explore how the CISSP stands apart from other security credentials, what it proves about your skills, and how it fits into the broader cybersecurity career ecosystem. Whether you’re pursuing technical leadership, governance, or executive-level roles, understanding the CISSP’s value is the first step toward strategic career development.

06-22
10:16

Episode 2: CISSP vs. Other Certifications: Which One’s Right for You?

Choosing the right cybersecurity certification can shape your career for years to come. In this episode, we compare the CISSP to other well-known certifications including CompTIA Security+, CISM, CRISC, and CEH. We examine how these credentials differ in focus, experience level, and strategic alignment—helping you understand which path fits your background and goals. Whether you're looking for a technical launchpad or a management-level credential, this discussion highlights where the CISSP stands in the broader certification landscape and how it fits into a layered learning and professional development plan.

06-22
10:05

Episode 3: Career Impact of the CISSP: Roles, Salaries, Growth

The CISSP isn’t just a certification—it’s a powerful career accelerator. This episode breaks down how earning your CISSP can open doors to high-level roles, raise your earning potential, and give you access to new leadership opportunities in the cybersecurity field. We cover the types of positions typically held by CISSP-certified professionals, explore industry data on salary trends, and discuss how employers view this credential during the hiring process. If you're wondering whether the CISSP is worth the investment, this episode lays out the tangible career benefits that come with certification.

06-22
10:00

Episode 4: How to Study and Pass the CISSP Exam: Resources and Mindset

Success on the CISSP exam requires more than memorizing facts—it takes a strategy, the right materials, and a focused mindset. In this episode, we walk through the most effective ways to prepare for the test, from selecting the right books and practice exams to choosing between self-paced and instructor-led training. We also talk about managing study timelines, pacing your progress, and mentally preparing for the adaptive test environment. If you're committed to passing the CISSP on your first attempt, this episode will give you the tools and confidence to build a structured and effective study plan.

06-22
09:23

Episode 5: The CIA Triad: Confidentiality, Integrity, Availability

Every cybersecurity professional must understand the CIA triad—confidentiality, integrity, and availability. These three pillars form the core of nearly every security strategy, policy, and control. In this episode, we break down what each term means, how they apply to real-world environments, and why balancing them is critical to risk management. You’ll learn how breaches in confidentiality, corruption of data integrity, or denial of availability can disrupt business operations and violate trust. This foundational concept is essential for mastering other topics across the CISSP domains.

06-22
10:52

Episode 6: Security Governance Principles: Frameworks and Strategy

Governance gives structure and direction to an organization’s cybersecurity efforts. In this episode, we explore what it means to build a security strategy aligned with business goals, risk appetite, and compliance obligations. You’ll learn about common governance frameworks such as NIST, ISO, and COBIT, and how they guide policy creation, control selection, and program management. We also discuss the importance of leadership involvement, accountability, and communication when establishing effective governance. Mastering these principles is key for any cybersecurity leader working at the strategic level.

06-22
11:17

Episode 7: Compliance Requirements: Legal, Regulatory, Contractual

Cybersecurity professionals must navigate a complex landscape of compliance obligations. This episode explains the differences between legal, regulatory, and contractual requirements, and how they impact your organization’s security posture. From privacy laws like GDPR and CCPA to industry frameworks such as HIPAA, PCI-DSS, and SOX, we explore what it takes to build and maintain compliance. We also address contractual security obligations that arise in third-party agreements. If you’re preparing for CISSP exam questions related to governance, law, and regulation, this episode provides critical clarity.

06-22
11:03

Episode 8: Organizational Roles and Responsibilities

Security is not the job of a single person or department—it’s a shared responsibility across the organization. In this episode, we examine the roles of executives, managers, security teams, end users, and third-party stakeholders in protecting assets and managing risk. You’ll learn about role-based access, segregation of duties, the function of a CISO, and the interplay between business units and IT. Understanding how responsibilities are distributed is essential for implementing effective governance, managing incidents, and ensuring organizational accountability.

06-22
11:12

Episode 9: Professional Ethics and (ISC)² Code of Ethics

Ethics are the backbone of trust in the cybersecurity profession. This episode explores the professional responsibilities outlined in the ISC² Code of Ethics, including the duty to protect society, act honorably, provide competent service, and advance the profession. We explain how these ethical canons apply to real-world decision-making and the consequences of ethical violations. As a CISSP candidate, demonstrating ethical judgment isn’t just part of the exam—it’s a lifelong obligation. This episode lays the ethical foundation for your professional conduct in and beyond the certification.

06-22
10:25

Episode 10: Risk Management Concepts: Threats, Vulnerabilities, Risk

Risk management is a cornerstone of cybersecurity, and this episode introduces the essential vocabulary and concepts you need to know. We define threats, vulnerabilities, likelihood, impact, and risk—and show how these elements interact in both assessments and real-world decision-making. You’ll also hear how organizations use risk tolerance and acceptance to prioritize controls and allocate resources. By mastering these fundamentals, you’ll be equipped to approach risk-based questions on the CISSP exam and to contribute to sound security decisions in your career.

06-22
10:53

Episode 11: Risk Response and Risk Appetite

Once a risk is identified and assessed, the next critical step is determining how to respond. In this episode, we examine the four primary risk response strategies: risk avoidance, risk mitigation, risk transference, and risk acceptance. We also clarify the concepts of risk appetite and risk tolerance, and how organizations use these to shape their security policies and control decisions. You'll learn how business objectives, regulatory pressure, and operational needs influence how much risk an organization is willing to take. Understanding these principles enables security professionals to align cybersecurity decisions with broader business goals.

06-22
11:28

Episode 12: Business Continuity Planning (BCP) Fundamentals

Business Continuity Planning, or BCP, is essential for maintaining operations during unexpected disruptions. This episode explores the key elements of a successful BCP strategy, including risk identification, business impact analysis, and recovery planning. We discuss how organizations determine critical functions, establish recovery priorities, and ensure that people, systems, and processes can recover efficiently. You’ll also learn the difference between BCP and disaster recovery, and why both are necessary for resilience. Mastering BCP concepts not only prepares you for the CISSP exam but helps you contribute to real-world continuity efforts.

06-22
10:44

Episode 13: Disaster Recovery Planning (DRP) and Continuity of Operations

Disaster Recovery Planning is a focused component of business continuity that addresses the rapid restoration of IT infrastructure and systems. In this episode, we explore how DRP helps organizations bounce back after major incidents such as natural disasters, cyberattacks, or system failures. You'll learn about recovery time objectives (RTOs), recovery point objectives (RPOs), and different recovery site strategies like hot, warm, and cold sites. We also explain how DRP integrates with continuity of operations to ensure both technology and essential services remain functional. This episode equips you with tools for designing robust recovery capabilities.

06-22
10:32

Episode 14: Security Policies, Standards, Procedures, and Guidelines

A strong cybersecurity program is built on clear and well-documented policies. In this episode, we break down the four foundational types of documentation: policies, standards, procedures, and guidelines. You'll learn how each plays a role in setting expectations, enforcing controls, and guiding behavior. We also explain who creates these documents, how they’re maintained, and why they matter for regulatory compliance and security culture. Understanding this documentation hierarchy is crucial for exam success and for implementing effective, enforceable cybersecurity programs in any organization.

06-22
10:23

Episode 15: Personnel Security: Background Checks, Policies, Termination

People are often the weakest link in cybersecurity, and managing personnel risk is a critical responsibility. In this episode, we discuss best practices for pre-employment screening, including background checks and reference validation. We also explore how organizations use security policies to govern employee behavior and set expectations for acceptable use, confidentiality, and compliance. Finally, we walk through secure termination processes that include revoking access, conducting exit interviews, and managing offboarding. Understanding the human side of cybersecurity is essential for risk reduction, especially in enterprise environments.

06-22
10:14

Episode 16: Security Awareness and Training Programs

Even the best technical defenses can fail if employees don’t understand their security responsibilities. This episode focuses on the development and delivery of effective security awareness and training programs. We explore how to tailor content for different roles, choose the right delivery formats, and measure effectiveness through assessments and behavioral monitoring. You’ll also learn how awareness programs support compliance and reduce risks such as phishing, social engineering, and insider threats. CISSP professionals must not only understand awareness programs but often play a key role in designing and leading them.

06-22
09:39

Episode 17: Third-Party Risk Management

Today’s organizations rely heavily on vendors, contractors, and service providers—but each relationship introduces potential risks. In this episode, we cover the principles of third-party risk management, including due diligence, contractual controls, and ongoing monitoring. You’ll learn how to assess a vendor’s security posture, enforce security requirements through service-level agreements (SLAs), and respond when third-party weaknesses are discovered. This topic is increasingly important as supply chain attacks and vendor-based breaches become more common. Managing third-party risk is a core responsibility for any CISSP-certified leader.

06-22
10:14

Episode 18: Supply Chain Risk and Due Diligence

Supply chains extend far beyond traditional logistics—they now include digital components, cloud providers, software dependencies, and more. This episode explores how cyber threats enter through the supply chain and what due diligence processes are needed to prevent compromise. We discuss methods for evaluating supply chain partners, setting clear security expectations, and responding to incidents that originate outside your direct control. By understanding the dynamics of modern supply chain risk, CISSP candidates will be better prepared to assess and secure the full ecosystem surrounding their organization’s operations.

06-22
11:10

Episode 19: Privacy Principles and Data Protection (GDPR, CCPA)

Protecting personal data is not just a compliance requirement—it’s a trust imperative. In this episode, we dive into key privacy principles such as data minimization, purpose limitation, and transparency. You’ll learn how regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) define privacy obligations and empower individuals with rights over their data. We also cover how organizations can embed privacy by design into their systems and policies. A solid grasp of privacy principles is vital for anyone working in security governance, policy, or legal alignment roles.

06-22
09:57

Episode 20: Intellectual Property and Licensing Laws

Cybersecurity professionals must understand how to protect not only data but also intellectual property. This episode unpacks the key types of intellectual property—copyrights, trademarks, patents, and trade secrets—and how they apply in the digital world. We also examine licensing models for software and content, including open-source and proprietary agreements. Understanding the legal landscape helps prevent accidental infringement and supports secure software procurement, asset management, and contract design. CISSPs are often called upon to advise on or enforce policies around intellectual property and licensing compliance.

06-22
10:37

Recommend Channels