DiscoverCISSP Cyber Training Podcast - CISSP Training ProgramCCT 172: Exploring Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)
CCT 172: Exploring Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)

CCT 172: Exploring Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)

Update: 2024-09-02
Share

Description

Send us a text

What if AI could be your company's best asset—and its biggest risk? Join me, Sean Gerber, on this enlightening episode of the CISSP Cyber Training Podcast, where we journey through the essentials of cybersecurity with a particular focus on media protection techniques from Domain 7.5 of the CISSP ISC² training manual. We’ll also navigate the secure-by-design principles crucial in the age of artificial intelligence. With AI transforming large enterprises, I’ll share eye-opening statistics on its adoption and delve into the risks it brings, such as cloud misconfigurations leading to severe breaches. Plus, we’ll discuss the alarming rise of deepfake scams with a real-world example that shook a UK energy firm to its core.

Ever wondered how to choose the best data encryption method for your needs? This episode has got you covered! We’ll discuss various encryption techniques like AES, RSA, and ECC, and why it's essential to select the right one based on media type. Trust me, understanding key management and rotation is vital for maintaining data integrity, especially when dealing with cloud storage and third-party providers. I’ll also walk you through secure erasure methods, from the DOD 5220.22-M standard to physical destruction techniques like shredding and degaussing, ensuring your data truly becomes irretrievable.

Lastly, don’t miss our deep dive into mobile device protection. I’ll highlight the critical software and physical security measures necessary to defend your devices against threats, emphasizing the importance of regular updates and robust antivirus solutions. We’ll explore strategies for data encryption, backup, and recovery, and clarify the differences between MTBF and MTTF and their relevance to your systems. Wrapping up with the environmental factors affecting device usage and data management, this episode is packed with actionable insights to elevate your cybersecurity game. Tune in now to arm yourself with the knowledge necessary to protect your digital world!

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

CCT 172: Exploring Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)

CCT 172: Exploring Media Protection, Encryption, and Mobile Security for the CISSP (Domain 7.5)

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur