CISSP Cyber Training Podcast - CISSP Training Program

CCT 320: OT Attacks And CISSP Domain 6.4 Essentials


Listen Later

Send us a text

What happens when custom malware turns IoT into a springboard for OT, and gas pumps become levers for panic? We open with a timely look at Iranian-linked operations targeting PLCs and use that story to ground a full, practical tour of CISSP Domain 6.4: how to analyze scan output and generate reports that actually drive action.

We break down the anatomy of a high-value vulnerability report—clean executive summaries, CVE and CVSS clarity, and the business context that separates theoretical risk from real-world impact. From there, we map a repeatable cadence for internal scans full of misconfigurations, default creds, and end-of-life software, plus a strategy to turn noisy findings into steady wins through prioritization, trend metrics, and small, fast fixes that build momentum.

On the perimeter, we focus on external scans across web apps, APIs, cloud edges, and third parties. You’ll hear hard-earned tactics for handling M&A exposure, vendor VPNs, misconfigured buckets, and certificate drift without breaking production. We share validation steps that avoid false positives and chaos in prod, then show how to formalize exceptions with risk assessments, compensating controls, and an auditable register that satisfies PCI DSS, HIPAA, SOX, and GDPR expectations.

We close with ethical disclosure done right—timelines, ISO/IEC 29147 alignment, and when to coordinate versus publish—so you protect users and your organization without stepping into legal traps. If you’re studying for the CISSP or building a vulnerability management program that survives contact with reality, this guide will help you prioritize what matters, communicate clearly, and keep improving.

Enjoyed the show? Subscribe, share with a teammate, and leave a quick review so others can find it. Tell us: what metric best proves your remediation progress?

Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.

Join now and start your journey toward CISSP mastery today!

...more
View all episodesView all episodes
Download on the App Store

CISSP Cyber Training Podcast - CISSP Training ProgramBy Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

  • 4.5
  • 4.5
  • 4.5
  • 4.5
  • 4.5

4.5

33 ratings


More shows like CISSP Cyber Training Podcast - CISSP Training Program

View all
Stuff You Should Know by iHeartPodcasts

Stuff You Should Know

78,845 Listeners

TED Talks Daily by TED

TED Talks Daily

11,213 Listeners

The Ben Shapiro Show by The Daily Wire

The Ben Shapiro Show

154,092 Listeners

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

369 Listeners

Software Engineering Daily by Software Engineering Daily

Software Engineering Daily

624 Listeners

Risky Business by Patrick Gray

Risky Business

374 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,035 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,119 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

178 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

191 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

138 Listeners

The AI Daily Brief: Artificial Intelligence News and Analysis by Nathaniel Whittemore

The AI Daily Brief: Artificial Intelligence News and Analysis

645 Listeners

Reduce Cyber Risk Podcast - Cyber Security Made Simple by Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur

Reduce Cyber Risk Podcast - Cyber Security Made Simple

0 Listeners