All Episodes

Displaying 1 - 20 of 147 in total

Episode 1 — Foundations — Why NIST 800-53 still anchors real programs

NIST Special Publication 800-53 remains the cornerstone of modern cybersecurity compliance because it provides a unified control catalog that integrates security and p...

Episode 2 — Baselines and Overlays — Tailoring you can defend

Baselines and overlays within NIST 800-53 define how control selections scale across systems of differing impact levels and mission contexts. Baselines represent the s...

Episode 3 — Scoping and Inheritance — Boundaries, providers, and proofs

Scoping and inheritance define where responsibility begins and ends within a system authorization boundary. In NIST 800-53, scoping determines which controls apply to ...

Episode 4 — Parameters and ODPs — Making controls fit your system

Parameters and organizationally defined parameters, or ODPs, give NIST 800-53 its flexibility by allowing organizations to specify how controls apply in their particul...

Episode 5 — Roles and Artifacts — SSP, SAP, SAR, and POA&M that agree

Every NIST 800-53 program depends on clear roles and aligned artifacts. The System Security Plan (SSP) documents control implementation, the Security Assessment Plan (...

Episode 6 — Evidence — Definitions, sufficiency, and traceability

Evidence in the NIST 800-53 framework forms the backbone of any credible assessment or authorization decision. It verifies that controls are not only documented but fu...

Episode 7 — Sampling — Populations, periods, and selection logic

Sampling enables assessors and auditors to test representative subsets of evidence without examining every instance, saving time while maintaining confidence in contro...

Episode 8 — Continuous Monitoring — Cadence, triggers, and tiles

Continuous monitoring within the NIST 800-53 program extends the assessment process beyond the authorization decision, transforming security into an ongoing management...

Episode 9 — Metrics — Choosing numbers that drive action

Metrics transform control performance into measurable insights that inform management and improvement. In the NIST 800-53 context, metrics should align with organizati...

Episode 10 — Tailoring Workflow — From assumption to parameter

Tailoring in NIST 800-53 refers to the process of adjusting control sets to fit specific system missions, environments, and technologies while maintaining defensibilit...

Episode 11 — Documentation Quality — Narratives that survive scrutiny

In NIST 800-53 programs, documentation quality directly determines how well an organization can defend its security posture during assessments. The System Security Pla...

Episode 12 — Always-Ready Rhythm — Updates, reviews, and renewals

An always-ready rhythm ensures that security documentation, control performance, and risk posture remain current without waiting for formal assessments. NIST 800-53 pr...

Episode 13 — Access Control — Part One: Principles, risks, and outcomes

Access control defines how organizations enforce the principle of least privilege and protect information from unauthorized use or disclosure. Within NIST 800-53, this...

Episode 14 — Access Control — Part Two: Implementation patterns and guardrails

Implementation of access control requires balancing usability with enforcement strength. NIST 800-53 outlines patterns that include mandatory, discretionary, and role-...

Episode 15 — Access Control — Part Three: Evidence, reviews, and pitfalls

Evidence in the access control domain confirms that permissions are granted appropriately and reviewed regularly. For NIST 800-53, this involves maintaining records su...

Episode 16 — Access Control — Part Four: Advanced topics and metrics

Advanced access control concepts expand from traditional identity enforcement into dynamic, context-aware decision-making. Within NIST 800-53, advanced patterns includ...

Episode 17 — Identification and Authentication — Part One: Authentication goals and threats

Identification and authentication underpin every security boundary. In NIST 800-53, this control family ensures that entities prove who they are before being granted a...

Episode 18 — Identification and Authentication — Part Two: Implementation patterns and enrollment

Implementing identification and authentication within NIST 800-53 involves lifecycle management, from identity proofing to credential issuance, renewal, and revocation...

Episode 19 — Identification and Authentication — Part Three: Evidence across the credential lifecycle

Evidence for identification and authentication controls demonstrates that identity verification, credential issuance, and periodic validation occur as designed. For th...

Episode 20 — Identification and Authentication — Part Four: Advanced topics and metrics

Advanced identification and authentication approaches align with zero trust architectures, emphasizing continuous validation rather than one-time login events. For exa...

Broadcast by