CCT 188: Applying Various Resource Protections for the CISSP Exam (Domain 7.5)
CISSP Cyber Training Podcast - CISSP Training Program - A podcast by Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
![](https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/76/0c/ab/760cabd4-ded7-c3b2-7158-8c05e3eebd39/mza_17866686741156025812.jpg/300x300bb-75.jpg)
Categories:
Send us a textReady to elevate your cybersecurity acumen and conquer the CISSP exam? Tune in to our latest episode, where we unravel the intricacies of a significant ransomware attack that exploited a supply chain vulnerability, impacting 60 US credit unions via the Citrix bleed vulnerability. This real-world scenario stresses the necessity of securing third-party relationships and maintaining a robust security posture. We shift gears to dissect Domain 7.5 of the CISSP, offering insights into...