All Episodes
PK's Chronicles — 38 episodes
Data Loss Prevention (DLP) – Preventing Data Leakage
Data Handling & Security Policies – From Classification to Enforcement
Data Lifecycle: From Creation to Destruction
Domain 2 Wrap-Up – The Asset Security Mental Model
Data Protection Techniques – Encryption, Masking & Tokenization
Privacy Roles – Data Controller vs Processor vs Subject
Data Retention & Privacy – Why Keeping Data Too Long Is a Risk
Data Security controls - How Classification drives protection
Data Owner vs Custodian vs User
The Cyber Battleground
The Cyber Battlefield
Why Data Classification Comes First
Stryker Cyber Disruption Hawkeye
Domain 1 Wrapper Episode
Business Impact Analysis
Business Continuity vs Disaster Recovery Process
Domain 1 Wrap Up Strong Endgame
ISC2 Code of Ethics
Being Compliant does not mean Secure
Polices vs Standard vs Procedure vs Guidelines
Risk Treatments Concept
Threat vs Vulnerability vs Risk
Governance and Management
Microsoft Patch Tuesday February 2026
CIA TRIAD Concept
Risk Treatment Options
What CISSP Really Tests: Mindset Over Memory
AI Governance
Cyber Insurance Unmasked
Breach Governance
One Control One Failure
Qualys Enterprise TruRisk Management Walk Through
ZeroTrust Unmasked
Securing the Core Database Security
Secure By Design
PK's CISSP Preparation Journey
How I cracked CISSP Exam
First Introduction Episode