PodParley PodParley
PK's Chronicles cover art

All Episodes

PK's Chronicles — 38 episodes

#
Title
1

Data Loss Prevention (DLP) – Preventing Data Leakage

2

Data Handling & Security Policies – From Classification to Enforcement

3

Data Lifecycle: From Creation to Destruction

4

Domain 2 Wrap-Up – The Asset Security Mental Model

5

Data Protection Techniques – Encryption, Masking & Tokenization

6

Privacy Roles – Data Controller vs Processor vs Subject

7

Data Retention & Privacy – Why Keeping Data Too Long Is a Risk

8

Data Security controls - How Classification drives protection

9

Data Owner vs Custodian vs User

10

The Cyber Battleground

11

The Cyber Battlefield

12

Why Data Classification Comes First

13

Stryker Cyber Disruption Hawkeye

14

Domain 1 Wrapper Episode

15

Business Impact Analysis

16

Business Continuity vs Disaster Recovery Process

17

Domain 1 Wrap Up Strong Endgame

18

ISC2 Code of Ethics

19

Being Compliant does not mean Secure

20

Polices vs Standard vs Procedure vs Guidelines

21

Risk Treatments Concept

22

Threat vs Vulnerability vs Risk

23

Governance and Management

24

Microsoft Patch Tuesday February 2026

25

CIA TRIAD Concept

26

Risk Treatment Options

27

What CISSP Really Tests: Mindset Over Memory

28

AI Governance

29

Cyber Insurance Unmasked

30

Breach Governance

31

One Control One Failure

32

Qualys Enterprise TruRisk Management Walk Through

33

ZeroTrust Unmasked

34

Securing the Core Database Security

35

Secure By Design

36

PK's CISSP Preparation Journey

37

How I cracked CISSP Exam

38

First Introduction Episode