
This show is all about cybersecurity and helping everyone understand the “why” when it comes to cybersecurity controls. We will break down cybersecurity 101 and slowly advance to more difficult and technical topics as the show progresses.
| Publishes | Twice monthly | Episodes | 10 | Founded | 6 months ago |
|---|---|---|---|---|---|
| Number of Listeners | Category | Technology | |||

Identity, Access & Authentication
• Authentication protocols (LDAP, Kerberos, SAML, OAuth2)
• Identity and Access Management (IAM)
• Least privilege, role-based access control (RBAC)
• Federation and Single Sign-On (SSO)
Network Security – Deeper Dive
• Deeper look at ports, protocols, and services
• Intro to Wireshark for packet analysis
• Firewalls: rule sets, NAT, and deep packet inspection
• IDS/IPS vs. SIEM tools – what they do and how they differ
Vulnerabilities, Exploits & Patch Management
• CVE, CVSS, and vulnerability scoring
• Exploit techniques (buffer overflows, privilege escalation)
• Patch management process in enterprise environments
• Virtual patching & compensating controls
Threat Actor Evolution
• Threat Actor Types:
• Script kiddies, criminal organizations, hacktivists, insiders
• Nation-state actors (APT groups) – motivations and tactics
• Case studies of evolving threats:
• From basic phishing → sophisticated s... more
Incident Response and Reporting
• Recognizing signs of compromise
• Steps in incident response (identify, contain, eradicate, recover)
• Role of users in reporting
• Legal and compliance considerations
Security in the Workplace
• Acceptable Use Policies (AUP), InfoSec Program and sub policies
• Device management (BYOD vs. corporate devices)
• Physical security (access control, secure areas)
• Security awareness culture
Data Protection and Privacy
• Encryption (at rest/in transit)
• Backups and data recovery
• Secure file sharing and disposal
• Privacy regulations (GDPR, HIPAA, etc.)
Basic networking: IP, DNS, ports, protocols
Firewalls and intrusion detection/prevention (IDS/IPS)
Network segmentation and zero trust principles
VPNs and secure remote access
How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.
Apple Podcasts | #168 |









Listeners, social reach, demographics and more for this podcast.
| Listeners per Episode | Gender Skew | Location | |||
|---|---|---|---|---|---|
| Interests | Professions | Age Range | |||
| Household Income | Social Media Reach | ||||
Rephonic provides a wide range of podcast stats for English Cybersecurity. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to English Cybersecurity and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.
Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for English Cybersecurity, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.
Rephonic provides comprehensive predictive audience data for English Cybersecurity, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.
To see how many followers or subscribers English Cybersecurity has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.
English Cybersecurity launched 6 months ago and published 10 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.
Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.
Rephonic pulls ratings and reviews for English Cybersecurity from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.
View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.
Rephonic provides full transcripts for episodes of English Cybersecurity. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.