Cybersecurity, GRC & SOC 2 Essentials

Follow Cybersecurity, GRC & SOC 2 Essentials
Share on
Copy link to clipboard

Cheri is a vCISO on a mission to simplify cybersecurity and SOC 2 so companies have what they need to make strategic decisions around implementing the right solutions, not too much and not too little. She sees a lot of "noise" in the marketplace around cy

Cheri Hotman


    • Dec 12, 2025 LATEST EPISODE
    • monthly NEW EPISODES
    • 15m AVG DURATION
    • 27 EPISODES


    Search for episodes from Cybersecurity, GRC & SOC 2 Essentials with a specific topic:

    Latest episodes from Cybersecurity, GRC & SOC 2 Essentials

    From CPA to Cyber Leader: Seeing the Whole Business

    Play Episode Listen Later Dec 12, 2025 55:22


    In this episode, Cheri Hotman sits down with Joe Kodali, a fellow CPA turned cybersecurity and GRC leader, to have a blunt, practitioner-level conversation about what is actually broken in modern cybersecurity programs and why compliance theater is making organizations less secure, not more.They unpack the unique value CPAs bring to cybersecurity, not because of accounting, but because of how auditors are trained to understand entire businesses, ask uncomfortable questions, and tie controls back to real risk and return on investment. From there, the discussion goes deep into the widening gap between executives and cyber teams, the failure of checkbox audits, and how GRC tools and low-quality SOC 2 practices have created a dangerous false sense of security.Cheri and Joe challenge the industry's obsession with compliance over governance and risk, calling out poor scoping, copy-paste controls, and the misuse of frameworks that were never meant to be treated as templates. They also address the hard truth that tools do not fix broken programs, people and discipline do.The conversation closes with a candid discussion on why governance is the most overlooked and undervalued part of GRC, how boards should be asking better questions, and what it actually takes to build a cyber program that protects the business rather than just passing audits.This episode is required listening for CISOs, security leaders, GRC practitioners, auditors, and executives who want real security outcomes instead of green checkmarks.

    Inside CMMC: The Real Challenges, the Real Stakes, and the Real Work

    Play Episode Listen Later Dec 11, 2025 49:09


    In this episode, Cheri Hotman sits down with CMMC expert and strategist Linda Rust for a direct, unscripted conversation about what CMMC really means for defense contractors, why so many organizations get it wrong, and how leaders can approach compliance with clarity instead of chaos.Linda brings more than 25 years of engineering and mission-critical technology leadership to the table. She breaks down why CMMC is fundamentally a business issue rather than an IT project, why third-party accountability is often the only thing that finally moves organizations to action, and why “cheap” approaches end up being the most expensive mistakes companies make.Cheri and Linda dig into:• What CMMC is (and isn't)• Why scoping and understanding your data matters more than any technical control• Why leadership, not IT, must own the strategy• The real cost drivers behind CMMC and why labor—not tools—is the biggest factor• How small companies get themselves into false-claims trouble without realizing it• What's coming next with FAR CUI and NIST 800-171 Revision 3• How organizations can right-size their efforts instead of chasing shortcutsIf you want a frank, practical explanation of CMMC from two people who have lived it for years, this episode will help you understand the landscape, avoid costly pitfalls, and build a program that leaders can actually sustain.

    Beyond the Checklist CMMC with Integrity

    Play Episode Listen Later Sep 24, 2025 36:37


    In this episode, Cheri Hotman unpacks the real story behind CMMC—and why it's far more than a compliance checklist. Drawing on highlights from her recent Dallas talk, Cheri emphasizes that passing an audit is never the end goal. Instead, CMMC is about protecting sensitive government data, earning customer trust, and building integrity into every layer of your security program.Cheri breaks down the biggest pitfalls she sees—like over- or under-scoping, documentation theater, and trying to “DIY” without the right expertise. She shares why companies must approach CMMC as an ongoing cycle of protection, monitoring, and improvement—not a one-time project.If you're navigating CMMC, you'll walk away with:Clear insight into what the DoD really expects (hint: it's not just a perfect score).Strategies to scope effectively and avoid wasted effort.How to balance third-party support with true internal ownership.The importance of building trust and integrity over “just passing.”CMMC is a chance to strengthen your security posture and stand out in the market—don't miss it.

    CMMC Demystified Scoping Compliance and Avoiding Costly Mistakes

    Play Episode Listen Later Aug 29, 2025 43:44


    In this episode, Cheri Hotman and Paula Biggs break down the realities of CMMC compliance, with a special focus on scoping and avoiding common missteps. They explain how CMMC builds on existing NIST 800-171 requirements and why scoping—deciding which systems, people, and vendors fall under compliance—is the first and most critical step. Paula emphasizes that smaller companies can often save significant cost and risk by narrowing their scope strategically, while Cheri highlights how poor scoping leads to inflated audits, unnecessary licensing fees, and added risk exposure. Together, they stress the importance of understanding vendor responsibilities, building accurate and detailed System Security Plans (SSPs), and treating audits as confidence-building exercises rather than checkbox events. The conversation reinforces that CMMC isn't just about passing an audit—it's about sustaining secure, risk-aware practices that protect sensitive data and long-term business trust.

    Beyond the Audit: Making Continuous Compliance Work

    Play Episode Listen Later Aug 29, 2025 23:29


    Cheri Hotman and Tanya Wade cut through the checkbox mentality of audits to show why real compliance is about building programs that protect your people, data, and reputation year-round. From SOC 2 readiness to the pitfalls of over-relying on GRC tools, they share practical steps for prioritizing controls, assigning ownership, and reducing audit stress. If you've ever thought “we passed the audit—now what?”, this episode gives you the roadmap to continuous compliance with less chaos and more confidence.

    Episode 0: Why Cybersecurity Is as Much Art as Science

    Play Episode Listen Later Aug 20, 2025 21:40


    In this kickoff episode of The Art of Cybersecurity, host Cheri Hotman shares why this podcast exists and what listeners can expect. Cyber isn't just science or technology — it's art. It's messy, constrained, people-driven, and ultimately about mitigating risk to protect people and data.Cheri cuts through the noise of “easy button” tools, audit-passing mentalities, and checkbox compliance to talk about what security really is: designing programs that work, tackling people and process challenges, and aligning solutions to business goals.Expect honest, unfiltered conversations, real-world stories, and practical insights that go beyond buzzwords. If you're ready to say what needs to be said and push for cybersecurity that truly matters, subscribe now and join the fight.

    5 Tactics to Protect the Cloud Pt. 2

    Play Episode Listen Later Jul 19, 2022 7:39


    Take these 5 tactics given by Cheri Hotman to help better protect the cloud.

    5 Tactics to Protect the Cloud Pt. 1

    Play Episode Listen Later Jul 18, 2022 8:24


    Take these 5 tactics given by Cheri Hotman to help better protect the cloud.

    Cybersecurity is a Problem of People

    Play Episode Listen Later May 5, 2022 10:59


    Cybersecurity is a Problem of People ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Pen Test to Remove Security Blindness

    Play Episode Listen Later May 5, 2022 8:31


    Pen Test to Remove Security Blindness ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    SaaS Tools Cover My Security, Right?

    Play Episode Listen Later May 5, 2022 7:58


    SaaS Tools Cover My Security, Right? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Even Policies Are Not Set-It-And-Forget-It

    Play Episode Listen Later May 5, 2022 5:53


    Even Policies Are Not Set-It-And-Forget-It ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Don't Solve for the Wrong Problem

    Play Episode Listen Later May 5, 2022 9:04


    Don't Solve for the Wrong Problem ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Cybersecurity Does Not Equal Cool Tools

    Play Episode Listen Later May 5, 2022 8:52


    Cybersecurity Does Not Equal Cool Tools ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    CEO's, Watch Your Assets

    Play Episode Listen Later May 5, 2022 5:19


    CEO's, Watch Your Assets ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    How to Respond to Security Questionnaires?

    Play Episode Listen Later May 5, 2022 6:06


    How to Respond to Security Questionnaires? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Why Can't I Just Download Policy?

    Play Episode Listen Later May 5, 2022 5:51


    Why Can't I Just Download Policy? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Got Asked for It, But Don't Have SOC 2?

    Play Episode Listen Later May 5, 2022 6:50


    Got Asked for It, But Don't Have SOC 2? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Minimal Security You Need for Cyber War

    Play Episode Listen Later May 5, 2022 9:56


    Minimal Security You Need for Cyber War ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    5 Questions CEOs Should Ask on Cybersecurity

    Play Episode Listen Later May 5, 2022 12:34


    5 Questions CEOs Should Ask on Cybersecurity ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    The Longer the Better Password

    Play Episode Listen Later May 5, 2022 9:42


    The Longer the Better Password ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Don't be Overwhelmed (on Security), Start Here

    Play Episode Listen Later May 5, 2022 10:26


    Don't be Overwhelmed (on Security), Start Here ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Does Your Business Need a VPN?

    Play Episode Listen Later May 5, 2022 9:38


    Does Your Business Need a VPN? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    How Much Is the Cost of a SOC 2?

    Play Episode Listen Later May 5, 2022 6:05


    How Much Is the Cost of a SOC 2? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Get Your SOC 2 "Fast" & "Easy"?

    Play Episode Listen Later May 5, 2022 7:18


    Get Your SOC 2 "Fast" & "Easy"? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    What Does War Mean to Business Security?

    Play Episode Listen Later May 5, 2022 10:32


    What Does War Mean to Business Security? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    What We Learn from Tesla Hack?

    Play Episode Listen Later Apr 19, 2022 7:13


    What We Learn from Tesla Hack? ➜ Hit the LIKE button ➜ SHARE the video with someone who might need it ➜ POST your questions in the comments for future video topics ➜ SUBSCRIBE for notifications of new episodes #cybersecurity #security #soc2 #vciso #compliance #risk #riskmanagement #grc #itrm #video #fintech #healthcare #healthcaretechnology #healthcaretech #software #saassecurity #ceo #ciso #phi #pii #pi #softwareindustry #dataprivacy #dataprotection #womenincybersecurity #womenincyber #womeninfintech #womenintech

    Claim Cybersecurity, GRC & SOC 2 Essentials

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel