Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
TV & Film
History
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/bf/8b/06/bf8b060a-66f8-1f3b-77af-573451f039c0/mza_6172341089823690659.jpg/600x600bb.jpg
Surviving the 9 to 5
Dead Inside by 9:05
74 episodes
1 week ago
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.
Show more...
Self-Improvement
Education
RSS
All content for Surviving the 9 to 5 is the property of Dead Inside by 9:05 and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.
Show more...
Self-Improvement
Education
Episodes (20/74)
Surviving the 9 to 5
Data Governance Zero Trust Strategy

From the perspective of a data governance expert, this audio episode outlines the key insights and essential knowledge you should have if you were to join Japan's global data governance team.

Show more...
1 week ago
36 minutes 58 seconds

Surviving the 9 to 5
Dual-Loop Security Control Debate

TL;DR: A Japanese Tech giant, Fujitsu’s Dual-Loop Security Scheme. According to their website, the Dual-Loop scheme is a company-wide risk management mechanism designed to bridge the gap between top-down leadership and bottom-up operations, treating security as a core business issue rather than just a technical one.The Two Loops:• The Outer Loop (Top-Down Governance): Focuses on senior management involvement and the CISO (Chief Information Security Officer) organization. It uses digital dashboards, like the Risk Monitor, to visualize risks for leadership, allowing them to make informed, quantitative decisions. Its primary goal is to empower the CISO and resolve "competing demands," such as the conflict between business efficiency and security rigor.• The Inner Loop (Bottom-Up Autonomy): Focuses on field organizations managing risks in their daily operations. Departments conduct self-driven assessments and implement responses based on visualized data without waiting for top-down instructions. It encourages department heads to take an active leadership role in security rather than delegating it to staff.Key Enablers:• Assigned Roles: Each department has a System Security Manager, an Information Manager, and a PSIRT Manager to ensure local accountability.• Zero Trust & Resilience: The scheme supports a shift toward a "Zero Trust" model, where all entities must be authenticated, and an "attack-resilient" posture that identifies vulnerabilities from an attacker’s perspective.• Automated Remediation: Centralized IT asset management matches data against global vulnerability databases to trigger automated fixes within the "Inner Loop".The "Debate" (Potential Friction Points): Based on the sources, a debate would likely focus on "Competing Demands." Field organizations often face pressure to increase efficiency and reduce costs, which can conflict with the rigorous security implementation required by the CISO. Furthermore, there is a challenge in closing "accountability gaps" to ensure department heads do not leave security solely to their specialized staff.--------------------------------------------------------------------------------Analogy for Understanding: Fujitsu’s dual-loop scheme is like a modern high-performance racing team. The Outer Loop is the pit wall (senior management), using digital sensors to see the whole track and make strategic decisions about safety and speed. The Inner Loop represents the driver and mechanics (field organizations), who have the autonomy to make split-second adjustments based on the immediate conditions they feel on the track. Because both loops share the same data in real-time, they work as a single unit to ensure the car reaches the finish line safely.

Show more...
1 week ago
8 minutes 38 seconds

Surviving the 9 to 5
Defend the Indefensible

Deep dive video episode: A Japanese Tech giant, Fujitsu’s transition toward an "attack-resilient" security posture by integrating global IT asset management with a specialized dual-loop governance model. The primary structure of the text details how the company shifts from traditional perimeter defenses to a "Zero Trust" framework, where every user and device must be authenticated and all vulnerabilities are proactively identified via centralized visualization and autonomous scanning. Key themes include the Inner Loop, which empowers local departments to manage their own technical risks, and the Outer Loop, which provides high-level CISO oversight and management accountability through real-time data dashboards. Ultimately, the source serves to define a cohesive corporate strategy that harmonizes international regulatory standards, such as GDPR and NIST, with a human-centric culture of continuous training and incident drills to protect the company's global digital infrastructure.

Show more...
1 week ago
7 minutes 8 seconds

Surviving the 9 to 5
Cyber Immune System

Briefing video episode: A Japanese Tech giant, Fujitsu’s transition toward an "attack-resilient" security posture by integrating global IT asset management with a specialized dual-loop governance model. The primary structure of the text details how the company shifts from traditional perimeter defenses to a "Zero Trust" framework, where every user and device must be authenticated and all vulnerabilities are proactively identified via centralized visualization and autonomous scanning. Key themes include the Inner Loop, which empowers local departments to manage their own technical risks, and the Outer Loop, which provides high-level CISO oversight and management accountability through real-time data dashboards. Ultimately, the source serves to define a cohesive corporate strategy that harmonizes international regulatory standards, such as GDPR and NIST, with a human-centric culture of continuous training and incident drills to protect the company's global digital infrastructure.

Show more...
1 week ago
2 minutes 13 seconds

Surviving the 9 to 5
Building Career Armor in AI Governance

The audio overview "Building Career Armor in AI Governance" summarizes the comprehensive strategy for your entry into a high-stakes, AI-accelerated global data security and governance team. This career armor is built on becoming indispensable by bridging the communication gap between technical complexity and organizational clarity.

The overview defines two crucial North Star objectives:

  1. Identity Goal: Become "Security- and Governance-Fluent Operations Glue"—the person who translates messy policy or technical information into lucid communication that keeps global teams aligned and structured.
  2. Strategic Goal: Position yourself as a "Revenue-Enabling AI Risk Architect." Instead of being a "Compliance Cop" or a cost center, the goal is to show that clean, governed data makes AI products safer, faster to ship, and more profitable.

To survive and thrive in this cutthroat environment, the strategy emphasizes highly transferable skills and specific mindsets:

  • Security Fluency: Focus on building security literacy—the ability to understand the logic of secure systems (data classification, access tiers, regulatory basics like GDPR) rather than deep technical configuration.
  • Pragmatic Paranoia: Adopt a mindset that aims for governance that is "good enough to prevent catastrophe, flexible enough to allow innovation". Every proposed governance rule must be evaluated based on "Commercial Empathy," considering its impact on the company’s Profit and Loss (P&L).
  • Political Literacy: Immediately map the power dynamics of the organization, identifying both "Rainmakers" (revenue drivers) and "Blockers" (bureaucratic gatekeepers).
  • Reliability: Establish yourself as the "safe pair of hands" whose deliverables are clean and follow-ups are consistent, as reliability is often more valuable than brilliance in ruthless companies.

The strategy outlines three phases for quick immersion:

  1. Days 1–30 (Orientation): Focus on observing, mapping the project universe, building the "human map" of global stakeholders, and absorbing essential security vocabulary.
  2. Days 31–60 (Contribution): Take ownership of recurring communications (e.g., cross-region summaries) and start guiding meetings to clarify action items and deadlines, establishing yourself as the "clarity anchor".
  3. Days 61–90 (Ownership): Own a full cycle of communication or process, strengthen security-fluency in complex topics (like incident response flow overview), and demonstrate reliability and independence.

Ultimately, the armor is built on human skills—judgment, diplomacy, synthesis, and translation—which are the tasks AI tools struggle to automate, making your role future-proof and your skills transferable to adjacent fields like AI governance and privacy.

Core Strategic GoalsKey Mindsets and StrategyThe 90-Day Roadmap

Show more...
2 weeks ago
40 minutes 45 seconds

Surviving the 9 to 5
Becoming Security-Fluent: A Strategic Stepping-Stone in AI-Driven Tech

Listen to the detailed strategy for the first 90 days in a multi-geo data security environment, designed for a newcomer to cybersecurity who excels in technical writing and coordination.The strategy moves through three phases: Orientation & Absorption (Days 1–30, focused on mapping stakeholders and vocabulary), Contribution & Fluency Building (Days 31–60, starting to drive tasks and guide meetings), and Ownership & Strategic Value (Days 61–90, establishing long-term independence and strengthening security-fluency). The ultimate goal is to become operationally fluent and trusted as a bilingual interface, focusing on human elements like diplomacy, translation, and synthesis—skills AI cannot reliably replicate. You are entering the environment built for the terrain security specialists struggle with: communication, clarity, documentation, and alignment.

Show more...
2 weeks ago
16 minutes 12 seconds

Surviving the 9 to 5
Strategic blueprint: archtecting value with Modern Data Governance

This strategic blueprint outlines how organizations can shift their approach to data governance to meet the demands of a landscape defined by unprecedented scale and escalating regulatory burdens. Initially, the document highlights the failures of traditional, centralized data architectures that result in crippling inefficiencies and data silos across the enterprise. It then defines Modern Data Governance as the essential strategic framework needed to transform data from a corporate liability into a core asset, enabling benefits such as regulatory compliance and a unified Single Source of Truth. By detailing different operating models, including the advanced, decentralized Data Mesh architecture, the guide offers case studies that quantify the return on investment in data quality and efficiency, concluding that governance is the crucial foundation for AI-driven intelligence and sustained competitive advantage.

Show more...
3 weeks ago
17 minutes 9 seconds

Surviving the 9 to 5
Strategic framework designed to guide global enterprises

This audio presents a strategic framework designed to guide global enterprises through the complex and expanding regulatory minefield of modern data handling, exemplified by mandates like GDPR and CCPA. It reclassifies data management—including issues of residency, privacy, and sovereignty—as a board-level strategic challenge, moving beyond traditional back-office IT responsibility. This direction is established through the Four Pillars of Control: Governance, Residency, Sovereignty, and Compliance, which require intentional alignment between organizational structure and technical infrastructure. Ultimately, mastering this framework allows businesses to move toward a state of high data maturity, transforming compliance from a cost factor into a genuine competitive advantage.


Show more...
3 weeks ago
16 minutes 2 seconds

Surviving the 9 to 5
Demystifying Cybersecurity

This video episode provides an extensive introduction to cybersecurity, defining it as the practice of protecting systems, networks, and programs from cyber attacks and distinguishing it from the broader concept of information security. The tutorial explains the motives of cyber criminals, illustrating that they target systems based on vulnerability and the potential value of the data. Core networking fundamentals are covered, including the definitions of networks, the internet, and essential protocols like TCP/IP, IP addresses, MAC addresses, and DNS, before shifting focus to the diverse landscape of cyber threats. Finally, the source details various forms of malware (such as viruses, worms, and botnets) and common attack types, including Distributed Denial of Service (DDoS), Man-in-the-Middle (MITM), and different password attacks, often concluding with defense strategies and practical demonstrations of exploit creation.

Show more...
3 weeks ago
7 minutes 46 seconds

Surviving the 9 to 5
Residency, Sovereignty, and Data Governance Explained

This audio episode, "Residency, Sovereignty, and Data Governance Explained," emphasizes that effective data management is an enterprise-wide, strategic imperative, not merely a technical project.

Data Governance (Strategy & Structure):Governance must be an overall plan based on the enterprise width, requiring buy-in from leadership and involving the real owners of data to avoid failure and achieve sustainability. Organizations select a structure—such as Centralized (for consistency and control, often favored by regulated sectors like financial institutions or government agencies), Decentralized (for flexibility), or Federated (a balance of both)—to ensure accountability.

Data Residency vs. Data Sovereignty:

  • Data Residency requires that data must be stored within a specific geographic boundary. Tools like Microsoft 365 Multi-Geo allow organizations to specify which geographic location (Geo) data for certain users or sites will reside in, aiding compliance with residency requirements.
  • Data Sovereignty refers to the concept that data remains under the control of the customer and is governed by local law, regardless of its location.

Security and Compliance:To meet global challenges like the EU's GDPR and California's CCPA, a key difference is that GDPR fundamentally requires a "legal basis" for all personal data processing, whereas the CCPA does not. CCPA instead focuses heavily on transparency and consumer rights, notably the "Do Not Sell My Personal Information" opt-out option.

Achieving data sovereignty and strengthening compliance mandates the adoption of data-centric security. This approach protects the data itself using methods like encryption, tokenization, or masking throughout its entire lifecycle (at rest, in use, and in transit). This renders the data useless to unauthorized parties, effectively mitigating privacy risks, simplifying compliance, and avoiding potential conflicts with cross-border regulations.

Data Lineage—tracking the origin, evolution, and movement of data—is essential for governance and risk management, particularly for compliance with standards like BCBS 239 in financial institutions. Graph databases, such as Neo4j, are particularly suited to visualizing and tracing this highly connected data lineage in real time.

Show more...
3 weeks ago
14 minutes 26 seconds

Surviving the 9 to 5
Azure Pillars for Perimeter, Identity, and Proactive Zero Trust Security

Mastering Cloud Defense

Show more...
2 months ago
56 minutes 49 seconds

Surviving the 9 to 5
Digital Data Security: Principles, Risks, and Solutions

a comprehensive overview of data security, defining it as the practice of protecting digital information throughout its entire lifecycle from theft, corruption, or unauthorized access. They uniformly distinguish data security from data privacy and cybersecurity, noting that security focuses on protection mechanisms (like encryption and access controls) while privacy governs data usage and compliance, and cybersecurity is the broader discipline encompassing all digital protection. 

Show more...
2 months ago
15 minutes 20 seconds

Surviving the 9 to 5
Digital Data Security: Your Digital Fortress

a comprehensive overview of data security, defining it as the practice of protecting digital information throughout its entire lifecycle from theft, corruption, or unauthorized access. They uniformly distinguish data security from data privacy and cybersecurity, noting that security focuses on protection mechanisms (like encryption and access controls) while privacy governs data usage and compliance, and cybersecurity is the broader discipline encompassing all digital protection. 

Show more...
2 months ago
6 minutes 33 seconds

Surviving the 9 to 5
Google Cybersecurity Certificate Deep Dive

Based on 36 training videos from Google Cybersecurity Certificate playlist.

Cybersecurity Deep Dive: From Ancient Ciphers to Zero Trust Architecture and the Modern Analyst's Toolkit



Show more...
2 months ago
51 minutes 13 seconds

Surviving the 9 to 5
Google Cybersecurity Certificate Briefing

Based on 36 training videos from Google Cybersecurity Certificate playlist.

Cybersecurity Cheat Sheet: Mastering the CIA Triad, Encryption, and Incident Response with SIEM/SOAR

Show more...
2 months ago
19 minutes 3 seconds

Surviving the 9 to 5
Cybersecurity Incident Response

Based on 36 training videos from Google Cybersecurity Certificate playlist

Show more...
2 months ago
6 minutes 34 seconds

Surviving the 9 to 5
MS Azure Cybersecurity Mastery: Systems, Cloud, and Defense

This audio episode offers an expansive curriculum focusing on cyber security and cloud computing, with a strong emphasis on Microsoft Azure services. The material covers foundational concepts like network security, operating systems, and data protection, detailing best practices such as strong password policies, regular updates, and data backup strategies. Furthermore, the sources explore advanced topics including identity and access management (IAM) using Azure Active Directory, different cloud service models (SaaS, PaaS, IaaS), threat detection and response using tools like Microsoft Sentinel and Defender, and comprehensive approaches to compliance and risk management within an organizational context.

Show more...
2 months ago
31 minutes 31 seconds

Surviving the 9 to 5
MS Azure: Zero Trust Blueprint

Cybersecurity Fundamentals from Firewalls to MFA and Azure's Role

Show more...
2 months ago
16 minutes 37 seconds

Surviving the 9 to 5
Cybersecurity 101

Cybersecurity 101

Show more...
2 months ago
6 minutes 15 seconds

Surviving the 9 to 5
Foundations of Cybersecurity and Security Analyst Roles

These combined audio episodes introduce the Google Cybersecurity Certificate program, emphasizing the high demand for security professionals, with projected growth exceeding 30% by 2030. The course aims to equip students from diverse backgrounds with the necessary knowledge and skills to become security analysts, focusing on the core objective of protecting organizations and people from both external and internal threats. The curriculum covers foundational concepts like the CIA Triad (Confidentiality, Integrity, and Availability), risk management frameworks such as NIST CSF, and the ethical principles guiding the profession. Students will also gain hands-on experience with essential security tools and technologies, including SIEM (Security Information and Event Management) tools, Linux, SQL, and Python, all taught by current Google experts.

Show more...
2 months ago
19 minutes 41 seconds

Surviving the 9 to 5
“Surviving the 9 to 5” isn’t about hustling harder or chasing the next big thing—it’s a raw, no-bull guide for anyone stuck in the daily grind. Each episode delivers real-life hacks to protect your energy, reclaim tiny bursts of sanity, and make it through workday hell without losing yourself. No pep talks. No sugarcoating. Just straight-up survival tips for worn-out souls who refuse to disappear behind their desks.