Episode 57 — Secure Shared Services Like Email and Communications With Practical Control Sets

 This episode focuses on shared services that become enterprise-wide attack surfaces, which is important for ISSAP because email and collaboration platforms often sit at the intersection of identity, data protection, and incident response. You’ll learn how to architect controls for authentication, anti-phishing defenses, message integrity, and administrative governance, then align those controls to real workflows like external sharing, delegated access, mobile clients, and third-party add-ins. We’ll cover practical examples such as enforcing MFA and conditional access, configuring modern mail authentication and reputation controls, limiting OAuth app permissions, and building logging that supports investigations without turning into unmanageable noise. Troubleshooting considerations include misaligned policies across clients that create bypass paths, shared mailboxes that undermine accountability, weak admin role separation that expands blast radius, and retention settings that conflict with legal hold needs or privacy constraints, creating risk on both sides of the governance line. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 57 — Secure Shared Services Like Email and Communications With Practical Control Sets
Broadcast by