All Episodes

Displaying 21 - 40 of 87 in total

Episode 20 — Use Reference Architectures and Blueprints Without Copying Hidden Assumptions

This episode teaches you how to use reference architectures as accelerators while still validating the assumptions they quietly embed, a common ISSAP exam theme when q...

Episode 21 — Operationalize STRIDE Threat Modeling From Concept to Concrete Mitigations

 This episode takes STRIDE from a memorized acronym to a working method you can apply in security architecture reviews, which is directly relevant to ISSAP questions t...

Episode 22 — Apply CVSS and Threat Intelligence to Prioritize Architecture Risk Decisions

 This episode explains how to use CVSS and threat intelligence as inputs to architecture prioritization without treating either one as a magic score that replaces judg...

Episode 23 — Verify Design With Functional Acceptance Testing Without Missing Security Behaviors

This episode teaches how to ensure security architecture requirements are validated during functional acceptance testing, which matters for ISSAP because the exam ofte...

Episode 24 — Validate Design With Regression Thinking When Systems and Dependencies Change

 This episode focuses on regression thinking as a security architecture discipline, because ISSAP scenarios frequently involve system changes that quietly break contro...

Episode 25 — Turn Threat Vectors, Impact, and Probability Into Testable Design Requirements

 This episode shows how architects translate risk language into requirements that can actually be tested, which is central to ISSAP because many questions ask you to b...

Episode 26 — Identify Architecture Gaps Early and Document Them for Fast Remediation

 This episode teaches a practical approach to finding and recording architecture gaps before they turn into expensive rework, a skill ISSAP tests indirectly when scena...

Episode 27 — Select Alternative Mitigations and Compensating Controls That Truly Reduce Risk

 This episode explains how to choose compensating controls when ideal mitigations are blocked by legacy constraints, budget, or operational limits, which is a common I...

Episode 28 — Run Tabletop Exercises to Validate Security Architecture Under Real Stress

 This episode covers tabletop exercises as an architecture validation tool, not just an incident response activity, which aligns with ISSAP objectives that test whethe...

Episode 29 — Use Modeling and Simulation to Expose Security Failures Before Production

 This episode explains how modeling and simulation can reveal security failures earlier than deployment, which is relevant to ISSAP because the exam values proactive v...

Episode 30 — Perform Manual Function Reviews to Catch Design Flaws Automated Tools Miss

 This episode focuses on manual function review as a disciplined way to find architecture and security design flaws that scanners and automated testing often miss, whi...

Episode 31 — Execute Peer Review Practices That Improve Architecture Quality Without Politics

 This episode explains how peer review functions as a quality control mechanism for security architecture and why ISSAP scenarios often reward answers that emphasize r...

Episode 32 — Choose Dynamic Analysis Approaches That Reveal Runtime Security Weaknesses

This episode covers dynamic analysis as a runtime-focused way to validate that security controls behave as designed, which connects directly to ISSAP exam questions th...

Episode 33 — Use Static Analysis Effectively Without Drowning in False Positives

 This episode explains how to use static analysis as an architecture-supporting control that improves code quality and reduces security defects, while avoiding the ISS...

Episode 34 — Apply Manual Code Review Techniques for High-Risk Components and Interfaces

This episode teaches how to perform manual code review in a way that supports security architecture goals, which matters for ISSAP because the exam frequently tests wh...

Episode 35 — Use Source Composition Analysis to Control Supply Chain and Dependency Risk

 This episode focuses on software composition analysis as a key supply chain control, and it explains why ISSAP questions often emphasize dependency governance, proven...

Episode 36 — Define Deployment Model Requirements Across On-Premises, Cloud, and Hybrid Systems

 This episode explains how deployment models change threat assumptions, control placement, and responsibility boundaries, which is a core ISSAP skill when exam scenari...

Episode 37 — Separate IT and Operational Technology Requirements Without Breaking Safety Goals

 This episode covers how to distinguish IT and OT requirements in a way that preserves safety, uptime, and integrity, which is highly relevant to ISSAP scenarios that ...

Episode 38 — Architect Physical Security Requirements, Perimeter Controls, Zoning, and Fire Suppression

 This episode explains how physical security requirements support and constrain security architecture, and why ISSAP questions often include facility and environmental...

Episode 39 — Specify Infrastructure and System Monitoring Requirements for Detection and Response

 This episode teaches how to define monitoring requirements that support detection, investigation, and response, which is a frequent ISSAP exam topic because architect...

Broadcast by