All Episodes

Displaying 41 - 60 of 87 in total

Episode 40 — Define Infrastructure and System Cryptography Requirements That Avoid Fragile Designs

 This episode explains how to set cryptography requirements that are secure, maintainable, and operationally realistic, which aligns with ISSAP because exam questions ...

Episode 41 — Translate Application Security Needs Using Traceability and Architecture Documentation

 This episode explains how security architects capture application security needs as traceable requirements and how that traceability becomes a scoring advantage on IS...

Episode 42 — Build Physical Security Control Sets Using Cameras, Doors, and Controllers

 This episode focuses on building a coherent physical security control set using cameras, door hardware, access controllers, and supporting procedures, which the ISSAP...

Episode 43 — Architect Platform Security Across Hardware, Firmware, OS, Virtual, and Container

 This episode teaches how to think about platform security as a layered stack that starts below the operating system and extends through virtualization and containers,...

Episode 44 — Design Wired and Wireless Network Security Without Creating Hidden Trust Paths

 This episode explains how to design wired and wireless network security so trust is explicit, enforced, and observable, which is central to ISSAP scenarios that test ...

Episode 45 — Secure Public, Private, and Management Networks With Segmentation and Policy

 This episode focuses on designing separate public, private, and management networks with segmentation and policy enforcement that remains consistent as environments g...

Episode 46 — Architect IoT and Management Plane Security Without Losing Operational Visibility

 This episode teaches how to secure IoT environments and their management planes while still preserving the visibility and uptime that operations teams require, which ...

Episode 47 — Select Firewalls, Airgaps, and Software Defined Perimeters for Clear Boundaries

 This episode explains how to choose between firewalls, airgaps, and software defined perimeters based on threat models, operational constraints, and assurance require...

Episode 48 — Design VPN and IPsec Strategies That Preserve Identity, Integrity, and Scale

 This episode covers how to design VPN and IPsec solutions that do more than create encrypted tunnels, which is directly relevant to ISSAP because exam questions often...

Episode 49 — Apply NAC, DNS, and NTP Protections to Prevent Control-Plane Attacks

 This episode explains how Network Access Control, DNS, and NTP protections defend the control plane that everything else depends on, a concept ISSAP often targets bec...

Episode 50 — Secure VoIP and Unified Communications Without Sacrificing Availability and Quality

 This episode teaches how to secure VoIP and unified communications systems while preserving availability, call quality, and user trust, which ISSAP questions often fr...

Episode 51 — Apply Web Application Firewalls Where They Help and Where They Fail

 This episode explains what a web application firewall actually does, what it cannot do, and why ISSAP questions often test whether you can place a WAF as part of a la...

Episode 52 — Design Storage Security for DAS, SAN, NAS, Archives, and Removable Media

 This episode teaches how storage architecture choices change your threat model and your control options, which is directly relevant to ISSAP because exam scenarios fr...

Episode 53 — Secure Data Repositories With Access Control, Encryption, Redaction, and Masking

 This episode focuses on protecting data repositories in ways that remain effective during normal operations, audits, and incidents, which ISSAP often tests through qu...

Episode 54 — Architect Cloud Security Across IaaS, PaaS, and SaaS Responsibility Boundaries

 This episode explains how cloud responsibility boundaries shape architecture decisions, which is central to ISSAP because many exam items hinge on knowing what the pr...

Episode 55 — Secure Industrial Control Systems and SCADA Without Breaking Safety Operations

 This episode teaches how to apply security architecture to industrial control environments where safety, uptime, and vendor constraints are dominant, a theme ISSAP of...

Episode 56 — Design Endpoint Security for BYOD, Mobile, EDR, and HIDS/HIPS

 This episode explains how endpoint security architecture changes when you mix corporate devices, BYOD, and mobile platforms, and why ISSAP questions often test contro...

Episode 57 — Secure Shared Services Like Email and Communications With Practical Control Sets

 This episode focuses on shared services that become enterprise-wide attack surfaces, which is important for ISSAP because email and collaboration platforms often sit ...

Episode 58 — Integrate Third Parties Using Federation, APIs, VPN, and SFTP Safely

 This episode teaches how to integrate partners and vendors without turning “business connectivity” into permanent, poorly governed trust, which ISSAP often tests thro...

Episode 59 — Design Infrastructure Monitoring Architecture That Supports Fast Triage and Containment

 This episode explains how to architect monitoring so it drives fast triage and containment instead of producing dashboards that look busy but do not shorten incident ...

Broadcast by