All Episodes

Displaying 61 - 80 of 87 in total

Episode 60 — Build Content Monitoring Using DLP Across Email, Web, Data, and Social Media

 This episode covers how to design data loss prevention as a practical monitoring and control capability across multiple channels, which ISSAP often tests through scen...

Episode 61 — Plan Out-of-Band Communications for Incident Response and BC/DR Operations

 This episode explains why out-of-band communications are a core security architecture requirement, not a convenience, and how ISSAP questions often test whether you c...

Episode 62 — Evaluate Control Applicability Across Clients, Proxies, and Application Service Components

 This episode teaches how to evaluate where controls can actually be enforced across clients, proxies, and application service components, a nuance ISSAP often tests b...

Episode 63 — Determine Cryptographic Design Constraints, Lifecycle, Algorithms, and System Capabilities

 This episode explains how to identify cryptographic design constraints before you select an implementation, which is important for ISSAP because exam questions often ...

Episode 64 — Choose Cryptographic Implementations for Data In-Transit, In-Use, and At-Rest

 This episode covers how to choose cryptographic implementations based on when data is moving, being processed, or stored, which ISSAP often tests through scenarios wh...

Episode 65 — Plan Key Management Lifecycle From Generation Through Storage and Distribution

 This episode teaches key management as a lifecycle discipline, because ISSAP questions frequently reward answers that focus on how keys are created, protected, rotate...

Episode 66 — Architect Identity Proofing and Verification Using Physical and Logical Methods

 This episode explains how identity proofing differs from authentication and why ISSAP often tests whether you can build trustworthy identity foundations before you re...

Episode 67 — Assign Identifiers to Users, Services, Devices, and Components Without Collisions

 This episode teaches how to design identifier strategies that scale cleanly across users, services, devices, and components, a topic ISSAP may test when identity syst...

Episode 68 — Design Joiners-Movers-Leavers Provisioning and Deprovisioning That Prevents Orphan Access

 This episode explains how to architect joiners-movers-leavers processes so access changes keep pace with real organizational change, which ISSAP often tests by presen...

Episode 69 — Select Identity Management Technologies That Support Scale, Recovery, and Governance

 This episode covers how to select identity management technologies based on scalability, resilience, and governance, which aligns with ISSAP because exam questions of...

Episode 70 — Define Authentication Approaches, Single-Factor, MFA, and Risk-Based Elevation

 This episode teaches how to define authentication requirements that match risk and user context, which is central to ISSAP because many exam questions revolve around ...

Episode 71 — Apply SAML, RADIUS, Kerberos, and OAuth Where Each Fits Best

 This episode explains how to choose between SAML, RADIUS, Kerberos, and OAuth based on the problem you are solving, which is a common ISSAP exam pattern because sever...

Episode 72 — Use LDAP and XACML Controls to Enforce Authentication and Access Policies

 This episode covers how LDAP and XACML fit into identity and access architecture, and why ISSAP questions often test whether you can distinguish between identity data...

Episode 73 — Define Trust Relationships for Federated and Stand-Alone Identity Architectures

 This episode teaches how to define trust relationships so identity assertions remain meaningful across systems, which is central to ISSAP because many scenarios hinge...

Episode 74 — Apply Authorization Principles, Least Privilege, SoD, and Interactive vs Non-Interactive

 This episode explains the core authorization principles that show up repeatedly in ISSAP questions because they drive defensible access decisions across people, servi...

Episode 75 — Choose Authorization Models for Physical, Logical, and Administrative Access Control

 This episode teaches how to choose authorization models that fit the access domain, which ISSAP often tests by mixing physical access, logical system access, and admi...

Episode 76 — Design Authorization Workflows, Issuance, Review, Revocation, Suspension, and Governance

 This episode covers authorization as a lifecycle workflow, which is essential for ISSAP because the exam frequently asks how to prevent stale access and how to prove ...

Episode 77 — Map Roles, Rights, and Responsibilities to System, Application, and Data Access

 This episode teaches how to map roles to rights in a way that stays consistent across systems and data stores, which is a frequent ISSAP topic because many access fai...

Episode 78 — Implement DRM and Group Strategies Without Creating Unmanageable Entitlement Sprawl

 This episode explains how to use DRM and group-based strategies to control access to content while avoiding the entitlement sprawl that makes governance impossible, a...

Episode 79 — Manage Privileged Accounts Using PAM to Reduce Standing Administrative Risk

 This episode focuses on privileged access management as an architecture control that reduces standing risk, which ISSAP often tests through questions about limiting b...

Broadcast by