All Episodes

Displaying 81 - 87 of 87 in total

Episode 80 — Select Authorization Approaches: SSO, RBAC, ABAC, Rules, Tokens, Certificates

 This episode teaches how to select authorization approaches based on system requirements, scale, and governance needs, which is a core ISSAP exam skill because the be...

Episode 81 — Determine Accounting and Forensic Requirements That Drive Audit Logging Architecture

 This episode explains how to define accounting and forensic requirements before you pick tools or storage, because ISSAP questions often test whether your logging des...

Episode 82 — Define Audit Events That Matter Without Flooding Storage and Analysts

 This episode teaches how to decide which audit events must be captured to satisfy exam objectives, investigations, and compliance evidence, without creating a logging...

Episode 83 — Establish Log Alerts and Notifications That Support Rapid Response and Investigation

 This episode focuses on turning logs into actionable alerts that reduce response time without creating alert fatigue, which is a common ISSAP theme when questions ask...

Episode 84 — Engineer Log Retention and Integrity Controls That Hold Up in Court

This episode explains how to design log retention and integrity so evidence remains trustworthy when it matters most, including legal discovery, regulatory review, and...

Episode 85 — Build Log Analysis and Reporting That Connects IAM Events to Business Risk

 This episode teaches how to analyze and report IAM-related log data in a way that connects technical events to business risk, which is central to ISSAP because the ex...

Episode 86 — Align IAM Logging With Policies and Regulations Including PCI DSS and GDPR

 This episode ties identity and access logging to policy and regulatory expectations, showing how to design evidence that satisfies both security outcomes and complian...

Broadcast by