All Episodes

Displaying 21 - 40 of 60 in total

Episode 20 — Provision Access with Lifecycle Control and Accountability in Mind

This episode focuses on provisioning as a controlled lifecycle activity that must align with role definitions, business need, approval authority, and traceable account...

Episode 21 — Review Identity Access Regularly Before Privilege Drift Becomes Dangerous

This episode explains why identity and access reviews are necessary after provisioning, because permissions that were once appropriate can become risky as roles change...

Episode 22 — Deprovision Access Cleanly When Roles People or Systems Change

This episode focuses on deprovisioning as a critical security process that must happen quickly and accurately when users leave, responsibilities change, contractors ro...

Episode 23 — Compare IAM Frameworks and Tools Without Losing the Lifecycle View

This episode compares identity and access management frameworks and supporting tools while keeping attention on the full lifecycle from onboarding to review and remova...

Episode 24 — Control AI Bots and Service Accounts Through Lifecycle and Least Privilege

This episode examines AI bots and service accounts as nonhuman identities that still require the same discipline applied to people, including ownership, approval, limi...

Episode 25 — Enforce Least Privilege and Separation of Duties in Daily Decisions

This episode explains how least privilege and separation of duties work together to reduce both error and abuse by ensuring that people receive only the access they ne...

Episode 26 — Evaluate Access Control Models for Realistic Logical Control Choices

This episode introduces the major access control models and explains how they influence logical security decisions in real systems rather than existing only as theory ...

Episode 27 — Apply IAM Concepts Through Role Lifecycle and Access Scenarios

This episode brings identity and access management together by showing how role definition, provisioning, review, adjustment, and deprovisioning play out across real w...

Episode 28 — Map OSI TCP IP IPv4 IPv6 and VPN Concepts Clearly

This episode explains the networking foundations that cybersecurity professionals must understand in order to interpret traffic, communicate clearly, and make better c...

Episode 29 — Interpret Firewalls Ports and Applications as Network Control Points

This episode focuses on firewalls, ports, and application traffic as practical control points that shape how systems communicate and how defenders enforce policy. On t...

Episode 30 — Secure Wireless Concepts Across Wi-Fi Bluetooth and Everyday Connections

This episode explains wireless security across common technologies such as Wi-Fi and Bluetooth, with attention to the convenience they provide and the risks they intro...

Episode 31 — Recognize Embedded Systems ICS and IoT Security Boundaries

This episode explains how embedded systems, industrial control systems, and Internet of Things devices create unique security boundaries that differ from traditional d...

Episode 32 — Design Segmentation with Firewall Zones VLANs and Micro-Segmentation

This episode focuses on network segmentation as a practical method for reducing attack paths, limiting exposure, and improving control over how users, systems, and ser...

Episode 33 — Layer Defense in Depth and Zero Trust into Architecture

This episode explains how defense in depth and zero trust strengthen security architecture by reducing dependence on any single control, assumption, or network locatio...

Episode 34 — Secure AI Data Pathways with Segmentation Zero Trust and Protected Environments

This episode examines how AI data pathways should be secured from input to storage to output so that sensitive information is not exposed through convenience, weak bou...

Episode 35 — Understand Cloud Characteristics That Shape Security Expectations and Risk

This episode explains the core characteristics of cloud computing and why they change the way security responsibilities, risk assumptions, and control design must be u...

Episode 36 — Compare Cloud Service Models SaaS PaaS IaaS and Responsibility Boundaries

This episode compares software as a service, platform as a service, and infrastructure as a service by focusing on what the customer controls, what the provider manage...

Episode 37 — Choose Cloud Deployment Models with Clear Security Tradeoff Thinking

This episode explores cloud deployment models by examining the security tradeoffs that come with public, private, hybrid, and community approaches. For certification s...

Episode 38 — Apply Shared Security Models Across Roles Responsibilities and Boundaries

This episode explains the shared responsibility concept as a practical model for understanding who secures what when cloud services, providers, customers, and internal...

Episode 39 — Protect Data Through Classification Labeling Masking Sanitization and Handling

This episode focuses on the data lifecycle controls that help organizations understand what information they hold, how sensitive it is, and what protections should fol...

Broadcast by