All Episodes

Displaying 21 - 40 of 83 in total

Episode 21 — Choose SOC Operating Models: In-House, Outsourced, Hybrid, and Follow-the-Sun

This episode explains how to choose a SOC operating model that fits organizational risk, coverage needs, and maturity, a common exam theme because leaders must justify...

Episode 22 — Staff a SOC With Clear Roles, Skills, and Escalation Paths

This episode covers SOC staffing as an operating design problem, emphasizing exam-relevant concepts like role clarity, escalation discipline, and sustainable coverage ...

Episode 23 — Set SOC Metrics That Drive Quality, Not Ticket Volume Theater

This episode teaches how to select SOC metrics that reflect real security outcomes, a topic the exam tests through governance, measurement, and leadership judgment que...

Episode 24 — Build Use Cases That Improve Detection Fidelity and Analyst Confidence

This episode explains how SOC use cases translate raw data into actionable detection, and why use-case quality is often the difference between a trusted monitoring pro...

Episode 25 — Improve SOC Handoffs With Playbooks, Case Management, and Evidence Standards

This episode focuses on improving SOC handoffs so investigations remain coherent across shifts, teams, and escalations, a frequent exam concept because it combines pro...

Episode 26 — Secure the SDLC by Embedding Security Requirements and Design Reviews

This episode teaches how to embed security into the software development lifecycle through requirements and design reviews, an exam-relevant topic because it tests lea...

Episode 27 — Prioritize Application Risks Using Threat Modeling and Abuse-Case Thinking

This episode explains threat modeling and abuse-case thinking as methods to prioritize application risk, a concept the exam often evaluates through risk-based decision...

Episode 28 — Operationalize Secure Coding Expectations Without Slowing Delivery Excessively

This episode focuses on making secure coding expectations practical, consistent, and scalable, aligning with exam expectations that leaders can drive behavior change w...

Episode 29 — Manage Dependency and Component Risk Across Build Pipelines and Releases

This episode teaches dependency and component risk management, a key exam topic because modern application security depends heavily on third-party libraries, container...

Episode 30 — Secure Infrastructure as Code With Reviews, Policy Gates, and Guardrails

This episode explains how to secure infrastructure as code (IaC) so speed and scale do not amplify misconfigurations, a theme the exam tests through governance, cloud ...

Episode 31 — Drive DevSecOps Adoption With Measurable Controls and Shared Ownership

This episode explains how to operationalize DevSecOps so security becomes a shared responsibility across development, operations, and security teams, which is frequent...

Episode 32 — Build Application Security Testing Strategy: SAST, DAST, SCA, and Triage

This episode builds a practical application security testing strategy and clarifies how SAST, DAST, and SCA complement each other, a common exam angle because leaders ...

Episode 33 — Explain AI Types and Capabilities Leaders Must Understand to Govern Risk

This episode explains essential AI concepts that security leaders must understand to govern risk and make defensible decisions, reflecting exam expectations around eme...

Episode 34 — Evaluate AI Business Benefits Without Confusing Demos With Production Reality

This episode teaches how to evaluate AI initiatives with disciplined criteria so you can separate real business value from impressive demonstrations, aligning with exa...

Episode 35 — Manage AI Security Risks: Data Leakage, Prompt Abuse, and Model Misuse

This episode focuses on AI security risks that leaders must anticipate and control, including data leakage, prompt abuse, and misuse patterns, which connects to exam o...

Episode 36 — Set AI Governance: Acceptable Use, Access Controls, and Monitoring Expectations

This episode explains how to build AI governance that is enforceable and sustainable, a concept the exam tests through leadership ability to translate risk appetite in...

Episode 37 — Master Cloud Service Models and Shared Responsibility Without Blind Spots

This episode clarifies cloud service models and the shared responsibility concept so you can correctly assign security duties, a frequent exam requirement because misu...

Episode 38 — Secure Cloud Identity: Roles, Federation, MFA, and Least Privilege Enforcement

This episode covers cloud identity as the primary control plane for modern environments, aligning with exam objectives that emphasize governance, access control strate...

Episode 39 — Design Cloud Network Segmentation to Reduce Blast Radius and Lateral Movement

This episode teaches how to segment cloud networks so inevitable compromises do not become enterprise-wide incidents, a topic tied to exam expectations around architec...

Episode 40 — Operationalize Cloud Logging: Sources, Normalization, Retention, and Alert Quality

This episode explains how to operationalize cloud logging so it supports detection, investigations, and compliance, a high-value exam theme because centralized visibil...

Broadcast by