All Episodes

Displaying 21 - 40 of 55 in total

Episode 20 — Run Information Management and Measurement Processes That Reveal Security Reality

This episode focuses on information management and measurement as the way security engineering stays honest over time, because without meaningful metrics and evidence ...

Episode 21 — Evaluate Security Process Automation Solutions Without Automating Bad Decisions

This episode teaches how to evaluate security automation with an engineering mindset so you improve outcomes instead of scaling mistakes, which is a common ISSEP exam ...

Episode 22 — Define Security Requirements for Acquisitions That Vendors Can Actually Meet

This episode focuses on writing acquisition-focused security requirements that are measurable, testable, and contract-ready, because ISSEP questions often test whether...

Episode 23 — Apply Supply Chain Risk Management and Review Contract Deliverables Like an Engineer

This episode explains supply chain risk management as a practical set of controls and verification activities, not a checklist exercise, which aligns with the ISSEP ex...

Episode 24 — Estimate Cost, Personnel, and Reliability Impacts Without Fantasy Numbers

This episode teaches how to estimate security impacts with realism, because ISSEP scenarios often require you to weigh controls against cost, staffing, and reliability...

Episode 25 — Use Monte Carlo, MTBF, MTTF, MTTR, and MTD to Explain Risk Clearly

This episode connects reliability and time-based measures to security risk communication, which matters for ISSEP because the exam expects you to explain operational i...

Episode 26 — Align Security Risk Management With Enterprise Risk Management Without Translation Loss

This episode explains how to align security risk work with enterprise risk management so security decisions can compete fairly with other business risks, which is a co...

Episode 27 — Integrate Risk Management Throughout the Lifecycle From Concept to Disposal

This episode teaches risk management as a continuous lifecycle activity, not a one-time assessment, which matches ISSEP’s emphasis on traceability, change control, and...

Episode 28 — Establish Risk Context for Systems: scope, assumptions, and decision criteria

This episode focuses on establishing risk context, because without clear scope, assumptions, and decision criteria, risk analysis becomes inconsistent and ISSEP questi...

Episode 29 — Identify Threats, Events, Vulnerabilities, and Impacts With Engineering Precision

This episode teaches a precise way to identify threats, events, vulnerabilities, and impacts so your risk analysis is actionable and your exam answers stay grounded in...

Episode 30 — Perform Inherent Risk Analysis, Risk Evaluation, and Document Risk Posture

This episode explains how to perform inherent risk analysis and risk evaluation, then document risk posture in a way that supports decisions and holds up under review,...

Episode 31 — Monitor Residual, Changed, and New Risks as System Reality Shifts

This episode explains how risk monitoring works after initial decisions are made, because the ISSEP exam expects you to treat risk as a living condition that changes a...

Episode 32 — Turn Findings and Decisions Into Risk Documentation Leaders Will Defend

This episode focuses on turning analysis into documentation that supports accountable decisions, which is heavily tested on ISSEP because the exam rewards clarity, tra...

Episode 33 — Establish Operational Risk Context for Production Systems and Mission Outcomes

This episode explains how operational risk context differs from project-time risk context, and why ISSEP expects you to reason about real production constraints like u...

Episode 34 — Identify Operational Threats, Events, Vulnerabilities, and Impacts That Matter

This episode teaches how to identify operational threats and impacts with enough precision to drive decisions, because ISSEP questions often hinge on whether you can c...

Episode 35 — Evaluate Operational Risk, Track Posture Changes, and Document Decisions

This episode focuses on evaluating operational risk using evidence from production, then tracking how posture changes over time as controls age, systems evolve, and at...

Episode 36 — Capture Stakeholder Requirements Without Losing Security Meaning in Translation

This episode teaches how to capture stakeholder requirements so security meaning survives the trip from business language to engineering language, which the ISSEP exam...

Episode 37 — Define Roles, Responsibilities, Constraints, Assumptions, and a Validation Plan

This episode explains how to lock in the “rules of the system” early by defining roles, responsibilities, constraints, assumptions, and a validation plan, because ISSE...

Episode 38 — Engineer Resiliency With Redundancy and Diversity Without Creating New Weaknesses

This episode teaches how to engineer resiliency using redundancy and diversity, while avoiding the classic failure where “more components” means “more ways to fail,” a...

Episode 39 — Apply Defense-in-Depth, Zero Trust, and Secure-by-Default in Real Designs

This episode explains how to apply defense-in-depth, zero trust, and secure-by-default in practical architecture decisions, because ISSEP tests whether you can impleme...

Broadcast by