All Episodes

Displaying 21 - 40 of 91 in total

Episode 71 — Understand the AI development life cycle from idea to retirement (Task 22)

This episode explains the AI development life cycle as the AAISM exam expects you to reason about it: a sequence of accountable decisions and controlled transitions fr...

Episode 70 — Document architecture decisions so governance and audit stay aligned (Task 11)

This episode explains how to document AI architecture decisions so governance and audit stay aligned, which AAISM tests by asking what evidence proves controls were in...

Episode 69 — Align AI architecture with enterprise identity, network, and data standards (Task 11)

This episode teaches how to align AI architecture with enterprise identity, network, and data standards, because AAISM expects you to treat AI as part of the environme...

Episode 68 — Integrate AI architecture into enterprise architecture without shadow systems (Task 11)

This episode explains how to integrate AI architecture into enterprise architecture so AI systems inherit proven controls instead of becoming shadow systems, which AAI...

Episode 67 — Implement AI architecture protections for identity, secrets, and isolation (Task 10)

This episode teaches how to implement core architecture protections around identity, secrets, and isolation, because AAISM scenarios frequently test whether you can pr...

Episode 66 — Reduce AI attack surface through smart deployment and integration choices (Task 10)

This episode explains how to reduce AI attack surface by making smart deployment and integration choices, which AAISM tests by asking what design decision most effecti...

Episode 65 — Design AI security architecture with clear trust boundaries and data flows (Task 10)

This episode teaches how to design AI security architecture by clearly defining trust boundaries and data flows, because AAISM questions often hinge on whether you can...

Episode 64 — Domain 3 overview: secure AI technologies using architecture and controls (Task 10)

This episode introduces Domain 3 as the “how you actually secure it” domain, focusing on architecture and control implementation that makes AI systems defensible in re...

Episode 63 — Domain 2 quick review: risk lifecycle, threats, testing, and vendors (Tasks 4–9)

This episode reinforces Domain 2 by connecting the risk lifecycle, threat assessment, reassessment triggers, security testing, vulnerability management, and vendor ove...

Episode 62 — Verify vendor AI security through audits, tests, and contract enforcement (Task 9)

This episode explains how to verify vendor AI security using audits, targeted tests, and enforceable contract terms, which AAISM tests by asking what creates real assu...

Episode 61 — Monitor vendor controls using evidence, updates, and incident notifications (Task 9)

This episode teaches how to monitor AI vendor controls as an ongoing responsibility, because AAISM scenarios often test whether you can maintain assurance after onboar...

Episode 60 — Embed vendor AI security requirements before procurement begins (Task 9)

This episode explains how to embed vendor AI security requirements early, because AAISM questions often test whether you can prevent downstream risk by shaping procure...

Episode 59 — Retest and document fixes so AI vulnerabilities stay closed (Task 7)

This episode teaches how to retest and document remediation so vulnerabilities stay closed over time, which AAISM often tests through scenarios where fixes are applied...

Episode 58 — Build AI vulnerability management from discovery to remediation (Task 7)

This episode explains how to build AI vulnerability management as a complete workflow from discovery through remediation, which AAISM tests by asking how you ensure we...

Episode 57 — Design AI security testing that matches your model, data, and use case (Task 7)

This episode teaches how to design AI security testing that is fit for purpose, because AAISM questions often challenge you to choose testing that matches the model ty...

Episode 56 — Build a reassessment cadence that prevents stale AI risk decisions (Task 6)

This episode explains how to set a reassessment cadence that prevents stale AI risk decisions while still respecting operational capacity, which AAISM tests by asking ...

Episode 55 — Monitor external changes like laws, vendors, and new AI capabilities (Task 6)

This episode teaches how to monitor external changes that should trigger AI risk reassessment, because AAISM scenarios often include shifting laws, vendor updates, or ...

Episode 54 — Monitor internal changes that require AI risk reassessment (Task 6)

This episode explains which internal changes should trigger AI risk reassessment and why AAISM treats reassessment as a governance-controlled decision, not a vague “re...

Episode 53 — Keep threat understanding current as attackers and tools evolve (Task 5)

This episode teaches how to keep threat understanding current so threat assessments do not become stale, which AAISM tests through scenarios where new model capabiliti...

Episode 52 — Assess AI threats by likelihood and impact, not hype and fear (Task 5)

This episode explains how to assess AI threats using likelihood and impact so your conclusions are defensible, which AAISM often tests by presenting dramatic scenarios...

Broadcast by