All Episodes

Displaying 61 - 80 of 91 in total

Episode 61 — Monitor vendor controls using evidence, updates, and incident notifications (Task 9)

This episode teaches how to monitor AI vendor controls as an ongoing responsibility, because AAISM scenarios often test whether you can maintain assurance after onboar...

Episode 62 — Verify vendor AI security through audits, tests, and contract enforcement (Task 9)

This episode explains how to verify vendor AI security using audits, targeted tests, and enforceable contract terms, which AAISM tests by asking what creates real assu...

Episode 63 — Domain 2 quick review: risk lifecycle, threats, testing, and vendors (Tasks 4–9)

This episode reinforces Domain 2 by connecting the risk lifecycle, threat assessment, reassessment triggers, security testing, vulnerability management, and vendor ove...

Episode 64 — Domain 3 overview: secure AI technologies using architecture and controls (Task 10)

This episode introduces Domain 3 as the “how you actually secure it” domain, focusing on architecture and control implementation that makes AI systems defensible in re...

Episode 65 — Design AI security architecture with clear trust boundaries and data flows (Task 10)

This episode teaches how to design AI security architecture by clearly defining trust boundaries and data flows, because AAISM questions often hinge on whether you can...

Episode 66 — Reduce AI attack surface through smart deployment and integration choices (Task 10)

This episode explains how to reduce AI attack surface by making smart deployment and integration choices, which AAISM tests by asking what design decision most effecti...

Episode 67 — Implement AI architecture protections for identity, secrets, and isolation (Task 10)

This episode teaches how to implement core architecture protections around identity, secrets, and isolation, because AAISM scenarios frequently test whether you can pr...

Episode 68 — Integrate AI architecture into enterprise architecture without shadow systems (Task 11)

This episode explains how to integrate AI architecture into enterprise architecture so AI systems inherit proven controls instead of becoming shadow systems, which AAI...

Episode 69 — Align AI architecture with enterprise identity, network, and data standards (Task 11)

This episode teaches how to align AI architecture with enterprise identity, network, and data standards, because AAISM expects you to treat AI as part of the environme...

Episode 70 — Document architecture decisions so governance and audit stay aligned (Task 11)

This episode explains how to document AI architecture decisions so governance and audit stay aligned, which AAISM tests by asking what evidence proves controls were in...

Episode 71 — Understand the AI development life cycle from idea to retirement (Task 22)

This episode explains the AI development life cycle as the AAISM exam expects you to reason about it: a sequence of accountable decisions and controlled transitions fr...

Episode 72 — Secure build, train, and deploy pipelines for repeatable safe releases (Task 22)

This episode teaches how to secure build, training, and deployment pipelines so releases are repeatable, controlled, and auditable, which AAISM commonly tests through ...

Episode 73 — Validate models for safety, accuracy, and security failure modes (Task 22)

This episode explains how to validate models in a way that addresses safety, accuracy, and security failure modes, because AAISM questions often ask what validation sh...

Episode 74 — Apply security controls across the AI life cycle to treat risk (Task 12)

This episode teaches how to apply security controls across the AI life cycle so controls actually treat risk at the points where harm can occur, which AAISM tests thro...

Episode 75 — Assign control owners and evidence so controls survive real operations (Task 12)

This episode explains how to assign control owners and evidence requirements so AI security controls remain effective after the initial rollout, which AAISM treats as ...

Episode 76 — Review and tune AI security controls as models, data, and threats change (Task 12)

This episode teaches how to review and tune AI security controls over time, because AAISM questions often assume that controls must evolve as models, data sources, ven...

Episode 77 — Control data pipelines with lineage, access control, and secure storage (Task 14)

This episode explains how to control data pipelines using lineage, access control, and secure storage, which AAISM tests because data pipelines are where integrity and...

Episode 78 — Protect embeddings, prompts, and inference logs as sensitive AI assets (Task 14)

This episode teaches why embeddings, prompts, and inference logs must be treated as sensitive assets, because AAISM scenarios often test whether you recognize non-obvi...

Episode 79 — Manage privacy requirements across AI inputs, outputs, and user access (Task 3)

This episode explains how to manage privacy requirements across AI inputs, outputs, and user access, with an exam focus on turning privacy expectations into enforceabl...

Episode 80 — Build ethical guardrails that reduce harm while meeting business goals (Task 3)

This episode teaches how to build ethical guardrails that reduce harm while still meeting business goals, because AAISM tests whether you can operationalize ethics as ...

Broadcast by