All Episodes

Displaying 21 - 40 of 59 in total

Episode 38 — Standardize passwords and modern authenticator policies organization-wide

This episode explains password and authenticator policy as an enterprise control that must be consistent across systems that touch or impact the cardholder data enviro...

Episode 37 — Secure wireless networks, controllers, and management planes

This episode covers wireless security because the ISA exam often frames wireless as a hidden path into sensitive environments, especially when corporate wireless, gues...

Episode 36 — Protect P2PE and end-to-end encryption deployments

This episode explains how point-to-point encryption and end-to-end encryption reduce exposure in payment flows and why the ISA exam expects you to validate boundaries,...

Episode 35 — Rotate keys, manage escrow, and revoke safely

This episode focuses on key rotation, escrow, and revocation, because the ISA exam often tests whether you understand how key lifecycle events prevent long-term exposu...

Episode 34 — Operate encryption keys under strict dual control

This episode covers dual control for cryptographic keys and why the ISA exam treats it as more than a procedural formality, especially when keys protect account data o...

Episode 33 — Govern cryptography across its complete lifecycle

This episode teaches cryptography governance as a lifecycle discipline, because the ISA exam expects you to evaluate not only whether encryption exists, but whether th...

Episode 32 — Harden databases and sensitive data repositories thoroughly

This episode focuses on database security and sensitive repositories because ISA exam scenarios often hinge on whether you can connect stored data risk to concrete con...

Episode 31 — Deploy, tune, and govern web application firewalls

This episode explains how web application firewalls fit into PCI-aligned security and why the ISA exam treats them as a control that must be governed and validated, no...

Episode 30 — Lock down web applications and exposed APIs

This episode focuses on web applications and APIs because payment environments increasingly rely on browser-based flows and service-to-service integrations, and the IS...

Episode 29 — Embed secure software development practices teams follow

This episode teaches secure software development as an operational discipline that PCI expects to be consistent, measurable, and integrated into how teams build and ma...

Episode 28 — Manage change and configuration with disciplined workflows

This episode explains change management and configuration control as the system that keeps PCI controls true over time, which is why ISA exam questions often test whet...

Episode 27 — Validate segmentation effectiveness with rigorous testing

This episode dives deeper into segmentation by focusing on testing, because the ISA exam commonly uses scenarios where segmentation is claimed, diagrams look clean, bu...

Episode 26 — Execute penetration testing with meaningful risk-based scope

This episode covers penetration testing from the ISA perspective, emphasizing what the exam often tests: whether you understand intent, scope selection, methodology, a...

Episode 25 — Conduct internal and external vulnerability scans effectively

This episode explains internal and external vulnerability scanning as a measurable control cycle that the ISA exam expects you to evaluate end to end, from scope accur...

Episode 24 — Monitor security events and tune actionable alerts

This episode builds on centralized logging by teaching monitoring as a process that produces action, which is exactly the kind of applied understanding the PCI ISA exa...

Episode 23 — Centralize logging and retain credible forensic evidence

This episode explains logging as an assessment-grade control, not just a technical feature, because ISA exam questions often test whether you can connect log collectio...

Episode 22 — Control physical access to sensitive facilities reliably

This episode focuses on physical security controls because the PCI ISA exam expects you to understand how physical access can defeat strong logical controls when attac...

Episode 21 — Secure remote access and hardened administrative pathways

This episode covers remote access as one of the highest-risk control surfaces in PCI programs and a frequent focus of PCI ISA exam scenarios because it blends authenti...

Episode 20 — Require strong multifactor authentication across all users

This episode focuses on multifactor authentication in a way the ISA exam expects, including where MFA is required, what counts as a factor, and how implementation deta...

Episode 19 — Enforce least-privilege and true need-to-know access

This episode builds your least-privilege toolkit for the ISA exam by turning a familiar concept into an assessable, testable control strategy. You’ll define least priv...

Broadcast by