All Episodes

Displaying 21 - 40 of 113 in total

Episode 21 — Refresh training when threats, tools, and regulations change (Task 21)

This episode focuses on Task 21 by showing how to refresh AI security training as threats, tools, and regulations evolve, because AAISM questions often reward the choi...

Episode 22 — Inventory AI assets: models, prompts, data, and key dependencies (Task 13)

This episode teaches Task 13 by explaining how to inventory AI assets in a way that supports governance, risk decisions, and exam-ready control evidence, because AAISM...

Episode 23 — Classify AI assets by sensitivity, criticality, and compliance scope (Task 13)

This episode expands Task 13 by showing how to classify AI assets using sensitivity, criticality, and compliance scope, because AAISM questions frequently ask you to c...

Episode 24 — Keep the AI inventory accurate with routine governance checks (Task 13)

This episode covers how to keep the AI inventory accurate through routine governance checks, reinforcing Task 13 with the exam-critical idea that inventories decay unl...

Episode 25 — Identify data risks across the AI life cycle: leaks and tampering (Task 14)

This episode targets Task 14 by teaching you to identify data risks across the AI life cycle, with a focus on leaks and tampering, because AAISM expects you to reason ...

Episode 26 — Protect training and test data with access control and secure storage (Task 14)

This episode explains how to protect training and test data using access control and secure storage, aligning to Task 14 and preparing you for AAISM questions where th...

Episode 27 — Preserve data integrity so models stay reliable and trustworthy (Task 14)

This episode focuses on preserving data integrity so models remain reliable, which is central to Task 14 because AAISM treats integrity failures as both a security pro...

Episode 28 — Manage retention and deletion to reduce long-term AI data exposure (Task 14)

This episode teaches Task 14 through retention and deletion discipline, because AI systems tend to accumulate prompts, outputs, logs, and derived artifacts that quietl...

Episode 29 — Build an AI security program that fits the enterprise security program (Task 19)

This episode addresses Task 19 by showing how to build an AI security program that fits into the enterprise security program instead of competing with it, because AAIS...

Episode 30 — Define AI security metrics leaders can understand and act on (Task 18)

This episode focuses on Task 18 by teaching you to define AI security metrics that leaders can use to make decisions, because AAISM favors measurable, outcome-linked r...

Episode 31 — Monitor AI metrics to spot misuse, drift, and early incident signals (Task 18)

This episode explains how continuous monitoring turns AI security metrics into early warning signals, which is exactly what Task 18 is getting at when AAISM questions ...

Episode 32 — Use metrics to prioritize work and prove security program value (Task 18)

This episode teaches how to use AI security metrics to prioritize work and demonstrate program value, aligning with Task 18 and preparing you for AAISM items where the...

Episode 33 — Review AI security tools by coverage, gaps, and operational fit (Task 19)

This episode focuses on Task 19 by showing how to review AI security tools based on coverage, gaps, and operational fit, because AAISM expects you to choose controls t...

Episode 34 — Implement AI security tools into monitoring, alerting, and response workflows (Task 19)

This episode explains how to implement AI security tools so they actually function inside monitoring, alerting, and response workflows, aligning to Task 19 and reflect...

Episode 35 — Operationalize tools with tuning, ownership, and measurable outcomes (Task 19)

This episode covers the operational reality of AI security tools, emphasizing Task 19 by showing that tools only reduce risk when they are tuned, owned, and measured o...

Episode 36 — Domain 1 quick review: governance, policies, assets, metrics, and training (Tasks 1–3)

This episode consolidates Domain 1 by reviewing the key ideas behind Tasks 1–3, helping you connect governance leadership, policy structure, inventory discipline, metr...

Episode 37 — Investigate AI security incidents by collecting the right evidence fast (Task 15)

This episode introduces Task 15 by teaching how to investigate AI security incidents through fast, disciplined evidence collection, because AAISM expects you to priori...

Episode 38 — Document AI incidents clearly for regulators, contracts, and executive updates (Task 15)

This episode focuses on Task 15 by explaining how to document AI incidents in a way that serves regulators, contracts, and executive stakeholders, because AAISM common...

Episode 39 — Report AI security incidents on time without losing accuracy (Task 15)

This episode teaches how to report AI security incidents on time while maintaining accuracy, aligning with Task 15 and reflecting how AAISM balances speed, governance,...

Episode 40 — Contain AI incidents quickly by limiting access and stopping risky flows (Task 16)

This episode introduces Task 16 by focusing on rapid containment actions for AI incidents, because AAISM questions often test whether you can stop harm first by limiti...

Broadcast by