Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Ccsp Podcasts

show episodes
 
The Certified Cloud Security Professional (CCSP) Audio Course is your complete audio-first guide to mastering the world’s leading cloud security certification. Across dozens of structured episodes, we break down every CCSP exam domain, from cloud concepts and architecture to legal, risk, and compliance. Whether you are building foundational knowledge or sharpening advanced skills, this course helps you design, manage, and secure cloud environments with confidence. Learn at your own pace and ...
  continue reading
 
Artwork

1
ADHD reWired

Eric Tivers, LCSW, ADHD-CCSP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ADHD reWired is more than just a podcast, we are a community for ADHD Adults. This podcast brings you stories, strategies, and science from everyday people and the world's top experts. Host Eric Tivers, LCSW, ADHD-CCSP is a trained mental health professional who not only specializes in ADHD but also has it. Eric talks openly about his own ADHD as well has his recent autism diagnosis. If you're ADHD or AuDHD and you want to feel less alone, hit subscribe for a regular dose of "me too."
  continue reading
 
Artwork

1
ADHD on Fire

Nachi Felt, PhD and Dovid Becker, LCSW, ADHD-CCSP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Tired of ADHD overwhelm? Let’s make life AWESOME with ADHD! Be more productive, more efficient, and a whole lot happier. Upgrade your relationships, do better at work, stop losing your keys (and your car!). Learn awesomeness from 2 guys who’ve been there. We get it and love to talk about it. We’re on fire - jump in!
  continue reading
 
Artwork

1
Dr. Jim Cares

Dr. James Augustine, DC, CCSP, FASBE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
I provide powerful solutions for creating wellness. We talk about all things holistic and functional medicine, including but not limited to diet, nutrition and herbs, as well as lab testing and cutting edge technology to improve and maximize wellness.
  continue reading
 
Artwork

1
The Peak Performance Podcast

Marc Dupuis, DC, CCSP, ICCSP, health, wellness & fitness expert

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Peak Performance Podcast with your host, Dr Marc Dupuis, board certified chiropractic sports physician, where we discuss Tips & Strategies for Optimizing Athletic Performance, Overall Health & Wellness!
  continue reading
 
🌟 **Unlock the Power of the Cloud! 🚀** Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. Whether you are a novice or seeking to deepen your understanding, this program is tailored for you. Season 1 Episodes 1-14: CompTIA Security+ 601 Episodes 15-52: Certified Cloud Security Professional (CCSP) Season 2 Epis ...
  continue reading
 
Artwork

1
The ADHD Manual Podcast

Abby Chau, LMFT, ADHD-CCSP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The ADHD Manual: How to survive with a colorful brain in a black and white world. Living with ADHD in a world built for neurotypicals (people with the most common brains) is like trying to follow an IKEA assembly manual for our Hot Wheels race car track pieces. We could toss this rocket launcher and buy crappy plastic pins. Or we could toss the manual and write our own.
  continue reading
 
Hosted by Jana Parker, a seasoned LEP with a wealth of experience in the field, this podcast is a vibrant community, a learning hub, and a source of encouragement for both aspiring and established educational psychologists. Meet Your Host: Jana Parker, MS, LEP, ABSNP, ADHD-CCSP: CEO of Mind by Design and Empower LEP, a Board Certified School Neuropsychologist and Certified ADHD Professional with a strong background in public education school psychology and administration as well as private p ...
  continue reading
 
Artwork

4
Me to We Talk Podcast

Me to We Talk Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
🎧 Listen to the Me to We Talk Podcast! Join us as we discuss all things dating and marriage! Gain dating advice to drive your relationship towards marriage! Fun, relatable daily tips to keep your relationships on its toes! Nothing is off limits! Our goal is to help relationships move from Me to We through dating, engagement and marriage...one couple at a time. We promise to tell the truth, the whole truth and nothing but the truth...So Help Me God! Text "MetoWe" to 22828 to SUBSCRIBE to be a ...
  continue reading
 
Loading …
show series
 
The cloud landscape is constantly evolving, and regulations are racing to keep pace. This final episode explores emerging rules governing artificial intelligence, digital sovereignty, and sector-specific requirements in areas like healthcare, finance, and critical infrastructure. These developments will shape the future of cloud security practice, …
  continue reading
 
What does it really mean to know when to push, when to pause, and when to let go? In this heartfelt conversation, Dr. Portia Preston returns to ADHD reWired to share insights from her book Hustle, Flow, or Let It Go? We talk about burnout, shame-free wellness, and the small practices that can help us create a more sustainable rhythm in life. This e…
  continue reading
 
🌟 Unlock the Power of the Cloud! 🚀 Join us for an exhilarating new season focused on mastering cloud computing and AWS security. This series will cover essential certification topics, provide expert insights, and offer hands-on practices to enhance your skills each week. In this episode, I cover topics such as the Security and Reliability pillar of…
  continue reading
 
Records management defines how information is retained, archived, and ultimately disposed of. In this episode, we cover how cloud systems enforce retention schedules, integrate with compliance requirements, and apply defensible disposition when data is no longer required. Poor records management not only creates legal risk but also inflates costs a…
  continue reading
 
Intellectual property concerns arise frequently in the cloud, where software, data, and designs may involve multiple stakeholders. This episode explores licensing models, use of open-source software (OSS), and patent issues that affect cloud adoption. We highlight why organizations must track licensing terms carefully and ensure OSS use complies wi…
  continue reading
 
Business continuity and disaster recovery are not just technical exercises—they also carry legal obligations. This episode covers how contracts and laws address force majeure events, define Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO), and require notification to stakeholders when disruptions occur. These legal dimensions ensu…
  continue reading
 
Professionalism in cloud security goes beyond technical competence—it includes ethical conduct and adherence to codes of practice. This episode explains the ethical responsibilities of CCSP professionals, including conflict of interest management, duty of care, and adherence to industry codes such as the ISC2 Code of Ethics. We emphasize why trust,…
  continue reading
 
Cyber insurance has expanded into cloud-specific policies, offering organizations financial protection against breaches, outages, and other incidents. This episode explores how cloud insurance is structured, including what is typically covered, common exclusions, and how claims are assessed. We discuss why organizations must carefully review polici…
  continue reading
 
Audits test whether organizations can prove compliance with standards and contractual obligations. In this episode, we discuss audit readiness in the cloud, focusing on evidence generation, control mapping, and continuous assurance. Documentation, automated reporting, and mapping provider controls to customer responsibilities all play vital roles i…
  continue reading
 
Cloud adoption almost always involves third parties, and their risk becomes your risk. This episode explains how due diligence, contract clauses, and continuous monitoring are used to manage vendor relationships. We cover the importance of evaluating a provider’s certifications, financial stability, and security practices before onboarding, and why…
  continue reading
 
For evidence to be admissible in legal or regulatory contexts, it must be accurate, verifiable, and properly maintained. This episode explores how digital evidence is collected in cloud environments, focusing on logging, time synchronization, and data integrity. Logs must be complete, tamper-resistant, and tied to reliable time sources so investiga…
  continue reading
 
E-Discovery obligations do not disappear in the cloud; in fact, they often become more complex. This episode explains how organizations must preserve relevant data during litigation, ensuring it cannot be altered or deleted once a legal hold is in place. We discuss the challenges of collection across distributed services, including multiple regions…
  continue reading
 
Privacy regulations impose strict rules on how personal data is handled, especially in the cloud where cross-border transfers are routine. This episode explores the requirements for lawful transfers under frameworks such as GDPR, as well as consent obligations that ensure users’ rights are respected. We also discuss localization laws that may restr…
  continue reading
 
Compliance frameworks provide benchmarks for cloud providers and customers alike. In this episode, we cover widely adopted standards such as ISO 27001, SOC 2, and cloud-specific programs like CSA STAR. We explain how frameworks provide assurance to regulators, customers, and partners, while also reducing duplication of effort through recognized cer…
  continue reading
 
Governance provides the structure for aligning cloud security with business strategy. This episode explains how enterprise risk management (ERM) frameworks define risk appetite, set tolerance levels, and establish policies that guide cloud decisions. We examine how risk assessments inform governance structures and how policies translate high-level …
  continue reading
 
Contracts and service-level agreements (SLAs) form the legal foundation of cloud relationships. This episode explores how security, privacy, and audit clauses define accountability between providers and customers. We highlight the importance of specifying uptime commitments, incident response expectations, and audit rights to ensure transparency an…
  continue reading
 
The sixth domain of the CCSP exam shifts attention from technical controls to the legal, risk, and compliance frameworks that govern cloud operations. In this episode, we introduce the core themes, including contracts, service-level agreements, international privacy rules, and regulatory obligations. While technical knowledge is essential, professi…
  continue reading
 
A service catalog provides pre-approved templates and builds that standardize cloud deployment. In this episode, we discuss how catalogs simplify operations, reduce risk, and accelerate adoption by giving users secure, vetted options. Self-service access is controlled through catalog entries, ensuring that only compliant resources can be launched w…
  continue reading
 
Cloud introduces new financial dimensions to security. This episode explores how cost optimization intersects with security, showing how excessive privileges or poorly controlled resources can drive unexpected expenses and risks. We explain how budgets, quotas, and automated guardrails ensure both financial discipline and security hygiene. Cost gov…
  continue reading
 
Business continuity in the cloud goes beyond disaster recovery; it ensures that critical services remain available under any condition. In this episode, we cover failover strategies across regions, the creation of detailed runbooks that guide recovery actions, and the role of exercises in validating readiness. Continuity planning in the cloud benef…
  continue reading
 
Access control is only effective if it remains accurate over time. This episode explains how access reviews confirm that permissions align with roles and responsibilities, ensuring least privilege is preserved. We highlight advanced workflows such as Just-In-Time (JIT) access, which grants temporary credentials, and Just-Enough Access (JEA), which …
  continue reading
 
Keys and secrets are not static assets; they must be actively managed to maintain security. In this episode, we explore operational practices such as regular rotation, enforced expiry, and escrow arrangements that ensure continuity in case of emergencies. Keys left unrotated for years become predictable targets, while secrets without expiration can…
  continue reading
 
Vulnerability operations extend beyond scanning, focusing on how findings are prioritized, tracked, and remediated across thousands of resources. This episode covers how risk-based prioritization ensures that critical flaws are addressed first, while less urgent issues are scheduled for later remediation. We also explore automation and orchestratio…
  continue reading
 
Configuration management goes hand in hand with posture and change management, ensuring systems remain aligned with secure baselines. This episode discusses how baselines are established, how continuous compliance tools monitor against them, and how automated remediation closes gaps quickly. In the cloud, where drift happens rapidly, configuration …
  continue reading
 
Change management ensures that updates to cloud environments are controlled, predictable, and secure. In this episode, we explore how guardrails, approval workflows, and documented exceptions keep systems stable while still allowing agility. We highlight the tension between speed and control, showing how automation can reduce friction while preserv…
  continue reading
 
Forensics in the cloud is complicated by lack of physical access, but it remains essential for investigations. This episode examines how evidence is acquired from cloud platforms, how chain of custody is maintained, and which tools support forensic readiness. We emphasize that evidence must be gathered in a way that preserves integrity, even when d…
  continue reading
 
Incident response in the cloud requires adapting traditional processes to dynamic, distributed environments. This episode covers how cloud-specific triage differs from on-premises, emphasizing challenges like volatile workloads, shared infrastructure, and rapid scaling. We discuss containment techniques that isolate affected services while minimizi…
  continue reading
 
Security Orchestration, Automation, and Response (SOAR) platforms transform operations by codifying response actions into playbooks. This episode explains how triggers from SIEMs or monitoring systems activate playbooks that execute repeatable, automated workflows. By reducing manual effort, SOAR accelerates response and ensures consistency across …
  continue reading
 
Cloud Security Posture Management (CSPM) addresses one of the leading causes of breaches: misconfiguration. In this episode, we explore how CSPM tools automatically detect weaknesses, enforce baselines, and identify drift from secure configurations. Cloud environments evolve rapidly, and without posture management, small errors can scale into criti…
  continue reading
 
Security Information and Event Management (SIEM) systems remain a cornerstone of security operations, but in the cloud, they must adapt to ingest vast amounts of telemetry from distributed sources. This episode explains how SIEM platforms collect, normalize, and correlate cloud logs, enabling advanced analytics that reveal patterns and anomalies ac…
  continue reading
 
Effective monitoring is at the heart of cloud security operations, providing the visibility required to detect, analyze, and respond to threats. In this episode, we discuss monitoring strategies that combine metrics for performance, logs for events, and traces for end-to-end transaction visibility. Each of these telemetry sources provides a differe…
  continue reading
 
Domain 5 introduces the operational side of cloud security, where the focus shifts from architecture and design to the day-to-day activities that ensure systems remain secure, resilient, and compliant. This episode provides a roadmap of the domain, highlighting monitoring strategies, posture management, automation, incident response, and business c…
  continue reading
 
Delivery strategies determine how applications are released into production, and security must be considered at every step. In this episode, we compare blue/green deployments, canary releases, and rollback mechanisms, showing how each method reduces risk by limiting exposure to new code. These approaches provide safety nets when changes fail or int…
  continue reading
 
DevSecOps integrates security into every stage of the development and delivery process. This episode explains how pipelines enforce security gates, how automated policies validate code and infrastructure, and how feedback loops accelerate remediation. By embedding security in workflows, DevSecOps reduces friction and strengthens trust in deployment…
  continue reading
 
Configuration management ensures that applications run consistently and securely across environments. In this episode, we explore how feature flags, environment variables, and default settings play critical roles in security posture. Misconfigured defaults are a leading cause of breaches, making it vital to enforce secure baselines and monitor for …
  continue reading
 
Containers bundle applications and dependencies, but their security depends on careful control across the lifecycle. This episode examines how images are built, stored in registries, and deployed in runtime environments. We highlight risks such as outdated base images, poisoned registries, and misconfigured container permissions. Hardening requires…
  continue reading
 
Serverless applications offer scalability and efficiency but bring unique risks. In this episode, we explore how event-driven models introduce vulnerabilities such as event injection, where malformed inputs can manipulate logic or trigger unintended behavior. We also highlight the critical role of least privilege in securing serverless functions, e…
  continue reading
 
Even well-tested applications face threats once deployed, making runtime protection essential. This episode covers technologies that monitor application behavior in real time, including runtime application self-protection (RASP), anomaly detection, and shielding mechanisms that block malicious inputs. These controls provide a last line of defense a…
  continue reading
 
Dynamic Application Security Testing (DAST) examines applications while they are running, simulating external attacks to uncover vulnerabilities that may not appear in source code. Interactive Application Security Testing (IAST) combines elements of both static and dynamic testing, instrumenting the application to monitor its behavior during execut…
  continue reading
 
Static Application Security Testing (SAST) analyzes source code or binaries to identify vulnerabilities before software is deployed. In this episode, we explain how SAST fits into cloud application development, integrating into CI/CD pipelines and enabling developers to catch errors early. Unlike dynamic testing, SAST does not require a running env…
  continue reading
 
Modern applications rely heavily on open-source libraries and frameworks, which can accelerate innovation but also expand the attack surface. In this episode, we analyze the risks associated with open-source dependencies, from unpatched vulnerabilities to malicious code injections by compromised maintainers. We explain why organizations must adopt …
  continue reading
 
Embedding secrets directly in code is one of the most common and dangerous mistakes developers make. In this episode, we examine why hardcoding credentials, API keys, or tokens creates significant risks, including source code leaks, insider misuse, and automated discovery by attackers scanning repositories. We highlight the dangers of secrets being…
  continue reading
 
Application identity is critical to securing interactions between services, users, and cloud providers. This episode covers OAuth 2.0 as the leading framework for delegated authorization, OpenID Connect as an identity layer, and the mechanics of token issuance and validation. We explain how scopes, claims, and Proof Key for Code Exchange (PKCE) str…
  continue reading
 
APIs are the glue of modern cloud applications, and their security is a top priority. In this episode, we explore how authentication and authorization work for APIs, highlighting practices such as OAuth 2.0, API gateways, and fine-grained permissions. We also explain why rate limiting and throttling are essential to preventing abuse and denial-of-s…
  continue reading
 
Applications today are increasingly built on microservices and APIs, and each component introduces potential vulnerabilities. This episode focuses on threat modeling at the application level, showing how to identify and address risks across distributed architectures. Techniques like STRIDE and data flow diagrams can be adapted to cloud environments…
  continue reading
 
The Secure Software Development Lifecycle (SDLC) provides the structure for building applications that remain resilient under attack. In this episode, we explore how secure requirements, design practices, and verification steps are applied in cloud contexts. You’ll learn how early integration of security principles prevents costly flaws and how des…
  continue reading
 
Domain 4 shifts focus to application security, addressing how cloud-hosted and cloud-native applications are designed, built, and secured. This episode introduces the scope of the domain, including secure development practices, API protections, testing methodologies, and runtime defenses. Cloud application security is especially dynamic, as applica…
  continue reading
 
Cloud adoption rarely happens in isolation—most organizations operate hybrid models that bridge on-premises infrastructure with cloud services. In this episode, we explore the role of edge gateways, VPNs, and dedicated links in connecting these environments. These connections provide flexibility and continuity but also expand the attack surface, re…
  continue reading
 
Backup and recovery strategies have evolved dramatically in the cloud, where snapshots, replication, and disaster recovery services are built into most platforms. This episode explores these options in depth, showing how snapshots can provide point-in-time recovery, while replication across regions supports continuity during major outages. Disaster…
  continue reading
 
Resilience is more than availability; it is about designing systems that anticipate failure and adapt automatically. In this episode, we cover resilience engineering concepts such as auto-scaling, self-healing systems, and the practice of chaos engineering, where deliberate failures are introduced to test robustness. These approaches are especially…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play