All Episodes

Displaying 81 - 88 of 88 in total

Episode 81 — Store sensitive data safely with encryption, key management, and strict access controls

This episode focuses on the control stack that makes sensitive data storage defensible on the GCLD exam and in real cloud programs: encryption, key management, and tig...

Episode 82 — Use sensitive data responsibly by controlling purpose, retention, and minimum exposure

This episode explains responsible data use as a governance discipline that connects directly to GCLD-style questions about reducing risk while still enabling business ...

Episode 83 — Prevent data leakage with monitoring, blocking controls, and tested response playbooks

This episode teaches how to prevent data leakage by combining visibility, preventative enforcement, and response readiness, which is a frequent exam theme because each...

Episode 84 — Risk management and compliance: translate cloud risk into defensible business decisions

This episode focuses on turning cloud security risk into decisions leadership can defend, which is central to the GCLD exam’s emphasis on governance, prioritization, a...

Episode 85 — Map controls to requirements so audits become evidence-driven rather than narrative-driven

This episode explains how to map security controls to requirements in a way that produces objective evidence, which is often what exam questions are really testing whe...

Episode 86 — Prepare for cloud audits by aligning logs, configurations, and access reviews to evidence

This episode teaches practical audit preparation as an engineering and governance alignment exercise: logs must exist and be retained, configurations must reflect poli...

Episode 87 — Perform practical cloud security assessments that surface misconfigurations before attackers do

This episode brings the series together by focusing on practical assessments that find misconfigurations and weak governance before they become incidents, aligning wit...

Welcome to Certified: The GIAC GCLD Audio Course

This course teaches you how to secure cloud environments the way real incidents unfold: misconfigurations, over-permissioned identities, weak network boundaries, and d...

Broadcast by