Certified: The ISACA AAISM Audio Course
Duración total:
9 h 25 min
Welcome to the ISACA AAISM Audio Course
Certified: The ISACA AAISM Audio Course
00:51
Episode 90 — Finish strong: lock in governance, risk, and controls for AAISM (Tasks 1–22)
Certified: The ISACA AAISM Audio Course
14:08
Episode 89 — Exam-day tactics: calm pacing, best-answer logic, and time discipline (Tasks 1–22)
Certified: The ISACA AAISM Audio Course
13:07
Episode 88 — Final rapid recap: remember the three domains and all 22 tasks (Tasks 1–22)
Certified: The ISACA AAISM Audio Course
14:23
Episode 87 — Cross-domain practice: choose the right task in realistic scenarios (Tasks 1–22)
Certified: The ISACA AAISM Audio Course
12:48
Episode 86 — Connect monitoring to incident response so alerts lead to action (Task 16)
Certified: The ISACA AAISM Audio Course
15:44
Episode 85 — Build continuous monitoring for AI systems, controls, and security signals (Task 12)
Certified: The ISACA AAISM Audio Course
14:02
Episode 84 — Test robustness and respond when models behave unpredictably (Task 20)
Certified: The ISACA AAISM Audio Course
14:56
Episode 83 — Improve explainability so decisions are defensible to leaders and auditors (Task 20)
Certified: The ISACA AAISM Audio Course
15:59
Episode 82 — Review AI outputs for trust and safety without slowing the business (Task 20)
Certified: The ISACA AAISM Audio Course
13:10
Episode 81 — Design risk-based human oversight so AI stays safe and useful (Task 20)
Certified: The ISACA AAISM Audio Course
12:40
Episode 80 — Build ethical guardrails that reduce harm while meeting business goals (Task 3)
Certified: The ISACA AAISM Audio Course
12:30
Episode 79 — Manage privacy requirements across AI inputs, outputs, and user access (Task 3)
Certified: The ISACA AAISM Audio Course
13:56
Episode 78 — Protect embeddings, prompts, and inference logs as sensitive AI assets (Task 14)
Certified: The ISACA AAISM Audio Course
14:20
Episode 77 — Control data pipelines with lineage, access control, and secure storage (Task 14)
Certified: The ISACA AAISM Audio Course
13:15
Episode 76 — Review and tune AI security controls as models, data, and threats change (Task 12)
Certified: The ISACA AAISM Audio Course
13:21
Episode 75 — Assign control owners and evidence so controls survive real operations (Task 12)
Certified: The ISACA AAISM Audio Course
14:07
Episode 74 — Apply security controls across the AI life cycle to treat risk (Task 12)
Certified: The ISACA AAISM Audio Course
17:29
Episode 73 — Validate models for safety, accuracy, and security failure modes (Task 22)
Certified: The ISACA AAISM Audio Course
14:56
Episode 72 — Secure build, train, and deploy pipelines for repeatable safe releases (Task 22)
Certified: The ISACA AAISM Audio Course
15:22
Episode 71 — Understand the AI development life cycle from idea to retirement (Task 22)
Certified: The ISACA AAISM Audio Course
13:53
Episode 70 — Document architecture decisions so governance and audit stay aligned (Task 11)
Certified: The ISACA AAISM Audio Course
11:19
Episode 69 — Align AI architecture with enterprise identity, network, and data standards (Task 11)
Certified: The ISACA AAISM Audio Course
11:57
Episode 68 — Integrate AI architecture into enterprise architecture without shadow systems (Task 11)
Certified: The ISACA AAISM Audio Course
11:40
Episode 67 — Implement AI architecture protections for identity, secrets, and isolation (Task 10)
Certified: The ISACA AAISM Audio Course
12:06
Episode 66 — Reduce AI attack surface through smart deployment and integration choices (Task 10)
Certified: The ISACA AAISM Audio Course
11:49
Episode 65 — Design AI security architecture with clear trust boundaries and data flows (Task 10)
Certified: The ISACA AAISM Audio Course
12:14
Episode 64 — Domain 3 overview: secure AI technologies using architecture and controls (Task 10)
Certified: The ISACA AAISM Audio Course
11:28
Episode 63 — Domain 2 quick review: risk lifecycle, threats, testing, and vendors (Tasks 4–9)
Certified: The ISACA AAISM Audio Course
11:21
Episode 62 — Verify vendor AI security through audits, tests, and contract enforcement (Task 9)
Certified: The ISACA AAISM Audio Course
12:02
Episode 61 — Monitor vendor controls using evidence, updates, and incident notifications (Task 9)
Certified: The ISACA AAISM Audio Course
12:55
Episode 60 — Embed vendor AI security requirements before procurement begins (Task 9)
Certified: The ISACA AAISM Audio Course
19:00
Episode 59 — Retest and document fixes so AI vulnerabilities stay closed (Task 7)
Certified: The ISACA AAISM Audio Course
17:13
Episode 58 — Build AI vulnerability management from discovery to remediation (Task 7)
Certified: The ISACA AAISM Audio Course
19:47
Episode 57 — Design AI security testing that matches your model, data, and use case (Task 7)
Certified: The ISACA AAISM Audio Course
18:06
Episode 56 — Build a reassessment cadence that prevents stale AI risk decisions (Task 6)
Certified: The ISACA AAISM Audio Course
17:33
Episode 55 — Monitor external changes like laws, vendors, and new AI capabilities (Task 6)
Certified: The ISACA AAISM Audio Course
18:56
Episode 54 — Monitor internal changes that require AI risk reassessment (Task 6)
Certified: The ISACA AAISM Audio Course
17:56
Episode 53 — Keep threat understanding current as attackers and tools evolve (Task 5)
Certified: The ISACA AAISM Audio Course
17:21
Episode 52 — Assess AI threats by likelihood and impact, not hype and fear (Task 5)
Certified: The ISACA AAISM Audio Course
15:24