All Episodes

Displaying 21 - 40 of 71 in total

Episode 21 — Build a data inventory you can trust and keep it current (Domain 2C-1 Data Inventory)

This episode explains how to create and maintain a data inventory that is accurate enough to drive real engineering decisions, because CDPSE questions often assume you...

Episode 22 — Map data flows end-to-end so privacy risk is visible, not guessed (Domain 2C-2 Data Flow)

This episode teaches you to map data flows with enough precision to answer exam scenarios about collection, sharing, storage, and deletion across complex architectures...

Episode 23 — Classify data properly to drive the right privacy safeguards (Domain 2C-3 Data Classification)

This episode focuses on data classification as a decision tool that drives safeguards, access rules, retention, and sharing controls, not as a label exercise. You’ll l...

Episode 24 — Use data minimization to reduce exposure without breaking the business (Domain 2C-4 Data Minimization)

This episode explains data minimization as an engineering and product discipline that reduces exposure by limiting collection, limiting use, and limiting retention to ...

Episode 25 — Define retention and disposal that is enforceable across systems and vendors (Domain 2C-5 Retention and Disposal)

This episode teaches retention and disposal as enforceable control systems rather than policy statements, because exam scenarios often reveal gaps between stated reten...

Episode 26 — Build consent management that is measurable, reversible, and reliable (Domain 2C-6 Consent Management)

This episode covers consent management as a system capability with clear states, audit trails, and enforcement points, not just a banner or checkbox. You’ll define val...

Episode 27 — Apply purpose limitation so data use stays aligned with promises and approvals (Domain 2C-7 Purpose Limitation)

This episode explains purpose limitation as a governance-and-technology pairing that prevents silent expansion of how data is used, which is a frequent source of priva...

Episode 28 — Manage privacy in third-party data sharing with clear boundaries and controls (Domain 2C-8 Data Sharing and Third Parties)

This episode teaches you how to control privacy risk when data is shared with third parties, emphasizing boundaries, contractual constraints, and technical enforcement...

Episode 29 — Protect privacy in monitoring, logging, and observability without losing visibility (Domain 2C-9 Monitoring and Logging)

This episode addresses a common real-world conflict: monitoring and logging are essential for reliability and security, but they can also become a privacy liability th...

Episode 30 — Spaced Retrieval Review: Data inventory, flows, classification, minimization, and retention (Domain 2C-1 to 2C-9)

This review episode strengthens rapid recall across the Domain 2C data management objectives by linking them into an end-to-end control story you can apply to exam sce...

Episode 31 — Spaced Retrieval Review: Data life cycle management from collection to destruction (Domain 3A-1 to 3B-4)

This review episode locks in rapid recall for Domain 3 by walking the data life cycle as a single continuous control story, from the moment data is collected to the po...

Episode 32 — Choose infrastructure and platform approaches for privacy across legacy and cloud (Domain 4A-1 Infrastructure and Platform Technology)

This episode explains how infrastructure and platform choices influence privacy outcomes, and how CDPSE questions often test whether you can connect architecture decis...

Episode 33 — Secure devices and endpoints so personal information exposure stays contained (Domain 4A-2 Devices and Endpoints)

This episode covers endpoint and device security as a privacy control surface, emphasizing how laptops, mobile devices, kiosks, and managed endpoints can become the fa...

Episode 34 — Design connectivity choices that reduce privacy risk across networks and services (Domain 4A-3 Connectivity)

This episode teaches connectivity as a privacy risk multiplier, because the way systems connect often determines whether data is exposed, intercepted, misrouted, or br...

Episode 35 — Embed privacy into the secure development life cycle without slowing delivery (Domain 4A-4 Secure Development Life Cycle)

This episode explains how to integrate privacy into the SDLC so it becomes a predictable part of delivery rather than a last-minute blocker, which is a common CDPSE sc...

Episode 36 — Engineer APIs and cloud-native services to prevent silent privacy failure modes (Domain 4A-5 APIs and Cloud-Native Services)

This episode focuses on APIs and cloud-native services as places where privacy failures can happen silently, such as over-broad responses, weak authorization checks, u...

Episode 37 — Operationalize asset management so data assets and owners are never ambiguous (Domain 4B-1 Asset Management)

This episode explains asset management as a foundational privacy enabler, because you cannot protect or govern what you cannot confidently identify, classify, and assi...

Episode 38 — Implement identity and access management that enforces least privilege for privacy (Domain 4B-2 Identity and Access Management)

This episode teaches IAM as one of the strongest privacy controls available, because access decisions determine who can view, export, modify, or share personal informa...

Episode 39 — Maintain patching and hardening discipline that protects privacy at scale (Domain 4B-3 Patch Management and Hardening)

This episode explains patch management and hardening as privacy protection at scale, because unpatched systems and weak baselines often lead to the kinds of unauthoriz...

Episode 40 — Select transport protocols that protect privacy across modern and legacy paths (Domain 4B-4 Communication and Transport Protocols)

This episode focuses on communication and transport protocols as privacy safeguards, because the protocol choices and configurations determine whether data can be inte...

Broadcast by