Show Notes
Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic.
Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money.
Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )
Key Takeaways:
0:00 - Welcome back to the Hacker Valley Studio
1:10 - Ron's favorite topic! Security Architecture
1:45 - Security architecture is the foundation
2:21 - Where a security architecture starts and stops
4:00 - A security architect is playing a game of Tower Defense
6:27 - Using EASY Framework as a security architect
10:04 - Prerequisites for becoming a security architect
13:55 - Differences between security architect and security engineers
16:55 - Resources for learning more about security architecture
19:21 - Stay in touch with Hacker Valley Studio!
Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram
Join our monthly mastermind group via Patreon
Learn more about our fantastic sponsor Upytcs
Recent Episodes
Debt vs. Risk: What the SharePoint Breach Taught Us with Ron ...
The riskiest move in cybersecurity? Playing it too safe. In this solo episode, Ron Eddings redefines the way we think about technical debt, risk, and missed opportunities, in security and in ...
The Future of Cyber Talent Is African with Confidence Staveley
The world’s youngest continent is also its most untapped resource. Confidence Staveley, Founder of CyberSafe, makes a powerful case for why Africa’s youth are the answer to global cybersecurity ...
Compliance Isn’t the Enemy with Jeff Man
Is compliance just a checkbox, or the backbone of real security? Returning to the show with decades of hard-earned insight, Jeff Man makes the case that compliance, especially PCI-DSS, isn't ...
What Makes a Great CISO? A Playbook from Gary Hayslip
What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to ...
Confidence, Coaching, and the S-Word with Mel Reyes
Want to stand out as a leader? According to our guest Mel Reyes, you need to dress like you mean it and speak like you’ve got nothing to prove. In this episode, Mel shares how he built ...
Purple Teaming Is the New Job Security with Maril Vernon
Cybersecurity isn’t just red or blue anymore... it’s purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker ...
The AI Gold Rush in Cybersecurity with Chris Cochran
The new cybersecurity pioneers aren’t chasing alerts, they’re building with AI. But what happens when tools meant to assist begin making decisions for us? And what skills do we lose when ...
The AI That Tried to Escape with Ron Eddings
What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there. Host Ron Eddings ...
Zero Trust Isn’t a Tool — It’s Everything with George Finney
What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products? In this episode, George Finney, CISO at the University of Texas System and ...
Your Two-Year Edge Starts Now with Marco Figueroa
You won’t be replaced by AI—you’ll be replaced by someone using it better. Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a ...
WORK WITH US
PODCASTS + SPEAKING + EVENTS
Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.
Thank you!
We will be in touch soon and reach out to you at