Watch Now

Show Notes

Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic.

Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money.

Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )

 

Key Takeaways:

0:00 - Welcome back to the Hacker Valley Studio

1:10 - Ron's favorite topic! Security Architecture

1:45 - Security architecture is the foundation 

2:21 - Where a security architecture starts and stops

4:00 - A security architect is playing a game of Tower Defense

6:27 - Using EASY Framework as a security architect

10:04 - Prerequisites for becoming a security architect

13:55 - Differences between security architect and security engineers

16:55 - Resources for learning more about security architecture

19:21 - Stay in touch with Hacker Valley Studio!

 

Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram

Join our monthly mastermind group via Patreon

Learn more about our fantastic sponsor Upytcs

Recent Episodes

Aug 7, 2025

Debt vs. Risk: What the SharePoint Breach Taught Us with Ron ...

The riskiest move in cybersecurity? Playing it too safe. In this solo episode, Ron Eddings redefines the way we think about technical debt, risk, and missed opportunities, in security and in ...

Jul 31, 2025

The Future of Cyber Talent Is African with Confidence Staveley

The world’s youngest continent is also its most untapped resource. Confidence Staveley, Founder of CyberSafe, makes a powerful case for why Africa’s youth are the answer to global cybersecurity ...

Jul 24, 2025

Compliance Isn’t the Enemy with Jeff Man

Is compliance just a checkbox, or the backbone of real security? Returning to the show with decades of hard-earned insight, Jeff Man makes the case that compliance, especially PCI-DSS, isn't ...

Jul 17, 2025

What Makes a Great CISO? A Playbook from Gary Hayslip

What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to ...

Jul 10, 2025

Confidence, Coaching, and the S-Word with Mel Reyes

Want to stand out as a leader? According to our guest Mel Reyes, you need to dress like you mean it and speak like you’ve got nothing to prove. In this episode, Mel shares how he built ...

Jun 26, 2025

Purple Teaming Is the New Job Security with Maril Vernon

Cybersecurity isn’t just red or blue anymore... it’s purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker ...

Jun 19, 2025

The AI Gold Rush in Cybersecurity with Chris Cochran

The new cybersecurity pioneers aren’t chasing alerts, they’re building with AI. But what happens when tools meant to assist begin making decisions for us? And what skills do we lose when ...

Jun 12, 2025

The AI That Tried to Escape with Ron Eddings

What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there. Host Ron Eddings ...

Jun 5, 2025

Zero Trust Isn’t a Tool — It’s Everything with George Finney

What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products? In this episode, George Finney, CISO at the University of Texas System and ...

May 29, 2025

Your Two-Year Edge Starts Now with Marco Figueroa

You won’t be replaced by AI—you’ll be replaced by someone using it better. Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a ...

WORK WITH US

PODCASTS + SPEAKING + EVENTS

Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.