<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/ahead-of-the-threat" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Ahead of the Threat</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/ahead-of-the-threat</itunes:new-feed-url>
    <description>On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. 

Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging technology impact corporate America? How can corporate boards be structured for cyber resilience? What does the FBI think about generative artificial intelligence?</description>
    <copyright>© 2026 Federal Bureau of Investigation</copyright>
    <podcast:guid>7dd36477-23cf-5f41-93bf-06dda821a654</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Thu, 09 Apr 2026 13:58:55 -0400</pubDate>
    <lastBuildDate>Thu, 09 Apr 2026 13:59:28 -0400</lastBuildDate>
    <link>https://www.fbi.gov/aheadofthethreat</link>
    <image>
      <url>https://img.transistorcdn.com/EWZAAJ9NPVfZupg_Y0QK38AFjkX1rGmLbweB_m3lCOU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDBi/ZWVmNDI1NjBhNjVl/NjI1YzU1N2JjZWIw/ZGJlMC5wbmc.jpg</url>
      <title>Ahead of the Threat</title>
      <link>https://www.fbi.gov/aheadofthethreat</link>
    </image>
    <itunes:category text="Government"/>
    <itunes:category text="Business"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Federal Bureau of Investigation</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/EWZAAJ9NPVfZupg_Y0QK38AFjkX1rGmLbweB_m3lCOU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDBi/ZWVmNDI1NjBhNjVl/NjI1YzU1N2JjZWIw/ZGJlMC5wbmc.jpg"/>
    <itunes:summary>On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. 

Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging technology impact corporate America? How can corporate boards be structured for cyber resilience? What does the FBI think about generative artificial intelligence?</itunes:summary>
    <itunes:subtitle>On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals.</itunes:subtitle>
    <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business</itunes:keywords>
    <itunes:owner>
      <itunes:name>Federal Bureau of Investigation</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Season 2, Episode 5: Joe Levy</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Season 2, Episode 5: Joe Levy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6234d781-4ef8-4b0e-8c55-ddc1f9a32db1</guid>
      <link>https://share.transistor.fm/s/905d7e48</link>
      <description>
        <![CDATA[<p>Joining the show is a security practitioner who also happens to be a CEO. Joe Levy of Sophos and host Brett Leatherman, head of the FBI’s Cyber Division, discuss the application of Operation Winter SHIELD, with Levy calling it one of the most effective and approachable lists of cybersecurity tips available. Adopting just one of the plan’s 10 steps will make any company “infinitely better off,” Levy said. </p><p>Their conversation also highlights the “cybersecurity poverty line” that details the lack of CISOs in the workforce, the inherent risk and recommended research of third-party vendors, and a detailed examination of how a Sophos compromise was tracked to a device that displayed a greeting message on an office monitor. </p><p>To start the show, Brett is joined by Adam Maddock, the FBI’s section chief of the Cyber Technical Analysis and Operations Section. They discuss the highly technical Cyber Action Team and current news items that discuss software supply chain attacks, a “compromise” of Signal and Telegram, and the growing trend of hackers infiltrating everyday home devices.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Joining the show is a security practitioner who also happens to be a CEO. Joe Levy of Sophos and host Brett Leatherman, head of the FBI’s Cyber Division, discuss the application of Operation Winter SHIELD, with Levy calling it one of the most effective and approachable lists of cybersecurity tips available. Adopting just one of the plan’s 10 steps will make any company “infinitely better off,” Levy said. </p><p>Their conversation also highlights the “cybersecurity poverty line” that details the lack of CISOs in the workforce, the inherent risk and recommended research of third-party vendors, and a detailed examination of how a Sophos compromise was tracked to a device that displayed a greeting message on an office monitor. </p><p>To start the show, Brett is joined by Adam Maddock, the FBI’s section chief of the Cyber Technical Analysis and Operations Section. They discuss the highly technical Cyber Action Team and current news items that discuss software supply chain attacks, a “compromise” of Signal and Telegram, and the growing trend of hackers infiltrating everyday home devices.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 09 Apr 2026 13:58:55 -0400</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/905d7e48/52bef8b6.mp3" length="152841909" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>4722</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Joining the show is a security practitioner who also happens to be a CEO. Joe Levy of Sophos and host Brett Leatherman, head of the FBI’s Cyber Division, discuss the application of Operation Winter SHIELD, with Levy calling it one of the most effective and approachable lists of cybersecurity tips available. Adopting just one of the plan’s 10 steps will make any company “infinitely better off,” Levy said. </p><p>Their conversation also highlights the “cybersecurity poverty line” that details the lack of CISOs in the workforce, the inherent risk and recommended research of third-party vendors, and a detailed examination of how a Sophos compromise was tracked to a device that displayed a greeting message on an office monitor. </p><p>To start the show, Brett is joined by Adam Maddock, the FBI’s section chief of the Cyber Technical Analysis and Operations Section. They discuss the highly technical Cyber Action Team and current news items that discuss software supply chain attacks, a “compromise” of Signal and Telegram, and the growing trend of hackers infiltrating everyday home devices.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/905d7e48/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Season 2, Episode 4: Sherrod DeGrippo</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Season 2, Episode 4: Sherrod DeGrippo</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ff73441e-bc85-4a9b-aa02-f78a00c82a1f</guid>
      <link>https://share.transistor.fm/s/46264e31</link>
      <description>
        <![CDATA[<p>Microsoft joins the conversation on all things Operation Winter SHIELD, the FBI’s list of the 10 most impactful cybersecurity actions for organizations big and small. Sherrod DeGrippo, general manager of Microsoft's Global Threat Intelligence, shares why she wrote a blog post about the Bureau’s effort with host Brett Leatherman, head of FBI Cyber. The two highlight the increasing role AI plays in initiating—and stopping—cyberattacks, how experts have observed that fundamental cybersecurity steps are enough to discourage a would-be hacker, and how security teams can be even more effective when they develop a partnership with software developers.  </p><p>To start the show, Ahead of the Threat goes international! Brett discusses the critical role international cyber investigators play for the FBI with program manager Maeve Healy of the Global Partnership Program. They also explore recent news topics, including Operation Lightning, an alleged ransomware negotiator who secretly worked against his company, and industry’s growing calls to include AI in its cybersecurity toolbox.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Microsoft joins the conversation on all things Operation Winter SHIELD, the FBI’s list of the 10 most impactful cybersecurity actions for organizations big and small. Sherrod DeGrippo, general manager of Microsoft's Global Threat Intelligence, shares why she wrote a blog post about the Bureau’s effort with host Brett Leatherman, head of FBI Cyber. The two highlight the increasing role AI plays in initiating—and stopping—cyberattacks, how experts have observed that fundamental cybersecurity steps are enough to discourage a would-be hacker, and how security teams can be even more effective when they develop a partnership with software developers.  </p><p>To start the show, Ahead of the Threat goes international! Brett discusses the critical role international cyber investigators play for the FBI with program manager Maeve Healy of the Global Partnership Program. They also explore recent news topics, including Operation Lightning, an alleged ransomware negotiator who secretly worked against his company, and industry’s growing calls to include AI in its cybersecurity toolbox.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 Mar 2026 13:21:00 -0400</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/46264e31/03ca382f.mp3" length="158285533" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>4901</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Microsoft joins the conversation on all things Operation Winter SHIELD, the FBI’s list of the 10 most impactful cybersecurity actions for organizations big and small. Sherrod DeGrippo, general manager of Microsoft's Global Threat Intelligence, shares why she wrote a blog post about the Bureau’s effort with host Brett Leatherman, head of FBI Cyber. The two highlight the increasing role AI plays in initiating—and stopping—cyberattacks, how experts have observed that fundamental cybersecurity steps are enough to discourage a would-be hacker, and how security teams can be even more effective when they develop a partnership with software developers.  </p><p>To start the show, Ahead of the Threat goes international! Brett discusses the critical role international cyber investigators play for the FBI with program manager Maeve Healy of the Global Partnership Program. They also explore recent news topics, including Operation Lightning, an alleged ransomware negotiator who secretly worked against his company, and industry’s growing calls to include AI in its cybersecurity toolbox.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/46264e31/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Season 2, Episode 3: Amy Herzog</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Season 2, Episode 3: Amy Herzog</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">49809ee4-a979-42d8-83b2-c85098fd6b29</guid>
      <link>https://share.transistor.fm/s/a127c30f</link>
      <description>
        <![CDATA[<p>Is a breach a security problem or a business problem? For guest Amy Herzog, CISO and vice president of Amazon Web Services, "security is what you bring to customers." Amy joins the show for a wide-ranging discussion with host Brett Leatherman on Operation Winter SHIELD. The two touch on how, in reality, AI makes bad hackers mediocre hackers; the importance of log retention (first mention this season!); that the most effective way to protect your business is by doing the basics (because most hackers succeed by exploiting the basics); and finally, learn how imagining yourself as a pilot puts you on the path for cybersecurity success. </p><p>In the show's opening, Brett is joined by the head of the FBI's Cyber Operations, Deputy Assistant Director Jason Bilnoski. They discuss the takedowns of LeakBase and Tycoon 2FAs while also wondering...if hackers use AI to infiltrate a system, should owners use AI to protect those systems?</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Is a breach a security problem or a business problem? For guest Amy Herzog, CISO and vice president of Amazon Web Services, "security is what you bring to customers." Amy joins the show for a wide-ranging discussion with host Brett Leatherman on Operation Winter SHIELD. The two touch on how, in reality, AI makes bad hackers mediocre hackers; the importance of log retention (first mention this season!); that the most effective way to protect your business is by doing the basics (because most hackers succeed by exploiting the basics); and finally, learn how imagining yourself as a pilot puts you on the path for cybersecurity success. </p><p>In the show's opening, Brett is joined by the head of the FBI's Cyber Operations, Deputy Assistant Director Jason Bilnoski. They discuss the takedowns of LeakBase and Tycoon 2FAs while also wondering...if hackers use AI to infiltrate a system, should owners use AI to protect those systems?</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Mar 2026 13:38:09 -0400</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/a127c30f/1443b711.mp3" length="127248389" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>3915</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Is a breach a security problem or a business problem? For guest Amy Herzog, CISO and vice president of Amazon Web Services, "security is what you bring to customers." Amy joins the show for a wide-ranging discussion with host Brett Leatherman on Operation Winter SHIELD. The two touch on how, in reality, AI makes bad hackers mediocre hackers; the importance of log retention (first mention this season!); that the most effective way to protect your business is by doing the basics (because most hackers succeed by exploiting the basics); and finally, learn how imagining yourself as a pilot puts you on the path for cybersecurity success. </p><p>In the show's opening, Brett is joined by the head of the FBI's Cyber Operations, Deputy Assistant Director Jason Bilnoski. They discuss the takedowns of LeakBase and Tycoon 2FAs while also wondering...if hackers use AI to infiltrate a system, should owners use AI to protect those systems?</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, FBI Cyber, FBI Cyber Division, Brett Leatherman, Ahead of the Threat, Ahead of the Threat Podcast, AOTT, aott, ahead of the threat, CISO, CEO, business, private sector, risk management, risk manager, board of directors, critical infrastructure, national security, natsec, nat sec, economic security, homeland security, cyber risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a127c30f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Season 2, Episode 2: John Hammond</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Season 2, Episode 2: John Hammond</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">09357ead-5e8a-48f1-85d2-a65366c579e6</guid>
      <link>https://share.transistor.fm/s/bfe0e2aa</link>
      <description>
        <![CDATA[<p>Search no further for an engaging, practical conversation from two cybersecurity experts! Diving into the FBI’s Operation Winter SHIELD initiative, John Hammond, the principal security researcher at Huntress, (who also has a YouTube channel with 2.1+ million subscribers) joins host Brett Leatherman for a wide-ranging discussion on hacking trends, how not every user in your organization needs full rights access, and that a basic inventory of IT equipment can be the most important cybersecurity step you take! Starting the show, Brett is joined by Michael Machtinger, the FBI’s deputy assistant director for the Cyber Intelligence Branch. After learning how the branch supports the Bureau’s cyber mission, the two discuss “slave” hackers from North Korea, CISA’s latest recommendation for end-of-life devices, and how hackers use remote proxy servers to attack within the U.S.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Search no further for an engaging, practical conversation from two cybersecurity experts! Diving into the FBI’s Operation Winter SHIELD initiative, John Hammond, the principal security researcher at Huntress, (who also has a YouTube channel with 2.1+ million subscribers) joins host Brett Leatherman for a wide-ranging discussion on hacking trends, how not every user in your organization needs full rights access, and that a basic inventory of IT equipment can be the most important cybersecurity step you take! Starting the show, Brett is joined by Michael Machtinger, the FBI’s deputy assistant director for the Cyber Intelligence Branch. After learning how the branch supports the Bureau’s cyber mission, the two discuss “slave” hackers from North Korea, CISA’s latest recommendation for end-of-life devices, and how hackers use remote proxy servers to attack within the U.S.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 Feb 2026 12:24:52 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/bfe0e2aa/2a2c545f.mp3" length="139778465" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>4342</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Search no further for an engaging, practical conversation from two cybersecurity experts! Diving into the FBI’s Operation Winter SHIELD initiative, John Hammond, the principal security researcher at Huntress, (who also has a YouTube channel with 2.1+ million subscribers) joins host Brett Leatherman for a wide-ranging discussion on hacking trends, how not every user in your organization needs full rights access, and that a basic inventory of IT equipment can be the most important cybersecurity step you take! Starting the show, Brett is joined by Michael Machtinger, the FBI’s deputy assistant director for the Cyber Intelligence Branch. After learning how the branch supports the Bureau’s cyber mission, the two discuss “slave” hackers from North Korea, CISA’s latest recommendation for end-of-life devices, and how hackers use remote proxy servers to attack within the U.S.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, FBI Cyber, FBI Cyber Division, Brett Leatherman, Ahead of the Threat, Ahead of the Threat Podcast, AOTT, aott, ahead of the threat, CISO, CEO, business, private sector, risk management, risk manager, board of directors, critical infrastructure, national security, natsec, nat sec, economic security, homeland security, cyber risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/bfe0e2aa/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Season 2, Episode 1: John Hultquist</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Season 2, Episode 1: John Hultquist</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9182ecd7-478d-4543-99eb-662a5970d6a4</guid>
      <link>https://share.transistor.fm/s/2213c3e6</link>
      <description>
        <![CDATA[<p>In the first full episode for Season 2, host Brett Leatherman, assistant director of the FBI’s Cyber Division, welcomes the self-described cyberthreat hunter John Hultquist, the chief analyst of the Google Threat Intelligence Group. </p><p>In their conversation, John highlights that not being hacked is unrealistic. Creating resilience, especially in how fast you can get back online following an attack, is the best mitigation approach. AI is also discussed, with John citing how since hackers use it to infiltrate systems, organizations must use AI in any countermeasure. </p><p>Brett also announces Operation Winter SHIELD, the FBI’s first-of-its-kind campaign to highlight the 10 most common ways the FBI sees companies get victimized by cyberattacks. Learn more at fbi.gov/wintershield. </p><p>The news segment also returns in Season 2, with Brett joined by special guest Kristin Grimes, an FBI unit chief in the Cyber Law Unit, discussing the effects of CISA 2015’s (maybe) reauthorization, edge device exploitation, and the White House’s executive order on AI. Joint Advisories: https://www.cisa.gov/news-events/news/cisa-uk-ncsc-fbi-unveil-principles-combat-cyber-risks-ot</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the first full episode for Season 2, host Brett Leatherman, assistant director of the FBI’s Cyber Division, welcomes the self-described cyberthreat hunter John Hultquist, the chief analyst of the Google Threat Intelligence Group. </p><p>In their conversation, John highlights that not being hacked is unrealistic. Creating resilience, especially in how fast you can get back online following an attack, is the best mitigation approach. AI is also discussed, with John citing how since hackers use it to infiltrate systems, organizations must use AI in any countermeasure. </p><p>Brett also announces Operation Winter SHIELD, the FBI’s first-of-its-kind campaign to highlight the 10 most common ways the FBI sees companies get victimized by cyberattacks. Learn more at fbi.gov/wintershield. </p><p>The news segment also returns in Season 2, with Brett joined by special guest Kristin Grimes, an FBI unit chief in the Cyber Law Unit, discussing the effects of CISA 2015’s (maybe) reauthorization, edge device exploitation, and the White House’s executive order on AI. Joint Advisories: https://www.cisa.gov/news-events/news/cisa-uk-ncsc-fbi-unveil-principles-combat-cyber-risks-ot</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Feb 2026 15:59:37 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/2213c3e6/7125cc0c.mp3" length="156463325" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>4864</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the first full episode for Season 2, host Brett Leatherman, assistant director of the FBI’s Cyber Division, welcomes the self-described cyberthreat hunter John Hultquist, the chief analyst of the Google Threat Intelligence Group. </p><p>In their conversation, John highlights that not being hacked is unrealistic. Creating resilience, especially in how fast you can get back online following an attack, is the best mitigation approach. AI is also discussed, with John citing how since hackers use it to infiltrate systems, organizations must use AI in any countermeasure. </p><p>Brett also announces Operation Winter SHIELD, the FBI’s first-of-its-kind campaign to highlight the 10 most common ways the FBI sees companies get victimized by cyberattacks. Learn more at fbi.gov/wintershield. </p><p>The news segment also returns in Season 2, with Brett joined by special guest Kristin Grimes, an FBI unit chief in the Cyber Law Unit, discussing the effects of CISA 2015’s (maybe) reauthorization, edge device exploitation, and the White House’s executive order on AI. Joint Advisories: https://www.cisa.gov/news-events/news/cisa-uk-ncsc-fbi-unveil-principles-combat-cyber-risks-ot</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, FBI Cyber, FBI Cyber Division, Brett Leatherman, Ahead of the Threat, Ahead of the Threat Podcast, AOTT, aott, ahead of the threat, CISO, CEO, business, private sector, risk management, risk manager, board of directors, critical infrastructure, national security, natsec, nat sec, economic security, homeland security, cyber risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2213c3e6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Season Two, Episode Zero: Brett Leatherman</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Season Two, Episode Zero: Brett Leatherman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cd78072f-6267-4d99-8854-4b099dea0292</guid>
      <link>https://share.transistor.fm/s/f1b732b3</link>
      <description>
        <![CDATA[<p>Ahead of the Threat returns for its second season! Join our new host, Brett Leatherman, the assistant director of the FBI’s Cyber Division, as he discusses the current landscape of cyberthreats targeting businesses and critical infrastructure with the goal to inspire listeners to step back from the day-to-day to see the cyber threat more clearly, connect the dots and drive change. </p><p>With guests ranging from the private sector to government officials, Brett will highlight the administration’s cyber strategy and the FBI’s launch of Operation Winter SHIELD, a campaign to defend the homeland against cyber threats with real economic and national security implications.  </p><p>If you’re on a cybersecurity team, a CISO, risk manager, CEO, on a board of directors, or just interested in stopping cyberattacks, join the FBI as we all get ahead of the threat.   </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ahead of the Threat returns for its second season! Join our new host, Brett Leatherman, the assistant director of the FBI’s Cyber Division, as he discusses the current landscape of cyberthreats targeting businesses and critical infrastructure with the goal to inspire listeners to step back from the day-to-day to see the cyber threat more clearly, connect the dots and drive change. </p><p>With guests ranging from the private sector to government officials, Brett will highlight the administration’s cyber strategy and the FBI’s launch of Operation Winter SHIELD, a campaign to defend the homeland against cyber threats with real economic and national security implications.  </p><p>If you’re on a cybersecurity team, a CISO, risk manager, CEO, on a board of directors, or just interested in stopping cyberattacks, join the FBI as we all get ahead of the threat.   </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Jan 2026 11:36:44 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/f1b732b3/aeb15d05.mp3" length="11676576" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>357</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Ahead of the Threat returns for its second season! Join our new host, Brett Leatherman, the assistant director of the FBI’s Cyber Division, as he discusses the current landscape of cyberthreats targeting businesses and critical infrastructure with the goal to inspire listeners to step back from the day-to-day to see the cyber threat more clearly, connect the dots and drive change. </p><p>With guests ranging from the private sector to government officials, Brett will highlight the administration’s cyber strategy and the FBI’s launch of Operation Winter SHIELD, a campaign to defend the homeland against cyber threats with real economic and national security implications.  </p><p>If you’re on a cybersecurity team, a CISO, risk manager, CEO, on a board of directors, or just interested in stopping cyberattacks, join the FBI as we all get ahead of the threat.   </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, FBI Cyber, FBI Cyber Division, Brett Leatherman, Ahead of the Threat, Ahead of the Threat Podcast, AOTT, aott, ahead of the threat, CISO, CEO, business, private sector, risk management, risk manager, board of directors, critical infrastructure, national security, natsec, nat sec, economic security, homeland security, cyber risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f1b732b3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Ten - Hugh Thompson</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode Ten - Hugh Thompson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2f15caff-9319-4f01-92aa-7cb7b6f44a80</guid>
      <link>https://share.transistor.fm/s/45fa6e2c</link>
      <description>
        <![CDATA[<p>The show is on the road! Filming on location at the annual RSAC Conference in San Francisco, hosts Bryan Vorndran and Jamil Farshchi welcome Dr. Hugh Thompson, the executive chairman of RSAC and the program coordinator of the RSAC Conference. The annual conference gathers thousands of cybersecurity officials from the private and public sector to discuss ways to thwart attacks and institute best practices. In this episode, Dr. Thompson highlights the importance of government participation, how to keep the relationships and knowledge-sharing going throughout the year, and the importance of being community-oriented to ensure effective cybersecurity postures against criminal adversaries.  </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The show is on the road! Filming on location at the annual RSAC Conference in San Francisco, hosts Bryan Vorndran and Jamil Farshchi welcome Dr. Hugh Thompson, the executive chairman of RSAC and the program coordinator of the RSAC Conference. The annual conference gathers thousands of cybersecurity officials from the private and public sector to discuss ways to thwart attacks and institute best practices. In this episode, Dr. Thompson highlights the importance of government participation, how to keep the relationships and knowledge-sharing going throughout the year, and the importance of being community-oriented to ensure effective cybersecurity postures against criminal adversaries.  </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 21 May 2025 18:02:05 -0400</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/45fa6e2c/17b8fa1c.mp3" length="47091887" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>1943</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The show is on the road! Filming on location at the annual RSAC Conference in San Francisco, hosts Bryan Vorndran and Jamil Farshchi welcome Dr. Hugh Thompson, the executive chairman of RSAC and the program coordinator of the RSAC Conference. The annual conference gathers thousands of cybersecurity officials from the private and public sector to discuss ways to thwart attacks and institute best practices. In this episode, Dr. Thompson highlights the importance of government participation, how to keep the relationships and knowledge-sharing going throughout the year, and the importance of being community-oriented to ensure effective cybersecurity postures against criminal adversaries.  </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>FBI, Federal Bureau of Investigation, podcast, Ahead of the Threat, cyber, cyber security, cybersecurity, intelligence, law enforcement, government, FBI Cyber, FBI Cyber Division, Hugh Thompson, Bryan Vorndran, Jamil Farshchi, RSAC, RSA</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/45fa6e2c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Nine - Meredith Griffanti</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode Nine - Meredith Griffanti</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1146fd9a-5413-462c-bf61-3506d10627b3</guid>
      <link>https://share.transistor.fm/s/863a3c01</link>
      <description>
        <![CDATA[<p>Are you an expert in communications? Do you need communications help? Are you ready for how to communicate to employees, the government, or your customers if a crisis happens? Many agencies believe they have it covered, but when a crisis does happen, the reality comes into focus that communications is a more nuanced and involved part of a response. Meredith Griffanti and her team do this “all day, every day.” As FTI’s senior managing director for cybersecurity and data privacy communications, Griffanti discusses her observations about the industry, common pitfalls and some changing attitudes about communications with hosts Bryan Vorndran, FBI assistant director of the Cyber Division, and Jamil Farshchi, an FBI strategic engagement advisor. Kicking off this episode’s Top Three segment with a look at current cybersecurity news, Bryan and Jamil assess the return of the LockBit ransomware group, a new tactic of “microransoms” targeting everyday users, and an FBI advisory warning people about fake FBI agents claiming to be from the Internet Crime Complaint Center (IC3). You can read the full public service announcement from IC3 at <a href="https://www.ic3.gov/PSA/2025/PSA250418">ic3.gov/PSA/2025/PSA250418</a>.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are you an expert in communications? Do you need communications help? Are you ready for how to communicate to employees, the government, or your customers if a crisis happens? Many agencies believe they have it covered, but when a crisis does happen, the reality comes into focus that communications is a more nuanced and involved part of a response. Meredith Griffanti and her team do this “all day, every day.” As FTI’s senior managing director for cybersecurity and data privacy communications, Griffanti discusses her observations about the industry, common pitfalls and some changing attitudes about communications with hosts Bryan Vorndran, FBI assistant director of the Cyber Division, and Jamil Farshchi, an FBI strategic engagement advisor. Kicking off this episode’s Top Three segment with a look at current cybersecurity news, Bryan and Jamil assess the return of the LockBit ransomware group, a new tactic of “microransoms” targeting everyday users, and an FBI advisory warning people about fake FBI agents claiming to be from the Internet Crime Complaint Center (IC3). You can read the full public service announcement from IC3 at <a href="https://www.ic3.gov/PSA/2025/PSA250418">ic3.gov/PSA/2025/PSA250418</a>.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 30 Apr 2025 16:01:43 -0400</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/863a3c01/e7b41eb9.mp3" length="74856114" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>3071</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are you an expert in communications? Do you need communications help? Are you ready for how to communicate to employees, the government, or your customers if a crisis happens? Many agencies believe they have it covered, but when a crisis does happen, the reality comes into focus that communications is a more nuanced and involved part of a response. Meredith Griffanti and her team do this “all day, every day.” As FTI’s senior managing director for cybersecurity and data privacy communications, Griffanti discusses her observations about the industry, common pitfalls and some changing attitudes about communications with hosts Bryan Vorndran, FBI assistant director of the Cyber Division, and Jamil Farshchi, an FBI strategic engagement advisor. Kicking off this episode’s Top Three segment with a look at current cybersecurity news, Bryan and Jamil assess the return of the LockBit ransomware group, a new tactic of “microransoms” targeting everyday users, and an FBI advisory warning people about fake FBI agents claiming to be from the Internet Crime Complaint Center (IC3). You can read the full public service announcement from IC3 at <a href="https://www.ic3.gov/PSA/2025/PSA250418">ic3.gov/PSA/2025/PSA250418</a>.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>FBI, Federal Bureau of Investigation, podcast, Ahead of the Threat, cyber, cyber hygiene, cyber security, cybersecurity, ransomware, IC3, Internet Crime Complaint Center, Internet Crime Complaints Center, intelligence, law enforcement, government, FBI Cyber, FBI Cyber Division, Meredith Griffanti, FTI, data privacy, LockBit, Lockbit, Bryan Vorndran, Jamil Farshchi</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/863a3c01/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Eight - Scott Aaronson</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode Eight - Scott Aaronson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d825518d-f190-45ff-b7ed-544da6a83f80</guid>
      <link>https://share.transistor.fm/s/dd3d9939</link>
      <description>
        <![CDATA[<p>Class is in session! Professor Scott Aaronson, a leading researcher in quantum computers, takes time away from his teaching at the University of Texas at Austin to give Ahead of the Threat a detailed overview of quantum theory and the applications of what a quantum computer could do—when one is invented. Though a real quantum computer remains unlikely for a few more years, its potential to unravel nearly all known encryption has led to the development of post-quantum encryption to protect sensitive data. </p><p>In the episode’s Top Three segment that highlights current cybersecurity news, hosts Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi, FBI strategic engagement advisor, discuss Google’s acquisition of the cloud computing company Wiz for $32 billion; the European Union's Artificial Intelligence Act, and a new ransomware attack at Jaguar Land Rover.</p><p>You can read an FBI Joint Cybersecurity Advisory on Medusa Ransomware at <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a">cisa.gov/news-events/cybersecurity-advisories/aa25-071a</a>. You can also read NIST’s Post-Quantum Cryptography Standardization Overview at <a href="https://csrc.nist.gov/projects/post-quantum-cryptography">csrc.nist.gov/projects/post-quantum-cryptography</a>. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Class is in session! Professor Scott Aaronson, a leading researcher in quantum computers, takes time away from his teaching at the University of Texas at Austin to give Ahead of the Threat a detailed overview of quantum theory and the applications of what a quantum computer could do—when one is invented. Though a real quantum computer remains unlikely for a few more years, its potential to unravel nearly all known encryption has led to the development of post-quantum encryption to protect sensitive data. </p><p>In the episode’s Top Three segment that highlights current cybersecurity news, hosts Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi, FBI strategic engagement advisor, discuss Google’s acquisition of the cloud computing company Wiz for $32 billion; the European Union's Artificial Intelligence Act, and a new ransomware attack at Jaguar Land Rover.</p><p>You can read an FBI Joint Cybersecurity Advisory on Medusa Ransomware at <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a">cisa.gov/news-events/cybersecurity-advisories/aa25-071a</a>. You can also read NIST’s Post-Quantum Cryptography Standardization Overview at <a href="https://csrc.nist.gov/projects/post-quantum-cryptography">csrc.nist.gov/projects/post-quantum-cryptography</a>. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 26 Mar 2025 12:20:08 -0400</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/dd3d9939/3bb55e72.mp3" length="98185429" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>4044</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Class is in session! Professor Scott Aaronson, a leading researcher in quantum computers, takes time away from his teaching at the University of Texas at Austin to give Ahead of the Threat a detailed overview of quantum theory and the applications of what a quantum computer could do—when one is invented. Though a real quantum computer remains unlikely for a few more years, its potential to unravel nearly all known encryption has led to the development of post-quantum encryption to protect sensitive data. </p><p>In the episode’s Top Three segment that highlights current cybersecurity news, hosts Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi, FBI strategic engagement advisor, discuss Google’s acquisition of the cloud computing company Wiz for $32 billion; the European Union's Artificial Intelligence Act, and a new ransomware attack at Jaguar Land Rover.</p><p>You can read an FBI Joint Cybersecurity Advisory on Medusa Ransomware at <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a">cisa.gov/news-events/cybersecurity-advisories/aa25-071a</a>. You can also read NIST’s Post-Quantum Cryptography Standardization Overview at <a href="https://csrc.nist.gov/projects/post-quantum-cryptography">csrc.nist.gov/projects/post-quantum-cryptography</a>. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>. </p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, FBI cyber podcast, FBI cyber, Ahead of the Threat Podcast, ahead of the threat, business, cyber, Bryan Vorndran, Jamil Farshchi, Google, Wiz, EU, European Union, Artificial Intelligence Act, Medusa Ransomware, ransomware, NIST, quantum, physics, quantum cryptography, quantum theory,  encryption, University of Texas at Austin</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dd3d9939/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Seven - Paul Proctor</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode Seven - Paul Proctor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f3e4222f-0cb6-4e51-a885-eddc8d2adea0</guid>
      <link>https://share.transistor.fm/s/690c240a</link>
      <description>
        <![CDATA[<p>Paul Proctor, a Gartner analyst for 20 years, joins the show to discuss practical approaches businesses can apply to make cybersecurity more effective. Through thousands of hours of outreach, Proctor sees a broken system that can improve with better communication and partnership between executives and chief information security officers to create strategies based on “outcome-driven metrics.” One example is identifying the cost to return systems online in a specific time frame following a breach, while understanding that cutting funds to that effort jeopardizes the timeline. </p><p>Hosts Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi, FBI strategic engagement advisor, discuss the importance of cybersecurity 'fundamentals' and how measured approaches can lead to more success in a field more complicated than many think. Commenting on current events in the 'Top Three' segment, Vorndran and Farshchi highlight DeepSeek AI, the new updates to United HealthGroup’s breach, and new reporting requirements for critical infrastructure cyber incidents (Cyber Incident Reporting for Critical Infrastructure Act, or CIRCIA). </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Paul Proctor, a Gartner analyst for 20 years, joins the show to discuss practical approaches businesses can apply to make cybersecurity more effective. Through thousands of hours of outreach, Proctor sees a broken system that can improve with better communication and partnership between executives and chief information security officers to create strategies based on “outcome-driven metrics.” One example is identifying the cost to return systems online in a specific time frame following a breach, while understanding that cutting funds to that effort jeopardizes the timeline. </p><p>Hosts Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi, FBI strategic engagement advisor, discuss the importance of cybersecurity 'fundamentals' and how measured approaches can lead to more success in a field more complicated than many think. Commenting on current events in the 'Top Three' segment, Vorndran and Farshchi highlight DeepSeek AI, the new updates to United HealthGroup’s breach, and new reporting requirements for critical infrastructure cyber incidents (Cyber Incident Reporting for Critical Infrastructure Act, or CIRCIA). </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Feb 2025 13:13:31 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/690c240a/c1b6b555.mp3" length="73283041" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>2998</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Paul Proctor, a Gartner analyst for 20 years, joins the show to discuss practical approaches businesses can apply to make cybersecurity more effective. Through thousands of hours of outreach, Proctor sees a broken system that can improve with better communication and partnership between executives and chief information security officers to create strategies based on “outcome-driven metrics.” One example is identifying the cost to return systems online in a specific time frame following a breach, while understanding that cutting funds to that effort jeopardizes the timeline. </p><p>Hosts Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi, FBI strategic engagement advisor, discuss the importance of cybersecurity 'fundamentals' and how measured approaches can lead to more success in a field more complicated than many think. Commenting on current events in the 'Top Three' segment, Vorndran and Farshchi highlight DeepSeek AI, the new updates to United HealthGroup’s breach, and new reporting requirements for critical infrastructure cyber incidents (Cyber Incident Reporting for Critical Infrastructure Act, or CIRCIA). </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, fbi cyber podcast, fbi cyber, ahead of the threat podcast, ahead of the threat, business, cyber, fbi, fbi podcast, fbi podcasts, fbi cyber, fbi cyber division, bryan vorndran, jamil farshchi, paul proctor, gartner, deepseek, ai, artificial intelligence, CIRCIA, cyber incident reporting for critical infrastructure act, critical infrastructure, cyber incidents</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/690c240a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Ahead of the Threat Podcast: Episode Six - Charles Carmakal</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Ahead of the Threat Podcast: Episode Six - Charles Carmakal</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">19a0af16-cc92-4d61-a6aa-f0d42e645b63</guid>
      <link>https://share.transistor.fm/s/60164739</link>
      <description>
        <![CDATA[<p>For our first episode of 2025, Charles Carmakal joins the show to discuss all things Scattered Spider. As the chief technology officer at Mandiant, Charles details a disturbing trend of compromises through seemingly unsophisticated, yet highly effective approaches, including hackers who trick organization help desks into granting them system access. Hosts Bryan Vorndran, the assistant director of the FBI's Cyber Division, and Jamil Farshchi, an FBI strategic engagement advisor, discuss mitigation techniques that companies, such as Mandiant, recommend to clients. In the episode’s Top Three segment, Bryan and Jamil discuss the breaches of BeyondTrust and Data School and give an update on Salt Typhoon.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>For our first episode of 2025, Charles Carmakal joins the show to discuss all things Scattered Spider. As the chief technology officer at Mandiant, Charles details a disturbing trend of compromises through seemingly unsophisticated, yet highly effective approaches, including hackers who trick organization help desks into granting them system access. Hosts Bryan Vorndran, the assistant director of the FBI's Cyber Division, and Jamil Farshchi, an FBI strategic engagement advisor, discuss mitigation techniques that companies, such as Mandiant, recommend to clients. In the episode’s Top Three segment, Bryan and Jamil discuss the breaches of BeyondTrust and Data School and give an update on Salt Typhoon.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 15 Jan 2025 09:37:46 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/60164739/06acf79b.mp3" length="93339770" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>3835</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>For our first episode of 2025, Charles Carmakal joins the show to discuss all things Scattered Spider. As the chief technology officer at Mandiant, Charles details a disturbing trend of compromises through seemingly unsophisticated, yet highly effective approaches, including hackers who trick organization help desks into granting them system access. Hosts Bryan Vorndran, the assistant director of the FBI's Cyber Division, and Jamil Farshchi, an FBI strategic engagement advisor, discuss mitigation techniques that companies, such as Mandiant, recommend to clients. In the episode’s Top Three segment, Bryan and Jamil discuss the breaches of BeyondTrust and Data School and give an update on Salt Typhoon.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, Ahead of the Threat, ahead of the threat, Ahead of the Threat podcast, FBI Cyber podcast, FBI Cyber, cyber, Scattered Spider, encryption, scattered spider, Charles Carmakal, Mandiant, salt typhoon, Salt Typhoon, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/60164739/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Five: Rachel Lavender</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode Five: Rachel Lavender</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">89e51a19-5db3-4b44-82d8-8fa6e8f42e59</guid>
      <link>https://share.transistor.fm/s/abea8524</link>
      <description>
        <![CDATA[<p>For our last episode until 2025, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Rachel Lavender, managing director of the cyber practice at Marsh McLennan. As a seasoned cyber-insurance broker, Rachel discusses the partnership between a company and a cyber-insurance service, working together to build and implement effective cybersecurity measures over time. She also highlights act-of-war clauses and the growing information the insurance industry has obtained in a short time by servicing victim clients, resulting in better coverage and recommendations. For the episode’s Top Three segment recounting recent events, Bryan and Jamil discuss the unsealing of charges against members of Scattered Spider, the U.S. Securities and Exchange Commission’s cybersecurity reporting rules, and reasonably managed encryption.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>For our last episode until 2025, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Rachel Lavender, managing director of the cyber practice at Marsh McLennan. As a seasoned cyber-insurance broker, Rachel discusses the partnership between a company and a cyber-insurance service, working together to build and implement effective cybersecurity measures over time. She also highlights act-of-war clauses and the growing information the insurance industry has obtained in a short time by servicing victim clients, resulting in better coverage and recommendations. For the episode’s Top Three segment recounting recent events, Bryan and Jamil discuss the unsealing of charges against members of Scattered Spider, the U.S. Securities and Exchange Commission’s cybersecurity reporting rules, and reasonably managed encryption.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Dec 2024 14:43:58 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/abea8524/822d1ab5.mp3" length="83608755" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>3412</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>For our last episode until 2025, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Rachel Lavender, managing director of the cyber practice at Marsh McLennan. As a seasoned cyber-insurance broker, Rachel discusses the partnership between a company and a cyber-insurance service, working together to build and implement effective cybersecurity measures over time. She also highlights act-of-war clauses and the growing information the insurance industry has obtained in a short time by servicing victim clients, resulting in better coverage and recommendations. For the episode’s Top Three segment recounting recent events, Bryan and Jamil discuss the unsealing of charges against members of Scattered Spider, the U.S. Securities and Exchange Commission’s cybersecurity reporting rules, and reasonably managed encryption.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, Ahead of the Threat, ahead of the threat, Ahead of the Threat podcast, FBI Cyber podcast, FBI Cyber, cyber, Rachel Lavender, Marsh McLennan, Marsh &amp; McLennan Companies, Marsh McLennan Companies, cyber insurance, cybersecurity insurance, insurance, SEC, Scattered Spider, encryption</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/abea8524/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Four - Wendi Whitmore</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode Four - Wendi Whitmore</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7e4cdba0-d387-494b-a31e-b80cd5cd4c91</guid>
      <link>https://share.transistor.fm/s/126d1246</link>
      <description>
        <![CDATA[<p>This week on Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Wendi Whitmore, senior vice president of Palo Alto Networks’ Unit 42. Drawing on her experience with cyber threat intelligence and incident response, Wendi talks about the growing sophistication of the cybercriminal business model and the need to have visibility across all company networks and infrastructure. She also highlights a growing trend in which companies have a “pre-built” environment that they would potentially move towards in case of a cyberattack. At the start of the episode, Bryan and Jamil discuss trending topics like the North Korean information technology worker threat, the Blue Yonder compromise, and the latest social engineering scheme from the cybercriminal group Black Basta. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week on Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Wendi Whitmore, senior vice president of Palo Alto Networks’ Unit 42. Drawing on her experience with cyber threat intelligence and incident response, Wendi talks about the growing sophistication of the cybercriminal business model and the need to have visibility across all company networks and infrastructure. She also highlights a growing trend in which companies have a “pre-built” environment that they would potentially move towards in case of a cyberattack. At the start of the episode, Bryan and Jamil discuss trending topics like the North Korean information technology worker threat, the Blue Yonder compromise, and the latest social engineering scheme from the cybercriminal group Black Basta. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Dec 2024 16:57:24 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/126d1246/d12d7b57.mp3" length="76371007" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>3135</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This week on Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Wendi Whitmore, senior vice president of Palo Alto Networks’ Unit 42. Drawing on her experience with cyber threat intelligence and incident response, Wendi talks about the growing sophistication of the cybercriminal business model and the need to have visibility across all company networks and infrastructure. She also highlights a growing trend in which companies have a “pre-built” environment that they would potentially move towards in case of a cyberattack. At the start of the episode, Bryan and Jamil discuss trending topics like the North Korean information technology worker threat, the Blue Yonder compromise, and the latest social engineering scheme from the cybercriminal group Black Basta. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, Ahead of the Threat, ahead of the threat, Ahead of the Threat podcast, FBI Cyber podcast, FBI Cyber, Wendi Whitmore, Palo Alto Networks, Unit 42, cyber threat intelligence, threat intelligence, incident response, cyber</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/126d1246/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Three - Chris Cwalina</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode Three - Chris Cwalina</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">34846d48-d3fd-4bb4-aad3-f728e9157727</guid>
      <link>https://share.transistor.fm/s/925cf784</link>
      <description>
        <![CDATA[<p>On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Chris Cwalina, global head of cybersecurity and privacy at Norton Rose Fulbright. Chris and his team of lawyers advise clients on how to minimize damage from sophisticated data breaches and cybersecurity incidents. </p><p>Chris reveals why many companies have a false sense of readiness and security before a breach. He also talks about fostering a security culture and the importance of having clear lines of decision-making when it comes to risk management. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like the Fortinet VPN zero-day, the extradition of the Phobos ransomware administrator, and the sentencing of U.S.-based co-conspirators behind the Bitfenix cryptocurrency exchange theft. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Chris Cwalina, global head of cybersecurity and privacy at Norton Rose Fulbright. Chris and his team of lawyers advise clients on how to minimize damage from sophisticated data breaches and cybersecurity incidents. </p><p>Chris reveals why many companies have a false sense of readiness and security before a breach. He also talks about fostering a security culture and the importance of having clear lines of decision-making when it comes to risk management. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like the Fortinet VPN zero-day, the extradition of the Phobos ransomware administrator, and the sentencing of U.S.-based co-conspirators behind the Bitfenix cryptocurrency exchange theft. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 20 Nov 2024 12:39:53 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/925cf784/c744dafe.mp3" length="82856695" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>3396</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Chris Cwalina, global head of cybersecurity and privacy at Norton Rose Fulbright. Chris and his team of lawyers advise clients on how to minimize damage from sophisticated data breaches and cybersecurity incidents. </p><p>Chris reveals why many companies have a false sense of readiness and security before a breach. He also talks about fostering a security culture and the importance of having clear lines of decision-making when it comes to risk management. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like the Fortinet VPN zero-day, the extradition of the Phobos ransomware administrator, and the sentencing of U.S.-based co-conspirators behind the Bitfenix cryptocurrency exchange theft. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, Ahead of the Threat, ahead of the threat, Ahead of the Threat podcast, FBI Cyber podcast, FBI Cyber, Chris Cwalina, cyber law, law, lawyer, lawyers, cyber breach, Norton Rose Fulbright</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/925cf784/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Two - Kevin Mandia</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode Two - Kevin Mandia</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e62f84bb-8ca8-4429-994c-3186bc9ed4a0</guid>
      <link>https://share.transistor.fm/s/8a482ff7</link>
      <description>
        <![CDATA[<p>On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Kevin Mandia, founder and CEO of Mandiant, one of the world’s leading cyberthreat intelligence and incident-response firms. </p><p>Drawing on his vast industry experience, Kevin talks about game-changing breaches and the history of cybersecurity, the increasing prevalence of voice cloning and other artificial intelligence tools in social engineering schemes, and the changing role of the chief information security officer (CISO). Kevin also shares the top four questions every CEO or corporate board should ask their CISO to assess cyber readiness. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like Sophos’ acquisition of Secureworks, the cyberattack on American Water, and the new CISO hire at UnitedHealth Group. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Kevin Mandia, founder and CEO of Mandiant, one of the world’s leading cyberthreat intelligence and incident-response firms. </p><p>Drawing on his vast industry experience, Kevin talks about game-changing breaches and the history of cybersecurity, the increasing prevalence of voice cloning and other artificial intelligence tools in social engineering schemes, and the changing role of the chief information security officer (CISO). Kevin also shares the top four questions every CEO or corporate board should ask their CISO to assess cyber readiness. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like Sophos’ acquisition of Secureworks, the cyberattack on American Water, and the new CISO hire at UnitedHealth Group. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Nov 2024 16:32:31 -0500</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/8a482ff7/be0acab8.mp3" length="98367330" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>3775</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Kevin Mandia, founder and CEO of Mandiant, one of the world’s leading cyberthreat intelligence and incident-response firms. </p><p>Drawing on his vast industry experience, Kevin talks about game-changing breaches and the history of cybersecurity, the increasing prevalence of voice cloning and other artificial intelligence tools in social engineering schemes, and the changing role of the chief information security officer (CISO). Kevin also shares the top four questions every CEO or corporate board should ask their CISO to assess cyber readiness. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like Sophos’ acquisition of Secureworks, the cyberattack on American Water, and the new CISO hire at UnitedHealth Group. </p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business, Ahead of the Threat, ahead of the threat, Ahead of the Threat podcast, FBI Cyber podcast, FBI Cyber, Kevin Mandia, CISO, Mandiant</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8a482ff7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode One: Aron Ain</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode One: Aron Ain</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">25ace676-a837-489a-a002-2a750472f90f</guid>
      <link>https://share.transistor.fm/s/f4d0d936</link>
      <description>
        <![CDATA[<p>In December 2021, UKG Kronos was hit with a ransomware attack that impacted thousands of business customers. On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Aron Ain, former CEO and current executive chair at UKG, who gives a firsthand account of what it’s like to lead a multinational technology company during a major cyber incident. Learn how Aron handled the extreme pressure of the situation, prioritized transparency to rebuild customer trust, and made enduring structural reforms to supply-chain security and cybersecurity at the board level. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like Iran’s brazen effort to interfere in the 2024 U.S. presidential election, the Salt Typhoon hack of U.S. telecoms, and recent supply chain compromises. </p><p>Watch FBI Director Christopher Wray’s announcement on the Iranian election interference indictment at <a href="https://www.fbi.gov/video-repository/director-wray-on-indictment-of-iranian-cyber-actors-092724.mp4/view">fbi.gov/video-repository/director-wray-on-indictment-of-iranian-cyber-actors-092724.mp4/view</a>. You can read the indictment itself at <a href="https://www.justice.gov/opa/pr/three-irgc-cyber-actors-indicted-hack-and-leak-operation-designed-influence-2024-us">justice.gov/opa/pr/three-irgc-cyber-actors-indicted-hack-and-leak-operation-designed-influence-2024-us</a>.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In December 2021, UKG Kronos was hit with a ransomware attack that impacted thousands of business customers. On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Aron Ain, former CEO and current executive chair at UKG, who gives a firsthand account of what it’s like to lead a multinational technology company during a major cyber incident. Learn how Aron handled the extreme pressure of the situation, prioritized transparency to rebuild customer trust, and made enduring structural reforms to supply-chain security and cybersecurity at the board level. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like Iran’s brazen effort to interfere in the 2024 U.S. presidential election, the Salt Typhoon hack of U.S. telecoms, and recent supply chain compromises. </p><p>Watch FBI Director Christopher Wray’s announcement on the Iranian election interference indictment at <a href="https://www.fbi.gov/video-repository/director-wray-on-indictment-of-iranian-cyber-actors-092724.mp4/view">fbi.gov/video-repository/director-wray-on-indictment-of-iranian-cyber-actors-092724.mp4/view</a>. You can read the indictment itself at <a href="https://www.justice.gov/opa/pr/three-irgc-cyber-actors-indicted-hack-and-leak-operation-designed-influence-2024-us">justice.gov/opa/pr/three-irgc-cyber-actors-indicted-hack-and-leak-operation-designed-influence-2024-us</a>.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 23 Oct 2024 17:41:53 -0400</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/f4d0d936/b9c0cffd.mp3" length="84461772" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>2637</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In December 2021, UKG Kronos was hit with a ransomware attack that impacted thousands of business customers. On this episode of Ahead of the Threat, FBI Assistant Director Bryan Vorndran and FBI Strategic Engagement Advisor Jamil Farshchi speak to Aron Ain, former CEO and current executive chair at UKG, who gives a firsthand account of what it’s like to lead a multinational technology company during a major cyber incident. Learn how Aron handled the extreme pressure of the situation, prioritized transparency to rebuild customer trust, and made enduring structural reforms to supply-chain security and cybersecurity at the board level. </p><p>At the start of the episode, Bryan and Jamil discuss trending topics like Iran’s brazen effort to interfere in the 2024 U.S. presidential election, the Salt Typhoon hack of U.S. telecoms, and recent supply chain compromises. </p><p>Watch FBI Director Christopher Wray’s announcement on the Iranian election interference indictment at <a href="https://www.fbi.gov/video-repository/director-wray-on-indictment-of-iranian-cyber-actors-092724.mp4/view">fbi.gov/video-repository/director-wray-on-indictment-of-iranian-cyber-actors-092724.mp4/view</a>. You can read the indictment itself at <a href="https://www.justice.gov/opa/pr/three-irgc-cyber-actors-indicted-hack-and-leak-operation-designed-influence-2024-us">justice.gov/opa/pr/three-irgc-cyber-actors-indicted-hack-and-leak-operation-designed-influence-2024-us</a>.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f4d0d936/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Episode Zero</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode Zero</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8d064876-a782-4fba-b46f-abf98b727056</guid>
      <link>https://share.transistor.fm/s/f2497f7c</link>
      <description>
        <![CDATA[<p>On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals.</p><p>Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging technology impact corporate America? How can corporate boards be structured for cyber resilience? What does the FBI think about generative artificial intelligence? Listen to new episodes biweekly and stay Ahead of the Threat.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals.</p><p>Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging technology impact corporate America? How can corporate boards be structured for cyber resilience? What does the FBI think about generative artificial intelligence? Listen to new episodes biweekly and stay Ahead of the Threat.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 16 Oct 2024 12:25:13 -0400</pubDate>
      <author>Federal Bureau of Investigation</author>
      <enclosure url="https://media.transistor.fm/f2497f7c/f28dd58b.mp3" length="14654918" type="audio/mpeg"/>
      <itunes:author>Federal Bureau of Investigation</itunes:author>
      <itunes:duration>455</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals.</p><p>Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging technology impact corporate America? How can corporate boards be structured for cyber resilience? What does the FBI think about generative artificial intelligence? Listen to new episodes biweekly and stay Ahead of the Threat.</p><p>Listen to Ahead of the Threat episodes, read the transcripts, and find related material at <a href="https://www.fbi.gov/aheadofthethreat">fbi.gov/aheadofthethreat</a>.</p><p>Subscribe to Ahead of the Threat wherever you get your podcasts:</p><ul><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272">podcasts.apple.com/us/podcast/ahead-of-the-threat-the-fbi-cyber-podcast/id1774312272</a></li><li>Spotify: <a href="https://open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA">open.spotify.com/show/7nV7uYsEK4nH87ADpooAyA</a></li><li>More ways to follow us: <a href="https://ahead-of-the-threat.transistor.fm/subscribe">ahead-of-the-threat.transistor.fm/subscribe</a></li></ul><p>And follow us on social media:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/company/fbicyber">linkedin.com/company/fbicyber</a></li><li>X: <a href="https://twitter.com/fbi">twitter.com/fbi</a></li><li>Facebook: <a href="https://www.facebook.com/FBI">facebook.com/FBI/ </a></li><li>Instagram: <a href="https://www.instagram.com/fbi/">instagram.com/fbi/</a>   </li><li>YouTube: <a href="https://www.youtube.com/user/fbi">youtube.com/user/fbi</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Federal Bureau of Investigation, FBI, government, cybersecurity, cyber, cyber defense, cyber threats, cyber literacy, business, cyber security, intelligence, law enforcement, business</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f2497f7c/transcript.txt" type="text/plain"/>
    </item>
  </channel>
</rss>
