<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/ciso-titans-unencrypted-unfiltered-unpatched" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Guardians of the Data</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/ciso-titans-unencrypted-unfiltered-unpatched</itunes:new-feed-url>
    <description>Welcome to Guardians of the Data! Join host, Ward Balcerzak, each week as he dives deep into the passions, expertise, and experiences of CISOs, Chief Data Officers, and more. Guardians of the Data is sponsored by Sentra - AI-powered data security platform that discovers and classifies all your data accurately and automatically to achieve enterprise-scale data protection without the fuss.</description>
    <copyright>© 2026 Ward Balcerzak</copyright>
    <podcast:guid>16f093a0-2722-5392-8ae3-bbfe521eb0d3</podcast:guid>
    <podcast:locked owner="guardians@ringmaster.com">no</podcast:locked>
    <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
    <podcast:trailer pubdate="Tue, 15 Jul 2025 11:28:56 -0400" url="https://media.transistor.fm/6a726f38/d6e406d1.mp3" length="466993" type="audio/mpeg">Guardians of the Data Trailer! </podcast:trailer>
    <language>en</language>
    <pubDate>Thu, 07 May 2026 05:00:09 -0400</pubDate>
    <lastBuildDate>Thu, 07 May 2026 05:04:03 -0400</lastBuildDate>
    <link>http://guardiansofthedata.show</link>
    <image>
      <url>https://img.transistorcdn.com/2BvJ5ptjDAid_wX-4OyKodgAY7EL-ryu7F5PGF77TXI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZTJm/MWI1Yzk2NDExY2U0/MWU2NDFkZjI1OWE1/MzM1My5qcGc.jpg</url>
      <title>Guardians of the Data</title>
      <link>http://guardiansofthedata.show</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Ward Balcerzak</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/2BvJ5ptjDAid_wX-4OyKodgAY7EL-ryu7F5PGF77TXI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZTJm/MWI1Yzk2NDExY2U0/MWU2NDFkZjI1OWE1/MzM1My5qcGc.jpg"/>
    <itunes:summary>Welcome to Guardians of the Data! Join host, Ward Balcerzak, each week as he dives deep into the passions, expertise, and experiences of CISOs, Chief Data Officers, and more. Guardians of the Data is sponsored by Sentra - AI-powered data security platform that discovers and classifies all your data accurately and automatically to achieve enterprise-scale data protection without the fuss.</itunes:summary>
    <itunes:subtitle>Welcome to Guardians of the Data.</itunes:subtitle>
    <itunes:keywords></itunes:keywords>
    <itunes:owner>
      <itunes:name>Ward Balcerzak</itunes:name>
      <itunes:email>guardians@ringmaster.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>AI Governance: Navigating the Speed of Change - Sweeney Williams - Guardians of the Data - Ep #41</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>AI Governance: Navigating the Speed of Change - Sweeney Williams - Guardians of the Data - Ep #41</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82457ead-0132-4c83-8e3e-05b757cff797</guid>
      <link>https://guardiansofthedata.show/s1/41</link>
      <description>
        <![CDATA[<p>How can organizations govern AI responsibly when the technology (and the risks) are evolving faster than ever?</p><p><br></p><p>In this episode of Guardians of the Data, Ward sits down with Sweeney Williams, Head of Responsible AI, to unpack the biggest challenge facing data security today ... speed.</p><p><br></p><p>With over 20 years of experience spanning cybersecurity, privacy, and AI governance, Sweeney shares how the rapid acceleration of AI is reshaping everything from geopolitical competition to regulatory approaches and security threats. What once felt like a manageable evolution now demands constant adaptation, forcing organizations to rethink how they govern, secure, and deploy AI in real time.</p><p><br></p><p>The conversation explores why traditional approaches to regulation and risk management are struggling to keep up, how bad actors are leveraging AI to scale attacks, and why organizations can’t afford to wait for clarity before taking action. Sweeney also outlines practical steps for building a strong AI governance foundation, emphasizing the importance of fundamentals like data governance, transparency, and cross-functional collaboration.</p><p> </p><p>Takeaways:</p><ul><li>Speed is the Defining Challenge of AI. AI isn’t just evolving quickly. It’s forcing rapid change across regulation, geopolitics, and security. Organizations are struggling to keep pace with constant shifts in capabilities and expectations.</li><li>Regulation is Lagging and May Stay That Way. Global attitudes toward AI regulation have shifted dramatically, with many regions prioritizing innovation and competitiveness over strict governance.</li><li>AI is Amplifying Security Risks. Bad actors are using AI to launch more sophisticated and scalable attacks, lowering the barrier to entry and increasing the pressure on security teams.</li><li>Fundamentals Still Matter! Strong data governance, transparency, access controls, and bias mitigation remain essential, even as the technology evolves.</li><li>You Can’t Wait for Clarity! Organizations that delay action until regulations stabilize risk falling behind. The best time to build AI governance is now.</li><li>Third party AI Risk is a Growing Blind Spot. Vendors are rapidly embedding AI into their products, often without clear visibility, making third party risk management more complex than ever.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“The best time to plant your AI governance tree… is right now.” - Sweeney Williams</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/sweeney-williams-00762564/">https://www.linkedin.com/in/sweeney-williams-00762564/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How can organizations govern AI responsibly when the technology (and the risks) are evolving faster than ever?</p><p><br></p><p>In this episode of Guardians of the Data, Ward sits down with Sweeney Williams, Head of Responsible AI, to unpack the biggest challenge facing data security today ... speed.</p><p><br></p><p>With over 20 years of experience spanning cybersecurity, privacy, and AI governance, Sweeney shares how the rapid acceleration of AI is reshaping everything from geopolitical competition to regulatory approaches and security threats. What once felt like a manageable evolution now demands constant adaptation, forcing organizations to rethink how they govern, secure, and deploy AI in real time.</p><p><br></p><p>The conversation explores why traditional approaches to regulation and risk management are struggling to keep up, how bad actors are leveraging AI to scale attacks, and why organizations can’t afford to wait for clarity before taking action. Sweeney also outlines practical steps for building a strong AI governance foundation, emphasizing the importance of fundamentals like data governance, transparency, and cross-functional collaboration.</p><p> </p><p>Takeaways:</p><ul><li>Speed is the Defining Challenge of AI. AI isn’t just evolving quickly. It’s forcing rapid change across regulation, geopolitics, and security. Organizations are struggling to keep pace with constant shifts in capabilities and expectations.</li><li>Regulation is Lagging and May Stay That Way. Global attitudes toward AI regulation have shifted dramatically, with many regions prioritizing innovation and competitiveness over strict governance.</li><li>AI is Amplifying Security Risks. Bad actors are using AI to launch more sophisticated and scalable attacks, lowering the barrier to entry and increasing the pressure on security teams.</li><li>Fundamentals Still Matter! Strong data governance, transparency, access controls, and bias mitigation remain essential, even as the technology evolves.</li><li>You Can’t Wait for Clarity! Organizations that delay action until regulations stabilize risk falling behind. The best time to build AI governance is now.</li><li>Third party AI Risk is a Growing Blind Spot. Vendors are rapidly embedding AI into their products, often without clear visibility, making third party risk management more complex than ever.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“The best time to plant your AI governance tree… is right now.” - Sweeney Williams</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/sweeney-williams-00762564/">https://www.linkedin.com/in/sweeney-williams-00762564/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 07 May 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/d4862b56/a7f9393f.mp3" length="36413597" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4XFkLI4xZk8bswnVWTtK2xBcRV_d-OCJiQ6cRRdDujY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yZDc1/Y2ZlNGJmMjE5NmRh/OGU1ODBkMDBhZGM1/ZDdkYS5wbmc.jpg"/>
      <itunes:duration>2273</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How can organizations govern AI responsibly when the technology (and the risks) are evolving faster than ever?</p><p><br></p><p>In this episode of Guardians of the Data, Ward sits down with Sweeney Williams, Head of Responsible AI, to unpack the biggest challenge facing data security today ... speed.</p><p><br></p><p>With over 20 years of experience spanning cybersecurity, privacy, and AI governance, Sweeney shares how the rapid acceleration of AI is reshaping everything from geopolitical competition to regulatory approaches and security threats. What once felt like a manageable evolution now demands constant adaptation, forcing organizations to rethink how they govern, secure, and deploy AI in real time.</p><p><br></p><p>The conversation explores why traditional approaches to regulation and risk management are struggling to keep up, how bad actors are leveraging AI to scale attacks, and why organizations can’t afford to wait for clarity before taking action. Sweeney also outlines practical steps for building a strong AI governance foundation, emphasizing the importance of fundamentals like data governance, transparency, and cross-functional collaboration.</p><p> </p><p>Takeaways:</p><ul><li>Speed is the Defining Challenge of AI. AI isn’t just evolving quickly. It’s forcing rapid change across regulation, geopolitics, and security. Organizations are struggling to keep pace with constant shifts in capabilities and expectations.</li><li>Regulation is Lagging and May Stay That Way. Global attitudes toward AI regulation have shifted dramatically, with many regions prioritizing innovation and competitiveness over strict governance.</li><li>AI is Amplifying Security Risks. Bad actors are using AI to launch more sophisticated and scalable attacks, lowering the barrier to entry and increasing the pressure on security teams.</li><li>Fundamentals Still Matter! Strong data governance, transparency, access controls, and bias mitigation remain essential, even as the technology evolves.</li><li>You Can’t Wait for Clarity! Organizations that delay action until regulations stabilize risk falling behind. The best time to build AI governance is now.</li><li>Third party AI Risk is a Growing Blind Spot. Vendors are rapidly embedding AI into their products, often without clear visibility, making third party risk management more complex than ever.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“The best time to plant your AI governance tree… is right now.” - Sweeney Williams</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/sweeney-williams-00762564/">https://www.linkedin.com/in/sweeney-williams-00762564/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/sweeney-williams" img="https://img.transistorcdn.com/9T_0ZmCPyMp4M_VjnLtxKymO1aFt-Fr-abTWuZGhwuo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWY1/NTkxZjNjZGJjYWVh/ZGM2MzRkNTk3NGYx/NjNlMy5wbmc.jpg">Sweeney Williams</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/serena-johnson" img="https://img.transistorcdn.com/ALOxf7HkQnuF3FKMKKDtYSO6uc91NMOwa122ZW3vJIk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMTI2/ZmI1MDYzZjZkOWI2/MWYyMWViZjY3ZWVj/ZWFiZi5qcGc.jpg">Serena Johnson</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d4862b56/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>AI Is a Tsunami: Why Teams Are Playing Catch-Up - Ben Rothke - Guardians of the Data - Episode #40</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>AI Is a Tsunami: Why Teams Are Playing Catch-Up - Ben Rothke - Guardians of the Data - Episode #40</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">65fb2a01-321f-4d99-a8a1-e85a39404b1e</guid>
      <link>https://guardiansofthedata.show/s1/40</link>
      <description>
        <![CDATA[<p>Are security teams already behind on AI? And what does it take to catch up?</p><p><br></p><p>In this episode of Guardians of the Data, Ben Rothke joins the show to break down the biggest data security challenges facing organizations today and why many of them are harder to solve than ever before.</p><p><br></p><p>With over 30 years in cybersecurity, Ben shares a grounded perspective on how the landscape has evolved from simpler perimeter-based models to today’s world of data sprawl, AI-driven threats, and overwhelming complexity. He explains why AI isn’t just another trend, but a “tsunami” that’s fundamentally changing how both attackers and defenders operate.</p><p><br></p><p>The conversation dives into why so many organizations are playing catch-up, how shadow IT and poor foundations create long-term risk, and why the most dangerous security problems can’t be solved with a single tool or quick fix. Ben also offers practical guidance on how teams can approach AI more responsibly, starting with clear use cases, strong guardrails, and embedding security from the very beginning.</p><p> </p><p>Takeaways:</p><ul><li><strong>Get Security Involved From the Start:</strong> Before deploying any new technology, especially AI, loop in information security from day one. Don't retrofit security after the fact; it's far more costly and risky.</li><li><strong>Define Your Use Case Before Buying Tools:</strong> Ask "What is my problem, and how will this tool solve it?" Don't buy enterprise AI or security tools because they're on the Gartner Hype Cycle. Start with a clearly defined use case.</li><li><strong>Create AI Policies and Guardrails Now:</strong> If your organization hasn't done it yet, immediately establish policies and processes governing how AI tools can be used: what data can be entered, by whom, and under what conditions.</li><li><strong>Document Before You Deploy:</strong> Create detailed design documents for any AI or IT system before rollout, covering use cases, security controls, privacy controls, and support plans. Undocumented "shadow IT" becomes tomorrow's critical vulnerability.</li><li><strong>Address Data Sprawl Proactively:</strong> Inventory where your data lives across servers, cloud, mobile, and third-party vendors. You can't protect what you don't know you have.</li><li><strong>Take Third-Party Supply Chain Risk Seriously:</strong> Even a single weak vendor can expose massive amounts of data. Vet your software supply chain rigorously.</li></ul><p>Quote of the Show:</p><ul><li>“In the last year and change, the challenge of AI has just been a tsunami.” - Ben Rothke</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/benrothke/">https://www.linkedin.com/in/benrothke/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are security teams already behind on AI? And what does it take to catch up?</p><p><br></p><p>In this episode of Guardians of the Data, Ben Rothke joins the show to break down the biggest data security challenges facing organizations today and why many of them are harder to solve than ever before.</p><p><br></p><p>With over 30 years in cybersecurity, Ben shares a grounded perspective on how the landscape has evolved from simpler perimeter-based models to today’s world of data sprawl, AI-driven threats, and overwhelming complexity. He explains why AI isn’t just another trend, but a “tsunami” that’s fundamentally changing how both attackers and defenders operate.</p><p><br></p><p>The conversation dives into why so many organizations are playing catch-up, how shadow IT and poor foundations create long-term risk, and why the most dangerous security problems can’t be solved with a single tool or quick fix. Ben also offers practical guidance on how teams can approach AI more responsibly, starting with clear use cases, strong guardrails, and embedding security from the very beginning.</p><p> </p><p>Takeaways:</p><ul><li><strong>Get Security Involved From the Start:</strong> Before deploying any new technology, especially AI, loop in information security from day one. Don't retrofit security after the fact; it's far more costly and risky.</li><li><strong>Define Your Use Case Before Buying Tools:</strong> Ask "What is my problem, and how will this tool solve it?" Don't buy enterprise AI or security tools because they're on the Gartner Hype Cycle. Start with a clearly defined use case.</li><li><strong>Create AI Policies and Guardrails Now:</strong> If your organization hasn't done it yet, immediately establish policies and processes governing how AI tools can be used: what data can be entered, by whom, and under what conditions.</li><li><strong>Document Before You Deploy:</strong> Create detailed design documents for any AI or IT system before rollout, covering use cases, security controls, privacy controls, and support plans. Undocumented "shadow IT" becomes tomorrow's critical vulnerability.</li><li><strong>Address Data Sprawl Proactively:</strong> Inventory where your data lives across servers, cloud, mobile, and third-party vendors. You can't protect what you don't know you have.</li><li><strong>Take Third-Party Supply Chain Risk Seriously:</strong> Even a single weak vendor can expose massive amounts of data. Vet your software supply chain rigorously.</li></ul><p>Quote of the Show:</p><ul><li>“In the last year and change, the challenge of AI has just been a tsunami.” - Ben Rothke</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/benrothke/">https://www.linkedin.com/in/benrothke/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 30 Apr 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/d2ee4ee9/f77f5e2f.mp3" length="40292999" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/96W5DR-McByyven8HzGTCEZ1mOpHe7xcxqa5PgmzzCM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82NTRm/NDAyZWEzNzdmMDc2/ODlhODg5ZjhmMTlh/ZmI0Ni5wbmc.jpg"/>
      <itunes:duration>2515</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are security teams already behind on AI? And what does it take to catch up?</p><p><br></p><p>In this episode of Guardians of the Data, Ben Rothke joins the show to break down the biggest data security challenges facing organizations today and why many of them are harder to solve than ever before.</p><p><br></p><p>With over 30 years in cybersecurity, Ben shares a grounded perspective on how the landscape has evolved from simpler perimeter-based models to today’s world of data sprawl, AI-driven threats, and overwhelming complexity. He explains why AI isn’t just another trend, but a “tsunami” that’s fundamentally changing how both attackers and defenders operate.</p><p><br></p><p>The conversation dives into why so many organizations are playing catch-up, how shadow IT and poor foundations create long-term risk, and why the most dangerous security problems can’t be solved with a single tool or quick fix. Ben also offers practical guidance on how teams can approach AI more responsibly, starting with clear use cases, strong guardrails, and embedding security from the very beginning.</p><p> </p><p>Takeaways:</p><ul><li><strong>Get Security Involved From the Start:</strong> Before deploying any new technology, especially AI, loop in information security from day one. Don't retrofit security after the fact; it's far more costly and risky.</li><li><strong>Define Your Use Case Before Buying Tools:</strong> Ask "What is my problem, and how will this tool solve it?" Don't buy enterprise AI or security tools because they're on the Gartner Hype Cycle. Start with a clearly defined use case.</li><li><strong>Create AI Policies and Guardrails Now:</strong> If your organization hasn't done it yet, immediately establish policies and processes governing how AI tools can be used: what data can be entered, by whom, and under what conditions.</li><li><strong>Document Before You Deploy:</strong> Create detailed design documents for any AI or IT system before rollout, covering use cases, security controls, privacy controls, and support plans. Undocumented "shadow IT" becomes tomorrow's critical vulnerability.</li><li><strong>Address Data Sprawl Proactively:</strong> Inventory where your data lives across servers, cloud, mobile, and third-party vendors. You can't protect what you don't know you have.</li><li><strong>Take Third-Party Supply Chain Risk Seriously:</strong> Even a single weak vendor can expose massive amounts of data. Vet your software supply chain rigorously.</li></ul><p>Quote of the Show:</p><ul><li>“In the last year and change, the challenge of AI has just been a tsunami.” - Ben Rothke</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/benrothke/">https://www.linkedin.com/in/benrothke/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/serena-johnson" img="https://img.transistorcdn.com/ALOxf7HkQnuF3FKMKKDtYSO6uc91NMOwa122ZW3vJIk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMTI2/ZmI1MDYzZjZkOWI2/MWYyMWViZjY3ZWVj/ZWFiZi5qcGc.jpg">Serena Johnson</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/ben-rothke" img="https://img.transistorcdn.com/MLla5wghbHsx0TUsFU6iu6enQX6cF2blqocihfBVVVw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMjQ0/Y2QxZTYwZmZiZWQ0/YjU2ZWFiNmQ3OTQ0/YWQxOS5qcGc.jpg">Ben Rothke</podcast:person>
    </item>
    <item>
      <title>The Unstructured Data Problem Not Yet Solved - Brent Bigelow - Guardians of the Data - Episode #39</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>The Unstructured Data Problem Not Yet Solved - Brent Bigelow - Guardians of the Data - Episode #39</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">87d52c82-9e36-40fb-9df0-2b3efd22c882</guid>
      <link>https://guardiansofthedata.show/s1/39</link>
      <description>
        <![CDATA[<p>How much of your company’s data is completely unknown? And what risk is it creating?</p><p><br></p><p>In this episode, Ward sits down with Brent Bigelow: security consultant, President of the Charlotte ISSA, and a cybersecurity veteran with nearly four decades of experience. They unpack one of the most persistent and overlooked challenges in data security: unstructured data.</p><p><br>Brent shares why unstructured data remains the “wild west” of security, how it quietly grows through everyday business operations, and why most organizations still struggle to get their arms around it, especially in the context of mergers and acquisitions.</p><p>The conversation explores how “shadow business” contributes to data sprawl, why traditional approaches like classification and DLP fall short, and how the rise of AI is accelerating both the risk and complexity of managing unknown data. Brent also reflects on his career journey from the pre-internet era to today’s AI-driven landscape, offering hard-earned lessons on sustainability, leadership, and staying curious in a rapidly evolving field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Audit Your Unstructured Data:</strong> You can't protect what you don't know you have. Dedicate a formal project to discovering, cataloging, and classifying unstructured data across your organization, especially after mergers and acquisitions.</li><li><strong>Establish and Enforce a Data Governance Policy:</strong> Policy is the "stake in the sand." Define where data should live, in what formats, and who owns it. Without written policy, you have nothing to point to when a breach or compliance issue surfaces.</li><li><strong>Watch Out For "Shadow Business," Not Just Shadow IT:</strong> Business units are storing data in unauthorized places just as often as rogue IT does. Extend your data governance conversations beyond IT to include business unit leaders.</li><li><strong>Control Privilege and Access as People Leave: </strong>When employees move on, they often take data access, or even the data itself, with them. Enforce least-privilege and revoke access promptly at offboarding.</li><li><strong>Treat AI Ingestion of Unstructured Data as a Risk:</strong> If your organization is deploying Copilot, generative AI, or any LLM that touches internal data, understand what unstructured data it's consuming. Garbage in, garbage out, and the "garbage" could be sensitive or regulated data.</li><li><strong>Don't Let Duplicate Data Pollute Your AI Models:</strong> Version control and de-duplication matter more now than ever. Unmanaged duplicates degrade AI output quality and can introduce conflicting or outdated information into critical workflows.</li><li><strong>Know Your Data Classification Framework and Actually Use It:</strong> Internal use, confidential, public. Make sure employees understand how to label data and where each classification belongs.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Unstructured data is no different than the ocean: it just keeps rising.” - Brent Bigelow</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/brent-bigelow-02b7791/">https://www.linkedin.com/in/brent-bigelow-02b7791/</a> </li><li>Website: <a href="https://www.charlotteissa.org/">https://www.charlotteissa.org/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How much of your company’s data is completely unknown? And what risk is it creating?</p><p><br></p><p>In this episode, Ward sits down with Brent Bigelow: security consultant, President of the Charlotte ISSA, and a cybersecurity veteran with nearly four decades of experience. They unpack one of the most persistent and overlooked challenges in data security: unstructured data.</p><p><br>Brent shares why unstructured data remains the “wild west” of security, how it quietly grows through everyday business operations, and why most organizations still struggle to get their arms around it, especially in the context of mergers and acquisitions.</p><p>The conversation explores how “shadow business” contributes to data sprawl, why traditional approaches like classification and DLP fall short, and how the rise of AI is accelerating both the risk and complexity of managing unknown data. Brent also reflects on his career journey from the pre-internet era to today’s AI-driven landscape, offering hard-earned lessons on sustainability, leadership, and staying curious in a rapidly evolving field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Audit Your Unstructured Data:</strong> You can't protect what you don't know you have. Dedicate a formal project to discovering, cataloging, and classifying unstructured data across your organization, especially after mergers and acquisitions.</li><li><strong>Establish and Enforce a Data Governance Policy:</strong> Policy is the "stake in the sand." Define where data should live, in what formats, and who owns it. Without written policy, you have nothing to point to when a breach or compliance issue surfaces.</li><li><strong>Watch Out For "Shadow Business," Not Just Shadow IT:</strong> Business units are storing data in unauthorized places just as often as rogue IT does. Extend your data governance conversations beyond IT to include business unit leaders.</li><li><strong>Control Privilege and Access as People Leave: </strong>When employees move on, they often take data access, or even the data itself, with them. Enforce least-privilege and revoke access promptly at offboarding.</li><li><strong>Treat AI Ingestion of Unstructured Data as a Risk:</strong> If your organization is deploying Copilot, generative AI, or any LLM that touches internal data, understand what unstructured data it's consuming. Garbage in, garbage out, and the "garbage" could be sensitive or regulated data.</li><li><strong>Don't Let Duplicate Data Pollute Your AI Models:</strong> Version control and de-duplication matter more now than ever. Unmanaged duplicates degrade AI output quality and can introduce conflicting or outdated information into critical workflows.</li><li><strong>Know Your Data Classification Framework and Actually Use It:</strong> Internal use, confidential, public. Make sure employees understand how to label data and where each classification belongs.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Unstructured data is no different than the ocean: it just keeps rising.” - Brent Bigelow</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/brent-bigelow-02b7791/">https://www.linkedin.com/in/brent-bigelow-02b7791/</a> </li><li>Website: <a href="https://www.charlotteissa.org/">https://www.charlotteissa.org/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 23 Apr 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/1b60e5cb/0a84766b.mp3" length="43143922" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/d916M6Js-uU3WDaOtIsdMmdvjp5PSQOJvaZHov0KnLU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZGEx/MDc1ZWM4MTQxMThk/N2ExODRlNTljYTIz/YjIxNS5wbmc.jpg"/>
      <itunes:duration>2694</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How much of your company’s data is completely unknown? And what risk is it creating?</p><p><br></p><p>In this episode, Ward sits down with Brent Bigelow: security consultant, President of the Charlotte ISSA, and a cybersecurity veteran with nearly four decades of experience. They unpack one of the most persistent and overlooked challenges in data security: unstructured data.</p><p><br>Brent shares why unstructured data remains the “wild west” of security, how it quietly grows through everyday business operations, and why most organizations still struggle to get their arms around it, especially in the context of mergers and acquisitions.</p><p>The conversation explores how “shadow business” contributes to data sprawl, why traditional approaches like classification and DLP fall short, and how the rise of AI is accelerating both the risk and complexity of managing unknown data. Brent also reflects on his career journey from the pre-internet era to today’s AI-driven landscape, offering hard-earned lessons on sustainability, leadership, and staying curious in a rapidly evolving field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Audit Your Unstructured Data:</strong> You can't protect what you don't know you have. Dedicate a formal project to discovering, cataloging, and classifying unstructured data across your organization, especially after mergers and acquisitions.</li><li><strong>Establish and Enforce a Data Governance Policy:</strong> Policy is the "stake in the sand." Define where data should live, in what formats, and who owns it. Without written policy, you have nothing to point to when a breach or compliance issue surfaces.</li><li><strong>Watch Out For "Shadow Business," Not Just Shadow IT:</strong> Business units are storing data in unauthorized places just as often as rogue IT does. Extend your data governance conversations beyond IT to include business unit leaders.</li><li><strong>Control Privilege and Access as People Leave: </strong>When employees move on, they often take data access, or even the data itself, with them. Enforce least-privilege and revoke access promptly at offboarding.</li><li><strong>Treat AI Ingestion of Unstructured Data as a Risk:</strong> If your organization is deploying Copilot, generative AI, or any LLM that touches internal data, understand what unstructured data it's consuming. Garbage in, garbage out, and the "garbage" could be sensitive or regulated data.</li><li><strong>Don't Let Duplicate Data Pollute Your AI Models:</strong> Version control and de-duplication matter more now than ever. Unmanaged duplicates degrade AI output quality and can introduce conflicting or outdated information into critical workflows.</li><li><strong>Know Your Data Classification Framework and Actually Use It:</strong> Internal use, confidential, public. Make sure employees understand how to label data and where each classification belongs.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Unstructured data is no different than the ocean: it just keeps rising.” - Brent Bigelow</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/brent-bigelow-02b7791/">https://www.linkedin.com/in/brent-bigelow-02b7791/</a> </li><li>Website: <a href="https://www.charlotteissa.org/">https://www.charlotteissa.org/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/brent-bigelow" img="https://img.transistorcdn.com/t63i1nQYNzbDuwVzJHWT8AZ-IvnnZ_ohwKGMWcUamW0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjY4/NzgxNDZlM2ExMTNj/ZTQ4NzFkOGI4NDAy/ZWEzNC53ZWJw.jpg">Brent Bigelow</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/serena-johnson" img="https://img.transistorcdn.com/ALOxf7HkQnuF3FKMKKDtYSO6uc91NMOwa122ZW3vJIk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMTI2/ZmI1MDYzZjZkOWI2/MWYyMWViZjY3ZWVj/ZWFiZi5qcGc.jpg">Serena Johnson</podcast:person>
    </item>
    <item>
      <title>Using AI to Solve the Data Visibility Problem - Andrew Wilder - Guardians of the Data - Episode #38</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Using AI to Solve the Data Visibility Problem - Andrew Wilder - Guardians of the Data - Episode #38</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">188cf803-4cb7-4d27-bf31-1c3bda083491</guid>
      <link>https://guardiansofthedata.show/s1/38</link>
      <description>
        <![CDATA[<p>What if your DLP tool is slowing your business down instead of protecting it?</p><p><br></p><p>In this episode, Andrew Wilder shares why traditional data loss prevention (DLP) programs have struggled to deliver real value, and what needs to change in an AI-driven world. Drawing from decades of experience leading security programs at global organizations, he breaks down the core challenge most teams still face: relying on humans to classify and manage massive volumes of data simply doesn’t scale.</p><p><br></p><p>The conversation explores how AI is reshaping data security, from automatically identifying sensitive data to reducing false positives and improving visibility across the organization. Andrew also explains why security should act as an enabler, not a blocker, and how CISOs can prioritize the right investments while balancing risk and business needs.</p><p><br></p><p>If you’re rethinking your approach to data security, AI, or DLP, this episode offers a practical look at what’s working, what isn’t, and where the future is headed.</p><p> </p><p>Takeaways:</p><ul><li><strong>Stop Relying on Humans to Classify Your Data: </strong>Manual data classification fails at scale. Invest in AI-powered DSPM tools that automatically crawl, catalog, and classify sensitive data across your environment.</li><li><strong>Use Just-In-Time Popups to Change User Behavior:</strong> Real-time prompts asking users to justify unusual data movement are more effective than blocking controls. They create accountability, generate valuable intel, and shift culture without requiring a large team to chase false positives.</li><li><strong>Think of Security as an Enabler, Not a Blocker:</strong> Present risks with options and let the business decide their risk appetite. Your job is to inform, not to dictate. Frame security like brakes on a Formula 1 car: they let you go faster safely.</li><li><strong>Look at AI From Three Angles:</strong> How is the business using it (and how do you secure that)? How are attackers using it? How can your security team use AI agents to do more with finite resources?</li><li><strong>Build a Team of "Bot Masters":</strong> Use AI agents to automate repetitive tasks (SOC L1 triage, GRC forms, legacy account cleanup, third-party risk). Free your human talent for higher-value, strategic work.</li><li><strong>Reassess Your Security Posture At Least Every 90 Days: </strong>The risk landscape changes fast (new AI models, zero-days, etc.). Your 3-year roadmap should be a living document, not a static plan.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Your job as a CISO is to be kind of a ruthless prioritizer.” - Andrew Wilder</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/apwilder/">https://www.linkedin.com/in/apwilder/</a> </li><li>Website: <a href="https://cybersecurityintheboardroom.com/">https://cybersecurityintheboardroom.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if your DLP tool is slowing your business down instead of protecting it?</p><p><br></p><p>In this episode, Andrew Wilder shares why traditional data loss prevention (DLP) programs have struggled to deliver real value, and what needs to change in an AI-driven world. Drawing from decades of experience leading security programs at global organizations, he breaks down the core challenge most teams still face: relying on humans to classify and manage massive volumes of data simply doesn’t scale.</p><p><br></p><p>The conversation explores how AI is reshaping data security, from automatically identifying sensitive data to reducing false positives and improving visibility across the organization. Andrew also explains why security should act as an enabler, not a blocker, and how CISOs can prioritize the right investments while balancing risk and business needs.</p><p><br></p><p>If you’re rethinking your approach to data security, AI, or DLP, this episode offers a practical look at what’s working, what isn’t, and where the future is headed.</p><p> </p><p>Takeaways:</p><ul><li><strong>Stop Relying on Humans to Classify Your Data: </strong>Manual data classification fails at scale. Invest in AI-powered DSPM tools that automatically crawl, catalog, and classify sensitive data across your environment.</li><li><strong>Use Just-In-Time Popups to Change User Behavior:</strong> Real-time prompts asking users to justify unusual data movement are more effective than blocking controls. They create accountability, generate valuable intel, and shift culture without requiring a large team to chase false positives.</li><li><strong>Think of Security as an Enabler, Not a Blocker:</strong> Present risks with options and let the business decide their risk appetite. Your job is to inform, not to dictate. Frame security like brakes on a Formula 1 car: they let you go faster safely.</li><li><strong>Look at AI From Three Angles:</strong> How is the business using it (and how do you secure that)? How are attackers using it? How can your security team use AI agents to do more with finite resources?</li><li><strong>Build a Team of "Bot Masters":</strong> Use AI agents to automate repetitive tasks (SOC L1 triage, GRC forms, legacy account cleanup, third-party risk). Free your human talent for higher-value, strategic work.</li><li><strong>Reassess Your Security Posture At Least Every 90 Days: </strong>The risk landscape changes fast (new AI models, zero-days, etc.). Your 3-year roadmap should be a living document, not a static plan.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Your job as a CISO is to be kind of a ruthless prioritizer.” - Andrew Wilder</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/apwilder/">https://www.linkedin.com/in/apwilder/</a> </li><li>Website: <a href="https://cybersecurityintheboardroom.com/">https://cybersecurityintheboardroom.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 16 Apr 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/c7686431/6cfe8835.mp3" length="37338517" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fN9HSrVyRIwZ7jqFEcgkSrHyjfpEygs3uoBSFbq7thg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83ODM0/NDJhOTRkOGQzZjgy/MjVjMWNjYzYwYjUw/YjUwNy5wbmc.jpg"/>
      <itunes:duration>2331</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if your DLP tool is slowing your business down instead of protecting it?</p><p><br></p><p>In this episode, Andrew Wilder shares why traditional data loss prevention (DLP) programs have struggled to deliver real value, and what needs to change in an AI-driven world. Drawing from decades of experience leading security programs at global organizations, he breaks down the core challenge most teams still face: relying on humans to classify and manage massive volumes of data simply doesn’t scale.</p><p><br></p><p>The conversation explores how AI is reshaping data security, from automatically identifying sensitive data to reducing false positives and improving visibility across the organization. Andrew also explains why security should act as an enabler, not a blocker, and how CISOs can prioritize the right investments while balancing risk and business needs.</p><p><br></p><p>If you’re rethinking your approach to data security, AI, or DLP, this episode offers a practical look at what’s working, what isn’t, and where the future is headed.</p><p> </p><p>Takeaways:</p><ul><li><strong>Stop Relying on Humans to Classify Your Data: </strong>Manual data classification fails at scale. Invest in AI-powered DSPM tools that automatically crawl, catalog, and classify sensitive data across your environment.</li><li><strong>Use Just-In-Time Popups to Change User Behavior:</strong> Real-time prompts asking users to justify unusual data movement are more effective than blocking controls. They create accountability, generate valuable intel, and shift culture without requiring a large team to chase false positives.</li><li><strong>Think of Security as an Enabler, Not a Blocker:</strong> Present risks with options and let the business decide their risk appetite. Your job is to inform, not to dictate. Frame security like brakes on a Formula 1 car: they let you go faster safely.</li><li><strong>Look at AI From Three Angles:</strong> How is the business using it (and how do you secure that)? How are attackers using it? How can your security team use AI agents to do more with finite resources?</li><li><strong>Build a Team of "Bot Masters":</strong> Use AI agents to automate repetitive tasks (SOC L1 triage, GRC forms, legacy account cleanup, third-party risk). Free your human talent for higher-value, strategic work.</li><li><strong>Reassess Your Security Posture At Least Every 90 Days: </strong>The risk landscape changes fast (new AI models, zero-days, etc.). Your 3-year roadmap should be a living document, not a static plan.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Your job as a CISO is to be kind of a ruthless prioritizer.” - Andrew Wilder</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/apwilder/">https://www.linkedin.com/in/apwilder/</a> </li><li>Website: <a href="https://cybersecurityintheboardroom.com/">https://cybersecurityintheboardroom.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/andrew-wilder" img="https://img.transistorcdn.com/hKuL5b6gTaFv22vgC1rwEHPDj9kIe3BWux5GLGApgNQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMzg2/MDk5MGU4YWVmNzdl/M2MxYmQxNDUwYjIw/M2ZiYy5qcGc.jpg">Andrew Wilder</podcast:person>
    </item>
    <item>
      <title>Solving Velocity vs. Control in the AI Era - Ketan Gotmare - Guardians of the Data - Episode #37</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Solving Velocity vs. Control in the AI Era - Ketan Gotmare - Guardians of the Data - Episode #37</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4c451268-e328-4aa9-be18-7f5f8e1ac192</guid>
      <link>https://guardiansofthedata.show/s1/37</link>
      <description>
        <![CDATA[<p>How do you protect sensitive data without becoming the bottleneck in a business that’s moving faster than ever?</p><p><br></p><p>Today, Ketan Gotmare shares how nearly two decades in cybersecurity have shaped his perspective on modern data protection and why today’s biggest challenge isn’t a lack of tools, but a fundamental imbalance between speed and control.</p><p><br></p><p>He introduces the concept of the “velocity versus control paradox,” where businesses are under constant pressure to move faster, adopt AI, and drive digital innovation while security teams are still expected to verify, govern, and reduce risk without slowing anything down. Ketan walks through the evolution of data security, from the “castle and moat” era to today’s borderless, cloud-first world, explaining why traditional approaches no longer work and what organizations must do instead. He emphasizes that security teams can no longer act as gatekeepers, and must shift toward enabling the business while still protecting sensitive data. The conversation dives into practical ways to get started, including how to define what sensitive data actually is, where it lives across structured and unstructured environments, and why most organizations struggle before they even begin implementing frameworks like zero trust.</p><p> </p><p>Takeaways:</p><ul><li><strong>Embrace the "Velocity vs. Control" Mindset:</strong> Security teams must stop being blockers. Find the balance between enabling business innovation and maintaining data protection.</li><li><strong>Apply Zero Trust as a Concept, Not a Product:</strong> Don't buy into "zero trust" tools blindly. Start small and identify your most sensitive/high-value data, layer controls around those assets, and expand from there. Never trust, always verify.</li><li><strong>Know What Your Sensitive Data Is Before Worrying About Where It Is:</strong> Partner with Privacy, Legal, and Compliance early. Ask: "If this data got out, would it cost us money or damage our brand?" That's your sensitive data. Define it in a formal standard before scanning anything.</li><li><strong>Don't Try to Boil the Ocean, Start with the Obvious:</strong> Prioritize structured/business-system data first. Then tackle unstructured user-generated data. Leave shadow data for the crawl/walk/run phase.</li><li><strong>Don't Do It Alone: </strong>Build strategic partnerships with data teams, privacy, legal, risk, and compliance. Data governance and data security have the same goals. Leverage that alignment.</li><li><strong>Think Data Lifecycle (DSPM), Not Just Classification + DLP: </strong>Track data from creation to retirement. Understand how data flows across your network, to SaaS platforms, and to third parties. Data lineage is the foundation of mature data security posture management.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“You cannot block the business.” - Ketan Gotmare</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ketangotmare/">https://www.linkedin.com/in/ketangotmare/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you protect sensitive data without becoming the bottleneck in a business that’s moving faster than ever?</p><p><br></p><p>Today, Ketan Gotmare shares how nearly two decades in cybersecurity have shaped his perspective on modern data protection and why today’s biggest challenge isn’t a lack of tools, but a fundamental imbalance between speed and control.</p><p><br></p><p>He introduces the concept of the “velocity versus control paradox,” where businesses are under constant pressure to move faster, adopt AI, and drive digital innovation while security teams are still expected to verify, govern, and reduce risk without slowing anything down. Ketan walks through the evolution of data security, from the “castle and moat” era to today’s borderless, cloud-first world, explaining why traditional approaches no longer work and what organizations must do instead. He emphasizes that security teams can no longer act as gatekeepers, and must shift toward enabling the business while still protecting sensitive data. The conversation dives into practical ways to get started, including how to define what sensitive data actually is, where it lives across structured and unstructured environments, and why most organizations struggle before they even begin implementing frameworks like zero trust.</p><p> </p><p>Takeaways:</p><ul><li><strong>Embrace the "Velocity vs. Control" Mindset:</strong> Security teams must stop being blockers. Find the balance between enabling business innovation and maintaining data protection.</li><li><strong>Apply Zero Trust as a Concept, Not a Product:</strong> Don't buy into "zero trust" tools blindly. Start small and identify your most sensitive/high-value data, layer controls around those assets, and expand from there. Never trust, always verify.</li><li><strong>Know What Your Sensitive Data Is Before Worrying About Where It Is:</strong> Partner with Privacy, Legal, and Compliance early. Ask: "If this data got out, would it cost us money or damage our brand?" That's your sensitive data. Define it in a formal standard before scanning anything.</li><li><strong>Don't Try to Boil the Ocean, Start with the Obvious:</strong> Prioritize structured/business-system data first. Then tackle unstructured user-generated data. Leave shadow data for the crawl/walk/run phase.</li><li><strong>Don't Do It Alone: </strong>Build strategic partnerships with data teams, privacy, legal, risk, and compliance. Data governance and data security have the same goals. Leverage that alignment.</li><li><strong>Think Data Lifecycle (DSPM), Not Just Classification + DLP: </strong>Track data from creation to retirement. Understand how data flows across your network, to SaaS platforms, and to third parties. Data lineage is the foundation of mature data security posture management.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“You cannot block the business.” - Ketan Gotmare</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ketangotmare/">https://www.linkedin.com/in/ketangotmare/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 09 Apr 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/eef8a38b/7f991e0a.mp3" length="40377078" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/eBbwLswdNXTwEvYgfYC7i_Ay8pbBBOGCVQ_1lCu6-mI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MzJh/YjRiYmU4NTU3M2Zi/ZWJiOGRiZTllM2Yx/NzNiMC5wbmc.jpg"/>
      <itunes:duration>2520</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you protect sensitive data without becoming the bottleneck in a business that’s moving faster than ever?</p><p><br></p><p>Today, Ketan Gotmare shares how nearly two decades in cybersecurity have shaped his perspective on modern data protection and why today’s biggest challenge isn’t a lack of tools, but a fundamental imbalance between speed and control.</p><p><br></p><p>He introduces the concept of the “velocity versus control paradox,” where businesses are under constant pressure to move faster, adopt AI, and drive digital innovation while security teams are still expected to verify, govern, and reduce risk without slowing anything down. Ketan walks through the evolution of data security, from the “castle and moat” era to today’s borderless, cloud-first world, explaining why traditional approaches no longer work and what organizations must do instead. He emphasizes that security teams can no longer act as gatekeepers, and must shift toward enabling the business while still protecting sensitive data. The conversation dives into practical ways to get started, including how to define what sensitive data actually is, where it lives across structured and unstructured environments, and why most organizations struggle before they even begin implementing frameworks like zero trust.</p><p> </p><p>Takeaways:</p><ul><li><strong>Embrace the "Velocity vs. Control" Mindset:</strong> Security teams must stop being blockers. Find the balance between enabling business innovation and maintaining data protection.</li><li><strong>Apply Zero Trust as a Concept, Not a Product:</strong> Don't buy into "zero trust" tools blindly. Start small and identify your most sensitive/high-value data, layer controls around those assets, and expand from there. Never trust, always verify.</li><li><strong>Know What Your Sensitive Data Is Before Worrying About Where It Is:</strong> Partner with Privacy, Legal, and Compliance early. Ask: "If this data got out, would it cost us money or damage our brand?" That's your sensitive data. Define it in a formal standard before scanning anything.</li><li><strong>Don't Try to Boil the Ocean, Start with the Obvious:</strong> Prioritize structured/business-system data first. Then tackle unstructured user-generated data. Leave shadow data for the crawl/walk/run phase.</li><li><strong>Don't Do It Alone: </strong>Build strategic partnerships with data teams, privacy, legal, risk, and compliance. Data governance and data security have the same goals. Leverage that alignment.</li><li><strong>Think Data Lifecycle (DSPM), Not Just Classification + DLP: </strong>Track data from creation to retirement. Understand how data flows across your network, to SaaS platforms, and to third parties. Data lineage is the foundation of mature data security posture management.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“You cannot block the business.” - Ketan Gotmare</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ketangotmare/">https://www.linkedin.com/in/ketangotmare/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/ketan-gotmare" img="https://img.transistorcdn.com/Rul5ACJhynhjBN05kxHLzsJWrpGlXbRI7u_6vu-k8GA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYzlh/YTJhMDRiZmEyYmI3/Y2M2NDMwMmY0NTJh/MDBlNS5qcGc.jpg">Ketan Gotmare</podcast:person>
    </item>
    <item>
      <title>Speaking Business: How Modern Guardians Translate Tech Talk - Guardians of the Data - Episode #36</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Speaking Business: How Modern Guardians Translate Tech Talk - Guardians of the Data - Episode #36</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bf058135-0d82-4ce1-8d14-ce5581cb0fff</guid>
      <link>https://guardiansofthedata.show/s1/36</link>
      <description>
        <![CDATA[<p>How can the super technical cybersecurity leaders communicate risk and protection to other business leaders?</p><p><br></p><p>Today, we unpack a huge topic: how to “speak business” when you’re a technology leader. We take a look back at recent episodes to hear from real cybersecurity experts on how they convey risk and security concerns to people who don't have the technical expertise.</p><p><br></p><p>This episode brings together insights from industry leaders on how to shift from being the “department of no” to becoming a trusted business partner by understanding business priorities, communicating risk in meaningful terms, and building strong cross-functional relationships.</p><p><br></p><p>Featuring: Antonio Taylor, Joshua Copeland, Rick Doten, Jennifer Fite, Mark Alvardo, Frank DePaola, and Sanjeev Kumar.</p><p> </p><p>Takeaways:</p><ul><li><strong>Stop Being the "Department of No":</strong> Instead of defaulting to blocking requests, find the safe and right way to enable what the business needs to do.</li><li><strong>Learn to Speak Business, Not Tech:</strong> Translate technical jargon and cyber risk into business risk, real dollars, and layman's terms so leadership can understand, support, and fund your programs.</li><li><strong>Be a Student of the Business:</strong> Understand your organization's structure, operations, long-term strategy, and threat landscape so you can give relevant, informed advice. </li><li><strong>Build Relationships with Your Peers: </strong>Proactively connect with people across departments (HR, sales, operations) whose work your decisions will impact.</li><li><strong>Listen for Problems You Can Solve:</strong> In one-on-ones with business leaders, listen for pain points where security, automation, or AI can add value. Then offer solutions, not restrictions.</li><li><strong>Frame Security as Risk Guidance, Not Gatekeeping: </strong>Present risks, likelihoods, and impacts, but let the business make the final decision to accept, mitigate, or transfer risk.</li><li><strong>Make Business Partners an Extension of Security:</strong> When you bring people secure solutions that help them do their jobs, they start asking vendors the right security questions on your behalf.</li></ul><p><br></p><p>Connect with these featured guests:</p><ul><li>Antonio Taylor: <a href="https://www.linkedin.com/in/antoniodtaylor/">https://www.linkedin.com/in/antoniodtaylor/</a> </li><li>Joshua Copeland: <a href="https://www.linkedin.com/in/joshuacopeland/">https://www.linkedin.com/in/joshuacopeland/</a> </li><li>Rick Doten: <a href="https://www.linkedin.com/in/rick-doten-633470177/">https://www.linkedin.com/in/rick-doten-633470177/</a> </li><li>Jennifer Fite: <a href="https://www.linkedin.com/in/jenfitephd/">https://www.linkedin.com/in/jenfitephd/</a> </li><li>Mark Alvarado: <a href="https://www.linkedin.com/in/mark-alvarado-8715148/">https://www.linkedin.com/in/mark-alvarado-8715148/</a> </li><li>Frank DePaola: <a href="https://www.linkedin.com/in/frankdepaola/">https://www.linkedin.com/in/frankdepaola/</a> </li><li>Sanjeev Kumar: <a href="https://www.linkedin.com/in/trusted-ai-ciso/">https://www.linkedin.com/in/trusted-ai-ciso/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How can the super technical cybersecurity leaders communicate risk and protection to other business leaders?</p><p><br></p><p>Today, we unpack a huge topic: how to “speak business” when you’re a technology leader. We take a look back at recent episodes to hear from real cybersecurity experts on how they convey risk and security concerns to people who don't have the technical expertise.</p><p><br></p><p>This episode brings together insights from industry leaders on how to shift from being the “department of no” to becoming a trusted business partner by understanding business priorities, communicating risk in meaningful terms, and building strong cross-functional relationships.</p><p><br></p><p>Featuring: Antonio Taylor, Joshua Copeland, Rick Doten, Jennifer Fite, Mark Alvardo, Frank DePaola, and Sanjeev Kumar.</p><p> </p><p>Takeaways:</p><ul><li><strong>Stop Being the "Department of No":</strong> Instead of defaulting to blocking requests, find the safe and right way to enable what the business needs to do.</li><li><strong>Learn to Speak Business, Not Tech:</strong> Translate technical jargon and cyber risk into business risk, real dollars, and layman's terms so leadership can understand, support, and fund your programs.</li><li><strong>Be a Student of the Business:</strong> Understand your organization's structure, operations, long-term strategy, and threat landscape so you can give relevant, informed advice. </li><li><strong>Build Relationships with Your Peers: </strong>Proactively connect with people across departments (HR, sales, operations) whose work your decisions will impact.</li><li><strong>Listen for Problems You Can Solve:</strong> In one-on-ones with business leaders, listen for pain points where security, automation, or AI can add value. Then offer solutions, not restrictions.</li><li><strong>Frame Security as Risk Guidance, Not Gatekeeping: </strong>Present risks, likelihoods, and impacts, but let the business make the final decision to accept, mitigate, or transfer risk.</li><li><strong>Make Business Partners an Extension of Security:</strong> When you bring people secure solutions that help them do their jobs, they start asking vendors the right security questions on your behalf.</li></ul><p><br></p><p>Connect with these featured guests:</p><ul><li>Antonio Taylor: <a href="https://www.linkedin.com/in/antoniodtaylor/">https://www.linkedin.com/in/antoniodtaylor/</a> </li><li>Joshua Copeland: <a href="https://www.linkedin.com/in/joshuacopeland/">https://www.linkedin.com/in/joshuacopeland/</a> </li><li>Rick Doten: <a href="https://www.linkedin.com/in/rick-doten-633470177/">https://www.linkedin.com/in/rick-doten-633470177/</a> </li><li>Jennifer Fite: <a href="https://www.linkedin.com/in/jenfitephd/">https://www.linkedin.com/in/jenfitephd/</a> </li><li>Mark Alvarado: <a href="https://www.linkedin.com/in/mark-alvarado-8715148/">https://www.linkedin.com/in/mark-alvarado-8715148/</a> </li><li>Frank DePaola: <a href="https://www.linkedin.com/in/frankdepaola/">https://www.linkedin.com/in/frankdepaola/</a> </li><li>Sanjeev Kumar: <a href="https://www.linkedin.com/in/trusted-ai-ciso/">https://www.linkedin.com/in/trusted-ai-ciso/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 02 Apr 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/75f1ebae/3c680b65.mp3" length="16856521" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hae-F_NqM2oGNDgI7ygWV1VCpFSoBvOZaQKtc-7WVzU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYTNi/OTBlNDQzMzU3MjVh/Y2RmZTUyMDFhYzcz/M2E1NC5wbmc.jpg"/>
      <itunes:duration>1049</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How can the super technical cybersecurity leaders communicate risk and protection to other business leaders?</p><p><br></p><p>Today, we unpack a huge topic: how to “speak business” when you’re a technology leader. We take a look back at recent episodes to hear from real cybersecurity experts on how they convey risk and security concerns to people who don't have the technical expertise.</p><p><br></p><p>This episode brings together insights from industry leaders on how to shift from being the “department of no” to becoming a trusted business partner by understanding business priorities, communicating risk in meaningful terms, and building strong cross-functional relationships.</p><p><br></p><p>Featuring: Antonio Taylor, Joshua Copeland, Rick Doten, Jennifer Fite, Mark Alvardo, Frank DePaola, and Sanjeev Kumar.</p><p> </p><p>Takeaways:</p><ul><li><strong>Stop Being the "Department of No":</strong> Instead of defaulting to blocking requests, find the safe and right way to enable what the business needs to do.</li><li><strong>Learn to Speak Business, Not Tech:</strong> Translate technical jargon and cyber risk into business risk, real dollars, and layman's terms so leadership can understand, support, and fund your programs.</li><li><strong>Be a Student of the Business:</strong> Understand your organization's structure, operations, long-term strategy, and threat landscape so you can give relevant, informed advice. </li><li><strong>Build Relationships with Your Peers: </strong>Proactively connect with people across departments (HR, sales, operations) whose work your decisions will impact.</li><li><strong>Listen for Problems You Can Solve:</strong> In one-on-ones with business leaders, listen for pain points where security, automation, or AI can add value. Then offer solutions, not restrictions.</li><li><strong>Frame Security as Risk Guidance, Not Gatekeeping: </strong>Present risks, likelihoods, and impacts, but let the business make the final decision to accept, mitigate, or transfer risk.</li><li><strong>Make Business Partners an Extension of Security:</strong> When you bring people secure solutions that help them do their jobs, they start asking vendors the right security questions on your behalf.</li></ul><p><br></p><p>Connect with these featured guests:</p><ul><li>Antonio Taylor: <a href="https://www.linkedin.com/in/antoniodtaylor/">https://www.linkedin.com/in/antoniodtaylor/</a> </li><li>Joshua Copeland: <a href="https://www.linkedin.com/in/joshuacopeland/">https://www.linkedin.com/in/joshuacopeland/</a> </li><li>Rick Doten: <a href="https://www.linkedin.com/in/rick-doten-633470177/">https://www.linkedin.com/in/rick-doten-633470177/</a> </li><li>Jennifer Fite: <a href="https://www.linkedin.com/in/jenfitephd/">https://www.linkedin.com/in/jenfitephd/</a> </li><li>Mark Alvarado: <a href="https://www.linkedin.com/in/mark-alvarado-8715148/">https://www.linkedin.com/in/mark-alvarado-8715148/</a> </li><li>Frank DePaola: <a href="https://www.linkedin.com/in/frankdepaola/">https://www.linkedin.com/in/frankdepaola/</a> </li><li>Sanjeev Kumar: <a href="https://www.linkedin.com/in/trusted-ai-ciso/">https://www.linkedin.com/in/trusted-ai-ciso/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/antonio-taylor" img="https://img.transistorcdn.com/unOS5RhWIB3o_F19g60UqukJ9e0H4FoFSaQ0rHeAbZA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hOTA2/YTU3MzI4M2VhNjY4/MzQ3ODc1YzkzYTYx/ZjZmZi5qcGc.jpg">Antonio Taylor</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/joshua-copeland" img="https://img.transistorcdn.com/cnPnGDXL1yq26eqiYzpdmq-4rYNtLZbUCL0SnrqWCmQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83Y2Nm/YTM5MDc1MDBkMTU4/MzZjZDZlMmM4NTcx/NGZiOC5qcGc.jpg">Joshua Copeland</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/rick-doten" img="https://img.transistorcdn.com/5VOQJaxCicvTb_ys1LmWyhaHduIwVxclV68OZK5jDE0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83N2Yy/M2I1Y2JhNTA4NzEx/NjMzZjFkMzAzMGIw/NTJiNS5qcGc.jpg">Rick Doten</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/jen-fite" img="https://img.transistorcdn.com/aSUieb9VzxbDuZBvvnpXaByE-PUieoeR9T_XUB1FZEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNmY0/MWQ2YmEwN2ZhNjU5/ZTVjYTFkODZmZjYy/N2EzNy5qcGc.jpg">Jen Fite</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/mark-alvarado" img="https://img.transistorcdn.com/ljMQ5c5vkre_M-HPmAyZBCMofNMhonCtJMWsGHD9qRg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNWE5/N2YxNDhiYzYwNGE3/ZDkxZWVjYjM5OWNh/YjliNS5qcGc.jpg">Mark Alvarado</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/frank-depaola" img="https://img.transistorcdn.com/GJFiTRyY5LIWb7b_raxq5V2syNKKWfII-Xw5Eb7sq3M/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MDFi/ZWI0YTAwODI3ODc2/N2E0OGM0ZGFiMzQx/OGM0My5qcGc.jpg">Frank Depaola</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/sanjeev-kumar" img="https://img.transistorcdn.com/u0vR2ujG6B-O-Aayl4LkZFQC5yTLRdi1zddjxbYMkTc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMzc4/MWFjN2ExMTNlMzNh/NzEzYzg3NjIzNDU0/MDk0Ni5qcGc.jpg">Sanjeev Kumar</podcast:person>
    </item>
    <item>
      <title>Re-Air: Implementing Robust Data Protection Measures - Hans Vargas - Guardians of the Data - Ep #35</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Re-Air: Implementing Robust Data Protection Measures - Hans Vargas - Guardians of the Data - Ep #35</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">47141ff8-6125-4e23-84aa-b5e6ea2fa0ea</guid>
      <link>https://guardiansofthedata.show/s1/35</link>
      <description>
        <![CDATA[<p>What is the first step in building an effective data security and data governance strategy?</p><p><br></p><p>In this re-aired episode, we revisit a powerful conversation with Hans Vargas, Enterprise Data Protection Lead at Marathon Petroleum Corporation.</p><p><br></p><p>Hans shares timeless insights on one of the most persistent challenges in data security: understanding what data actually matters and how to protect it effectively. From the importance of data discovery and classification to the realities of working with business stakeholders, this episode is a practical look at what it takes to build a strong data protection foundation.</p><p><br></p><p>As organizations continue to navigate cloud adoption, AI, and increasingly distributed environments, Hans’s perspective is just as relevant today as when this episode first aired.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Know What You Need to Protect:</strong> Start with data discovery and identify what data you have, where it is, and what is sensitive. You can't protect what you don't know exists.</li><li><strong>Engage Data Owners Directly:</strong> Build relationships with data owners, not just stakeholders. Have open conversations to understand what is truly sensitive and important to the business.</li><li><strong>Communicate the Value of Data Protection:</strong> Clearly explain to business units why data protection matters, using relatable analogies if needed (e.g., moving houses, hoarding).</li><li><strong>Establish and Strengthen Data Governance:</strong> Ensure your organization has clear data governance policies covering the entire data lifecycle from creation to disposition.</li><li><strong>Collaborate Across Teams:</strong> Work closely with data governance, legal, and business units. Data security is a two-way street; share discoveries and insights to improve overall protection.</li><li><strong>Don’t Rely Solely on Tools:</strong> Deploying a tool is not enough. Make sure processes and responsibilities are in place before or alongside technology adoption.</li><li><strong>Consider the Full CIA Triad:</strong> Don’t focus only on confidentiality. Ensure data integrity and availability are also prioritized to keep the business running smoothly.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“I argue that the conversation about the architecture of how to protect data should be one of the first things.” - Hans Vargas</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Website: <a href="https://www.marathonpetroleum.com/">https://www.marathonpetroleum.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What is the first step in building an effective data security and data governance strategy?</p><p><br></p><p>In this re-aired episode, we revisit a powerful conversation with Hans Vargas, Enterprise Data Protection Lead at Marathon Petroleum Corporation.</p><p><br></p><p>Hans shares timeless insights on one of the most persistent challenges in data security: understanding what data actually matters and how to protect it effectively. From the importance of data discovery and classification to the realities of working with business stakeholders, this episode is a practical look at what it takes to build a strong data protection foundation.</p><p><br></p><p>As organizations continue to navigate cloud adoption, AI, and increasingly distributed environments, Hans’s perspective is just as relevant today as when this episode first aired.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Know What You Need to Protect:</strong> Start with data discovery and identify what data you have, where it is, and what is sensitive. You can't protect what you don't know exists.</li><li><strong>Engage Data Owners Directly:</strong> Build relationships with data owners, not just stakeholders. Have open conversations to understand what is truly sensitive and important to the business.</li><li><strong>Communicate the Value of Data Protection:</strong> Clearly explain to business units why data protection matters, using relatable analogies if needed (e.g., moving houses, hoarding).</li><li><strong>Establish and Strengthen Data Governance:</strong> Ensure your organization has clear data governance policies covering the entire data lifecycle from creation to disposition.</li><li><strong>Collaborate Across Teams:</strong> Work closely with data governance, legal, and business units. Data security is a two-way street; share discoveries and insights to improve overall protection.</li><li><strong>Don’t Rely Solely on Tools:</strong> Deploying a tool is not enough. Make sure processes and responsibilities are in place before or alongside technology adoption.</li><li><strong>Consider the Full CIA Triad:</strong> Don’t focus only on confidentiality. Ensure data integrity and availability are also prioritized to keep the business running smoothly.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“I argue that the conversation about the architecture of how to protect data should be one of the first things.” - Hans Vargas</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Website: <a href="https://www.marathonpetroleum.com/">https://www.marathonpetroleum.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 26 Mar 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/09ef057d/373d66bd.mp3" length="49638338" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UEJqfgx3mOHyBR4_6_hdjI_nNmMyQ08OjWlk7R4Du1E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NTVk/ZDJiNmQ2ZGIyNzky/ZjBiNjY0YjY0ZmFm/YmE0MC5wbmc.jpg"/>
      <itunes:duration>3100</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What is the first step in building an effective data security and data governance strategy?</p><p><br></p><p>In this re-aired episode, we revisit a powerful conversation with Hans Vargas, Enterprise Data Protection Lead at Marathon Petroleum Corporation.</p><p><br></p><p>Hans shares timeless insights on one of the most persistent challenges in data security: understanding what data actually matters and how to protect it effectively. From the importance of data discovery and classification to the realities of working with business stakeholders, this episode is a practical look at what it takes to build a strong data protection foundation.</p><p><br></p><p>As organizations continue to navigate cloud adoption, AI, and increasingly distributed environments, Hans’s perspective is just as relevant today as when this episode first aired.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Know What You Need to Protect:</strong> Start with data discovery and identify what data you have, where it is, and what is sensitive. You can't protect what you don't know exists.</li><li><strong>Engage Data Owners Directly:</strong> Build relationships with data owners, not just stakeholders. Have open conversations to understand what is truly sensitive and important to the business.</li><li><strong>Communicate the Value of Data Protection:</strong> Clearly explain to business units why data protection matters, using relatable analogies if needed (e.g., moving houses, hoarding).</li><li><strong>Establish and Strengthen Data Governance:</strong> Ensure your organization has clear data governance policies covering the entire data lifecycle from creation to disposition.</li><li><strong>Collaborate Across Teams:</strong> Work closely with data governance, legal, and business units. Data security is a two-way street; share discoveries and insights to improve overall protection.</li><li><strong>Don’t Rely Solely on Tools:</strong> Deploying a tool is not enough. Make sure processes and responsibilities are in place before or alongside technology adoption.</li><li><strong>Consider the Full CIA Triad:</strong> Don’t focus only on confidentiality. Ensure data integrity and availability are also prioritized to keep the business running smoothly.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“I argue that the conversation about the architecture of how to protect data should be one of the first things.” - Hans Vargas</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Website: <a href="https://www.marathonpetroleum.com/">https://www.marathonpetroleum.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/hans-vargas" img="https://img.transistorcdn.com/oBM6_Vhjk4z2vbRhz_Ckrj8FmZSDWiDTvsOqY7IL6iI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMTFm/ZTU1MzUwYTZiNjQ2/ZjQyZGE1Nzg3MzEz/YzljMC5wbmc.jpg">Hans Vargas</podcast:person>
    </item>
    <item>
      <title>Data Security Starts With People - Anand Pallapalayam - Guardians of the Data - Episode #34</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Data Security Starts With People - Anand Pallapalayam - Guardians of the Data - Episode #34</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">752e2c99-3e3b-4918-828d-64a592eb96db</guid>
      <link>https://guardiansofthedata.show/s1/34</link>
      <description>
        <![CDATA[<p>Are organizations focusing on the wrong things when it comes to data security?</p><p><br></p><p>In this episode of Guardians of the Data, Anand Pallapalayam, an enterprise data protection leader with nearly 30 years of experience, explains why the biggest data security challenge isn’t technology, it’s people. Anand breaks down the classic “three Ps” of security: people, process, and products. He argues that education and awareness should be the foundation of every security strategy. From understanding sensitive data types like PII, PHI, and PCI to teaching employees the real risks of data misuse, he shares why even basic training can dramatically improve an organization’s security posture.</p><p><br></p><p>Anand shares lessons from his career journey into data security and why continuous learning is essential in fields like technology. His message is simple but powerful: protect the data, educate the people, and build systems thoughtfully from the start.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People Through Education:</strong> Start with mandatory employee training on data security fundamentals like what sensitive data is (PII, PHI, PCI), why it matters, and basic protection principles.</li><li><strong>Never Use Sensitive Data as Database Keys:</strong> Avoid using SSN, credit card numbers, or other sensitive data as primary or secondary keys in your database schemas. Instead, use sequential numbers or unique identifiers (UIDs) to minimize the exposure surface.</li><li><strong>Take Time to Design Systems Right the First Time:</strong> Invest 70-75% of your effort in planning and designing technical systems before implementation. "Postmortem work" to fix security flaws in production systems is expensive, risky, and disruptive.</li><li><strong>Understand That Data Abuse Exceeds Data Use:</strong> Recognize that in today's environment, the misuse and abuse of data is more prevalent than legitimate use. Train employees to be protective of sensitive information and question whether data collection is truly necessary.</li><li><strong>Use Tokenization Over Encryption When Possible:</strong> It preserves the original format, type, and size of data, improves usability for applications, and still protects sensitive data at rest.</li><li><strong>Separate Authorization from Authentication:</strong> Move beyond basic authentication to implement proper authorization controls. Limit access to sensitive data to only the 5% of employees who genuinely need it for their business functions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“In this time and age, the abuse of data is more existing than the use of data itself.” - Anand Pallapalayam</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/anand-pallapalayam-bb4a2a70/">https://www.linkedin.com/in/anand-pallapalayam-bb4a2a70/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are organizations focusing on the wrong things when it comes to data security?</p><p><br></p><p>In this episode of Guardians of the Data, Anand Pallapalayam, an enterprise data protection leader with nearly 30 years of experience, explains why the biggest data security challenge isn’t technology, it’s people. Anand breaks down the classic “three Ps” of security: people, process, and products. He argues that education and awareness should be the foundation of every security strategy. From understanding sensitive data types like PII, PHI, and PCI to teaching employees the real risks of data misuse, he shares why even basic training can dramatically improve an organization’s security posture.</p><p><br></p><p>Anand shares lessons from his career journey into data security and why continuous learning is essential in fields like technology. His message is simple but powerful: protect the data, educate the people, and build systems thoughtfully from the start.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People Through Education:</strong> Start with mandatory employee training on data security fundamentals like what sensitive data is (PII, PHI, PCI), why it matters, and basic protection principles.</li><li><strong>Never Use Sensitive Data as Database Keys:</strong> Avoid using SSN, credit card numbers, or other sensitive data as primary or secondary keys in your database schemas. Instead, use sequential numbers or unique identifiers (UIDs) to minimize the exposure surface.</li><li><strong>Take Time to Design Systems Right the First Time:</strong> Invest 70-75% of your effort in planning and designing technical systems before implementation. "Postmortem work" to fix security flaws in production systems is expensive, risky, and disruptive.</li><li><strong>Understand That Data Abuse Exceeds Data Use:</strong> Recognize that in today's environment, the misuse and abuse of data is more prevalent than legitimate use. Train employees to be protective of sensitive information and question whether data collection is truly necessary.</li><li><strong>Use Tokenization Over Encryption When Possible:</strong> It preserves the original format, type, and size of data, improves usability for applications, and still protects sensitive data at rest.</li><li><strong>Separate Authorization from Authentication:</strong> Move beyond basic authentication to implement proper authorization controls. Limit access to sensitive data to only the 5% of employees who genuinely need it for their business functions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“In this time and age, the abuse of data is more existing than the use of data itself.” - Anand Pallapalayam</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/anand-pallapalayam-bb4a2a70/">https://www.linkedin.com/in/anand-pallapalayam-bb4a2a70/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 19 Mar 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/b756bdf8/bafda340.mp3" length="38184222" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GW9L38nW8y1057-DCz79-d3uVjvLOP8GnRP56cUMILo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZmM4/OTQxZTFjOWU0ZmE2/MjNkZTA3MDYxNWQ4/NTgyMC5wbmc.jpg"/>
      <itunes:duration>2384</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are organizations focusing on the wrong things when it comes to data security?</p><p><br></p><p>In this episode of Guardians of the Data, Anand Pallapalayam, an enterprise data protection leader with nearly 30 years of experience, explains why the biggest data security challenge isn’t technology, it’s people. Anand breaks down the classic “three Ps” of security: people, process, and products. He argues that education and awareness should be the foundation of every security strategy. From understanding sensitive data types like PII, PHI, and PCI to teaching employees the real risks of data misuse, he shares why even basic training can dramatically improve an organization’s security posture.</p><p><br></p><p>Anand shares lessons from his career journey into data security and why continuous learning is essential in fields like technology. His message is simple but powerful: protect the data, educate the people, and build systems thoughtfully from the start.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People Through Education:</strong> Start with mandatory employee training on data security fundamentals like what sensitive data is (PII, PHI, PCI), why it matters, and basic protection principles.</li><li><strong>Never Use Sensitive Data as Database Keys:</strong> Avoid using SSN, credit card numbers, or other sensitive data as primary or secondary keys in your database schemas. Instead, use sequential numbers or unique identifiers (UIDs) to minimize the exposure surface.</li><li><strong>Take Time to Design Systems Right the First Time:</strong> Invest 70-75% of your effort in planning and designing technical systems before implementation. "Postmortem work" to fix security flaws in production systems is expensive, risky, and disruptive.</li><li><strong>Understand That Data Abuse Exceeds Data Use:</strong> Recognize that in today's environment, the misuse and abuse of data is more prevalent than legitimate use. Train employees to be protective of sensitive information and question whether data collection is truly necessary.</li><li><strong>Use Tokenization Over Encryption When Possible:</strong> It preserves the original format, type, and size of data, improves usability for applications, and still protects sensitive data at rest.</li><li><strong>Separate Authorization from Authentication:</strong> Move beyond basic authentication to implement proper authorization controls. Limit access to sensitive data to only the 5% of employees who genuinely need it for their business functions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“In this time and age, the abuse of data is more existing than the use of data itself.” - Anand Pallapalayam</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/anand-pallapalayam-bb4a2a70/">https://www.linkedin.com/in/anand-pallapalayam-bb4a2a70/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/anand-pallapalayam" img="https://img.transistorcdn.com/hNYeb05pRZA8pXUCPLYo4yDVYs_jqPUFhKYyvn69fzI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNjBk/ZDU5MTZiMTc4OTE4/MzkwMDc2NTdlZGE2/MDM1YS5qcGc.jpg">Anand Pallapalayam</podcast:person>
    </item>
    <item>
      <title>Data Protection for AI: 3-Pillar Framework for CISOs - Areejit Banerjee - Guardians of the Data - Episode #33</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Data Protection for AI: 3-Pillar Framework for CISOs - Areejit Banerjee - Guardians of the Data - Episode #33</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23083f37-3bba-4922-9862-151faf7b8c3e</guid>
      <link>https://guardiansofthedata.show/s1/33</link>
      <description>
        <![CDATA[<p>Are your AI models amplifying bias and exposing your organization to data scraping risks without you realizing it?</p><p><br></p><p>Today, Ward sits down with Areejit Banerjee, Senior Manager of Data Protection and Product Strategy and published author, to unpack one of the biggest challenges in modern cybersecurity: protecting data in the age of artificial intelligence. With over 20 years of experience across banking, data analytics, AI, and adversarial systems, Areejit shares his perspective on how synthetic data, AI scraping, and outdated policy frameworks are reshaping the security landscape. </p><p><br></p><p>Areejit explains how we are reaching the limits of decades of “organic” human-generated data. As that well runs dry, AI systems are increasingly trained on synthetic data generated from existing models. The risk? If the original datasets lacked global representation or contained structural bias, synthetic data doesn’t fix the problem; it compounds it.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Adopt a Three-Pillar Defense Strategy:</strong> Organizations must address data security through technical defenses, product design, and public policy engagement to modernize laws like the Computer Fraud and Abuse Act.</li><li><strong>Map Your Scraping Landscape With Common Language:</strong> Use standardized ontologies like OWASP's automated threat standards so legal, product, and technical teams speak the same language about threats. This prevents fighting different battles on different grounds.</li><li><strong>Classify Data By Value, Not Uniformly:</strong> Don't defend all data equally. Identify your data lineage and protect proprietary intellectual property more heavily while keeping commodity-level data more accessible to reduce friction for legitimate users.</li><li><strong>Implement Layered Defense Architecture:</strong> Create perimeter defenses, protect high-value business assets first, and adjust friction based on customer behavior.</li><li><strong>Connect Individual Work to Organizational Mission:</strong> Whether you're writing SQL code or building AI models, regularly reflect on how your specific contribution advances the larger mission. This transforms work from bill-paying to meaningful impact and increases job fulfillment.</li><li><strong>Conduct AI Impact Assessments Before Launch:</strong> Every product using AI should undergo an impact assessment using frameworks from Microsoft, NIST, or the EU AI Act to identify and mitigate bias before deployment, not after problems emerge.</li><li><strong>Balance Tactical and Strategic Security Initiatives:</strong> Create a day-zero tactical playbook (like onboarding AI-enabled bot detection vendors) while simultaneously planning strategic moves to avoid an endless backlog.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“If we use the same rule book that we had before, we are lagging. We are waiting for a catastrophe to happen.” - Areejit Banerjee</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/areejitbanerjee/">https://www.linkedin.com/in/areejitbanerjee/</a> </li><li>CircleID: <a href="https://circleid.com/members/9502">https://circleid.com/members/9502</a></li><li>Dark Reading: <a href="https://www.darkreading.com/author/areejit-banerjee">https://www.darkreading.com/author/areejit-banerjee</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are your AI models amplifying bias and exposing your organization to data scraping risks without you realizing it?</p><p><br></p><p>Today, Ward sits down with Areejit Banerjee, Senior Manager of Data Protection and Product Strategy and published author, to unpack one of the biggest challenges in modern cybersecurity: protecting data in the age of artificial intelligence. With over 20 years of experience across banking, data analytics, AI, and adversarial systems, Areejit shares his perspective on how synthetic data, AI scraping, and outdated policy frameworks are reshaping the security landscape. </p><p><br></p><p>Areejit explains how we are reaching the limits of decades of “organic” human-generated data. As that well runs dry, AI systems are increasingly trained on synthetic data generated from existing models. The risk? If the original datasets lacked global representation or contained structural bias, synthetic data doesn’t fix the problem; it compounds it.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Adopt a Three-Pillar Defense Strategy:</strong> Organizations must address data security through technical defenses, product design, and public policy engagement to modernize laws like the Computer Fraud and Abuse Act.</li><li><strong>Map Your Scraping Landscape With Common Language:</strong> Use standardized ontologies like OWASP's automated threat standards so legal, product, and technical teams speak the same language about threats. This prevents fighting different battles on different grounds.</li><li><strong>Classify Data By Value, Not Uniformly:</strong> Don't defend all data equally. Identify your data lineage and protect proprietary intellectual property more heavily while keeping commodity-level data more accessible to reduce friction for legitimate users.</li><li><strong>Implement Layered Defense Architecture:</strong> Create perimeter defenses, protect high-value business assets first, and adjust friction based on customer behavior.</li><li><strong>Connect Individual Work to Organizational Mission:</strong> Whether you're writing SQL code or building AI models, regularly reflect on how your specific contribution advances the larger mission. This transforms work from bill-paying to meaningful impact and increases job fulfillment.</li><li><strong>Conduct AI Impact Assessments Before Launch:</strong> Every product using AI should undergo an impact assessment using frameworks from Microsoft, NIST, or the EU AI Act to identify and mitigate bias before deployment, not after problems emerge.</li><li><strong>Balance Tactical and Strategic Security Initiatives:</strong> Create a day-zero tactical playbook (like onboarding AI-enabled bot detection vendors) while simultaneously planning strategic moves to avoid an endless backlog.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“If we use the same rule book that we had before, we are lagging. We are waiting for a catastrophe to happen.” - Areejit Banerjee</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/areejitbanerjee/">https://www.linkedin.com/in/areejitbanerjee/</a> </li><li>CircleID: <a href="https://circleid.com/members/9502">https://circleid.com/members/9502</a></li><li>Dark Reading: <a href="https://www.darkreading.com/author/areejit-banerjee">https://www.darkreading.com/author/areejit-banerjee</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 12 Mar 2026 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/3320f925/58657e4b.mp3" length="35884589" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/S9N6rF35Z6xdOgIcKK8spdYkd7GWC3-UtUU9l6pasM0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NmU2/YmYyNWM1YzY1OWEw/M2U1MDZhMWNhN2Rh/YjgzZi5wbmc.jpg"/>
      <itunes:duration>2239</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are your AI models amplifying bias and exposing your organization to data scraping risks without you realizing it?</p><p><br></p><p>Today, Ward sits down with Areejit Banerjee, Senior Manager of Data Protection and Product Strategy and published author, to unpack one of the biggest challenges in modern cybersecurity: protecting data in the age of artificial intelligence. With over 20 years of experience across banking, data analytics, AI, and adversarial systems, Areejit shares his perspective on how synthetic data, AI scraping, and outdated policy frameworks are reshaping the security landscape. </p><p><br></p><p>Areejit explains how we are reaching the limits of decades of “organic” human-generated data. As that well runs dry, AI systems are increasingly trained on synthetic data generated from existing models. The risk? If the original datasets lacked global representation or contained structural bias, synthetic data doesn’t fix the problem; it compounds it.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Adopt a Three-Pillar Defense Strategy:</strong> Organizations must address data security through technical defenses, product design, and public policy engagement to modernize laws like the Computer Fraud and Abuse Act.</li><li><strong>Map Your Scraping Landscape With Common Language:</strong> Use standardized ontologies like OWASP's automated threat standards so legal, product, and technical teams speak the same language about threats. This prevents fighting different battles on different grounds.</li><li><strong>Classify Data By Value, Not Uniformly:</strong> Don't defend all data equally. Identify your data lineage and protect proprietary intellectual property more heavily while keeping commodity-level data more accessible to reduce friction for legitimate users.</li><li><strong>Implement Layered Defense Architecture:</strong> Create perimeter defenses, protect high-value business assets first, and adjust friction based on customer behavior.</li><li><strong>Connect Individual Work to Organizational Mission:</strong> Whether you're writing SQL code or building AI models, regularly reflect on how your specific contribution advances the larger mission. This transforms work from bill-paying to meaningful impact and increases job fulfillment.</li><li><strong>Conduct AI Impact Assessments Before Launch:</strong> Every product using AI should undergo an impact assessment using frameworks from Microsoft, NIST, or the EU AI Act to identify and mitigate bias before deployment, not after problems emerge.</li><li><strong>Balance Tactical and Strategic Security Initiatives:</strong> Create a day-zero tactical playbook (like onboarding AI-enabled bot detection vendors) while simultaneously planning strategic moves to avoid an endless backlog.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“If we use the same rule book that we had before, we are lagging. We are waiting for a catastrophe to happen.” - Areejit Banerjee</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/areejitbanerjee/">https://www.linkedin.com/in/areejitbanerjee/</a> </li><li>CircleID: <a href="https://circleid.com/members/9502">https://circleid.com/members/9502</a></li><li>Dark Reading: <a href="https://www.darkreading.com/author/areejit-banerjee">https://www.darkreading.com/author/areejit-banerjee</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/areejit-banerjee" img="https://img.transistorcdn.com/A_O9Zg2VMLyQEp5o9s1gcYflgyXjiGoJ2E1HWaZ0na8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNzli/OGYxYWE3ODM2MjUx/YzRiMjBiYjU2ZjE3/NWNmNC5qcGc.jpg">Areejit Banerjee</podcast:person>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
    </item>
    <item>
      <title>Why EQ Matters More Than Tech - Mark Alvarado - Guardians of the Data - Episode #32</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Why EQ Matters More Than Tech - Mark Alvarado - Guardians of the Data - Episode #32</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b5115dd-36ae-4b5d-8128-803d1062bc9f</guid>
      <link>https://guardiansofthedata.show/s1/32</link>
      <description>
        <![CDATA[<p>Why do so many security leaders struggle to build lasting, effective programs, even as technology keeps getting better?</p><p><br>In this episode, Ward sits down with retail CISO Mark Alvarado to unpack one of the biggest misconceptions in cybersecurity leadership: technical expertise alone isn’t enough anymore. With over 20 years of experience across digital risk, IT infrastructure, and data privacy, Mark shares why today’s most successful CISOs must master emotional intelligence, relationship building, and business alignment. The conversation explores what it truly takes to build a resilient, business-aligned security program.</p><p>Takeaways:</p><ul><li><strong>Be a Student of Your Business:</strong> Deeply understand your company's structure, operations, long-term strategy, and threat landscape to provide relevant security advice and build effective programs tailored to your organization's unique culture.</li><li><strong>Prioritize EQ and Relationship-Building Over Pure Technical Skills: </strong>The most critical CISO skill today is emotional intelligence and the ability to translate complex security concepts into business language that leadership can understand and act upon.</li><li><strong>Focus Security Efforts on Identity and Network Access:</strong> Since all data access requires user IDs and network connectivity, concentrating your resources on authentication management and network security provides the strongest foundation for protecting business data.</li><li><strong>Document Everything Systematically</strong>: Create comprehensive, well-organized documentation of processes, procedures, and configurations to ensure knowledge transfer, program continuity, and operational efficiency when team members change.</li><li><strong>Accept That You Can't Stop Everything:</strong> Rather than trying to prevent all threats, focus on protecting your most critical business data, limiting blast radius when incidents occur, and ensuring rapid recovery capabilities.</li><li><strong>Invest in Continuous Learning:</strong> Stay current with evolving technology, regulations, and threat landscapes through formal education, certifications, peer networking, and industry conferences to remain effective in this rapidly changing field.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We can’t really one hundred percent stop cyber crime,… but we can limit the blast radius.” - Mark Alvarado</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/mark-alvarado-8715148/">https://www.linkedin.com/in/mark-alvarado-8715148/</a> </li></ul><p><br>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Why do so many security leaders struggle to build lasting, effective programs, even as technology keeps getting better?</p><p><br>In this episode, Ward sits down with retail CISO Mark Alvarado to unpack one of the biggest misconceptions in cybersecurity leadership: technical expertise alone isn’t enough anymore. With over 20 years of experience across digital risk, IT infrastructure, and data privacy, Mark shares why today’s most successful CISOs must master emotional intelligence, relationship building, and business alignment. The conversation explores what it truly takes to build a resilient, business-aligned security program.</p><p>Takeaways:</p><ul><li><strong>Be a Student of Your Business:</strong> Deeply understand your company's structure, operations, long-term strategy, and threat landscape to provide relevant security advice and build effective programs tailored to your organization's unique culture.</li><li><strong>Prioritize EQ and Relationship-Building Over Pure Technical Skills: </strong>The most critical CISO skill today is emotional intelligence and the ability to translate complex security concepts into business language that leadership can understand and act upon.</li><li><strong>Focus Security Efforts on Identity and Network Access:</strong> Since all data access requires user IDs and network connectivity, concentrating your resources on authentication management and network security provides the strongest foundation for protecting business data.</li><li><strong>Document Everything Systematically</strong>: Create comprehensive, well-organized documentation of processes, procedures, and configurations to ensure knowledge transfer, program continuity, and operational efficiency when team members change.</li><li><strong>Accept That You Can't Stop Everything:</strong> Rather than trying to prevent all threats, focus on protecting your most critical business data, limiting blast radius when incidents occur, and ensuring rapid recovery capabilities.</li><li><strong>Invest in Continuous Learning:</strong> Stay current with evolving technology, regulations, and threat landscapes through formal education, certifications, peer networking, and industry conferences to remain effective in this rapidly changing field.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We can’t really one hundred percent stop cyber crime,… but we can limit the blast radius.” - Mark Alvarado</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/mark-alvarado-8715148/">https://www.linkedin.com/in/mark-alvarado-8715148/</a> </li></ul><p><br>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 05 Mar 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/e115d940/d0d32cfd.mp3" length="39323430" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fyjl747HUVlGsR5wL_ZNW3km3nWKEjBB0mGHVgjBH2w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZGU4/Mjk1MmZlMzY4OGM3/Mzk3ZGEyNWMzNTUy/MTM5Mi5wbmc.jpg"/>
      <itunes:duration>2455</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Why do so many security leaders struggle to build lasting, effective programs, even as technology keeps getting better?</p><p><br>In this episode, Ward sits down with retail CISO Mark Alvarado to unpack one of the biggest misconceptions in cybersecurity leadership: technical expertise alone isn’t enough anymore. With over 20 years of experience across digital risk, IT infrastructure, and data privacy, Mark shares why today’s most successful CISOs must master emotional intelligence, relationship building, and business alignment. The conversation explores what it truly takes to build a resilient, business-aligned security program.</p><p>Takeaways:</p><ul><li><strong>Be a Student of Your Business:</strong> Deeply understand your company's structure, operations, long-term strategy, and threat landscape to provide relevant security advice and build effective programs tailored to your organization's unique culture.</li><li><strong>Prioritize EQ and Relationship-Building Over Pure Technical Skills: </strong>The most critical CISO skill today is emotional intelligence and the ability to translate complex security concepts into business language that leadership can understand and act upon.</li><li><strong>Focus Security Efforts on Identity and Network Access:</strong> Since all data access requires user IDs and network connectivity, concentrating your resources on authentication management and network security provides the strongest foundation for protecting business data.</li><li><strong>Document Everything Systematically</strong>: Create comprehensive, well-organized documentation of processes, procedures, and configurations to ensure knowledge transfer, program continuity, and operational efficiency when team members change.</li><li><strong>Accept That You Can't Stop Everything:</strong> Rather than trying to prevent all threats, focus on protecting your most critical business data, limiting blast radius when incidents occur, and ensuring rapid recovery capabilities.</li><li><strong>Invest in Continuous Learning:</strong> Stay current with evolving technology, regulations, and threat landscapes through formal education, certifications, peer networking, and industry conferences to remain effective in this rapidly changing field.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We can’t really one hundred percent stop cyber crime,… but we can limit the blast radius.” - Mark Alvarado</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/mark-alvarado-8715148/">https://www.linkedin.com/in/mark-alvarado-8715148/</a> </li></ul><p><br>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/mark-alvarado" img="https://img.transistorcdn.com/ljMQ5c5vkre_M-HPmAyZBCMofNMhonCtJMWsGHD9qRg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNWE5/N2YxNDhiYzYwNGE3/ZDkxZWVjYjM5OWNh/YjliNS5qcGc.jpg">Mark Alvarado</podcast:person>
    </item>
    <item>
      <title>Hope Is Not a Strategy: Secure AI the Right Way - Jason Elrod - Guardians of the Data - Episode #31</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Hope Is Not a Strategy: Secure AI the Right Way - Jason Elrod - Guardians of the Data - Episode #31</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">374e00ef-265e-4565-9b5b-d5a930954085</guid>
      <link>https://guardiansofthedata.show/s1/31</link>
      <description>
        <![CDATA[<p>How do you secure AI when you don’t have data inventory, classification, identity controls, and governance frameworks? You can’t.</p><p>In this episode of Guardians of the Data, Ward sits down with Jason Elrod, Founder of Limitless Cyber and CISO of a multi-billion-dollar healthcare system, to unpack the real risks and realities of AI in today’s enterprise.</p><p><br></p><p>Jason makes it clear: AI may be the biggest emerging data threat, but the fundamentals haven’t changed. Data inventory, classification, identity controls, and governance frameworks still form the bedrock of security. The problem? Many organizations skipped those steps and are now trying to integrate AI into fragile environments. As cyber threats accelerate, attackers are already leveraging automation and AI. Jason argues that defenders must do the same by using AI to automate, augment, and amplify blue teams rather than replace them.</p><p> </p><p>Takeaways:</p><ul><li><strong>Don't Give AI Direct Access to Everything:</strong> Never connect AI directly to your data lake or core systems. Instead, create a curated "bastion dataset" specifically for AI use cases.</li><li><strong>Master the Fundamentals First:</strong> Data inventory, classification, and context are essential. Make sure you have these mastered before integrating AI into your organization.</li><li><strong>Pause and Assess Your Current AI Deployments:</strong> Prioritize AI use cases that deliver actual ROI vs. just "interest on investment," and stop exploratory AI projects until the fundamentals are in place.</li><li><strong>Implement AI for Defense:</strong> Use AI to automate, augment, and amplify your security team. You must use AI to defend against AI-speed attacks.</li><li><strong>Career Advice: Out-Frame AI, Don't Outwork It:</strong> Focus on skills AI can't replace: discernment, integrity, morality, judgment, and become AI's manager rather than its competitor.</li><li><strong>Pay the Cost in Discipline Now, Not Anxiety Later:</strong> Skipping fundamentals today creates stress you'll carry for years. Make sure to document and do things right from the start.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Have a rock-solid data governance plan and framework in place. Then it's easier to have a more stable AI governance in place.” - Jason Elrod</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/thejasonelrod/">https://www.linkedin.com/in/thejasonelrod/</a> </li><li>Website: <a href="https://www.limitlesscyber.com/">https://www.limitlesscyber.com/</a> </li><li>YouTube: <a href="https://www.youtube.com/@LimitlessCyber">https://www.youtube.com/@LimitlessCyber</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you secure AI when you don’t have data inventory, classification, identity controls, and governance frameworks? You can’t.</p><p>In this episode of Guardians of the Data, Ward sits down with Jason Elrod, Founder of Limitless Cyber and CISO of a multi-billion-dollar healthcare system, to unpack the real risks and realities of AI in today’s enterprise.</p><p><br></p><p>Jason makes it clear: AI may be the biggest emerging data threat, but the fundamentals haven’t changed. Data inventory, classification, identity controls, and governance frameworks still form the bedrock of security. The problem? Many organizations skipped those steps and are now trying to integrate AI into fragile environments. As cyber threats accelerate, attackers are already leveraging automation and AI. Jason argues that defenders must do the same by using AI to automate, augment, and amplify blue teams rather than replace them.</p><p> </p><p>Takeaways:</p><ul><li><strong>Don't Give AI Direct Access to Everything:</strong> Never connect AI directly to your data lake or core systems. Instead, create a curated "bastion dataset" specifically for AI use cases.</li><li><strong>Master the Fundamentals First:</strong> Data inventory, classification, and context are essential. Make sure you have these mastered before integrating AI into your organization.</li><li><strong>Pause and Assess Your Current AI Deployments:</strong> Prioritize AI use cases that deliver actual ROI vs. just "interest on investment," and stop exploratory AI projects until the fundamentals are in place.</li><li><strong>Implement AI for Defense:</strong> Use AI to automate, augment, and amplify your security team. You must use AI to defend against AI-speed attacks.</li><li><strong>Career Advice: Out-Frame AI, Don't Outwork It:</strong> Focus on skills AI can't replace: discernment, integrity, morality, judgment, and become AI's manager rather than its competitor.</li><li><strong>Pay the Cost in Discipline Now, Not Anxiety Later:</strong> Skipping fundamentals today creates stress you'll carry for years. Make sure to document and do things right from the start.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Have a rock-solid data governance plan and framework in place. Then it's easier to have a more stable AI governance in place.” - Jason Elrod</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/thejasonelrod/">https://www.linkedin.com/in/thejasonelrod/</a> </li><li>Website: <a href="https://www.limitlesscyber.com/">https://www.limitlesscyber.com/</a> </li><li>YouTube: <a href="https://www.youtube.com/@LimitlessCyber">https://www.youtube.com/@LimitlessCyber</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 26 Feb 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/c69b03fe/f614509d.mp3" length="29735062" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/IO8L2bG-AokDhgtEFwIJMqfKHatEcrjqZ9BSYFsFPTU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNjE4/NTA0ODdmNTI0Nzky/M2YwYmY2YTgwYzQ0/MTczYy5wbmc.jpg"/>
      <itunes:duration>1856</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you secure AI when you don’t have data inventory, classification, identity controls, and governance frameworks? You can’t.</p><p>In this episode of Guardians of the Data, Ward sits down with Jason Elrod, Founder of Limitless Cyber and CISO of a multi-billion-dollar healthcare system, to unpack the real risks and realities of AI in today’s enterprise.</p><p><br></p><p>Jason makes it clear: AI may be the biggest emerging data threat, but the fundamentals haven’t changed. Data inventory, classification, identity controls, and governance frameworks still form the bedrock of security. The problem? Many organizations skipped those steps and are now trying to integrate AI into fragile environments. As cyber threats accelerate, attackers are already leveraging automation and AI. Jason argues that defenders must do the same by using AI to automate, augment, and amplify blue teams rather than replace them.</p><p> </p><p>Takeaways:</p><ul><li><strong>Don't Give AI Direct Access to Everything:</strong> Never connect AI directly to your data lake or core systems. Instead, create a curated "bastion dataset" specifically for AI use cases.</li><li><strong>Master the Fundamentals First:</strong> Data inventory, classification, and context are essential. Make sure you have these mastered before integrating AI into your organization.</li><li><strong>Pause and Assess Your Current AI Deployments:</strong> Prioritize AI use cases that deliver actual ROI vs. just "interest on investment," and stop exploratory AI projects until the fundamentals are in place.</li><li><strong>Implement AI for Defense:</strong> Use AI to automate, augment, and amplify your security team. You must use AI to defend against AI-speed attacks.</li><li><strong>Career Advice: Out-Frame AI, Don't Outwork It:</strong> Focus on skills AI can't replace: discernment, integrity, morality, judgment, and become AI's manager rather than its competitor.</li><li><strong>Pay the Cost in Discipline Now, Not Anxiety Later:</strong> Skipping fundamentals today creates stress you'll carry for years. Make sure to document and do things right from the start.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Have a rock-solid data governance plan and framework in place. Then it's easier to have a more stable AI governance in place.” - Jason Elrod</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/thejasonelrod/">https://www.linkedin.com/in/thejasonelrod/</a> </li><li>Website: <a href="https://www.limitlesscyber.com/">https://www.limitlesscyber.com/</a> </li><li>YouTube: <a href="https://www.youtube.com/@LimitlessCyber">https://www.youtube.com/@LimitlessCyber</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/jason-elrod" img="https://img.transistorcdn.com/J8d0XP76sy9ogiCna0qFYibi0GkTq11WGLVr411fyW0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NDE2/ZDM1ZDMxYzM5Yzdj/NDI4NjNjMTU4ZGJi/MTdiZi5qcGc.jpg">Jason Elrod</podcast:person>
    </item>
    <item>
      <title>Why Least Privilege Fails (And How to Fix It) - Sanjeev Kumar - Guardians of the Data - Episode #30</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Why Least Privilege Fails (And How to Fix It) - Sanjeev Kumar - Guardians of the Data - Episode #30</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a123fe5b-d790-402f-bd2b-d970fbd802fb</guid>
      <link>https://guardiansofthedata.show/s1/30</link>
      <description>
        <![CDATA[<p>What happens when your AI system has more access to your data than your employees (and you don’t even know it)?</p><p><br></p><p>Sanjeev Kumar, Senior Global AI &amp; Data Protection Lead at Amazon Web Services, joins Ward on the podcast today for a deep dive into the real risks organizations face as AI moves from experimentation to production.</p><p><br></p><p>With more than 20 years of cybersecurity experience and a career that spans the rise of cloud computing to today’s AI transformation, Sanjeev shares what organizations consistently get wrong about data governance, ownership, least privilege, and AI deployment. This is not a high-level “AI is risky” discussion. It’s a tactical breakdown of what security leaders must implement now to avoid regulatory, reputational, and operational fallout.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start with Data Classification and Inventory: </strong>Understand the types of data you have (sensitive, regulated, or intellectual property) and where they reside before implementing any controls.</li><li><strong>Establish Clear Data Ownership and Stewardship:</strong> Define who owns the data (business leaders), who manages it daily (data stewards), and who maintains the infrastructure (IT custodians). Everyone must understand their responsibilities.</li><li><strong>Never Let Temporary Become Permanent: </strong>When moving data to interim storage solutions, ensure proper controls are in place. Temporary shortcuts often become permanent security gaps.</li><li><strong>Always Experiment in Isolated Environments:</strong> Start with black-box environments using synthetic data first. Never expose experimental AI systems to production or public networks.</li><li><strong>Implement Dynamic, Behavior-Based Access Controls:</strong> Move beyond traditional RBAC to access controls that adapt based on actual behavior patterns, not just historical permissions.</li><li><strong>Understand Both Financial and Non-Financial Risks:</strong> Reputational damage, regulatory scrutiny, and loss of customer trust often outweigh direct financial penalties.</li><li><strong>Live in the Future:</strong> Anticipate what will matter in 4-5 years and start learning it today. Position yourself where the industry is heading, not where it is now.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Vendor can be replaced, trust cannot be.” - Sanjeev Kumar</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/trusted-ai-ciso/">https://www.linkedin.com/in/trusted-ai-ciso/</a> </li><li>Website: <a href="https://aws.amazon.com/">https://aws.amazon.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What happens when your AI system has more access to your data than your employees (and you don’t even know it)?</p><p><br></p><p>Sanjeev Kumar, Senior Global AI &amp; Data Protection Lead at Amazon Web Services, joins Ward on the podcast today for a deep dive into the real risks organizations face as AI moves from experimentation to production.</p><p><br></p><p>With more than 20 years of cybersecurity experience and a career that spans the rise of cloud computing to today’s AI transformation, Sanjeev shares what organizations consistently get wrong about data governance, ownership, least privilege, and AI deployment. This is not a high-level “AI is risky” discussion. It’s a tactical breakdown of what security leaders must implement now to avoid regulatory, reputational, and operational fallout.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start with Data Classification and Inventory: </strong>Understand the types of data you have (sensitive, regulated, or intellectual property) and where they reside before implementing any controls.</li><li><strong>Establish Clear Data Ownership and Stewardship:</strong> Define who owns the data (business leaders), who manages it daily (data stewards), and who maintains the infrastructure (IT custodians). Everyone must understand their responsibilities.</li><li><strong>Never Let Temporary Become Permanent: </strong>When moving data to interim storage solutions, ensure proper controls are in place. Temporary shortcuts often become permanent security gaps.</li><li><strong>Always Experiment in Isolated Environments:</strong> Start with black-box environments using synthetic data first. Never expose experimental AI systems to production or public networks.</li><li><strong>Implement Dynamic, Behavior-Based Access Controls:</strong> Move beyond traditional RBAC to access controls that adapt based on actual behavior patterns, not just historical permissions.</li><li><strong>Understand Both Financial and Non-Financial Risks:</strong> Reputational damage, regulatory scrutiny, and loss of customer trust often outweigh direct financial penalties.</li><li><strong>Live in the Future:</strong> Anticipate what will matter in 4-5 years and start learning it today. Position yourself where the industry is heading, not where it is now.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Vendor can be replaced, trust cannot be.” - Sanjeev Kumar</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/trusted-ai-ciso/">https://www.linkedin.com/in/trusted-ai-ciso/</a> </li><li>Website: <a href="https://aws.amazon.com/">https://aws.amazon.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 19 Feb 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/d879d4ad/03516593.mp3" length="50540801" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YLOkS690YdXxf7G_lmcKPp6fookB1j_6VCCVETseoYk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MTg0/ZTgxZmE2NzdhNDVm/MWI0MmFlZTMxNjRk/ZmMxOS5wbmc.jpg"/>
      <itunes:duration>3155</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What happens when your AI system has more access to your data than your employees (and you don’t even know it)?</p><p><br></p><p>Sanjeev Kumar, Senior Global AI &amp; Data Protection Lead at Amazon Web Services, joins Ward on the podcast today for a deep dive into the real risks organizations face as AI moves from experimentation to production.</p><p><br></p><p>With more than 20 years of cybersecurity experience and a career that spans the rise of cloud computing to today’s AI transformation, Sanjeev shares what organizations consistently get wrong about data governance, ownership, least privilege, and AI deployment. This is not a high-level “AI is risky” discussion. It’s a tactical breakdown of what security leaders must implement now to avoid regulatory, reputational, and operational fallout.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start with Data Classification and Inventory: </strong>Understand the types of data you have (sensitive, regulated, or intellectual property) and where they reside before implementing any controls.</li><li><strong>Establish Clear Data Ownership and Stewardship:</strong> Define who owns the data (business leaders), who manages it daily (data stewards), and who maintains the infrastructure (IT custodians). Everyone must understand their responsibilities.</li><li><strong>Never Let Temporary Become Permanent: </strong>When moving data to interim storage solutions, ensure proper controls are in place. Temporary shortcuts often become permanent security gaps.</li><li><strong>Always Experiment in Isolated Environments:</strong> Start with black-box environments using synthetic data first. Never expose experimental AI systems to production or public networks.</li><li><strong>Implement Dynamic, Behavior-Based Access Controls:</strong> Move beyond traditional RBAC to access controls that adapt based on actual behavior patterns, not just historical permissions.</li><li><strong>Understand Both Financial and Non-Financial Risks:</strong> Reputational damage, regulatory scrutiny, and loss of customer trust often outweigh direct financial penalties.</li><li><strong>Live in the Future:</strong> Anticipate what will matter in 4-5 years and start learning it today. Position yourself where the industry is heading, not where it is now.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Vendor can be replaced, trust cannot be.” - Sanjeev Kumar</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/trusted-ai-ciso/">https://www.linkedin.com/in/trusted-ai-ciso/</a> </li><li>Website: <a href="https://aws.amazon.com/">https://aws.amazon.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/sanjeev-kumar" img="https://img.transistorcdn.com/u0vR2ujG6B-O-Aayl4LkZFQC5yTLRdi1zddjxbYMkTc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMzc4/MWFjN2ExMTNlMzNh/NzEzYzg3NjIzNDU0/MDk0Ni5qcGc.jpg">Sanjeev Kumar</podcast:person>
    </item>
    <item>
      <title>Stop Talking Tech and Start Talking Business - Joshua Copeland - Guardians of the Data - Episode #29</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Stop Talking Tech and Start Talking Business - Joshua Copeland - Guardians of the Data - Episode #29</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c584a8e0-1451-4349-986f-dad79d7ee770</guid>
      <link>https://guardiansofthedata.show/s1/29</link>
      <description>
        <![CDATA[<p>Is leadership the real reason data security keeps breaking down?</p><p><br></p><p>In this episode of Guardians of the Data, host Ward Balcerzak sits down with Joshua Copeland, Director of Cybersecurity at Crescendo. With more than 25 years of experience across IT, cybersecurity, and government, Joshua brings a refreshingly honest perspective: most security failures don’t come from bad tools; they come from misaligned leadership, misunderstood business risk, and security teams operating in a vacuum.</p><p><br></p><p>Throughout the conversation, Joshua breaks down why cybersecurity professionals must stop speaking only in technical terms and start translating risk into real business impact, from revenue and operations to productivity and customer trust. The discussion also dives deep into AI and data security, where Joshua argues that AI hasn’t introduced new risk, but simply exposes the risks organizations have ignored for years. From shadow AI and data leakage to prompt engineering and governance, this episode offers practical guidance for security leaders trying to keep up with reality.</p><p> </p><p>Takeaways:</p><ul><li><strong>Learn to Speak Business, Not Just Tech:</strong> Cybersecurity professionals need to translate technical risks into business impact.</li><li><strong>Build Cross-Functional Relationships Early:</strong> Understand how your security decisions impact productivity and workflows. Talk to operations teams before implementing security controls.</li><li><strong>Avoid Building Solutions in a Vacuum:</strong> Don't create security controls based solely on frameworks or "best practices".</li><li><strong>Network Relentlessly:</strong> Attend local B-Sides and regional conferences (cheaper than RSA) and join local cyber clubs and professional chapters.</li><li><strong>Focus on What Actually Protects Your Business:</strong> Prioritize vulnerabilities based on your environment, not just severity scores. Understand your critical business processes and protect those first.</li><li><strong>Say Yes to New Opportunities:</strong> Joshua's career advice: volunteer for things outside your comfort zone. Non-traditional paths often lead to the most interesting opportunities.</li></ul><p>Quote of the Show:</p><ul><li>“ We're really, really good at technology. We really suck at business, and that's where we fall flat.” - Joshua Copeland</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/joshuacopeland/">https://www.linkedin.com/in/joshuacopeland/</a> </li><li>Website: <a href="https://www.crescendo.ai/">https://www.crescendo.ai/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Is leadership the real reason data security keeps breaking down?</p><p><br></p><p>In this episode of Guardians of the Data, host Ward Balcerzak sits down with Joshua Copeland, Director of Cybersecurity at Crescendo. With more than 25 years of experience across IT, cybersecurity, and government, Joshua brings a refreshingly honest perspective: most security failures don’t come from bad tools; they come from misaligned leadership, misunderstood business risk, and security teams operating in a vacuum.</p><p><br></p><p>Throughout the conversation, Joshua breaks down why cybersecurity professionals must stop speaking only in technical terms and start translating risk into real business impact, from revenue and operations to productivity and customer trust. The discussion also dives deep into AI and data security, where Joshua argues that AI hasn’t introduced new risk, but simply exposes the risks organizations have ignored for years. From shadow AI and data leakage to prompt engineering and governance, this episode offers practical guidance for security leaders trying to keep up with reality.</p><p> </p><p>Takeaways:</p><ul><li><strong>Learn to Speak Business, Not Just Tech:</strong> Cybersecurity professionals need to translate technical risks into business impact.</li><li><strong>Build Cross-Functional Relationships Early:</strong> Understand how your security decisions impact productivity and workflows. Talk to operations teams before implementing security controls.</li><li><strong>Avoid Building Solutions in a Vacuum:</strong> Don't create security controls based solely on frameworks or "best practices".</li><li><strong>Network Relentlessly:</strong> Attend local B-Sides and regional conferences (cheaper than RSA) and join local cyber clubs and professional chapters.</li><li><strong>Focus on What Actually Protects Your Business:</strong> Prioritize vulnerabilities based on your environment, not just severity scores. Understand your critical business processes and protect those first.</li><li><strong>Say Yes to New Opportunities:</strong> Joshua's career advice: volunteer for things outside your comfort zone. Non-traditional paths often lead to the most interesting opportunities.</li></ul><p>Quote of the Show:</p><ul><li>“ We're really, really good at technology. We really suck at business, and that's where we fall flat.” - Joshua Copeland</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/joshuacopeland/">https://www.linkedin.com/in/joshuacopeland/</a> </li><li>Website: <a href="https://www.crescendo.ai/">https://www.crescendo.ai/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 12 Feb 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/26bfc2db/c2eab2fd.mp3" length="39870821" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/D2sih-3CdWSGgxBroRE2B89nA3Ne7WHe0QCf6_VjZpo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDFj/MGM3ZTA3YzQzOWU5/NjNmMzY0YzljYzgx/YmRjYy5wbmc.jpg"/>
      <itunes:duration>2489</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Is leadership the real reason data security keeps breaking down?</p><p><br></p><p>In this episode of Guardians of the Data, host Ward Balcerzak sits down with Joshua Copeland, Director of Cybersecurity at Crescendo. With more than 25 years of experience across IT, cybersecurity, and government, Joshua brings a refreshingly honest perspective: most security failures don’t come from bad tools; they come from misaligned leadership, misunderstood business risk, and security teams operating in a vacuum.</p><p><br></p><p>Throughout the conversation, Joshua breaks down why cybersecurity professionals must stop speaking only in technical terms and start translating risk into real business impact, from revenue and operations to productivity and customer trust. The discussion also dives deep into AI and data security, where Joshua argues that AI hasn’t introduced new risk, but simply exposes the risks organizations have ignored for years. From shadow AI and data leakage to prompt engineering and governance, this episode offers practical guidance for security leaders trying to keep up with reality.</p><p> </p><p>Takeaways:</p><ul><li><strong>Learn to Speak Business, Not Just Tech:</strong> Cybersecurity professionals need to translate technical risks into business impact.</li><li><strong>Build Cross-Functional Relationships Early:</strong> Understand how your security decisions impact productivity and workflows. Talk to operations teams before implementing security controls.</li><li><strong>Avoid Building Solutions in a Vacuum:</strong> Don't create security controls based solely on frameworks or "best practices".</li><li><strong>Network Relentlessly:</strong> Attend local B-Sides and regional conferences (cheaper than RSA) and join local cyber clubs and professional chapters.</li><li><strong>Focus on What Actually Protects Your Business:</strong> Prioritize vulnerabilities based on your environment, not just severity scores. Understand your critical business processes and protect those first.</li><li><strong>Say Yes to New Opportunities:</strong> Joshua's career advice: volunteer for things outside your comfort zone. Non-traditional paths often lead to the most interesting opportunities.</li></ul><p>Quote of the Show:</p><ul><li>“ We're really, really good at technology. We really suck at business, and that's where we fall flat.” - Joshua Copeland</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/joshuacopeland/">https://www.linkedin.com/in/joshuacopeland/</a> </li><li>Website: <a href="https://www.crescendo.ai/">https://www.crescendo.ai/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/joshua-copeland" img="https://img.transistorcdn.com/cnPnGDXL1yq26eqiYzpdmq-4rYNtLZbUCL0SnrqWCmQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83Y2Nm/YTM5MDc1MDBkMTU4/MzZjZDZlMmM4NTcx/NGZiOC5qcGc.jpg">Joshua Copeland</podcast:person>
    </item>
    <item>
      <title>Future-Proofing Cybersecurity Talent - Marlene Dehart - Guardians of the Data - Episode #28</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Future-Proofing Cybersecurity Talent - Marlene Dehart - Guardians of the Data - Episode #28</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8f0d723e-7aa4-43e2-86b2-20bad29f6498</guid>
      <link>https://guardiansofthedata.show/s1/28</link>
      <description>
        <![CDATA[<p>Are we solving the cybersecurity talent problem the wrong way?</p><p><br></p><p>The cybersecurity industry has no shortage of open roles, yet thousands of capable candidates still can’t land their first job. In this episode of Guardians of the Data, Ward Balcerzak sits down with Marlene DeHart, cybersecurity executive, advisor, and Air Force Reserve veteran, to explore why the problem isn’t a lack of interest or intelligence; it’s how the industry defines experience.</p><p><br></p><p>Drawing on more than 20 years across enterprise security, internal audit, military cyber operations, and emerging technologies like Web3 and AI, Marlene argues that cybersecurity needs to be treated more like a trade: skills-first, mentor-led, and learned through real-world practice, not just certifications and degrees.</p><p> </p><p>Takeaways:</p><ul><li><strong>Seek Mentorship Actively:</strong> Find experienced professionals who can guide your career development and commit to mentoring others once you gain experience, creating a reciprocal learning ecosystem.</li><li><strong>Participate in Hands-On Challenges:</strong> Join hackathons, capture-the-flag events, and collaborative technical challenges to demonstrate real-world skills beyond what certifications alone can show.</li><li><strong>Build a Skills Portfolio:</strong> Create tangible demonstrations of your work that showcase your abilities to potential employers, moving beyond traditional resumes to include actual project examples and problem-solving evidence.</li><li><strong>Apply Fundamentals to New Technologies:</strong> Bridge your existing cybersecurity knowledge to emerging technologies like AI, blockchain, and Web3 by applying core principles you already understand to new contexts.</li><li><strong>Establish Reskilling Pathways:</strong> Companies should build structured programs to help existing employees transition when business direction or technology stacks change, rather than leaving team members behind.</li><li><strong>Gamify Learning Experiences:</strong> Make skills development engaging through scenario-based training, real-world simulations, and competitive challenges that mirror actual workplace situations.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ Once you're skilled, you have to keep reskilling. You have to upskill.” - Marlene Dehart</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/marleneveum/">https://www.linkedin.com/in/marleneveum/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are we solving the cybersecurity talent problem the wrong way?</p><p><br></p><p>The cybersecurity industry has no shortage of open roles, yet thousands of capable candidates still can’t land their first job. In this episode of Guardians of the Data, Ward Balcerzak sits down with Marlene DeHart, cybersecurity executive, advisor, and Air Force Reserve veteran, to explore why the problem isn’t a lack of interest or intelligence; it’s how the industry defines experience.</p><p><br></p><p>Drawing on more than 20 years across enterprise security, internal audit, military cyber operations, and emerging technologies like Web3 and AI, Marlene argues that cybersecurity needs to be treated more like a trade: skills-first, mentor-led, and learned through real-world practice, not just certifications and degrees.</p><p> </p><p>Takeaways:</p><ul><li><strong>Seek Mentorship Actively:</strong> Find experienced professionals who can guide your career development and commit to mentoring others once you gain experience, creating a reciprocal learning ecosystem.</li><li><strong>Participate in Hands-On Challenges:</strong> Join hackathons, capture-the-flag events, and collaborative technical challenges to demonstrate real-world skills beyond what certifications alone can show.</li><li><strong>Build a Skills Portfolio:</strong> Create tangible demonstrations of your work that showcase your abilities to potential employers, moving beyond traditional resumes to include actual project examples and problem-solving evidence.</li><li><strong>Apply Fundamentals to New Technologies:</strong> Bridge your existing cybersecurity knowledge to emerging technologies like AI, blockchain, and Web3 by applying core principles you already understand to new contexts.</li><li><strong>Establish Reskilling Pathways:</strong> Companies should build structured programs to help existing employees transition when business direction or technology stacks change, rather than leaving team members behind.</li><li><strong>Gamify Learning Experiences:</strong> Make skills development engaging through scenario-based training, real-world simulations, and competitive challenges that mirror actual workplace situations.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ Once you're skilled, you have to keep reskilling. You have to upskill.” - Marlene Dehart</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/marleneveum/">https://www.linkedin.com/in/marleneveum/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 05 Feb 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/90515c81/6f7ae925.mp3" length="41310083" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/y3zJmOxUhlRkWNG7HQRzap922BNHzJoCdBmgREWeDao/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNTc1/NDUzMDhhYmJhMDA2/M2JmZWE2YjhjMDg0/MmNiMi5wbmc.jpg"/>
      <itunes:duration>2579</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are we solving the cybersecurity talent problem the wrong way?</p><p><br></p><p>The cybersecurity industry has no shortage of open roles, yet thousands of capable candidates still can’t land their first job. In this episode of Guardians of the Data, Ward Balcerzak sits down with Marlene DeHart, cybersecurity executive, advisor, and Air Force Reserve veteran, to explore why the problem isn’t a lack of interest or intelligence; it’s how the industry defines experience.</p><p><br></p><p>Drawing on more than 20 years across enterprise security, internal audit, military cyber operations, and emerging technologies like Web3 and AI, Marlene argues that cybersecurity needs to be treated more like a trade: skills-first, mentor-led, and learned through real-world practice, not just certifications and degrees.</p><p> </p><p>Takeaways:</p><ul><li><strong>Seek Mentorship Actively:</strong> Find experienced professionals who can guide your career development and commit to mentoring others once you gain experience, creating a reciprocal learning ecosystem.</li><li><strong>Participate in Hands-On Challenges:</strong> Join hackathons, capture-the-flag events, and collaborative technical challenges to demonstrate real-world skills beyond what certifications alone can show.</li><li><strong>Build a Skills Portfolio:</strong> Create tangible demonstrations of your work that showcase your abilities to potential employers, moving beyond traditional resumes to include actual project examples and problem-solving evidence.</li><li><strong>Apply Fundamentals to New Technologies:</strong> Bridge your existing cybersecurity knowledge to emerging technologies like AI, blockchain, and Web3 by applying core principles you already understand to new contexts.</li><li><strong>Establish Reskilling Pathways:</strong> Companies should build structured programs to help existing employees transition when business direction or technology stacks change, rather than leaving team members behind.</li><li><strong>Gamify Learning Experiences:</strong> Make skills development engaging through scenario-based training, real-world simulations, and competitive challenges that mirror actual workplace situations.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ Once you're skilled, you have to keep reskilling. You have to upskill.” - Marlene Dehart</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/marleneveum/">https://www.linkedin.com/in/marleneveum/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/marlene-dehart" img="https://img.transistorcdn.com/vopbd-ZgHzb87AzHbRUGqtns649JOuXZ9vkxR-jMY1U/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMmYw/MmQ1YWM2MTFmYWYy/OGYwYjQyYTRhNjNl/MDUwZi5qcGc.jpg">Marlene Dehart</podcast:person>
    </item>
    <item>
      <title>Data Security in Critical Infrastructure - Arturo Santos - Guardians of the Data - Episode #27</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Data Security in Critical Infrastructure - Arturo Santos - Guardians of the Data - Episode #27</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b126e28b-a325-4f2c-b656-3f70f665ab56</guid>
      <link>https://guardiansofthedata.show/s1/27</link>
      <description>
        <![CDATA[<p>What happens when the systems that move people and power our world aren’t secure?</p><p>In this episode of Guardians of the Data, host Ward Balcerzak sits down with Arturo Santos, Director of Cybersecurity Architecture at Amtrak, to explore the growing risks facing operational technology (OT), the realities of protecting critical infrastructure, and why data governance, AI, and industry collaboration are no longer optional.</p><p><br></p><p>With more than 30 years of experience in IT and cybersecurity, Arturo shares real-world insights from the rail industry, discusses why legacy data retention practices are putting organizations at risk, and explains how modern cyber-physical systems are reshaping security priorities across transportation, energy, and other critical sectors.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Implement Strict Data Retention Policies:</strong> Organizations must establish clear guidelines for data retention and storage. Develop retention schedules based on legal requirements, business needs, and industry best practices, then enforce them rigorously.</li><li><strong>Treat Employee Data with Equal Priority as Customer Data:</strong> Many organizations focus heavily on protecting customer information while overlooking employee data. Your employees deserve the same level of protection you provide to your customers.</li><li><strong>Adopt a Data Custodianship Mindset:</strong> Shift how your organization thinks about personal information. Always remember that the data belongs to the individual, and your organization is merely a temporary steward.</li><li><strong>Monitor Threats Across Your Entire Supply Chain:</strong> Your organization doesn't operate in a vacuum. Stay informed about security incidents, vulnerabilities, and attack patterns across your industry and related sectors.</li><li><strong>Engage with Industry Standards Development:</strong> Participate in the creation and refinement of security standards for your sector. Your expertise and real-world experience can help shape standards that are both effective and practical.</li><li><strong>Leverage Collaborative Threat Intelligence Sharing:</strong> A collaborative approach provides visibility into threats you might never see coming from your own network alone. The key is moving from isolated security operations to participating in a broader intelligence ecosystem.</li></ul><p>Quote of the Show:</p><ul><li>“ I started working in cybersecurity because I am passionate about protecting my data. I see it as a consumer .” - Arturo Santos</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/-arturo-santos/">https://www.linkedin.com/in/-arturo-santos/</a> </li><li>Website: <a href="https://www.amtrak.com/home">https://www.amtrak.com/home</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What happens when the systems that move people and power our world aren’t secure?</p><p>In this episode of Guardians of the Data, host Ward Balcerzak sits down with Arturo Santos, Director of Cybersecurity Architecture at Amtrak, to explore the growing risks facing operational technology (OT), the realities of protecting critical infrastructure, and why data governance, AI, and industry collaboration are no longer optional.</p><p><br></p><p>With more than 30 years of experience in IT and cybersecurity, Arturo shares real-world insights from the rail industry, discusses why legacy data retention practices are putting organizations at risk, and explains how modern cyber-physical systems are reshaping security priorities across transportation, energy, and other critical sectors.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Implement Strict Data Retention Policies:</strong> Organizations must establish clear guidelines for data retention and storage. Develop retention schedules based on legal requirements, business needs, and industry best practices, then enforce them rigorously.</li><li><strong>Treat Employee Data with Equal Priority as Customer Data:</strong> Many organizations focus heavily on protecting customer information while overlooking employee data. Your employees deserve the same level of protection you provide to your customers.</li><li><strong>Adopt a Data Custodianship Mindset:</strong> Shift how your organization thinks about personal information. Always remember that the data belongs to the individual, and your organization is merely a temporary steward.</li><li><strong>Monitor Threats Across Your Entire Supply Chain:</strong> Your organization doesn't operate in a vacuum. Stay informed about security incidents, vulnerabilities, and attack patterns across your industry and related sectors.</li><li><strong>Engage with Industry Standards Development:</strong> Participate in the creation and refinement of security standards for your sector. Your expertise and real-world experience can help shape standards that are both effective and practical.</li><li><strong>Leverage Collaborative Threat Intelligence Sharing:</strong> A collaborative approach provides visibility into threats you might never see coming from your own network alone. The key is moving from isolated security operations to participating in a broader intelligence ecosystem.</li></ul><p>Quote of the Show:</p><ul><li>“ I started working in cybersecurity because I am passionate about protecting my data. I see it as a consumer .” - Arturo Santos</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/-arturo-santos/">https://www.linkedin.com/in/-arturo-santos/</a> </li><li>Website: <a href="https://www.amtrak.com/home">https://www.amtrak.com/home</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 29 Jan 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/5a2f33ab/8519fead.mp3" length="43794122" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/S1KxNnMtOvYWsysq8VFWsquYO08BAHDUyxBS5EdCcPk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZmM5/NTY4YTkzMDNjNGE0/MTM0NDM0MjlmZjRj/YzlkNS5wbmc.jpg"/>
      <itunes:duration>2734</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What happens when the systems that move people and power our world aren’t secure?</p><p>In this episode of Guardians of the Data, host Ward Balcerzak sits down with Arturo Santos, Director of Cybersecurity Architecture at Amtrak, to explore the growing risks facing operational technology (OT), the realities of protecting critical infrastructure, and why data governance, AI, and industry collaboration are no longer optional.</p><p><br></p><p>With more than 30 years of experience in IT and cybersecurity, Arturo shares real-world insights from the rail industry, discusses why legacy data retention practices are putting organizations at risk, and explains how modern cyber-physical systems are reshaping security priorities across transportation, energy, and other critical sectors.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Implement Strict Data Retention Policies:</strong> Organizations must establish clear guidelines for data retention and storage. Develop retention schedules based on legal requirements, business needs, and industry best practices, then enforce them rigorously.</li><li><strong>Treat Employee Data with Equal Priority as Customer Data:</strong> Many organizations focus heavily on protecting customer information while overlooking employee data. Your employees deserve the same level of protection you provide to your customers.</li><li><strong>Adopt a Data Custodianship Mindset:</strong> Shift how your organization thinks about personal information. Always remember that the data belongs to the individual, and your organization is merely a temporary steward.</li><li><strong>Monitor Threats Across Your Entire Supply Chain:</strong> Your organization doesn't operate in a vacuum. Stay informed about security incidents, vulnerabilities, and attack patterns across your industry and related sectors.</li><li><strong>Engage with Industry Standards Development:</strong> Participate in the creation and refinement of security standards for your sector. Your expertise and real-world experience can help shape standards that are both effective and practical.</li><li><strong>Leverage Collaborative Threat Intelligence Sharing:</strong> A collaborative approach provides visibility into threats you might never see coming from your own network alone. The key is moving from isolated security operations to participating in a broader intelligence ecosystem.</li></ul><p>Quote of the Show:</p><ul><li>“ I started working in cybersecurity because I am passionate about protecting my data. I see it as a consumer .” - Arturo Santos</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/-arturo-santos/">https://www.linkedin.com/in/-arturo-santos/</a> </li><li>Website: <a href="https://www.amtrak.com/home">https://www.amtrak.com/home</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/arturo-santos" img="https://img.transistorcdn.com/T7IrIP5H4KGg9_imY7fPfThzOi3ZpwyBtHccCGqEPL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MjBk/MzBhMGY1MGU0MjUw/NTdhYjhjNmE5ODM0/MjI1YS5qcGc.jpg">Arturo Santos</podcast:person>
    </item>
    <item>
      <title>Securing Data in the Age of AI - Frank Depaola - Guardians of the Data - Episode #26</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Securing Data in the Age of AI - Frank Depaola - Guardians of the Data - Episode #26</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1b321d5d-3f97-449c-806d-5415d3a7c02a</guid>
      <link>https://guardiansofthedata.show/s1/26</link>
      <description>
        <![CDATA[<p>Is your data security strategy still focused on where your data lives, or have you evolved to protect it where it flows?</p><p><br></p><p>Ward sits down with Frank DePaola, Vice President and CISO at EnPro and recipient of the 2025 Top Global CISO award. With over 25 years of experience in cybersecurity, Frank shares a masterclass on navigating the complexities of modern data security, from the "data sprawl" of the AI era to the unique challenges of maintaining security during aggressive M&amp;A cycles. </p><p><br></p><p>The conversation dives deep into the realization that "data is the new currency of business," which has led organizations to accumulate petabytes of information that become increasingly difficult to manage. Frank explains why the state of your data directly impacts the success of AI initiatives and why security leaders must transition from a static mindset to one that secures data in motion, especially as it leaves the organization's physical purview through cloud services and subcontractors.</p><p> </p><p>Takeaways:</p><ul><li><strong>Build Or Update Your Data Retention Policy:</strong> Work collaboratively with business units to understand their actual needs and regulatory requirements, not arbitrary timeframes.</li><li><strong>Leverage Community Expertise:</strong> Reach out to industry peers or hire consultants who've implemented programs before; don't reinvent the wheel.</li><li><strong>Shift From Static to Dynamic Protection: </strong>Move beyond securing data only where it resides; focus on securing data in motion and throughout its lifecycle.</li><li><strong>Consolidate Your Tools:</strong> Look for comprehensive platforms that integrate DLP, DSPM, and AI governance rather than managing multiple point solutions.</li><li><strong>Gather Complete Requirements Upfront:</strong> Avoid point solution sprawl by thoroughly vetting all use cases before making technology investments.</li><li><strong>Build a Risk-Based Roadmap:</strong> Connect tactical initiatives directly to organizational strategic objectives, so teams understand how their work impacts the business.</li></ul><p>Quote of the Show:</p><ul><li>“Data is the new currency of business.” - Frank Depaola</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/frankdepaola/">https://www.linkedin.com/in/frankdepaola/</a> </li><li>Website: <a href="https://www.enpro.com/overview/default.aspx">https://www.enpro.com/overview/default.aspx</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Is your data security strategy still focused on where your data lives, or have you evolved to protect it where it flows?</p><p><br></p><p>Ward sits down with Frank DePaola, Vice President and CISO at EnPro and recipient of the 2025 Top Global CISO award. With over 25 years of experience in cybersecurity, Frank shares a masterclass on navigating the complexities of modern data security, from the "data sprawl" of the AI era to the unique challenges of maintaining security during aggressive M&amp;A cycles. </p><p><br></p><p>The conversation dives deep into the realization that "data is the new currency of business," which has led organizations to accumulate petabytes of information that become increasingly difficult to manage. Frank explains why the state of your data directly impacts the success of AI initiatives and why security leaders must transition from a static mindset to one that secures data in motion, especially as it leaves the organization's physical purview through cloud services and subcontractors.</p><p> </p><p>Takeaways:</p><ul><li><strong>Build Or Update Your Data Retention Policy:</strong> Work collaboratively with business units to understand their actual needs and regulatory requirements, not arbitrary timeframes.</li><li><strong>Leverage Community Expertise:</strong> Reach out to industry peers or hire consultants who've implemented programs before; don't reinvent the wheel.</li><li><strong>Shift From Static to Dynamic Protection: </strong>Move beyond securing data only where it resides; focus on securing data in motion and throughout its lifecycle.</li><li><strong>Consolidate Your Tools:</strong> Look for comprehensive platforms that integrate DLP, DSPM, and AI governance rather than managing multiple point solutions.</li><li><strong>Gather Complete Requirements Upfront:</strong> Avoid point solution sprawl by thoroughly vetting all use cases before making technology investments.</li><li><strong>Build a Risk-Based Roadmap:</strong> Connect tactical initiatives directly to organizational strategic objectives, so teams understand how their work impacts the business.</li></ul><p>Quote of the Show:</p><ul><li>“Data is the new currency of business.” - Frank Depaola</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/frankdepaola/">https://www.linkedin.com/in/frankdepaola/</a> </li><li>Website: <a href="https://www.enpro.com/overview/default.aspx">https://www.enpro.com/overview/default.aspx</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 22 Jan 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/e679299a/b57fe02b.mp3" length="39791311" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xRBWBkQXEr_dTm7vkbgwKEHrOQ4fVwWo-aDR75SmgHw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yYjJk/YTQ3YjMxYjNhY2Y5/OGU4NjAyOWM0NDMz/ZjdmZC5wbmc.jpg"/>
      <itunes:duration>2484</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Is your data security strategy still focused on where your data lives, or have you evolved to protect it where it flows?</p><p><br></p><p>Ward sits down with Frank DePaola, Vice President and CISO at EnPro and recipient of the 2025 Top Global CISO award. With over 25 years of experience in cybersecurity, Frank shares a masterclass on navigating the complexities of modern data security, from the "data sprawl" of the AI era to the unique challenges of maintaining security during aggressive M&amp;A cycles. </p><p><br></p><p>The conversation dives deep into the realization that "data is the new currency of business," which has led organizations to accumulate petabytes of information that become increasingly difficult to manage. Frank explains why the state of your data directly impacts the success of AI initiatives and why security leaders must transition from a static mindset to one that secures data in motion, especially as it leaves the organization's physical purview through cloud services and subcontractors.</p><p> </p><p>Takeaways:</p><ul><li><strong>Build Or Update Your Data Retention Policy:</strong> Work collaboratively with business units to understand their actual needs and regulatory requirements, not arbitrary timeframes.</li><li><strong>Leverage Community Expertise:</strong> Reach out to industry peers or hire consultants who've implemented programs before; don't reinvent the wheel.</li><li><strong>Shift From Static to Dynamic Protection: </strong>Move beyond securing data only where it resides; focus on securing data in motion and throughout its lifecycle.</li><li><strong>Consolidate Your Tools:</strong> Look for comprehensive platforms that integrate DLP, DSPM, and AI governance rather than managing multiple point solutions.</li><li><strong>Gather Complete Requirements Upfront:</strong> Avoid point solution sprawl by thoroughly vetting all use cases before making technology investments.</li><li><strong>Build a Risk-Based Roadmap:</strong> Connect tactical initiatives directly to organizational strategic objectives, so teams understand how their work impacts the business.</li></ul><p>Quote of the Show:</p><ul><li>“Data is the new currency of business.” - Frank Depaola</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/frankdepaola/">https://www.linkedin.com/in/frankdepaola/</a> </li><li>Website: <a href="https://www.enpro.com/overview/default.aspx">https://www.enpro.com/overview/default.aspx</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/frank-depaola" img="https://img.transistorcdn.com/GJFiTRyY5LIWb7b_raxq5V2syNKKWfII-Xw5Eb7sq3M/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MDFi/ZWI0YTAwODI3ODc2/N2E0OGM0ZGFiMzQx/OGM0My5qcGc.jpg">Frank Depaola</podcast:person>
    </item>
    <item>
      <title>Addressing the Data Everywhere and No Map Issue - Antonio Taylor - Guardians of the Data - Ep #25</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Addressing the Data Everywhere and No Map Issue - Antonio Taylor - Guardians of the Data - Ep #25</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">88a71f0c-db25-4aa0-9c84-b47c659213ad</guid>
      <link>https://guardiansofthedata.show/s1/25</link>
      <description>
        <![CDATA[<p>What happens when security leaders stop talking tech and start speaking the language of the business?</p><p><br></p><p>In this episode, author and VP of IT for Mission Healthcare, Antonio Taylor, reveals why modern security success has less to do with tools and everything to do with building trust, curiosity, and true business partnerships. Antonio brings 25+ years of experience in enterprise IT leadership, data security, and organizational transformation. He’s seen behind the curtain of data sprawl, shadow SaaS, M&amp;A chaos, and the cultural friction that often exists between business units and cybersecurity teams. Antonio shares how security leaders can shift from “the department of no” to trusted business partners by staying curious, building relationships, and speaking the language of the business rather than the language of technology.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Become a True Business Partner:</strong> Learn how your company makes money and frame security as an accelerator, not a barrier.</li><li><strong>Build Trust Before You Need It:</strong> When business units trust you, they'll involve you in decisions before purchasing tools or implementing solutions.</li><li><strong>Make Security Part of the Culture:</strong> Transform employees into your "biggest firewall" by making them security partners.</li><li><strong>Offer Alternatives: </strong>Instead of blocking tools, find secure alternatives that meet their needs (like suggesting Copilot instead of ChatGPT).</li><li><strong>Create a "Life Resume":</strong> Document all your accomplishments, not just job-related ones, to combat imposter syndrome and recognize your inherent skills.</li><li><strong>Embrace AI as an Enhancement Tool:</strong> Use AI to advance your capabilities, not replace them.</li><li><strong>Listen for Pain Points:</strong> Proactively identify business problems and propose secure solutions before they go rogue.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Security, we’re the bad people. We’re the ones who tell you no all the time, and I think that’s a myth that has to be shot down.” - Antonio Taylor</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/antoniodtaylor/">https://www.linkedin.com/in/antoniodtaylor/</a> </li><li>Website: <a href="https://www.homewithmission.com/">https://www.homewithmission.com/</a> </li><li>Book: <a href="https://a.co/d/127OwCr">https://a.co/d/127OwCr</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What happens when security leaders stop talking tech and start speaking the language of the business?</p><p><br></p><p>In this episode, author and VP of IT for Mission Healthcare, Antonio Taylor, reveals why modern security success has less to do with tools and everything to do with building trust, curiosity, and true business partnerships. Antonio brings 25+ years of experience in enterprise IT leadership, data security, and organizational transformation. He’s seen behind the curtain of data sprawl, shadow SaaS, M&amp;A chaos, and the cultural friction that often exists between business units and cybersecurity teams. Antonio shares how security leaders can shift from “the department of no” to trusted business partners by staying curious, building relationships, and speaking the language of the business rather than the language of technology.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Become a True Business Partner:</strong> Learn how your company makes money and frame security as an accelerator, not a barrier.</li><li><strong>Build Trust Before You Need It:</strong> When business units trust you, they'll involve you in decisions before purchasing tools or implementing solutions.</li><li><strong>Make Security Part of the Culture:</strong> Transform employees into your "biggest firewall" by making them security partners.</li><li><strong>Offer Alternatives: </strong>Instead of blocking tools, find secure alternatives that meet their needs (like suggesting Copilot instead of ChatGPT).</li><li><strong>Create a "Life Resume":</strong> Document all your accomplishments, not just job-related ones, to combat imposter syndrome and recognize your inherent skills.</li><li><strong>Embrace AI as an Enhancement Tool:</strong> Use AI to advance your capabilities, not replace them.</li><li><strong>Listen for Pain Points:</strong> Proactively identify business problems and propose secure solutions before they go rogue.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Security, we’re the bad people. We’re the ones who tell you no all the time, and I think that’s a myth that has to be shot down.” - Antonio Taylor</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/antoniodtaylor/">https://www.linkedin.com/in/antoniodtaylor/</a> </li><li>Website: <a href="https://www.homewithmission.com/">https://www.homewithmission.com/</a> </li><li>Book: <a href="https://a.co/d/127OwCr">https://a.co/d/127OwCr</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 15 Jan 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/33006b9e/8176670d.mp3" length="52797060" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mqm7abzvEoRB9HRDRfV0yqangc-lE5A40BWS7zBP-Qk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MTQ1/MmNlMDA4MTMwYzU4/YzM0NzRjYTdmY2Ix/MTZlYy5wbmc.jpg"/>
      <itunes:duration>3296</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What happens when security leaders stop talking tech and start speaking the language of the business?</p><p><br></p><p>In this episode, author and VP of IT for Mission Healthcare, Antonio Taylor, reveals why modern security success has less to do with tools and everything to do with building trust, curiosity, and true business partnerships. Antonio brings 25+ years of experience in enterprise IT leadership, data security, and organizational transformation. He’s seen behind the curtain of data sprawl, shadow SaaS, M&amp;A chaos, and the cultural friction that often exists between business units and cybersecurity teams. Antonio shares how security leaders can shift from “the department of no” to trusted business partners by staying curious, building relationships, and speaking the language of the business rather than the language of technology.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Become a True Business Partner:</strong> Learn how your company makes money and frame security as an accelerator, not a barrier.</li><li><strong>Build Trust Before You Need It:</strong> When business units trust you, they'll involve you in decisions before purchasing tools or implementing solutions.</li><li><strong>Make Security Part of the Culture:</strong> Transform employees into your "biggest firewall" by making them security partners.</li><li><strong>Offer Alternatives: </strong>Instead of blocking tools, find secure alternatives that meet their needs (like suggesting Copilot instead of ChatGPT).</li><li><strong>Create a "Life Resume":</strong> Document all your accomplishments, not just job-related ones, to combat imposter syndrome and recognize your inherent skills.</li><li><strong>Embrace AI as an Enhancement Tool:</strong> Use AI to advance your capabilities, not replace them.</li><li><strong>Listen for Pain Points:</strong> Proactively identify business problems and propose secure solutions before they go rogue.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Security, we’re the bad people. We’re the ones who tell you no all the time, and I think that’s a myth that has to be shot down.” - Antonio Taylor</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/antoniodtaylor/">https://www.linkedin.com/in/antoniodtaylor/</a> </li><li>Website: <a href="https://www.homewithmission.com/">https://www.homewithmission.com/</a> </li><li>Book: <a href="https://a.co/d/127OwCr">https://a.co/d/127OwCr</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/antonio-taylor" img="https://img.transistorcdn.com/unOS5RhWIB3o_F19g60UqukJ9e0H4FoFSaQ0rHeAbZA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hOTA2/YTU3MzI4M2VhNjY4/MzQ3ODc1YzkzYTYx/ZjZmZi5qcGc.jpg">Antonio Taylor</podcast:person>
    </item>
    <item>
      <title>When Data Security Isn’t Yes or No - Jennifer Fite - Guardians of the Data - Episode #24</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>When Data Security Isn’t Yes or No - Jennifer Fite - Guardians of the Data - Episode #24</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">84683192-e702-4caa-b170-d1db4eeb0702</guid>
      <link>https://guardiansofthedata.show/s1/24</link>
      <description>
        <![CDATA[<p>How do you secure data when access isn’t binary?</p><p><br></p><p>In this episode, host Ward Balcerzak sits down with Jennifer Fite, Principal Consultant on the Data Risk Management team at Trace3, to unpack the real-world challenges organizations face when trying to protect sensitive data in today’s cloud-first, integration-heavy environments.</p><p><br></p><p>Jen shares why supply chain breaches have become one of the fastest-growing data security threats and why focusing solely on AI misses the bigger picture. As organizations move from on-prem infrastructure to sprawling cloud ecosystems, security teams are losing visibility into where data lives, who’s accessing it, and how it’s being used. Jen emphasizes a recurring theme: data security is contextual, not binary. Unlike traditional security controls, protecting data requires understanding business intent, user behavior, and downstream data usage, all of which can change over time.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Harden Internal Data Security Practices:</strong> Focus on protecting data at rest, minimizing unnecessary data proliferation, and ensuring robust internal controls regardless of external integrations.</li><li><strong>Implement User Behavior Analytics:</strong> Establish monitoring to understand normal user behavior and detect anomalies. This helps identify potential breaches, especially when attackers use legitimate credentials.</li><li><strong>Know Your Data Estate:</strong> Maintain visibility into where sensitive data is stored, who has access, and how it is used. Regularly update your data inventory and access controls.</li><li><strong>Establish Data Ownership and Accountability:</strong> Assign clear data owners who understand and can authorize access and usage. Ensure business justification for all data access and regularly review permissions.</li><li><strong>Start with Immediate, Practical Steps:</strong> If resources are limited, address the most critical gaps first (e.g., implement basic classification and access policies), then build toward a more comprehensive data security program.</li><li><strong>Regularly Review and Adjust Access:</strong> Continuously re-evaluate who has access to what data, ensuring permissions are still necessary and appropriate, and remove access when it is no longer needed.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ I don't wanna say no, but because it depends, I have to sit with that person and understand what they're doing so we can create the safe right way to do that thing.” - Jennifer Fite</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/jenfitephd/">https://www.linkedin.com/in/jenfitephd/</a> </li><li>Website: <a href="https://www.trace3.com/">https://www.trace3.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you secure data when access isn’t binary?</p><p><br></p><p>In this episode, host Ward Balcerzak sits down with Jennifer Fite, Principal Consultant on the Data Risk Management team at Trace3, to unpack the real-world challenges organizations face when trying to protect sensitive data in today’s cloud-first, integration-heavy environments.</p><p><br></p><p>Jen shares why supply chain breaches have become one of the fastest-growing data security threats and why focusing solely on AI misses the bigger picture. As organizations move from on-prem infrastructure to sprawling cloud ecosystems, security teams are losing visibility into where data lives, who’s accessing it, and how it’s being used. Jen emphasizes a recurring theme: data security is contextual, not binary. Unlike traditional security controls, protecting data requires understanding business intent, user behavior, and downstream data usage, all of which can change over time.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Harden Internal Data Security Practices:</strong> Focus on protecting data at rest, minimizing unnecessary data proliferation, and ensuring robust internal controls regardless of external integrations.</li><li><strong>Implement User Behavior Analytics:</strong> Establish monitoring to understand normal user behavior and detect anomalies. This helps identify potential breaches, especially when attackers use legitimate credentials.</li><li><strong>Know Your Data Estate:</strong> Maintain visibility into where sensitive data is stored, who has access, and how it is used. Regularly update your data inventory and access controls.</li><li><strong>Establish Data Ownership and Accountability:</strong> Assign clear data owners who understand and can authorize access and usage. Ensure business justification for all data access and regularly review permissions.</li><li><strong>Start with Immediate, Practical Steps:</strong> If resources are limited, address the most critical gaps first (e.g., implement basic classification and access policies), then build toward a more comprehensive data security program.</li><li><strong>Regularly Review and Adjust Access:</strong> Continuously re-evaluate who has access to what data, ensuring permissions are still necessary and appropriate, and remove access when it is no longer needed.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ I don't wanna say no, but because it depends, I have to sit with that person and understand what they're doing so we can create the safe right way to do that thing.” - Jennifer Fite</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/jenfitephd/">https://www.linkedin.com/in/jenfitephd/</a> </li><li>Website: <a href="https://www.trace3.com/">https://www.trace3.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 08 Jan 2026 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/30c95324/20504727.mp3" length="38357352" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/D4jNoH8e5W0g1qaHju1fkZZk9_b4XTnNnKbaPkUqybM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MTc5/ZmJlNDYzNWVkNWU0/MDNmNTM1MzRkNTc3/OTEzMy5wbmc.jpg"/>
      <itunes:duration>2394</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you secure data when access isn’t binary?</p><p><br></p><p>In this episode, host Ward Balcerzak sits down with Jennifer Fite, Principal Consultant on the Data Risk Management team at Trace3, to unpack the real-world challenges organizations face when trying to protect sensitive data in today’s cloud-first, integration-heavy environments.</p><p><br></p><p>Jen shares why supply chain breaches have become one of the fastest-growing data security threats and why focusing solely on AI misses the bigger picture. As organizations move from on-prem infrastructure to sprawling cloud ecosystems, security teams are losing visibility into where data lives, who’s accessing it, and how it’s being used. Jen emphasizes a recurring theme: data security is contextual, not binary. Unlike traditional security controls, protecting data requires understanding business intent, user behavior, and downstream data usage, all of which can change over time.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Harden Internal Data Security Practices:</strong> Focus on protecting data at rest, minimizing unnecessary data proliferation, and ensuring robust internal controls regardless of external integrations.</li><li><strong>Implement User Behavior Analytics:</strong> Establish monitoring to understand normal user behavior and detect anomalies. This helps identify potential breaches, especially when attackers use legitimate credentials.</li><li><strong>Know Your Data Estate:</strong> Maintain visibility into where sensitive data is stored, who has access, and how it is used. Regularly update your data inventory and access controls.</li><li><strong>Establish Data Ownership and Accountability:</strong> Assign clear data owners who understand and can authorize access and usage. Ensure business justification for all data access and regularly review permissions.</li><li><strong>Start with Immediate, Practical Steps:</strong> If resources are limited, address the most critical gaps first (e.g., implement basic classification and access policies), then build toward a more comprehensive data security program.</li><li><strong>Regularly Review and Adjust Access:</strong> Continuously re-evaluate who has access to what data, ensuring permissions are still necessary and appropriate, and remove access when it is no longer needed.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ I don't wanna say no, but because it depends, I have to sit with that person and understand what they're doing so we can create the safe right way to do that thing.” - Jennifer Fite</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/jenfitephd/">https://www.linkedin.com/in/jenfitephd/</a> </li><li>Website: <a href="https://www.trace3.com/">https://www.trace3.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/jen-fite" img="https://img.transistorcdn.com/aSUieb9VzxbDuZBvvnpXaByE-PUieoeR9T_XUB1FZEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNmY0/MWQ2YmEwN2ZhNjU5/ZTVjYTFkODZmZjYy/N2EzNy5qcGc.jpg">Jen Fite</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
    </item>
    <item>
      <title>Re-Air: Data Governance &amp; Stewardship Balance - Lance Fischer - Guardians of the Data - Episode #23</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Re-Air: Data Governance &amp; Stewardship Balance - Lance Fischer - Guardians of the Data - Episode #23</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">241fc56d-c62e-43d3-841d-42e7060057ea</guid>
      <link>https://guardiansofthedata.show/s1/23</link>
      <description>
        <![CDATA[<p>Why is visibility the first step in any effective data security strategy?</p><p><br></p><p>In this re-air episode, we’re revisiting Ward’s conversation with Lance Fischer, Principal Security Architect at Guidepoint Security, but its insights are more relevant than ever as organizations grapple with data sprawl, AI adoption, and rising regulatory pressure.</p><p><br></p><p>With nearly three decades in security, Lance breaks down one of the most misunderstood areas of modern security programs: the difference between data governance and data stewardship, and why confusing the two stalls progress before it even begins.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Visibility First:</strong> Before implementing controls or buying tools, ensure you have a clear understanding of what data you have, where it resides, and how it flows within your organization.</li><li><strong>Clarify Data Governance vs. Data Stewardship:</strong> Define clear roles. Governance sets the policies and rules; stewardship ensures those rules are applied consistently. Foster communication and cooperation between these groups.</li><li><strong>Start Small and Scale:</strong> Don’t try to solve everything at once. Tackle visibility and controls in manageable pieces. Focus on a subset of data or a specific business unit to build momentum.</li><li><strong>Engage Stakeholders Across the Business:</strong> Involve HR, Legal, IT, and business units early to ensure policies are practical and have buy-in. Encourage open dialogue rather than top-down mandates.</li><li><strong>Understand and Plan for Resource Needs:</strong> Assess the people, time, and budget required for data security initiatives before launching. Avoid overburdening staff with too many roles; dedicate resources where possible.</li><li><strong>Document Decisions and Processes:</strong> Track inputs and outputs from governance meetings and policy changes for audit and continuous improvement.</li><li><strong>Anticipate and Manage Tool Sprawl: </strong>Regularly review existing tools for effectiveness and eliminate redundant or unused solutions. Don’t assume swapping tools will solve underlying process or visibility issues.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ Data governance is the rules of the game. Data stewardship ensures those rules are applied consistently and effectively.” - Lance Fischer</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lance-fischer-a0301219/">https://www.linkedin.com/in/lance-fischer-a0301219/</a> </li><li>Website: <a href="https://www.guidepointsecurity.com/">https://www.guidepointsecurity.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Why is visibility the first step in any effective data security strategy?</p><p><br></p><p>In this re-air episode, we’re revisiting Ward’s conversation with Lance Fischer, Principal Security Architect at Guidepoint Security, but its insights are more relevant than ever as organizations grapple with data sprawl, AI adoption, and rising regulatory pressure.</p><p><br></p><p>With nearly three decades in security, Lance breaks down one of the most misunderstood areas of modern security programs: the difference between data governance and data stewardship, and why confusing the two stalls progress before it even begins.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Visibility First:</strong> Before implementing controls or buying tools, ensure you have a clear understanding of what data you have, where it resides, and how it flows within your organization.</li><li><strong>Clarify Data Governance vs. Data Stewardship:</strong> Define clear roles. Governance sets the policies and rules; stewardship ensures those rules are applied consistently. Foster communication and cooperation between these groups.</li><li><strong>Start Small and Scale:</strong> Don’t try to solve everything at once. Tackle visibility and controls in manageable pieces. Focus on a subset of data or a specific business unit to build momentum.</li><li><strong>Engage Stakeholders Across the Business:</strong> Involve HR, Legal, IT, and business units early to ensure policies are practical and have buy-in. Encourage open dialogue rather than top-down mandates.</li><li><strong>Understand and Plan for Resource Needs:</strong> Assess the people, time, and budget required for data security initiatives before launching. Avoid overburdening staff with too many roles; dedicate resources where possible.</li><li><strong>Document Decisions and Processes:</strong> Track inputs and outputs from governance meetings and policy changes for audit and continuous improvement.</li><li><strong>Anticipate and Manage Tool Sprawl: </strong>Regularly review existing tools for effectiveness and eliminate redundant or unused solutions. Don’t assume swapping tools will solve underlying process or visibility issues.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ Data governance is the rules of the game. Data stewardship ensures those rules are applied consistently and effectively.” - Lance Fischer</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lance-fischer-a0301219/">https://www.linkedin.com/in/lance-fischer-a0301219/</a> </li><li>Website: <a href="https://www.guidepointsecurity.com/">https://www.guidepointsecurity.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 30 Dec 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/572f110c/51987cca.mp3" length="47120195" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/snTFlq14m4MS-leAW6CbV75tYUJSzq1l0DdqYeLh0u0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YjI4/MDdkMzI5ZjRhNDcy/YmM0MThmY2JjN2Zk/OTJiZi5wbmc.jpg"/>
      <itunes:duration>2942</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Why is visibility the first step in any effective data security strategy?</p><p><br></p><p>In this re-air episode, we’re revisiting Ward’s conversation with Lance Fischer, Principal Security Architect at Guidepoint Security, but its insights are more relevant than ever as organizations grapple with data sprawl, AI adoption, and rising regulatory pressure.</p><p><br></p><p>With nearly three decades in security, Lance breaks down one of the most misunderstood areas of modern security programs: the difference between data governance and data stewardship, and why confusing the two stalls progress before it even begins.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Visibility First:</strong> Before implementing controls or buying tools, ensure you have a clear understanding of what data you have, where it resides, and how it flows within your organization.</li><li><strong>Clarify Data Governance vs. Data Stewardship:</strong> Define clear roles. Governance sets the policies and rules; stewardship ensures those rules are applied consistently. Foster communication and cooperation between these groups.</li><li><strong>Start Small and Scale:</strong> Don’t try to solve everything at once. Tackle visibility and controls in manageable pieces. Focus on a subset of data or a specific business unit to build momentum.</li><li><strong>Engage Stakeholders Across the Business:</strong> Involve HR, Legal, IT, and business units early to ensure policies are practical and have buy-in. Encourage open dialogue rather than top-down mandates.</li><li><strong>Understand and Plan for Resource Needs:</strong> Assess the people, time, and budget required for data security initiatives before launching. Avoid overburdening staff with too many roles; dedicate resources where possible.</li><li><strong>Document Decisions and Processes:</strong> Track inputs and outputs from governance meetings and policy changes for audit and continuous improvement.</li><li><strong>Anticipate and Manage Tool Sprawl: </strong>Regularly review existing tools for effectiveness and eliminate redundant or unused solutions. Don’t assume swapping tools will solve underlying process or visibility issues.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“ Data governance is the rules of the game. Data stewardship ensures those rules are applied consistently and effectively.” - Lance Fischer</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lance-fischer-a0301219/">https://www.linkedin.com/in/lance-fischer-a0301219/</a> </li><li>Website: <a href="https://www.guidepointsecurity.com/">https://www.guidepointsecurity.com/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/lance-fischer" img="https://img.transistorcdn.com/0QZ3fg_ohBVLsgjptOTuMvAR5XEnZ26DLWy7nSpH0kk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YWJm/OTJiMmQ3MzYyOTEy/ZjljN2I3NjY2ZGE5/NjEzYi5wbmc.jpg">Lance Fischer</podcast:person>
    </item>
    <item>
      <title>The Biggest Data Security Challenges of 2025 - Guardians of the Data - Episode #22</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>The Biggest Data Security Challenges of 2025 - Guardians of the Data - Episode #22</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fc022914-36bb-485a-8fff-0578e6cd1a1f</guid>
      <link>https://guardiansofthedata.show/s1/22</link>
      <description>
        <![CDATA[<p>What are the biggest challenges data leaders are facing?</p><p><br></p><p>Today, we run back some of the best conversations of the year. Ward brings together insights from data security, privacy, and governance leaders across industries to answer one foundational question: What is the biggest challenge organizations are facing when it comes to data security?</p><p><br></p><p>From data classification to data sprawl, to even knowing what data you have, we cover it all in this episode.</p><p><br>Featuring: Rick DeLoach, Daley Varghese, Hans Vargas, Bryan DeLuca, Trevor Dolan, Luis Valenzuela, and Christian Ghigliotty.</p><p>Takeaways:</p><ul><li><strong>Know Your Data:</strong> Conduct a thorough inventory and classification of your data assets.</li><li><strong>Establish Strong Governance:</strong> Develop clear, practical data governance policies and procedures. Involve legal, privacy, and business stakeholders in defining standards.</li><li><strong>Assess and Address Risks:</strong> Regularly perform risk assessments for new and existing data uses and understand who has access to what.</li><li><strong>Balance Technology with Process:</strong> Don’t rely solely on tools. Ensure you have the right processes and people in place.</li><li><strong>Educate and Empower:</strong> Provide ongoing training and awareness for all employees, not just annual modules. Embed “champions” or advocates for data security and privacy throughout the organization.</li><li><strong>Continuously Improve:</strong> Create feedback loops to refine policies, processes, and technology over time.</li><li><strong>Adapt to Change:</strong> Be proactive in adapting to new challenges like remote work, AI, and cloud adoption. Stay curious and seek out passionate partners across the organization.</li></ul><p><br>Connect with these featured guests:</p><ul><li>Rick DeLoach: <a href="https://www.linkedin.com/in/rdeloach/">https://www.linkedin.com/in/rdeloach/</a> </li><li>Daley Varghese: <a href="https://www.linkedin.com/in/daley-varghese/">https://www.linkedin.com/in/daley-varghese/</a> </li><li>Hans Vargas: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Bryan DeLuca: <a href="https://www.linkedin.com/in/bdll/">https://www.linkedin.com/in/bdll/</a> </li><li>Trevor Dolan: <a href="https://www.linkedin.com/in/trevor-dolan-91a1ab12/">https://www.linkedin.com/in/trevor-dolan-91a1ab12/</a> </li><li>Luis Valenzuela: <a href="https://www.linkedin.com/in/luisvalenzuela28323623/">https://www.linkedin.com/in/luisvalenzuela28323623/</a> </li><li>Christian Ghigliotty: <a href="https://www.linkedin.com/in/ghigliottyc/">https://www.linkedin.com/in/ghigliottyc/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What are the biggest challenges data leaders are facing?</p><p><br></p><p>Today, we run back some of the best conversations of the year. Ward brings together insights from data security, privacy, and governance leaders across industries to answer one foundational question: What is the biggest challenge organizations are facing when it comes to data security?</p><p><br></p><p>From data classification to data sprawl, to even knowing what data you have, we cover it all in this episode.</p><p><br>Featuring: Rick DeLoach, Daley Varghese, Hans Vargas, Bryan DeLuca, Trevor Dolan, Luis Valenzuela, and Christian Ghigliotty.</p><p>Takeaways:</p><ul><li><strong>Know Your Data:</strong> Conduct a thorough inventory and classification of your data assets.</li><li><strong>Establish Strong Governance:</strong> Develop clear, practical data governance policies and procedures. Involve legal, privacy, and business stakeholders in defining standards.</li><li><strong>Assess and Address Risks:</strong> Regularly perform risk assessments for new and existing data uses and understand who has access to what.</li><li><strong>Balance Technology with Process:</strong> Don’t rely solely on tools. Ensure you have the right processes and people in place.</li><li><strong>Educate and Empower:</strong> Provide ongoing training and awareness for all employees, not just annual modules. Embed “champions” or advocates for data security and privacy throughout the organization.</li><li><strong>Continuously Improve:</strong> Create feedback loops to refine policies, processes, and technology over time.</li><li><strong>Adapt to Change:</strong> Be proactive in adapting to new challenges like remote work, AI, and cloud adoption. Stay curious and seek out passionate partners across the organization.</li></ul><p><br>Connect with these featured guests:</p><ul><li>Rick DeLoach: <a href="https://www.linkedin.com/in/rdeloach/">https://www.linkedin.com/in/rdeloach/</a> </li><li>Daley Varghese: <a href="https://www.linkedin.com/in/daley-varghese/">https://www.linkedin.com/in/daley-varghese/</a> </li><li>Hans Vargas: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Bryan DeLuca: <a href="https://www.linkedin.com/in/bdll/">https://www.linkedin.com/in/bdll/</a> </li><li>Trevor Dolan: <a href="https://www.linkedin.com/in/trevor-dolan-91a1ab12/">https://www.linkedin.com/in/trevor-dolan-91a1ab12/</a> </li><li>Luis Valenzuela: <a href="https://www.linkedin.com/in/luisvalenzuela28323623/">https://www.linkedin.com/in/luisvalenzuela28323623/</a> </li><li>Christian Ghigliotty: <a href="https://www.linkedin.com/in/ghigliottyc/">https://www.linkedin.com/in/ghigliottyc/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 23 Dec 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/0bfcf938/456e53e2.mp3" length="29717811" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ivmCkc0KRoh0jkodcQzGt4CkqcDUVRj-ZBWfY4oWs3w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNTQz/Y2UyMGMwNTM5NjQ2/YzljY2Y3ZTA5ODJk/ZTg1NC5wbmc.jpg"/>
      <itunes:duration>1853</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What are the biggest challenges data leaders are facing?</p><p><br></p><p>Today, we run back some of the best conversations of the year. Ward brings together insights from data security, privacy, and governance leaders across industries to answer one foundational question: What is the biggest challenge organizations are facing when it comes to data security?</p><p><br></p><p>From data classification to data sprawl, to even knowing what data you have, we cover it all in this episode.</p><p><br>Featuring: Rick DeLoach, Daley Varghese, Hans Vargas, Bryan DeLuca, Trevor Dolan, Luis Valenzuela, and Christian Ghigliotty.</p><p>Takeaways:</p><ul><li><strong>Know Your Data:</strong> Conduct a thorough inventory and classification of your data assets.</li><li><strong>Establish Strong Governance:</strong> Develop clear, practical data governance policies and procedures. Involve legal, privacy, and business stakeholders in defining standards.</li><li><strong>Assess and Address Risks:</strong> Regularly perform risk assessments for new and existing data uses and understand who has access to what.</li><li><strong>Balance Technology with Process:</strong> Don’t rely solely on tools. Ensure you have the right processes and people in place.</li><li><strong>Educate and Empower:</strong> Provide ongoing training and awareness for all employees, not just annual modules. Embed “champions” or advocates for data security and privacy throughout the organization.</li><li><strong>Continuously Improve:</strong> Create feedback loops to refine policies, processes, and technology over time.</li><li><strong>Adapt to Change:</strong> Be proactive in adapting to new challenges like remote work, AI, and cloud adoption. Stay curious and seek out passionate partners across the organization.</li></ul><p><br>Connect with these featured guests:</p><ul><li>Rick DeLoach: <a href="https://www.linkedin.com/in/rdeloach/">https://www.linkedin.com/in/rdeloach/</a> </li><li>Daley Varghese: <a href="https://www.linkedin.com/in/daley-varghese/">https://www.linkedin.com/in/daley-varghese/</a> </li><li>Hans Vargas: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Bryan DeLuca: <a href="https://www.linkedin.com/in/bdll/">https://www.linkedin.com/in/bdll/</a> </li><li>Trevor Dolan: <a href="https://www.linkedin.com/in/trevor-dolan-91a1ab12/">https://www.linkedin.com/in/trevor-dolan-91a1ab12/</a> </li><li>Luis Valenzuela: <a href="https://www.linkedin.com/in/luisvalenzuela28323623/">https://www.linkedin.com/in/luisvalenzuela28323623/</a> </li><li>Christian Ghigliotty: <a href="https://www.linkedin.com/in/ghigliottyc/">https://www.linkedin.com/in/ghigliottyc/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/bryan-deluca" img="https://img.transistorcdn.com/oLrO0sIhbEO2xoH5ubLN3Wo9JOc_uZPAJW5dEcETKG8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZTU2/NDcwMmUyZDBiNjkx/M2JkMmU5ZjhhMzU3/ZjMxOC5wbmc.jpg">Bryan DeLuca</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/christian-ghigliotty" img="https://img.transistorcdn.com/DxR0JvvOhwmzs_Xq6x3L80CMuDTeMFLO5pRKtdepRNY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZTQ1/ZjIzZTY4N2RlNzFk/MzNmMGUwZTYzZjA1/YTJmMy5qcGc.jpg">Christian Ghigliotty</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/daley-varghese" img="https://img.transistorcdn.com/YJ8hFLG7ms85xebV6KC_ZJSdWwNfqSVz3BpFQnXpv6g/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NTRi/YzIyNTJiMGFhMzI3/YTJjYzEyMTVmYWY2/YWMwOC5qcGc.jpg">Daley Varghese</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/hans-vargas" img="https://img.transistorcdn.com/oBM6_Vhjk4z2vbRhz_Ckrj8FmZSDWiDTvsOqY7IL6iI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMTFm/ZTU1MzUwYTZiNjQ2/ZjQyZGE1Nzg3MzEz/YzljMC5wbmc.jpg">Hans Vargas</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/luis-valenzuela" img="https://img.transistorcdn.com/wwiziFISrCfqYvjxGcES1fbTfGA3abxg13aiVwhIGFQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZmU3/YTY4MTY1OGE0MWUw/ZWU0ZWYxYWE3ODQ3/OTFkMC5qcGc.jpg">Luis Valenzuela</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/rick-deloach" img="https://img.transistorcdn.com/CizLNE_5fyjWQuKKORfro9aC5QFn2-DYkvc88dOXzak/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMmQz/MmQyZGNkZGNmYzRm/NDk1YTlhMjE0ODNl/MzkxMi5qcGc.jpg">Rick DeLoach</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/trevor-dolan" img="https://img.transistorcdn.com/h4GffZXxgIJVTOlVs8BpLVJEjMTnOjnWIeZhMAiHjMM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYTU2/ZmNjYzZkOTU4NGFi/M2NiMmNiNTdmNzI1/NmFjMi5qcGc.jpg">Trevor Dolan</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
    </item>
    <item>
      <title>The Real Business Impact of Poor Data Governance - Rick Doten - Guardians of the Data - Episode #21</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>The Real Business Impact of Poor Data Governance - Rick Doten - Guardians of the Data - Episode #21</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ec2728a1-5428-4794-837c-42027cf45704</guid>
      <link>https://guardiansofthedata.show/s1/21</link>
      <description>
        <![CDATA[<p>What’s the real business impact of bad data governance in modern security programs?</p><p><br></p><p>Rick Doten, former Healthplan CISO at Centene Corporation and AI researcher with over 25 years of cybersecurity experience, joins the show to discuss the biggest challenges in data security. Rick emphasizes the critical importance of data governance and quality, explaining how understanding a business's needs and the value of its data are pivotal. He also explores how AI can both enhance and complicate data management. Drawing insights from his varied career path, including his role as a former health plan CISO and current advisor, Rick provides practical advice on mitigating security risks and leveraging AI for data protection.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Data Governance:</strong> Recognize that the biggest challenge in data security is often a lack of data governance. Start by defining what data you have, where it is, who has access, and how valuable it is.</li><li><strong>Engage the Business:</strong> Security professionals should not decide what data is most important. Partner with business leaders to understand critical business processes and data.</li><li><strong>Conduct Business Impact Assessments:</strong> Work with business units to identify what would constitute a "bad day" for them. Use this to determine which data and systems are most critical.</li><li><strong>Define Clear Policies and Rules:</strong> Develop and document policies around data protection, classification, access, retention, and destruction, based on regulatory, contractual, and business requirements.</li><li><strong>Ensure Data Quality:</strong> Especially in the age of AI, ensure that data sets are accurate, current, and appropriately managed to avoid issues with automation and analytics.</li><li><strong>Foster Collaboration, Not Adversarial Relationships:</strong> Security should be seen as a business enabler, not a blocker. Build trust and open communication with business units.</li><li><strong>Accept That Change Takes Time:</strong> Building effective governance and security is a long-term process. Set realistic expectations and avoid quick-fix solutions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We’re only in this game to protect data and the availability of that data.” - Rick Doten</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rick-doten-633470177/">https://www.linkedin.com/in/rick-doten-633470177/</a> </li><li>YouTube: <a href="https://www.youtube.com/@rickscybersecurityvideos1059">https://www.youtube.com/@rickscybersecurityvideos1059</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What’s the real business impact of bad data governance in modern security programs?</p><p><br></p><p>Rick Doten, former Healthplan CISO at Centene Corporation and AI researcher with over 25 years of cybersecurity experience, joins the show to discuss the biggest challenges in data security. Rick emphasizes the critical importance of data governance and quality, explaining how understanding a business's needs and the value of its data are pivotal. He also explores how AI can both enhance and complicate data management. Drawing insights from his varied career path, including his role as a former health plan CISO and current advisor, Rick provides practical advice on mitigating security risks and leveraging AI for data protection.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Data Governance:</strong> Recognize that the biggest challenge in data security is often a lack of data governance. Start by defining what data you have, where it is, who has access, and how valuable it is.</li><li><strong>Engage the Business:</strong> Security professionals should not decide what data is most important. Partner with business leaders to understand critical business processes and data.</li><li><strong>Conduct Business Impact Assessments:</strong> Work with business units to identify what would constitute a "bad day" for them. Use this to determine which data and systems are most critical.</li><li><strong>Define Clear Policies and Rules:</strong> Develop and document policies around data protection, classification, access, retention, and destruction, based on regulatory, contractual, and business requirements.</li><li><strong>Ensure Data Quality:</strong> Especially in the age of AI, ensure that data sets are accurate, current, and appropriately managed to avoid issues with automation and analytics.</li><li><strong>Foster Collaboration, Not Adversarial Relationships:</strong> Security should be seen as a business enabler, not a blocker. Build trust and open communication with business units.</li><li><strong>Accept That Change Takes Time:</strong> Building effective governance and security is a long-term process. Set realistic expectations and avoid quick-fix solutions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We’re only in this game to protect data and the availability of that data.” - Rick Doten</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rick-doten-633470177/">https://www.linkedin.com/in/rick-doten-633470177/</a> </li><li>YouTube: <a href="https://www.youtube.com/@rickscybersecurityvideos1059">https://www.youtube.com/@rickscybersecurityvideos1059</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 18 Dec 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/4d89e554/f20e2ac5.mp3" length="47964139" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AkNn696AsDU2fnirWuW3vsHEGjyG5L5FGmxO08Svg5k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xYzU3/MjdmNzc2ZjhlZmM0/ZjBlOTVlYjJiZDlj/OGFmOC5wbmc.jpg"/>
      <itunes:duration>2995</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What’s the real business impact of bad data governance in modern security programs?</p><p><br></p><p>Rick Doten, former Healthplan CISO at Centene Corporation and AI researcher with over 25 years of cybersecurity experience, joins the show to discuss the biggest challenges in data security. Rick emphasizes the critical importance of data governance and quality, explaining how understanding a business's needs and the value of its data are pivotal. He also explores how AI can both enhance and complicate data management. Drawing insights from his varied career path, including his role as a former health plan CISO and current advisor, Rick provides practical advice on mitigating security risks and leveraging AI for data protection.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Data Governance:</strong> Recognize that the biggest challenge in data security is often a lack of data governance. Start by defining what data you have, where it is, who has access, and how valuable it is.</li><li><strong>Engage the Business:</strong> Security professionals should not decide what data is most important. Partner with business leaders to understand critical business processes and data.</li><li><strong>Conduct Business Impact Assessments:</strong> Work with business units to identify what would constitute a "bad day" for them. Use this to determine which data and systems are most critical.</li><li><strong>Define Clear Policies and Rules:</strong> Develop and document policies around data protection, classification, access, retention, and destruction, based on regulatory, contractual, and business requirements.</li><li><strong>Ensure Data Quality:</strong> Especially in the age of AI, ensure that data sets are accurate, current, and appropriately managed to avoid issues with automation and analytics.</li><li><strong>Foster Collaboration, Not Adversarial Relationships:</strong> Security should be seen as a business enabler, not a blocker. Build trust and open communication with business units.</li><li><strong>Accept That Change Takes Time:</strong> Building effective governance and security is a long-term process. Set realistic expectations and avoid quick-fix solutions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We’re only in this game to protect data and the availability of that data.” - Rick Doten</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rick-doten-633470177/">https://www.linkedin.com/in/rick-doten-633470177/</a> </li><li>YouTube: <a href="https://www.youtube.com/@rickscybersecurityvideos1059">https://www.youtube.com/@rickscybersecurityvideos1059</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/rick-doten" img="https://img.transistorcdn.com/5VOQJaxCicvTb_ys1LmWyhaHduIwVxclV68OZK5jDE0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83N2Yy/M2I1Y2JhNTA4NzEx/NjMzZjFkMzAzMGIw/NTJiNS5qcGc.jpg">Rick Doten</podcast:person>
    </item>
    <item>
      <title>Leadership Buy-In: The #1 Success Factor in Security - Kenny Vu - Guardians of the Data - Episode #20</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Leadership Buy-In: The #1 Success Factor in Security - Kenny Vu - Guardians of the Data - Episode #20</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1e3699fc-294b-43e2-97e9-280f3418b1a2</guid>
      <link>https://guardiansofthedata.show/s1/20</link>
      <description>
        <![CDATA[<p>How do you get true leadership buy-in for your data security program and turn risk assessments into real action?</p><p>In this episode, AVP of InfoSec and data security leader Kenny Vu breaks down why leadership support is the biggest determining factor in whether a program thrives or fails. With over a decade of experience across engineering, consulting, and hands-on data protection work, Kenny shares a clear, practical framework for assessing risk, creating a roadmap, and earning long-term organizational trust. He dives into the nuances of implementing and managing data security programs, the necessity of education and awareness among employees, and strategies for gaining ongoing support from leadership. Kenny also recounts his journey in the cybersecurity field and offers advice for those looking to move into leadership roles.</p><p> </p><p>Takeaways:</p><ul><li><strong>Secure Leadership Buy-In Early:</strong> Success in data security programs hinges on strong leadership support. When starting a new role or initiative, assess the level of leadership commitment and ask tough questions during interviews or project kickoffs.</li><li><strong>Conduct a Thorough Assessment:</strong> Begin with a comprehensive assessment of your organization’s data security posture. Identify all current risks, compliance obligations, and gaps in your program.</li><li><strong>Develop a Risk-Based Roadmap:</strong> Use your assessment to create a clear, prioritized roadmap. Focus first on “low-hanging fruit” or quick wins that deliver value with minimal effort, then tackle more complex issues.</li><li><strong>Be Flexible with Tools and Solutions:</strong> Evaluate existing tools before bringing in new ones. Ensure any solution meets your control requirements, and be prepared to adapt if another team’s priorities or tools impact your plans.</li><li><strong>Show Value Through Reporting:</strong> Consistently report on your progress, quick wins, and risk reduction. Use metrics and reports to demonstrate the ongoing value of your data security program.</li><li><strong>Plan for Resource Needs:</strong> When building your roadmap, factor in the resources required. Present options to leadership that show what can be achieved with current resources versus additional headcount.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“If you don't act on it, you accept. You're accepting the risk.” - Kenny Vu</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/kenny-vu-cissp-94193289/">https://www.linkedin.com/in/kenny-vu-cissp-94193289/</a> </li></ul><p><br>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you get true leadership buy-in for your data security program and turn risk assessments into real action?</p><p>In this episode, AVP of InfoSec and data security leader Kenny Vu breaks down why leadership support is the biggest determining factor in whether a program thrives or fails. With over a decade of experience across engineering, consulting, and hands-on data protection work, Kenny shares a clear, practical framework for assessing risk, creating a roadmap, and earning long-term organizational trust. He dives into the nuances of implementing and managing data security programs, the necessity of education and awareness among employees, and strategies for gaining ongoing support from leadership. Kenny also recounts his journey in the cybersecurity field and offers advice for those looking to move into leadership roles.</p><p> </p><p>Takeaways:</p><ul><li><strong>Secure Leadership Buy-In Early:</strong> Success in data security programs hinges on strong leadership support. When starting a new role or initiative, assess the level of leadership commitment and ask tough questions during interviews or project kickoffs.</li><li><strong>Conduct a Thorough Assessment:</strong> Begin with a comprehensive assessment of your organization’s data security posture. Identify all current risks, compliance obligations, and gaps in your program.</li><li><strong>Develop a Risk-Based Roadmap:</strong> Use your assessment to create a clear, prioritized roadmap. Focus first on “low-hanging fruit” or quick wins that deliver value with minimal effort, then tackle more complex issues.</li><li><strong>Be Flexible with Tools and Solutions:</strong> Evaluate existing tools before bringing in new ones. Ensure any solution meets your control requirements, and be prepared to adapt if another team’s priorities or tools impact your plans.</li><li><strong>Show Value Through Reporting:</strong> Consistently report on your progress, quick wins, and risk reduction. Use metrics and reports to demonstrate the ongoing value of your data security program.</li><li><strong>Plan for Resource Needs:</strong> When building your roadmap, factor in the resources required. Present options to leadership that show what can be achieved with current resources versus additional headcount.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“If you don't act on it, you accept. You're accepting the risk.” - Kenny Vu</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/kenny-vu-cissp-94193289/">https://www.linkedin.com/in/kenny-vu-cissp-94193289/</a> </li></ul><p><br>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 11 Dec 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/95df993d/7825dcb1.mp3" length="42129651" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cwGx2nYpbq0b_rOftttI_Qdyw4pwf9I2npiaRS15Aec/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82Y2Ji/ZWIwYTljNzcwNmJm/MjUxZTAwNjk3ZDIw/NGJlYy5wbmc.jpg"/>
      <itunes:duration>2630</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you get true leadership buy-in for your data security program and turn risk assessments into real action?</p><p>In this episode, AVP of InfoSec and data security leader Kenny Vu breaks down why leadership support is the biggest determining factor in whether a program thrives or fails. With over a decade of experience across engineering, consulting, and hands-on data protection work, Kenny shares a clear, practical framework for assessing risk, creating a roadmap, and earning long-term organizational trust. He dives into the nuances of implementing and managing data security programs, the necessity of education and awareness among employees, and strategies for gaining ongoing support from leadership. Kenny also recounts his journey in the cybersecurity field and offers advice for those looking to move into leadership roles.</p><p> </p><p>Takeaways:</p><ul><li><strong>Secure Leadership Buy-In Early:</strong> Success in data security programs hinges on strong leadership support. When starting a new role or initiative, assess the level of leadership commitment and ask tough questions during interviews or project kickoffs.</li><li><strong>Conduct a Thorough Assessment:</strong> Begin with a comprehensive assessment of your organization’s data security posture. Identify all current risks, compliance obligations, and gaps in your program.</li><li><strong>Develop a Risk-Based Roadmap:</strong> Use your assessment to create a clear, prioritized roadmap. Focus first on “low-hanging fruit” or quick wins that deliver value with minimal effort, then tackle more complex issues.</li><li><strong>Be Flexible with Tools and Solutions:</strong> Evaluate existing tools before bringing in new ones. Ensure any solution meets your control requirements, and be prepared to adapt if another team’s priorities or tools impact your plans.</li><li><strong>Show Value Through Reporting:</strong> Consistently report on your progress, quick wins, and risk reduction. Use metrics and reports to demonstrate the ongoing value of your data security program.</li><li><strong>Plan for Resource Needs:</strong> When building your roadmap, factor in the resources required. Present options to leadership that show what can be achieved with current resources versus additional headcount.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“If you don't act on it, you accept. You're accepting the risk.” - Kenny Vu</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/kenny-vu-cissp-94193289/">https://www.linkedin.com/in/kenny-vu-cissp-94193289/</a> </li></ul><p><br>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/kenny-vu" img="https://img.transistorcdn.com/S-CHWgc6HJ2O0eyRY7s8qLGlSzBuYmLP3WTkIh6O2Ds/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hOTE5/ZGM0YWFhODQ5Njkz/YmZjNzYyYmM0ZDJl/ZmViMi5qcGVn.jpg">Kenny Vu</podcast:person>
    </item>
    <item>
      <title>AI Won’t Save You: Human Judgment Still Matters - Ian Kicmol - Guardians of the Data - Episode #19</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>AI Won’t Save You: Human Judgment Still Matters - Ian Kicmol - Guardians of the Data - Episode #19</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">280c0dae-9f65-48ab-b3e0-f27c7eb68ca1</guid>
      <link>https://guardiansofthedata.show/s1/19</link>
      <description>
        <![CDATA[<p>Is AI really the solution to your data security challenges, or is the real problem hiding in your people and processes?</p><p><br></p><p>Ian Kicmol, leader of a major data protection organization with more than a decade of experience, shares why the biggest challenges facing data security today have less to do with tools and everything to do with people, communication, and the ability to manage overwhelming alert volumes. Ian explains why organizations that expect AI to replace humans in data security are setting themselves up for disappointment, and what teams should focus on instead to build programs that actually work. From hiring the right talent to tuning tools to creating a governance council that aligns engineering, legal, and business stakeholders, Ian breaks down the blueprint for a scalable, sustainable data protection function. Whether you're building a program from scratch or trying to fix alert fatigue, this conversation delivers real-world insight from someone who’s done the work across multiple industries.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Invest in People, Not Just Tools:</strong> AI and automation are valuable, but people remain the core of a successful data security program. Focus on hiring, developing, and retaining talented individuals.</li><li><strong>Prioritize Communication Skills:</strong> Technical expertise is important, but the ability to communicate complex issues in simple, clear language is critical.</li><li><strong>Build Cross-Functional Councils:</strong> Establish a data governance council or similar forum that brings together leaders from engineering, legal, operations, and business units to collaboratively assess and make decisions on security rules and alerts.</li><li><strong>Tune and Automate Where Possible:</strong> Regularly review and tune security tools to reduce noise and focus on high-priority alerts. Use automation to handle repetitive, low-value tasks, but always keep human oversight for critical decisions.</li><li><strong>Encourage Ownership and Growth:</strong> Give team members opportunities to own projects and tools. Support their growth by recognizing strengths and encouraging them to expand their skills.</li><li><strong>Balance AI Adoption with Human Judgment:</strong> Embrace AI as a tool to enhance efficiency, but recognize its limitations. Human judgment is still essential for interpreting intent and making nuanced decisions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“People are really the core of having a successful program… AI is not there to replace everybody right now.” - Ian Kicmol</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ian-kicmol1/">https://www.linkedin.com/in/ian-kicmol1/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Is AI really the solution to your data security challenges, or is the real problem hiding in your people and processes?</p><p><br></p><p>Ian Kicmol, leader of a major data protection organization with more than a decade of experience, shares why the biggest challenges facing data security today have less to do with tools and everything to do with people, communication, and the ability to manage overwhelming alert volumes. Ian explains why organizations that expect AI to replace humans in data security are setting themselves up for disappointment, and what teams should focus on instead to build programs that actually work. From hiring the right talent to tuning tools to creating a governance council that aligns engineering, legal, and business stakeholders, Ian breaks down the blueprint for a scalable, sustainable data protection function. Whether you're building a program from scratch or trying to fix alert fatigue, this conversation delivers real-world insight from someone who’s done the work across multiple industries.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Invest in People, Not Just Tools:</strong> AI and automation are valuable, but people remain the core of a successful data security program. Focus on hiring, developing, and retaining talented individuals.</li><li><strong>Prioritize Communication Skills:</strong> Technical expertise is important, but the ability to communicate complex issues in simple, clear language is critical.</li><li><strong>Build Cross-Functional Councils:</strong> Establish a data governance council or similar forum that brings together leaders from engineering, legal, operations, and business units to collaboratively assess and make decisions on security rules and alerts.</li><li><strong>Tune and Automate Where Possible:</strong> Regularly review and tune security tools to reduce noise and focus on high-priority alerts. Use automation to handle repetitive, low-value tasks, but always keep human oversight for critical decisions.</li><li><strong>Encourage Ownership and Growth:</strong> Give team members opportunities to own projects and tools. Support their growth by recognizing strengths and encouraging them to expand their skills.</li><li><strong>Balance AI Adoption with Human Judgment:</strong> Embrace AI as a tool to enhance efficiency, but recognize its limitations. Human judgment is still essential for interpreting intent and making nuanced decisions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“People are really the core of having a successful program… AI is not there to replace everybody right now.” - Ian Kicmol</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ian-kicmol1/">https://www.linkedin.com/in/ian-kicmol1/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 04 Dec 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/e21ed3a9/96de2447.mp3" length="48390630" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YRMO90aBVkjaqQDVx5PJW_P7wPK2cLGVdBlYs7i6JXQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYjJk/MWI2YWU3NWM1OGUx/MjcyNGE5YWRkNjVh/MGYyOS5wbmc.jpg"/>
      <itunes:duration>3022</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Is AI really the solution to your data security challenges, or is the real problem hiding in your people and processes?</p><p><br></p><p>Ian Kicmol, leader of a major data protection organization with more than a decade of experience, shares why the biggest challenges facing data security today have less to do with tools and everything to do with people, communication, and the ability to manage overwhelming alert volumes. Ian explains why organizations that expect AI to replace humans in data security are setting themselves up for disappointment, and what teams should focus on instead to build programs that actually work. From hiring the right talent to tuning tools to creating a governance council that aligns engineering, legal, and business stakeholders, Ian breaks down the blueprint for a scalable, sustainable data protection function. Whether you're building a program from scratch or trying to fix alert fatigue, this conversation delivers real-world insight from someone who’s done the work across multiple industries.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Invest in People, Not Just Tools:</strong> AI and automation are valuable, but people remain the core of a successful data security program. Focus on hiring, developing, and retaining talented individuals.</li><li><strong>Prioritize Communication Skills:</strong> Technical expertise is important, but the ability to communicate complex issues in simple, clear language is critical.</li><li><strong>Build Cross-Functional Councils:</strong> Establish a data governance council or similar forum that brings together leaders from engineering, legal, operations, and business units to collaboratively assess and make decisions on security rules and alerts.</li><li><strong>Tune and Automate Where Possible:</strong> Regularly review and tune security tools to reduce noise and focus on high-priority alerts. Use automation to handle repetitive, low-value tasks, but always keep human oversight for critical decisions.</li><li><strong>Encourage Ownership and Growth:</strong> Give team members opportunities to own projects and tools. Support their growth by recognizing strengths and encouraging them to expand their skills.</li><li><strong>Balance AI Adoption with Human Judgment:</strong> Embrace AI as a tool to enhance efficiency, but recognize its limitations. Human judgment is still essential for interpreting intent and making nuanced decisions.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“People are really the core of having a successful program… AI is not there to replace everybody right now.” - Ian Kicmol</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ian-kicmol1/">https://www.linkedin.com/in/ian-kicmol1/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/ian-kicmol" img="https://img.transistorcdn.com/Vjis5u2kDxHUF3qESZopr1ai-161UIc-7qTTOAJhfVY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNGZl/MzhmM2NjNWM0NTc3/MDk3ZjY3YzEzZGVj/NzI0OC5qcGc.jpg">Ian Kicmol</podcast:person>
    </item>
    <item>
      <title>AI: The New Era of Cyber Threats - Dr. Sergio Sanchez - Guardians of the Data - Episode #18</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>AI: The New Era of Cyber Threats - Dr. Sergio Sanchez - Guardians of the Data - Episode #18</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6b28af36-1b9d-4923-ae15-e018ae7da76f</guid>
      <link>https://guardiansofthedata.show/s1/18</link>
      <description>
        <![CDATA[<p>Are your cybersecurity practices ready for the new era of AI-generated phishing, social engineering, and real-time deepfake attacks?</p><p><br>In this episode of Guardians of the Data, Dr. Sergio Sanchez, CIO of Coleman Health Services and former medical turned cybersecurity leader, breaks down the rapidly evolving world of AI-driven cyber threats. With more than 25 years in IT and security, Sergio brings a rare blend of technical insight, human understanding, and real-world experience. He digs into how AI is reshaping the attacker landscape, why non-technical employees are now prime targets, and what leaders must do today to prepare their organizations for the next wave of threats: from voice cloning and deepfake videos to hyper-personalized social engineering attacks. Sergio also shares his incredible personal journey from operating rooms in Mexico to managing technology for the Catholic Church across 50 states, to now securing one of the most mission-critical environments in healthcare.</p><p>Takeaways:</p><ul><li><strong>Train Everyone, Not Just Leadership:</strong> Security awareness and training should include all employees, not just executives. Threat actors often target those with less technical knowledge.</li><li><strong>Emphasize Caution Before Clicking:</strong> Encourage a culture of "think before you click"; whether it’s a link in an email, a text, or a message from a familiar contact.</li><li><strong>Adopt Multi-Factor Authentication (MFA): </strong>Use MFA wherever possible, and educate users on alternatives if they don’t have access to a cell phone (e.g., voice call authentication).</li><li><strong>Verify Unusual Requests:</strong> Establish code words or secondary verification steps for sensitive requests, especially those involving money or confidential information even if the request appears to come from a trusted source.</li><li><strong>Recognize the Blending of Digital and Real Life:</strong> Remind everyone that even if they don’t use social media, their digital footprint (e.g., online banking, email) can still make them a target.</li><li><strong>Support Those Afraid of Technology:</strong> Offer extra help and patience to those who are “allergic to technology.” Their lack of comfort can make them prime targets.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We are creating a monster that we are now giving the tools to destroy us.” - Dr. Sergio Sanchez</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/dr-sergio-e-sanchez/">https://www.linkedin.com/in/dr-sergio-e-sanchez/</a> </li><li>Website: <a href="https://www.colemanservices.org/">https://www.colemanservices.org/</a> </li><li>Podcast: <a href="https://podcasts.apple.com/us/podcast/behind-the-digital-curtain/id1829054726">https://podcasts.apple.com/us/podcast/behind-the-digital-curtain/id1829054726</a> </li></ul><p><br></p><p> Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are your cybersecurity practices ready for the new era of AI-generated phishing, social engineering, and real-time deepfake attacks?</p><p><br>In this episode of Guardians of the Data, Dr. Sergio Sanchez, CIO of Coleman Health Services and former medical turned cybersecurity leader, breaks down the rapidly evolving world of AI-driven cyber threats. With more than 25 years in IT and security, Sergio brings a rare blend of technical insight, human understanding, and real-world experience. He digs into how AI is reshaping the attacker landscape, why non-technical employees are now prime targets, and what leaders must do today to prepare their organizations for the next wave of threats: from voice cloning and deepfake videos to hyper-personalized social engineering attacks. Sergio also shares his incredible personal journey from operating rooms in Mexico to managing technology for the Catholic Church across 50 states, to now securing one of the most mission-critical environments in healthcare.</p><p>Takeaways:</p><ul><li><strong>Train Everyone, Not Just Leadership:</strong> Security awareness and training should include all employees, not just executives. Threat actors often target those with less technical knowledge.</li><li><strong>Emphasize Caution Before Clicking:</strong> Encourage a culture of "think before you click"; whether it’s a link in an email, a text, or a message from a familiar contact.</li><li><strong>Adopt Multi-Factor Authentication (MFA): </strong>Use MFA wherever possible, and educate users on alternatives if they don’t have access to a cell phone (e.g., voice call authentication).</li><li><strong>Verify Unusual Requests:</strong> Establish code words or secondary verification steps for sensitive requests, especially those involving money or confidential information even if the request appears to come from a trusted source.</li><li><strong>Recognize the Blending of Digital and Real Life:</strong> Remind everyone that even if they don’t use social media, their digital footprint (e.g., online banking, email) can still make them a target.</li><li><strong>Support Those Afraid of Technology:</strong> Offer extra help and patience to those who are “allergic to technology.” Their lack of comfort can make them prime targets.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We are creating a monster that we are now giving the tools to destroy us.” - Dr. Sergio Sanchez</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/dr-sergio-e-sanchez/">https://www.linkedin.com/in/dr-sergio-e-sanchez/</a> </li><li>Website: <a href="https://www.colemanservices.org/">https://www.colemanservices.org/</a> </li><li>Podcast: <a href="https://podcasts.apple.com/us/podcast/behind-the-digital-curtain/id1829054726">https://podcasts.apple.com/us/podcast/behind-the-digital-curtain/id1829054726</a> </li></ul><p><br></p><p> Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 26 Nov 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/47bb7b17/7fed2223.mp3" length="46187855" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/QB6R1lDI-BCmXFojG7W7j6vAcckWCsIxQvr02IaKT-w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNzJk/MmU1N2RmMzI2ZWY4/N2ZhZWI2NjdjOGNj/YjhkYS5wbmc.jpg"/>
      <itunes:duration>2884</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are your cybersecurity practices ready for the new era of AI-generated phishing, social engineering, and real-time deepfake attacks?</p><p><br>In this episode of Guardians of the Data, Dr. Sergio Sanchez, CIO of Coleman Health Services and former medical turned cybersecurity leader, breaks down the rapidly evolving world of AI-driven cyber threats. With more than 25 years in IT and security, Sergio brings a rare blend of technical insight, human understanding, and real-world experience. He digs into how AI is reshaping the attacker landscape, why non-technical employees are now prime targets, and what leaders must do today to prepare their organizations for the next wave of threats: from voice cloning and deepfake videos to hyper-personalized social engineering attacks. Sergio also shares his incredible personal journey from operating rooms in Mexico to managing technology for the Catholic Church across 50 states, to now securing one of the most mission-critical environments in healthcare.</p><p>Takeaways:</p><ul><li><strong>Train Everyone, Not Just Leadership:</strong> Security awareness and training should include all employees, not just executives. Threat actors often target those with less technical knowledge.</li><li><strong>Emphasize Caution Before Clicking:</strong> Encourage a culture of "think before you click"; whether it’s a link in an email, a text, or a message from a familiar contact.</li><li><strong>Adopt Multi-Factor Authentication (MFA): </strong>Use MFA wherever possible, and educate users on alternatives if they don’t have access to a cell phone (e.g., voice call authentication).</li><li><strong>Verify Unusual Requests:</strong> Establish code words or secondary verification steps for sensitive requests, especially those involving money or confidential information even if the request appears to come from a trusted source.</li><li><strong>Recognize the Blending of Digital and Real Life:</strong> Remind everyone that even if they don’t use social media, their digital footprint (e.g., online banking, email) can still make them a target.</li><li><strong>Support Those Afraid of Technology:</strong> Offer extra help and patience to those who are “allergic to technology.” Their lack of comfort can make them prime targets.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We are creating a monster that we are now giving the tools to destroy us.” - Dr. Sergio Sanchez</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/dr-sergio-e-sanchez/">https://www.linkedin.com/in/dr-sergio-e-sanchez/</a> </li><li>Website: <a href="https://www.colemanservices.org/">https://www.colemanservices.org/</a> </li><li>Podcast: <a href="https://podcasts.apple.com/us/podcast/behind-the-digital-curtain/id1829054726">https://podcasts.apple.com/us/podcast/behind-the-digital-curtain/id1829054726</a> </li></ul><p><br></p><p> Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/dr-sergio-sanchez" img="https://img.transistorcdn.com/_CPEo4BidUf022Q9irqtUHlcGOmBy5KFgq5zg33Cp1g/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NzFk/ZDVmZmU0NDhkYTc5/NGIwNWQwNzNlOTY1/NzNlOS5qcGc.jpg">Dr. Sergio Sanchez</podcast:person>
    </item>
    <item>
      <title>Know Your Crown Jewels: Discovery at the Heart - Bryan DeLuca - Guardians of the Data - Episode #17</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Know Your Crown Jewels: Discovery at the Heart - Bryan DeLuca - Guardians of the Data - Episode #17</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6afe8f01-eca3-4daf-b347-fb5444c3e1d8</guid>
      <link>https://guardiansofthedata.show/s1/17</link>
      <description>
        <![CDATA[<p>Do you <em>really</em> know what your organization’s “crown jewels” are? Or how to protect them?</p><p><br></p><p>Bryan DeLuca, Principal Cybersecurity Engineer and self-proclaimed “Swiss Army knife” for data security programs, shares why every great security strategy starts with understanding your data. With over 25 years of IT and cybersecurity experience across a variety of industries, Bryan dives into what it really means to know your “crown jewels”, the data that would stop your business cold if it were compromised. He also discusses the critical role of trust and mental health in fostering a productive and secure work environment. Additionally, Bryan offers practical advice on data protection strategies, the significance of process-driven approaches, and how to effectively implement data lineage and insider threat management.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Know Your Data:</strong> Start by identifying what your organization's most sensitive and valuable data is. This varies by industry, so tailor your approach accordingly.</li><li><strong>Engage with the Business:</strong> Build relationships with business stakeholders (like a business information security officer) to understand what data is truly critical and why.</li><li><strong>Think Like an Attacker:</strong> Consult with ethical hackers or your red team to understand what data would be most attractive to adversaries and how it might be targeted.</li><li><strong>Do Your Own Reconnaissance:</strong> Proactively research what information about your organization is available on the dark web or in hacker forums. Don’t rely solely on automated tools, get hands-on.</li><li><strong>Develop and Practice Incident Response:</strong> Go beyond compliance checklists. Create tailored incident response plans for different types of sensitive data and run realistic, unannounced tabletop exercises to test your readiness.</li><li><strong>Map and Monitor Sensitive Data:</strong> Build a data catalog or index to track where sensitive data lives, how it moves, and who accesses it. Use tagging and alerting to prioritize responses to incidents involving critical data.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We gotta get faster. And the way to do that is knowing where your sensitive data lives on your network.” - Bryan DeLuca</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/bdll/">https://www.linkedin.com/in/bdll/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Do you <em>really</em> know what your organization’s “crown jewels” are? Or how to protect them?</p><p><br></p><p>Bryan DeLuca, Principal Cybersecurity Engineer and self-proclaimed “Swiss Army knife” for data security programs, shares why every great security strategy starts with understanding your data. With over 25 years of IT and cybersecurity experience across a variety of industries, Bryan dives into what it really means to know your “crown jewels”, the data that would stop your business cold if it were compromised. He also discusses the critical role of trust and mental health in fostering a productive and secure work environment. Additionally, Bryan offers practical advice on data protection strategies, the significance of process-driven approaches, and how to effectively implement data lineage and insider threat management.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Know Your Data:</strong> Start by identifying what your organization's most sensitive and valuable data is. This varies by industry, so tailor your approach accordingly.</li><li><strong>Engage with the Business:</strong> Build relationships with business stakeholders (like a business information security officer) to understand what data is truly critical and why.</li><li><strong>Think Like an Attacker:</strong> Consult with ethical hackers or your red team to understand what data would be most attractive to adversaries and how it might be targeted.</li><li><strong>Do Your Own Reconnaissance:</strong> Proactively research what information about your organization is available on the dark web or in hacker forums. Don’t rely solely on automated tools, get hands-on.</li><li><strong>Develop and Practice Incident Response:</strong> Go beyond compliance checklists. Create tailored incident response plans for different types of sensitive data and run realistic, unannounced tabletop exercises to test your readiness.</li><li><strong>Map and Monitor Sensitive Data:</strong> Build a data catalog or index to track where sensitive data lives, how it moves, and who accesses it. Use tagging and alerting to prioritize responses to incidents involving critical data.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We gotta get faster. And the way to do that is knowing where your sensitive data lives on your network.” - Bryan DeLuca</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/bdll/">https://www.linkedin.com/in/bdll/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 20 Nov 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/41ce3cbd/92f53a2c.mp3" length="45332652" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_wTroa2aZqhb_GlUPbH6M05Lduc354OCwmRfdEKfwGk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjI2/OWIwZDQ1MjExN2Fk/ODIzZGM5YzlhMjk0/ZTdlYi5wbmc.jpg"/>
      <itunes:duration>2831</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Do you <em>really</em> know what your organization’s “crown jewels” are? Or how to protect them?</p><p><br></p><p>Bryan DeLuca, Principal Cybersecurity Engineer and self-proclaimed “Swiss Army knife” for data security programs, shares why every great security strategy starts with understanding your data. With over 25 years of IT and cybersecurity experience across a variety of industries, Bryan dives into what it really means to know your “crown jewels”, the data that would stop your business cold if it were compromised. He also discusses the critical role of trust and mental health in fostering a productive and secure work environment. Additionally, Bryan offers practical advice on data protection strategies, the significance of process-driven approaches, and how to effectively implement data lineage and insider threat management.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Know Your Data:</strong> Start by identifying what your organization's most sensitive and valuable data is. This varies by industry, so tailor your approach accordingly.</li><li><strong>Engage with the Business:</strong> Build relationships with business stakeholders (like a business information security officer) to understand what data is truly critical and why.</li><li><strong>Think Like an Attacker:</strong> Consult with ethical hackers or your red team to understand what data would be most attractive to adversaries and how it might be targeted.</li><li><strong>Do Your Own Reconnaissance:</strong> Proactively research what information about your organization is available on the dark web or in hacker forums. Don’t rely solely on automated tools, get hands-on.</li><li><strong>Develop and Practice Incident Response:</strong> Go beyond compliance checklists. Create tailored incident response plans for different types of sensitive data and run realistic, unannounced tabletop exercises to test your readiness.</li><li><strong>Map and Monitor Sensitive Data:</strong> Build a data catalog or index to track where sensitive data lives, how it moves, and who accesses it. Use tagging and alerting to prioritize responses to incidents involving critical data.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“We gotta get faster. And the way to do that is knowing where your sensitive data lives on your network.” - Bryan DeLuca</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/bdll/">https://www.linkedin.com/in/bdll/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/bryan-deluca" img="https://img.transistorcdn.com/oLrO0sIhbEO2xoH5ubLN3Wo9JOc_uZPAJW5dEcETKG8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZTU2/NDcwMmUyZDBiNjkx/M2JkMmU5ZjhhMzU3/ZjMxOC5wbmc.jpg">Bryan DeLuca</podcast:person>
    </item>
    <item>
      <title>Building an Effective Data Security Program - Matthew Gonzales - Guardians of the Data - Episode #16</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Building an Effective Data Security Program - Matthew Gonzales - Guardians of the Data - Episode #16</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">94e13d1d-f896-45c4-a3ae-c6f11f9b8d83</guid>
      <link>https://guardiansofthedata.show/s1/16</link>
      <description>
        <![CDATA[<p>Are you building a data security program that truly works or just checking the boxes for compliance? </p><p><br></p><p>In this episode of Guardians of the Data, Matthew Gonzales, Director of Data Security Engineering, shares what it really takes to build and sustain an effective data security program. Drawing from his 20 years of experience, Matthew stresses the importance of having a structured data security strategy, incorporating business objectives, control frameworks, and operating models. The conversation dives into the nuances of stakeholder engagement, effective communication, and proactive governance. Matthew also shares insights from his own journey in the industry, emphasizing the need to align data security practices with evolving technologies like AI. This episode serves as a comprehensive guide for organizations looking to fortify their data security frameworks.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Define a Clear Vision and Mission for Data Security:</strong> Start by establishing a vision and mission that aligns with your organization’s broader goals. This sets the tone and direction for your data security program.</li><li><strong>Set Specific Business Objectives:</strong> Identify concrete goals, such as global deployment of DLP or minimizing friction for end users, to guide your program’s efforts.</li><li><strong>Establish a Control/Capabilities Framework:</strong> Clearly outline what is in scope for your data security program to avoid overlap and friction with other teams (e.g., cloud security, IAM, networking).</li><li><strong>Develop a Robust Operating Model:</strong> Map out how your program will operate, including who needs to be involved (cybersecurity peers, legal, HR, privacy, infrastructure, etc.). Use tools like RACI matrices to clarify roles and responsibilities.</li><li><strong>Engage Stakeholders Early and Often:</strong> Identify key stakeholders, blockers, and influencers. Bring them together to present your strategy, gather feedback, and secure buy-in.</li><li><strong>Maintain and Update Your Operating Model Regularly:</strong> Don’t let your operating model get stale. Update it proactively (ideally monthly or quarterly) to reflect organizational and technological changes.</li><li><strong>Foster a Culture of Self-Service and Openness:</strong> Encourage employees to ask questions and seek guidance on data handling. Success is when people proactively reach out for advice.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Without a good program, you’re kind of lost in the dark, fumbling around trying to find a light switch.” - Matthew Gonzales</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/matthew-c-gonzales-64012a8/">https://www.linkedin.com/in/matthew-c-gonzales-64012a8/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are you building a data security program that truly works or just checking the boxes for compliance? </p><p><br></p><p>In this episode of Guardians of the Data, Matthew Gonzales, Director of Data Security Engineering, shares what it really takes to build and sustain an effective data security program. Drawing from his 20 years of experience, Matthew stresses the importance of having a structured data security strategy, incorporating business objectives, control frameworks, and operating models. The conversation dives into the nuances of stakeholder engagement, effective communication, and proactive governance. Matthew also shares insights from his own journey in the industry, emphasizing the need to align data security practices with evolving technologies like AI. This episode serves as a comprehensive guide for organizations looking to fortify their data security frameworks.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Define a Clear Vision and Mission for Data Security:</strong> Start by establishing a vision and mission that aligns with your organization’s broader goals. This sets the tone and direction for your data security program.</li><li><strong>Set Specific Business Objectives:</strong> Identify concrete goals, such as global deployment of DLP or minimizing friction for end users, to guide your program’s efforts.</li><li><strong>Establish a Control/Capabilities Framework:</strong> Clearly outline what is in scope for your data security program to avoid overlap and friction with other teams (e.g., cloud security, IAM, networking).</li><li><strong>Develop a Robust Operating Model:</strong> Map out how your program will operate, including who needs to be involved (cybersecurity peers, legal, HR, privacy, infrastructure, etc.). Use tools like RACI matrices to clarify roles and responsibilities.</li><li><strong>Engage Stakeholders Early and Often:</strong> Identify key stakeholders, blockers, and influencers. Bring them together to present your strategy, gather feedback, and secure buy-in.</li><li><strong>Maintain and Update Your Operating Model Regularly:</strong> Don’t let your operating model get stale. Update it proactively (ideally monthly or quarterly) to reflect organizational and technological changes.</li><li><strong>Foster a Culture of Self-Service and Openness:</strong> Encourage employees to ask questions and seek guidance on data handling. Success is when people proactively reach out for advice.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Without a good program, you’re kind of lost in the dark, fumbling around trying to find a light switch.” - Matthew Gonzales</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/matthew-c-gonzales-64012a8/">https://www.linkedin.com/in/matthew-c-gonzales-64012a8/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 13 Nov 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/055d87b3/36b27aec.mp3" length="47517304" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/F7tJFzGbk2rkMq6jO62DWn4z6pFh5a6bZhqXIWc31mc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZTQ5/YjcyZDIxMDU0MjQw/NThiMTdiZjI5NzNm/NzlkNS5wbmc.jpg"/>
      <itunes:duration>2967</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are you building a data security program that truly works or just checking the boxes for compliance? </p><p><br></p><p>In this episode of Guardians of the Data, Matthew Gonzales, Director of Data Security Engineering, shares what it really takes to build and sustain an effective data security program. Drawing from his 20 years of experience, Matthew stresses the importance of having a structured data security strategy, incorporating business objectives, control frameworks, and operating models. The conversation dives into the nuances of stakeholder engagement, effective communication, and proactive governance. Matthew also shares insights from his own journey in the industry, emphasizing the need to align data security practices with evolving technologies like AI. This episode serves as a comprehensive guide for organizations looking to fortify their data security frameworks.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Define a Clear Vision and Mission for Data Security:</strong> Start by establishing a vision and mission that aligns with your organization’s broader goals. This sets the tone and direction for your data security program.</li><li><strong>Set Specific Business Objectives:</strong> Identify concrete goals, such as global deployment of DLP or minimizing friction for end users, to guide your program’s efforts.</li><li><strong>Establish a Control/Capabilities Framework:</strong> Clearly outline what is in scope for your data security program to avoid overlap and friction with other teams (e.g., cloud security, IAM, networking).</li><li><strong>Develop a Robust Operating Model:</strong> Map out how your program will operate, including who needs to be involved (cybersecurity peers, legal, HR, privacy, infrastructure, etc.). Use tools like RACI matrices to clarify roles and responsibilities.</li><li><strong>Engage Stakeholders Early and Often:</strong> Identify key stakeholders, blockers, and influencers. Bring them together to present your strategy, gather feedback, and secure buy-in.</li><li><strong>Maintain and Update Your Operating Model Regularly:</strong> Don’t let your operating model get stale. Update it proactively (ideally monthly or quarterly) to reflect organizational and technological changes.</li><li><strong>Foster a Culture of Self-Service and Openness:</strong> Encourage employees to ask questions and seek guidance on data handling. Success is when people proactively reach out for advice.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Without a good program, you’re kind of lost in the dark, fumbling around trying to find a light switch.” - Matthew Gonzales</li></ul><p><br></p><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/matthew-c-gonzales-64012a8/">https://www.linkedin.com/in/matthew-c-gonzales-64012a8/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/matthew-gonzales" img="https://img.transistorcdn.com/lbWiINGZbzjuofiitKjcGEEgSiSphXZFDh8nNfFJHQA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jMGVi/NjMyY2VjMzFmNTMw/Zjc1NjAyMzgzOTlm/ODU5My5qcGc.jpg">Matthew Gonzales</podcast:person>
    </item>
    <item>
      <title>How to Make DLP Work in the Real World - Tobias Simpson - Guardians of the Data - Episode #15</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>How to Make DLP Work in the Real World - Tobias Simpson - Guardians of the Data - Episode #15</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86b302db-a1c5-45c1-a530-a4337656e87d</guid>
      <link>https://guardiansofthedata.show/s1/15</link>
      <description>
        <![CDATA[<p>In this episode of Guardians of the Data, Ward sits down with Tobias Simpson, Director of Data Security and Security Awareness at Kennesaw State University, to unpack the realities of data classification, governance, and loss prevention in complex organizations. With over 25 years in IT and cybersecurity, Tobias shares hard-earned lessons on building a data-first culture, getting executive buy-in, and using tools like Microsoft Purview to make DLP actually work, without breaking the business. Tobias also highlights the significance of tabletop exercises with departmental cooperation, implementing document matrices, and maintaining strong relationships with technology providers. The conversation concludes with Tobias reflecting on his career journey from help desk roles to cybersecurity leadership, and offering advice for professionals entering or advancing in the field.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Start with Data Classification Tabletop Exercises:</strong> Conduct tabletop exercises to classify and understand your organization’s data.</li><li><strong>Involve the Right People:</strong> Assign data stewards and involve all key stakeholders in data initiatives.</li><li><strong>Don’t Fear DLP “Prevention” Mode:</strong> Move beyond just monitoring to actively preventing data loss, but do so with proper support systems and communication in place.</li><li><strong>Leverage Vendor Relationships:</strong> Build strong partnerships with your technology providers to navigate platform changes and challenges.</li><li><strong>Establish Ongoing Support and Feedback Loops:</strong> Set up regular check-ins (e.g., quarterly meetings) with departments to review DLP effectiveness and address issues.</li><li><strong>Communicate and Build Awareness:</strong> Regularly communicate with high-risk departments (finance, HR, logistics) about DLP and data security. Use newsletters, training, and ongoing discussions to keep data protection top of mind.</li></ul><p><br>Quote of the Show:</p><ul><li>“You should have a strong relationship with those stakeholders and constantly talk about data loss prevention around those people.” - Tobias Simpson</li></ul><p><br>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/tobias-simpson-706b57a8/">https://www.linkedin.com/in/tobias-simpson-706b57a8/</a> </li><li>Website: <a href="https://www.kennesaw.edu/">https://www.kennesaw.edu/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Guardians of the Data, Ward sits down with Tobias Simpson, Director of Data Security and Security Awareness at Kennesaw State University, to unpack the realities of data classification, governance, and loss prevention in complex organizations. With over 25 years in IT and cybersecurity, Tobias shares hard-earned lessons on building a data-first culture, getting executive buy-in, and using tools like Microsoft Purview to make DLP actually work, without breaking the business. Tobias also highlights the significance of tabletop exercises with departmental cooperation, implementing document matrices, and maintaining strong relationships with technology providers. The conversation concludes with Tobias reflecting on his career journey from help desk roles to cybersecurity leadership, and offering advice for professionals entering or advancing in the field.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Start with Data Classification Tabletop Exercises:</strong> Conduct tabletop exercises to classify and understand your organization’s data.</li><li><strong>Involve the Right People:</strong> Assign data stewards and involve all key stakeholders in data initiatives.</li><li><strong>Don’t Fear DLP “Prevention” Mode:</strong> Move beyond just monitoring to actively preventing data loss, but do so with proper support systems and communication in place.</li><li><strong>Leverage Vendor Relationships:</strong> Build strong partnerships with your technology providers to navigate platform changes and challenges.</li><li><strong>Establish Ongoing Support and Feedback Loops:</strong> Set up regular check-ins (e.g., quarterly meetings) with departments to review DLP effectiveness and address issues.</li><li><strong>Communicate and Build Awareness:</strong> Regularly communicate with high-risk departments (finance, HR, logistics) about DLP and data security. Use newsletters, training, and ongoing discussions to keep data protection top of mind.</li></ul><p><br>Quote of the Show:</p><ul><li>“You should have a strong relationship with those stakeholders and constantly talk about data loss prevention around those people.” - Tobias Simpson</li></ul><p><br>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/tobias-simpson-706b57a8/">https://www.linkedin.com/in/tobias-simpson-706b57a8/</a> </li><li>Website: <a href="https://www.kennesaw.edu/">https://www.kennesaw.edu/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 06 Nov 2025 05:00:00 -0500</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/96ae0c52/a1ae6476.mp3" length="47427998" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/f7Rnjn6GjGasllLTbHG2JLoX8Qd5RYFgG5EeQ1hwE94/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNWNi/Yzc4ZTNhZGQxMGQx/MDFlNTU2NmVmMmJh/NWNhYi5wbmc.jpg"/>
      <itunes:duration>2961</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Guardians of the Data, Ward sits down with Tobias Simpson, Director of Data Security and Security Awareness at Kennesaw State University, to unpack the realities of data classification, governance, and loss prevention in complex organizations. With over 25 years in IT and cybersecurity, Tobias shares hard-earned lessons on building a data-first culture, getting executive buy-in, and using tools like Microsoft Purview to make DLP actually work, without breaking the business. Tobias also highlights the significance of tabletop exercises with departmental cooperation, implementing document matrices, and maintaining strong relationships with technology providers. The conversation concludes with Tobias reflecting on his career journey from help desk roles to cybersecurity leadership, and offering advice for professionals entering or advancing in the field.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Start with Data Classification Tabletop Exercises:</strong> Conduct tabletop exercises to classify and understand your organization’s data.</li><li><strong>Involve the Right People:</strong> Assign data stewards and involve all key stakeholders in data initiatives.</li><li><strong>Don’t Fear DLP “Prevention” Mode:</strong> Move beyond just monitoring to actively preventing data loss, but do so with proper support systems and communication in place.</li><li><strong>Leverage Vendor Relationships:</strong> Build strong partnerships with your technology providers to navigate platform changes and challenges.</li><li><strong>Establish Ongoing Support and Feedback Loops:</strong> Set up regular check-ins (e.g., quarterly meetings) with departments to review DLP effectiveness and address issues.</li><li><strong>Communicate and Build Awareness:</strong> Regularly communicate with high-risk departments (finance, HR, logistics) about DLP and data security. Use newsletters, training, and ongoing discussions to keep data protection top of mind.</li></ul><p><br>Quote of the Show:</p><ul><li>“You should have a strong relationship with those stakeholders and constantly talk about data loss prevention around those people.” - Tobias Simpson</li></ul><p><br>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/tobias-simpson-706b57a8/">https://www.linkedin.com/in/tobias-simpson-706b57a8/</a> </li><li>Website: <a href="https://www.kennesaw.edu/">https://www.kennesaw.edu/</a> </li></ul><p><br></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/tobias-simpson" img="https://img.transistorcdn.com/9yhwLJtI3FhReIhSQok4ezY0BJtvNeC0fTYn76PnJRc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNzlh/OGMxYTdhOTAzODM1/MDBjOGQ0NDdjNDI4/MzA3NS5qcGc.jpg">Tobias Simpson</podcast:person>
    </item>
    <item>
      <title>Building Resilient Security Champions - Christian Ghigliotty - Guardians of the Data - Episode #14</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Building Resilient Security Champions - Christian Ghigliotty - Guardians of the Data - Episode #14</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">70d2aa18-9431-4b0e-b2b1-95ce1c7bba05</guid>
      <link>https://guardiansofthedata.show/s1/14</link>
      <description>
        <![CDATA[<p>What if the key to stronger data security isn’t technology… but curiosity?</p><p>In this episode, Christian Ghigliotty, Head of Enterprise Security Engineering, joins us to unpack what it really takes to build a security-first culture in today’s AI-driven world. From champion programs to collaboration councils, Christian shares how curiosity, communication, and connection are redefining how modern teams protect data. He also opens up about his unconventional career path and why he believes writing and relationship-building are two of the most underrated skills in tech. Whether you’re leading enterprise security or just getting started in data protection, this conversation will leave you thinking differently about how trust, empathy, and engagement fuel resilience.</p><p> </p><p>Takeaways:</p><ul><li><strong>Identify and Empower Champions:</strong> Find individuals passionate about data security within your organization and empower them to act as liaisons or "champions" to bridge gaps between teams.</li><li><strong>Create a Council or Working Group:</strong> Bring together your champions or stakeholders regularly, not just for updates but for active participation, problem-solving, and sharing ownership of outcomes.</li><li><strong>Leverage Awareness Opportunities:</strong> Use events like Cybersecurity Awareness Month to elevate champions, share success stories, and recruit new advocates.</li><li><strong>Apply Your Unique Skills:</strong> Leverage your background and strengths (e.g., communication, writing, teaching) to add value in security roles, even if you come from a non-technical background.</li><li><strong>Gamify Security Initiatives:</strong> Consider using gamification (leaderboards, rewards, or friendly competition) to incentivize good security practices and increase engagement.</li><li><strong>Document and Share Successes:</strong> Regularly communicate wins and lessons learned to maintain momentum and encourage broader participation.</li><li><strong>Don’t Wait for the “Right” Time:</strong> Security awareness and improvement should be ongoing, not just tied to special months or events.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Cybersecurity doesn't always have to wait till October. Of course, we love to highlight cybersecurity awareness month, but every month we're working together on these things.” - Christian Ghigliotty</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ghigliottyc/">https://www.linkedin.com/in/ghigliottyc/</a></li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if the key to stronger data security isn’t technology… but curiosity?</p><p>In this episode, Christian Ghigliotty, Head of Enterprise Security Engineering, joins us to unpack what it really takes to build a security-first culture in today’s AI-driven world. From champion programs to collaboration councils, Christian shares how curiosity, communication, and connection are redefining how modern teams protect data. He also opens up about his unconventional career path and why he believes writing and relationship-building are two of the most underrated skills in tech. Whether you’re leading enterprise security or just getting started in data protection, this conversation will leave you thinking differently about how trust, empathy, and engagement fuel resilience.</p><p> </p><p>Takeaways:</p><ul><li><strong>Identify and Empower Champions:</strong> Find individuals passionate about data security within your organization and empower them to act as liaisons or "champions" to bridge gaps between teams.</li><li><strong>Create a Council or Working Group:</strong> Bring together your champions or stakeholders regularly, not just for updates but for active participation, problem-solving, and sharing ownership of outcomes.</li><li><strong>Leverage Awareness Opportunities:</strong> Use events like Cybersecurity Awareness Month to elevate champions, share success stories, and recruit new advocates.</li><li><strong>Apply Your Unique Skills:</strong> Leverage your background and strengths (e.g., communication, writing, teaching) to add value in security roles, even if you come from a non-technical background.</li><li><strong>Gamify Security Initiatives:</strong> Consider using gamification (leaderboards, rewards, or friendly competition) to incentivize good security practices and increase engagement.</li><li><strong>Document and Share Successes:</strong> Regularly communicate wins and lessons learned to maintain momentum and encourage broader participation.</li><li><strong>Don’t Wait for the “Right” Time:</strong> Security awareness and improvement should be ongoing, not just tied to special months or events.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Cybersecurity doesn't always have to wait till October. Of course, we love to highlight cybersecurity awareness month, but every month we're working together on these things.” - Christian Ghigliotty</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ghigliottyc/">https://www.linkedin.com/in/ghigliottyc/</a></li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 30 Oct 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/17e81470/fc19025d.mp3" length="47013902" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/g6vLWe9UkmtyuGBqU5wevC6akqj5SU2t6w91AIAIDaY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZGU1/NTMwYjExOWY5YmYz/YzQ2ZDQ5ZjcxMTgz/NzVkOS5wbmc.jpg"/>
      <itunes:duration>2935</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if the key to stronger data security isn’t technology… but curiosity?</p><p>In this episode, Christian Ghigliotty, Head of Enterprise Security Engineering, joins us to unpack what it really takes to build a security-first culture in today’s AI-driven world. From champion programs to collaboration councils, Christian shares how curiosity, communication, and connection are redefining how modern teams protect data. He also opens up about his unconventional career path and why he believes writing and relationship-building are two of the most underrated skills in tech. Whether you’re leading enterprise security or just getting started in data protection, this conversation will leave you thinking differently about how trust, empathy, and engagement fuel resilience.</p><p> </p><p>Takeaways:</p><ul><li><strong>Identify and Empower Champions:</strong> Find individuals passionate about data security within your organization and empower them to act as liaisons or "champions" to bridge gaps between teams.</li><li><strong>Create a Council or Working Group:</strong> Bring together your champions or stakeholders regularly, not just for updates but for active participation, problem-solving, and sharing ownership of outcomes.</li><li><strong>Leverage Awareness Opportunities:</strong> Use events like Cybersecurity Awareness Month to elevate champions, share success stories, and recruit new advocates.</li><li><strong>Apply Your Unique Skills:</strong> Leverage your background and strengths (e.g., communication, writing, teaching) to add value in security roles, even if you come from a non-technical background.</li><li><strong>Gamify Security Initiatives:</strong> Consider using gamification (leaderboards, rewards, or friendly competition) to incentivize good security practices and increase engagement.</li><li><strong>Document and Share Successes:</strong> Regularly communicate wins and lessons learned to maintain momentum and encourage broader participation.</li><li><strong>Don’t Wait for the “Right” Time:</strong> Security awareness and improvement should be ongoing, not just tied to special months or events.</li></ul><p><br></p><p>Quote of the Show:</p><ul><li>“Cybersecurity doesn't always have to wait till October. Of course, we love to highlight cybersecurity awareness month, but every month we're working together on these things.” - Christian Ghigliotty</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ghigliottyc/">https://www.linkedin.com/in/ghigliottyc/</a></li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/christian-ghigliotty" img="https://img.transistorcdn.com/DxR0JvvOhwmzs_Xq6x3L80CMuDTeMFLO5pRKtdepRNY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZTQ1/ZjIzZTY4N2RlNzFk/MzNmMGUwZTYzZjA1/YTJmMy5qcGc.jpg">Christian Ghigliotty</podcast:person>
    </item>
    <item>
      <title>How AI Is Reshaping Data Security - Adrian Guevara - Guardians of the Data - Episode #13</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>How AI Is Reshaping Data Security - Adrian Guevara - Guardians of the Data - Episode #13</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d97d737c-87b2-43da-b287-f25dad3e42aa</guid>
      <link>https://guardiansofthedata.show/s1/13</link>
      <description>
        <![CDATA[<p>What happens when AI adoption moves faster than your security strategy?</p><p>Today, Ward sits down with Adrian Guevara, Chief Information Security Officer at TELUS Digital Solutions, to unpack one of the biggest challenges facing organizations today: how to secure your business in an AI-driven world. Adrian brings over two decades of IT and cybersecurity experience and a refreshingly candid take on what it really takes to lead through massive change. Adrian shares insights on the impact of AI on businesses, the importance of understanding and tinkering with technology, and the crucial role of building trust and relationships within an organization. He emphasizes the need for a culture of continuous feedback and collaboration, especially in rapidly growing and technologically evolving environments. The episode also delves into Adrian's fascinating career journey from an IT director who was voluntold to be a security officer to his current role as a CISO, highlighting key strategies for navigating the ever-changing landscape of data security.</p><p> </p><p>Takeaways:</p><ul><li><strong>Ask “Can We Do It Better?”:</strong> Regularly question existing processes and tools. Encourage feedback from your team to drive continuous improvement.</li><li><strong>Create a Path of Least Resistance:</strong> Make secure, approved tools and processes as easy to use as possible to reduce the temptation for employees to circumvent security.</li><li><strong>Build a Culture of Trust and Approachability:</strong> Be visible, approachable, and responsive. Building trust makes it easier to implement change and get buy-in.</li><li><strong>Leverage Feedback for Better Security:</strong> Involve your team in decision-making, listen to their feedback, and let them help shape security policies and tool choices.</li><li><strong>Invest in Tools that Support Security:</strong> Provide employees with tools like password managers to make secure practices easier to follow.</li><li><strong>Build Relationships:</strong> Strong professional relationships help you navigate change, get buy-in, and create a more fulfilling work environment.</li><li><strong>Be Transparent and Communicate the “Why”:</strong> When implementing new policies or changes, explain the reasoning and how it benefits the team and organization.</li></ul><p>Quote of the Show:</p><ul><li>“ You gotta love what you're doing because there's gonna be hard times and there's gonna be times you have to learn things on your own. Without that love, it just makes it much harder to do.” - Adrian Guevara</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/adrian-guevara17/">https://www.linkedin.com/in/adrian-guevara17/</a> </li><li>Website: <a href="https://www.telusdigital.com/">https://www.telusdigital.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What happens when AI adoption moves faster than your security strategy?</p><p>Today, Ward sits down with Adrian Guevara, Chief Information Security Officer at TELUS Digital Solutions, to unpack one of the biggest challenges facing organizations today: how to secure your business in an AI-driven world. Adrian brings over two decades of IT and cybersecurity experience and a refreshingly candid take on what it really takes to lead through massive change. Adrian shares insights on the impact of AI on businesses, the importance of understanding and tinkering with technology, and the crucial role of building trust and relationships within an organization. He emphasizes the need for a culture of continuous feedback and collaboration, especially in rapidly growing and technologically evolving environments. The episode also delves into Adrian's fascinating career journey from an IT director who was voluntold to be a security officer to his current role as a CISO, highlighting key strategies for navigating the ever-changing landscape of data security.</p><p> </p><p>Takeaways:</p><ul><li><strong>Ask “Can We Do It Better?”:</strong> Regularly question existing processes and tools. Encourage feedback from your team to drive continuous improvement.</li><li><strong>Create a Path of Least Resistance:</strong> Make secure, approved tools and processes as easy to use as possible to reduce the temptation for employees to circumvent security.</li><li><strong>Build a Culture of Trust and Approachability:</strong> Be visible, approachable, and responsive. Building trust makes it easier to implement change and get buy-in.</li><li><strong>Leverage Feedback for Better Security:</strong> Involve your team in decision-making, listen to their feedback, and let them help shape security policies and tool choices.</li><li><strong>Invest in Tools that Support Security:</strong> Provide employees with tools like password managers to make secure practices easier to follow.</li><li><strong>Build Relationships:</strong> Strong professional relationships help you navigate change, get buy-in, and create a more fulfilling work environment.</li><li><strong>Be Transparent and Communicate the “Why”:</strong> When implementing new policies or changes, explain the reasoning and how it benefits the team and organization.</li></ul><p>Quote of the Show:</p><ul><li>“ You gotta love what you're doing because there's gonna be hard times and there's gonna be times you have to learn things on your own. Without that love, it just makes it much harder to do.” - Adrian Guevara</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/adrian-guevara17/">https://www.linkedin.com/in/adrian-guevara17/</a> </li><li>Website: <a href="https://www.telusdigital.com/">https://www.telusdigital.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 23 Oct 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/b5fce587/16832502.mp3" length="46845570" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cyg-1oMEBot_AjG9JBpJre5oMPPQqv3ME2pBYh7CQrY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yYjUz/NzhjYjRkYjg4NTRj/MjZiODhiNGY4M2Fi/OWNhZi5wbmc.jpg"/>
      <itunes:duration>2925</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What happens when AI adoption moves faster than your security strategy?</p><p>Today, Ward sits down with Adrian Guevara, Chief Information Security Officer at TELUS Digital Solutions, to unpack one of the biggest challenges facing organizations today: how to secure your business in an AI-driven world. Adrian brings over two decades of IT and cybersecurity experience and a refreshingly candid take on what it really takes to lead through massive change. Adrian shares insights on the impact of AI on businesses, the importance of understanding and tinkering with technology, and the crucial role of building trust and relationships within an organization. He emphasizes the need for a culture of continuous feedback and collaboration, especially in rapidly growing and technologically evolving environments. The episode also delves into Adrian's fascinating career journey from an IT director who was voluntold to be a security officer to his current role as a CISO, highlighting key strategies for navigating the ever-changing landscape of data security.</p><p> </p><p>Takeaways:</p><ul><li><strong>Ask “Can We Do It Better?”:</strong> Regularly question existing processes and tools. Encourage feedback from your team to drive continuous improvement.</li><li><strong>Create a Path of Least Resistance:</strong> Make secure, approved tools and processes as easy to use as possible to reduce the temptation for employees to circumvent security.</li><li><strong>Build a Culture of Trust and Approachability:</strong> Be visible, approachable, and responsive. Building trust makes it easier to implement change and get buy-in.</li><li><strong>Leverage Feedback for Better Security:</strong> Involve your team in decision-making, listen to their feedback, and let them help shape security policies and tool choices.</li><li><strong>Invest in Tools that Support Security:</strong> Provide employees with tools like password managers to make secure practices easier to follow.</li><li><strong>Build Relationships:</strong> Strong professional relationships help you navigate change, get buy-in, and create a more fulfilling work environment.</li><li><strong>Be Transparent and Communicate the “Why”:</strong> When implementing new policies or changes, explain the reasoning and how it benefits the team and organization.</li></ul><p>Quote of the Show:</p><ul><li>“ You gotta love what you're doing because there's gonna be hard times and there's gonna be times you have to learn things on your own. Without that love, it just makes it much harder to do.” - Adrian Guevara</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/adrian-guevara17/">https://www.linkedin.com/in/adrian-guevara17/</a> </li><li>Website: <a href="https://www.telusdigital.com/">https://www.telusdigital.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/adrian-guevara" img="https://img.transistorcdn.com/v54CMUQJ9zQ-brBII7-M2F3gqXUf0MJ8jkl0WPC1164/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZDBh/NzBhNDA4ZTJmMTNi/NjRjYzkxZWIzMTUx/ZjVlZC5qcGc.jpg">Adrian Guevara</podcast:person>
    </item>
    <item>
      <title>Securing AI and Reclaiming Control of Access - Kraig Faulkner - Guardians of the Data - Episode #12</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Securing AI and Reclaiming Control of Access - Kraig Faulkner - Guardians of the Data - Episode #12</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6dd0719-843b-448e-a4a3-59cdcc807466</guid>
      <link>https://guardiansofthedata.show/s1/12</link>
      <description>
        <![CDATA[<p>Are we so obsessed with new AI tools that we’ve forgotten the basics of security?</p><p>Kraig Faulkner, Field CTO at Infolock, joins the show to discuss the pressing challenges and solutions around data security, particularly focusing on AI and access control. Kraig elaborates on the importance of understanding business data, securing AI access, and the necessary steps organizations need to take to prevent data exfiltration. He shares his professional journey and thoughts on the future trends in data security, including a potential shift back to on-prem solutions and the integration of AI into larger security portfolios. The episode highlights key strategies for implementing and securing AI within organizations, making it a must-listen for security leaders.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start Small, Don’t Boil the Ocean:</strong> Begin with a manageable subset of data or a pilot group rather than trying to secure everything at once.</li><li><strong>Audit Access Regularly:</strong> Conduct regular audits to determine who has access to what data, why they have access, and whether that access is still appropriate.</li><li><strong>Implement Role-Based Access Controls (RBAC):</strong> Use RBAC to ensure only the right people have access to sensitive data, and review these controls periodically.</li><li><strong>Control AI and Tool Access:</strong> Roll out generative AI and other new tools methodically. Test with small, trusted groups before wider deployment, and avoid unsanctioned tools.</li><li><strong>Validate AI Outputs:</strong> Always verify the accuracy and appropriateness of AI-generated outputs before acting on them or sharing them.</li><li><strong>Involve HR in Identity Management:</strong> Ensure HR processes are integrated with IT to manage onboarding, offboarding, and changes in access as roles evolve.</li><li><strong>Prepare for Ongoing Change:</strong> Recognize that securing data and managing access is an ongoing process. Regularly revisit policies, tools, and practices as technology and business needs evolve.</li></ul><p>Quote of the Show:</p><ul><li>“We have gotten so fascinated with what's new, what's hot, what's moving the needle, right? And we forget about some of the basics.” - Kraig Faulkner</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/kraigfaulkner/">https://www.linkedin.com/in/kraigfaulkner/</a> </li><li>Website: <a href="https://www.infolock.com/">https://www.infolock.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are we so obsessed with new AI tools that we’ve forgotten the basics of security?</p><p>Kraig Faulkner, Field CTO at Infolock, joins the show to discuss the pressing challenges and solutions around data security, particularly focusing on AI and access control. Kraig elaborates on the importance of understanding business data, securing AI access, and the necessary steps organizations need to take to prevent data exfiltration. He shares his professional journey and thoughts on the future trends in data security, including a potential shift back to on-prem solutions and the integration of AI into larger security portfolios. The episode highlights key strategies for implementing and securing AI within organizations, making it a must-listen for security leaders.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start Small, Don’t Boil the Ocean:</strong> Begin with a manageable subset of data or a pilot group rather than trying to secure everything at once.</li><li><strong>Audit Access Regularly:</strong> Conduct regular audits to determine who has access to what data, why they have access, and whether that access is still appropriate.</li><li><strong>Implement Role-Based Access Controls (RBAC):</strong> Use RBAC to ensure only the right people have access to sensitive data, and review these controls periodically.</li><li><strong>Control AI and Tool Access:</strong> Roll out generative AI and other new tools methodically. Test with small, trusted groups before wider deployment, and avoid unsanctioned tools.</li><li><strong>Validate AI Outputs:</strong> Always verify the accuracy and appropriateness of AI-generated outputs before acting on them or sharing them.</li><li><strong>Involve HR in Identity Management:</strong> Ensure HR processes are integrated with IT to manage onboarding, offboarding, and changes in access as roles evolve.</li><li><strong>Prepare for Ongoing Change:</strong> Recognize that securing data and managing access is an ongoing process. Regularly revisit policies, tools, and practices as technology and business needs evolve.</li></ul><p>Quote of the Show:</p><ul><li>“We have gotten so fascinated with what's new, what's hot, what's moving the needle, right? And we forget about some of the basics.” - Kraig Faulkner</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/kraigfaulkner/">https://www.linkedin.com/in/kraigfaulkner/</a> </li><li>Website: <a href="https://www.infolock.com/">https://www.infolock.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 16 Oct 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/8edfa95f/ad2be5e7.mp3" length="48881742" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AxeqO8wJzbRBqinfWVy8yZk6eJSZwlJZHwcQNPrd9EI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZTNh/NGNjNWMxYzdlNDcy/YWJmYTM1Y2I0Y2Ix/M2ExZS5wbmc.jpg"/>
      <itunes:duration>3052</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are we so obsessed with new AI tools that we’ve forgotten the basics of security?</p><p>Kraig Faulkner, Field CTO at Infolock, joins the show to discuss the pressing challenges and solutions around data security, particularly focusing on AI and access control. Kraig elaborates on the importance of understanding business data, securing AI access, and the necessary steps organizations need to take to prevent data exfiltration. He shares his professional journey and thoughts on the future trends in data security, including a potential shift back to on-prem solutions and the integration of AI into larger security portfolios. The episode highlights key strategies for implementing and securing AI within organizations, making it a must-listen for security leaders.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start Small, Don’t Boil the Ocean:</strong> Begin with a manageable subset of data or a pilot group rather than trying to secure everything at once.</li><li><strong>Audit Access Regularly:</strong> Conduct regular audits to determine who has access to what data, why they have access, and whether that access is still appropriate.</li><li><strong>Implement Role-Based Access Controls (RBAC):</strong> Use RBAC to ensure only the right people have access to sensitive data, and review these controls periodically.</li><li><strong>Control AI and Tool Access:</strong> Roll out generative AI and other new tools methodically. Test with small, trusted groups before wider deployment, and avoid unsanctioned tools.</li><li><strong>Validate AI Outputs:</strong> Always verify the accuracy and appropriateness of AI-generated outputs before acting on them or sharing them.</li><li><strong>Involve HR in Identity Management:</strong> Ensure HR processes are integrated with IT to manage onboarding, offboarding, and changes in access as roles evolve.</li><li><strong>Prepare for Ongoing Change:</strong> Recognize that securing data and managing access is an ongoing process. Regularly revisit policies, tools, and practices as technology and business needs evolve.</li></ul><p>Quote of the Show:</p><ul><li>“We have gotten so fascinated with what's new, what's hot, what's moving the needle, right? And we forget about some of the basics.” - Kraig Faulkner</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/kraigfaulkner/">https://www.linkedin.com/in/kraigfaulkner/</a> </li><li>Website: <a href="https://www.infolock.com/">https://www.infolock.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/kraig-faulkner" img="https://img.transistorcdn.com/wTUYokr71lb89fzetSW0Xmvjauy6XLQ0rAjcujMgo9E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80OTdi/ZjQxYzlhNTEwY2Ey/NDNlYTA4YzExYmM4/M2ViZS5qcGc.jpg">Kraig Faulkner</podcast:person>
    </item>
    <item>
      <title>From Data Chaos to Clarity - Hans Vargas - Guardians of the Data - Episode #11</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>From Data Chaos to Clarity - Hans Vargas - Guardians of the Data - Episode #11</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2706f712-afa3-4e4c-8462-43c759d7620a</guid>
      <link>https://guardiansofthedata.show/s1/11</link>
      <description>
        <![CDATA[<p>What happens when your organization doesn’t know what it needs to protect?</p><p>Today Ward welcomes Hans Vargas, Enterprise Data Protection Lead at Marathon Petroleum Corporation, who brings over two decades of experience in cybersecurity. Hans shares insights on the importance of understanding what data needs to be protected, and the challenges organizations face in this area, especially with the adoption of cloud services. He discusses the significance of communicating the value of data protection to business leaders and data owners, and offers practical advice on data discovery, retention, and governance. Hans emphasizes the necessity of including data security considerations in the early stages of application development and innovation. He also shares his personal journey from Peru to a successful career in the U.S., highlighting the importance of mentorship, continuous learning, and proactive problem-solving in cybersecurity. This episode provides valuable strategies for integrating data security into organizational processes and fostering collaboration between cybersecurity professionals and business stakeholders.</p><p> </p><p>Takeaways:</p><ul><li><strong>Know What You Need to Protect:</strong> Start with data discovery and identify what data you have, where it is, and what is sensitive. You can't protect what you don't know exists.</li><li><strong>Engage Data Owners Directly:</strong> Build relationships with data owners, not just stakeholders. Have open conversations to understand what is truly sensitive and important to the business.</li><li><strong>Communicate the Value of Data Protection:</strong> Clearly explain to business units why data protection matters, using relatable analogies if needed (e.g., moving houses, hoarding).</li><li><strong>Establish and Strengthen Data Governance:</strong> Ensure your organization has clear data governance policies covering the entire data lifecycle from creation to disposition.</li><li><strong>Collaborate Across Teams:</strong> Work closely with data governance, legal, and business units. Data security is a two-way street; share discoveries and insights to improve overall protection.</li><li><strong>Don’t Rely Solely on Tools:</strong> Deploying a tool is not enough. Make sure processes and responsibilities are in place before or alongside technology adoption.</li><li><strong>Consider the Full CIA Triad:</strong> Don’t focus only on confidentiality. Ensure data integrity and availability are also prioritized to keep the business running smoothly.</li></ul><p>Quote of the Show:</p><ul><li>“If you don't know what you need to protect, that's a problem.” - Hans Vargas</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Website: <a href="https://www.marathonpetroleum.com/">https://www.marathonpetroleum.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What happens when your organization doesn’t know what it needs to protect?</p><p>Today Ward welcomes Hans Vargas, Enterprise Data Protection Lead at Marathon Petroleum Corporation, who brings over two decades of experience in cybersecurity. Hans shares insights on the importance of understanding what data needs to be protected, and the challenges organizations face in this area, especially with the adoption of cloud services. He discusses the significance of communicating the value of data protection to business leaders and data owners, and offers practical advice on data discovery, retention, and governance. Hans emphasizes the necessity of including data security considerations in the early stages of application development and innovation. He also shares his personal journey from Peru to a successful career in the U.S., highlighting the importance of mentorship, continuous learning, and proactive problem-solving in cybersecurity. This episode provides valuable strategies for integrating data security into organizational processes and fostering collaboration between cybersecurity professionals and business stakeholders.</p><p> </p><p>Takeaways:</p><ul><li><strong>Know What You Need to Protect:</strong> Start with data discovery and identify what data you have, where it is, and what is sensitive. You can't protect what you don't know exists.</li><li><strong>Engage Data Owners Directly:</strong> Build relationships with data owners, not just stakeholders. Have open conversations to understand what is truly sensitive and important to the business.</li><li><strong>Communicate the Value of Data Protection:</strong> Clearly explain to business units why data protection matters, using relatable analogies if needed (e.g., moving houses, hoarding).</li><li><strong>Establish and Strengthen Data Governance:</strong> Ensure your organization has clear data governance policies covering the entire data lifecycle from creation to disposition.</li><li><strong>Collaborate Across Teams:</strong> Work closely with data governance, legal, and business units. Data security is a two-way street; share discoveries and insights to improve overall protection.</li><li><strong>Don’t Rely Solely on Tools:</strong> Deploying a tool is not enough. Make sure processes and responsibilities are in place before or alongside technology adoption.</li><li><strong>Consider the Full CIA Triad:</strong> Don’t focus only on confidentiality. Ensure data integrity and availability are also prioritized to keep the business running smoothly.</li></ul><p>Quote of the Show:</p><ul><li>“If you don't know what you need to protect, that's a problem.” - Hans Vargas</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Website: <a href="https://www.marathonpetroleum.com/">https://www.marathonpetroleum.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 09 Oct 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/a072d9a2/447be9b5.mp3" length="49638389" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Z_M_Kib9RTxhTP7OycTtnOOY2fOCjnYb3S7gIn-ZdUY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zN2Qy/YjMwZTQ2Yjk3MGM5/YWM0MjlmZDViYjcz/NWY4My5wbmc.jpg"/>
      <itunes:duration>3100</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What happens when your organization doesn’t know what it needs to protect?</p><p>Today Ward welcomes Hans Vargas, Enterprise Data Protection Lead at Marathon Petroleum Corporation, who brings over two decades of experience in cybersecurity. Hans shares insights on the importance of understanding what data needs to be protected, and the challenges organizations face in this area, especially with the adoption of cloud services. He discusses the significance of communicating the value of data protection to business leaders and data owners, and offers practical advice on data discovery, retention, and governance. Hans emphasizes the necessity of including data security considerations in the early stages of application development and innovation. He also shares his personal journey from Peru to a successful career in the U.S., highlighting the importance of mentorship, continuous learning, and proactive problem-solving in cybersecurity. This episode provides valuable strategies for integrating data security into organizational processes and fostering collaboration between cybersecurity professionals and business stakeholders.</p><p> </p><p>Takeaways:</p><ul><li><strong>Know What You Need to Protect:</strong> Start with data discovery and identify what data you have, where it is, and what is sensitive. You can't protect what you don't know exists.</li><li><strong>Engage Data Owners Directly:</strong> Build relationships with data owners, not just stakeholders. Have open conversations to understand what is truly sensitive and important to the business.</li><li><strong>Communicate the Value of Data Protection:</strong> Clearly explain to business units why data protection matters, using relatable analogies if needed (e.g., moving houses, hoarding).</li><li><strong>Establish and Strengthen Data Governance:</strong> Ensure your organization has clear data governance policies covering the entire data lifecycle from creation to disposition.</li><li><strong>Collaborate Across Teams:</strong> Work closely with data governance, legal, and business units. Data security is a two-way street; share discoveries and insights to improve overall protection.</li><li><strong>Don’t Rely Solely on Tools:</strong> Deploying a tool is not enough. Make sure processes and responsibilities are in place before or alongside technology adoption.</li><li><strong>Consider the Full CIA Triad:</strong> Don’t focus only on confidentiality. Ensure data integrity and availability are also prioritized to keep the business running smoothly.</li></ul><p>Quote of the Show:</p><ul><li>“If you don't know what you need to protect, that's a problem.” - Hans Vargas</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/hansvargas/">https://www.linkedin.com/in/hansvargas/</a> </li><li>Website: <a href="https://www.marathonpetroleum.com/">https://www.marathonpetroleum.com/</a> </li></ul><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/hans-vargas" img="https://img.transistorcdn.com/oBM6_Vhjk4z2vbRhz_Ckrj8FmZSDWiDTvsOqY7IL6iI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMTFm/ZTU1MzUwYTZiNjQ2/ZjQyZGE1Nzg3MzEz/YzljMC5wbmc.jpg">Hans Vargas</podcast:person>
    </item>
    <item>
      <title>From Data Discovery to Records at Risk - Zach Luze - Guardians of the Data - Episode #10</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>From Data Discovery to Records at Risk - Zach Luze - Guardians of the Data - Episode #10</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a4db2919-127f-48a3-a4ae-4fd2d01386b6</guid>
      <link>https://guardiansofthedata.show/s1/10</link>
      <description>
        <![CDATA[<p>What’s harder than stopping a breach? Convincing leadership your data security program is worth the investment.</p><p>Zach Luze, Data Security Advisory Practice Director at TBD Cyber joins Ward today to focus on the challenges organizations face in demonstrating the value of data security. Zach explains how the inability to show value can impact budgets and resources, emphasizing that many data security programs struggle with meaningful key performance indicators (KPIs). He suggests a blended approach to data discovery and provides insights into building metrics that highlight the value of security programs. Zach also shares his career journey from an IT auditor to his current role, highlighting his work in assessing, designing, and building data security programs. The conversation touches on various aspects of data security, including data discovery, cloud transformation, insider threats, and the burgeoning role of AI in improving data detection and response. The episode concludes with Zach's predictions on AI's growing influence in data security through 2026 and advice for those looking to break into the field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Focus on Meaningful Metrics:</strong> Prioritize data security metrics that reflect real impact, not just what’s easiest to measure.</li><li><strong>Align People, Process, and Technology:</strong> Engage stakeholders across teams and ensure your data security approach integrates people, processes, and technology from the start.</li><li><strong>Eliminate Stale Data for Savings:</strong> Regularly identify and remove outdated or unused data to reduce risk and demonstrate cost savings.</li><li><strong>Adopt an Agile Discovery Mindset:</strong> Stay flexible and ready to adjust your data discovery strategy as new information and challenges arise.</li><li><strong>Look Beyond the Obvious:</strong> Investigate areas where sensitive data might be hiding, even if you don’t expect to find it there.</li><li><strong>Demonstrate Value Clearly:</strong> Communicate the benefits and results of your data security efforts to build support and momentum.</li></ul><p>Quote of the Show:</p><ul><li>“Metrics are great. Stories are just as good to back those up and through your insider threat program, that’s where you get the case notes to develop those stories.” - Zach Luze</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/zachluze/">https://www.linkedin.com/in/zachluze/</a> </li><li>Website: <a href="https://www.tbdcyber.com/">https://www.tbdcyber.com/</a> </li></ul><p>For more insights on data discovery, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/product/data-discovery-and-classification</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What’s harder than stopping a breach? Convincing leadership your data security program is worth the investment.</p><p>Zach Luze, Data Security Advisory Practice Director at TBD Cyber joins Ward today to focus on the challenges organizations face in demonstrating the value of data security. Zach explains how the inability to show value can impact budgets and resources, emphasizing that many data security programs struggle with meaningful key performance indicators (KPIs). He suggests a blended approach to data discovery and provides insights into building metrics that highlight the value of security programs. Zach also shares his career journey from an IT auditor to his current role, highlighting his work in assessing, designing, and building data security programs. The conversation touches on various aspects of data security, including data discovery, cloud transformation, insider threats, and the burgeoning role of AI in improving data detection and response. The episode concludes with Zach's predictions on AI's growing influence in data security through 2026 and advice for those looking to break into the field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Focus on Meaningful Metrics:</strong> Prioritize data security metrics that reflect real impact, not just what’s easiest to measure.</li><li><strong>Align People, Process, and Technology:</strong> Engage stakeholders across teams and ensure your data security approach integrates people, processes, and technology from the start.</li><li><strong>Eliminate Stale Data for Savings:</strong> Regularly identify and remove outdated or unused data to reduce risk and demonstrate cost savings.</li><li><strong>Adopt an Agile Discovery Mindset:</strong> Stay flexible and ready to adjust your data discovery strategy as new information and challenges arise.</li><li><strong>Look Beyond the Obvious:</strong> Investigate areas where sensitive data might be hiding, even if you don’t expect to find it there.</li><li><strong>Demonstrate Value Clearly:</strong> Communicate the benefits and results of your data security efforts to build support and momentum.</li></ul><p>Quote of the Show:</p><ul><li>“Metrics are great. Stories are just as good to back those up and through your insider threat program, that’s where you get the case notes to develop those stories.” - Zach Luze</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/zachluze/">https://www.linkedin.com/in/zachluze/</a> </li><li>Website: <a href="https://www.tbdcyber.com/">https://www.tbdcyber.com/</a> </li></ul><p>For more insights on data discovery, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/product/data-discovery-and-classification</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 02 Oct 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/81a89de4/5e3743ce.mp3" length="52052196" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9F_KAPoZuHaiUoJxkDA4Tj3UaSjbvnMxEIQBvZL3AV0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMzU3/MDJjNDIwZjE4ZDQ3/M2E3YjFmZTc2Mjdj/MGQ3Zi5wbmc.jpg"/>
      <itunes:duration>3251</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What’s harder than stopping a breach? Convincing leadership your data security program is worth the investment.</p><p>Zach Luze, Data Security Advisory Practice Director at TBD Cyber joins Ward today to focus on the challenges organizations face in demonstrating the value of data security. Zach explains how the inability to show value can impact budgets and resources, emphasizing that many data security programs struggle with meaningful key performance indicators (KPIs). He suggests a blended approach to data discovery and provides insights into building metrics that highlight the value of security programs. Zach also shares his career journey from an IT auditor to his current role, highlighting his work in assessing, designing, and building data security programs. The conversation touches on various aspects of data security, including data discovery, cloud transformation, insider threats, and the burgeoning role of AI in improving data detection and response. The episode concludes with Zach's predictions on AI's growing influence in data security through 2026 and advice for those looking to break into the field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Focus on Meaningful Metrics:</strong> Prioritize data security metrics that reflect real impact, not just what’s easiest to measure.</li><li><strong>Align People, Process, and Technology:</strong> Engage stakeholders across teams and ensure your data security approach integrates people, processes, and technology from the start.</li><li><strong>Eliminate Stale Data for Savings:</strong> Regularly identify and remove outdated or unused data to reduce risk and demonstrate cost savings.</li><li><strong>Adopt an Agile Discovery Mindset:</strong> Stay flexible and ready to adjust your data discovery strategy as new information and challenges arise.</li><li><strong>Look Beyond the Obvious:</strong> Investigate areas where sensitive data might be hiding, even if you don’t expect to find it there.</li><li><strong>Demonstrate Value Clearly:</strong> Communicate the benefits and results of your data security efforts to build support and momentum.</li></ul><p>Quote of the Show:</p><ul><li>“Metrics are great. Stories are just as good to back those up and through your insider threat program, that’s where you get the case notes to develop those stories.” - Zach Luze</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/zachluze/">https://www.linkedin.com/in/zachluze/</a> </li><li>Website: <a href="https://www.tbdcyber.com/">https://www.tbdcyber.com/</a> </li></ul><p>For more insights on data discovery, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/product/data-discovery-and-classification</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/zach-luze" img="https://img.transistorcdn.com/BaMz6YzBc0pcoDoEc4upSRD3_7-cqAPZGRPGvqrTno8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MzI1/MzRhOWJkNWI0NzUy/NmI5MWYwMGMxYzNj/Y2Y0Yi5qcGc.jpg">Zach Luze</podcast:person>
    </item>
    <item>
      <title>Tackling Data Sprawl and AI Risks - Daley Varghese - Guardians of the Data - Episode #9</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Tackling Data Sprawl and AI Risks - Daley Varghese - Guardians of the Data - Episode #9</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5bdd2e5f-7723-4abe-8b83-86b9f8efb851</guid>
      <link>https://guardiansofthedata.show/s1/9</link>
      <description>
        <![CDATA[<p>Think hackers are your biggest data threat? Think again.</p><p>Daley Varghese, a seasoned privacy expert, joins Ward Balcerzak to reveal why data sprawl and AI misuse may be even more dangerous, and what companies can do to get ahead. Daley emphasizes the importance of governance strategies, data mapping, and the need for cross-functional collaboration among privacy, security, and data governance teams. The episode also highlights the pressing need for education and clear communication within organizations to mitigate risks and build trust with consumers. Daley shares insights on how to start privacy initiatives, manage assessment fatigue, and the role of education and relationships in overcoming these challenges. Additionally, Daley provides advice for professionals looking to enter the privacy field and discusses the evolving landscape of privacy regulations.</p><p> </p><p>Takeaways:</p><ul><li><strong>Engage Governance Early:</strong> Start conversations with privacy, legal, security, and data governance professionals as early as possible in any project involving sensitive data.</li><li><strong>Keep Assessments Simple and Understandable: </strong>Design privacy and security assessments in clear, layman’s terms so business users can complete them without excessive handholding.</li><li><strong>Educate Continuously: </strong>Go beyond mandatory training. Join team meetings, host town halls, and make privacy and security topics relevant and accessible to all employees.</li><li><strong>Mitigate, Don’t Just Identify Risks:</strong> Once risks are identified, take concrete steps to address them. Add them to your roadmap and allocate resources to resolve them over time.</li><li><strong>Leverage Privacy and Security Champions:</strong> Train and empower champions within business units to advocate for privacy and security, spreading knowledge and best practices.</li><li><strong>Trust, But Verify:</strong> Always verify the output of AI and data-driven tools, especially when using external or generative AI systems.</li><li><strong>Stay Informed on Regulations:</strong> Partner with legal and policy teams, use industry tools, and pursue certifications to keep up with evolving privacy and security regulations.</li></ul><p>Quote of the Show:</p><ul><li>“No company is perfect; every company is struggling with this. It's okay to have these risks identified. What is not okay is once you know that these risks are identified, don't do nothing.” - Daley Varghese</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/daley-varghese/">https://www.linkedin.com/in/daley-varghese/</a> </li></ul><p>For more insights on data sprawl, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/use-cases/data-sprawl</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Think hackers are your biggest data threat? Think again.</p><p>Daley Varghese, a seasoned privacy expert, joins Ward Balcerzak to reveal why data sprawl and AI misuse may be even more dangerous, and what companies can do to get ahead. Daley emphasizes the importance of governance strategies, data mapping, and the need for cross-functional collaboration among privacy, security, and data governance teams. The episode also highlights the pressing need for education and clear communication within organizations to mitigate risks and build trust with consumers. Daley shares insights on how to start privacy initiatives, manage assessment fatigue, and the role of education and relationships in overcoming these challenges. Additionally, Daley provides advice for professionals looking to enter the privacy field and discusses the evolving landscape of privacy regulations.</p><p> </p><p>Takeaways:</p><ul><li><strong>Engage Governance Early:</strong> Start conversations with privacy, legal, security, and data governance professionals as early as possible in any project involving sensitive data.</li><li><strong>Keep Assessments Simple and Understandable: </strong>Design privacy and security assessments in clear, layman’s terms so business users can complete them without excessive handholding.</li><li><strong>Educate Continuously: </strong>Go beyond mandatory training. Join team meetings, host town halls, and make privacy and security topics relevant and accessible to all employees.</li><li><strong>Mitigate, Don’t Just Identify Risks:</strong> Once risks are identified, take concrete steps to address them. Add them to your roadmap and allocate resources to resolve them over time.</li><li><strong>Leverage Privacy and Security Champions:</strong> Train and empower champions within business units to advocate for privacy and security, spreading knowledge and best practices.</li><li><strong>Trust, But Verify:</strong> Always verify the output of AI and data-driven tools, especially when using external or generative AI systems.</li><li><strong>Stay Informed on Regulations:</strong> Partner with legal and policy teams, use industry tools, and pursue certifications to keep up with evolving privacy and security regulations.</li></ul><p>Quote of the Show:</p><ul><li>“No company is perfect; every company is struggling with this. It's okay to have these risks identified. What is not okay is once you know that these risks are identified, don't do nothing.” - Daley Varghese</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/daley-varghese/">https://www.linkedin.com/in/daley-varghese/</a> </li></ul><p>For more insights on data sprawl, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/use-cases/data-sprawl</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 25 Sep 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/31f30448/65a7c865.mp3" length="40471577" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HNyWNAi5mlD3dgvWLd2cI6NlKj0G4R85LmaiwkaCdSY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85YmQ1/NTU1YTIyMGVmYmYy/ZGM1Y2NiMTNmODQ3/MmUzMS5wbmc.jpg"/>
      <itunes:duration>2527</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Think hackers are your biggest data threat? Think again.</p><p>Daley Varghese, a seasoned privacy expert, joins Ward Balcerzak to reveal why data sprawl and AI misuse may be even more dangerous, and what companies can do to get ahead. Daley emphasizes the importance of governance strategies, data mapping, and the need for cross-functional collaboration among privacy, security, and data governance teams. The episode also highlights the pressing need for education and clear communication within organizations to mitigate risks and build trust with consumers. Daley shares insights on how to start privacy initiatives, manage assessment fatigue, and the role of education and relationships in overcoming these challenges. Additionally, Daley provides advice for professionals looking to enter the privacy field and discusses the evolving landscape of privacy regulations.</p><p> </p><p>Takeaways:</p><ul><li><strong>Engage Governance Early:</strong> Start conversations with privacy, legal, security, and data governance professionals as early as possible in any project involving sensitive data.</li><li><strong>Keep Assessments Simple and Understandable: </strong>Design privacy and security assessments in clear, layman’s terms so business users can complete them without excessive handholding.</li><li><strong>Educate Continuously: </strong>Go beyond mandatory training. Join team meetings, host town halls, and make privacy and security topics relevant and accessible to all employees.</li><li><strong>Mitigate, Don’t Just Identify Risks:</strong> Once risks are identified, take concrete steps to address them. Add them to your roadmap and allocate resources to resolve them over time.</li><li><strong>Leverage Privacy and Security Champions:</strong> Train and empower champions within business units to advocate for privacy and security, spreading knowledge and best practices.</li><li><strong>Trust, But Verify:</strong> Always verify the output of AI and data-driven tools, especially when using external or generative AI systems.</li><li><strong>Stay Informed on Regulations:</strong> Partner with legal and policy teams, use industry tools, and pursue certifications to keep up with evolving privacy and security regulations.</li></ul><p>Quote of the Show:</p><ul><li>“No company is perfect; every company is struggling with this. It's okay to have these risks identified. What is not okay is once you know that these risks are identified, don't do nothing.” - Daley Varghese</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/daley-varghese/">https://www.linkedin.com/in/daley-varghese/</a> </li></ul><p>For more insights on data sprawl, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/use-cases/data-sprawl</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/daley-varghese" img="https://img.transistorcdn.com/YJ8hFLG7ms85xebV6KC_ZJSdWwNfqSVz3BpFQnXpv6g/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NTRi/YzIyNTJiMGFhMzI3/YTJjYzEyMTVmYWY2/YWMwOC5qcGc.jpg">Daley Varghese</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
    </item>
    <item>
      <title>Why the Insider is the Biggest Data Security Threat - Rick Scot - Guardians of the Data - Episode #8</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Why the Insider is the Biggest Data Security Threat - Rick Scot - Guardians of the Data - Episode #8</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b88e23d4-59dc-45e5-b09f-bdb2105d638c</guid>
      <link>https://guardiansofthedata.show/s1/8</link>
      <description>
        <![CDATA[<p>How does the accidental insider pose a threat to your company’s security?</p><p>Today, Ward dives deep into data security challenges with Rick Scot, the global CISO at Elevate Textiles. With almost 20 years of cybersecurity experience, Rick emphasizes the critical importance of addressing insider threats, especially those posed by well-meaning employees unaware of their risky actions. He shares real-world experiences, the evolution of cyber awareness training, the necessity of building strong internal relationships, and insights into his multifaceted career journey. The episode is packed with expert advice for cybersecurity professionals on fostering a culture of security within an organization and tips for young professionals to find a mentor.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People in Data Security:</strong> Recognize that most data breaches are caused by insiders who make mistakes. Focus on educating and supporting employees to reduce accidental risks.</li><li><strong>Stay Vigilant Against Social Engineering:</strong> Be aware of sophisticated phishing and social engineering tactics, especially those leveraging personal information from social media and deepfakes. Always verify requests for sensitive information, even if they appear to come from trusted sources.</li><li><strong>Make Security Training Personal and Relevant:</strong> Move beyond generic, checkbox-style training. Tailor security awareness programs to real-life scenarios and make them relatable to employees’ daily experiences.</li><li><strong>Know Your Data and Its Value:</strong> Understand what data your organization holds, where it resides, and why it’s valuable. This knowledge is crucial for protecting sensitive information and responding to incidents.</li><li><strong>Build Relationships Across the Organization:</strong> Foster open communication and trust between security teams and other departments. Building relationships makes it easier for employees to ask questions and report suspicious activity.</li><li><strong>Balance Security and Trust:</strong> Implement necessary controls without creating a culture of distrust. Explain the “why” behind security measures to avoid alienating employees.</li><li><strong>Network and Seek Mentorship:</strong> Build a professional network inside and outside your organization. Seek mentors, and be open to mentoring others to grow your knowledge and resilience in the field.</li></ul><p>Quote of the Show:</p><ul><li>“ I always feel like if I have the institutional knowledge, then I can better protect the company if I understand the business.” - Rick Scot</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ricksscot/">https://www.linkedin.com/in/ricksscot/</a> </li><li>Website: <a href="https://www.elevatetextiles.com/">https://www.elevatetextiles.com/</a> </li></ul><p>For more insights on data loss prevention, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/use-cases/data-loss-prevention</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How does the accidental insider pose a threat to your company’s security?</p><p>Today, Ward dives deep into data security challenges with Rick Scot, the global CISO at Elevate Textiles. With almost 20 years of cybersecurity experience, Rick emphasizes the critical importance of addressing insider threats, especially those posed by well-meaning employees unaware of their risky actions. He shares real-world experiences, the evolution of cyber awareness training, the necessity of building strong internal relationships, and insights into his multifaceted career journey. The episode is packed with expert advice for cybersecurity professionals on fostering a culture of security within an organization and tips for young professionals to find a mentor.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People in Data Security:</strong> Recognize that most data breaches are caused by insiders who make mistakes. Focus on educating and supporting employees to reduce accidental risks.</li><li><strong>Stay Vigilant Against Social Engineering:</strong> Be aware of sophisticated phishing and social engineering tactics, especially those leveraging personal information from social media and deepfakes. Always verify requests for sensitive information, even if they appear to come from trusted sources.</li><li><strong>Make Security Training Personal and Relevant:</strong> Move beyond generic, checkbox-style training. Tailor security awareness programs to real-life scenarios and make them relatable to employees’ daily experiences.</li><li><strong>Know Your Data and Its Value:</strong> Understand what data your organization holds, where it resides, and why it’s valuable. This knowledge is crucial for protecting sensitive information and responding to incidents.</li><li><strong>Build Relationships Across the Organization:</strong> Foster open communication and trust between security teams and other departments. Building relationships makes it easier for employees to ask questions and report suspicious activity.</li><li><strong>Balance Security and Trust:</strong> Implement necessary controls without creating a culture of distrust. Explain the “why” behind security measures to avoid alienating employees.</li><li><strong>Network and Seek Mentorship:</strong> Build a professional network inside and outside your organization. Seek mentors, and be open to mentoring others to grow your knowledge and resilience in the field.</li></ul><p>Quote of the Show:</p><ul><li>“ I always feel like if I have the institutional knowledge, then I can better protect the company if I understand the business.” - Rick Scot</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ricksscot/">https://www.linkedin.com/in/ricksscot/</a> </li><li>Website: <a href="https://www.elevatetextiles.com/">https://www.elevatetextiles.com/</a> </li></ul><p>For more insights on data loss prevention, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/use-cases/data-loss-prevention</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 18 Sep 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/c3c6d480/ae69545a.mp3" length="51938802" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/G4zc2_-XIujsTIovuTrm4pORhpOpD0zmP1_JGbMBSRc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZmEy/ZjdkMDU0ZDFhYWNj/MTVmMTQzZmQyMWQ5/NzZlZS5wbmc.jpg"/>
      <itunes:duration>3243</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How does the accidental insider pose a threat to your company’s security?</p><p>Today, Ward dives deep into data security challenges with Rick Scot, the global CISO at Elevate Textiles. With almost 20 years of cybersecurity experience, Rick emphasizes the critical importance of addressing insider threats, especially those posed by well-meaning employees unaware of their risky actions. He shares real-world experiences, the evolution of cyber awareness training, the necessity of building strong internal relationships, and insights into his multifaceted career journey. The episode is packed with expert advice for cybersecurity professionals on fostering a culture of security within an organization and tips for young professionals to find a mentor.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People in Data Security:</strong> Recognize that most data breaches are caused by insiders who make mistakes. Focus on educating and supporting employees to reduce accidental risks.</li><li><strong>Stay Vigilant Against Social Engineering:</strong> Be aware of sophisticated phishing and social engineering tactics, especially those leveraging personal information from social media and deepfakes. Always verify requests for sensitive information, even if they appear to come from trusted sources.</li><li><strong>Make Security Training Personal and Relevant:</strong> Move beyond generic, checkbox-style training. Tailor security awareness programs to real-life scenarios and make them relatable to employees’ daily experiences.</li><li><strong>Know Your Data and Its Value:</strong> Understand what data your organization holds, where it resides, and why it’s valuable. This knowledge is crucial for protecting sensitive information and responding to incidents.</li><li><strong>Build Relationships Across the Organization:</strong> Foster open communication and trust between security teams and other departments. Building relationships makes it easier for employees to ask questions and report suspicious activity.</li><li><strong>Balance Security and Trust:</strong> Implement necessary controls without creating a culture of distrust. Explain the “why” behind security measures to avoid alienating employees.</li><li><strong>Network and Seek Mentorship:</strong> Build a professional network inside and outside your organization. Seek mentors, and be open to mentoring others to grow your knowledge and resilience in the field.</li></ul><p>Quote of the Show:</p><ul><li>“ I always feel like if I have the institutional knowledge, then I can better protect the company if I understand the business.” - Rick Scot</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/ricksscot/">https://www.linkedin.com/in/ricksscot/</a> </li><li>Website: <a href="https://www.elevatetextiles.com/">https://www.elevatetextiles.com/</a> </li></ul><p>For more insights on data loss prevention, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/use-cases/data-loss-prevention</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/rick-scot-aae3e327-7ed4-4d90-9105-35e498e2ebad" img="https://img.transistorcdn.com/YU1-mzB57jt4s5MZvpvAI6sIOfwwlwxpG8mhlCEizIE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NTU0/MTA0YTIyNzJlNTIw/YmQ3YjA4MDc5ODI4/OWRlZS5qcGc.jpg">Rick Scot</podcast:person>
    </item>
    <item>
      <title>Why the 'Why' is More Important than the 'What’ - Derek Fisher - Guardians of the Data - Episode #7</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Why the 'Why' is More Important than the 'What’ - Derek Fisher - Guardians of the Data - Episode #7</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69c653bc-2e83-446d-b072-222e48d2348f</guid>
      <link>https://guardiansofthedata.show/s1/7</link>
      <description>
        <![CDATA[<p>What’s the meaning behind the data your team is collecting?</p><p>Derek Fisher, Director of the Cybersecurity Defense and Information Assurance Program at Temple University, joins Ward to hash out the ‘why’ behind data security. Derek emphasizes the importance of understanding the integrity and proper usage of data, especially in scenarios like healthcare and financial services. The conversation also explores the differences in data security practices across various industries such as healthcare, financial services, and higher education. Derek shares insights on teaching the next generation of cybersecurity professionals and the relevance of the NIST NICE framework in aligning education and job roles. The episode offers practical advice for aspiring and current cybersecurity professionals on staying curious, demonstrating skills, and the importance of understanding the broader ecosystem of data security.</p><p> </p><p>Takeaways:</p><ul><li><strong>Question Every Data Collection:</strong> Before collecting any data, ask yourself if you truly need it. If the answer is no, don’t collect it. This reduces your responsibility to protect unnecessary information and minimizes risk.</li><li><strong>Show Your Work and Stand Out:</strong> Document and share your work, especially if you’re entering a new field like cybersecurity. Demonstrating your process and achievements helps you differentiate yourself from others.</li><li><strong>Data Minimization for Security:</strong> Avoid collecting data just because you might need it in the future. Every piece of data you store increases your attack surface. Only collect what is essential to reduce potential vulnerabilities.</li><li><strong>Use the NIST NICE Framework for Career Growth:</strong> Leverage frameworks like NIST NICE to understand the skills and knowledge required for specific roles. This can help you target your learning and career development more effectively.</li><li><strong>Stay Curious and Threat Model:</strong> Maintain a curious mindset and always think like an attacker. Regularly ask, “What can go wrong?” and “What will we do about it?” Practicing basic threat modeling is a critical skill for navigating today’s security landscape.</li><li><strong>Risk-Based Approach to Data Decryption:</strong> When deciding whether to decrypt data, use a risk-based approach. Work with legal and HR teams to set clear guidelines and avoid decrypting sensitive categories like healthcare unless necessary.</li></ul><p>Quote of the Show:</p><ul><li>“ For me, teaching this next generation of cyber individuals or technologists, it's about showing them sort of the entire picture.” - Derek Fisher</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/derek-fisher-sec-arch/">https://www.linkedin.com/in/derek-fisher-sec-arch/</a> </li><li>Website: <a href="https://www.securelybuilt.com/">https://www.securelybuilt.com/</a> </li><li>Substack: <a href="https://substack.com/@securelybuilt">https://substack.com/@securelybuilt</a></li></ul><p>For more insights on data security posture management, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/data-security-posture-management</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What’s the meaning behind the data your team is collecting?</p><p>Derek Fisher, Director of the Cybersecurity Defense and Information Assurance Program at Temple University, joins Ward to hash out the ‘why’ behind data security. Derek emphasizes the importance of understanding the integrity and proper usage of data, especially in scenarios like healthcare and financial services. The conversation also explores the differences in data security practices across various industries such as healthcare, financial services, and higher education. Derek shares insights on teaching the next generation of cybersecurity professionals and the relevance of the NIST NICE framework in aligning education and job roles. The episode offers practical advice for aspiring and current cybersecurity professionals on staying curious, demonstrating skills, and the importance of understanding the broader ecosystem of data security.</p><p> </p><p>Takeaways:</p><ul><li><strong>Question Every Data Collection:</strong> Before collecting any data, ask yourself if you truly need it. If the answer is no, don’t collect it. This reduces your responsibility to protect unnecessary information and minimizes risk.</li><li><strong>Show Your Work and Stand Out:</strong> Document and share your work, especially if you’re entering a new field like cybersecurity. Demonstrating your process and achievements helps you differentiate yourself from others.</li><li><strong>Data Minimization for Security:</strong> Avoid collecting data just because you might need it in the future. Every piece of data you store increases your attack surface. Only collect what is essential to reduce potential vulnerabilities.</li><li><strong>Use the NIST NICE Framework for Career Growth:</strong> Leverage frameworks like NIST NICE to understand the skills and knowledge required for specific roles. This can help you target your learning and career development more effectively.</li><li><strong>Stay Curious and Threat Model:</strong> Maintain a curious mindset and always think like an attacker. Regularly ask, “What can go wrong?” and “What will we do about it?” Practicing basic threat modeling is a critical skill for navigating today’s security landscape.</li><li><strong>Risk-Based Approach to Data Decryption:</strong> When deciding whether to decrypt data, use a risk-based approach. Work with legal and HR teams to set clear guidelines and avoid decrypting sensitive categories like healthcare unless necessary.</li></ul><p>Quote of the Show:</p><ul><li>“ For me, teaching this next generation of cyber individuals or technologists, it's about showing them sort of the entire picture.” - Derek Fisher</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/derek-fisher-sec-arch/">https://www.linkedin.com/in/derek-fisher-sec-arch/</a> </li><li>Website: <a href="https://www.securelybuilt.com/">https://www.securelybuilt.com/</a> </li><li>Substack: <a href="https://substack.com/@securelybuilt">https://substack.com/@securelybuilt</a></li></ul><p>For more insights on data security posture management, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/data-security-posture-management</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 11 Sep 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/9a5a1712/512bd2d8.mp3" length="55043569" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HUSaNPMDCIbTyeKbeXo5beQwoEnzaJJQ7yGR6_54gTE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMDc5/YjIxZjlkZDVhNjI3/OWQ3NTU3YWRiOGIz/Nzk3ZC5wbmc.jpg"/>
      <itunes:duration>3436</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What’s the meaning behind the data your team is collecting?</p><p>Derek Fisher, Director of the Cybersecurity Defense and Information Assurance Program at Temple University, joins Ward to hash out the ‘why’ behind data security. Derek emphasizes the importance of understanding the integrity and proper usage of data, especially in scenarios like healthcare and financial services. The conversation also explores the differences in data security practices across various industries such as healthcare, financial services, and higher education. Derek shares insights on teaching the next generation of cybersecurity professionals and the relevance of the NIST NICE framework in aligning education and job roles. The episode offers practical advice for aspiring and current cybersecurity professionals on staying curious, demonstrating skills, and the importance of understanding the broader ecosystem of data security.</p><p> </p><p>Takeaways:</p><ul><li><strong>Question Every Data Collection:</strong> Before collecting any data, ask yourself if you truly need it. If the answer is no, don’t collect it. This reduces your responsibility to protect unnecessary information and minimizes risk.</li><li><strong>Show Your Work and Stand Out:</strong> Document and share your work, especially if you’re entering a new field like cybersecurity. Demonstrating your process and achievements helps you differentiate yourself from others.</li><li><strong>Data Minimization for Security:</strong> Avoid collecting data just because you might need it in the future. Every piece of data you store increases your attack surface. Only collect what is essential to reduce potential vulnerabilities.</li><li><strong>Use the NIST NICE Framework for Career Growth:</strong> Leverage frameworks like NIST NICE to understand the skills and knowledge required for specific roles. This can help you target your learning and career development more effectively.</li><li><strong>Stay Curious and Threat Model:</strong> Maintain a curious mindset and always think like an attacker. Regularly ask, “What can go wrong?” and “What will we do about it?” Practicing basic threat modeling is a critical skill for navigating today’s security landscape.</li><li><strong>Risk-Based Approach to Data Decryption:</strong> When deciding whether to decrypt data, use a risk-based approach. Work with legal and HR teams to set clear guidelines and avoid decrypting sensitive categories like healthcare unless necessary.</li></ul><p>Quote of the Show:</p><ul><li>“ For me, teaching this next generation of cyber individuals or technologists, it's about showing them sort of the entire picture.” - Derek Fisher</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/derek-fisher-sec-arch/">https://www.linkedin.com/in/derek-fisher-sec-arch/</a> </li><li>Website: <a href="https://www.securelybuilt.com/">https://www.securelybuilt.com/</a> </li><li>Substack: <a href="https://substack.com/@securelybuilt">https://substack.com/@securelybuilt</a></li></ul><p>For more insights on data security posture management, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/data-security-posture-management</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/derek-fisher" img="https://img.transistorcdn.com/AUixSlPuZF-YHIRt0Es9qs4WT1OoMasoq7MQSXWwp2o/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMTdi/MmU3OGY4Y2QwZWRj/YjRkYTViODRiYmU1/M2YwZi5qcGc.jpg">Derek Fisher</podcast:person>
    </item>
    <item>
      <title>Cybersecurity’s Weakest Link: Human Risk - Lisa Gunning - Guardians of the Data - Episode #6</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Cybersecurity’s Weakest Link: Human Risk - Lisa Gunning - Guardians of the Data - Episode #6</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d91912b9-0cd2-4064-a422-666703425bf9</guid>
      <link>https://guardiansofthedata.show/s1/6</link>
      <description>
        <![CDATA[<p>Human risk is the most unpredictable factor in cybersecurity and insider risk.</p><p>Lisa Gunning, a counterintelligence and insider risk expert with over 18 years of experience in both the public and private sectors, joins Ward today to dive into human risk. Lisa shares her unique perspective on the human element in cybersecurity, the evolving landscape of insider threats, and the critical importance of building a strong security culture within organizations. The conversation covers the intersection of AI, human behavior, and data protection, offering practical advice for organizations of all sizes. She provides actionable recommendations and stories around her experiences that any listener can benefit from.</p><p> </p><p>Takeaways:</p><ul><li><strong>Recognize the Human Element:</strong> Understand that human behavior is often the biggest risk in data security. Both intentional and accidental actions by insiders can create vulnerabilities.</li><li><strong>Foster Security Culture:</strong> Build a culture where security is everyone’s responsibility. Encourage open conversations about risks and make security policies clear and rational.</li><li><strong>Partner Across Departments:</strong> Collaborate with stakeholders like HR, compliance, IT, and business leaders to address insider risk from multiple angles.</li><li><strong>Iterate Policies:</strong> Keep security and data policies up to date. Make them flexible enough to adapt to new technologies and edge cases, rather than relying on rigid, outdated rules.</li><li><strong>Monitor for Insider Threats:</strong> Identify high-risk individuals and roles, not just executives or IT admins, but anyone with access to sensitive data or mission-critical processes.</li><li><strong>Leverage Counterintelligence Tactics:</strong> Use counterintelligence strategies to understand what assets are valuable to adversaries and how your organization might be targeted.</li><li><strong>Be Transparent About AI Tools:</strong> Set clear guidelines for the use of AI note-takers and other digital assistants, especially in confidential meetings.</li></ul><p>Quote of the Show:</p><ul><li>“Human behavior is the biggest risk. We are an unpredictable, ever-evolving group, and as a very wise colleague of mine once said, humans are gonna human.” - Lisa Gunning</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lisa-gunning/">https://www.linkedin.com/in/lisa-gunning/</a> </li><li>Website: <a href="https://www.vaillancegroup.com/">https://www.vaillancegroup.com/</a> </li><li>Substack: <a href="https://lotstounpackthere.substack.com/">https://lotstounpackthere.substack.com/</a>  </li></ul><p>For more insights on generative AI risks, visit: <a href="https://www.sentra.io/learn/ghosts-in-the-model-uncovering-generative-ai-risks">https://www.sentra.io/learn/ghosts-in-the-model-uncovering-generative-ai-risks</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Human risk is the most unpredictable factor in cybersecurity and insider risk.</p><p>Lisa Gunning, a counterintelligence and insider risk expert with over 18 years of experience in both the public and private sectors, joins Ward today to dive into human risk. Lisa shares her unique perspective on the human element in cybersecurity, the evolving landscape of insider threats, and the critical importance of building a strong security culture within organizations. The conversation covers the intersection of AI, human behavior, and data protection, offering practical advice for organizations of all sizes. She provides actionable recommendations and stories around her experiences that any listener can benefit from.</p><p> </p><p>Takeaways:</p><ul><li><strong>Recognize the Human Element:</strong> Understand that human behavior is often the biggest risk in data security. Both intentional and accidental actions by insiders can create vulnerabilities.</li><li><strong>Foster Security Culture:</strong> Build a culture where security is everyone’s responsibility. Encourage open conversations about risks and make security policies clear and rational.</li><li><strong>Partner Across Departments:</strong> Collaborate with stakeholders like HR, compliance, IT, and business leaders to address insider risk from multiple angles.</li><li><strong>Iterate Policies:</strong> Keep security and data policies up to date. Make them flexible enough to adapt to new technologies and edge cases, rather than relying on rigid, outdated rules.</li><li><strong>Monitor for Insider Threats:</strong> Identify high-risk individuals and roles, not just executives or IT admins, but anyone with access to sensitive data or mission-critical processes.</li><li><strong>Leverage Counterintelligence Tactics:</strong> Use counterintelligence strategies to understand what assets are valuable to adversaries and how your organization might be targeted.</li><li><strong>Be Transparent About AI Tools:</strong> Set clear guidelines for the use of AI note-takers and other digital assistants, especially in confidential meetings.</li></ul><p>Quote of the Show:</p><ul><li>“Human behavior is the biggest risk. We are an unpredictable, ever-evolving group, and as a very wise colleague of mine once said, humans are gonna human.” - Lisa Gunning</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lisa-gunning/">https://www.linkedin.com/in/lisa-gunning/</a> </li><li>Website: <a href="https://www.vaillancegroup.com/">https://www.vaillancegroup.com/</a> </li><li>Substack: <a href="https://lotstounpackthere.substack.com/">https://lotstounpackthere.substack.com/</a>  </li></ul><p>For more insights on generative AI risks, visit: <a href="https://www.sentra.io/learn/ghosts-in-the-model-uncovering-generative-ai-risks">https://www.sentra.io/learn/ghosts-in-the-model-uncovering-generative-ai-risks</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 04 Sep 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/72117df4/58206855.mp3" length="53288279" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/i5ByZ7HAbYu_L4rI2qGr3Tq67Hk7kp1IFYbatB5E3SY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MDM3/MzliNmRlODNjNmFh/ZThkYTUyOTY4ZGZj/OThjMC5wbmc.jpg"/>
      <itunes:duration>3328</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Human risk is the most unpredictable factor in cybersecurity and insider risk.</p><p>Lisa Gunning, a counterintelligence and insider risk expert with over 18 years of experience in both the public and private sectors, joins Ward today to dive into human risk. Lisa shares her unique perspective on the human element in cybersecurity, the evolving landscape of insider threats, and the critical importance of building a strong security culture within organizations. The conversation covers the intersection of AI, human behavior, and data protection, offering practical advice for organizations of all sizes. She provides actionable recommendations and stories around her experiences that any listener can benefit from.</p><p> </p><p>Takeaways:</p><ul><li><strong>Recognize the Human Element:</strong> Understand that human behavior is often the biggest risk in data security. Both intentional and accidental actions by insiders can create vulnerabilities.</li><li><strong>Foster Security Culture:</strong> Build a culture where security is everyone’s responsibility. Encourage open conversations about risks and make security policies clear and rational.</li><li><strong>Partner Across Departments:</strong> Collaborate with stakeholders like HR, compliance, IT, and business leaders to address insider risk from multiple angles.</li><li><strong>Iterate Policies:</strong> Keep security and data policies up to date. Make them flexible enough to adapt to new technologies and edge cases, rather than relying on rigid, outdated rules.</li><li><strong>Monitor for Insider Threats:</strong> Identify high-risk individuals and roles, not just executives or IT admins, but anyone with access to sensitive data or mission-critical processes.</li><li><strong>Leverage Counterintelligence Tactics:</strong> Use counterintelligence strategies to understand what assets are valuable to adversaries and how your organization might be targeted.</li><li><strong>Be Transparent About AI Tools:</strong> Set clear guidelines for the use of AI note-takers and other digital assistants, especially in confidential meetings.</li></ul><p>Quote of the Show:</p><ul><li>“Human behavior is the biggest risk. We are an unpredictable, ever-evolving group, and as a very wise colleague of mine once said, humans are gonna human.” - Lisa Gunning</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lisa-gunning/">https://www.linkedin.com/in/lisa-gunning/</a> </li><li>Website: <a href="https://www.vaillancegroup.com/">https://www.vaillancegroup.com/</a> </li><li>Substack: <a href="https://lotstounpackthere.substack.com/">https://lotstounpackthere.substack.com/</a>  </li></ul><p>For more insights on generative AI risks, visit: <a href="https://www.sentra.io/learn/ghosts-in-the-model-uncovering-generative-ai-risks">https://www.sentra.io/learn/ghosts-in-the-model-uncovering-generative-ai-risks</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/lisa-gunning" img="https://img.transistorcdn.com/RbWFYp3P_w3tGsxPuMPubUbl5swAsiFItmnacFA50uE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNWFk/NjMyOWU5NGVhYWRk/MDg2NDA1MzNhMGE0/ZTU1NS5qcGc.jpg">Lisa Gunning</podcast:person>
    </item>
    <item>
      <title>The Data Dilemma: Governance vs. Stewardship - Lance Fischer- Guardians of the Data - Episode #5</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>The Data Dilemma: Governance vs. Stewardship - Lance Fischer- Guardians of the Data - Episode #5</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b02df572-1c58-4ae0-ba87-c101cec0911c</guid>
      <link>https://guardiansofthedata.show/s1/5</link>
      <description>
        <![CDATA[<p>What’s the balance between data governance and data stewardship?</p><p>Lance Fischer, Principal Security Architect at Guidepoint Security, joins the show today and dives into the complexities of data security, highlighting the differences between data governance and data stewardship. He emphasizes the significance of visibility and collaboration among stakeholders in maintaining robust data security frameworks. Lance shares insights from his extensive career, revealing the practical challenges and strategies in improving data security through governance, tool rationalization, and pragmatic approaches. The discussion also touches on the evolving landscape of AI, APIs, and the critical importance of securing sensitive data. This episode provides a comprehensive look into the foundational aspects of data security and offers practical advice for organizations to enhance their data protection efforts.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Visibility First:</strong> Before implementing controls or buying tools, ensure you have a clear understanding of what data you have, where it resides, and how it flows within your organization.</li><li><strong>Clarify Data Governance vs. Data Stewardship:</strong> Define clear roles. Governance sets the policies and rules; stewardship ensures those rules are applied consistently. Foster communication and cooperation between these groups.</li><li><strong>Start Small and Scale:</strong> Don’t try to solve everything at once. Tackle visibility and controls in manageable pieces. Focus on a subset of data or a specific business unit to build momentum.</li><li><strong>Engage Stakeholders Across the Business:</strong> Involve HR, Legal, IT, and business units early to ensure policies are practical and have buy-in. Encourage open dialogue rather than top-down mandates.</li><li><strong>Understand and Plan for Resource Needs:</strong> Assess the people, time, and budget required for data security initiatives before launching. Avoid overburdening staff with too many roles; dedicate resources where possible.</li><li><strong>Document Decisions and Processes:</strong> Track inputs and outputs from governance meetings and policy changes for audit and continuous improvement.</li><li><strong>Anticipate and Manage Tool Sprawl: </strong>Regularly review existing tools for effectiveness and eliminate redundant or unused solutions. Don’t assume swapping tools will solve underlying process or visibility issues.</li></ul><p>Quote of the Show:</p><ul><li>“What we're talking about here is not visibility, just from putting in a DLP tool. We're also talking about business: having those conversations between real humans to get a sense for what's going on.” - Lance Fischer</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lance-fischer-a0301219/">https://www.linkedin.com/in/lance-fischer-a0301219/</a> </li><li>Website: <a href="https://www.guidepointsecurity.com/">https://www.guidepointsecurity.com/</a> </li></ul><p>For more insights on data security posture management, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/data-security-posture-management</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What’s the balance between data governance and data stewardship?</p><p>Lance Fischer, Principal Security Architect at Guidepoint Security, joins the show today and dives into the complexities of data security, highlighting the differences between data governance and data stewardship. He emphasizes the significance of visibility and collaboration among stakeholders in maintaining robust data security frameworks. Lance shares insights from his extensive career, revealing the practical challenges and strategies in improving data security through governance, tool rationalization, and pragmatic approaches. The discussion also touches on the evolving landscape of AI, APIs, and the critical importance of securing sensitive data. This episode provides a comprehensive look into the foundational aspects of data security and offers practical advice for organizations to enhance their data protection efforts.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Visibility First:</strong> Before implementing controls or buying tools, ensure you have a clear understanding of what data you have, where it resides, and how it flows within your organization.</li><li><strong>Clarify Data Governance vs. Data Stewardship:</strong> Define clear roles. Governance sets the policies and rules; stewardship ensures those rules are applied consistently. Foster communication and cooperation between these groups.</li><li><strong>Start Small and Scale:</strong> Don’t try to solve everything at once. Tackle visibility and controls in manageable pieces. Focus on a subset of data or a specific business unit to build momentum.</li><li><strong>Engage Stakeholders Across the Business:</strong> Involve HR, Legal, IT, and business units early to ensure policies are practical and have buy-in. Encourage open dialogue rather than top-down mandates.</li><li><strong>Understand and Plan for Resource Needs:</strong> Assess the people, time, and budget required for data security initiatives before launching. Avoid overburdening staff with too many roles; dedicate resources where possible.</li><li><strong>Document Decisions and Processes:</strong> Track inputs and outputs from governance meetings and policy changes for audit and continuous improvement.</li><li><strong>Anticipate and Manage Tool Sprawl: </strong>Regularly review existing tools for effectiveness and eliminate redundant or unused solutions. Don’t assume swapping tools will solve underlying process or visibility issues.</li></ul><p>Quote of the Show:</p><ul><li>“What we're talking about here is not visibility, just from putting in a DLP tool. We're also talking about business: having those conversations between real humans to get a sense for what's going on.” - Lance Fischer</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lance-fischer-a0301219/">https://www.linkedin.com/in/lance-fischer-a0301219/</a> </li><li>Website: <a href="https://www.guidepointsecurity.com/">https://www.guidepointsecurity.com/</a> </li></ul><p>For more insights on data security posture management, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/data-security-posture-management</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 28 Aug 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/5f3dfcdc/a6883b2c.mp3" length="47120188" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9cJmLiyJtsnTm8BftGXIDzK-4Ag4Aa0EeR23iXFl_l8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYjE1/NmU2N2I5MmE2MTA0/MWUxZTc0MTc2YmQ2/OGNjYi5wbmc.jpg"/>
      <itunes:duration>2942</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What’s the balance between data governance and data stewardship?</p><p>Lance Fischer, Principal Security Architect at Guidepoint Security, joins the show today and dives into the complexities of data security, highlighting the differences between data governance and data stewardship. He emphasizes the significance of visibility and collaboration among stakeholders in maintaining robust data security frameworks. Lance shares insights from his extensive career, revealing the practical challenges and strategies in improving data security through governance, tool rationalization, and pragmatic approaches. The discussion also touches on the evolving landscape of AI, APIs, and the critical importance of securing sensitive data. This episode provides a comprehensive look into the foundational aspects of data security and offers practical advice for organizations to enhance their data protection efforts.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize Visibility First:</strong> Before implementing controls or buying tools, ensure you have a clear understanding of what data you have, where it resides, and how it flows within your organization.</li><li><strong>Clarify Data Governance vs. Data Stewardship:</strong> Define clear roles. Governance sets the policies and rules; stewardship ensures those rules are applied consistently. Foster communication and cooperation between these groups.</li><li><strong>Start Small and Scale:</strong> Don’t try to solve everything at once. Tackle visibility and controls in manageable pieces. Focus on a subset of data or a specific business unit to build momentum.</li><li><strong>Engage Stakeholders Across the Business:</strong> Involve HR, Legal, IT, and business units early to ensure policies are practical and have buy-in. Encourage open dialogue rather than top-down mandates.</li><li><strong>Understand and Plan for Resource Needs:</strong> Assess the people, time, and budget required for data security initiatives before launching. Avoid overburdening staff with too many roles; dedicate resources where possible.</li><li><strong>Document Decisions and Processes:</strong> Track inputs and outputs from governance meetings and policy changes for audit and continuous improvement.</li><li><strong>Anticipate and Manage Tool Sprawl: </strong>Regularly review existing tools for effectiveness and eliminate redundant or unused solutions. Don’t assume swapping tools will solve underlying process or visibility issues.</li></ul><p>Quote of the Show:</p><ul><li>“What we're talking about here is not visibility, just from putting in a DLP tool. We're also talking about business: having those conversations between real humans to get a sense for what's going on.” - Lance Fischer</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/lance-fischer-a0301219/">https://www.linkedin.com/in/lance-fischer-a0301219/</a> </li><li>Website: <a href="https://www.guidepointsecurity.com/">https://www.guidepointsecurity.com/</a> </li></ul><p>For more insights on data security posture management, visit: <a href="https://www.sentra.io/data-security-posture-management">https://www.sentra.io/data-security-posture-management</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/lance-fischer" img="https://img.transistorcdn.com/0QZ3fg_ohBVLsgjptOTuMvAR5XEnZ26DLWy7nSpH0kk/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YWJm/OTJiMmQ3MzYyOTEy/ZjljN2I3NjY2ZGE5/NjEzYi5wbmc.jpg">Lance Fischer</podcast:person>
    </item>
    <item>
      <title>The 5 Pillars of Data Protection - Trevor Dolan - Guardians of the Data - Episode #4</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>The 5 Pillars of Data Protection - Trevor Dolan - Guardians of the Data - Episode #4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ed329018-6554-40dc-ab54-660551874250</guid>
      <link>https://guardiansofthedata.show/s1/4</link>
      <description>
        <![CDATA[<p>How can cybersecurity professionals balance both the regulatory requirements and the fundamentals of data protection?</p><p>Today, Trevor Dolan, Cyber Security Executive Advisor at NinjaJobs, shares insights on balancing regulatory compliance with the fundamentals of data protection, designing holistic data protection programs, and the importance of strategic planning. He delves into the five main areas of developing data protection organizations: governance and leadership, risk assessment, policies and procedures, training and awareness, and team and organizational structure. Trevor also offers practical advice for young professionals starting in the field and discusses the significance of building trustworthy relationships with stakeholders. For organizations facing budget and hiring challenges, he suggests prioritizing top-risk areas and leveraging existing resources effectively. The episode concludes with Trevor reflecting on his career journey and sharing his contact information for further connection.</p><p> </p><p>Takeaways:</p><ul><li><strong>Establish Strong Governance and Leadership: </strong>Build a solid foundation by defining the scope of your data protection program.</li><li><strong>Conduct a Comprehensive Risk Assessment:</strong> Use frameworks like NIST CSF or CIS Controls to assess your current state and maturity. Be honest about gaps and deficiencies; use data to drive consensus and prioritize improvements.</li><li><strong>Develop and Maintain Clear Policies and Procedures:</strong> Ensure policies map directly to regulatory, legal, and contractual requirements. Create a hierarchy: policies, procedures, standards, and control implementation patterns.</li><li><strong>Invest in Targeted Training and Awareness:</strong> Go beyond generic security training; provide specific modules for privacy, incident management, and data protection. Reinforce training with assessments that encourage critical thinking, not just box-checking.</li><li><strong>Be Flexible and Resourceful with Budget and Staffing:</strong> If faced with budget or hiring freezes, focus on top-priority risks and use available tools creatively (“gold, silver, bronze” approach).</li><li><strong>Use Data to Drive Decisions and Build Consensus:</strong> Bring objective data to stakeholder discussions to resolve disagreements and focus on solving real problems.</li><li><strong>Continuously Improve and Adapt: </strong>Treat your data protection program as a living, evolving effort. Regularly revisit your risk assessments, policies, and training to ensure they remain effective and aligned with business objectives.</li></ul><p>Quote of the Show:</p><ul><li>“Make sure that those expectations are well communicated, but do it in a way that helps them to really incorporate that in their day-to-day so that they feel empowered as far as protecting the organization's data, and they feel part of the mission.” - Trevor Dolan</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/trevor-dolan-91a1ab12/">https://www.linkedin.com/in/trevor-dolan-91a1ab12/</a> </li></ul><p>For more insights on data privacy and compliance, visit: <a href="https://www.sentra.io/use-cases/data-privacy-and-compliance">https://www.sentra.io/use-cases/data-privacy-and-compliance</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How can cybersecurity professionals balance both the regulatory requirements and the fundamentals of data protection?</p><p>Today, Trevor Dolan, Cyber Security Executive Advisor at NinjaJobs, shares insights on balancing regulatory compliance with the fundamentals of data protection, designing holistic data protection programs, and the importance of strategic planning. He delves into the five main areas of developing data protection organizations: governance and leadership, risk assessment, policies and procedures, training and awareness, and team and organizational structure. Trevor also offers practical advice for young professionals starting in the field and discusses the significance of building trustworthy relationships with stakeholders. For organizations facing budget and hiring challenges, he suggests prioritizing top-risk areas and leveraging existing resources effectively. The episode concludes with Trevor reflecting on his career journey and sharing his contact information for further connection.</p><p> </p><p>Takeaways:</p><ul><li><strong>Establish Strong Governance and Leadership: </strong>Build a solid foundation by defining the scope of your data protection program.</li><li><strong>Conduct a Comprehensive Risk Assessment:</strong> Use frameworks like NIST CSF or CIS Controls to assess your current state and maturity. Be honest about gaps and deficiencies; use data to drive consensus and prioritize improvements.</li><li><strong>Develop and Maintain Clear Policies and Procedures:</strong> Ensure policies map directly to regulatory, legal, and contractual requirements. Create a hierarchy: policies, procedures, standards, and control implementation patterns.</li><li><strong>Invest in Targeted Training and Awareness:</strong> Go beyond generic security training; provide specific modules for privacy, incident management, and data protection. Reinforce training with assessments that encourage critical thinking, not just box-checking.</li><li><strong>Be Flexible and Resourceful with Budget and Staffing:</strong> If faced with budget or hiring freezes, focus on top-priority risks and use available tools creatively (“gold, silver, bronze” approach).</li><li><strong>Use Data to Drive Decisions and Build Consensus:</strong> Bring objective data to stakeholder discussions to resolve disagreements and focus on solving real problems.</li><li><strong>Continuously Improve and Adapt: </strong>Treat your data protection program as a living, evolving effort. Regularly revisit your risk assessments, policies, and training to ensure they remain effective and aligned with business objectives.</li></ul><p>Quote of the Show:</p><ul><li>“Make sure that those expectations are well communicated, but do it in a way that helps them to really incorporate that in their day-to-day so that they feel empowered as far as protecting the organization's data, and they feel part of the mission.” - Trevor Dolan</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/trevor-dolan-91a1ab12/">https://www.linkedin.com/in/trevor-dolan-91a1ab12/</a> </li></ul><p>For more insights on data privacy and compliance, visit: <a href="https://www.sentra.io/use-cases/data-privacy-and-compliance">https://www.sentra.io/use-cases/data-privacy-and-compliance</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 21 Aug 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/3eb46283/7579307c.mp3" length="57490636" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/lK-5z2BTbeTDh91AvtRqQJ9-GQ3cJt2YHce6q1GBxg4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81Mzlh/ZDdmMjBkNTQ4ZmFk/Y2YyNzA3ZDMwNTll/MTVlZi5wbmc.jpg"/>
      <itunes:duration>3591</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How can cybersecurity professionals balance both the regulatory requirements and the fundamentals of data protection?</p><p>Today, Trevor Dolan, Cyber Security Executive Advisor at NinjaJobs, shares insights on balancing regulatory compliance with the fundamentals of data protection, designing holistic data protection programs, and the importance of strategic planning. He delves into the five main areas of developing data protection organizations: governance and leadership, risk assessment, policies and procedures, training and awareness, and team and organizational structure. Trevor also offers practical advice for young professionals starting in the field and discusses the significance of building trustworthy relationships with stakeholders. For organizations facing budget and hiring challenges, he suggests prioritizing top-risk areas and leveraging existing resources effectively. The episode concludes with Trevor reflecting on his career journey and sharing his contact information for further connection.</p><p> </p><p>Takeaways:</p><ul><li><strong>Establish Strong Governance and Leadership: </strong>Build a solid foundation by defining the scope of your data protection program.</li><li><strong>Conduct a Comprehensive Risk Assessment:</strong> Use frameworks like NIST CSF or CIS Controls to assess your current state and maturity. Be honest about gaps and deficiencies; use data to drive consensus and prioritize improvements.</li><li><strong>Develop and Maintain Clear Policies and Procedures:</strong> Ensure policies map directly to regulatory, legal, and contractual requirements. Create a hierarchy: policies, procedures, standards, and control implementation patterns.</li><li><strong>Invest in Targeted Training and Awareness:</strong> Go beyond generic security training; provide specific modules for privacy, incident management, and data protection. Reinforce training with assessments that encourage critical thinking, not just box-checking.</li><li><strong>Be Flexible and Resourceful with Budget and Staffing:</strong> If faced with budget or hiring freezes, focus on top-priority risks and use available tools creatively (“gold, silver, bronze” approach).</li><li><strong>Use Data to Drive Decisions and Build Consensus:</strong> Bring objective data to stakeholder discussions to resolve disagreements and focus on solving real problems.</li><li><strong>Continuously Improve and Adapt: </strong>Treat your data protection program as a living, evolving effort. Regularly revisit your risk assessments, policies, and training to ensure they remain effective and aligned with business objectives.</li></ul><p>Quote of the Show:</p><ul><li>“Make sure that those expectations are well communicated, but do it in a way that helps them to really incorporate that in their day-to-day so that they feel empowered as far as protecting the organization's data, and they feel part of the mission.” - Trevor Dolan</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/trevor-dolan-91a1ab12/">https://www.linkedin.com/in/trevor-dolan-91a1ab12/</a> </li></ul><p>For more insights on data privacy and compliance, visit: <a href="https://www.sentra.io/use-cases/data-privacy-and-compliance">https://www.sentra.io/use-cases/data-privacy-and-compliance</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a>  </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/trevor-dolan" img="https://img.transistorcdn.com/h4GffZXxgIJVTOlVs8BpLVJEjMTnOjnWIeZhMAiHjMM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYTU2/ZmNjYzZkOTU4NGFi/M2NiMmNiNTdmNzI1/NmFjMi5qcGc.jpg">Trevor Dolan</podcast:person>
    </item>
    <item>
      <title>From Tech to Team: People, Culture, Technology - Rick McElroy - Guardians of the Data - Episode #3</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>From Tech to Team: People, Culture, Technology - Rick McElroy - Guardians of the Data - Episode #3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">28168e98-ec3c-4549-8aab-a354f03025e1</guid>
      <link>https://guardiansofthedata.show/s1/3</link>
      <description>
        <![CDATA[<p>What are the people concerns when it comes to cybersecurity?</p><p><br></p><p>Today Ward welcomes seasoned security veteran and CEO of Nexasure, Rick McElroy. Rick, with over 25 years of experience in cybersecurity, shares his insights on the primary challenges organizations face in data security, focusing on the often-overlooked human and cultural elements. He emphasizes the importance of education, awareness, and the need for a balanced investment between technology and people. Rick also delves into the dynamics of cross-generational training and the impact of organizational culture on security programs. Additionally, he shares his personal journey in cybersecurity, discusses the significance of continuous learning and volunteering, and offers advice for individuals looking to enter or advance in the field. The episode highlights the need for a holistic approach to data security that includes both technological solutions and human factors.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People and Culture in Security:</strong> Invest in security awareness and education at all levels of the organization, not just in technology.</li><li><strong>Engage Leadership Early:</strong> Start security conversations at the highest levels (C-suite) to ensure buy-in and proper governance. Clarify who is responsible for risk and ensure decision-makers are educated on security issues.</li><li><strong>Balance Technology with Human Factors: </strong>Don’t rely solely on technical solutions; consider how changes impact people and workflows. Design security controls and processes with end users in mind to minimize friction and maximize adoption.</li><li><strong>Invest in Prevention and Smart Tooling:</strong> Focus on effective, well-managed controls rather than constantly switching tools. Choose vendors and solutions that can scale with your organization and minimize switching costs.</li><li><strong>Tailor Security Training to Your Audience:</strong> Use multimodal training approaches (video, experiential, written) to reach different generations and learning styles.</li><li><strong>Support Career Growth and Entry into Cybersecurity: </strong>Take advantage of free vendor training and volunteer opportunities to gain experience.</li></ul><p>Quote of the Show:</p><ul><li>“What I'm actually interested in is a change in behavior to the positive, even if that's a tiny thing that one user does that's more secure than it was yesterday.” - Rick McElroy</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rickdecrypts/">https://www.linkedin.com/in/rickdecrypts/</a> </li><li>Website: <a href="https://nexasure.ai/">https://nexasure.ai/</a> </li></ul><p>For more insights on cybersecurity resilience, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/use-cases/cyber-security-resilience</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What are the people concerns when it comes to cybersecurity?</p><p><br></p><p>Today Ward welcomes seasoned security veteran and CEO of Nexasure, Rick McElroy. Rick, with over 25 years of experience in cybersecurity, shares his insights on the primary challenges organizations face in data security, focusing on the often-overlooked human and cultural elements. He emphasizes the importance of education, awareness, and the need for a balanced investment between technology and people. Rick also delves into the dynamics of cross-generational training and the impact of organizational culture on security programs. Additionally, he shares his personal journey in cybersecurity, discusses the significance of continuous learning and volunteering, and offers advice for individuals looking to enter or advance in the field. The episode highlights the need for a holistic approach to data security that includes both technological solutions and human factors.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People and Culture in Security:</strong> Invest in security awareness and education at all levels of the organization, not just in technology.</li><li><strong>Engage Leadership Early:</strong> Start security conversations at the highest levels (C-suite) to ensure buy-in and proper governance. Clarify who is responsible for risk and ensure decision-makers are educated on security issues.</li><li><strong>Balance Technology with Human Factors: </strong>Don’t rely solely on technical solutions; consider how changes impact people and workflows. Design security controls and processes with end users in mind to minimize friction and maximize adoption.</li><li><strong>Invest in Prevention and Smart Tooling:</strong> Focus on effective, well-managed controls rather than constantly switching tools. Choose vendors and solutions that can scale with your organization and minimize switching costs.</li><li><strong>Tailor Security Training to Your Audience:</strong> Use multimodal training approaches (video, experiential, written) to reach different generations and learning styles.</li><li><strong>Support Career Growth and Entry into Cybersecurity: </strong>Take advantage of free vendor training and volunteer opportunities to gain experience.</li></ul><p>Quote of the Show:</p><ul><li>“What I'm actually interested in is a change in behavior to the positive, even if that's a tiny thing that one user does that's more secure than it was yesterday.” - Rick McElroy</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rickdecrypts/">https://www.linkedin.com/in/rickdecrypts/</a> </li><li>Website: <a href="https://nexasure.ai/">https://nexasure.ai/</a> </li></ul><p>For more insights on cybersecurity resilience, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/use-cases/cyber-security-resilience</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 14 Aug 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/4d0a5006/328652a4.mp3" length="47321358" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LBdKJiuNXXGAoFutWoUSm7PjmnA9-uUlmmuAgoKLXj0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kOTdk/MGIzYmNkMDczYmZk/NTAxZDQ2ZjZkNTZi/YzBjOS5wbmc.jpg"/>
      <itunes:duration>2955</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What are the people concerns when it comes to cybersecurity?</p><p><br></p><p>Today Ward welcomes seasoned security veteran and CEO of Nexasure, Rick McElroy. Rick, with over 25 years of experience in cybersecurity, shares his insights on the primary challenges organizations face in data security, focusing on the often-overlooked human and cultural elements. He emphasizes the importance of education, awareness, and the need for a balanced investment between technology and people. Rick also delves into the dynamics of cross-generational training and the impact of organizational culture on security programs. Additionally, he shares his personal journey in cybersecurity, discusses the significance of continuous learning and volunteering, and offers advice for individuals looking to enter or advance in the field. The episode highlights the need for a holistic approach to data security that includes both technological solutions and human factors.</p><p> </p><p>Takeaways:</p><ul><li><strong>Prioritize People and Culture in Security:</strong> Invest in security awareness and education at all levels of the organization, not just in technology.</li><li><strong>Engage Leadership Early:</strong> Start security conversations at the highest levels (C-suite) to ensure buy-in and proper governance. Clarify who is responsible for risk and ensure decision-makers are educated on security issues.</li><li><strong>Balance Technology with Human Factors: </strong>Don’t rely solely on technical solutions; consider how changes impact people and workflows. Design security controls and processes with end users in mind to minimize friction and maximize adoption.</li><li><strong>Invest in Prevention and Smart Tooling:</strong> Focus on effective, well-managed controls rather than constantly switching tools. Choose vendors and solutions that can scale with your organization and minimize switching costs.</li><li><strong>Tailor Security Training to Your Audience:</strong> Use multimodal training approaches (video, experiential, written) to reach different generations and learning styles.</li><li><strong>Support Career Growth and Entry into Cybersecurity: </strong>Take advantage of free vendor training and volunteer opportunities to gain experience.</li></ul><p>Quote of the Show:</p><ul><li>“What I'm actually interested in is a change in behavior to the positive, even if that's a tiny thing that one user does that's more secure than it was yesterday.” - Rick McElroy</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rickdecrypts/">https://www.linkedin.com/in/rickdecrypts/</a> </li><li>Website: <a href="https://nexasure.ai/">https://nexasure.ai/</a> </li></ul><p>For more insights on cybersecurity resilience, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/use-cases/cyber-security-resilience</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/rick-mcelroy" img="https://img.transistorcdn.com/Zty3dQjp_SpZ9U9sureAlZZnyqVYg8_EsdFrgh3fpfM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNTA3/ZmVlZTg0ZWE2NWI1/M2EwZWRlYTMzNzIx/ZDA5My53ZWJw.jpg">Rick McElroy</podcast:person>
    </item>
    <item>
      <title>Ensuring Business Alignment in Data Security - Rick DeLoach - Guardians of the Data - Episode #2</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Ensuring Business Alignment in Data Security - Rick DeLoach - Guardians of the Data - Episode #2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d734add3-0647-47f0-b52f-dea8dee27878</guid>
      <link>https://guardiansofthedata.show/s1/2</link>
      <description>
        <![CDATA[<p>How can you protect your data if you don’t know where it is?</p><p><br></p><p>The answer is you can’t. Rick DeLoach, Deputy CISO at ADT, joins Ward on this week’s episode to discuss the crucial aspects of data security and governance. Rick shares his two decades of experience in the field, emphasizing the importance of data discovery, classification, and the implementation of structured programs involving process, policy, and technology. The conversation also covers the challenges of integrating AI technologies within organizations and the significance of ongoing business alignment to enhance security practices. Lastly, Rick's journey from finance student to cybersecurity leader offers valuable insights and advice for aspiring professionals in the field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start with Data Discovery and Classification:</strong> You can't protect what you don't know you have. Begin by inventorying and classifying your data assets.</li><li><strong>Establish Strong Governance and Policy Frameworks:</strong> Before investing in technology, ensure you have clear, organization-wide policies and processes for data handling and security.</li><li><strong>Align Security with Business Needs:</strong> Engage business stakeholders to understand what data is most critical, why it matters, and the impact if it’s lost or exposed.</li><li><strong>Educate and Partner with Business Users:</strong> Move from being the “department of no” to a partner that educates and collaborates with business units on secure data practices.</li><li><strong>Be Proactive, Not Reactive:</strong> Build and maintain a data inventory to enable rapid response and assessment in the event of a breach or incident.</li><li><strong>Balance Innovation and Security:</strong> Embrace new technologies like AI, but ensure their use is governed by clear policies and risk assessments.</li><li><strong>Stay Adaptable: </strong>The security landscape changes rapidly—be ready to adjust your approach as new challenges and technologies emerge.</li></ul><p>Quote of the Show:</p><ul><li>“You don't know how to protect something if you don't know what it is and where it's at.” - Rick DeLoach</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rdeloach/">https://www.linkedin.com/in/rdeloach/</a> </li><li>Website: <a href="https://www.adt.com/">https://www.adt.com/</a> </li></ul><p>For more insights on data discovery, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/product/data-discovery-and-classification</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How can you protect your data if you don’t know where it is?</p><p><br></p><p>The answer is you can’t. Rick DeLoach, Deputy CISO at ADT, joins Ward on this week’s episode to discuss the crucial aspects of data security and governance. Rick shares his two decades of experience in the field, emphasizing the importance of data discovery, classification, and the implementation of structured programs involving process, policy, and technology. The conversation also covers the challenges of integrating AI technologies within organizations and the significance of ongoing business alignment to enhance security practices. Lastly, Rick's journey from finance student to cybersecurity leader offers valuable insights and advice for aspiring professionals in the field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start with Data Discovery and Classification:</strong> You can't protect what you don't know you have. Begin by inventorying and classifying your data assets.</li><li><strong>Establish Strong Governance and Policy Frameworks:</strong> Before investing in technology, ensure you have clear, organization-wide policies and processes for data handling and security.</li><li><strong>Align Security with Business Needs:</strong> Engage business stakeholders to understand what data is most critical, why it matters, and the impact if it’s lost or exposed.</li><li><strong>Educate and Partner with Business Users:</strong> Move from being the “department of no” to a partner that educates and collaborates with business units on secure data practices.</li><li><strong>Be Proactive, Not Reactive:</strong> Build and maintain a data inventory to enable rapid response and assessment in the event of a breach or incident.</li><li><strong>Balance Innovation and Security:</strong> Embrace new technologies like AI, but ensure their use is governed by clear policies and risk assessments.</li><li><strong>Stay Adaptable: </strong>The security landscape changes rapidly—be ready to adjust your approach as new challenges and technologies emerge.</li></ul><p>Quote of the Show:</p><ul><li>“You don't know how to protect something if you don't know what it is and where it's at.” - Rick DeLoach</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rdeloach/">https://www.linkedin.com/in/rdeloach/</a> </li><li>Website: <a href="https://www.adt.com/">https://www.adt.com/</a> </li></ul><p>For more insights on data discovery, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/product/data-discovery-and-classification</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 07 Aug 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/3ea38fb0/db9d502b.mp3" length="40546290" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Tvw7YC-Y0FLmkd3sI7kLJBXPtvK2qmIxs-s-IIsz1xk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81OGM5/YzBlMjE0MzZmN2Iw/MTBkNjJmMzY5Yzlh/NGM5YS5wbmc.jpg"/>
      <itunes:duration>2531</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How can you protect your data if you don’t know where it is?</p><p><br></p><p>The answer is you can’t. Rick DeLoach, Deputy CISO at ADT, joins Ward on this week’s episode to discuss the crucial aspects of data security and governance. Rick shares his two decades of experience in the field, emphasizing the importance of data discovery, classification, and the implementation of structured programs involving process, policy, and technology. The conversation also covers the challenges of integrating AI technologies within organizations and the significance of ongoing business alignment to enhance security practices. Lastly, Rick's journey from finance student to cybersecurity leader offers valuable insights and advice for aspiring professionals in the field.</p><p> </p><p>Takeaways:</p><ul><li><strong>Start with Data Discovery and Classification:</strong> You can't protect what you don't know you have. Begin by inventorying and classifying your data assets.</li><li><strong>Establish Strong Governance and Policy Frameworks:</strong> Before investing in technology, ensure you have clear, organization-wide policies and processes for data handling and security.</li><li><strong>Align Security with Business Needs:</strong> Engage business stakeholders to understand what data is most critical, why it matters, and the impact if it’s lost or exposed.</li><li><strong>Educate and Partner with Business Users:</strong> Move from being the “department of no” to a partner that educates and collaborates with business units on secure data practices.</li><li><strong>Be Proactive, Not Reactive:</strong> Build and maintain a data inventory to enable rapid response and assessment in the event of a breach or incident.</li><li><strong>Balance Innovation and Security:</strong> Embrace new technologies like AI, but ensure their use is governed by clear policies and risk assessments.</li><li><strong>Stay Adaptable: </strong>The security landscape changes rapidly—be ready to adjust your approach as new challenges and technologies emerge.</li></ul><p>Quote of the Show:</p><ul><li>“You don't know how to protect something if you don't know what it is and where it's at.” - Rick DeLoach</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/rdeloach/">https://www.linkedin.com/in/rdeloach/</a> </li><li>Website: <a href="https://www.adt.com/">https://www.adt.com/</a> </li></ul><p>For more insights on data discovery, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/product/data-discovery-and-classification</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/rick-deloach" img="https://img.transistorcdn.com/CizLNE_5fyjWQuKKORfro9aC5QFn2-DYkvc88dOXzak/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMmQz/MmQyZGNkZGNmYzRm/NDk1YTlhMjE0ODNl/MzkxMi5qcGc.jpg">Rick DeLoach</podcast:person>
    </item>
    <item>
      <title>The Human Element of Data Security - Luis Valenzuela - Guardians of the Data - Episode #1</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The Human Element of Data Security - Luis Valenzuela - Guardians of the Data - Episode #1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86e78f82-49ee-4c33-975f-b3b568f255ae</guid>
      <link>https://guardiansofthedata.show/s1/1</link>
      <description>
        <![CDATA[<p>How can simplifying your data governance strategy revolutionize your security posture?</p><p>In the inaugural episode of Guardians of the Data, host Ward Balcerzak sits down with Luis Valenzuela, Director of Data Governance and Data Loss Prevention at InComm Payments. Luis, who brings two decades of cybersecurity experience, dives into the often-overlooked fundamentals of data security. Discover why understanding and categorizing your most critical data is paramount, how robust governance can transform your approach, and the strategic role of tools in a well-defined process. Luis also shares his inspiring journey from Colombia to becoming a cybersecurity leader, highlighting the power of hard work, resilience, and cultivating strong relationships and processes.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Prioritize Data Governance:</strong> Establish clear data governance frameworks that are practical and actionable. Avoid lengthy, complicated documents that no one will read.</li><li><strong>Simplify Data Classifications:</strong> Reduce complex data categories into a smaller number of easily understandable types. This helps with better adherence across the organization.</li><li><strong>Combine Tools with Processes:</strong> Utilize both technological tools and well-defined processes to manage data security effectively. Tools should complement your strategic planning and governance efforts.</li><li><strong>Training and Awareness:</strong> Regularly educate and train employees about data security policies and procedures. Tailor this training to specific departments to make it relevant and practical.</li><li><strong>Document Sensitivity:</strong> Label and classify data accurately to ensure that sensitive information is appropriately protected according to its level of sensitivity.</li><li><strong>Foster Trust:</strong> Collaborate with different teams and leaders to build trust. This eases the implementation of security measures and reduces the typical friction between security teams and business units.</li><li><strong>Focus on People and Relationships:</strong> Invest time in understanding the needs and operations of different departments. Effective data security is as much about relationship management as it is about technical measures.</li></ul><p>Quote of the Show:</p><ul><li>“The emphasis is on process. The more I work in cyber, I realize that's what we need to work more on.” - Luis Valenzuela</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/luisvalenzuela28323623/">https://www.linkedin.com/in/luisvalenzuela28323623/</a> </li><li>Website: <a href="https://www.incomm.com/">https://www.incomm.com/</a> </li></ul><p>For more insights on data overexposure, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/product/least-privilege-access-control</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How can simplifying your data governance strategy revolutionize your security posture?</p><p>In the inaugural episode of Guardians of the Data, host Ward Balcerzak sits down with Luis Valenzuela, Director of Data Governance and Data Loss Prevention at InComm Payments. Luis, who brings two decades of cybersecurity experience, dives into the often-overlooked fundamentals of data security. Discover why understanding and categorizing your most critical data is paramount, how robust governance can transform your approach, and the strategic role of tools in a well-defined process. Luis also shares his inspiring journey from Colombia to becoming a cybersecurity leader, highlighting the power of hard work, resilience, and cultivating strong relationships and processes.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Prioritize Data Governance:</strong> Establish clear data governance frameworks that are practical and actionable. Avoid lengthy, complicated documents that no one will read.</li><li><strong>Simplify Data Classifications:</strong> Reduce complex data categories into a smaller number of easily understandable types. This helps with better adherence across the organization.</li><li><strong>Combine Tools with Processes:</strong> Utilize both technological tools and well-defined processes to manage data security effectively. Tools should complement your strategic planning and governance efforts.</li><li><strong>Training and Awareness:</strong> Regularly educate and train employees about data security policies and procedures. Tailor this training to specific departments to make it relevant and practical.</li><li><strong>Document Sensitivity:</strong> Label and classify data accurately to ensure that sensitive information is appropriately protected according to its level of sensitivity.</li><li><strong>Foster Trust:</strong> Collaborate with different teams and leaders to build trust. This eases the implementation of security measures and reduces the typical friction between security teams and business units.</li><li><strong>Focus on People and Relationships:</strong> Invest time in understanding the needs and operations of different departments. Effective data security is as much about relationship management as it is about technical measures.</li></ul><p>Quote of the Show:</p><ul><li>“The emphasis is on process. The more I work in cyber, I realize that's what we need to work more on.” - Luis Valenzuela</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/luisvalenzuela28323623/">https://www.linkedin.com/in/luisvalenzuela28323623/</a> </li><li>Website: <a href="https://www.incomm.com/">https://www.incomm.com/</a> </li></ul><p>For more insights on data overexposure, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/product/least-privilege-access-control</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 31 Jul 2025 05:00:00 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/f0a18a88/1dbb2d94.mp3" length="46968302" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/B7wjQ63hs1MUpkC9JHe6OIs1uIdeT1MZjs7JqfF0Gnw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNTMy/YzM2OTRlMmQxNDRm/MDI3NWNhNDE2MzE5/MTBiNC5wbmc.jpg"/>
      <itunes:duration>2933</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How can simplifying your data governance strategy revolutionize your security posture?</p><p>In the inaugural episode of Guardians of the Data, host Ward Balcerzak sits down with Luis Valenzuela, Director of Data Governance and Data Loss Prevention at InComm Payments. Luis, who brings two decades of cybersecurity experience, dives into the often-overlooked fundamentals of data security. Discover why understanding and categorizing your most critical data is paramount, how robust governance can transform your approach, and the strategic role of tools in a well-defined process. Luis also shares his inspiring journey from Colombia to becoming a cybersecurity leader, highlighting the power of hard work, resilience, and cultivating strong relationships and processes.</p><p><br></p><p>Takeaways:</p><ul><li><strong>Prioritize Data Governance:</strong> Establish clear data governance frameworks that are practical and actionable. Avoid lengthy, complicated documents that no one will read.</li><li><strong>Simplify Data Classifications:</strong> Reduce complex data categories into a smaller number of easily understandable types. This helps with better adherence across the organization.</li><li><strong>Combine Tools with Processes:</strong> Utilize both technological tools and well-defined processes to manage data security effectively. Tools should complement your strategic planning and governance efforts.</li><li><strong>Training and Awareness:</strong> Regularly educate and train employees about data security policies and procedures. Tailor this training to specific departments to make it relevant and practical.</li><li><strong>Document Sensitivity:</strong> Label and classify data accurately to ensure that sensitive information is appropriately protected according to its level of sensitivity.</li><li><strong>Foster Trust:</strong> Collaborate with different teams and leaders to build trust. This eases the implementation of security measures and reduces the typical friction between security teams and business units.</li><li><strong>Focus on People and Relationships:</strong> Invest time in understanding the needs and operations of different departments. Effective data security is as much about relationship management as it is about technical measures.</li></ul><p>Quote of the Show:</p><ul><li>“The emphasis is on process. The more I work in cyber, I realize that's what we need to work more on.” - Luis Valenzuela</li></ul><p>Links:</p><ul><li>LinkedIn: <a href="https://www.linkedin.com/in/luisvalenzuela28323623/">https://www.linkedin.com/in/luisvalenzuela28323623/</a> </li><li>Website: <a href="https://www.incomm.com/">https://www.incomm.com/</a> </li></ul><p>For more insights on data overexposure, visit: <a href="https://www.sentra.io/product/least-privilege-access-control">https://www.sentra.io/product/least-privilege-access-control</a></p><p>Ways to Tune In:</p><ul><li>Transistor: <a href="https://guardiansofthedata.show/">https://guardiansofthedata.show/</a> </li><li>Spotify: <a href="https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ">https://open.spotify.com/show/5gZXInkb12Qrs2Lyv0hstQ</a> </li><li>Apple Podcasts: <a href="https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323">https://podcasts.apple.com/us/podcast/guardians-of-the-data/id1826819323</a> </li><li>Amazon Music: <a href="https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data">https://music.amazon.com/podcasts/0754cdde-f1c4-4f6c-92a2-e263f7840eb8/guardians-of-the-data</a></li><li>iHeart Radio: <a href="https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/">https://www.iheart.com/podcast/269-guardians-of-the-data-285972170/</a></li><li>YouTube: <a href="https://www.youtube.com/@GuardiansoftheDataPod">https://www.youtube.com/@GuardiansoftheDataPod</a> </li></ul>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
      <podcast:person role="Producer" href="https://guardiansofthedata.show/people/rayanne-pruitt" img="https://img.transistorcdn.com/SW_X9E2Yt_rD_Y9v1qslcvDjAac2YfXop4Emt5gUcq8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YWJm/ODkxMDlmNGFmOWRh/NDg2NTM3ODUwNGI0/ODlhOS5qcGc.jpg">Rayanne Pruitt</podcast:person>
      <podcast:person role="Guest" href="https://guardiansofthedata.show/people/luis-valenzuela" img="https://img.transistorcdn.com/wwiziFISrCfqYvjxGcES1fbTfGA3abxg13aiVwhIGFQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZmU3/YTY4MTY1OGE0MWUw/ZWU0ZWYxYWE3ODQ3/OTFkMC5qcGc.jpg">Luis Valenzuela</podcast:person>
    </item>
    <item>
      <title>Guardians of the Data Trailer! </title>
      <itunes:title>Guardians of the Data Trailer! </itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">19677d67-a0a5-4764-a13c-077b72541376</guid>
      <link>https://guardiansofthedata.show/episodes/guardians-of-the-data-trailer</link>
      <description>
        <![CDATA[<p>Welcome to Guardians of the Data! Join host, Ward Balcerzak, each week as he dives deep into the passions, expertise, and experiences of CISOs, Chief Data Officers, and more. Guardians of the Data is sponsored by Sentra - AI-powered data security platform that discovers and classifies all your data accurately and automatically to achieve enterprise-scale data protection without the fuss.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to Guardians of the Data! Join host, Ward Balcerzak, each week as he dives deep into the passions, expertise, and experiences of CISOs, Chief Data Officers, and more. Guardians of the Data is sponsored by Sentra - AI-powered data security platform that discovers and classifies all your data accurately and automatically to achieve enterprise-scale data protection without the fuss.</p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Jul 2025 11:28:56 -0400</pubDate>
      <author>Ward Balcerzak</author>
      <enclosure url="https://media.transistor.fm/6a726f38/d6e406d1.mp3" length="466993" type="audio/mpeg"/>
      <itunes:author>Ward Balcerzak</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/lIdSrt4PiK-O95u37ViKVd7ZWHdyZj8uiqpeUv-4a44/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80YTMw/ZTJjOWM1N2MzOGM3/MGIzZWU2Y2ZhMWY2/ZjI5OC5qcGc.jpg"/>
      <itunes:duration>26</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to Guardians of the Data! Join host, Ward Balcerzak, each week as he dives deep into the passions, expertise, and experiences of CISOs, Chief Data Officers, and more. Guardians of the Data is sponsored by Sentra - AI-powered data security platform that discovers and classifies all your data accurately and automatically to achieve enterprise-scale data protection without the fuss.</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://guardiansofthedata.show/people/ward-balcerzak" img="https://img.transistorcdn.com/RGYzjLf_tWzODbeODUwOeXEbX13JdP1K5i4pp8Q-NcM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Y4/MDZmZjhkNzc4ZWI1/MDlkMWNjY2YwNDY2/ZWNiOS5qcGVn.jpg">Ward Balcerzak</podcast:person>
    </item>
  </channel>
</rss>
