<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/cyber-risk-reels" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Risk and Reels: A Cybersecurity Podcast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/cyber-risk-reels</itunes:new-feed-url>
    <description>A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.</description>
    <copyright>© 2025 Jeffrey Wheatman</copyright>
    <podcast:guid>e902243d-6b80-5bdb-ad66-1039f0f041d3</podcast:guid>
    <podcast:locked owner="haley.williams@blackkite.com">no</podcast:locked>
    <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    <podcast:trailer pubdate="Mon, 06 Feb 2023 11:40:39 -0800" url="https://media.transistor.fm/1956ebb1/94b9c3e6.mp3" length="1114210" type="audio/mpeg">Introducing Risk and Reels: A Cybersecurity Podcast</podcast:trailer>
    <language>en</language>
    <pubDate>Wed, 23 Jul 2025 07:35:22 -0700</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 17:06:11 -0800</lastBuildDate>
    <link>https://blackkite.com/risk-and-reels-podcast/</link>
    <image>
      <url>https://img.transistor.fm/u73ngAAFK4Plb6NXIKptrB58MKgAKGEqc82Og52Z9kw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM2NzA2LzE2NzU5/NzkwNTgtYXJ0d29y/ay5qcGc.jpg</url>
      <title>Risk and Reels: A Cybersecurity Podcast</title>
      <link>https://blackkite.com/risk-and-reels-podcast/</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Jeffrey Wheatman</itunes:author>
    <itunes:image href="https://img.transistor.fm/u73ngAAFK4Plb6NXIKptrB58MKgAKGEqc82Og52Z9kw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM2NzA2LzE2NzU5/NzkwNTgtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.</itunes:summary>
    <itunes:subtitle>A podcast for movies.</itunes:subtitle>
    <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jeffrey Wheatman</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Systemic Cyber Risk: A CISO’s Impossible Task</title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>Systemic Cyber Risk: A CISO’s Impossible Task</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4d87e56d-1315-479b-9848-64d72ca462ff</guid>
      <link>https://share.transistor.fm/s/075b37bc</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey Wheatman sits down with <a href="https://www.linkedin.com/in/paulguckian/?originalSubdomain=uk">Paul Guckian</a>, former BISO at Lloyd’s of London and author of <em>Systemic Cyber Resilience: Why CISOs Can’t Fix Cybersecurity</em>. They unpack why the traditional security model is broken, how systemic risk is the real enemy, and why putting the weight of an entire ecosystem on a single CISO sets everyone up for failure. From resilient thinking to lessons from fire safety and finance, Paul brings an academic lens—and a pragmatic mindset—to a critical conversation.</p><p><br><a href="https://www.amazon.com/Systemic-Cyber-Resilience-CISOs-security-ebook/dp/B0F3W4JWLY">Link to Paul’s book.</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey Wheatman sits down with <a href="https://www.linkedin.com/in/paulguckian/?originalSubdomain=uk">Paul Guckian</a>, former BISO at Lloyd’s of London and author of <em>Systemic Cyber Resilience: Why CISOs Can’t Fix Cybersecurity</em>. They unpack why the traditional security model is broken, how systemic risk is the real enemy, and why putting the weight of an entire ecosystem on a single CISO sets everyone up for failure. From resilient thinking to lessons from fire safety and finance, Paul brings an academic lens—and a pragmatic mindset—to a critical conversation.</p><p><br><a href="https://www.amazon.com/Systemic-Cyber-Resilience-CISOs-security-ebook/dp/B0F3W4JWLY">Link to Paul’s book.</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Jun 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/075b37bc/de6fb7e6.mp3" length="41548258" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2594</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey Wheatman sits down with <a href="https://www.linkedin.com/in/paulguckian/?originalSubdomain=uk">Paul Guckian</a>, former BISO at Lloyd’s of London and author of <em>Systemic Cyber Resilience: Why CISOs Can’t Fix Cybersecurity</em>. They unpack why the traditional security model is broken, how systemic risk is the real enemy, and why putting the weight of an entire ecosystem on a single CISO sets everyone up for failure. From resilient thinking to lessons from fire safety and finance, Paul brings an academic lens—and a pragmatic mindset—to a critical conversation.</p><p><br><a href="https://www.amazon.com/Systemic-Cyber-Resilience-CISOs-security-ebook/dp/B0F3W4JWLY">Link to Paul’s book.</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Phishing for Truth: Fixing the Flaws in Security Awareness</title>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>Phishing for Truth: Fixing the Flaws in Security Awareness</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a176ff2b-4770-441c-988d-5a1bc83f5a70</guid>
      <link>https://share.transistor.fm/s/61475b1e</link>
      <description>
        <![CDATA[<p>Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.</p>]]>
      </content:encoded>
      <pubDate>Wed, 28 May 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/61475b1e/caefbc69.mp3" length="30640743" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1913</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Jeffrey Wheatman sits down with Cary Johnson, founder of Phishbusters Audit and Consulting, to expose the failures of traditional phishing simulations. They discuss why standard metrics fall short, how self-assessment distorts results, and what it really takes to track — and influence — behavioral change in security awareness programs.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Accidental CISO</title>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>The Accidental CISO</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0fe26e78-265f-421a-a4a9-5709d2844741</guid>
      <link>https://share.transistor.fm/s/e76eddd6</link>
      <description>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, Jeffrey Wheatman sits down with RJ Friedman, CEO of Dayone Cyber, to talk frameworks, risk, and leadership. RJ shares how his start in sales shaped his approach as a CISO, why CIS 18 remains his go-to, and how mapping frameworks to business goals makes all the difference. It's a sharp, honest look at what makes cybersecurity leadership actually work.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, Jeffrey Wheatman sits down with RJ Friedman, CEO of Dayone Cyber, to talk frameworks, risk, and leadership. RJ shares how his start in sales shaped his approach as a CISO, why CIS 18 remains his go-to, and how mapping frameworks to business goals makes all the difference. It's a sharp, honest look at what makes cybersecurity leadership actually work.</p>]]>
      </content:encoded>
      <pubDate>Wed, 21 May 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/e76eddd6/92a73edf.mp3" length="34253543" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2138</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, Jeffrey Wheatman sits down with RJ Friedman, CEO of Dayone Cyber, to talk frameworks, risk, and leadership. RJ shares how his start in sales shaped his approach as a CISO, why CIS 18 remains his go-to, and how mapping frameworks to business goals makes all the difference. It's a sharp, honest look at what makes cybersecurity leadership actually work.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>A Story of Limited Resources</title>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>A Story of Limited Resources</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e997819f-f0ab-4dfb-9eca-a2aaedf7c596</guid>
      <link>https://share.transistor.fm/s/3605c177</link>
      <description>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, Jeffrey Wheatman sits down with Craig Taylor, CEO of CyberHoot, to talk about how small businesses are navigating the evolving world of cybersecurity compliance—especially the demanding standards of CMMC. From Apollo 13-style ingenuity to the unintended consequences of regulation, Craig shares a 30-year perspective rooted in psychology, education, and operational realism. Tune in for a conversation that covers limited resources, positive reinforcement, and why now is the time to prepare.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, Jeffrey Wheatman sits down with Craig Taylor, CEO of CyberHoot, to talk about how small businesses are navigating the evolving world of cybersecurity compliance—especially the demanding standards of CMMC. From Apollo 13-style ingenuity to the unintended consequences of regulation, Craig shares a 30-year perspective rooted in psychology, education, and operational realism. Tune in for a conversation that covers limited resources, positive reinforcement, and why now is the time to prepare.</p>]]>
      </content:encoded>
      <pubDate>Wed, 07 May 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/3605c177/3631d07f.mp3" length="31435671" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1962</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, Jeffrey Wheatman sits down with Craig Taylor, CEO of CyberHoot, to talk about how small businesses are navigating the evolving world of cybersecurity compliance—especially the demanding standards of CMMC. From Apollo 13-style ingenuity to the unintended consequences of regulation, Craig shares a 30-year perspective rooted in psychology, education, and operational realism. Tune in for a conversation that covers limited resources, positive reinforcement, and why now is the time to prepare.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>From Homicide to Hackers: Fixing Cybersecurity’s Broken Model</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>From Homicide to Hackers: Fixing Cybersecurity’s Broken Model</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f8d3901c-dd1d-41fe-8e87-2cf6dabf87b1</guid>
      <link>https://share.transistor.fm/s/920a6aeb</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey Wheatman sits down with Carter Schoenberg, Chief Security Officer at Soundway Consulting and author of <a href="https://www.amazon.com/Cybersecurity-Fails-America-Carter-Schoenberg/dp/B0CPP1Y73Z"><em>Why Cybersecurity Fails in America</em></a>. From his unexpected transition from homicide detective to cybersecurity leader, Carter shares hard-earned insights into the failures of our current cyber risk models—and how to fix them. They dive into cybercriminal collaboration, the stagnation of HR and hiring practices, and why security leaders need to learn to “speak CFO.”</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey Wheatman sits down with Carter Schoenberg, Chief Security Officer at Soundway Consulting and author of <a href="https://www.amazon.com/Cybersecurity-Fails-America-Carter-Schoenberg/dp/B0CPP1Y73Z"><em>Why Cybersecurity Fails in America</em></a>. From his unexpected transition from homicide detective to cybersecurity leader, Carter shares hard-earned insights into the failures of our current cyber risk models—and how to fix them. They dive into cybercriminal collaboration, the stagnation of HR and hiring practices, and why security leaders need to learn to “speak CFO.”</p>]]>
      </content:encoded>
      <pubDate>Wed, 23 Apr 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/920a6aeb/5e93f3d5.mp3" length="33604975" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2098</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey Wheatman sits down with Carter Schoenberg, Chief Security Officer at Soundway Consulting and author of <a href="https://www.amazon.com/Cybersecurity-Fails-America-Carter-Schoenberg/dp/B0CPP1Y73Z"><em>Why Cybersecurity Fails in America</em></a>. From his unexpected transition from homicide detective to cybersecurity leader, Carter shares hard-earned insights into the failures of our current cyber risk models—and how to fix them. They dive into cybercriminal collaboration, the stagnation of HR and hiring practices, and why security leaders need to learn to “speak CFO.”</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>This Isn't the Wolf of Wall Street: Recruitment, Rewired</title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>This Isn't the Wolf of Wall Street: Recruitment, Rewired</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2f0ca071-0411-4a9b-b579-ccb8f4beda1c</guid>
      <link>https://share.transistor.fm/s/b5a0747b</link>
      <description>
        <![CDATA[<p>Richie Lampani—self-proclaimed Chief Recruiter Dude—joins Jeffrey Wheatman to talk about the real state of hiring today. From music industry war stories to navigating post-pandemic expectations, Richie drops insights on transparency, mentorship, and why the “perfect candidate” is a myth. Candid, sharp, and unexpectedly hilarious.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Richie Lampani—self-proclaimed Chief Recruiter Dude—joins Jeffrey Wheatman to talk about the real state of hiring today. From music industry war stories to navigating post-pandemic expectations, Richie drops insights on transparency, mentorship, and why the “perfect candidate” is a myth. Candid, sharp, and unexpectedly hilarious.</p>]]>
      </content:encoded>
      <pubDate>Wed, 16 Apr 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/b5a0747b/ef13ee59.mp3" length="34816989" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2174</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Richie Lampani—self-proclaimed Chief Recruiter Dude—joins Jeffrey Wheatman to talk about the real state of hiring today. From music industry war stories to navigating post-pandemic expectations, Richie drops insights on transparency, mentorship, and why the “perfect candidate” is a myth. Candid, sharp, and unexpectedly hilarious.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>I Robbed a Bank with a Solar Eclipse</title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>I Robbed a Bank with a Solar Eclipse</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">39910f84-9e36-4177-ac7e-69843920780d</guid>
      <link>https://share.transistor.fm/s/2d0f6e5a</link>
      <description>
        <![CDATA[<p>Jayson Street, Chief Adversarial Officer at Secure Yeti, returns to <em>Risk and Reels</em> for a no-holds-barred conversation on hacking human nature, creating teachable moments, and why kindness matters in cybersecurity. From robbing banks during celestial events to sneaky USB exploits involving hearing aids, Jayson shares stories that are as outrageous as they are enlightening. Plus: the power of the pause, avoiding blame culture, and how code words like “rutabaga” can save your family from scams.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jayson Street, Chief Adversarial Officer at Secure Yeti, returns to <em>Risk and Reels</em> for a no-holds-barred conversation on hacking human nature, creating teachable moments, and why kindness matters in cybersecurity. From robbing banks during celestial events to sneaky USB exploits involving hearing aids, Jayson shares stories that are as outrageous as they are enlightening. Plus: the power of the pause, avoiding blame culture, and how code words like “rutabaga” can save your family from scams.</p>]]>
      </content:encoded>
      <pubDate>Wed, 09 Apr 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/2d0f6e5a/8cf49c00.mp3" length="40250438" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2513</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Jayson Street, Chief Adversarial Officer at Secure Yeti, returns to <em>Risk and Reels</em> for a no-holds-barred conversation on hacking human nature, creating teachable moments, and why kindness matters in cybersecurity. From robbing banks during celestial events to sneaky USB exploits involving hearing aids, Jayson shares stories that are as outrageous as they are enlightening. Plus: the power of the pause, avoiding blame culture, and how code words like “rutabaga” can save your family from scams.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>A Confluence of Errors and a Little Help From Friends</title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>A Confluence of Errors and a Little Help From Friends</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7da308d6-123e-4a28-bdf6-9144c392b9e8</guid>
      <link>https://share.transistor.fm/s/e0bc2e26</link>
      <description>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, host Jeffrey Wheatman sits down with Ed Gaudet, CEO and founder of Censinet, for an insightful conversation about entrepreneurship, product innovation, and the evolution of cybersecurity in healthcare. Ed shares the winding path that led him to founding Censinet, why listening to customers is a game-changer, and how authentic leadership and human connection have shaped his journey. The two also geek out over company origin stories in film—think <em>Tucker</em>, <em>BlackBerry</em>, and of course, <em>Jobs</em>. With lessons on vision, leverage, and not losing sight of the people you serve, this episode is a must-listen for builders, dreamers, and anyone navigating the fast-moving world of tech and risk.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, host Jeffrey Wheatman sits down with Ed Gaudet, CEO and founder of Censinet, for an insightful conversation about entrepreneurship, product innovation, and the evolution of cybersecurity in healthcare. Ed shares the winding path that led him to founding Censinet, why listening to customers is a game-changer, and how authentic leadership and human connection have shaped his journey. The two also geek out over company origin stories in film—think <em>Tucker</em>, <em>BlackBerry</em>, and of course, <em>Jobs</em>. With lessons on vision, leverage, and not losing sight of the people you serve, this episode is a must-listen for builders, dreamers, and anyone navigating the fast-moving world of tech and risk.</p>]]>
      </content:encoded>
      <pubDate>Wed, 02 Apr 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/e0bc2e26/e451aa43.mp3" length="30756095" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1920</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Risk &amp; Reels</em>, host Jeffrey Wheatman sits down with Ed Gaudet, CEO and founder of Censinet, for an insightful conversation about entrepreneurship, product innovation, and the evolution of cybersecurity in healthcare. Ed shares the winding path that led him to founding Censinet, why listening to customers is a game-changer, and how authentic leadership and human connection have shaped his journey. The two also geek out over company origin stories in film—think <em>Tucker</em>, <em>BlackBerry</em>, and of course, <em>Jobs</em>. With lessons on vision, leverage, and not losing sight of the people you serve, this episode is a must-listen for builders, dreamers, and anyone navigating the fast-moving world of tech and risk.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Cyber Truths, Intelligence Myths, and Life after the NSA</title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>Cyber Truths, Intelligence Myths, and Life after the NSA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1f0e1526-27d6-4ba0-b079-6bfcf2c691ec</guid>
      <link>https://share.transistor.fm/s/aae50257</link>
      <description>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, host Jeffrey Wheatman welcomes security veteran and former NSA executive Don Boian for a wide-ranging conversation on intelligence, cybersecurity, and life on both sides of the public-private divide. Don reflects on his 30-year NSA career, shares myths about intelligence agencies, and explains how AI is shifting the balance for defenders. He also dives into his work as an expert witness, his boardroom insights, and how introverts can thrive in public speaking and leadership roles. It’s a blend of wisdom, war stories, and actionable advice for anyone in or entering the cybersecurity world.</p><p>Here's the list of the books Don mentions - Note: He does not endorse or profit from these books. Some have facts, fiction, and a little of both.<br>* Dark Territory</p><p>* Sandworm</p><p>* Countdown to Zero Day</p><p>* This is How They Tell Me the World Ends</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, host Jeffrey Wheatman welcomes security veteran and former NSA executive Don Boian for a wide-ranging conversation on intelligence, cybersecurity, and life on both sides of the public-private divide. Don reflects on his 30-year NSA career, shares myths about intelligence agencies, and explains how AI is shifting the balance for defenders. He also dives into his work as an expert witness, his boardroom insights, and how introverts can thrive in public speaking and leadership roles. It’s a blend of wisdom, war stories, and actionable advice for anyone in or entering the cybersecurity world.</p><p>Here's the list of the books Don mentions - Note: He does not endorse or profit from these books. Some have facts, fiction, and a little of both.<br>* Dark Territory</p><p>* Sandworm</p><p>* Countdown to Zero Day</p><p>* This is How They Tell Me the World Ends</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Mar 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/aae50257/26c6f58d.mp3" length="32389064" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2022</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, host Jeffrey Wheatman welcomes security veteran and former NSA executive Don Boian for a wide-ranging conversation on intelligence, cybersecurity, and life on both sides of the public-private divide. Don reflects on his 30-year NSA career, shares myths about intelligence agencies, and explains how AI is shifting the balance for defenders. He also dives into his work as an expert witness, his boardroom insights, and how introverts can thrive in public speaking and leadership roles. It’s a blend of wisdom, war stories, and actionable advice for anyone in or entering the cybersecurity world.</p><p>Here's the list of the books Don mentions - Note: He does not endorse or profit from these books. Some have facts, fiction, and a little of both.<br>* Dark Territory</p><p>* Sandworm</p><p>* Countdown to Zero Day</p><p>* This is How They Tell Me the World Ends</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Every Day is a Risk Decision</title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Every Day is a Risk Decision</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fe621eca-4f97-439a-9e72-6cd5ea149e68</guid>
      <link>https://share.transistor.fm/s/77bfb20e</link>
      <description>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, host Jeffrey Wheatman sits down with seasoned cybersecurity leader Kimberly Trapani to discuss the evolving role of the CISO. With over 30 years in security, Kimberly shares insights from her career, emphasizing the importance of bridging the gap between business and technology. </p><p>Drawing inspiration from <em>Apollo 13</em>, likening a CISO’s role to mission control, she highlights navigating unexpected challenges with agility and confidence and shifting from a compliance-driven security program to a more integrated, business-resilient approach.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, host Jeffrey Wheatman sits down with seasoned cybersecurity leader Kimberly Trapani to discuss the evolving role of the CISO. With over 30 years in security, Kimberly shares insights from her career, emphasizing the importance of bridging the gap between business and technology. </p><p>Drawing inspiration from <em>Apollo 13</em>, likening a CISO’s role to mission control, she highlights navigating unexpected challenges with agility and confidence and shifting from a compliance-driven security program to a more integrated, business-resilient approach.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Mar 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/77bfb20e/36985535.mp3" length="28495746" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1779</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, host Jeffrey Wheatman sits down with seasoned cybersecurity leader Kimberly Trapani to discuss the evolving role of the CISO. With over 30 years in security, Kimberly shares insights from her career, emphasizing the importance of bridging the gap between business and technology. </p><p>Drawing inspiration from <em>Apollo 13</em>, likening a CISO’s role to mission control, she highlights navigating unexpected challenges with agility and confidence and shifting from a compliance-driven security program to a more integrated, business-resilient approach.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Silent Risk - How Do We Figure Out What We Don't Know?</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>Silent Risk - How Do We Figure Out What We Don't Know?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a0251342-44fd-4328-9ac6-bd6bd5d728b8</guid>
      <link>https://share.transistor.fm/s/fb84dae9</link>
      <description>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, Jeffrey Wheatman (interviewing himself!) dives into the concept of the 'silent breach'—cybersecurity exposures that organizations don’t realize exist until it’s too late. He explores real-world examples of major supply chain vulnerabilities and the challenges of visibility in today’s digital ecosystem. Wheatman also discusses how organizations can improve risk assessment and response strategies to mitigate the cascading effects of hidden threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, Jeffrey Wheatman (interviewing himself!) dives into the concept of the 'silent breach'—cybersecurity exposures that organizations don’t realize exist until it’s too late. He explores real-world examples of major supply chain vulnerabilities and the challenges of visibility in today’s digital ecosystem. Wheatman also discusses how organizations can improve risk assessment and response strategies to mitigate the cascading effects of hidden threats.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Mar 2025 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/fb84dae9/a4271918.mp3" length="12777581" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>796</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Risk and Reels</em>, Jeffrey Wheatman (interviewing himself!) dives into the concept of the 'silent breach'—cybersecurity exposures that organizations don’t realize exist until it’s too late. He explores real-world examples of major supply chain vulnerabilities and the challenges of visibility in today’s digital ecosystem. Wheatman also discusses how organizations can improve risk assessment and response strategies to mitigate the cascading effects of hidden threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Telling YOUR Story Within Your Organization</title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>Telling YOUR Story Within Your Organization</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c0ea2306-47b4-4461-9f6c-e7b59bd6c937</guid>
      <link>https://share.transistor.fm/s/2be1715f</link>
      <description>
        <![CDATA[<p>In this episode (throwback to Black Hat 2024), Jeffrey talks to Munish Walther-Puri, Adjunct Fellow at NYU Center for Global Affairs. Jeffrey and Munish discuss exploring real-life challenges through fantasy and science fiction movies, allowing us to think through the more "uncomfortable" topics in a comfortable space. Have you heard of a "pirate unicorn?" Doubtful. Listen to episode 80 to find out.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode (throwback to Black Hat 2024), Jeffrey talks to Munish Walther-Puri, Adjunct Fellow at NYU Center for Global Affairs. Jeffrey and Munish discuss exploring real-life challenges through fantasy and science fiction movies, allowing us to think through the more "uncomfortable" topics in a comfortable space. Have you heard of a "pirate unicorn?" Doubtful. Listen to episode 80 to find out.  </p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Feb 2025 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/2be1715f/94f27852.mp3" length="39266908" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1634</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode (throwback to Black Hat 2024), Jeffrey talks to Munish Walther-Puri, Adjunct Fellow at NYU Center for Global Affairs. Jeffrey and Munish discuss exploring real-life challenges through fantasy and science fiction movies, allowing us to think through the more "uncomfortable" topics in a comfortable space. Have you heard of a "pirate unicorn?" Doubtful. Listen to episode 80 to find out.  </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Concerning Impact of Cybersecurity on National Security</title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>The Concerning Impact of Cybersecurity on National Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c08a162-3540-49be-a74a-f2abea5bd6f3</guid>
      <link>https://share.transistor.fm/s/7cc2ee8b</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/dbray/">Dr. David Bray</a>, PhD, who shares his extensive background in cybersecurity, national security and technology in the public sector. The conversation explores the accurate portrayal of cybersecurity in movies, the challenges of supply chain security, and the importance of deep hardware interrogation to ensure the integrity of technology. </p><p><br></p><p>Dr. Bray emphasizes the need for proactive measures in cybersecurity and the significance of understanding the perception of reality in the context of social engineering and national security. They also dig into the evolving landscape of cybersecurity, focusing on the challenges posed by compromised hardware, the rise of scams and ransomware and the dynamics between government and non-state actors. The conversation also touches on the implications of generative AI in cybersecurity and emphasize the need for proactive measures and innovative solutions to address these threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/dbray/">Dr. David Bray</a>, PhD, who shares his extensive background in cybersecurity, national security and technology in the public sector. The conversation explores the accurate portrayal of cybersecurity in movies, the challenges of supply chain security, and the importance of deep hardware interrogation to ensure the integrity of technology. </p><p><br></p><p>Dr. Bray emphasizes the need for proactive measures in cybersecurity and the significance of understanding the perception of reality in the context of social engineering and national security. They also dig into the evolving landscape of cybersecurity, focusing on the challenges posed by compromised hardware, the rise of scams and ransomware and the dynamics between government and non-state actors. The conversation also touches on the implications of generative AI in cybersecurity and emphasize the need for proactive measures and innovative solutions to address these threats.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Feb 2025 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/7cc2ee8b/e3d0fe68.mp3" length="52160359" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2172</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/dbray/">Dr. David Bray</a>, PhD, who shares his extensive background in cybersecurity, national security and technology in the public sector. The conversation explores the accurate portrayal of cybersecurity in movies, the challenges of supply chain security, and the importance of deep hardware interrogation to ensure the integrity of technology. </p><p><br></p><p>Dr. Bray emphasizes the need for proactive measures in cybersecurity and the significance of understanding the perception of reality in the context of social engineering and national security. They also dig into the evolving landscape of cybersecurity, focusing on the challenges posed by compromised hardware, the rise of scams and ransomware and the dynamics between government and non-state actors. The conversation also touches on the implications of generative AI in cybersecurity and emphasize the need for proactive measures and innovative solutions to address these threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Meet an Attorney Who Keeps CISOs Out of Legal Hot Water </title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Meet an Attorney Who Keeps CISOs Out of Legal Hot Water </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4953d23c-492a-4ec9-b72b-cc01d7ba6c7e</guid>
      <link>https://share.transistor.fm/s/afef2f18</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/steventeppler/">Steven Teppler</a>, a partner at <a href="https://mblawfirm.com/">Mandelbaum Barrett</a> and the lead of the firm's Privacy and Cybersecurity practice group. Steve is an ISACA-certified Certified Data Privacy Solutions Engineer (CDPSE) and the firm's chief cybersecurity legal officer. They discuss sci-fi movies and the intersection of cybersecurity and law — focusing on the evolving role of Chief Information Security Officers (CISOs) and the legal implications they face. They also explore the increasing legal exposure for CISOs, the complexities of downstream liability and the importance of defensibility in cybersecurity practices.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/steventeppler/">Steven Teppler</a>, a partner at <a href="https://mblawfirm.com/">Mandelbaum Barrett</a> and the lead of the firm's Privacy and Cybersecurity practice group. Steve is an ISACA-certified Certified Data Privacy Solutions Engineer (CDPSE) and the firm's chief cybersecurity legal officer. They discuss sci-fi movies and the intersection of cybersecurity and law — focusing on the evolving role of Chief Information Security Officers (CISOs) and the legal implications they face. They also explore the increasing legal exposure for CISOs, the complexities of downstream liability and the importance of defensibility in cybersecurity practices.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Feb 2025 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/afef2f18/2f22d5d4.mp3" length="45711930" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1903</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/steventeppler/">Steven Teppler</a>, a partner at <a href="https://mblawfirm.com/">Mandelbaum Barrett</a> and the lead of the firm's Privacy and Cybersecurity practice group. Steve is an ISACA-certified Certified Data Privacy Solutions Engineer (CDPSE) and the firm's chief cybersecurity legal officer. They discuss sci-fi movies and the intersection of cybersecurity and law — focusing on the evolving role of Chief Information Security Officers (CISOs) and the legal implications they face. They also explore the increasing legal exposure for CISOs, the complexities of downstream liability and the importance of defensibility in cybersecurity practices.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Addressing Cybersecurity’s Education and Engagement Challenges</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>Addressing Cybersecurity’s Education and Engagement Challenges</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">38152638-675b-42b4-9d22-f097f065e4f5</guid>
      <link>https://share.transistor.fm/s/65aa8656</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/lisaplaggemier/">Lisa Plaggemier</a>, Executive Director of the <a href="https://www.staysafeonline.org/">National Cybersecurity Alliance</a>. They discuss their favorite movie-based educators, the importance of cybersecurity awareness, the challenges in measuring its effectiveness and the need for engaging educational content. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/lisaplaggemier/">Lisa Plaggemier</a>, Executive Director of the <a href="https://www.staysafeonline.org/">National Cybersecurity Alliance</a>. They discuss their favorite movie-based educators, the importance of cybersecurity awareness, the challenges in measuring its effectiveness and the need for engaging educational content. </p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Feb 2025 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/65aa8656/1b04bb04.mp3" length="37974622" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1581</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/lisaplaggemier/">Lisa Plaggemier</a>, Executive Director of the <a href="https://www.staysafeonline.org/">National Cybersecurity Alliance</a>. They discuss their favorite movie-based educators, the importance of cybersecurity awareness, the challenges in measuring its effectiveness and the need for engaging educational content. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Fresh Perspectives from a Future Cybersecurity Leader</title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>Fresh Perspectives from a Future Cybersecurity Leader</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e1555109-bb56-4aac-b277-4bcc21793f07</guid>
      <link>https://share.transistor.fm/s/736baabc</link>
      <description>
        <![CDATA[<p>Cybersecurity veterans see the industry through the lens of experience. But how do those visions align with the outlooks of up-and-coming cybersecurity pros? In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/nicholas-crabb/">Nick Crabb</a>, a senior at Florida Gulf Coast University majoring in computer information systems, focusing on cybersecurity. They discuss their favorite college movies, Nick's educational journey, the challenges of entering the field and AI's impact on future job prospects. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity veterans see the industry through the lens of experience. But how do those visions align with the outlooks of up-and-coming cybersecurity pros? In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/nicholas-crabb/">Nick Crabb</a>, a senior at Florida Gulf Coast University majoring in computer information systems, focusing on cybersecurity. They discuss their favorite college movies, Nick's educational journey, the challenges of entering the field and AI's impact on future job prospects. </p>]]>
      </content:encoded>
      <pubDate>Wed, 29 Jan 2025 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/736baabc/706cf2c4.mp3" length="36288123" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1510</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity veterans see the industry through the lens of experience. But how do those visions align with the outlooks of up-and-coming cybersecurity pros? In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/nicholas-crabb/">Nick Crabb</a>, a senior at Florida Gulf Coast University majoring in computer information systems, focusing on cybersecurity. They discuss their favorite college movies, Nick's educational journey, the challenges of entering the field and AI's impact on future job prospects. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>What the Trump Administration Could Mean for Cybersecurity</title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>What the Trump Administration Could Mean for Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">12680089-d3a2-4e4c-b74d-3ada7b9edd08</guid>
      <link>https://share.transistor.fm/s/64b916f8</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/merrittbaer/">Merritt Baer</a>, CISO and advisory board member for <a href="https://www.reco.ai/?utm_term=reco%20ai&amp;utm_campaign=brand&amp;utm_source=google&amp;utm_medium=ppc&amp;hsa_acc=5115141196&amp;hsa_cam=20951823559&amp;hsa_grp=157658257853&amp;hsa_ad=687834682065&amp;hsa_src=g&amp;hsa_tgt=kwd-2294457223674&amp;hsa_kw=reco%20ai&amp;hsa_mt=p&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1&amp;gclid=Cj0KCQiAkJO8BhCGARIsAMkswyjv37la9Rr4wpnxR0cdyYTgSLK6I3fA__fE3q9naLM59Q3_w2ggjnkaAt_JEALw_wcB">Reco</a>. Merritt also advises private businesses like <a href="https://www.expanso.io/">Expanso</a>, <a href="https://andesite.ai/?gad_source=1&amp;gclid=Cj0KCQiAkJO8BhCGARIsAMkswyjS-Gjfk2eIJVZXAD2ZkFen8H34DeXp8OdD78NuPc57XUVY1ykb3xYaArHPEALw_wcB">Andesite</a>, <a href="https://www.enkryptai.com/">Enkrypt AI</a> and <a href="https://www.level6cyber.com/">Level 6 Cybersecurity</a>. She has a background in cybersecurity within the U.S. government and spent five years at AWS. Jeffrey and Merritt discuss their favorite fictitious world leaders, how the Trump administration may impact cybersecurity and the importance of public/private partnerships.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/merrittbaer/">Merritt Baer</a>, CISO and advisory board member for <a href="https://www.reco.ai/?utm_term=reco%20ai&amp;utm_campaign=brand&amp;utm_source=google&amp;utm_medium=ppc&amp;hsa_acc=5115141196&amp;hsa_cam=20951823559&amp;hsa_grp=157658257853&amp;hsa_ad=687834682065&amp;hsa_src=g&amp;hsa_tgt=kwd-2294457223674&amp;hsa_kw=reco%20ai&amp;hsa_mt=p&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1&amp;gclid=Cj0KCQiAkJO8BhCGARIsAMkswyjv37la9Rr4wpnxR0cdyYTgSLK6I3fA__fE3q9naLM59Q3_w2ggjnkaAt_JEALw_wcB">Reco</a>. Merritt also advises private businesses like <a href="https://www.expanso.io/">Expanso</a>, <a href="https://andesite.ai/?gad_source=1&amp;gclid=Cj0KCQiAkJO8BhCGARIsAMkswyjS-Gjfk2eIJVZXAD2ZkFen8H34DeXp8OdD78NuPc57XUVY1ykb3xYaArHPEALw_wcB">Andesite</a>, <a href="https://www.enkryptai.com/">Enkrypt AI</a> and <a href="https://www.level6cyber.com/">Level 6 Cybersecurity</a>. She has a background in cybersecurity within the U.S. government and spent five years at AWS. Jeffrey and Merritt discuss their favorite fictitious world leaders, how the Trump administration may impact cybersecurity and the importance of public/private partnerships.</p>]]>
      </content:encoded>
      <pubDate>Wed, 22 Jan 2025 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/64b916f8/765cae57.mp3" length="53663248" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2234</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/merrittbaer/">Merritt Baer</a>, CISO and advisory board member for <a href="https://www.reco.ai/?utm_term=reco%20ai&amp;utm_campaign=brand&amp;utm_source=google&amp;utm_medium=ppc&amp;hsa_acc=5115141196&amp;hsa_cam=20951823559&amp;hsa_grp=157658257853&amp;hsa_ad=687834682065&amp;hsa_src=g&amp;hsa_tgt=kwd-2294457223674&amp;hsa_kw=reco%20ai&amp;hsa_mt=p&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1&amp;gclid=Cj0KCQiAkJO8BhCGARIsAMkswyjv37la9Rr4wpnxR0cdyYTgSLK6I3fA__fE3q9naLM59Q3_w2ggjnkaAt_JEALw_wcB">Reco</a>. Merritt also advises private businesses like <a href="https://www.expanso.io/">Expanso</a>, <a href="https://andesite.ai/?gad_source=1&amp;gclid=Cj0KCQiAkJO8BhCGARIsAMkswyjS-Gjfk2eIJVZXAD2ZkFen8H34DeXp8OdD78NuPc57XUVY1ykb3xYaArHPEALw_wcB">Andesite</a>, <a href="https://www.enkryptai.com/">Enkrypt AI</a> and <a href="https://www.level6cyber.com/">Level 6 Cybersecurity</a>. She has a background in cybersecurity within the U.S. government and spent five years at AWS. Jeffrey and Merritt discuss their favorite fictitious world leaders, how the Trump administration may impact cybersecurity and the importance of public/private partnerships.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Everything is an Endpoint — and Other Zero Trust Insight</title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>Everything is an Endpoint — and Other Zero Trust Insight</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3941d1b1-57af-494c-bd47-449c815f5668</guid>
      <link>https://share.transistor.fm/s/91ad2ac0</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/jessicamba/">Jessica Dapelo</a>, a zero trust expert and founder of <a href="https://www.jessicadapeloenterpriseinc.world/">Jessica Dapelo Enterprises</a>, a consulting firm specializing in cybersecurity guidance for public sector organizations and agencies. They discuss movies about the convergence of two worlds, the importance of understanding zero trust as a proactive cybersecurity methodology, the implications of ethical AI on data privacy and the need for organizations to be aware of their data storage and access permissions. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/jessicamba/">Jessica Dapelo</a>, a zero trust expert and founder of <a href="https://www.jessicadapeloenterpriseinc.world/">Jessica Dapelo Enterprises</a>, a consulting firm specializing in cybersecurity guidance for public sector organizations and agencies. They discuss movies about the convergence of two worlds, the importance of understanding zero trust as a proactive cybersecurity methodology, the implications of ethical AI on data privacy and the need for organizations to be aware of their data storage and access permissions. </p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Jan 2025 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/91ad2ac0/57eec39c.mp3" length="37885700" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1577</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/jessicamba/">Jessica Dapelo</a>, a zero trust expert and founder of <a href="https://www.jessicadapeloenterpriseinc.world/">Jessica Dapelo Enterprises</a>, a consulting firm specializing in cybersecurity guidance for public sector organizations and agencies. They discuss movies about the convergence of two worlds, the importance of understanding zero trust as a proactive cybersecurity methodology, the implications of ethical AI on data privacy and the need for organizations to be aware of their data storage and access permissions. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>We Really Need to Shake S*** Up in Cybersecurity Research and Insight</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>We Really Need to Shake S*** Up in Cybersecurity Research and Insight</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">500c72e4-b8b1-4880-b99b-d4b18e7fac3d</guid>
      <link>https://share.transistor.fm/s/85abf621</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey speaks with cybersecurity marketing extraordinaire <a href="https://www.linkedin.com/in/daniarad/">Dani Woolf</a>, co-founder of <a href="https://cybersynapse.us/">CyberSynapse</a> and CEO/host of the <a href="https://audience1st.fm/c/about">Audience 1st podcast</a>. They discuss movies where the main character rocks the status quo, the unique challenges of marketing in the cybersecurity space, the shortcomings of traditional analyst models and the importance of direct customer engagement. The conversation also touches on the necessity of collaboration within the cybersecurity community and the common pitfalls smaller vendors face when trying to penetrate the enterprise market.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey speaks with cybersecurity marketing extraordinaire <a href="https://www.linkedin.com/in/daniarad/">Dani Woolf</a>, co-founder of <a href="https://cybersynapse.us/">CyberSynapse</a> and CEO/host of the <a href="https://audience1st.fm/c/about">Audience 1st podcast</a>. They discuss movies where the main character rocks the status quo, the unique challenges of marketing in the cybersecurity space, the shortcomings of traditional analyst models and the importance of direct customer engagement. The conversation also touches on the necessity of collaboration within the cybersecurity community and the common pitfalls smaller vendors face when trying to penetrate the enterprise market.</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 Jan 2025 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/85abf621/4ac1daca.mp3" length="45621167" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1899</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey speaks with cybersecurity marketing extraordinaire <a href="https://www.linkedin.com/in/daniarad/">Dani Woolf</a>, co-founder of <a href="https://cybersynapse.us/">CyberSynapse</a> and CEO/host of the <a href="https://audience1st.fm/c/about">Audience 1st podcast</a>. They discuss movies where the main character rocks the status quo, the unique challenges of marketing in the cybersecurity space, the shortcomings of traditional analyst models and the importance of direct customer engagement. The conversation also touches on the necessity of collaboration within the cybersecurity community and the common pitfalls smaller vendors face when trying to penetrate the enterprise market.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>Yes</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Yes, CISOs Should Be Ethical — But Maybe We Stop Lying To Them</title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>Yes, CISOs Should Be Ethical — But Maybe We Stop Lying To Them</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">14f25b40-9c9c-4cd7-9466-890596542873</guid>
      <link>https://share.transistor.fm/s/c5634930</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Robert “RSnake” Hansen, Managing Director at Grossman Ventures. He’s also a computer hacker, executive and entrepreneur. He’s most well-known for his security research and disclosures such as Slowloris, Clickjacking, Fierce DNS enumeration tool and others. </p><p>RSnake produces a wide range of security content including <a href="https://rsnakereport.rsnake.com/">The RSnake Report</a> newsletter, a podcast called <a href="https://www.youtube.com/@thersnakeshow">The RSnake Show</a> and a book entitled <a href="https://www.amazon.com/Best-Friend-Robert-RSnake-Hansen/dp/B0CWKY91WM/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=&amp;sr=">AI’s Best Friend</a>. Jeffrey and Robert discuss movies where a main character struggles with an ethical dilemma, the temptations for CISOs to act unethically and how companies should support CISOs to minimize the prevalence of those temptations. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Robert “RSnake” Hansen, Managing Director at Grossman Ventures. He’s also a computer hacker, executive and entrepreneur. He’s most well-known for his security research and disclosures such as Slowloris, Clickjacking, Fierce DNS enumeration tool and others. </p><p>RSnake produces a wide range of security content including <a href="https://rsnakereport.rsnake.com/">The RSnake Report</a> newsletter, a podcast called <a href="https://www.youtube.com/@thersnakeshow">The RSnake Show</a> and a book entitled <a href="https://www.amazon.com/Best-Friend-Robert-RSnake-Hansen/dp/B0CWKY91WM/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=&amp;sr=">AI’s Best Friend</a>. Jeffrey and Robert discuss movies where a main character struggles with an ethical dilemma, the temptations for CISOs to act unethically and how companies should support CISOs to minimize the prevalence of those temptations. </p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Dec 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/c5634930/c0718231.mp3" length="66850242" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2784</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Robert “RSnake” Hansen, Managing Director at Grossman Ventures. He’s also a computer hacker, executive and entrepreneur. He’s most well-known for his security research and disclosures such as Slowloris, Clickjacking, Fierce DNS enumeration tool and others. </p><p>RSnake produces a wide range of security content including <a href="https://rsnakereport.rsnake.com/">The RSnake Report</a> newsletter, a podcast called <a href="https://www.youtube.com/@thersnakeshow">The RSnake Show</a> and a book entitled <a href="https://www.amazon.com/Best-Friend-Robert-RSnake-Hansen/dp/B0CWKY91WM/ref=tmm_pap_swatch_0?_encoding=UTF8&amp;qid=&amp;sr=">AI’s Best Friend</a>. Jeffrey and Robert discuss movies where a main character struggles with an ethical dilemma, the temptations for CISOs to act unethically and how companies should support CISOs to minimize the prevalence of those temptations. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Turtles All the Way Down — Looking for Third-Party Risk in DORA</title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>Turtles All the Way Down — Looking for Third-Party Risk in DORA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c5dc359a-ce3a-49ae-bf7b-742a216138ef</guid>
      <link>https://share.transistor.fm/s/70f55914</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey Wheatman talks to <a href="https://www.linkedin.com/in/sandra-saliba-575832123/?originalSubdomain=mt">Sandra Saliba</a>, TPP Governance Manager at APS Bank. Jeffrey and Sandra dig into the Digital Operational Resilience Act (DORA), the implications of DORA for financial institutions, and the importance of managing third-party risk in the face of increasing cyber threats. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey Wheatman talks to <a href="https://www.linkedin.com/in/sandra-saliba-575832123/?originalSubdomain=mt">Sandra Saliba</a>, TPP Governance Manager at APS Bank. Jeffrey and Sandra dig into the Digital Operational Resilience Act (DORA), the implications of DORA for financial institutions, and the importance of managing third-party risk in the face of increasing cyber threats. </p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Dec 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/70f55914/4c4d86f9.mp3" length="47227548" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1966</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey Wheatman talks to <a href="https://www.linkedin.com/in/sandra-saliba-575832123/?originalSubdomain=mt">Sandra Saliba</a>, TPP Governance Manager at APS Bank. Jeffrey and Sandra dig into the Digital Operational Resilience Act (DORA), the implications of DORA for financial institutions, and the importance of managing third-party risk in the face of increasing cyber threats. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Enough With the Cybersecurity Gatekeeping — Be a Genuine Mentor</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>Enough With the Cybersecurity Gatekeeping — Be a Genuine Mentor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5e4e1e5b-49fe-45b6-8eb3-10aeb30ed90b</guid>
      <link>https://share.transistor.fm/s/7a6b466a</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks with <a href="https://www.linkedin.com/in/david-ruiz1/">Dave Ruiz</a> — aka “CyberDAve” — cybersecurity leader for the Public Works Commission in Fayetteville, North Carolina. Dave is an Army veteran with over 20 years of experience in information assurance and security, governance risk and compliance and IT/OT Security. And he plays a mean guitar. Jeffrey and Dave discuss movies in which a mentor/mentee relationship is critical to the plot, how gatekeeping is detrimental to the future of cybersecurity and why genuine mentorship is so important to move the industry forward. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks with <a href="https://www.linkedin.com/in/david-ruiz1/">Dave Ruiz</a> — aka “CyberDAve” — cybersecurity leader for the Public Works Commission in Fayetteville, North Carolina. Dave is an Army veteran with over 20 years of experience in information assurance and security, governance risk and compliance and IT/OT Security. And he plays a mean guitar. Jeffrey and Dave discuss movies in which a mentor/mentee relationship is critical to the plot, how gatekeeping is detrimental to the future of cybersecurity and why genuine mentorship is so important to move the industry forward. </p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Dec 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/7a6b466a/596804b9.mp3" length="46528932" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1937</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks with <a href="https://www.linkedin.com/in/david-ruiz1/">Dave Ruiz</a> — aka “CyberDAve” — cybersecurity leader for the Public Works Commission in Fayetteville, North Carolina. Dave is an Army veteran with over 20 years of experience in information assurance and security, governance risk and compliance and IT/OT Security. And he plays a mean guitar. Jeffrey and Dave discuss movies in which a mentor/mentee relationship is critical to the plot, how gatekeeping is detrimental to the future of cybersecurity and why genuine mentorship is so important to move the industry forward. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Hey, Cybersecurity Pros: Complexity is the Enemy of Execution</title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Hey, Cybersecurity Pros: Complexity is the Enemy of Execution</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c7e2631c-7193-4fca-8cb2-7558e0d885d1</guid>
      <link>https://share.transistor.fm/s/8d7a6a9d</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/jonesedgar/">Edgar Jones</a>, co-founder of <a href="https://www.thelitcode.com/">Luminated in Thought</a> — aka L.I.T. — an organization specializing in individual and group coaching for professionals. Edgar uses his background and lessons learned as a former NFL player to help professionals take on overwhelming situations and determine a clear path to breaking through complexity. He and Jeffrey discuss movies where a character exhibits leadership traits, navigating conflict via communication skills and how the best leaders are those who make connections — and how it all relates to cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/jonesedgar/">Edgar Jones</a>, co-founder of <a href="https://www.thelitcode.com/">Luminated in Thought</a> — aka L.I.T. — an organization specializing in individual and group coaching for professionals. Edgar uses his background and lessons learned as a former NFL player to help professionals take on overwhelming situations and determine a clear path to breaking through complexity. He and Jeffrey discuss movies where a character exhibits leadership traits, navigating conflict via communication skills and how the best leaders are those who make connections — and how it all relates to cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Wed, 27 Nov 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/8d7a6a9d/2f07454c.mp3" length="46052969" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1917</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/jonesedgar/">Edgar Jones</a>, co-founder of <a href="https://www.thelitcode.com/">Luminated in Thought</a> — aka L.I.T. — an organization specializing in individual and group coaching for professionals. Edgar uses his background and lessons learned as a former NFL player to help professionals take on overwhelming situations and determine a clear path to breaking through complexity. He and Jeffrey discuss movies where a character exhibits leadership traits, navigating conflict via communication skills and how the best leaders are those who make connections — and how it all relates to cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Navigating Bias — Cybersecurity’s Crooked Mirror </title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Navigating Bias — Cybersecurity’s Crooked Mirror </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fb3b1c84-ea20-4d50-b108-d9da7a498041</guid>
      <link>https://share.transistor.fm/s/d7828561</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/dustinsachs/">Dr. Dustin Sachs</a>, Chief Technologist and Sr. Director of Programs at the <a href="https://www.cyberriskcollaborative.com/">CyberRisk Collaborative</a>. They discuss movies in which a main character’s misunderstanding of a situation creates chaos, then dive into Dustin’s extensive <a href="https://careered.libguides.com/ctu/journal/thepinnacle/v2n2Sachs">scholarly research on bias</a> and explore its impact on making sound cybersecurity decisions. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/dustinsachs/">Dr. Dustin Sachs</a>, Chief Technologist and Sr. Director of Programs at the <a href="https://www.cyberriskcollaborative.com/">CyberRisk Collaborative</a>. They discuss movies in which a main character’s misunderstanding of a situation creates chaos, then dive into Dustin’s extensive <a href="https://careered.libguides.com/ctu/journal/thepinnacle/v2n2Sachs">scholarly research on bias</a> and explore its impact on making sound cybersecurity decisions. </p>]]>
      </content:encoded>
      <pubDate>Wed, 20 Nov 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/d7828561/00a241b0.mp3" length="47755977" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1988</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/dustinsachs/">Dr. Dustin Sachs</a>, Chief Technologist and Sr. Director of Programs at the <a href="https://www.cyberriskcollaborative.com/">CyberRisk Collaborative</a>. They discuss movies in which a main character’s misunderstanding of a situation creates chaos, then dive into Dustin’s extensive <a href="https://careered.libguides.com/ctu/journal/thepinnacle/v2n2Sachs">scholarly research on bias</a> and explore its impact on making sound cybersecurity decisions. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Helping CISOs Communicate Their Way To Positive Outcomes</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>Helping CISOs Communicate Their Way To Positive Outcomes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f8e9ae1d-cbbd-451f-953b-ce722fad3102</guid>
      <link>https://share.transistor.fm/s/74ae4b09</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/rocklambros/">Rock Lambros</a>, founder and CEO of <a href="https://www.rockcyber.com/">RockCyber</a>. Along with coaching CISOs and serving as a vCISO, Rock is also a published thought leader, co-authoring the book, “<a href="https://www.amazon.com/CISO-Evolution-Knowledge-Cybersecurity-Executives/dp/1119782481">The CISO Evolution: Business Knowledge for Cybersecurity Executives</a>.” Rock and Jeffrey talk about “little fish in a big pond” movies, the evolving landscape of cybersecurity for SMBs, transitioning from management to leadership in cybersecurity and the need for effective communication and collaboration between cybersecurity and operational teams.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/rocklambros/">Rock Lambros</a>, founder and CEO of <a href="https://www.rockcyber.com/">RockCyber</a>. Along with coaching CISOs and serving as a vCISO, Rock is also a published thought leader, co-authoring the book, “<a href="https://www.amazon.com/CISO-Evolution-Knowledge-Cybersecurity-Executives/dp/1119782481">The CISO Evolution: Business Knowledge for Cybersecurity Executives</a>.” Rock and Jeffrey talk about “little fish in a big pond” movies, the evolving landscape of cybersecurity for SMBs, transitioning from management to leadership in cybersecurity and the need for effective communication and collaboration between cybersecurity and operational teams.</p>]]>
      </content:encoded>
      <pubDate>Wed, 13 Nov 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/74ae4b09/486493f2.mp3" length="43488380" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1810</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/rocklambros/">Rock Lambros</a>, founder and CEO of <a href="https://www.rockcyber.com/">RockCyber</a>. Along with coaching CISOs and serving as a vCISO, Rock is also a published thought leader, co-authoring the book, “<a href="https://www.amazon.com/CISO-Evolution-Knowledge-Cybersecurity-Executives/dp/1119782481">The CISO Evolution: Business Knowledge for Cybersecurity Executives</a>.” Rock and Jeffrey talk about “little fish in a big pond” movies, the evolving landscape of cybersecurity for SMBs, transitioning from management to leadership in cybersecurity and the need for effective communication and collaboration between cybersecurity and operational teams.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Art of Throwing the (Calculated) Cybersecurity Hail Mary</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>The Art of Throwing the (Calculated) Cybersecurity Hail Mary</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eec0bb9c-05e4-4734-b32d-f99d39a4489c</guid>
      <link>https://share.transistor.fm/s/5e7a8999</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/melreyes/">Mel Reyes</a>, CEO of <a href="https://etc.limited/">Elite Technical Concierge</a>. Mel’s background is deep, with expertise in helping organizations build successful security programs with limited resources. He also heads a nonprofit organization, <a href="https://fdg.institute/">Fellowship of Digital Guardians</a> that seeks to elevate awareness of IT, cybersecurity and compliance domains among individuals and organizations. Jeffrey and Mel discuss movies with unlikely heroes, the need for speed and agility in defense strategies and why innovative — and sometimes risky — ideas are critical to cybersecurity success.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/melreyes/">Mel Reyes</a>, CEO of <a href="https://etc.limited/">Elite Technical Concierge</a>. Mel’s background is deep, with expertise in helping organizations build successful security programs with limited resources. He also heads a nonprofit organization, <a href="https://fdg.institute/">Fellowship of Digital Guardians</a> that seeks to elevate awareness of IT, cybersecurity and compliance domains among individuals and organizations. Jeffrey and Mel discuss movies with unlikely heroes, the need for speed and agility in defense strategies and why innovative — and sometimes risky — ideas are critical to cybersecurity success.</p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Nov 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/5e7a8999/6115193a.mp3" length="47891040" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1994</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/melreyes/">Mel Reyes</a>, CEO of <a href="https://etc.limited/">Elite Technical Concierge</a>. Mel’s background is deep, with expertise in helping organizations build successful security programs with limited resources. He also heads a nonprofit organization, <a href="https://fdg.institute/">Fellowship of Digital Guardians</a> that seeks to elevate awareness of IT, cybersecurity and compliance domains among individuals and organizations. Jeffrey and Mel discuss movies with unlikely heroes, the need for speed and agility in defense strategies and why innovative — and sometimes risky — ideas are critical to cybersecurity success.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>What the Military’s “Elegant and Brutal” Model Can Teach Us About Cybersecurity</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>What the Military’s “Elegant and Brutal” Model Can Teach Us About Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5e3b6bc7-583a-4d36-bbc0-f885bc460146</guid>
      <link>https://share.transistor.fm/s/c89c72e9</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/cindy-seipert/">Cindy Seipert</a>, an InfoSec GRC analyst at Health Catalyst. They discuss movies that challenge our identity, Cindy’s unique career path from the military to the tech industry and her experiences as a woman in cybersecurity.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/cindy-seipert/">Cindy Seipert</a>, an InfoSec GRC analyst at Health Catalyst. They discuss movies that challenge our identity, Cindy’s unique career path from the military to the tech industry and her experiences as a woman in cybersecurity.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 30 Oct 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/c89c72e9/17a75183.mp3" length="44637198" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1858</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/cindy-seipert/">Cindy Seipert</a>, an InfoSec GRC analyst at Health Catalyst. They discuss movies that challenge our identity, Cindy’s unique career path from the military to the tech industry and her experiences as a woman in cybersecurity.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>You’ve Got To Be Audacious To Succeed</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>You’ve Got To Be Audacious To Succeed</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c32658f4-fe45-442b-a2dc-9f9d9bdadbd5</guid>
      <link>https://share.transistor.fm/s/87cc9f92</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks with <a href="https://www.linkedin.com/in/keren-de-via/">Keren de Via</a>, Go-to-Market Director at Cyturus Technologies. Keren has a deep cybersecurity background and was the first female Combat Communications and Cyber Defense Officer in the Israel Defense Forces. They discuss movies where a character experiences a perspective-shifting transformation, Keren’s transition from military to civilian life and the importance of overcoming imposter syndrome.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks with <a href="https://www.linkedin.com/in/keren-de-via/">Keren de Via</a>, Go-to-Market Director at Cyturus Technologies. Keren has a deep cybersecurity background and was the first female Combat Communications and Cyber Defense Officer in the Israel Defense Forces. They discuss movies where a character experiences a perspective-shifting transformation, Keren’s transition from military to civilian life and the importance of overcoming imposter syndrome.</p>]]>
      </content:encoded>
      <pubDate>Wed, 23 Oct 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/87cc9f92/88d156dc.mp3" length="43829568" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1825</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks with <a href="https://www.linkedin.com/in/keren-de-via/">Keren de Via</a>, Go-to-Market Director at Cyturus Technologies. Keren has a deep cybersecurity background and was the first female Combat Communications and Cyber Defense Officer in the Israel Defense Forces. They discuss movies where a character experiences a perspective-shifting transformation, Keren’s transition from military to civilian life and the importance of overcoming imposter syndrome.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>What Better Time Than Now? (And Other Considerations for Aspiring Security Professionals)</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>What Better Time Than Now? (And Other Considerations for Aspiring Security Professionals)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5902b609-abd4-4f71-8c90-3664eb6129b7</guid>
      <link>https://share.transistor.fm/s/ddb73e64</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Tanara Burke-Lloyd, SOC Analyst at Littler, the largest global employment and labor law practice. They discuss “fish out of water” movies, her inspiring journey into cybersecurity and the importance of mentorship, documentation and understanding the actual problems in cybersecurity. </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Tanara Burke-Lloyd, SOC Analyst at Littler, the largest global employment and labor law practice. They discuss “fish out of water” movies, her inspiring journey into cybersecurity and the importance of mentorship, documentation and understanding the actual problems in cybersecurity. </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 16 Oct 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/ddb73e64/cade82ab.mp3" length="41043255" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1708</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Tanara Burke-Lloyd, SOC Analyst at Littler, the largest global employment and labor law practice. They discuss “fish out of water” movies, her inspiring journey into cybersecurity and the importance of mentorship, documentation and understanding the actual problems in cybersecurity. </p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Why “Always Be Collaborating” Should Overshadow “Always Be Closing” in Security Sales</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Why “Always Be Collaborating” Should Overshadow “Always Be Closing” in Security Sales</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">143ba27e-1fe5-467b-9c86-94c54cbc3ea7</guid>
      <link>https://share.transistor.fm/s/f17a6f9d</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to entrepreneur and four-time CISO Demetrios Lazarikos — aka Laz. Laz is the founder and IT security consultant of Blue Lava Consulting. They discuss why security salespeople should look for ways to solve problems instead of focusing solely on closing and how CISOs can better communicate to a wider audience. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to entrepreneur and four-time CISO Demetrios Lazarikos — aka Laz. Laz is the founder and IT security consultant of Blue Lava Consulting. They discuss why security salespeople should look for ways to solve problems instead of focusing solely on closing and how CISOs can better communicate to a wider audience. </p>]]>
      </content:encoded>
      <pubDate>Wed, 09 Oct 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/f17a6f9d/bfd947c5.mp3" length="39341007" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1637</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to entrepreneur and four-time CISO Demetrios Lazarikos — aka Laz. Laz is the founder and IT security consultant of Blue Lava Consulting. They discuss why security salespeople should look for ways to solve problems instead of focusing solely on closing and how CISOs can better communicate to a wider audience. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>How CISOs Manage Risk Acceptance</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>How CISOs Manage Risk Acceptance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5d24e757-005b-4b7f-be64-c9dc95027110</guid>
      <link>https://share.transistor.fm/s/ca766618</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/evelinbiro/">Evelin Biro</a>, a CISO advisor and cybersecurity expert. They discuss movies where a character goes through a significant life change, the role risk acceptance plays for CISOs and the difficult disconnect between regulatory requirements and business expectations. </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/evelinbiro/">Evelin Biro</a>, a CISO advisor and cybersecurity expert. They discuss movies where a character goes through a significant life change, the role risk acceptance plays for CISOs and the difficult disconnect between regulatory requirements and business expectations. </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 02 Oct 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/ca766618/16cab980.mp3" length="42799114" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1782</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to <a href="https://www.linkedin.com/in/evelinbiro/">Evelin Biro</a>, a CISO advisor and cybersecurity expert. They discuss movies where a character goes through a significant life change, the role risk acceptance plays for CISOs and the difficult disconnect between regulatory requirements and business expectations. </p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>AppSec Ain’t Easy — But it Doesn’t Have to be Impossible</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>AppSec Ain’t Easy — But it Doesn’t Have to be Impossible</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">30cae06b-04f1-4fd6-873f-7c72306bb8bf</guid>
      <link>https://share.transistor.fm/s/98546126</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Pete Chestna, Checkmarx's CISO of the Americas. They discuss movies in which a character feels threatened by the introduction of a new character, why successful AppSec requires better security/developer symbiosis and how CISOs take on the myriad challenges they face.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Pete Chestna, Checkmarx's CISO of the Americas. They discuss movies in which a character feels threatened by the introduction of a new character, why successful AppSec requires better security/developer symbiosis and how CISOs take on the myriad challenges they face.</p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Sep 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/98546126/37db0537.mp3" length="43396400" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1807</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Pete Chestna, Checkmarx's CISO of the Americas. They discuss movies in which a character feels threatened by the introduction of a new character, why successful AppSec requires better security/developer symbiosis and how CISOs take on the myriad challenges they face.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Building Business Resilience in the Face of Risk</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Building Business Resilience in the Face of Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bd011d7a-ba68-4f77-bb0d-f0dc8a7a113b</guid>
      <link>https://share.transistor.fm/s/c4c35645</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Sara Ricci, an accomplished consultant and executive with a proven track record in global leadership roles, specializing in building new capabilities and enhancing organizational resilience. Jeffrey and Sara discuss movies with characters who exhibit great strength in the face of risk, the difference between resilience and business continuity and the need for collaboration and communication across different teams and levels of an organization.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Sara Ricci, an accomplished consultant and executive with a proven track record in global leadership roles, specializing in building new capabilities and enhancing organizational resilience. Jeffrey and Sara discuss movies with characters who exhibit great strength in the face of risk, the difference between resilience and business continuity and the need for collaboration and communication across different teams and levels of an organization.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Sep 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/c4c35645/6c88486c.mp3" length="42861744" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1784</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Sara Ricci, an accomplished consultant and executive with a proven track record in global leadership roles, specializing in building new capabilities and enhancing organizational resilience. Jeffrey and Sara discuss movies with characters who exhibit great strength in the face of risk, the difference between resilience and business continuity and the need for collaboration and communication across different teams and levels of an organization.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Calculating the Cost of Cyber Risk</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Calculating the Cost of Cyber Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6e44a49c-c139-4971-946a-e666d6a368ed</guid>
      <link>https://share.transistor.fm/s/f144b474</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to veteran CISO and cybersecurity practitioner Jason Taule. Jason has worked with Booz Allen, General Dynamics, HITRUST and others. Today, he serves as a virtual CISO for various clients. Jeffrey and Jason discuss movies that highlight character transitions, approaches to risk conversations and the cost calculations of cyber risk.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to veteran CISO and cybersecurity practitioner Jason Taule. Jason has worked with Booz Allen, General Dynamics, HITRUST and others. Today, he serves as a virtual CISO for various clients. Jeffrey and Jason discuss movies that highlight character transitions, approaches to risk conversations and the cost calculations of cyber risk.</p>]]>
      </content:encoded>
      <pubDate>Wed, 04 Sep 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/f144b474/6a1654fe.mp3" length="47442172" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1975</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to veteran CISO and cybersecurity practitioner Jason Taule. Jason has worked with Booz Allen, General Dynamics, HITRUST and others. Today, he serves as a virtual CISO for various clients. Jeffrey and Jason discuss movies that highlight character transitions, approaches to risk conversations and the cost calculations of cyber risk.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>How Security Advisors Support Sales — Without Actually Selling</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>How Security Advisors Support Sales — Without Actually Selling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9567caae-d44f-4151-966b-dab4fbc6d301</guid>
      <link>https://share.transistor.fm/s/fff4221a</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Helen Patton, cybersecurity advisor at Cisco. They discuss movies where the main character undergoes a career change, the challenges of being a cybersecurity advisor and maintaining your reputation as an independent thinker when working for a large company. </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Helen Patton, cybersecurity advisor at Cisco. They discuss movies where the main character undergoes a career change, the challenges of being a cybersecurity advisor and maintaining your reputation as an independent thinker when working for a large company. </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Aug 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/fff4221a/e1b3ffb7.mp3" length="43134758" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1796</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Helen Patton, cybersecurity advisor at Cisco. They discuss movies where the main character undergoes a career change, the challenges of being a cybersecurity advisor and maintaining your reputation as an independent thinker when working for a large company. </p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>An Uncommon Cybersecurity Question: What Makes Your Soul Sing?</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>An Uncommon Cybersecurity Question: What Makes Your Soul Sing?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">33e59c78-36f0-4374-9b6f-49dc1fc2352b</guid>
      <link>https://share.transistor.fm/s/b9aca6f7</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks with Dom Vogel, founder of Vogel Leadership &amp; Coaching, where he helps cybersecurity executives to be the best leaders possible. Jeffrey and Dom discuss their favorite tear-jerkers, the power of empathetic leadership and “epic friend-building.” </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks with Dom Vogel, founder of Vogel Leadership &amp; Coaching, where he helps cybersecurity executives to be the best leaders possible. Jeffrey and Dom discuss their favorite tear-jerkers, the power of empathetic leadership and “epic friend-building.” </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Aug 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/b9aca6f7/91cc56d3.mp3" length="40999402" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1707</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks with Dom Vogel, founder of Vogel Leadership &amp; Coaching, where he helps cybersecurity executives to be the best leaders possible. Jeffrey and Dom discuss their favorite tear-jerkers, the power of empathetic leadership and “epic friend-building.” </p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Wanna Tackle Third-Party Risk? Collaborate, Collaborate, Collaborate!  </title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Wanna Tackle Third-Party Risk? Collaborate, Collaborate, Collaborate!  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cc9f6dac-a9ed-4ac6-b108-3d627ddd1a42</guid>
      <link>https://share.transistor.fm/s/5e984712</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Richard Stiennon, Chief Research Analyst at IT-Harvest. They discuss their favorite buddy movies, the art of collaboration with vendors and third parties and how CISOs and their teams can work with partners across the supply chain.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Richard Stiennon, Chief Research Analyst at IT-Harvest. They discuss their favorite buddy movies, the art of collaboration with vendors and third parties and how CISOs and their teams can work with partners across the supply chain.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 31 Jul 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/5e984712/f586c3c7.mp3" length="44693437" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1861</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Richard Stiennon, Chief Research Analyst at IT-Harvest. They discuss their favorite buddy movies, the art of collaboration with vendors and third parties and how CISOs and their teams can work with partners across the supply chain.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity; third party risk; third party security; CISOs; CIOs</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>You Can't Ease off the Security Gas Pedal — Especially in Healthcare</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>You Can't Ease off the Security Gas Pedal — Especially in Healthcare</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">237d8003-d226-44b5-a7fa-ba093643bd14</guid>
      <link>https://share.transistor.fm/s/30f2fb75</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Adam Moore, Head of Global Cloud Solutions for Elekta. They discuss movies that look forward and backward, security threats — including AI — to healthcare data and why you can never say “we’re good” with your security posture.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Adam Moore, Head of Global Cloud Solutions for Elekta. They discuss movies that look forward and backward, security threats — including AI — to healthcare data and why you can never say “we’re good” with your security posture.</p>]]>
      </content:encoded>
      <pubDate>Wed, 24 Jul 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/30f2fb75/32905202.mp3" length="40948765" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1705</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Adam Moore, Head of Global Cloud Solutions for Elekta. They discuss movies that look forward and backward, security threats — including AI — to healthcare data and why you can never say “we’re good” with your security posture.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>CISOs Need to Tell Good Stories and the Right Allies to Help Tell Them</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>CISOs Need to Tell Good Stories and the Right Allies to Help Tell Them</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">773d9865-bd12-4c62-9715-98fc00e1e808</guid>
      <link>https://share.transistor.fm/s/c5778b6b</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey is joined by Matthew Webster, founder, CEO and CISO for Cyvergence. Jeffrey and Matthew discuss movies where miscommunication impacts a character, the importance of CISOs communicating the business impact of cybersecurity and finding allies to help them do it. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey is joined by Matthew Webster, founder, CEO and CISO for Cyvergence. Jeffrey and Matthew discuss movies where miscommunication impacts a character, the importance of CISOs communicating the business impact of cybersecurity and finding allies to help them do it. </p>]]>
      </content:encoded>
      <pubDate>Wed, 17 Jul 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/c5778b6b/cb5c14c6.mp3" length="44078081" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1835</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey is joined by Matthew Webster, founder, CEO and CISO for Cyvergence. Jeffrey and Matthew discuss movies where miscommunication impacts a character, the importance of CISOs communicating the business impact of cybersecurity and finding allies to help them do it. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Third Party Risk Management Doesn’t Stop When the Contract is Executed</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Third Party Risk Management Doesn’t Stop When the Contract is Executed</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b4dd5689-c4ba-4d87-b94e-555f1f544946</guid>
      <link>https://share.transistor.fm/s/39d66938</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Melissa Mellen, Head of Third Party Risk Management for the Federal Reserve Bank of New York. They discuss movies that have unforeseen plot twists and the myriad challenges related to addressing third party risk management in cybersecurity. </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Melissa Mellen, Head of Third Party Risk Management for the Federal Reserve Bank of New York. They discuss movies that have unforeseen plot twists and the myriad challenges related to addressing third party risk management in cybersecurity. </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 10 Jul 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/39d66938/30f89302.mp3" length="44712920" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1861</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Melissa Mellen, Head of Third Party Risk Management for the Federal Reserve Bank of New York. They discuss movies that have unforeseen plot twists and the myriad challenges related to addressing third party risk management in cybersecurity. </p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity; third party risk; third party risk management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>An Honest Look at Diversity and Inclusion in the Security Industry</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>An Honest Look at Diversity and Inclusion in the Security Industry</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4a44b04f-c21d-40d1-b616-bbd0946107e0</guid>
      <link>https://share.transistor.fm/s/064afc30</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Octavia Howell, CISO at Equifax. Jeffrey and Octavia discuss movies that have done a good job at implementing diversity in storylines and characters, the isolation that women and people of color can feel at security events and what can be done to make the industry more inclusive.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Octavia Howell, CISO at Equifax. Jeffrey and Octavia discuss movies that have done a good job at implementing diversity in storylines and characters, the isolation that women and people of color can feel at security events and what can be done to make the industry more inclusive.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Jul 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/064afc30/0e5bef67.mp3" length="36228040" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1508</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Octavia Howell, CISO at Equifax. Jeffrey and Octavia discuss movies that have done a good job at implementing diversity in storylines and characters, the isolation that women and people of color can feel at security events and what can be done to make the industry more inclusive.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity; diversity and includsion; CISO</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>If You’re Not Leading With Empathy, Are You Really Leading?</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>If You’re Not Leading With Empathy, Are You Really Leading?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5ceac3ba-b264-47a6-b791-6dbeccb3d8af</guid>
      <link>https://share.transistor.fm/s/e41f863d</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks with Tammy Klotz, CISO of Trinseo. Recorded at the recent Gartner Security &amp; Risk Management Summit, they discuss their favorite low-budget movies, lessons from Tammy’s book, “<a href="https://www.amazon.com/stores/Tammy-Klotz/author/B0CY9GWZ6B?ref=ap_rdr&amp;isDramIntegrated=true&amp;shoppingPortalEnabled=true">Leading with Empathy and Grace</a>” and how the manufacturing industry has embraced cybersecurity in recent years. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks with Tammy Klotz, CISO of Trinseo. Recorded at the recent Gartner Security &amp; Risk Management Summit, they discuss their favorite low-budget movies, lessons from Tammy’s book, “<a href="https://www.amazon.com/stores/Tammy-Klotz/author/B0CY9GWZ6B?ref=ap_rdr&amp;isDramIntegrated=true&amp;shoppingPortalEnabled=true">Leading with Empathy and Grace</a>” and how the manufacturing industry has embraced cybersecurity in recent years. </p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Jun 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/e41f863d/a968e462.mp3" length="34529756" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1437</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks with Tammy Klotz, CISO of Trinseo. Recorded at the recent Gartner Security &amp; Risk Management Summit, they discuss their favorite low-budget movies, lessons from Tammy’s book, “<a href="https://www.amazon.com/stores/Tammy-Klotz/author/B0CY9GWZ6B?ref=ap_rdr&amp;isDramIntegrated=true&amp;shoppingPortalEnabled=true">Leading with Empathy and Grace</a>” and how the manufacturing industry has embraced cybersecurity in recent years. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Trials and Tribulations of a Virtual CISO and Startup Advisor</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>The Trials and Tribulations of a Virtual CISO and Startup Advisor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">adefc08c-4112-4f52-8d89-58bf9b08cb9a</guid>
      <link>https://share.transistor.fm/s/aae00461</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Tony Gonzalez, a former CTO, CIO and CISO in sectors such as biotech, pharma, specialty chemicals, finance and insurance. Today, Tony offers startup advisory and virtual CISO services. Jeffrey and Tony talk about movies where the main character unsuccessfully retires, the interesting nature of being a virtual CISO and how Tony assists startups.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Tony Gonzalez, a former CTO, CIO and CISO in sectors such as biotech, pharma, specialty chemicals, finance and insurance. Today, Tony offers startup advisory and virtual CISO services. Jeffrey and Tony talk about movies where the main character unsuccessfully retires, the interesting nature of being a virtual CISO and how Tony assists startups.</p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Jun 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/aae00461/a37aeb9c.mp3" length="32214358" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1833</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Tony Gonzalez, a former CTO, CIO and CISO in sectors such as biotech, pharma, specialty chemicals, finance and insurance. Today, Tony offers startup advisory and virtual CISO services. Jeffrey and Tony talk about movies where the main character unsuccessfully retires, the interesting nature of being a virtual CISO and how Tony assists startups.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Getting the Cybersecurity Budget you Need Doesn't Just Happen </title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Getting the Cybersecurity Budget you Need Doesn't Just Happen </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">98388014-4464-46a8-84eb-45e8778cb163</guid>
      <link>https://share.transistor.fm/s/22c04732</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks with Ira Winkler, CISO for CYE. They discuss their favorite low-budget movies and strategies for convincing decision-makers to approve the cybersecurity budgets necessary to comprehensively address risk. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks with Ira Winkler, CISO for CYE. They discuss their favorite low-budget movies and strategies for convincing decision-makers to approve the cybersecurity budgets necessary to comprehensively address risk. </p>]]>
      </content:encoded>
      <pubDate>Wed, 29 May 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/22c04732/f7e989e5.mp3" length="45412805" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1891</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks with Ira Winkler, CISO for CYE. They discuss their favorite low-budget movies and strategies for convincing decision-makers to approve the cybersecurity budgets necessary to comprehensively address risk. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Risk &amp; Reels Mix Tape — Some of our Favorite Guests</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>The Risk &amp; Reels Mix Tape — Some of our Favorite Guests</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d107c5a-c3e7-4a20-9d97-53352c592c35</guid>
      <link>https://share.transistor.fm/s/ace88fc4</link>
      <description>
        <![CDATA[<p>From time to time, it’s fun to look back and share snippets from some of our best conversations on the podcast. In this episode, you’ll hear cool insight from Ang Brown, Team Leader at TCS Security, Dave Mahdi, CIO of Transmit Security and Anna Belak, Director of the Office of Cybersecurity Strategy of Sysdig. There’s lots of movie talk and exciting insight into career journeys, the importance of standards and being able to communicate with diverse audiences.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From time to time, it’s fun to look back and share snippets from some of our best conversations on the podcast. In this episode, you’ll hear cool insight from Ang Brown, Team Leader at TCS Security, Dave Mahdi, CIO of Transmit Security and Anna Belak, Director of the Office of Cybersecurity Strategy of Sysdig. There’s lots of movie talk and exciting insight into career journeys, the importance of standards and being able to communicate with diverse audiences.</p>]]>
      </content:encoded>
      <pubDate>Wed, 22 May 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/ace88fc4/3071821f.mp3" length="48343657" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2014</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>From time to time, it’s fun to look back and share snippets from some of our best conversations on the podcast. In this episode, you’ll hear cool insight from Ang Brown, Team Leader at TCS Security, Dave Mahdi, CIO of Transmit Security and Anna Belak, Director of the Office of Cybersecurity Strategy of Sysdig. There’s lots of movie talk and exciting insight into career journeys, the importance of standards and being able to communicate with diverse audiences.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>From Outsider to Cybersecurity Insider — Leaning into the Power of Transitions</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>From Outsider to Cybersecurity Insider — Leaning into the Power of Transitions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8904b3d7-cede-488a-a76f-1148004e623a</guid>
      <link>https://share.transistor.fm/s/f0ba30b6</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Mariana Padilla, co-founder and CEO of HACKERVERSE. Jeffrey and Mariana discuss movies (and TV shows) where the main character goes through a significant transition, Mariana’s journey from marketing to the security industry and the integration of AI and security solutions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Mariana Padilla, co-founder and CEO of HACKERVERSE. Jeffrey and Mariana discuss movies (and TV shows) where the main character goes through a significant transition, Mariana’s journey from marketing to the security industry and the integration of AI and security solutions.</p>]]>
      </content:encoded>
      <pubDate>Wed, 15 May 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/f0ba30b6/25f4ee74.mp3" length="43702525" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1820</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Mariana Padilla, co-founder and CEO of HACKERVERSE. Jeffrey and Mariana discuss movies (and TV shows) where the main character goes through a significant transition, Mariana’s journey from marketing to the security industry and the integration of AI and security solutions.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Are You Really You? The Fascinating World of Identity Access Management</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Are You Really You? The Fascinating World of Identity Access Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f9b45696-7d48-461c-b77e-1e812635b92b</guid>
      <link>https://share.transistor.fm/s/3576b690</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Rick Patterson, CISO at CLEAR. They discuss movies about mistaken identities, the challenges and future of identity access management and a bizarre identity swap case from Rick’s time in the Secret Service.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Rick Patterson, CISO at CLEAR. They discuss movies about mistaken identities, the challenges and future of identity access management and a bizarre identity swap case from Rick’s time in the Secret Service.</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 May 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/3576b690/e35df791.mp3" length="42909800" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1787</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Rick Patterson, CISO at CLEAR. They discuss movies about mistaken identities, the challenges and future of identity access management and a bizarre identity swap case from Rick’s time in the Secret Service.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Want to be a Successful CISO? Know Your Audience</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Want to be a Successful CISO? Know Your Audience</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">146f4341-9c0f-43d6-81a0-b71ca9bfc7ba</guid>
      <link>https://share.transistor.fm/s/c79545e9</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Marcos Marrero, CISO at H.I.G. Capital. Jeffrey and Marcos discuss their favorite music-themed movies, how CISOs must move at the same speed as the business and the importance of being a master communicator.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Marcos Marrero, CISO at H.I.G. Capital. Jeffrey and Marcos discuss their favorite music-themed movies, how CISOs must move at the same speed as the business and the importance of being a master communicator.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 01 May 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/c79545e9/3786aa92.mp3" length="44799155" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1866</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Marcos Marrero, CISO at H.I.G. Capital. Jeffrey and Marcos discuss their favorite music-themed movies, how CISOs must move at the same speed as the business and the importance of being a master communicator.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>There’s No Excuse to Ignore Supply Chain Cyber Risk</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>There’s No Excuse to Ignore Supply Chain Cyber Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">84074af0-164b-45d9-835a-c846cfafc2cb</guid>
      <link>https://share.transistor.fm/s/7641bf9b</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to JC Dodson, former CSO for BAE Systems and the founder of global risk, resilience, and response advisory firm JCarl Group. Jeffrey and JC discuss movies where characters are confronted with new and challenging situations, the evolution of supply chain security and the critical nature of presenting cyber risks as a business concern.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to JC Dodson, former CSO for BAE Systems and the founder of global risk, resilience, and response advisory firm JCarl Group. Jeffrey and JC discuss movies where characters are confronted with new and challenging situations, the evolution of supply chain security and the critical nature of presenting cyber risks as a business concern.</p>]]>
      </content:encoded>
      <pubDate>Wed, 24 Apr 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/7641bf9b/067b9a01.mp3" length="45973110" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1915</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to JC Dodson, former CSO for BAE Systems and the founder of global risk, resilience, and response advisory firm JCarl Group. Jeffrey and JC discuss movies where characters are confronted with new and challenging situations, the evolution of supply chain security and the critical nature of presenting cyber risks as a business concern.</p>]]>
      </itunes:summary>
      <itunes:keywords>supply chain cyber risk; cyber risk; cyber security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Intersection of OT and ICS Security</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>The Intersection of OT and ICS Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fb77bc90-0764-4d80-b2ce-6a2f36ee985c</guid>
      <link>https://share.transistor.fm/s/6d47826c</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Mike Holcomb, Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor — one of the world's largest construction and engineering firms. Jeffrey and Mike discuss movies highlighting the clash of two worlds and the convergence of operational technology (OT) security and industrial control systems (ICS) security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Mike Holcomb, Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor — one of the world's largest construction and engineering firms. Jeffrey and Mike discuss movies highlighting the clash of two worlds and the convergence of operational technology (OT) security and industrial control systems (ICS) security.</p>]]>
      </content:encoded>
      <pubDate>Wed, 10 Apr 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/6d47826c/4f0ba8bd.mp3" length="55167289" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2298</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Mike Holcomb, Fellow of Cybersecurity and the ICS/OT Cybersecurity Global Lead for Fluor — one of the world's largest construction and engineering firms. Jeffrey and Mike discuss movies highlighting the clash of two worlds and the convergence of operational technology (OT) security and industrial control systems (ICS) security.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Art of Managing — and Communicating — Third-party Security Risks</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>The Art of Managing — and Communicating — Third-party Security Risks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a09f85f8-f3ca-4c18-ac8a-4c6ca3f415df</guid>
      <link>https://share.transistor.fm/s/26552820</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Phillip Addison, manager of third-party cyber risk management for The Hershey Company. Jeffrey and Phillip discuss buddy movies, key players in maintaining a secure ecosystem and tips for communicating third-party cyber risk to the C-Suite.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Phillip Addison, manager of third-party cyber risk management for The Hershey Company. Jeffrey and Phillip discuss buddy movies, key players in maintaining a secure ecosystem and tips for communicating third-party cyber risk to the C-Suite.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Apr 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/26552820/0f6772d3.mp3" length="30225006" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1886</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Phillip Addison, manager of third-party cyber risk management for The Hershey Company. Jeffrey and Phillip discuss buddy movies, key players in maintaining a secure ecosystem and tips for communicating third-party cyber risk to the C-Suite.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity; third-party security; CISO</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>What Makes a Great Modern CISO?</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>What Makes a Great Modern CISO?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2d6766c6-77c0-4c9e-a342-a9ec7ef7f559</guid>
      <link>https://share.transistor.fm/s/9686bab2</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Joe Head, a CISO coach and mentor with Intaso. They discuss “fish out of water” movies, the challenges related to being a CISO and advice for aspiring CISOs.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Joe Head, a CISO coach and mentor with Intaso. They discuss “fish out of water” movies, the challenges related to being a CISO and advice for aspiring CISOs.</p>]]>
      </content:encoded>
      <pubDate>Wed, 13 Mar 2024 06:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/9686bab2/edafaab0.mp3" length="35354248" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2207</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Joe Head, a CISO coach and mentor with Intaso. They discuss “fish out of water” movies, the challenges related to being a CISO and advice for aspiring CISOs.</p>]]>
      </itunes:summary>
      <itunes:keywords>CISO, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
      <podcast:chapters url="https://share.transistor.fm/s/9686bab2/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Pearls of Wisdom from a ‘Been There, Done That’ CISO  </title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Pearls of Wisdom from a ‘Been There, Done That’ CISO  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b493e90e-fd53-48ec-bf37-b2cdefd48683</guid>
      <link>https://share.transistor.fm/s/971d412c</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to six-time CISO — and respected security thought leader — Jim Routh. They cover movies where miscommunication plays a major role in the plot, the scrutiny CISOs are under and the importance of crisis communication training. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to six-time CISO — and respected security thought leader — Jim Routh. They cover movies where miscommunication plays a major role in the plot, the scrutiny CISOs are under and the importance of crisis communication training. </p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Mar 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/971d412c/bbda0757.mp3" length="38616344" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2411</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to six-time CISO — and respected security thought leader — Jim Routh. They cover movies where miscommunication plays a major role in the plot, the scrutiny CISOs are under and the importance of crisis communication training. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity; data breaches; CISO</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Ins and Outs of Fractional CISOs</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>The Ins and Outs of Fractional CISOs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">715fcd9b-c788-4550-944c-0cfa8e03dba8</guid>
      <link>https://share.transistor.fm/s/895bbd1b</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey speaks to Carlota Sage, founder and CEO of Pocket CISO, to discuss obscure movies with Elvis characters, the emergence of Fractional CISOs and the unique security challenges she’s solving for SMB clients. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey speaks to Carlota Sage, founder and CEO of Pocket CISO, to discuss obscure movies with Elvis characters, the emergence of Fractional CISOs and the unique security challenges she’s solving for SMB clients. </p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Feb 2024 08:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/895bbd1b/9e007869.mp3" length="34709559" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2167</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey speaks to Carlota Sage, founder and CEO of Pocket CISO, to discuss obscure movies with Elvis characters, the emergence of Fractional CISOs and the unique security challenges she’s solving for SMB clients. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Funniest — or “Least Boring” — Man in Cybersecurity</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>The Funniest — or “Least Boring” — Man in Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">293337a9-c6b7-4f6e-8aee-7da3c09ef061</guid>
      <link>https://share.transistor.fm/s/08d374ba</link>
      <description>
        <![CDATA[<p>In this episode, Jeffrey talks to Keyaan Williams, Founder and CEO of Cyber Leadership and Strategy Solutions on his affinity for “The Long Kiss Goodnight,” his inspiration for becoming a cybersecurity professional and why he coins himself “The Funniest Man in Cybersecurity.”</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Jeffrey talks to Keyaan Williams, Founder and CEO of Cyber Leadership and Strategy Solutions on his affinity for “The Long Kiss Goodnight,” his inspiration for becoming a cybersecurity professional and why he coins himself “The Funniest Man in Cybersecurity.”</p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Feb 2024 07:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/08d374ba/b4249cff.mp3" length="37243768" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2325</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Jeffrey talks to Keyaan Williams, Founder and CEO of Cyber Leadership and Strategy Solutions on his affinity for “The Long Kiss Goodnight,” his inspiration for becoming a cybersecurity professional and why he coins himself “The Funniest Man in Cybersecurity.”</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Have Your CISO's Back</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Have Your CISO's Back</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5a4dda90-b92d-4678-8280-0faecdb0b21e</guid>
      <link>https://share.transistor.fm/s/2f46b873</link>
      <description>
        <![CDATA[<p>In this episode Jeffrey speaks with David Anderson, vice president of cyber at Woodruff Sawyer to discuss why he dislikes heist movies, his love for romantic comedies, and how the cyber insurance business works.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode Jeffrey speaks with David Anderson, vice president of cyber at Woodruff Sawyer to discuss why he dislikes heist movies, his love for romantic comedies, and how the cyber insurance business works.  </p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Feb 2024 06:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/2f46b873/d9bacca4.mp3" length="38994879" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2435</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode Jeffrey speaks with David Anderson, vice president of cyber at Woodruff Sawyer to discuss why he dislikes heist movies, his love for romantic comedies, and how the cyber insurance business works.  </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Unpredictable Career Trajectory of a Cyber Professional</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>The Unpredictable Career Trajectory of a Cyber Professional</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2607bc17-3df6-4437-b9e9-24f1648aad9b</guid>
      <link>https://share.transistor.fm/s/5b2c38f9</link>
      <description>
        <![CDATA[<p>Steve Magowan, CISO and CISSP and Jeffrey Wheatman talk about their favorite movies with a small world and how to build a career in cyber security. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Steve Magowan, CISO and CISSP and Jeffrey Wheatman talk about their favorite movies with a small world and how to build a career in cyber security. </p>]]>
      </content:encoded>
      <pubDate>Wed, 07 Feb 2024 09:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/5b2c38f9/15e53636.mp3" length="33461974" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2089</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Steve Magowan, CISO and CISSP and Jeffrey Wheatman talk about their favorite movies with a small world and how to build a career in cyber security. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>How to Make Businesses Care about Security</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>How to Make Businesses Care about Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0e0cc53a-1739-4092-b06f-0164d8bed8c6</guid>
      <link>https://share.transistor.fm/s/75e325e1</link>
      <description>
        <![CDATA[<p>Dr. Anna Belak, director, office of cybersecurity at Sydig and Black Kite's Jeffrey Wheatman discuss how to make security a business priority. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Dr. Anna Belak, director, office of cybersecurity at Sydig and Black Kite's Jeffrey Wheatman discuss how to make security a business priority. </p>]]>
      </content:encoded>
      <pubDate>Wed, 31 Jan 2024 07:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/75e325e1/5694082a.mp3" length="35320203" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2205</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Dr. Anna Belak, director, office of cybersecurity at Sydig and Black Kite's Jeffrey Wheatman discuss how to make security a business priority. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Finding your Path</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Finding your Path</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a5e4b26d-e0d8-46c2-b04f-9766610948f7</guid>
      <link>https://share.transistor.fm/s/dff54966</link>
      <description>
        <![CDATA[<p>Ang Brown from TCM Security and Jeffrey Wheatman talk career paths and finding security. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ang Brown from TCM Security and Jeffrey Wheatman talk career paths and finding security. </p>]]>
      </content:encoded>
      <pubDate>Wed, 24 Jan 2024 08:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/dff54966/07c9ecd2.mp3" length="40395039" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2522</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Ang Brown from TCM Security and Jeffrey Wheatman talk career paths and finding security. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Positivity, Privacy, and Pressure</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Positivity, Privacy, and Pressure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">67b070fc-8458-4634-8ae7-f0177ad2a21b</guid>
      <link>https://share.transistor.fm/s/83b11f95</link>
      <description>
        <![CDATA[<p>Debbie Reynolds the Data Diva and Founder for Debbie Reynolds Consulting, and Jeffrey Wheatman talk about privacy in our modern world. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Debbie Reynolds the Data Diva and Founder for Debbie Reynolds Consulting, and Jeffrey Wheatman talk about privacy in our modern world. </p>]]>
      </content:encoded>
      <pubDate>Wed, 17 Jan 2024 10:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/83b11f95/e722e488.mp3" length="36457879" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2276</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Debbie Reynolds the Data Diva and Founder for Debbie Reynolds Consulting, and Jeffrey Wheatman talk about privacy in our modern world. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Unlikely Hero </title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>The Unlikely Hero </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">56924c28-8dbd-4a43-9aae-d0d720dfcfff</guid>
      <link>https://share.transistor.fm/s/03262553</link>
      <description>
        <![CDATA[<p>Jason Ozin,  CISO for PIB Group joins Jeffrey Wheatman, SVP Security Evangelist for Black Kite to  discuss unlikely heroes and the role of the CISO.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jason Ozin,  CISO for PIB Group joins Jeffrey Wheatman, SVP Security Evangelist for Black Kite to  discuss unlikely heroes and the role of the CISO.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 10 Jan 2024 08:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/03262553/be58587e.mp3" length="39627667" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2474</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Jason Ozin,  CISO for PIB Group joins Jeffrey Wheatman, SVP Security Evangelist for Black Kite to  discuss unlikely heroes and the role of the CISO.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Heists, Fraud and Cons; Oh My!</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Heists, Fraud and Cons; Oh My!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">88ca41d3-ffd1-4a61-8f6e-7d278a10104e</guid>
      <link>https://share.transistor.fm/s/a99d3f22</link>
      <description>
        <![CDATA[<p>During this Podcast Jonathan Care, Advisor at Lionfish and former Gartner Analysts, talks scams, cons and frauds and why they still work. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>During this Podcast Jonathan Care, Advisor at Lionfish and former Gartner Analysts, talks scams, cons and frauds and why they still work. </p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Nov 2023 07:12:34 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/a99d3f22/e1a08005.mp3" length="35810131" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/mJQGKuiyosLFae4irAQ2jLF0trrqUsKwYPlbrZEZnDM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2MDA5MTcv/MTcwMDA2MTE1NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2236</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>During this Podcast Jonathan Care, Advisor at Lionfish and former Gartner Analysts, talks scams, cons and frauds and why they still work. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Can You See the Real Threats? | S2 Ep. 9 with Patrick Garrity</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Can You See the Real Threats? | S2 Ep. 9 with Patrick Garrity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f865bb34-6af8-4dab-aca8-189304eadf45</guid>
      <link>https://share.transistor.fm/s/6af45dd8</link>
      <description>
        <![CDATA[<p>Patrick Garrity talks about the real threats, prioritizing vulnerabilities and movies where someone thinks they know what is going on and is wrong. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Patrick Garrity talks about the real threats, prioritizing vulnerabilities and movies where someone thinks they know what is going on and is wrong. </p>]]>
      </content:encoded>
      <pubDate>Wed, 01 Nov 2023 08:19:23 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/6af45dd8/38e4cf0c.mp3" length="32730514" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2043</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Patrick Garrity talks about the real threats, prioritizing vulnerabilities and movies where someone thinks they know what is going on and is wrong. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Tackling Risk | S2 Ep. 8 with Tomás Maldonado</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Tackling Risk | S2 Ep. 8 with Tomás Maldonado</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">090335b0-a08d-40cd-8e56-e6c8d3e9e269</guid>
      <link>https://share.transistor.fm/s/f24ec2f0</link>
      <description>
        <![CDATA[<p>Join us as Tomas Maldonado, CISO for the NFL and Jeffrey Wheatman, Black Kite Cyber Risk Evangelist discuss the best sports movies, the challenges of securing a league of disparate teams and collaboration for better security. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us as Tomas Maldonado, CISO for the NFL and Jeffrey Wheatman, Black Kite Cyber Risk Evangelist discuss the best sports movies, the challenges of securing a league of disparate teams and collaboration for better security. </p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Oct 2023 05:17:25 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/f24ec2f0/cfe213cf.mp3" length="66151372" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2009</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us as Tomas Maldonado, CISO for the NFL and Jeffrey Wheatman, Black Kite Cyber Risk Evangelist discuss the best sports movies, the challenges of securing a league of disparate teams and collaboration for better security. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Building a Successful Security Program from Scratch | S2 Ep. 7 with George Al-Koura</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Building a Successful Security Program from Scratch | S2 Ep. 7 with George Al-Koura</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">548e3898-d95c-424c-93e2-0604aa73f073</guid>
      <link>https://share.transistor.fm/s/b1420145</link>
      <description>
        <![CDATA[<p>During this episode George Al-Koura, CISO at Ruby and co-host of the Bare Knuckles &amp; Brass Tacks podcasts shares his insights on building security programs from scratch. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>During this episode George Al-Koura, CISO at Ruby and co-host of the Bare Knuckles &amp; Brass Tacks podcasts shares his insights on building security programs from scratch. </p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Oct 2023 11:58:19 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/b1420145/542e5d79.mp3" length="37505136" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/Hjsg4RrmxXKUd12liHIGwXkWeGQ9NuLtY38ygmMlURY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1NTIxMDAv/MTY5NzY1NTQ5OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2342</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>During this episode George Al-Koura, CISO at Ruby and co-host of the Bare Knuckles &amp; Brass Tacks podcasts shares his insights on building security programs from scratch. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber security, risk, security careers</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title> The Overlap of Physical Security into Digital | S2 Ep. 6 with Angela Dogan</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title> The Overlap of Physical Security into Digital | S2 Ep. 6 with Angela Dogan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1c000ea7-3f41-43c5-8d5c-f942d7fcaf32</guid>
      <link>https://share.transistor.fm/s/cd6581ef</link>
      <description>
        <![CDATA[<p>Meet Dr. Angela Dogan, the Associate Director for IT Cloud Computing at Kyndryl. Join us to talk about the Halloween movies, twists and turns, physical security, the evolution of physical security, cyber risk/posture, and the move to the cloud. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Meet Dr. Angela Dogan, the Associate Director for IT Cloud Computing at Kyndryl. Join us to talk about the Halloween movies, twists and turns, physical security, the evolution of physical security, cyber risk/posture, and the move to the cloud. </p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Oct 2023 05:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/cd6581ef/7f43d29f.mp3" length="70623419" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/Bo0SqDt-L8bd7rFZAMcpNyhrJWQlTcsdqT3UEBfmiVk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MzM1NzMv/MTY5NjQ1MTkzNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2154</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Meet Dr. Angela Dogan, the Associate Director for IT Cloud Computing at Kyndryl. Join us to talk about the Halloween movies, twists and turns, physical security, the evolution of physical security, cyber risk/posture, and the move to the cloud. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Security Operations: Learning what works | S2 Ep. 5 with Anton Chuvakin</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Security Operations: Learning what works | S2 Ep. 5 with Anton Chuvakin</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4e08ebef-aafd-4d49-be1b-522fe28f6d91</guid>
      <link>https://share.transistor.fm/s/acb2a56b</link>
      <description>
        <![CDATA[<p>Meet today's guest: <strong>Dr.</strong> <strong>Anton Chuvakin, </strong>an advisor at the Office of the CISO of Google Cloud. Join us to chat about sci-fi movies, technology predictions, security operations, solving security problems, three lines of defense, AI and using the cloud. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Meet today's guest: <strong>Dr.</strong> <strong>Anton Chuvakin, </strong>an advisor at the Office of the CISO of Google Cloud. Join us to chat about sci-fi movies, technology predictions, security operations, solving security problems, three lines of defense, AI and using the cloud. </p>]]>
      </content:encoded>
      <pubDate>Mon, 02 Oct 2023 10:27:11 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/acb2a56b/5dd1db27.mp3" length="74333792" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/Ca-NcTfsaKQgTIjnEPyxtA5vJ1Nff2Jl6t6znXNi49E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MzAzMDcv/MTY5NjI2NzYzMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2274</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Meet today's guest: <strong>Dr.</strong> <strong>Anton Chuvakin, </strong>an advisor at the Office of the CISO of Google Cloud. Join us to chat about sci-fi movies, technology predictions, security operations, solving security problems, three lines of defense, AI and using the cloud. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Security Architecture and what the structure entails | S2 Ep. 4 with Evgeniy Kharam</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Security Architecture and what the structure entails | S2 Ep. 4 with Evgeniy Kharam</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c1e2f3dc-5e73-4887-8189-fc729a5d5d68</guid>
      <link>https://share.transistor.fm/s/8ae886e1</link>
      <description>
        <![CDATA[<p>Jeffrey Wheatman is joined in this episode by Evgeniy Kharam, a fellow<strong> Cyber Evangelist! </strong></p><p>Today we are discussing learning from your mistakes, Avatar, CGI, New Zealand, firewalls, and security architecture. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jeffrey Wheatman is joined in this episode by Evgeniy Kharam, a fellow<strong> Cyber Evangelist! </strong></p><p>Today we are discussing learning from your mistakes, Avatar, CGI, New Zealand, firewalls, and security architecture. </p>]]>
      </content:encoded>
      <pubDate>Mon, 25 Sep 2023 07:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/8ae886e1/5126df43.mp3" length="85052483" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/7LKoJWMg7XvhxBSTm2VFRYL7c0doHUnfT2DdX7_X6qs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MDg2MjYv/MTY5NTA2MTM2My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2588</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Jeffrey Wheatman is joined in this episode by Evgeniy Kharam, a fellow<strong> Cyber Evangelist! </strong></p><p>Today we are discussing learning from your mistakes, Avatar, CGI, New Zealand, firewalls, and security architecture. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Why open standards matter for streamlined cybersecurity | S2 Ep. 3 with David Mahdi</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Why open standards matter for streamlined cybersecurity | S2 Ep. 3 with David Mahdi</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2aace5fc-568a-45e6-a73d-0c4f3c0e256f</guid>
      <link>https://share.transistor.fm/s/5d57db9d</link>
      <description>
        <![CDATA[<p>This week we have Jeffrey's old friend and colleague: Dave Mahdi, the current CIO (Chief Identity Officer) for Transmit Security. Join us to chat about movies (Natalie Portman's first film!), Ted Lasso, good guys vs. bad guys, and why <strong>standards</strong> (and open standards) matter in the world of cybersecurity when prioritizing risk resilience. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This week we have Jeffrey's old friend and colleague: Dave Mahdi, the current CIO (Chief Identity Officer) for Transmit Security. Join us to chat about movies (Natalie Portman's first film!), Ted Lasso, good guys vs. bad guys, and why <strong>standards</strong> (and open standards) matter in the world of cybersecurity when prioritizing risk resilience. </p>]]>
      </content:encoded>
      <pubDate>Mon, 18 Sep 2023 07:47:29 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/5d57db9d/3f06e9b7.mp3" length="82524680" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/235uS2RZnyL33PTWRB_V604eRZH1zCKq_4Z--99tk-0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MDgxMDcv/MTY5NTA0ODQ0OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2521</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This week we have Jeffrey's old friend and colleague: Dave Mahdi, the current CIO (Chief Identity Officer) for Transmit Security. Join us to chat about movies (Natalie Portman's first film!), Ted Lasso, good guys vs. bad guys, and why <strong>standards</strong> (and open standards) matter in the world of cybersecurity when prioritizing risk resilience. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Prioritizing cybersecurity in the world of CISO burnout | S2 Ep. 2 with Rob Black</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Prioritizing cybersecurity in the world of CISO burnout | S2 Ep. 2 with Rob Black</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f9adfeba-9d9a-4f3c-b3d3-afc171d1e84d</guid>
      <link>https://share.transistor.fm/s/b3429f11</link>
      <description>
        <![CDATA[<p>In this episode, join Jeffrey and Rob Black, CISSP, the founder and CEO of Fractional CISO. Buckle up to talk about Stephen King, Barbenheimer,  and the main topic of CISO burnout/stress and how to combat it in our new cyber environment while still prioritizing security leadership. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, join Jeffrey and Rob Black, CISSP, the founder and CEO of Fractional CISO. Buckle up to talk about Stephen King, Barbenheimer,  and the main topic of CISO burnout/stress and how to combat it in our new cyber environment while still prioritizing security leadership. </p>]]>
      </content:encoded>
      <pubDate>Mon, 11 Sep 2023 07:51:09 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/b3429f11/292dd4e4.mp3" length="41402038" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/iYcMMdzwnFcQowHh5c_XgT4k-MYk09Wu2idF-No9T24/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0OTk5OTgv/MTY5NDQ0Mzg2OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2585</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, join Jeffrey and Rob Black, CISSP, the founder and CEO of Fractional CISO. Buckle up to talk about Stephen King, Barbenheimer,  and the main topic of CISO burnout/stress and how to combat it in our new cyber environment while still prioritizing security leadership. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Cybersecurity in the realm of Higher Education around the world | S2 Ep. 1 with Luqman Kondeth</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Cybersecurity in the realm of Higher Education around the world | S2 Ep. 1 with Luqman Kondeth</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7cb3b497-d3fd-4860-9e7f-cdb300e88bb6</guid>
      <link>https://share.transistor.fm/s/9b91a7fe</link>
      <description>
        <![CDATA[<p>Welcome to SEASON TWO of Risk and Reels! Get ready to talk about Indian film festivals, Abu Dhabi, cyber security within higher education (with an emphasis on third party cyber risk), and plenty of side stories. In episode one, Jeffrey Wheatman brings his good friend and colleague <br><strong>Luqman Kondeth </strong>to the show. He is the Director of Campus Technology Security Services for NYU Abu Dhabi. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to SEASON TWO of Risk and Reels! Get ready to talk about Indian film festivals, Abu Dhabi, cyber security within higher education (with an emphasis on third party cyber risk), and plenty of side stories. In episode one, Jeffrey Wheatman brings his good friend and colleague <br><strong>Luqman Kondeth </strong>to the show. He is the Director of Campus Technology Security Services for NYU Abu Dhabi. </p>]]>
      </content:encoded>
      <pubDate>Tue, 05 Sep 2023 10:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/9b91a7fe/e2ae5ae3.mp3" length="72956673" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/bHhweJSphLhyFD2jnWpjQkLtPpf92tZkX_AAxza2SzY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0ODk4MTQv/MTY5Mzg3ODc3NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2226</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to SEASON TWO of Risk and Reels! Get ready to talk about Indian film festivals, Abu Dhabi, cyber security within higher education (with an emphasis on third party cyber risk), and plenty of side stories. In episode one, Jeffrey Wheatman brings his good friend and colleague <br><strong>Luqman Kondeth </strong>to the show. He is the Director of Campus Technology Security Services for NYU Abu Dhabi. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The Bright Future of Public/Private Partnership in Cybersecurity | SEASON 1 FINALE Ep. 17 with Bailey Bickley</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>The Bright Future of Public/Private Partnership in Cybersecurity | SEASON 1 FINALE Ep. 17 with Bailey Bickley</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">18cebe94-262d-4978-aab4-a503bf864e0e</guid>
      <link>https://share.transistor.fm/s/252430e0</link>
      <description>
        <![CDATA[<p>True crime, storytelling, Big Fish, the partnership between private sector and public sector, the new White House cybersecurity policy, power of strong minds in one room, resilience and redundancy, threat actors worldwide, and supply chain risk and security. </p><p>We are thrilled to share this episode with special guest, Bailey Bickley, the Chief DIB Defense at the NSA. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>True crime, storytelling, Big Fish, the partnership between private sector and public sector, the new White House cybersecurity policy, power of strong minds in one room, resilience and redundancy, threat actors worldwide, and supply chain risk and security. </p><p>We are thrilled to share this episode with special guest, Bailey Bickley, the Chief DIB Defense at the NSA. </p>]]>
      </content:encoded>
      <pubDate>Tue, 30 May 2023 01:25:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/252430e0/2535345f.mp3" length="50819462" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2114</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>True crime, storytelling, Big Fish, the partnership between private sector and public sector, the new White House cybersecurity policy, power of strong minds in one room, resilience and redundancy, threat actors worldwide, and supply chain risk and security. </p><p>We are thrilled to share this episode with special guest, Bailey Bickley, the Chief DIB Defense at the NSA. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>From the Military to IT and Cybersecurity | Ep. 16 with Lewis Heuermann</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>From the Military to IT and Cybersecurity | Ep. 16 with Lewis Heuermann</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">58d2ff41-887f-4597-99c7-1621ed08c0ff</guid>
      <link>https://share.transistor.fm/s/d118395c</link>
      <description>
        <![CDATA[<p>Charlie and the chocolate factory, Tom Hanks, the Military, culture shifts, precision, training, accountability, the why for the what. </p><p>Join Jeffrey Wheatman and Lewis Heuermann (current Cyber Risk Management leader at Booz Allen Hamilton) as they discuss what it looks like to move from a life in the service to a post-military role in cybersecurity, as well as stories and moments along the way. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Charlie and the chocolate factory, Tom Hanks, the Military, culture shifts, precision, training, accountability, the why for the what. </p><p>Join Jeffrey Wheatman and Lewis Heuermann (current Cyber Risk Management leader at Booz Allen Hamilton) as they discuss what it looks like to move from a life in the service to a post-military role in cybersecurity, as well as stories and moments along the way. </p>]]>
      </content:encoded>
      <pubDate>Mon, 22 May 2023 09:28:01 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/d118395c/9b796da1.mp3" length="61354836" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2553</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Charlie and the chocolate factory, Tom Hanks, the Military, culture shifts, precision, training, accountability, the why for the what. </p><p>Join Jeffrey Wheatman and Lewis Heuermann (current Cyber Risk Management leader at Booz Allen Hamilton) as they discuss what it looks like to move from a life in the service to a post-military role in cybersecurity, as well as stories and moments along the way. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Investing in Cyber and AI in 2023 | Ep. 15 with Rick Grinnell</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Investing in Cyber and AI in 2023 | Ep. 15 with Rick Grinnell</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3faaf4c9-25bf-4938-83d6-af01ea3be526</guid>
      <link>https://share.transistor.fm/s/8594d7b1</link>
      <description>
        <![CDATA[<p>Comedies, Young Frankenstein, History of the World, artificial intelligence, investments in cybersecurity, AI investors, third party risk, ChatGPT, the future of jobs in cyber. Hear from Rick Grinnell, the Founder of Glasswing Ventures (an investor of Black Kite!)</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Comedies, Young Frankenstein, History of the World, artificial intelligence, investments in cybersecurity, AI investors, third party risk, ChatGPT, the future of jobs in cyber. Hear from Rick Grinnell, the Founder of Glasswing Ventures (an investor of Black Kite!)</p>]]>
      </content:encoded>
      <pubDate>Mon, 15 May 2023 11:48:03 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/8594d7b1/b49805a9.mp3" length="74037394" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2277</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Comedies, Young Frankenstein, History of the World, artificial intelligence, investments in cybersecurity, AI investors, third party risk, ChatGPT, the future of jobs in cyber. Hear from Rick Grinnell, the Founder of Glasswing Ventures (an investor of Black Kite!)</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity in Higher Education – over the years and today | Ep. 14 with Gretchen Ruck</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Cybersecurity in Higher Education – over the years and today | Ep. 14 with Gretchen Ruck</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ccefbce2-bf0e-4d39-8413-38d688940c50</guid>
      <link>https://share.transistor.fm/s/6fb463f2</link>
      <description>
        <![CDATA[<p>80s movies, Animal House, cyber in higher education, university CISOs, managing student data, healthcare within universities, compliance requirements, HECVAT, Educause,  </p><p>Today's episode features Gretchen Ruck, <strong>Senior Managing Director of  Cybersecurity &amp; Privacy at Ankura. </strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>80s movies, Animal House, cyber in higher education, university CISOs, managing student data, healthcare within universities, compliance requirements, HECVAT, Educause,  </p><p>Today's episode features Gretchen Ruck, <strong>Senior Managing Director of  Cybersecurity &amp; Privacy at Ankura. </strong></p>]]>
      </content:encoded>
      <pubDate>Mon, 08 May 2023 09:29:16 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/6fb463f2/277d625f.mp3" length="71401044" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2194</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>80s movies, Animal House, cyber in higher education, university CISOs, managing student data, healthcare within universities, compliance requirements, HECVAT, Educause,  </p><p>Today's episode features Gretchen Ruck, <strong>Senior Managing Director of  Cybersecurity &amp; Privacy at Ankura. </strong></p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The People of Cyber: Diversity, Education and Empowerment | Ep. 13 with Juliana Vida</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>The People of Cyber: Diversity, Education and Empowerment | Ep. 13 with Juliana Vida</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0a2c694b-a3c6-487d-9ef3-09221fe7cc61</guid>
      <link>https://share.transistor.fm/s/ebdd93dd</link>
      <description>
        <![CDATA[<p>The Admiral, A Christmas Story, new policies, the New White House Cybersecurity Policy, information security importance, DEI, diversity in cyber, government training, empowering the people, poker, hiring, and zero trust. </p><p>Welcome Juliana Vida to today's episode - she currently runs strategy for Public Sector at Splunk. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The Admiral, A Christmas Story, new policies, the New White House Cybersecurity Policy, information security importance, DEI, diversity in cyber, government training, empowering the people, poker, hiring, and zero trust. </p><p>Welcome Juliana Vida to today's episode - she currently runs strategy for Public Sector at Splunk. </p>]]>
      </content:encoded>
      <pubDate>Mon, 01 May 2023 10:03:11 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/ebdd93dd/45fce77f.mp3" length="68412542" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2847</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The Admiral, A Christmas Story, new policies, the New White House Cybersecurity Policy, information security importance, DEI, diversity in cyber, government training, empowering the people, poker, hiring, and zero trust. </p><p>Welcome Juliana Vida to today's episode - she currently runs strategy for Public Sector at Splunk. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ebdd93dd/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>How to use cybersecurity tools properly to meet regulations | Ep. 12 with Larry Whiteside</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>How to use cybersecurity tools properly to meet regulations | Ep. 12 with Larry Whiteside</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ac569941-aeee-4c3d-8871-7ce80ccc10c5</guid>
      <link>https://share.transistor.fm/s/7b5971e5</link>
      <description>
        <![CDATA[<p>Crafty hackers, super-smart villains, speaking the business language, GRC tools, risk and regulatory correlations, reg ops, being compliant, meeting regulations, and why vendors can't solve all your problems. </p><p>This episode, features Larry Whiteside, the current CISO at RegScale and long-time friend of Jeffrey Wheatman. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Crafty hackers, super-smart villains, speaking the business language, GRC tools, risk and regulatory correlations, reg ops, being compliant, meeting regulations, and why vendors can't solve all your problems. </p><p>This episode, features Larry Whiteside, the current CISO at RegScale and long-time friend of Jeffrey Wheatman. </p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Apr 2023 11:12:29 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/7b5971e5/5ad24242.mp3" length="60107681" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2501</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Crafty hackers, super-smart villains, speaking the business language, GRC tools, risk and regulatory correlations, reg ops, being compliant, meeting regulations, and why vendors can't solve all your problems. </p><p>This episode, features Larry Whiteside, the current CISO at RegScale and long-time friend of Jeffrey Wheatman. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/7b5971e5/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Building a third-party risk program from the ground up | Ep. 11 with Tom Garrubba</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Building a third-party risk program from the ground up | Ep. 11 with Tom Garrubba</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8cf03276-2047-4e3b-9194-d1f0d38191e0</guid>
      <link>https://share.transistor.fm/s/66148676</link>
      <description>
        <![CDATA[<p><strong>SPECIAL double-time episode.</strong> Hear from Tom Garrubba, the Director of Third-Party Risk Management Services at Echelon Risk + Cyber and he talks through the journey of building a third party risk management program at CVS Caremark (plus everything after and in-between.) Plus, as always, movies (JAWS), Saturday night theater showings, Franco, and Schwarzenegger. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>SPECIAL double-time episode.</strong> Hear from Tom Garrubba, the Director of Third-Party Risk Management Services at Echelon Risk + Cyber and he talks through the journey of building a third party risk management program at CVS Caremark (plus everything after and in-between.) Plus, as always, movies (JAWS), Saturday night theater showings, Franco, and Schwarzenegger. </p>]]>
      </content:encoded>
      <pubDate>Mon, 17 Apr 2023 06:14:35 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/66148676/a257a7cd.mp3" length="102428467" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>4265</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>SPECIAL double-time episode.</strong> Hear from Tom Garrubba, the Director of Third-Party Risk Management Services at Echelon Risk + Cyber and he talks through the journey of building a third party risk management program at CVS Caremark (plus everything after and in-between.) Plus, as always, movies (JAWS), Saturday night theater showings, Franco, and Schwarzenegger. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Threat Modeling in STRIDE, the basis for cybersecurity. | Ep. 10 with Matt Stamper</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Threat Modeling in STRIDE, the basis for cybersecurity. | Ep. 10 with Matt Stamper</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4edb25df-c0dc-4f2e-842f-f990fc23de0d</guid>
      <link>https://share.transistor.fm/s/fe872414</link>
      <description>
        <![CDATA[<p>Forrest Gump, threat modeling, animal farm, application weaknesses, business impact analyses, resilience, accountability, and stride. Tune into the latest episode to hear from Matt Stamper, the CEO of Executive Advisors Group.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Forrest Gump, threat modeling, animal farm, application weaknesses, business impact analyses, resilience, accountability, and stride. Tune into the latest episode to hear from Matt Stamper, the CEO of Executive Advisors Group.</p>]]>
      </content:encoded>
      <pubDate>Mon, 10 Apr 2023 01:16:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/fe872414/fef37916.mp3" length="55560129" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2311</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Forrest Gump, threat modeling, animal farm, application weaknesses, business impact analyses, resilience, accountability, and stride. Tune into the latest episode to hear from Matt Stamper, the CEO of Executive Advisors Group.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/fe872414/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Productive risk processes = *truly* reducing risk. How has TPRM shifted? | Ep. 9 with Bob Maley</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Productive risk processes = *truly* reducing risk. How has TPRM shifted? | Ep. 9 with Bob Maley</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">80229188-dbb3-4023-bb66-1d2847ac8700</guid>
      <link>https://share.transistor.fm/s/c5c5098a</link>
      <description>
        <![CDATA[<p>Star Wars, Star Trek, third party risk management, fallen heroes, best practices, triaging risk, cyber posture, the cloud, vendor access, productive risk process, and truly managing risk. How has third party risk management changed in the last 20 years? How should it be changing to promote better processes? Join Jeffrey Wheatman and Bob Maley, CSO of Black Kite, for this exciting discussion. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Star Wars, Star Trek, third party risk management, fallen heroes, best practices, triaging risk, cyber posture, the cloud, vendor access, productive risk process, and truly managing risk. How has third party risk management changed in the last 20 years? How should it be changing to promote better processes? Join Jeffrey Wheatman and Bob Maley, CSO of Black Kite, for this exciting discussion. </p>]]>
      </content:encoded>
      <pubDate>Mon, 03 Apr 2023 06:42:37 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/c5c5098a/2eb2451e.mp3" length="48527054" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2018</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Star Wars, Star Trek, third party risk management, fallen heroes, best practices, triaging risk, cyber posture, the cloud, vendor access, productive risk process, and truly managing risk. How has third party risk management changed in the last 20 years? How should it be changing to promote better processes? Join Jeffrey Wheatman and Bob Maley, CSO of Black Kite, for this exciting discussion. </p>]]>
      </itunes:summary>
      <itunes:keywords>third party risk, risk management, cyber posture, Star Wars, Star Trek, vendor risk, supply chain</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Talking with the former Director of Cybersecurity Coordination for the U.S. Dept. of Homeland Security | Ep. 8 with Mike Brown</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Talking with the former Director of Cybersecurity Coordination for the U.S. Dept. of Homeland Security | Ep. 8 with Mike Brown</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9343e323-9cde-426f-a8d5-f768af102b76</guid>
      <link>https://share.transistor.fm/s/45a5d31c</link>
      <description>
        <![CDATA[<p>Jeffrey speaks with the former Director of Cybersecurity Coordination for the U.S. Dept. of Homeland Security, Mike Brown, about strategic, tactical, and operational cybersecurity. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jeffrey speaks with the former Director of Cybersecurity Coordination for the U.S. Dept. of Homeland Security, Mike Brown, about strategic, tactical, and operational cybersecurity. </p>]]>
      </content:encoded>
      <pubDate>Mon, 27 Mar 2023 04:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/45a5d31c/d51cc8fb.mp3" length="59429387" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2473</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Jeffrey speaks with the former Director of Cybersecurity Coordination for the U.S. Dept. of Homeland Security, Mike Brown, about strategic, tactical, and operational cybersecurity. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>With a plethora of emerging AI, where does the cybersecurity industry stand? | Ep. 7 with Eric Cowperthwaite</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>With a plethora of emerging AI, where does the cybersecurity industry stand? | Ep. 7 with Eric Cowperthwaite</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c0d7688-e06d-4e11-bb0b-298a0d266a83</guid>
      <link>https://share.transistor.fm/s/b81e5f13</link>
      <description>
        <![CDATA[<p>Musicals, emerging AI, and understanding the risk within your third-party ecosystem. Our guest this week is Eric Cowperthwaite, COO at Threathunter.ai by Milton Security. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Musicals, emerging AI, and understanding the risk within your third-party ecosystem. Our guest this week is Eric Cowperthwaite, COO at Threathunter.ai by Milton Security. </p>]]>
      </content:encoded>
      <pubDate>Mon, 20 Mar 2023 01:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/b81e5f13/c1ffea2f.mp3" length="66410020" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2763</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Musicals, emerging AI, and understanding the risk within your third-party ecosystem. Our guest this week is Eric Cowperthwaite, COO at Threathunter.ai by Milton Security. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Managing the risk you quantify is half the battle | Ep. 6 with David Elfering</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Managing the risk you quantify is half the battle | Ep. 6 with David Elfering</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7ddc4208-21ab-4d07-a6a1-fcaa4f3b379e</guid>
      <link>https://share.transistor.fm/s/51180e4f</link>
      <description>
        <![CDATA[<p>Black and white films, photography, risk quantification, FAIR, (ROI), the business case for risk, risk scenarios, sea monsters, and PII. Our guest this week is David Elfering, Sr. VP and Sr. Cybersecurity Specialist at Marsh.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Black and white films, photography, risk quantification, FAIR, (ROI), the business case for risk, risk scenarios, sea monsters, and PII. Our guest this week is David Elfering, Sr. VP and Sr. Cybersecurity Specialist at Marsh.</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Mar 2023 01:00:00 -0700</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/51180e4f/0e88b6bc.mp3" length="43958937" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>1828</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Black and white films, photography, risk quantification, FAIR, (ROI), the business case for risk, risk scenarios, sea monsters, and PII. Our guest this week is David Elfering, Sr. VP and Sr. Cybersecurity Specialist at Marsh.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>It’s the dog that caught the car - how can security programs properly mature? | Ep. 5 with Dave Lewis</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>It’s the dog that caught the car - how can security programs properly mature? | Ep. 5 with Dave Lewis</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6f4c6318-8194-457f-9326-22a86f08439a</guid>
      <link>https://share.transistor.fm/s/b469f05a</link>
      <description>
        <![CDATA[<p>John wick, curiosity, organizational changes over time, security debt, risk appetite, chatGPT, dogs running around, and taking security seriously. Join Jeffrey Wheatman and Dave Lewis, (Global Advisory CISO at Cisco), as they discuss what it means for security teams to mature and address accepted risks that need to be revisited. As security is taken more seriously overall, leaders must adjust programs to complement that. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>John wick, curiosity, organizational changes over time, security debt, risk appetite, chatGPT, dogs running around, and taking security seriously. Join Jeffrey Wheatman and Dave Lewis, (Global Advisory CISO at Cisco), as they discuss what it means for security teams to mature and address accepted risks that need to be revisited. As security is taken more seriously overall, leaders must adjust programs to complement that. </p>]]>
      </content:encoded>
      <pubDate>Mon, 06 Mar 2023 01:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/b469f05a/67216112.mp3" length="37948897" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2369</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>John wick, curiosity, organizational changes over time, security debt, risk appetite, chatGPT, dogs running around, and taking security seriously. Join Jeffrey Wheatman and Dave Lewis, (Global Advisory CISO at Cisco), as they discuss what it means for security teams to mature and address accepted risks that need to be revisited. As security is taken more seriously overall, leaders must adjust programs to complement that. </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber, tech startup, gartner, cybersecurity, data breach, hack, hackers, ransomware, ciso, cyber security, cyber analyst</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>The anatomy of the 2023 Black Kite Third Party Breach Report | Ep. 4 with Ferhat Dikbiyik</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>The anatomy of the 2023 Black Kite Third Party Breach Report | Ep. 4 with Ferhat Dikbiyik</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">23a85f6c-3054-4b19-904e-4d83a5383b91</guid>
      <link>https://share.transistor.fm/s/0803892f</link>
      <description>
        <![CDATA[<p>Third party attacks, common ways hackers target companies, Turkish movies, outsmarting the bad guys, and the trajectory of 2023 data breaches. Listen to episode four as Jeffrey Wheatman and the Head of Research at Black Kite, Ferhat Dikbiyik discuss the latest Third Party Data Breach report (and its astonishing findings).</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Third party attacks, common ways hackers target companies, Turkish movies, outsmarting the bad guys, and the trajectory of 2023 data breaches. Listen to episode four as Jeffrey Wheatman and the Head of Research at Black Kite, Ferhat Dikbiyik discuss the latest Third Party Data Breach report (and its astonishing findings).</p>]]>
      </content:encoded>
      <pubDate>Sun, 19 Feb 2023 21:49:50 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/0803892f/de81c550.mp3" length="51155144" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2128</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Third party attacks, common ways hackers target companies, Turkish movies, outsmarting the bad guys, and the trajectory of 2023 data breaches. Listen to episode four as Jeffrey Wheatman and the Head of Research at Black Kite, Ferhat Dikbiyik discuss the latest Third Party Data Breach report (and its astonishing findings).</p>]]>
      </itunes:summary>
      <itunes:keywords>third party breach, cyber attack, disclosure time, hacker, data breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>“We’ve always done it that way.” Why we *shouldn’t.* | Ep. 3 with Patti Titus</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>“We’ve always done it that way.” Why we *shouldn’t.* | Ep. 3 with Patti Titus</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d0559a70-1214-4e6f-8a4c-5f9f3ed220c9</guid>
      <link>https://share.transistor.fm/s/b5e0c32f</link>
      <description>
        <![CDATA[<p><br></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Sun, 12 Feb 2023 22:15:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/b5e0c32f/0dadcbbf.mp3" length="52898688" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2201</itunes:duration>
      <itunes:summary>Insurance, resilience, breaking out-of-the-box, new ideas, tech debt, strong female leads, and Downton Abbey. Join Jeffrey Wheatman and guest Patti Titus (Chief Privacy and Information Security Officer at Markel Insurance) as they discuss how change and transformation can revolutionize the future of security. </itunes:summary>
      <itunes:subtitle>Insurance, resilience, breaking out-of-the-box, new ideas, tech debt, strong female leads, and Downton Abbey. Join Jeffrey Wheatman and guest Patti Titus (Chief Privacy and Information Security Officer at Markel Insurance) as they discuss how change and t</itunes:subtitle>
      <itunes:keywords>cybersecurity, artificial intelligence, security practices, firewall, data security, Downton abbey, status quo </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Security starts with people. Process requires purpose. | Ep. 2 with Brian Reed</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Security starts with people. Process requires purpose. | Ep. 2 with Brian Reed</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e812b442-f7b4-44ae-aa5f-1c2f01065efa</guid>
      <link>https://share.transistor.fm/s/fb2a78b3</link>
      <description>
        <![CDATA[People, process, tools, tech, Ocean’s Eleven, movie remakes, and a recession. Security is people-centric, and tools cannot exist independently. Learn why we must humanize our problems first. Tune into episode 2 with Jeffrey Wheatman and guest Brian Reed (Senior Director of Cybersecurity Strategy at Proofpoint).]]>
      </description>
      <content:encoded>
        <![CDATA[People, process, tools, tech, Ocean’s Eleven, movie remakes, and a recession. Security is people-centric, and tools cannot exist independently. Learn why we must humanize our problems first. Tune into episode 2 with Jeffrey Wheatman and guest Brian Reed (Senior Director of Cybersecurity Strategy at Proofpoint).]]>
      </content:encoded>
      <pubDate>Sun, 12 Feb 2023 22:05:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/fb2a78b3/52539c94.mp3" length="51047930" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2124</itunes:duration>
      <itunes:summary>People, process, tools, tech, Ocean’s Eleven, movie remakes, and a recession. Security is people-centric, and tools cannot exist independently. Learn why we must humanize our problems first. Tune into episode 2 with Jeffrey Wheatman and guest Brian Reed (Senior Director of Cybersecurity Strategy at Proofpoint).</itunes:summary>
      <itunes:subtitle>People, process, tools, tech, Ocean’s Eleven, movie remakes, and a recession. Security is people-centric, and tools cannot exist independently. Learn why we must humanize our problems first. Tune into episode 2 with Jeffrey Wheatman and guest Brian Reed (</itunes:subtitle>
      <itunes:keywords>recession, movie remakes, tools, cybersecurity, security, ciso, third party risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Who's a hacker? | Ep. 1 with Jayson Street </title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Who's a hacker? | Ep. 1 with Jayson Street </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92d17e5e-aa14-4dd3-a03c-828614583d76</guid>
      <link>https://share.transistor.fm/s/e70db183</link>
      <description>
        <![CDATA[Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hacker. ]]>
      </description>
      <content:encoded>
        <![CDATA[Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hacker. ]]>
      </content:encoded>
      <pubDate>Sun, 12 Feb 2023 22:00:00 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/e70db183/332ad7ed.mp3" length="42274485" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:duration>2842</itunes:duration>
      <itunes:summary>Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hacker. </itunes:summary>
      <itunes:subtitle>Hackers, curiosity, security, pen-testers, kindness, analogies and Hollywood criminals. Welcome to the first episode of Risk and Reels with Jeffrey Wheatman, featuring Jayson Street (OG Pen Tester and Chief Chaos Officer for Trusec), a self-proclaimed hac</itunes:subtitle>
      <itunes:keywords>hollywood, defcon, cybersecurity, hacker, ethical hacker, curiosity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
    <item>
      <title>Introducing Risk and Reels: A Cybersecurity Podcast</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Introducing Risk and Reels: A Cybersecurity Podcast</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">fc9ac9da-4d38-42dd-bc1b-624a23b282a9</guid>
      <link>https://vimeo.com/795341876</link>
      <description>
        <![CDATA[<p>It's me, Jeffrey. And the first three episodes of my new podcast release on <em>February 13th.</em> <strong>I want YOU to tune in</strong> and experience the fun and knowledge shared every week. </p><p> </p><p>I am inviting fellow cyber security experts and icons in the field to chat about relevant topics (plus all things cinema!) Stay tuned.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>It's me, Jeffrey. And the first three episodes of my new podcast release on <em>February 13th.</em> <strong>I want YOU to tune in</strong> and experience the fun and knowledge shared every week. </p><p> </p><p>I am inviting fellow cyber security experts and icons in the field to chat about relevant topics (plus all things cinema!) Stay tuned.</p>]]>
      </content:encoded>
      <pubDate>Mon, 06 Feb 2023 11:40:39 -0800</pubDate>
      <author>Jeffrey Wheatman</author>
      <enclosure url="https://media.transistor.fm/1956ebb1/94b9c3e6.mp3" length="1114210" type="audio/mpeg"/>
      <itunes:author>Jeffrey Wheatman</itunes:author>
      <itunes:image href="https://img.transistor.fm/9SmMfqnLove5Pki9u1mLw9k5CNEorE5Oubnv8UDqozw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExOTU1Nzgv/MTY3NTcxMjQzOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>65</itunes:duration>
      <itunes:summary>A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.</itunes:summary>
      <itunes:subtitle>A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.</itunes:subtitle>
      <itunes:keywords>cybersecurity, third party risk, cinema, Hollywood, movies, reels, cyber risk, data breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://risknreels.transistor.fm/people/jeffrey-wheatman" img="https://img.transistor.fm/EZiXKzbLNkBSwifq6M2xRuq2FrbmYg4reEdfluEWKL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9wZXJz/b24vYWE0NjE4Njgt/ZDY4Ni00Mjg5LWE1/OGEtNzViOTJlMTE2/MTg2LzE2Njk3NDcx/NTQtaW1hZ2UuanBn.jpg">Jeffrey Wheatman</podcast:person>
    </item>
  </channel>
</rss>
