<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/distilledsecurity" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Distilled Security Podcast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/distilledsecurity</itunes:new-feed-url>
    <description>Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.</description>
    <copyright>© 2025 Distilled Security Podcast</copyright>
    <podcast:guid>739ab7c3-99e6-5865-ba64-48741450574a</podcast:guid>
    <podcast:locked owner="hello@distilledsecuritypodcast.com">no</podcast:locked>
    <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
    <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
    <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
    <podcast:trailer pubdate="Sat, 01 Jun 2024 20:52:35 -0400" url="https://media.transistor.fm/893e842b/768be7b5.mp3" length="763744" type="audio/mpeg">Distilled Security Podcast Trailer</podcast:trailer>
    <language>en</language>
    <pubDate>Tue, 14 Apr 2026 09:00:27 -0400</pubDate>
    <lastBuildDate>Tue, 14 Apr 2026 09:01:46 -0400</lastBuildDate>
    <link>https://distilledsecuritypodcast.com</link>
    <image>
      <url>https://img.transistorcdn.com/ci6vSNoQC12txPyPMyq8QCOrfpHD25y4gbyA2dg9_7I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMjk1/MTk1NTkwZTA3OThl/NzAxOGMwZjM4NTEy/MjVmOS5wbmc.jpg</url>
      <title>Distilled Security Podcast</title>
      <link>https://distilledsecuritypodcast.com</link>
    </image>
    <itunes:category text="Business"/>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/ci6vSNoQC12txPyPMyq8QCOrfpHD25y4gbyA2dg9_7I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMjk1/MTk1NTkwZTA3OThl/NzAxOGMwZjM4NTEy/MjVmOS5wbmc.jpg"/>
    <itunes:summary>Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.</itunes:summary>
    <itunes:subtitle>Join us on Distilled Security as we delve into the fascinating world of cybersecurity.</itunes:subtitle>
    <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
    <itunes:owner>
      <itunes:name>Distilled Security</itunes:name>
      <itunes:email>hello@distilledsecuritypodcast.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 23: Nobody read the report</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23: Nobody read the report</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">613b0d65-6a3e-4658-bdb0-4278efbfe070</guid>
      <link>https://share.transistor.fm/s/2188c59d</link>
      <description>
        <![CDATA[<p>In this episode of the <em>Distilled Security Podcast</em>, we break down the Delve scandal—flawed SOC 2 reports, copy-pasted content, and oversight failures that expose deeper issues in compliance-as-a-service. Joined by Matthew J. Schiavone, we examine auditor accountability, quality review gaps, and key differences between SOC 2 and ISO 27001.</p><p>We also cover what companies should demand from auditors, the role of automation, and whether this scandal will drive real change in the industry.</p><p><strong> Topics Covered</strong></p><ul><li>The Delve scandal—leaked reports, copy-pasted audits &amp; pervasive deficiencies</li><li>The AICPA peer review process &amp; AC Corp's adverse findings</li><li>SOC 2 vs ISO 27001—oversight models, witness audits &amp; accreditation</li><li>The incentive structure driving compliance to the bottom</li><li>Compliance automation — what works, what doesn't &amp; AI's real role</li><li>What to ask your auditor before signing anything</li><li>Trust centers — done right vs. compliance theater</li><li>Is SOC 2 dead? What needs to change &amp; who has to change it</li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><strong>Hosts</strong></p><ul><li>Matthew J. Schiavone - (Sikich) </li></ul><p><br><strong>Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the <em>Distilled Security Podcast</em>, we break down the Delve scandal—flawed SOC 2 reports, copy-pasted content, and oversight failures that expose deeper issues in compliance-as-a-service. Joined by Matthew J. Schiavone, we examine auditor accountability, quality review gaps, and key differences between SOC 2 and ISO 27001.</p><p>We also cover what companies should demand from auditors, the role of automation, and whether this scandal will drive real change in the industry.</p><p><strong> Topics Covered</strong></p><ul><li>The Delve scandal—leaked reports, copy-pasted audits &amp; pervasive deficiencies</li><li>The AICPA peer review process &amp; AC Corp's adverse findings</li><li>SOC 2 vs ISO 27001—oversight models, witness audits &amp; accreditation</li><li>The incentive structure driving compliance to the bottom</li><li>Compliance automation — what works, what doesn't &amp; AI's real role</li><li>What to ask your auditor before signing anything</li><li>Trust centers — done right vs. compliance theater</li><li>Is SOC 2 dead? What needs to change &amp; who has to change it</li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><strong>Hosts</strong></p><ul><li>Matthew J. Schiavone - (Sikich) </li></ul><p><br><strong>Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 14 Apr 2026 08:55:48 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn,Rick Yocum, Matthew J. Schiavone</author>
      <enclosure url="https://media.transistor.fm/2188c59d/84364a89.mp3" length="126191767" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn,Rick Yocum, Matthew J. Schiavone</itunes:author>
      <itunes:duration>7810</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the <em>Distilled Security Podcast</em>, we break down the Delve scandal—flawed SOC 2 reports, copy-pasted content, and oversight failures that expose deeper issues in compliance-as-a-service. Joined by Matthew J. Schiavone, we examine auditor accountability, quality review gaps, and key differences between SOC 2 and ISO 27001.</p><p>We also cover what companies should demand from auditors, the role of automation, and whether this scandal will drive real change in the industry.</p><p><strong> Topics Covered</strong></p><ul><li>The Delve scandal—leaked reports, copy-pasted audits &amp; pervasive deficiencies</li><li>The AICPA peer review process &amp; AC Corp's adverse findings</li><li>SOC 2 vs ISO 27001—oversight models, witness audits &amp; accreditation</li><li>The incentive structure driving compliance to the bottom</li><li>Compliance automation — what works, what doesn't &amp; AI's real role</li><li>What to ask your auditor before signing anything</li><li>Trust centers — done right vs. compliance theater</li><li>Is SOC 2 dead? What needs to change &amp; who has to change it</li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><strong>Hosts</strong></p><ul><li>Matthew J. Schiavone - (Sikich) </li></ul><p><br><strong>Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>SOC 2,Compliance fraud, Audit quality,Third-party risk,AICPA peer reviewIn this episode of the Distilled Security Podcast, we break down the Delve scandal—flawed SOC 2 reports, copy-pasted content, and oversight failures that expose deeper issues in compliance-as-a-service.  Joined by Matthew J. Schiavone (Sikich), we examine auditor accountability, quality review gaps, and key differences between SOC 2 and ISO 27001.  We also cover what companies should demand from auditors, the role of automation, and whether this scandal will drive real change in the industry.</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:person role="Guest" href="https://www.linkedin.com/in/matthew-j-schiavone-cpa-cissp-cisa-cmmc-cca-29371347/" img="https://img.transistorcdn.com/2K6YM7wwWy5fzf42SBamq9dmS9TViLSjHoGkY6o6DK8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZjQ1/ZmY4NzQ1NTIyNzY0/MmM5NDNmYjdjNjFk/OTE3NS5wbmc.jpg">Matthew J. Schiavone</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/2188c59d/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2188c59d/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2188c59d/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/2188c59d/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/2188c59d/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 22: Is AI Good for Security, CIRCIA Starts the Clock, and the M&amp;A Problem Nobody's Talking About</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22: Is AI Good for Security, CIRCIA Starts the Clock, and the M&amp;A Problem Nobody's Talking About</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">95d0eaf3-c55b-4a97-8845-620b308ca34b</guid>
      <link>https://share.transistor.fm/s/d9902f49</link>
      <description>
        <![CDATA[<p>In this episode of the Distilled Security Podcast, we tackle four topics shaping the cybersecurity landscape — from AI's real impact on defense to a wave of regulatory and market changes every security team needs to be tracking.</p><p><br></p><p>🔹 Is AI Good for Security? — Anthropic's model finding hundreds of zero days, stock market panic after Claude Code's launch (CrowdStrike down 11%), the "hard things easy, easy things hard" reality of AI, why human-out-of-the-loop isn't ready yet, the coming spike in vulnerability disclosures, and how defenders should be using AI for better hygiene</p><p>🔹 CIRCIA Final Rule (May 2026) — The federal incident reporting law hitting critical infrastructure, 72-hour incident and 24-hour ransom payment notification clocks, how "substantial cyber incident" triggers differ from materiality, mid-market companies falling in scope, overlapping timelines with HIPAA/SEC/state breach laws, and building your incident response playbook now</p><p>🔹 Protecting Yourself Against a Changing Compliance Landscape — CMMC Phase 2, HIPAA overhaul, CCPA audits all converging, why a unified security program beats framework-by-framework chasing, evidence over policy in audits, engineering continuous compliance through automation, and the reality of doing this without dedicated staff</p><p>🔹 Cybersecurity M&amp;A / Consolidation Problem — Google acquiring Wiz for $32B, 10% of the cybersecurity industry changing hands, operational benefits of fewer vendors vs. pricing pressure and talent drain, the OneTrust "sticker on the side" integration warning, Cisco's Startup Studios model, and why consolidation only works if they don't break what made the acquisition special</p><p><br></p><p>🥃 Spirit Review: WhistlePig 12 Year Old World Rye</p><p>PA Fine Wine &amp; Good Spirits Select — Finished in Madeira, Sauternes &amp; Port barrels, 86 proof</p><p>https://www.whistlepigwhiskey.com/</p><p><br></p><p>📬 Send Us Your Questions!</p><p>ask@distilledsecuritypodcast.com</p><p><br></p><p>🎙️ Hosts</p><p>Justin Leapline – @justinleapline</p><p>Joe Wynn – @wynnjoe</p><p>Rick Yocum – @rickyocum</p><p><br></p><p>🌐 Connect with Us</p><p>Website: distilledsecuritypodcast.com</p><p>X: @DisSecPod</p><p>Email: hello@distilledsecuritypodcast.com</p><p><br></p><p>👍 Like, comment, and subscribe for weekly security and compliance insights.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Distilled Security Podcast, we tackle four topics shaping the cybersecurity landscape — from AI's real impact on defense to a wave of regulatory and market changes every security team needs to be tracking.</p><p><br></p><p>🔹 Is AI Good for Security? — Anthropic's model finding hundreds of zero days, stock market panic after Claude Code's launch (CrowdStrike down 11%), the "hard things easy, easy things hard" reality of AI, why human-out-of-the-loop isn't ready yet, the coming spike in vulnerability disclosures, and how defenders should be using AI for better hygiene</p><p>🔹 CIRCIA Final Rule (May 2026) — The federal incident reporting law hitting critical infrastructure, 72-hour incident and 24-hour ransom payment notification clocks, how "substantial cyber incident" triggers differ from materiality, mid-market companies falling in scope, overlapping timelines with HIPAA/SEC/state breach laws, and building your incident response playbook now</p><p>🔹 Protecting Yourself Against a Changing Compliance Landscape — CMMC Phase 2, HIPAA overhaul, CCPA audits all converging, why a unified security program beats framework-by-framework chasing, evidence over policy in audits, engineering continuous compliance through automation, and the reality of doing this without dedicated staff</p><p>🔹 Cybersecurity M&amp;A / Consolidation Problem — Google acquiring Wiz for $32B, 10% of the cybersecurity industry changing hands, operational benefits of fewer vendors vs. pricing pressure and talent drain, the OneTrust "sticker on the side" integration warning, Cisco's Startup Studios model, and why consolidation only works if they don't break what made the acquisition special</p><p><br></p><p>🥃 Spirit Review: WhistlePig 12 Year Old World Rye</p><p>PA Fine Wine &amp; Good Spirits Select — Finished in Madeira, Sauternes &amp; Port barrels, 86 proof</p><p>https://www.whistlepigwhiskey.com/</p><p><br></p><p>📬 Send Us Your Questions!</p><p>ask@distilledsecuritypodcast.com</p><p><br></p><p>🎙️ Hosts</p><p>Justin Leapline – @justinleapline</p><p>Joe Wynn – @wynnjoe</p><p>Rick Yocum – @rickyocum</p><p><br></p><p>🌐 Connect with Us</p><p>Website: distilledsecuritypodcast.com</p><p>X: @DisSecPod</p><p>Email: hello@distilledsecuritypodcast.com</p><p><br></p><p>👍 Like, comment, and subscribe for weekly security and compliance insights.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Mar 2026 11:41:17 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/d9902f49/753bac65.mp3" length="114319580" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>6983</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Distilled Security Podcast, we tackle four topics shaping the cybersecurity landscape — from AI's real impact on defense to a wave of regulatory and market changes every security team needs to be tracking.</p><p><br></p><p>🔹 Is AI Good for Security? — Anthropic's model finding hundreds of zero days, stock market panic after Claude Code's launch (CrowdStrike down 11%), the "hard things easy, easy things hard" reality of AI, why human-out-of-the-loop isn't ready yet, the coming spike in vulnerability disclosures, and how defenders should be using AI for better hygiene</p><p>🔹 CIRCIA Final Rule (May 2026) — The federal incident reporting law hitting critical infrastructure, 72-hour incident and 24-hour ransom payment notification clocks, how "substantial cyber incident" triggers differ from materiality, mid-market companies falling in scope, overlapping timelines with HIPAA/SEC/state breach laws, and building your incident response playbook now</p><p>🔹 Protecting Yourself Against a Changing Compliance Landscape — CMMC Phase 2, HIPAA overhaul, CCPA audits all converging, why a unified security program beats framework-by-framework chasing, evidence over policy in audits, engineering continuous compliance through automation, and the reality of doing this without dedicated staff</p><p>🔹 Cybersecurity M&amp;A / Consolidation Problem — Google acquiring Wiz for $32B, 10% of the cybersecurity industry changing hands, operational benefits of fewer vendors vs. pricing pressure and talent drain, the OneTrust "sticker on the side" integration warning, Cisco's Startup Studios model, and why consolidation only works if they don't break what made the acquisition special</p><p><br></p><p>🥃 Spirit Review: WhistlePig 12 Year Old World Rye</p><p>PA Fine Wine &amp; Good Spirits Select — Finished in Madeira, Sauternes &amp; Port barrels, 86 proof</p><p>https://www.whistlepigwhiskey.com/</p><p><br></p><p>📬 Send Us Your Questions!</p><p>ask@distilledsecuritypodcast.com</p><p><br></p><p>🎙️ Hosts</p><p>Justin Leapline – @justinleapline</p><p>Joe Wynn – @wynnjoe</p><p>Rick Yocum – @rickyocum</p><p><br></p><p>🌐 Connect with Us</p><p>Website: distilledsecuritypodcast.com</p><p>X: @DisSecPod</p><p>Email: hello@distilledsecuritypodcast.com</p><p><br></p><p>👍 Like, comment, and subscribe for weekly security and compliance insights.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d9902f49/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d9902f49/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d9902f49/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d9902f49/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/d9902f49/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 21: AI Notetakers Are Illegal, GRC Tools Are Lying, and ISO 42001 Changes Everything</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21: AI Notetakers Are Illegal, GRC Tools Are Lying, and ISO 42001 Changes Everything</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f34f64f0-5570-4f33-a35a-2a6ae93da6bc</guid>
      <link>https://share.transistor.fm/s/82f35a0e</link>
      <description>
        <![CDATA[<p>In this episode of the Distilled Security Podcast, we break down three converging forces reshaping how organizations manage AI risk — and what you need to do about it now.</p><p>🔹 BIPA + AI Notetakers — A class action lawsuit exposes unauthorized biometric data collection, why a single Illinois meeting participant creates liability, the Shopify wiretapping dismissal, and the steps you should take today to audit your AI tools<br>🔹 GRC Engineering Meets AI — Real AI compliance tools vs. vaporware, using LLMs for policy drafting and control mapping, the hallucination accountability problem, building AI guardrails as code, and the NIST RFI on AI Agent Security (comments due March 9, 2026)<br>🔹 ISO 42001 Deep Dive — The first AI Management System standard, how it differs from ISO 27001, AI Impact Assessments vs. traditional risk assessments, stakeholder engagement requirements, and why certification is becoming essential for EU AI Act compliance</p><p>🥃 Spirit Review: Redbreast 12 Cask Strength<br>https://www.redbreastwhiskey.com/en-us/whiskey-collections/redbreast-cask-strength-whiskey/</p><p>⏱️ Timestamps</p><p>0:00 Intro &amp; Episode Overview<br>2:04 BIPA &amp; AI Notetakers<br>25:08 GRC Engineering Meets AI<br>1:07:15 🥃 Spirit Review: Redbreast 12 Cask Strength (Irish Whiskey)<br>1:11:17 ISO 42001<br>1:49:30 Outro &amp; wrap-up</p><p>🎙️ Hosts<br>Justin Leapline – @justinleapline<br>Joe Wynn – @wynnjoe<br>Rick Yocum – @rickyocum</p><p>🌐 Connect with Us<br>Website: distilledsecuritypodcast.com<br>X: @DisSecPod<br>Email: hello@distilledsecuritypodcast.com</p><p>👍 Like, comment, and subscribe for weekly security and compliance insights.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Distilled Security Podcast, we break down three converging forces reshaping how organizations manage AI risk — and what you need to do about it now.</p><p>🔹 BIPA + AI Notetakers — A class action lawsuit exposes unauthorized biometric data collection, why a single Illinois meeting participant creates liability, the Shopify wiretapping dismissal, and the steps you should take today to audit your AI tools<br>🔹 GRC Engineering Meets AI — Real AI compliance tools vs. vaporware, using LLMs for policy drafting and control mapping, the hallucination accountability problem, building AI guardrails as code, and the NIST RFI on AI Agent Security (comments due March 9, 2026)<br>🔹 ISO 42001 Deep Dive — The first AI Management System standard, how it differs from ISO 27001, AI Impact Assessments vs. traditional risk assessments, stakeholder engagement requirements, and why certification is becoming essential for EU AI Act compliance</p><p>🥃 Spirit Review: Redbreast 12 Cask Strength<br>https://www.redbreastwhiskey.com/en-us/whiskey-collections/redbreast-cask-strength-whiskey/</p><p>⏱️ Timestamps</p><p>0:00 Intro &amp; Episode Overview<br>2:04 BIPA &amp; AI Notetakers<br>25:08 GRC Engineering Meets AI<br>1:07:15 🥃 Spirit Review: Redbreast 12 Cask Strength (Irish Whiskey)<br>1:11:17 ISO 42001<br>1:49:30 Outro &amp; wrap-up</p><p>🎙️ Hosts<br>Justin Leapline – @justinleapline<br>Joe Wynn – @wynnjoe<br>Rick Yocum – @rickyocum</p><p>🌐 Connect with Us<br>Website: distilledsecuritypodcast.com<br>X: @DisSecPod<br>Email: hello@distilledsecuritypodcast.com</p><p>👍 Like, comment, and subscribe for weekly security and compliance insights.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Feb 2026 09:54:37 -0500</pubDate>
      <author>Justin Leapline, Joseph Wyn, Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/82f35a0e/5d8df492.mp3" length="106237244" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joseph Wyn, Rick Yocum</itunes:author>
      <itunes:duration>6638</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Distilled Security Podcast, we break down three converging forces reshaping how organizations manage AI risk — and what you need to do about it now.</p><p>🔹 BIPA + AI Notetakers — A class action lawsuit exposes unauthorized biometric data collection, why a single Illinois meeting participant creates liability, the Shopify wiretapping dismissal, and the steps you should take today to audit your AI tools<br>🔹 GRC Engineering Meets AI — Real AI compliance tools vs. vaporware, using LLMs for policy drafting and control mapping, the hallucination accountability problem, building AI guardrails as code, and the NIST RFI on AI Agent Security (comments due March 9, 2026)<br>🔹 ISO 42001 Deep Dive — The first AI Management System standard, how it differs from ISO 27001, AI Impact Assessments vs. traditional risk assessments, stakeholder engagement requirements, and why certification is becoming essential for EU AI Act compliance</p><p>🥃 Spirit Review: Redbreast 12 Cask Strength<br>https://www.redbreastwhiskey.com/en-us/whiskey-collections/redbreast-cask-strength-whiskey/</p><p>⏱️ Timestamps</p><p>0:00 Intro &amp; Episode Overview<br>2:04 BIPA &amp; AI Notetakers<br>25:08 GRC Engineering Meets AI<br>1:07:15 🥃 Spirit Review: Redbreast 12 Cask Strength (Irish Whiskey)<br>1:11:17 ISO 42001<br>1:49:30 Outro &amp; wrap-up</p><p>🎙️ Hosts<br>Justin Leapline – @justinleapline<br>Joe Wynn – @wynnjoe<br>Rick Yocum – @rickyocum</p><p>🌐 Connect with Us<br>Website: distilledsecuritypodcast.com<br>X: @DisSecPod<br>Email: hello@distilledsecuritypodcast.com</p><p>👍 Like, comment, and subscribe for weekly security and compliance insights.</p>]]>
      </itunes:summary>
      <itunes:keywords>AI Governance, GRC Engineering, AI Risk Management, BIPA Compliance, AI Notetakers</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/82f35a0e/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/82f35a0e/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/82f35a0e/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/82f35a0e/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/82f35a0e/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 20 : 2026 Kickoff: Security Resolutions, Key Deadlines, and Don’t Mislead the Feds</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20 : 2026 Kickoff: Security Resolutions, Key Deadlines, and Don’t Mislead the Feds</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">15e0c7a7-efea-4448-94f6-ae7c7a3ead3c</guid>
      <link>https://share.transistor.fm/s/64241178</link>
      <description>
        <![CDATA[<p><br>In the first episode of 2026, the Distilled Security team kicks off the year with a practical discussion on security priorities, key compliance dates to watch in 2026, and why misleading the government on cybersecurity compliance can have serious consequences.</p><p>The conversation focuses on simplifying security programs, returning to core fundamentals, and learning from real-world enforcement and regulatory cases. The episode closes with a holiday pour and a preview of format changes coming next.</p><p>⏱️ <strong>Timestamps</strong></p><ul><li>0:00 Intro &amp; episode overview</li><li>0:33 2026 security resolutions: simplify &amp; back to basics</li><li>5:45 “Science projects”: removing emotion from decisions</li><li>8:36 Justin’s goals: family, travel, business &amp; AI workflows</li><li>17:52 EOS + Atomic Habits workbook (goal planning)</li><li>23:54 Key compliance dates to watch in 2026</li><li>31:45 California privacy updates &amp; risk assessments (CCPA)</li><li>35:39 EU AI Act + NIS2 enforcement ramp-up</li><li>42:48 Drink break: High West “A Midwinter Night’s Dram.”</li><li>45:04 Don’t mislead the feds: FedRAMP, SolarWinds, CMMC—wrap-up to 1:20:12</li></ul><p><strong> 🎙️ Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><br><strong>🌐 Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br>🥃 <strong>Drink of the episode: </strong>High West A Midwinter Night’s Dram</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>In the first episode of 2026, the Distilled Security team kicks off the year with a practical discussion on security priorities, key compliance dates to watch in 2026, and why misleading the government on cybersecurity compliance can have serious consequences.</p><p>The conversation focuses on simplifying security programs, returning to core fundamentals, and learning from real-world enforcement and regulatory cases. The episode closes with a holiday pour and a preview of format changes coming next.</p><p>⏱️ <strong>Timestamps</strong></p><ul><li>0:00 Intro &amp; episode overview</li><li>0:33 2026 security resolutions: simplify &amp; back to basics</li><li>5:45 “Science projects”: removing emotion from decisions</li><li>8:36 Justin’s goals: family, travel, business &amp; AI workflows</li><li>17:52 EOS + Atomic Habits workbook (goal planning)</li><li>23:54 Key compliance dates to watch in 2026</li><li>31:45 California privacy updates &amp; risk assessments (CCPA)</li><li>35:39 EU AI Act + NIS2 enforcement ramp-up</li><li>42:48 Drink break: High West “A Midwinter Night’s Dram.”</li><li>45:04 Don’t mislead the feds: FedRAMP, SolarWinds, CMMC—wrap-up to 1:20:12</li></ul><p><strong> 🎙️ Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><br><strong>🌐 Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br>🥃 <strong>Drink of the episode: </strong>High West A Midwinter Night’s Dram</p>]]>
      </content:encoded>
      <pubDate>Mon, 26 Jan 2026 10:24:56 -0500</pubDate>
      <author>Justin Leapline,Joe Wynn,Rick Yocum </author>
      <enclosure url="https://media.transistor.fm/64241178/2930dd73.mp3" length="77228961" type="audio/mpeg"/>
      <itunes:author>Justin Leapline,Joe Wynn,Rick Yocum </itunes:author>
      <itunes:duration>4825</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>In the first episode of 2026, the Distilled Security team kicks off the year with a practical discussion on security priorities, key compliance dates to watch in 2026, and why misleading the government on cybersecurity compliance can have serious consequences.</p><p>The conversation focuses on simplifying security programs, returning to core fundamentals, and learning from real-world enforcement and regulatory cases. The episode closes with a holiday pour and a preview of format changes coming next.</p><p>⏱️ <strong>Timestamps</strong></p><ul><li>0:00 Intro &amp; episode overview</li><li>0:33 2026 security resolutions: simplify &amp; back to basics</li><li>5:45 “Science projects”: removing emotion from decisions</li><li>8:36 Justin’s goals: family, travel, business &amp; AI workflows</li><li>17:52 EOS + Atomic Habits workbook (goal planning)</li><li>23:54 Key compliance dates to watch in 2026</li><li>31:45 California privacy updates &amp; risk assessments (CCPA)</li><li>35:39 EU AI Act + NIS2 enforcement ramp-up</li><li>42:48 Drink break: High West “A Midwinter Night’s Dram.”</li><li>45:04 Don’t mislead the feds: FedRAMP, SolarWinds, CMMC—wrap-up to 1:20:12</li></ul><p><strong> 🎙️ Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><br><strong>🌐 Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br>🥃 <strong>Drink of the episode: </strong>High West A Midwinter Night’s Dram</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, GRC, Compliance, Regulatory Deadlines,Federal Oversight, Risk Management</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/64241178/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/64241178/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/64241178/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/64241178/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/64241178/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 19: Cloudflare Outage, AI-Powered Attacks &amp; The Rise of GRC Engineering | Distilled Security Podcast</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19: Cloudflare Outage, AI-Powered Attacks &amp; The Rise of GRC Engineering | Distilled Security Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cdca3c1c-aadb-40f8-992a-99aaae719e02</guid>
      <link>https://share.transistor.fm/s/4bf68cf9</link>
      <description>
        <![CDATA[<p>In this episode, we break down a major Cloudflare outage, explore how a nation-state used AI agents to automate a cyberattack, and discuss the growing risks around MCP integrations. We also highlight why GRC Engineering is becoming essential to modern security programs and wrap up with key regulatory updates, including CMMC changes affecting thousands of contractors.</p><p><strong>Topics covered: </strong><br>• Cloudflare outage impact and root cause<br>• Nation-state attack using AI agents to automate intrusion steps<br>• MCP (Model Context Protocol): power, risks, and examples<br>• Why GRC Engineering is the future of compliance and automation<br>• Updates on GDPR, ISO 27701, California AB 5866, and SEC rules<br>• CMMC assessor shortages and what organizations must prepare for</p><p><strong>Spirit of the Episode</strong><br>• Knob Creek 21-Year Limited Release, rich caramel notes, heavy char, smooth for 100 proof</p><p><strong>Timestamps</strong></p><ul><li>0:02—Cloudflare Outage Stories &amp; Global Impact</li><li>3:07—Root Cause, Not a Cyberattack &amp; Third-Party Risk Reality</li><li>10:38 - China Uses Anthropic’s Claude + MCP for Automated Cyberattacks</li><li>14:17 - Full AI Attack Lifecycle Explained</li><li>27:18 - MCP: The API for AI &amp; Its Security Risks</li><li>44:05 - Bourbon Break: Knob Creek 21-Year Review</li><li>50:02 - GRC Engineering Deep Dive: Automation &amp; Controls-as-Code</li><li>1:24:13 - Regulatory Roundup: GDPR, ISO 27701, California AB 566, SEC SP</li><li>1:44:27 - CMMC 2.0 Crisis: Auditor Shortages &amp; DoD Contract Impact</li><li>2:11:20 - Closing Thoughts &amp; Episode Wrap-Up</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><strong>Guest</strong></p><ul><li>Matthew J. Schiavone - @Sikitch</li></ul><p><strong>Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we break down a major Cloudflare outage, explore how a nation-state used AI agents to automate a cyberattack, and discuss the growing risks around MCP integrations. We also highlight why GRC Engineering is becoming essential to modern security programs and wrap up with key regulatory updates, including CMMC changes affecting thousands of contractors.</p><p><strong>Topics covered: </strong><br>• Cloudflare outage impact and root cause<br>• Nation-state attack using AI agents to automate intrusion steps<br>• MCP (Model Context Protocol): power, risks, and examples<br>• Why GRC Engineering is the future of compliance and automation<br>• Updates on GDPR, ISO 27701, California AB 5866, and SEC rules<br>• CMMC assessor shortages and what organizations must prepare for</p><p><strong>Spirit of the Episode</strong><br>• Knob Creek 21-Year Limited Release, rich caramel notes, heavy char, smooth for 100 proof</p><p><strong>Timestamps</strong></p><ul><li>0:02—Cloudflare Outage Stories &amp; Global Impact</li><li>3:07—Root Cause, Not a Cyberattack &amp; Third-Party Risk Reality</li><li>10:38 - China Uses Anthropic’s Claude + MCP for Automated Cyberattacks</li><li>14:17 - Full AI Attack Lifecycle Explained</li><li>27:18 - MCP: The API for AI &amp; Its Security Risks</li><li>44:05 - Bourbon Break: Knob Creek 21-Year Review</li><li>50:02 - GRC Engineering Deep Dive: Automation &amp; Controls-as-Code</li><li>1:24:13 - Regulatory Roundup: GDPR, ISO 27701, California AB 566, SEC SP</li><li>1:44:27 - CMMC 2.0 Crisis: Auditor Shortages &amp; DoD Contract Impact</li><li>2:11:20 - Closing Thoughts &amp; Episode Wrap-Up</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><strong>Guest</strong></p><ul><li>Matthew J. Schiavone - @Sikitch</li></ul><p><strong>Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 08 Dec 2025 09:00:00 -0500</pubDate>
      <author>Justin Leapline, Joe Wynn and Rick Yocum </author>
      <enclosure url="https://media.transistor.fm/4bf68cf9/999c5138.mp3" length="126887170" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn and Rick Yocum </itunes:author>
      <itunes:duration>7929</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, we break down a major Cloudflare outage, explore how a nation-state used AI agents to automate a cyberattack, and discuss the growing risks around MCP integrations. We also highlight why GRC Engineering is becoming essential to modern security programs and wrap up with key regulatory updates, including CMMC changes affecting thousands of contractors.</p><p><strong>Topics covered: </strong><br>• Cloudflare outage impact and root cause<br>• Nation-state attack using AI agents to automate intrusion steps<br>• MCP (Model Context Protocol): power, risks, and examples<br>• Why GRC Engineering is the future of compliance and automation<br>• Updates on GDPR, ISO 27701, California AB 5866, and SEC rules<br>• CMMC assessor shortages and what organizations must prepare for</p><p><strong>Spirit of the Episode</strong><br>• Knob Creek 21-Year Limited Release, rich caramel notes, heavy char, smooth for 100 proof</p><p><strong>Timestamps</strong></p><ul><li>0:02—Cloudflare Outage Stories &amp; Global Impact</li><li>3:07—Root Cause, Not a Cyberattack &amp; Third-Party Risk Reality</li><li>10:38 - China Uses Anthropic’s Claude + MCP for Automated Cyberattacks</li><li>14:17 - Full AI Attack Lifecycle Explained</li><li>27:18 - MCP: The API for AI &amp; Its Security Risks</li><li>44:05 - Bourbon Break: Knob Creek 21-Year Review</li><li>50:02 - GRC Engineering Deep Dive: Automation &amp; Controls-as-Code</li><li>1:24:13 - Regulatory Roundup: GDPR, ISO 27701, California AB 566, SEC SP</li><li>1:44:27 - CMMC 2.0 Crisis: Auditor Shortages &amp; DoD Contract Impact</li><li>2:11:20 - Closing Thoughts &amp; Episode Wrap-Up</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline – @justinleapline</li><li>Joe Wynn – @wynnjoe</li><li>Rick Yocum – @rickyocum</li></ul><p><strong>Guest</strong></p><ul><li>Matthew J. Schiavone - @Sikitch</li></ul><p><strong>Connect with Us</strong></p><ul><li>Website: distilledsecuritypodcast.com</li><li>X:  @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, AI-Powered Attacks, GRC Engineering, MCP Security, CMMC Compliance Risks, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4bf68cf9/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4bf68cf9/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4bf68cf9/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4bf68cf9/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/4bf68cf9/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 18: TRISS Highlights, Cloud Chaos &amp; SaaS Lessons Learned</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18: TRISS Highlights, Cloud Chaos &amp; SaaS Lessons Learned</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fdb51287-c9be-40a0-98fc-2f41aa332164</guid>
      <link>https://share.transistor.fm/s/728ba78c</link>
      <description>
        <![CDATA[<p>In Episode 18 of the Distilled Security Podcast, Justin Leapline, Joe Wynn, and Rick Yokum recap their time at TRISS, share lessons on storytelling and women in tech, and break down the recent AWS us-east-1 DNS/DynamoDB outage, the Microsoft Front Door global disruption, and the F5 BIG-IP incident. </p><p>🔍 We discuss:<br>- TRISS highlights: panels, community &amp; storytelling<br>- “Breaking the glass ceiling” and unintentional bias in meetings<br>- AWS &amp; Microsoft outages: risk, resilience &amp; when multicloud matters<br>- F5 BIG-IP incident and supply chain risk<br>- Launching a GRC SaaS: episki’s journey, lessons &amp; tradeoffs</p><p>🥃 Spirit of the episode<br>Penelope Bourbon – Project X (sherry cask finish)</p><p>⏱️ Timestamps<br>00:00 – 🥃 Intro &amp; TRISS Recap — Highlights from TRISS: panels, community, and a keynote with Edward Norton</p><p>02:40 – 📖 The Power of Storytelling — Why empathy and narrative matter in cybersecurity leadership</p><p>04:40 – 👩‍💻 Women in Tech &amp; Bias in Meetings — Real talk about unintentional bias and everyday experiences</p><p>20:34 – ☁️ AWS &amp; Microsoft Outages — What happened and what it says about cloud resilience</p><p>49:38 - 🥃 Bourbon Break — Enjoying a glass of Penelope Project X</p><p>53:30 – 🔥 F5 BIG-IP Vulnerability — Supply chain risk and patching lessons</p><p>1:09:50 – 🚀 Launching episki (GRC SaaS) — Building simply, shipping fast, and learning from users</p><p>1:52:22 – 🧭 Reflections &amp; Closing Thoughts — Culture, resilience, and what’s next</p><p>🎧 Hosts<br>Justin Leapline <br>Joe Wynn <br>Rick Yocum </p><p>🌐 Connect with Us<br>Website: distilledsecuritypodcast.com<br>X : @DisSecPod<br>Email: hello@distilledsecuritypodcast.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Episode 18 of the Distilled Security Podcast, Justin Leapline, Joe Wynn, and Rick Yokum recap their time at TRISS, share lessons on storytelling and women in tech, and break down the recent AWS us-east-1 DNS/DynamoDB outage, the Microsoft Front Door global disruption, and the F5 BIG-IP incident. </p><p>🔍 We discuss:<br>- TRISS highlights: panels, community &amp; storytelling<br>- “Breaking the glass ceiling” and unintentional bias in meetings<br>- AWS &amp; Microsoft outages: risk, resilience &amp; when multicloud matters<br>- F5 BIG-IP incident and supply chain risk<br>- Launching a GRC SaaS: episki’s journey, lessons &amp; tradeoffs</p><p>🥃 Spirit of the episode<br>Penelope Bourbon – Project X (sherry cask finish)</p><p>⏱️ Timestamps<br>00:00 – 🥃 Intro &amp; TRISS Recap — Highlights from TRISS: panels, community, and a keynote with Edward Norton</p><p>02:40 – 📖 The Power of Storytelling — Why empathy and narrative matter in cybersecurity leadership</p><p>04:40 – 👩‍💻 Women in Tech &amp; Bias in Meetings — Real talk about unintentional bias and everyday experiences</p><p>20:34 – ☁️ AWS &amp; Microsoft Outages — What happened and what it says about cloud resilience</p><p>49:38 - 🥃 Bourbon Break — Enjoying a glass of Penelope Project X</p><p>53:30 – 🔥 F5 BIG-IP Vulnerability — Supply chain risk and patching lessons</p><p>1:09:50 – 🚀 Launching episki (GRC SaaS) — Building simply, shipping fast, and learning from users</p><p>1:52:22 – 🧭 Reflections &amp; Closing Thoughts — Culture, resilience, and what’s next</p><p>🎧 Hosts<br>Justin Leapline <br>Joe Wynn <br>Rick Yocum </p><p>🌐 Connect with Us<br>Website: distilledsecuritypodcast.com<br>X : @DisSecPod<br>Email: hello@distilledsecuritypodcast.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 10 Nov 2025 15:47:21 -0500</pubDate>
      <author>Justin Leapline, Joe Wynn, Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/728ba78c/9cec2b5a.mp3" length="108780451" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, Rick Yocum</itunes:author>
      <itunes:duration>6797</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In Episode 18 of the Distilled Security Podcast, Justin Leapline, Joe Wynn, and Rick Yokum recap their time at TRISS, share lessons on storytelling and women in tech, and break down the recent AWS us-east-1 DNS/DynamoDB outage, the Microsoft Front Door global disruption, and the F5 BIG-IP incident. </p><p>🔍 We discuss:<br>- TRISS highlights: panels, community &amp; storytelling<br>- “Breaking the glass ceiling” and unintentional bias in meetings<br>- AWS &amp; Microsoft outages: risk, resilience &amp; when multicloud matters<br>- F5 BIG-IP incident and supply chain risk<br>- Launching a GRC SaaS: episki’s journey, lessons &amp; tradeoffs</p><p>🥃 Spirit of the episode<br>Penelope Bourbon – Project X (sherry cask finish)</p><p>⏱️ Timestamps<br>00:00 – 🥃 Intro &amp; TRISS Recap — Highlights from TRISS: panels, community, and a keynote with Edward Norton</p><p>02:40 – 📖 The Power of Storytelling — Why empathy and narrative matter in cybersecurity leadership</p><p>04:40 – 👩‍💻 Women in Tech &amp; Bias in Meetings — Real talk about unintentional bias and everyday experiences</p><p>20:34 – ☁️ AWS &amp; Microsoft Outages — What happened and what it says about cloud resilience</p><p>49:38 - 🥃 Bourbon Break — Enjoying a glass of Penelope Project X</p><p>53:30 – 🔥 F5 BIG-IP Vulnerability — Supply chain risk and patching lessons</p><p>1:09:50 – 🚀 Launching episki (GRC SaaS) — Building simply, shipping fast, and learning from users</p><p>1:52:22 – 🧭 Reflections &amp; Closing Thoughts — Culture, resilience, and what’s next</p><p>🎧 Hosts<br>Justin Leapline <br>Joe Wynn <br>Rick Yocum </p><p>🌐 Connect with Us<br>Website: distilledsecuritypodcast.com<br>X : @DisSecPod<br>Email: hello@distilledsecuritypodcast.com</p>]]>
      </itunes:summary>
      <itunes:keywords>cloud outage, AWS us-east-1, Microsoft Front Door, F5 BIG-IP breach, GRC SaaS</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/728ba78c/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/728ba78c/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/728ba78c/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/728ba78c/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/728ba78c/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 17: TPRM Is Worthless?! NY DFS Part 500, Security Negotiation Tips &amp; Mezcal</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Episode 17: TPRM Is Worthless?! NY DFS Part 500, Security Negotiation Tips &amp; Mezcal</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3590a4f4-a182-4738-87c8-7269289c4d79</guid>
      <link>https://share.transistor.fm/s/cc06dded</link>
      <description>
        <![CDATA[<p>🎙️ Welcome back to the Distilled Security Podcast - Episode 17!</p><p><br></p><p>In this episode, Justin, Joe, and Rick break down several major cybersecurity and compliance updates shaping the landscape this fall. From regulatory deadlines to the futility of checkbox TPRM exercises, the crew dives deep into what actually matters for security leaders and business owners navigating today’s risk environment.</p><p><br></p><p>Also, join us at TRISS in Pittsburgh, PA, at the David this October 29,2025! We have our own booth and will be doing something fun there. Also, we are sponsoring the After Party! Please come say hi!</p><p><br></p><p>🔹 Topics Covered</p><p><br></p><p>NY DFS Part 500: Final Requirements Take Effect November 1</p><p>The hosts unpack the final phase of New York’s cybersecurity regulation, what’s changing, and what companies must have in place before the enforcement deadline.</p><p><br></p><p>Negotiating Security</p><p>How smaller companies can push back or reframe due diligence requirements—substituting a SOC 2 or ISO 27001 certification with custom questionnaires, summaries, or shared evidence that reflect real security maturity instead of checklists.</p><p><br></p><p>“TPRM Is Worthless”</p><p>A candid discussion on the state of third-party risk management: why it’s often broken, what needs to change, and how to make it meaningful rather than bureaucratic.</p><p><br></p><p>Department of War Announces New Cybersecurity Risk Management Construct</p><p>The team explores the DoD’s latest cybersecurity framework announcement—what it means for contractors, how it overlaps with CMMC and NIST 800-171, and whether it will actually simplify or complicate compliance.</p><p><br></p><p>🥃 Spirit Review</p><p><br></p><p>One of Us Mezcal — This small-batch mezcal impresses with its earthy smoke, hints of citrus, and smooth finish. The guys compare it to other craft agave spirits they’ve tried and debate whether it pairs better with a quiet evening or post-recording celebration.</p><p><br></p><p>Find it here:</p><p>https://oneofusmezcal.com/products/cuishe-mezcal-the-wild-one</p><p><br></p><p>⏱️ Timestamps</p><p><br></p><p>0:00 – Introduction &amp; Travel Mishap</p><p>6:25 – New Laptop Twins &amp; Backup Strategies</p><p>11:35 – NY DFS Part 500 Updates</p><p>27:30 – DFS Reporting &amp; Organizational Accountability</p><p>33:30 – Negotiating Security Requirements</p><p>47:46 – Cultural Nuances in Negotiation</p><p>50:20 – Spirit Review: One of Us Mezcal</p><p>52:55 – TPRM Is Worthless?</p><p>57:50 – Fixing Broken Vendor Risk Workflows</p><p>1:08:21 – Vendor Resilience vs. Security</p><p>1:18:20 – New DoW/DoD Cybersecurity Risk Management Construct</p><p>1:35:06 - BSides Pittsburgh Planning &amp; Sponsorship</p><p>1:38:35 - DSP at TRISS</p><p>1:39:51 – Closing Remarks &amp; Outro</p><p><br></p><p>🎧 Hosts</p><p><br></p><p>Justin Leapline – @justinleapline</p><p>Joe Wynn – @wynnjoe</p><p>Rick Yocum – @rickyocum</p><p><br></p><p>🌐 Connect with Us</p><p><br></p><p>Website: distilledsecuritypodcast.com</p><p>🐦 Twitter: @DisSecPod</p><p>📧 Email: hello@distilledsecuritypodcast.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🎙️ Welcome back to the Distilled Security Podcast - Episode 17!</p><p><br></p><p>In this episode, Justin, Joe, and Rick break down several major cybersecurity and compliance updates shaping the landscape this fall. From regulatory deadlines to the futility of checkbox TPRM exercises, the crew dives deep into what actually matters for security leaders and business owners navigating today’s risk environment.</p><p><br></p><p>Also, join us at TRISS in Pittsburgh, PA, at the David this October 29,2025! We have our own booth and will be doing something fun there. Also, we are sponsoring the After Party! Please come say hi!</p><p><br></p><p>🔹 Topics Covered</p><p><br></p><p>NY DFS Part 500: Final Requirements Take Effect November 1</p><p>The hosts unpack the final phase of New York’s cybersecurity regulation, what’s changing, and what companies must have in place before the enforcement deadline.</p><p><br></p><p>Negotiating Security</p><p>How smaller companies can push back or reframe due diligence requirements—substituting a SOC 2 or ISO 27001 certification with custom questionnaires, summaries, or shared evidence that reflect real security maturity instead of checklists.</p><p><br></p><p>“TPRM Is Worthless”</p><p>A candid discussion on the state of third-party risk management: why it’s often broken, what needs to change, and how to make it meaningful rather than bureaucratic.</p><p><br></p><p>Department of War Announces New Cybersecurity Risk Management Construct</p><p>The team explores the DoD’s latest cybersecurity framework announcement—what it means for contractors, how it overlaps with CMMC and NIST 800-171, and whether it will actually simplify or complicate compliance.</p><p><br></p><p>🥃 Spirit Review</p><p><br></p><p>One of Us Mezcal — This small-batch mezcal impresses with its earthy smoke, hints of citrus, and smooth finish. The guys compare it to other craft agave spirits they’ve tried and debate whether it pairs better with a quiet evening or post-recording celebration.</p><p><br></p><p>Find it here:</p><p>https://oneofusmezcal.com/products/cuishe-mezcal-the-wild-one</p><p><br></p><p>⏱️ Timestamps</p><p><br></p><p>0:00 – Introduction &amp; Travel Mishap</p><p>6:25 – New Laptop Twins &amp; Backup Strategies</p><p>11:35 – NY DFS Part 500 Updates</p><p>27:30 – DFS Reporting &amp; Organizational Accountability</p><p>33:30 – Negotiating Security Requirements</p><p>47:46 – Cultural Nuances in Negotiation</p><p>50:20 – Spirit Review: One of Us Mezcal</p><p>52:55 – TPRM Is Worthless?</p><p>57:50 – Fixing Broken Vendor Risk Workflows</p><p>1:08:21 – Vendor Resilience vs. Security</p><p>1:18:20 – New DoW/DoD Cybersecurity Risk Management Construct</p><p>1:35:06 - BSides Pittsburgh Planning &amp; Sponsorship</p><p>1:38:35 - DSP at TRISS</p><p>1:39:51 – Closing Remarks &amp; Outro</p><p><br></p><p>🎧 Hosts</p><p><br></p><p>Justin Leapline – @justinleapline</p><p>Joe Wynn – @wynnjoe</p><p>Rick Yocum – @rickyocum</p><p><br></p><p>🌐 Connect with Us</p><p><br></p><p>Website: distilledsecuritypodcast.com</p><p>🐦 Twitter: @DisSecPod</p><p>📧 Email: hello@distilledsecuritypodcast.com</p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Oct 2025 10:40:15 -0400</pubDate>
      <author>Justin Leapline, Rick Yocum, Joseph Wynn</author>
      <enclosure url="https://media.transistor.fm/cc06dded/c5a28a12.mp3" length="96701322" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Rick Yocum, Joseph Wynn</itunes:author>
      <itunes:duration>6042</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>🎙️ Welcome back to the Distilled Security Podcast - Episode 17!</p><p><br></p><p>In this episode, Justin, Joe, and Rick break down several major cybersecurity and compliance updates shaping the landscape this fall. From regulatory deadlines to the futility of checkbox TPRM exercises, the crew dives deep into what actually matters for security leaders and business owners navigating today’s risk environment.</p><p><br></p><p>Also, join us at TRISS in Pittsburgh, PA, at the David this October 29,2025! We have our own booth and will be doing something fun there. Also, we are sponsoring the After Party! Please come say hi!</p><p><br></p><p>🔹 Topics Covered</p><p><br></p><p>NY DFS Part 500: Final Requirements Take Effect November 1</p><p>The hosts unpack the final phase of New York’s cybersecurity regulation, what’s changing, and what companies must have in place before the enforcement deadline.</p><p><br></p><p>Negotiating Security</p><p>How smaller companies can push back or reframe due diligence requirements—substituting a SOC 2 or ISO 27001 certification with custom questionnaires, summaries, or shared evidence that reflect real security maturity instead of checklists.</p><p><br></p><p>“TPRM Is Worthless”</p><p>A candid discussion on the state of third-party risk management: why it’s often broken, what needs to change, and how to make it meaningful rather than bureaucratic.</p><p><br></p><p>Department of War Announces New Cybersecurity Risk Management Construct</p><p>The team explores the DoD’s latest cybersecurity framework announcement—what it means for contractors, how it overlaps with CMMC and NIST 800-171, and whether it will actually simplify or complicate compliance.</p><p><br></p><p>🥃 Spirit Review</p><p><br></p><p>One of Us Mezcal — This small-batch mezcal impresses with its earthy smoke, hints of citrus, and smooth finish. The guys compare it to other craft agave spirits they’ve tried and debate whether it pairs better with a quiet evening or post-recording celebration.</p><p><br></p><p>Find it here:</p><p>https://oneofusmezcal.com/products/cuishe-mezcal-the-wild-one</p><p><br></p><p>⏱️ Timestamps</p><p><br></p><p>0:00 – Introduction &amp; Travel Mishap</p><p>6:25 – New Laptop Twins &amp; Backup Strategies</p><p>11:35 – NY DFS Part 500 Updates</p><p>27:30 – DFS Reporting &amp; Organizational Accountability</p><p>33:30 – Negotiating Security Requirements</p><p>47:46 – Cultural Nuances in Negotiation</p><p>50:20 – Spirit Review: One of Us Mezcal</p><p>52:55 – TPRM Is Worthless?</p><p>57:50 – Fixing Broken Vendor Risk Workflows</p><p>1:08:21 – Vendor Resilience vs. Security</p><p>1:18:20 – New DoW/DoD Cybersecurity Risk Management Construct</p><p>1:35:06 - BSides Pittsburgh Planning &amp; Sponsorship</p><p>1:38:35 - DSP at TRISS</p><p>1:39:51 – Closing Remarks &amp; Outro</p><p><br></p><p>🎧 Hosts</p><p><br></p><p>Justin Leapline – @justinleapline</p><p>Joe Wynn – @wynnjoe</p><p>Rick Yocum – @rickyocum</p><p><br></p><p>🌐 Connect with Us</p><p><br></p><p>Website: distilledsecuritypodcast.com</p><p>🐦 Twitter: @DisSecPod</p><p>📧 Email: hello@distilledsecuritypodcast.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity,  Risk Management, Compliance,  Third-Party Risk,  NY DFS Part 500</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/cc06dded/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cc06dded/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cc06dded/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cc06dded/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/cc06dded/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 16: When Metrics Mislead: Security Scoring, Board Gaps, and vGRC</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16: When Metrics Mislead: Security Scoring, Board Gaps, and vGRC</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">79330c8f-1b12-47e6-b529-6f1d085ae9d1</guid>
      <link>https://share.transistor.fm/s/4999b411</link>
      <description>
        <![CDATA[<p><strong><br>Episode 16: When Metrics Mislead: Security Scoring, Board Gaps, and vGRC<br></strong><br></p><p><br></p><p><strong><br>Episode 16 of the Distilled Security Podcast is here!</strong></p><p><br>In this episode, Justin, Joe, and Rick christen the new studio and dive into some of the trickiest challenges in measuring, reporting, and governing security programs. From maturity models to board reporting, the conversation unpacks how scoring systems can mislead, how to communicate bad news effectively, and why boards need more than just “checkbox” cyber expertise.</p><p>The team also explores the rise of <strong>vGRC (Virtual GRC) services</strong>—what they are, how they differ from vCISO offerings, and when organizations should consider fractional models. And of course, no episode would be complete without a pour: this week, a rich <strong>Woodford Reserve Double Double Oaked</strong> bourbon.</p><p><strong><br>Topics Covered</strong></p><ul><li><strong>New Studio Upgrade</strong>: Behind-the-scenes on mics, cameras, and why the couch had to go.<p></p></li><li><strong>Measuring to the Score</strong>: The dangers of chasing maturity numbers instead of real security outcomes.<p></p></li><li><strong>Scoping, Rubrics &amp; Auditor Whim</strong>: Why assessments are subjective and how leadership often misunderstands the results.<p></p></li><li><strong>Cultural Incentives</strong>: How bonuses, compliance checkboxes, and “auditor shopping” distort security reporting.<p></p></li><li><strong>Prepping for New Tools</strong>: Setting expectations with leadership when visibility spikes after deploying monitoring or vulnerability tools.<p></p></li><li><strong>Boards and Cybersecurity Expertise</strong>: Should cyber knowledge be mandated at the board level—or does it risk creating the illusion of safety?<p></p></li><li><strong>Virtual GRC vs. vCISO</strong>: What fractional GRC services really deliver, how they differ from vCISO roles, and why naming clarity matters.<p></p></li><li><strong>Bourbon Review</strong>: Woodford Reserve Double Double Oaked — syrupy, smooth, and perfect for a holiday pour.<p></p></li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline</li><li>Joe Wynn</li><li>Rick Yocum<p></p></li></ul><p><strong>Connect with Us<br></strong> 🌐 Website:<a href="http://distilledsecuritypodcast.com?utm_source=chatgpt.com"> distilledsecuritypodcast.com<br></a> 🐦 Twitter:<a href="https://twitter.com/DisSecPod?utm_source=chatgpt.com"> @DisSecPod<br></a> 📧 Email: hello@distilledsecuritypodcast.com</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong><br>Episode 16: When Metrics Mislead: Security Scoring, Board Gaps, and vGRC<br></strong><br></p><p><br></p><p><strong><br>Episode 16 of the Distilled Security Podcast is here!</strong></p><p><br>In this episode, Justin, Joe, and Rick christen the new studio and dive into some of the trickiest challenges in measuring, reporting, and governing security programs. From maturity models to board reporting, the conversation unpacks how scoring systems can mislead, how to communicate bad news effectively, and why boards need more than just “checkbox” cyber expertise.</p><p>The team also explores the rise of <strong>vGRC (Virtual GRC) services</strong>—what they are, how they differ from vCISO offerings, and when organizations should consider fractional models. And of course, no episode would be complete without a pour: this week, a rich <strong>Woodford Reserve Double Double Oaked</strong> bourbon.</p><p><strong><br>Topics Covered</strong></p><ul><li><strong>New Studio Upgrade</strong>: Behind-the-scenes on mics, cameras, and why the couch had to go.<p></p></li><li><strong>Measuring to the Score</strong>: The dangers of chasing maturity numbers instead of real security outcomes.<p></p></li><li><strong>Scoping, Rubrics &amp; Auditor Whim</strong>: Why assessments are subjective and how leadership often misunderstands the results.<p></p></li><li><strong>Cultural Incentives</strong>: How bonuses, compliance checkboxes, and “auditor shopping” distort security reporting.<p></p></li><li><strong>Prepping for New Tools</strong>: Setting expectations with leadership when visibility spikes after deploying monitoring or vulnerability tools.<p></p></li><li><strong>Boards and Cybersecurity Expertise</strong>: Should cyber knowledge be mandated at the board level—or does it risk creating the illusion of safety?<p></p></li><li><strong>Virtual GRC vs. vCISO</strong>: What fractional GRC services really deliver, how they differ from vCISO roles, and why naming clarity matters.<p></p></li><li><strong>Bourbon Review</strong>: Woodford Reserve Double Double Oaked — syrupy, smooth, and perfect for a holiday pour.<p></p></li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline</li><li>Joe Wynn</li><li>Rick Yocum<p></p></li></ul><p><strong>Connect with Us<br></strong> 🌐 Website:<a href="http://distilledsecuritypodcast.com?utm_source=chatgpt.com"> distilledsecuritypodcast.com<br></a> 🐦 Twitter:<a href="https://twitter.com/DisSecPod?utm_source=chatgpt.com"> @DisSecPod<br></a> 📧 Email: hello@distilledsecuritypodcast.com</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Sep 2025 09:58:00 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/4999b411/9f8b633d.mp3" length="109422811" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn and Rick Yocum</itunes:author>
      <itunes:duration>6837</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong><br>Episode 16: When Metrics Mislead: Security Scoring, Board Gaps, and vGRC<br></strong><br></p><p><br></p><p><strong><br>Episode 16 of the Distilled Security Podcast is here!</strong></p><p><br>In this episode, Justin, Joe, and Rick christen the new studio and dive into some of the trickiest challenges in measuring, reporting, and governing security programs. From maturity models to board reporting, the conversation unpacks how scoring systems can mislead, how to communicate bad news effectively, and why boards need more than just “checkbox” cyber expertise.</p><p>The team also explores the rise of <strong>vGRC (Virtual GRC) services</strong>—what they are, how they differ from vCISO offerings, and when organizations should consider fractional models. And of course, no episode would be complete without a pour: this week, a rich <strong>Woodford Reserve Double Double Oaked</strong> bourbon.</p><p><strong><br>Topics Covered</strong></p><ul><li><strong>New Studio Upgrade</strong>: Behind-the-scenes on mics, cameras, and why the couch had to go.<p></p></li><li><strong>Measuring to the Score</strong>: The dangers of chasing maturity numbers instead of real security outcomes.<p></p></li><li><strong>Scoping, Rubrics &amp; Auditor Whim</strong>: Why assessments are subjective and how leadership often misunderstands the results.<p></p></li><li><strong>Cultural Incentives</strong>: How bonuses, compliance checkboxes, and “auditor shopping” distort security reporting.<p></p></li><li><strong>Prepping for New Tools</strong>: Setting expectations with leadership when visibility spikes after deploying monitoring or vulnerability tools.<p></p></li><li><strong>Boards and Cybersecurity Expertise</strong>: Should cyber knowledge be mandated at the board level—or does it risk creating the illusion of safety?<p></p></li><li><strong>Virtual GRC vs. vCISO</strong>: What fractional GRC services really deliver, how they differ from vCISO roles, and why naming clarity matters.<p></p></li><li><strong>Bourbon Review</strong>: Woodford Reserve Double Double Oaked — syrupy, smooth, and perfect for a holiday pour.<p></p></li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline</li><li>Joe Wynn</li><li>Rick Yocum<p></p></li></ul><p><strong>Connect with Us<br></strong> 🌐 Website:<a href="http://distilledsecuritypodcast.com?utm_source=chatgpt.com"> distilledsecuritypodcast.com<br></a> 🐦 Twitter:<a href="https://twitter.com/DisSecPod?utm_source=chatgpt.com"> @DisSecPod<br></a> 📧 Email: hello@distilledsecuritypodcast.com</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity Maturity, Risk Management, Board Governance, vCISO vs vGRC, Security Compliance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4999b411/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4999b411/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4999b411/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4999b411/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/4999b411/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 15: Community Building, Art of Convincing, and GTD Strategies</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15: Community Building, Art of Convincing, and GTD Strategies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d718ab9c-92f0-4b8f-97af-42f3b9dc1167</guid>
      <link>https://share.transistor.fm/s/00fd0bc1</link>
      <description>
        <![CDATA[<p><strong>🎙️ Welcome back to the Distilled Security Podcast!</strong></p><p>In this episode, hosts Justin Leapline, Joe Wynn, and Rick Yocum sit down with James Ringold (Senior Security Cloud Solution Architect at Microsoft and President of ISSA Pittsburgh) to talk all about building stronger cybersecurity communities.</p><p>From the behind-the-scenes of BSides Pittsburgh 2025 to engaging the next generation through mentorship and student-led talks, this episode offers practical insights on how to grow inclusive, vendor-neutral spaces that truly support people in security.</p><p><strong>Topics Covered</strong></p><ul><li><strong>BSides Pittsburgh 2025 Highlights</strong></li></ul><p>What made this year’s event stand out — from arcade machines and pastries to great speakers and a welcoming atmosphere.</p><ul><li><strong>Running an Inclusive Security Chapter</strong></li></ul><p>Insights into leading ISSA Pittsburgh, maintaining momentum, and building a vendor-neutral space that feels open to everyone.</p><ul><li><strong>The Power of Consistency</strong></li></ul><p>Why showing up regularly and following through matters when growing a security community.</p><ul><li><strong>Mentoring the Next Generation</strong></li></ul><p>The importance of mentorship chains, student-led initiatives, and creating low-pressure environments for future leaders.</p><ul><li><strong>Engaging Students Beyond Attendance</strong></li></ul><p>How to get students truly involved, from submitting talks to building long-term relationships that support career growth.</p><ul><li><strong>Authenticity and Community Building</strong></li></ul><p>Why empathy, storytelling, and invitation—not pressure—are essential for creating lasting, supportive security ecosystems.</p><p><strong>Timestamps:</strong></p><p>00:00:00 – Intro &amp; Guest Welcome<br> 00:02:20 – BSides Pittsburgh 2025 Preview<br> 00:24:10 – Building Inclusive Security Communities<br> 00:41:20 – Mentorship &amp; Student Talks<br> 01:11:00 – Whiskey Tasting: Grand Traverse Distillery<br> 01:33:00 – Growing Through Empathy &amp; Local Leadership<br> 01:48:30 – Final Reflections &amp; Outro</p><p><strong>Links</strong></p><ul><li><a href="https://pittsburghissa.org/">ISSA Pittsburgh</a></li><li><a href="https://www.bsidespgh.com/">BSides Pittsburgh</a></li></ul><p><strong>Hosts</strong></p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline </a></li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn </a> </li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum </a></li></ul><p><strong>Guest </strong></p><ul><li><a href="https://www.linkedin.com/in/jamesringold/">James Ringold</a></li></ul><p><br><strong>Connect with Us</strong></p><ul><li>Website: <a href="https://distilledsecuritypodcast.com/">distilledsecuritypodcast.com</a></li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>🎙️ Welcome back to the Distilled Security Podcast!</strong></p><p>In this episode, hosts Justin Leapline, Joe Wynn, and Rick Yocum sit down with James Ringold (Senior Security Cloud Solution Architect at Microsoft and President of ISSA Pittsburgh) to talk all about building stronger cybersecurity communities.</p><p>From the behind-the-scenes of BSides Pittsburgh 2025 to engaging the next generation through mentorship and student-led talks, this episode offers practical insights on how to grow inclusive, vendor-neutral spaces that truly support people in security.</p><p><strong>Topics Covered</strong></p><ul><li><strong>BSides Pittsburgh 2025 Highlights</strong></li></ul><p>What made this year’s event stand out — from arcade machines and pastries to great speakers and a welcoming atmosphere.</p><ul><li><strong>Running an Inclusive Security Chapter</strong></li></ul><p>Insights into leading ISSA Pittsburgh, maintaining momentum, and building a vendor-neutral space that feels open to everyone.</p><ul><li><strong>The Power of Consistency</strong></li></ul><p>Why showing up regularly and following through matters when growing a security community.</p><ul><li><strong>Mentoring the Next Generation</strong></li></ul><p>The importance of mentorship chains, student-led initiatives, and creating low-pressure environments for future leaders.</p><ul><li><strong>Engaging Students Beyond Attendance</strong></li></ul><p>How to get students truly involved, from submitting talks to building long-term relationships that support career growth.</p><ul><li><strong>Authenticity and Community Building</strong></li></ul><p>Why empathy, storytelling, and invitation—not pressure—are essential for creating lasting, supportive security ecosystems.</p><p><strong>Timestamps:</strong></p><p>00:00:00 – Intro &amp; Guest Welcome<br> 00:02:20 – BSides Pittsburgh 2025 Preview<br> 00:24:10 – Building Inclusive Security Communities<br> 00:41:20 – Mentorship &amp; Student Talks<br> 01:11:00 – Whiskey Tasting: Grand Traverse Distillery<br> 01:33:00 – Growing Through Empathy &amp; Local Leadership<br> 01:48:30 – Final Reflections &amp; Outro</p><p><strong>Links</strong></p><ul><li><a href="https://pittsburghissa.org/">ISSA Pittsburgh</a></li><li><a href="https://www.bsidespgh.com/">BSides Pittsburgh</a></li></ul><p><strong>Hosts</strong></p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline </a></li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn </a> </li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum </a></li></ul><p><strong>Guest </strong></p><ul><li><a href="https://www.linkedin.com/in/jamesringold/">James Ringold</a></li></ul><p><br><strong>Connect with Us</strong></p><ul><li>Website: <a href="https://distilledsecuritypodcast.com/">distilledsecuritypodcast.com</a></li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 06 Aug 2025 09:15:00 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, Rick Yocum and James Ringold</author>
      <enclosure url="https://media.transistor.fm/00fd0bc1/172f1495.mp3" length="109807746" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, Rick Yocum and James Ringold</itunes:author>
      <itunes:duration>6861</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>🎙️ Welcome back to the Distilled Security Podcast!</strong></p><p>In this episode, hosts Justin Leapline, Joe Wynn, and Rick Yocum sit down with James Ringold (Senior Security Cloud Solution Architect at Microsoft and President of ISSA Pittsburgh) to talk all about building stronger cybersecurity communities.</p><p>From the behind-the-scenes of BSides Pittsburgh 2025 to engaging the next generation through mentorship and student-led talks, this episode offers practical insights on how to grow inclusive, vendor-neutral spaces that truly support people in security.</p><p><strong>Topics Covered</strong></p><ul><li><strong>BSides Pittsburgh 2025 Highlights</strong></li></ul><p>What made this year’s event stand out — from arcade machines and pastries to great speakers and a welcoming atmosphere.</p><ul><li><strong>Running an Inclusive Security Chapter</strong></li></ul><p>Insights into leading ISSA Pittsburgh, maintaining momentum, and building a vendor-neutral space that feels open to everyone.</p><ul><li><strong>The Power of Consistency</strong></li></ul><p>Why showing up regularly and following through matters when growing a security community.</p><ul><li><strong>Mentoring the Next Generation</strong></li></ul><p>The importance of mentorship chains, student-led initiatives, and creating low-pressure environments for future leaders.</p><ul><li><strong>Engaging Students Beyond Attendance</strong></li></ul><p>How to get students truly involved, from submitting talks to building long-term relationships that support career growth.</p><ul><li><strong>Authenticity and Community Building</strong></li></ul><p>Why empathy, storytelling, and invitation—not pressure—are essential for creating lasting, supportive security ecosystems.</p><p><strong>Timestamps:</strong></p><p>00:00:00 – Intro &amp; Guest Welcome<br> 00:02:20 – BSides Pittsburgh 2025 Preview<br> 00:24:10 – Building Inclusive Security Communities<br> 00:41:20 – Mentorship &amp; Student Talks<br> 01:11:00 – Whiskey Tasting: Grand Traverse Distillery<br> 01:33:00 – Growing Through Empathy &amp; Local Leadership<br> 01:48:30 – Final Reflections &amp; Outro</p><p><strong>Links</strong></p><ul><li><a href="https://pittsburghissa.org/">ISSA Pittsburgh</a></li><li><a href="https://www.bsidespgh.com/">BSides Pittsburgh</a></li></ul><p><strong>Hosts</strong></p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline </a></li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn </a> </li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum </a></li></ul><p><strong>Guest </strong></p><ul><li><a href="https://www.linkedin.com/in/jamesringold/">James Ringold</a></li></ul><p><br><strong>Connect with Us</strong></p><ul><li>Website: <a href="https://distilledsecuritypodcast.com/">distilledsecuritypodcast.com</a></li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity Community, BSides Pittsburgh 2025, Mentorship in Security, ISSA Pittsburgh, Student Engagement in Cybersecurity.</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:person role="Guest" href="https://www.threads.com/@jringold3" img="https://img.transistorcdn.com/q1u3VpcVdjNFVNjmkCYHU5oGjZztB4LjwDPZdb0hIkE/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kODll/ZjM3M2NkY2UyZjZj/MzNmYTVhMDljMDJi/MmI2Mi5wbmc.jpg">James Ringold</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/00fd0bc1/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/00fd0bc1/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/00fd0bc1/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/00fd0bc1/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/00fd0bc1/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 14: AI Risks, Threat Modeling, and The Future of Vibe Coding</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14: AI Risks, Threat Modeling, and The Future of Vibe Coding</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82e985a3-fc5d-4255-8173-f0934c0f5c14</guid>
      <link>https://share.transistor.fm/s/d3155aef</link>
      <description>
        <![CDATA[<p><strong>Episode 14 of the Distilled Security Podcast is here!</strong></p><p>This week, the team welcomes guest <strong>John Zeolla</strong>, a cybersecurity expert and AI enthusiast, for a deep dive into the risks, realities, and potential of artificial intelligence.</p><p><br>Topics include:</p><ul><li><strong>Shadow AI in the Enterprise</strong>: Why business leaders are adopting AI faster than CISOs can assess the risks—and how features are outpacing controls.<p></p></li><li><strong>Third-Party AI Risk</strong>: Understanding vendor integrations with ChatGPT and others, and how contracts alone can’t guarantee security.<p></p></li><li><strong>Data Sprawl and Provenance</strong>: How uncontrolled data flows and poor identity scoping create dangerous exposure in generative AI platforms.<p></p></li><li><strong>Threat Modeling for AI</strong>: Why traditional frameworks like STRIDE still apply—and how techniques like “LLM as a judge” are reshaping modern risk analysis.<p></p></li><li><strong>Hallucinations, Misuse, and Insider Access</strong>: From AI-summarized HR documents to leaked board data, the team explores how improper permissions are amplified by intelligent agents.<p></p></li><li><strong>AI in Real Business Use</strong>: From customer support chatbots to code review tools, where AI adds value—and where it creates new points of failure.<p></p></li><li><strong>Governance and Culture</strong>: The role of CISOs, legal, and finance leaders in aligning AI ambition with responsible oversight.<p></p></li><li><strong>Bourbon Review – Elijah Craig Private Barrel Pick</strong>: A smooth 94-proof selection sponsored by <strong>Liberty Liquors (MD)</strong>, bringing sweet caramel and balance to this week’s pour.<p></p></li><li><strong>BSides Pittsburgh Preview</strong>: With nearly 1,000 tickets sold, the team teases event highlights, panel interviews, and John's upcoming talk on "vibe coding."</li></ul><p><br><strong>Timestamps</strong></p><p><a href="https://www.youtube.com/watch?v=L12uZJBGE7A">00:00</a> – Welcome &amp; Introductions<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=140s">02:20</a> – What’s “Shadow AI”?<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=405s">06:45</a> – Third-Party Risk &amp; AI Integrations<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=670s">11:10</a> – Contracts ≠ Security<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=840s">14:00</a> – Data Sprawl &amp; Identity Challenges<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1145s">19:05</a> – Threat Modeling for AI<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1420s">23:40</a> – “LLM as a Judge” in Risk Analysis<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1695s">28:15</a> – Hallucinations &amp; Misuse Scenarios<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1980s">33:00</a> – Insider Access Amplified by AI<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2190s">36:30</a> – Real-World Use Cases (Chatbots, Code Review, etc.)<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2515s">41:55</a> – Governance, Culture &amp; CISO Alignment<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2900s">48:20</a> – Bourbon Review: Elijah Craig Private Barrel<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=3150s">52:30</a> – BSides PGH Preview &amp; John’s “Vibe Coding” Talk<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=3420s">57:00</a> – Final Thoughts &amp; Wrap-Up</p><p><strong><br>Hosts</strong></p><ul><li>Justin Leapline –<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn –<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum –<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn<br></a><br></li></ul><p><strong>Guest</strong></p><ul><li>John Zeolla –<a href="https://zenable.io"> Zenable.io<br></a><br></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> distilledsecuritypodcast.com</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode 14 of the Distilled Security Podcast is here!</strong></p><p>This week, the team welcomes guest <strong>John Zeolla</strong>, a cybersecurity expert and AI enthusiast, for a deep dive into the risks, realities, and potential of artificial intelligence.</p><p><br>Topics include:</p><ul><li><strong>Shadow AI in the Enterprise</strong>: Why business leaders are adopting AI faster than CISOs can assess the risks—and how features are outpacing controls.<p></p></li><li><strong>Third-Party AI Risk</strong>: Understanding vendor integrations with ChatGPT and others, and how contracts alone can’t guarantee security.<p></p></li><li><strong>Data Sprawl and Provenance</strong>: How uncontrolled data flows and poor identity scoping create dangerous exposure in generative AI platforms.<p></p></li><li><strong>Threat Modeling for AI</strong>: Why traditional frameworks like STRIDE still apply—and how techniques like “LLM as a judge” are reshaping modern risk analysis.<p></p></li><li><strong>Hallucinations, Misuse, and Insider Access</strong>: From AI-summarized HR documents to leaked board data, the team explores how improper permissions are amplified by intelligent agents.<p></p></li><li><strong>AI in Real Business Use</strong>: From customer support chatbots to code review tools, where AI adds value—and where it creates new points of failure.<p></p></li><li><strong>Governance and Culture</strong>: The role of CISOs, legal, and finance leaders in aligning AI ambition with responsible oversight.<p></p></li><li><strong>Bourbon Review – Elijah Craig Private Barrel Pick</strong>: A smooth 94-proof selection sponsored by <strong>Liberty Liquors (MD)</strong>, bringing sweet caramel and balance to this week’s pour.<p></p></li><li><strong>BSides Pittsburgh Preview</strong>: With nearly 1,000 tickets sold, the team teases event highlights, panel interviews, and John's upcoming talk on "vibe coding."</li></ul><p><br><strong>Timestamps</strong></p><p><a href="https://www.youtube.com/watch?v=L12uZJBGE7A">00:00</a> – Welcome &amp; Introductions<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=140s">02:20</a> – What’s “Shadow AI”?<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=405s">06:45</a> – Third-Party Risk &amp; AI Integrations<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=670s">11:10</a> – Contracts ≠ Security<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=840s">14:00</a> – Data Sprawl &amp; Identity Challenges<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1145s">19:05</a> – Threat Modeling for AI<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1420s">23:40</a> – “LLM as a Judge” in Risk Analysis<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1695s">28:15</a> – Hallucinations &amp; Misuse Scenarios<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1980s">33:00</a> – Insider Access Amplified by AI<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2190s">36:30</a> – Real-World Use Cases (Chatbots, Code Review, etc.)<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2515s">41:55</a> – Governance, Culture &amp; CISO Alignment<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2900s">48:20</a> – Bourbon Review: Elijah Craig Private Barrel<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=3150s">52:30</a> – BSides PGH Preview &amp; John’s “Vibe Coding” Talk<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=3420s">57:00</a> – Final Thoughts &amp; Wrap-Up</p><p><strong><br>Hosts</strong></p><ul><li>Justin Leapline –<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn –<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum –<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn<br></a><br></li></ul><p><strong>Guest</strong></p><ul><li>John Zeolla –<a href="https://zenable.io"> Zenable.io<br></a><br></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> distilledsecuritypodcast.com</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Jul 2025 10:30:23 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, Rick Yocum and John Zeolla</author>
      <enclosure url="https://media.transistor.fm/d3155aef/c242f001.mp3" length="79226510" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, Rick Yocum and John Zeolla</itunes:author>
      <itunes:duration>4950</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Episode 14 of the Distilled Security Podcast is here!</strong></p><p>This week, the team welcomes guest <strong>John Zeolla</strong>, a cybersecurity expert and AI enthusiast, for a deep dive into the risks, realities, and potential of artificial intelligence.</p><p><br>Topics include:</p><ul><li><strong>Shadow AI in the Enterprise</strong>: Why business leaders are adopting AI faster than CISOs can assess the risks—and how features are outpacing controls.<p></p></li><li><strong>Third-Party AI Risk</strong>: Understanding vendor integrations with ChatGPT and others, and how contracts alone can’t guarantee security.<p></p></li><li><strong>Data Sprawl and Provenance</strong>: How uncontrolled data flows and poor identity scoping create dangerous exposure in generative AI platforms.<p></p></li><li><strong>Threat Modeling for AI</strong>: Why traditional frameworks like STRIDE still apply—and how techniques like “LLM as a judge” are reshaping modern risk analysis.<p></p></li><li><strong>Hallucinations, Misuse, and Insider Access</strong>: From AI-summarized HR documents to leaked board data, the team explores how improper permissions are amplified by intelligent agents.<p></p></li><li><strong>AI in Real Business Use</strong>: From customer support chatbots to code review tools, where AI adds value—and where it creates new points of failure.<p></p></li><li><strong>Governance and Culture</strong>: The role of CISOs, legal, and finance leaders in aligning AI ambition with responsible oversight.<p></p></li><li><strong>Bourbon Review – Elijah Craig Private Barrel Pick</strong>: A smooth 94-proof selection sponsored by <strong>Liberty Liquors (MD)</strong>, bringing sweet caramel and balance to this week’s pour.<p></p></li><li><strong>BSides Pittsburgh Preview</strong>: With nearly 1,000 tickets sold, the team teases event highlights, panel interviews, and John's upcoming talk on "vibe coding."</li></ul><p><br><strong>Timestamps</strong></p><p><a href="https://www.youtube.com/watch?v=L12uZJBGE7A">00:00</a> – Welcome &amp; Introductions<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=140s">02:20</a> – What’s “Shadow AI”?<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=405s">06:45</a> – Third-Party Risk &amp; AI Integrations<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=670s">11:10</a> – Contracts ≠ Security<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=840s">14:00</a> – Data Sprawl &amp; Identity Challenges<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1145s">19:05</a> – Threat Modeling for AI<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1420s">23:40</a> – “LLM as a Judge” in Risk Analysis<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1695s">28:15</a> – Hallucinations &amp; Misuse Scenarios<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=1980s">33:00</a> – Insider Access Amplified by AI<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2190s">36:30</a> – Real-World Use Cases (Chatbots, Code Review, etc.)<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2515s">41:55</a> – Governance, Culture &amp; CISO Alignment<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=2900s">48:20</a> – Bourbon Review: Elijah Craig Private Barrel<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=3150s">52:30</a> – BSides PGH Preview &amp; John’s “Vibe Coding” Talk<br><a href="https://www.youtube.com/watch?v=L12uZJBGE7A&amp;t=3420s">57:00</a> – Final Thoughts &amp; Wrap-Up</p><p><strong><br>Hosts</strong></p><ul><li>Justin Leapline –<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn –<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum –<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn<br></a><br></li></ul><p><strong>Guest</strong></p><ul><li>John Zeolla –<a href="https://zenable.io"> Zenable.io<br></a><br></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> distilledsecuritypodcast.com</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>AI Risk,Insider Threats, Shadow AI, Threat Modeling, Governance, Third-Party Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:person role="Guest" href="https://jonzeolla.com/about-me.html" img="https://img.transistorcdn.com/kOvsQXs9ZKUPXU3S8uWfq2q2BIosJsefokAcX3SmSuM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDk0/MDI2ZjA2MWY4MWM4/YmJlMzJiZTZjYTY2/MDkxYy5wbmc.jpg">Jon Zeolla</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d3155aef/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d3155aef/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d3155aef/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d3155aef/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/d3155aef/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 13: Insider Threats, the CISO's Role, and Reporting Lines</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13: Insider Threats, the CISO's Role, and Reporting Lines</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3728a387-02d3-46af-8c4a-a70911b67d04</guid>
      <link>https://share.transistor.fm/s/cfee33e4</link>
      <description>
        <![CDATA[<p><strong>Episode 13 of the Distilled Security Podcast is here!</strong></p><p>Join us as we explore:</p><ul><li><strong>The Coinbase Breach</strong>: A breakdown of Coinbase’s recent insider-driven breach, including social engineering, bribery of offshore contractors, and how the company responded publicly and operationally.</li><li><strong>Building Insider Threat Programs</strong>: The crew shares practical approaches to detecting insider misuse, behavioral monitoring, and the potential for "job descriptions as code."</li><li><strong>CISO Liability and Insurance</strong>: Discussion on the evolving legal exposure for CISOs, personal liability, and whether directors and officers (D&amp;O) insurance is a must-have.</li><li><strong>Board-Level Cyber Risk</strong>: Should cybersecurity roll up to the audit committee or its own risk committee? The team explores where security leadership best fits in organizational governance.</li><li><strong>Communication and Legal Risk</strong>: How careless comments—public or internal—can be used against organizations, and why CISOs and leaders must strike a balance between transparency and caution.</li><li><strong>Modern Risk Management</strong>: Turning technical issues into business risk conversations, why documentation matters, and how strong risk communication can help CISOs avoid being scapegoated.</li><li><strong>BSides Pittsburgh Update</strong>: With over 600 tickets already sold, the team gives updates on ticket tiers, t-shirts, speaker schedules, and why you should register by June 13.</li><li><strong>Bourbon Review – Widow Jane Lucky 13</strong>: To celebrate episode 13, the crew samples Widow Jane Lucky 13—a smooth, toffee-forward bourbon aged 13 years.</li><li><strong>Reporting Lines</strong>: Where and how security should be structured within the organization, from effectiveness to liability and more.</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode 13 of the Distilled Security Podcast is here!</strong></p><p>Join us as we explore:</p><ul><li><strong>The Coinbase Breach</strong>: A breakdown of Coinbase’s recent insider-driven breach, including social engineering, bribery of offshore contractors, and how the company responded publicly and operationally.</li><li><strong>Building Insider Threat Programs</strong>: The crew shares practical approaches to detecting insider misuse, behavioral monitoring, and the potential for "job descriptions as code."</li><li><strong>CISO Liability and Insurance</strong>: Discussion on the evolving legal exposure for CISOs, personal liability, and whether directors and officers (D&amp;O) insurance is a must-have.</li><li><strong>Board-Level Cyber Risk</strong>: Should cybersecurity roll up to the audit committee or its own risk committee? The team explores where security leadership best fits in organizational governance.</li><li><strong>Communication and Legal Risk</strong>: How careless comments—public or internal—can be used against organizations, and why CISOs and leaders must strike a balance between transparency and caution.</li><li><strong>Modern Risk Management</strong>: Turning technical issues into business risk conversations, why documentation matters, and how strong risk communication can help CISOs avoid being scapegoated.</li><li><strong>BSides Pittsburgh Update</strong>: With over 600 tickets already sold, the team gives updates on ticket tiers, t-shirts, speaker schedules, and why you should register by June 13.</li><li><strong>Bourbon Review – Widow Jane Lucky 13</strong>: To celebrate episode 13, the crew samples Widow Jane Lucky 13—a smooth, toffee-forward bourbon aged 13 years.</li><li><strong>Reporting Lines</strong>: Where and how security should be structured within the organization, from effectiveness to liability and more.</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </content:encoded>
      <pubDate>Fri, 13 Jun 2025 08:37:31 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/cfee33e4/ea563ea5.mp3" length="79421271" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn and Rick Yocum</itunes:author>
      <itunes:duration>4962</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Episode 13 of the Distilled Security Podcast is here!</strong></p><p>Join us as we explore:</p><ul><li><strong>The Coinbase Breach</strong>: A breakdown of Coinbase’s recent insider-driven breach, including social engineering, bribery of offshore contractors, and how the company responded publicly and operationally.</li><li><strong>Building Insider Threat Programs</strong>: The crew shares practical approaches to detecting insider misuse, behavioral monitoring, and the potential for "job descriptions as code."</li><li><strong>CISO Liability and Insurance</strong>: Discussion on the evolving legal exposure for CISOs, personal liability, and whether directors and officers (D&amp;O) insurance is a must-have.</li><li><strong>Board-Level Cyber Risk</strong>: Should cybersecurity roll up to the audit committee or its own risk committee? The team explores where security leadership best fits in organizational governance.</li><li><strong>Communication and Legal Risk</strong>: How careless comments—public or internal—can be used against organizations, and why CISOs and leaders must strike a balance between transparency and caution.</li><li><strong>Modern Risk Management</strong>: Turning technical issues into business risk conversations, why documentation matters, and how strong risk communication can help CISOs avoid being scapegoated.</li><li><strong>BSides Pittsburgh Update</strong>: With over 600 tickets already sold, the team gives updates on ticket tiers, t-shirts, speaker schedules, and why you should register by June 13.</li><li><strong>Bourbon Review – Widow Jane Lucky 13</strong>: To celebrate episode 13, the crew samples Widow Jane Lucky 13—a smooth, toffee-forward bourbon aged 13 years.</li><li><strong>Reporting Lines</strong>: Where and how security should be structured within the organization, from effectiveness to liability and more.</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Insider Threats, Governance, CISO Liability, Audit Committees, Risk Management, Coinbase Breach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/cfee33e4/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cfee33e4/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cfee33e4/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cfee33e4/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/cfee33e4/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 12: One Year of Distilled Security, Auditor Quality, and Starting Your Own Company</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12: One Year of Distilled Security, Auditor Quality, and Starting Your Own Company</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">288c449c-8ce5-4182-809c-6fe502492dd3</guid>
      <link>https://share.transistor.fm/s/1ca210ed</link>
      <description>
        <![CDATA[<p><strong>Join us as we reflect on:</strong></p><ul><li><strong>One Year of Podcasting</strong>: The crew celebrates a full year of episodes, favorite topics, behind-the-scenes production, and where the show is headed next—including a new studio setup and future sponsors.</li><li><strong>Audit Quality and Risk</strong>: A deep dive into the evolution of cybersecurity audits, the growing influence of low-cost providers, and what actually makes an audit valuable and trustworthy.</li><li><strong>Third-Party Risk Management</strong>: How companies can assess vendor SOC 2 reports, triage risk among their vendors, and build defensible compliance practices.</li><li><strong>Operational vs. Commercial Risk</strong>: The importance of translating audit findings into business impact and strengthening vendor partnerships for long-term resilience.</li><li><strong>Bourbon Review – </strong><a href="https://jeffersonsbourbon.com/whiskeys/jeffersons-tropics-bourbon/"><strong>Jefferson’s Tropics</strong></a>: A tasting of a tropical-aged bourbon matured in Singapore’s climate, featuring notes of toffee and spice.</li><li><strong>BSides Pittsburgh Update</strong>: Details on ticket sales, sponsor opportunities, and how to get involved with the local security community’s flagship event.</li><li><strong>Entrepreneurship &amp; Starting a Business</strong>: A thoughtful discussion on what it really takes to start your own business—when to consider it, how to prepare, and why it’s often more work (and growth) than expected.</li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Join us as we reflect on:</strong></p><ul><li><strong>One Year of Podcasting</strong>: The crew celebrates a full year of episodes, favorite topics, behind-the-scenes production, and where the show is headed next—including a new studio setup and future sponsors.</li><li><strong>Audit Quality and Risk</strong>: A deep dive into the evolution of cybersecurity audits, the growing influence of low-cost providers, and what actually makes an audit valuable and trustworthy.</li><li><strong>Third-Party Risk Management</strong>: How companies can assess vendor SOC 2 reports, triage risk among their vendors, and build defensible compliance practices.</li><li><strong>Operational vs. Commercial Risk</strong>: The importance of translating audit findings into business impact and strengthening vendor partnerships for long-term resilience.</li><li><strong>Bourbon Review – </strong><a href="https://jeffersonsbourbon.com/whiskeys/jeffersons-tropics-bourbon/"><strong>Jefferson’s Tropics</strong></a>: A tasting of a tropical-aged bourbon matured in Singapore’s climate, featuring notes of toffee and spice.</li><li><strong>BSides Pittsburgh Update</strong>: Details on ticket sales, sponsor opportunities, and how to get involved with the local security community’s flagship event.</li><li><strong>Entrepreneurship &amp; Starting a Business</strong>: A thoughtful discussion on what it really takes to start your own business—when to consider it, how to prepare, and why it’s often more work (and growth) than expected.</li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </content:encoded>
      <pubDate>Fri, 02 May 2025 11:06:29 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/1ca210ed/19e2de1f.mp3" length="94265952" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>5890</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Join us as we reflect on:</strong></p><ul><li><strong>One Year of Podcasting</strong>: The crew celebrates a full year of episodes, favorite topics, behind-the-scenes production, and where the show is headed next—including a new studio setup and future sponsors.</li><li><strong>Audit Quality and Risk</strong>: A deep dive into the evolution of cybersecurity audits, the growing influence of low-cost providers, and what actually makes an audit valuable and trustworthy.</li><li><strong>Third-Party Risk Management</strong>: How companies can assess vendor SOC 2 reports, triage risk among their vendors, and build defensible compliance practices.</li><li><strong>Operational vs. Commercial Risk</strong>: The importance of translating audit findings into business impact and strengthening vendor partnerships for long-term resilience.</li><li><strong>Bourbon Review – </strong><a href="https://jeffersonsbourbon.com/whiskeys/jeffersons-tropics-bourbon/"><strong>Jefferson’s Tropics</strong></a>: A tasting of a tropical-aged bourbon matured in Singapore’s climate, featuring notes of toffee and spice.</li><li><strong>BSides Pittsburgh Update</strong>: Details on ticket sales, sponsor opportunities, and how to get involved with the local security community’s flagship event.</li><li><strong>Entrepreneurship &amp; Starting a Business</strong>: A thoughtful discussion on what it really takes to start your own business—when to consider it, how to prepare, and why it’s often more work (and growth) than expected.</li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1ca210ed/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1ca210ed/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1ca210ed/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1ca210ed/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/1ca210ed/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 11: Encrypted Messaging, Data Breaches, and Vulnerability Management</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11: Encrypted Messaging, Data Breaches, and Vulnerability Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">44253fb4-b339-4dee-8254-de1eb2078102</guid>
      <link>https://share.transistor.fm/s/8076fdc0</link>
      <description>
        <![CDATA[<p><strong>Episode 11 of the Distilled Security Podcast is here!</strong></p><p><br><strong>Join us as we cover:</strong></p><ul><li>Signal, Encrypted Messaging, and Corporate Policy: A deep dive into the use of Signal in sensitive discussions—including a political mishap—and the implications for corporate communication policies, discovery, and compliance.</li><li>Oracle Cloud Breach Allegations: Evaluating breach claims, early response tactics, and the value of proactive key and credential rotation.</li><li>DNA Data, 23andMe, and Privacy Concerns: With 23andMe filing for bankruptcy, the team explores risks associated with sharing genetic data and broader privacy implications when personal information changes hands.</li><li>Hospital Data as Business Assets: A surprising look at how some companies are buying bankrupt hospitals—primarily for access to their medical datasets.</li><li>Vulnerability Management in the Real World: Tips on building practical, risk-based vulnerability management programs, understanding scanner severity versus real-world risk, and developing responsive processes that scale.</li></ul><p><strong>Spirits: </strong></p><ul><li>Calumet Farm Small Batch Bourbon Whiskey https://www.calumetbourbon.com/smallbatch</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode 11 of the Distilled Security Podcast is here!</strong></p><p><br><strong>Join us as we cover:</strong></p><ul><li>Signal, Encrypted Messaging, and Corporate Policy: A deep dive into the use of Signal in sensitive discussions—including a political mishap—and the implications for corporate communication policies, discovery, and compliance.</li><li>Oracle Cloud Breach Allegations: Evaluating breach claims, early response tactics, and the value of proactive key and credential rotation.</li><li>DNA Data, 23andMe, and Privacy Concerns: With 23andMe filing for bankruptcy, the team explores risks associated with sharing genetic data and broader privacy implications when personal information changes hands.</li><li>Hospital Data as Business Assets: A surprising look at how some companies are buying bankrupt hospitals—primarily for access to their medical datasets.</li><li>Vulnerability Management in the Real World: Tips on building practical, risk-based vulnerability management programs, understanding scanner severity versus real-world risk, and developing responsive processes that scale.</li></ul><p><strong>Spirits: </strong></p><ul><li>Calumet Farm Small Batch Bourbon Whiskey https://www.calumetbourbon.com/smallbatch</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 14 Apr 2025 09:45:00 -0400</pubDate>
      <author>Justin Leapline,  Rick Yocum and Joe Wynn</author>
      <enclosure url="https://media.transistor.fm/8076fdc0/69235306.mp3" length="86462645" type="audio/mpeg"/>
      <itunes:author>Justin Leapline,  Rick Yocum and Joe Wynn</itunes:author>
      <itunes:duration>5402</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Episode 11 of the Distilled Security Podcast is here!</strong></p><p><br><strong>Join us as we cover:</strong></p><ul><li>Signal, Encrypted Messaging, and Corporate Policy: A deep dive into the use of Signal in sensitive discussions—including a political mishap—and the implications for corporate communication policies, discovery, and compliance.</li><li>Oracle Cloud Breach Allegations: Evaluating breach claims, early response tactics, and the value of proactive key and credential rotation.</li><li>DNA Data, 23andMe, and Privacy Concerns: With 23andMe filing for bankruptcy, the team explores risks associated with sharing genetic data and broader privacy implications when personal information changes hands.</li><li>Hospital Data as Business Assets: A surprising look at how some companies are buying bankrupt hospitals—primarily for access to their medical datasets.</li><li>Vulnerability Management in the Real World: Tips on building practical, risk-based vulnerability management programs, understanding scanner severity versus real-world risk, and developing responsive processes that scale.</li></ul><p><strong>Spirits: </strong></p><ul><li>Calumet Farm Small Batch Bourbon Whiskey https://www.calumetbourbon.com/smallbatch</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>Data Privacy, Encrypted Messaging, Oracle Cloud, Vulnerability Management, Distilled Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/8076fdc0/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8076fdc0/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8076fdc0/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8076fdc0/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/8076fdc0/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 10: Navigating Budget Cuts, Talent Shortages, and Cybersecurity Resilience</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10: Navigating Budget Cuts, Talent Shortages, and Cybersecurity Resilience</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">062c58cd-c5fe-4593-83ce-bda5d0a39ad2</guid>
      <link>https://share.transistor.fm/s/706367f1</link>
      <description>
        <![CDATA[<p>Episode 10 of the Distilled Security Podcast is here!</p><p>Join us as we explore:</p><ul><li>Security in Times of Budget Cuts: How organizations can navigate layoffs and reduced funding while maintaining a strong security posture.</li><li>The Cybersecurity Talent Shortage: Why security hiring remains challenging, the need for apprenticeship models, and how organizations can develop internal talent pipelines.</li><li>BSides Pittsburgh: Put this on your calendar and submit talks.</li><li>Cyber Crisis Readiness: The importance of C-suite participation in tabletop exercises and cyber incident planning.</li></ul><p><strong>References</strong> </p><ul><li>Early Education by David Barton - https://www.youtube.com/watch?v=io-O59eakMk</li><li>BSides Pittsburgh CFP - https://www.bsidespgh.com/cfp</li></ul><p><strong>Spirits:</strong> Lady of the Glen – A 10-year-old cask strength Scotch whisky finished in Oloroso sherry casks.</p><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Episode 10 of the Distilled Security Podcast is here!</p><p>Join us as we explore:</p><ul><li>Security in Times of Budget Cuts: How organizations can navigate layoffs and reduced funding while maintaining a strong security posture.</li><li>The Cybersecurity Talent Shortage: Why security hiring remains challenging, the need for apprenticeship models, and how organizations can develop internal talent pipelines.</li><li>BSides Pittsburgh: Put this on your calendar and submit talks.</li><li>Cyber Crisis Readiness: The importance of C-suite participation in tabletop exercises and cyber incident planning.</li></ul><p><strong>References</strong> </p><ul><li>Early Education by David Barton - https://www.youtube.com/watch?v=io-O59eakMk</li><li>BSides Pittsburgh CFP - https://www.bsidespgh.com/cfp</li></ul><p><strong>Spirits:</strong> Lady of the Glen – A 10-year-old cask strength Scotch whisky finished in Oloroso sherry casks.</p><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Mar 2025 10:08:32 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/706367f1/96e6f0ad.mp3" length="90657291" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>5664</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Episode 10 of the Distilled Security Podcast is here!</p><p>Join us as we explore:</p><ul><li>Security in Times of Budget Cuts: How organizations can navigate layoffs and reduced funding while maintaining a strong security posture.</li><li>The Cybersecurity Talent Shortage: Why security hiring remains challenging, the need for apprenticeship models, and how organizations can develop internal talent pipelines.</li><li>BSides Pittsburgh: Put this on your calendar and submit talks.</li><li>Cyber Crisis Readiness: The importance of C-suite participation in tabletop exercises and cyber incident planning.</li></ul><p><strong>References</strong> </p><ul><li>Early Education by David Barton - https://www.youtube.com/watch?v=io-O59eakMk</li><li>BSides Pittsburgh CFP - https://www.bsidespgh.com/cfp</li></ul><p><strong>Spirits:</strong> Lady of the Glen – A 10-year-old cask strength Scotch whisky finished in Oloroso sherry casks.</p><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/706367f1/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/706367f1/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/706367f1/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/706367f1/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/706367f1/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 9: Security Budgets, AI Risks, and Data Sovereignty</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Episode 9: Security Budgets, AI Risks, and Data Sovereignty</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6a7720b-5bcc-4839-bf28-4aefa4cfa308</guid>
      <link>https://share.transistor.fm/s/92dad8b8</link>
      <description>
        <![CDATA[<p><br><strong><em>Episode 9</em></strong><strong> of the Distilled Security Podcast is here!</strong></p><p><strong>Join us as we explore:</strong></p><ul><li>Security on a Budget: How teams can optimize tools, manage resource constraints, and build an effective security strategy with limited funding.</li><li>AI and Efficiency: The impact of AI on job performance, along with the risks of AI-powered note-taking and data classification.</li><li>Data Breaches &amp; Industry Challenges: Lessons from Marriott’s data breaches, security concerns in the hospitality industry, and evolving consumer protection mandates.</li><li>Regulatory Shifts &amp; Compliance: A discussion on HIPAA’s 2023 overhaul, required vs. addressable regulations, and the role of dual audits in compliance assurance.</li><li>Data Sovereignty &amp; Government Oversight: How security teams navigate data sovereignty risks, government requests for information, and evolving security standards.</li><li>Multi-Factor Authentication &amp; Risk Mitigation: The importance of MFA and its role in strengthening security posture is increasing.</li></ul><p><strong>Spirits</strong></p><ul><li><a href="https://www.rabbitholedistillery.com/pages/single-barrel-release">Heigold Single Barrel Cask Strength </a>https://www.rabbitholedistillery.com/pages/single-barrel-release</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>References</strong></p><p>2025 HIPAA Security Rule Guide and Compliance Checklist // https://www.seisollc.com/insights/2025-hipaa-rule-guide</p><p><br><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br><strong><em>Episode 9</em></strong><strong> of the Distilled Security Podcast is here!</strong></p><p><strong>Join us as we explore:</strong></p><ul><li>Security on a Budget: How teams can optimize tools, manage resource constraints, and build an effective security strategy with limited funding.</li><li>AI and Efficiency: The impact of AI on job performance, along with the risks of AI-powered note-taking and data classification.</li><li>Data Breaches &amp; Industry Challenges: Lessons from Marriott’s data breaches, security concerns in the hospitality industry, and evolving consumer protection mandates.</li><li>Regulatory Shifts &amp; Compliance: A discussion on HIPAA’s 2023 overhaul, required vs. addressable regulations, and the role of dual audits in compliance assurance.</li><li>Data Sovereignty &amp; Government Oversight: How security teams navigate data sovereignty risks, government requests for information, and evolving security standards.</li><li>Multi-Factor Authentication &amp; Risk Mitigation: The importance of MFA and its role in strengthening security posture is increasing.</li></ul><p><strong>Spirits</strong></p><ul><li><a href="https://www.rabbitholedistillery.com/pages/single-barrel-release">Heigold Single Barrel Cask Strength </a>https://www.rabbitholedistillery.com/pages/single-barrel-release</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>References</strong></p><p>2025 HIPAA Security Rule Guide and Compliance Checklist // https://www.seisollc.com/insights/2025-hipaa-rule-guide</p><p><br><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 06 Feb 2025 08:58:00 -0500</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/92dad8b8/4a70e764.mp3" length="75075330" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>4690</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br><strong><em>Episode 9</em></strong><strong> of the Distilled Security Podcast is here!</strong></p><p><strong>Join us as we explore:</strong></p><ul><li>Security on a Budget: How teams can optimize tools, manage resource constraints, and build an effective security strategy with limited funding.</li><li>AI and Efficiency: The impact of AI on job performance, along with the risks of AI-powered note-taking and data classification.</li><li>Data Breaches &amp; Industry Challenges: Lessons from Marriott’s data breaches, security concerns in the hospitality industry, and evolving consumer protection mandates.</li><li>Regulatory Shifts &amp; Compliance: A discussion on HIPAA’s 2023 overhaul, required vs. addressable regulations, and the role of dual audits in compliance assurance.</li><li>Data Sovereignty &amp; Government Oversight: How security teams navigate data sovereignty risks, government requests for information, and evolving security standards.</li><li>Multi-Factor Authentication &amp; Risk Mitigation: The importance of MFA and its role in strengthening security posture is increasing.</li></ul><p><strong>Spirits</strong></p><ul><li><a href="https://www.rabbitholedistillery.com/pages/single-barrel-release">Heigold Single Barrel Cask Strength </a>https://www.rabbitholedistillery.com/pages/single-barrel-release</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>References</strong></p><p>2025 HIPAA Security Rule Guide and Compliance Checklist // https://www.seisollc.com/insights/2025-hipaa-rule-guide</p><p><br><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/92dad8b8/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/92dad8b8/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/92dad8b8/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/92dad8b8/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/92dad8b8/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 8: Whiskey, Quantum Computing, and Executive Protection</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8: Whiskey, Quantum Computing, and Executive Protection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">398893b4-dcd3-4473-98a1-97800586bf36</guid>
      <link>https://share.transistor.fm/s/a9ba5dad</link>
      <description>
        <![CDATA[<p><br>🎙️ Episode 8 of the Distilled Security Podcast is here! 🔐🥃</p><p>🔎 Join us as we explore:</p><ul><li><strong>The Whiskey Rebellion and Craft Distilling</strong>: A dive into the history of the Whiskey Rebellion and what it means for today’s distillers. Learn about Iron City Distilling, creating national brand-quality spirits, and the significance of the Bessemer brand name.</li><li><strong>Whiskey Craftsmanship</strong>: Insights into chamber still distillation, the balance of maturation versus aging, and premium craft whiskey production.</li><li><strong>Executive Protection and Privacy</strong>: Strategies for workplace safety, reducing online risks, and managing personal branding in crises.</li><li><strong>Quantum Computing Risks</strong>: A look at Google's Willow chip, the implications of quantum computing on cybersecurity, and the need for post-quantum cryptographic protocols.</li><li><strong>Modern Password Challenges</strong>: Discussing the future of passwordless login, phishing risks, dark web breaches, and the evolving standards of password compliance.<p></p></li></ul><p>🌟 <strong>Spirit: </strong>Iron City Distilling Distillers Reserve – A 6-Year Craft Masterpiece!</p><p><strong>🎙️ Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn<br></a><br></li></ul><p>🤝 <strong>Guest</strong></p><ul><li>Eddie Kubit -<a href="https://www.linkedin.com/in/eddie-kubit-28122b3/"> LinkedIn </a></li></ul><p><br></p><p><strong>📲 Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul><p>🕐 Time Stamps</p><p>[00:00:00] Introduction<br>[00:00:09] Eddie’s Career Transition<br>[00:03:00] Whiskey Rebellion and Craft Distilling<br>[00:06:00] Joining Iron City Distilling<br>[00:10:00] Unique Approach at Iron City Distilling<br>[00:19:00] Traditional Whiskey Making Process<br>[00:28:30] Executive Protection and Privacy<br>[00:39:00] Practical Security Measures for Executives<br>[00:50:00] Google’s Quantum Computing and Cybersecurity Risks<br>[00:57:00] Post-Quantum Cryptography<br>[01:06:00] Modern Password Practices<br>[01:20:00] Closing Thoughts</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>🎙️ Episode 8 of the Distilled Security Podcast is here! 🔐🥃</p><p>🔎 Join us as we explore:</p><ul><li><strong>The Whiskey Rebellion and Craft Distilling</strong>: A dive into the history of the Whiskey Rebellion and what it means for today’s distillers. Learn about Iron City Distilling, creating national brand-quality spirits, and the significance of the Bessemer brand name.</li><li><strong>Whiskey Craftsmanship</strong>: Insights into chamber still distillation, the balance of maturation versus aging, and premium craft whiskey production.</li><li><strong>Executive Protection and Privacy</strong>: Strategies for workplace safety, reducing online risks, and managing personal branding in crises.</li><li><strong>Quantum Computing Risks</strong>: A look at Google's Willow chip, the implications of quantum computing on cybersecurity, and the need for post-quantum cryptographic protocols.</li><li><strong>Modern Password Challenges</strong>: Discussing the future of passwordless login, phishing risks, dark web breaches, and the evolving standards of password compliance.<p></p></li></ul><p>🌟 <strong>Spirit: </strong>Iron City Distilling Distillers Reserve – A 6-Year Craft Masterpiece!</p><p><strong>🎙️ Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn<br></a><br></li></ul><p>🤝 <strong>Guest</strong></p><ul><li>Eddie Kubit -<a href="https://www.linkedin.com/in/eddie-kubit-28122b3/"> LinkedIn </a></li></ul><p><br></p><p><strong>📲 Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul><p>🕐 Time Stamps</p><p>[00:00:00] Introduction<br>[00:00:09] Eddie’s Career Transition<br>[00:03:00] Whiskey Rebellion and Craft Distilling<br>[00:06:00] Joining Iron City Distilling<br>[00:10:00] Unique Approach at Iron City Distilling<br>[00:19:00] Traditional Whiskey Making Process<br>[00:28:30] Executive Protection and Privacy<br>[00:39:00] Practical Security Measures for Executives<br>[00:50:00] Google’s Quantum Computing and Cybersecurity Risks<br>[00:57:00] Post-Quantum Cryptography<br>[01:06:00] Modern Password Practices<br>[01:20:00] Closing Thoughts</p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Jan 2025 10:16:50 -0500</pubDate>
      <author>Justin Leapline,Joe Wynn,Rick Yocum and Eddie Kubit </author>
      <enclosure url="https://media.transistor.fm/a9ba5dad/2c8b7551.mp3" length="78334161" type="audio/mpeg"/>
      <itunes:author>Justin Leapline,Joe Wynn,Rick Yocum and Eddie Kubit </itunes:author>
      <itunes:duration>4894</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>🎙️ Episode 8 of the Distilled Security Podcast is here! 🔐🥃</p><p>🔎 Join us as we explore:</p><ul><li><strong>The Whiskey Rebellion and Craft Distilling</strong>: A dive into the history of the Whiskey Rebellion and what it means for today’s distillers. Learn about Iron City Distilling, creating national brand-quality spirits, and the significance of the Bessemer brand name.</li><li><strong>Whiskey Craftsmanship</strong>: Insights into chamber still distillation, the balance of maturation versus aging, and premium craft whiskey production.</li><li><strong>Executive Protection and Privacy</strong>: Strategies for workplace safety, reducing online risks, and managing personal branding in crises.</li><li><strong>Quantum Computing Risks</strong>: A look at Google's Willow chip, the implications of quantum computing on cybersecurity, and the need for post-quantum cryptographic protocols.</li><li><strong>Modern Password Challenges</strong>: Discussing the future of passwordless login, phishing risks, dark web breaches, and the evolving standards of password compliance.<p></p></li></ul><p>🌟 <strong>Spirit: </strong>Iron City Distilling Distillers Reserve – A 6-Year Craft Masterpiece!</p><p><strong>🎙️ Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn<br></a><br></li></ul><p>🤝 <strong>Guest</strong></p><ul><li>Eddie Kubit -<a href="https://www.linkedin.com/in/eddie-kubit-28122b3/"> LinkedIn </a></li></ul><p><br></p><p><strong>📲 Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul><p>🕐 Time Stamps</p><p>[00:00:00] Introduction<br>[00:00:09] Eddie’s Career Transition<br>[00:03:00] Whiskey Rebellion and Craft Distilling<br>[00:06:00] Joining Iron City Distilling<br>[00:10:00] Unique Approach at Iron City Distilling<br>[00:19:00] Traditional Whiskey Making Process<br>[00:28:30] Executive Protection and Privacy<br>[00:39:00] Practical Security Measures for Executives<br>[00:50:00] Google’s Quantum Computing and Cybersecurity Risks<br>[00:57:00] Post-Quantum Cryptography<br>[01:06:00] Modern Password Practices<br>[01:20:00] Closing Thoughts</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity Trends, Quantum Computing Risks, Craft Whiskey Production, Executive Protection, Passwordless, Login Whiskey Rebellion </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:person role="Guest" href="https://distilledsecuritypodcast.com/people/eddie-kubit" img="https://img.transistorcdn.com/m0wh-4ZWjIkigW0EaWP1f_Eziw9lUByoRhUJ20fM6m4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZmM4/ZjAwMjBmODg2ODM2/MGEzMmM5NWVkYmJh/NmMyMy5wbmc.jpg">Eddie Kubit  </podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/a9ba5dad/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a9ba5dad/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a9ba5dad/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a9ba5dad/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/a9ba5dad/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 7: Certifications, Mentorship, and Auditor Missteps</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7: Certifications, Mentorship, and Auditor Missteps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dc6a6544-304f-4f45-b38b-1575be41c3dd</guid>
      <link>https://share.transistor.fm/s/318c010a</link>
      <description>
        <![CDATA[<p><strong>Welcome to Episode 7 of the Distilled Security Podcast!<br></strong><br></p><p>In this episode, hosts Justin, Rick, and Joe are joined by special guest Brandon Eckert to explore his fascinating journey in cybersecurity, share industry insights, and enjoy a fun debate on Thanksgiving favorites. Here’s what’s in store:</p><p><strong>Topics Covered: <br></strong><br></p><p>🔹 <strong>Navigating a Career in Cybersecurity</strong><br>Reflections on starting out in cybersecurity, overcoming challenges in small-town IT careers, and the role of certifications in shaping career success.</p><p>🔹 <strong>The Value of Certifications</strong><br>How certifications like OSCP contribute to career growth, practical knowledge, and their relationship with networking and formal education.</p><p>🔹 <strong>Mentorship and the Pittsburgh Cybersecurity Community</strong><br>The importance of fostering growth, mentoring local talent, and giving back to the Pittsburgh security community.</p><p>🔹 <strong>Networking vs. Certifications</strong><br>A discussion on what matters more for career advancement and the unique benefits of each.</p><p>🔹 <strong>Auditor Stories and Lessons Learned</strong><br>Hear hilarious and insightful tales from hospital audits, ethical dilemmas, and tips for managing challenging auditor experiences.</p><p>🔹 <strong>Business Continuity Challenges</strong><br>How organizations can prepare for rare but impactful events, like solar flares, while building strong auditor relationships.</p><p>🔹 <strong>Thanksgiving Favorites</strong><br>A lighthearted wrap-up featuring turkey tips, stuffing recipes, and the ultimate leftover turkey sandwich.</p><p>🔸 Links<br>Widow Jane Black Opal: https://widowjane.com/</p><p>🔸 Spirits<br><strong>Widow Jane Black Opal</strong><br>A rare blend of bourbons, each aged for at least 20 years and finished in Japanese Mizunara oak. Notes of toffee, plum, and tobacco make this whiskey an extraordinary treat.</p><p>🔸Hosts</p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline</a> </li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn</a></li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum</a></li></ul><p>🔸 Guest<br>🙋🏻‍♂️ <a href="https://www.linkedin.com/in/brandon-eckert/">Brandon Eckert </a></p><p>🎙 Connect with Us<br>Website: <a href="https://distilledsecuritypodcast.com/">Distilled Security Podcast</a><br> X: <a href="https://x.com/DisSecPod">@DisSecPod</a><br>Email: hello@distilledsecuritypodcast.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Welcome to Episode 7 of the Distilled Security Podcast!<br></strong><br></p><p>In this episode, hosts Justin, Rick, and Joe are joined by special guest Brandon Eckert to explore his fascinating journey in cybersecurity, share industry insights, and enjoy a fun debate on Thanksgiving favorites. Here’s what’s in store:</p><p><strong>Topics Covered: <br></strong><br></p><p>🔹 <strong>Navigating a Career in Cybersecurity</strong><br>Reflections on starting out in cybersecurity, overcoming challenges in small-town IT careers, and the role of certifications in shaping career success.</p><p>🔹 <strong>The Value of Certifications</strong><br>How certifications like OSCP contribute to career growth, practical knowledge, and their relationship with networking and formal education.</p><p>🔹 <strong>Mentorship and the Pittsburgh Cybersecurity Community</strong><br>The importance of fostering growth, mentoring local talent, and giving back to the Pittsburgh security community.</p><p>🔹 <strong>Networking vs. Certifications</strong><br>A discussion on what matters more for career advancement and the unique benefits of each.</p><p>🔹 <strong>Auditor Stories and Lessons Learned</strong><br>Hear hilarious and insightful tales from hospital audits, ethical dilemmas, and tips for managing challenging auditor experiences.</p><p>🔹 <strong>Business Continuity Challenges</strong><br>How organizations can prepare for rare but impactful events, like solar flares, while building strong auditor relationships.</p><p>🔹 <strong>Thanksgiving Favorites</strong><br>A lighthearted wrap-up featuring turkey tips, stuffing recipes, and the ultimate leftover turkey sandwich.</p><p>🔸 Links<br>Widow Jane Black Opal: https://widowjane.com/</p><p>🔸 Spirits<br><strong>Widow Jane Black Opal</strong><br>A rare blend of bourbons, each aged for at least 20 years and finished in Japanese Mizunara oak. Notes of toffee, plum, and tobacco make this whiskey an extraordinary treat.</p><p>🔸Hosts</p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline</a> </li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn</a></li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum</a></li></ul><p>🔸 Guest<br>🙋🏻‍♂️ <a href="https://www.linkedin.com/in/brandon-eckert/">Brandon Eckert </a></p><p>🎙 Connect with Us<br>Website: <a href="https://distilledsecuritypodcast.com/">Distilled Security Podcast</a><br> X: <a href="https://x.com/DisSecPod">@DisSecPod</a><br>Email: hello@distilledsecuritypodcast.com</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Dec 2024 18:01:06 -0500</pubDate>
      <author>Justin Leapline, Joe Wynn, Rick Yocum and Brandon Eckert</author>
      <enclosure url="https://media.transistor.fm/318c010a/8a52a479.mp3" length="75715165" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, Rick Yocum and Brandon Eckert</itunes:author>
      <itunes:duration>4730</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Welcome to Episode 7 of the Distilled Security Podcast!<br></strong><br></p><p>In this episode, hosts Justin, Rick, and Joe are joined by special guest Brandon Eckert to explore his fascinating journey in cybersecurity, share industry insights, and enjoy a fun debate on Thanksgiving favorites. Here’s what’s in store:</p><p><strong>Topics Covered: <br></strong><br></p><p>🔹 <strong>Navigating a Career in Cybersecurity</strong><br>Reflections on starting out in cybersecurity, overcoming challenges in small-town IT careers, and the role of certifications in shaping career success.</p><p>🔹 <strong>The Value of Certifications</strong><br>How certifications like OSCP contribute to career growth, practical knowledge, and their relationship with networking and formal education.</p><p>🔹 <strong>Mentorship and the Pittsburgh Cybersecurity Community</strong><br>The importance of fostering growth, mentoring local talent, and giving back to the Pittsburgh security community.</p><p>🔹 <strong>Networking vs. Certifications</strong><br>A discussion on what matters more for career advancement and the unique benefits of each.</p><p>🔹 <strong>Auditor Stories and Lessons Learned</strong><br>Hear hilarious and insightful tales from hospital audits, ethical dilemmas, and tips for managing challenging auditor experiences.</p><p>🔹 <strong>Business Continuity Challenges</strong><br>How organizations can prepare for rare but impactful events, like solar flares, while building strong auditor relationships.</p><p>🔹 <strong>Thanksgiving Favorites</strong><br>A lighthearted wrap-up featuring turkey tips, stuffing recipes, and the ultimate leftover turkey sandwich.</p><p>🔸 Links<br>Widow Jane Black Opal: https://widowjane.com/</p><p>🔸 Spirits<br><strong>Widow Jane Black Opal</strong><br>A rare blend of bourbons, each aged for at least 20 years and finished in Japanese Mizunara oak. Notes of toffee, plum, and tobacco make this whiskey an extraordinary treat.</p><p>🔸Hosts</p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline</a> </li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn</a></li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum</a></li></ul><p>🔸 Guest<br>🙋🏻‍♂️ <a href="https://www.linkedin.com/in/brandon-eckert/">Brandon Eckert </a></p><p>🎙 Connect with Us<br>Website: <a href="https://distilledsecuritypodcast.com/">Distilled Security Podcast</a><br> X: <a href="https://x.com/DisSecPod">@DisSecPod</a><br>Email: hello@distilledsecuritypodcast.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity Career,  IT to Cybersecurity, OSCP Journey, Pittsburgh Cybersecurity, Community Cybersecurity Certifications,  Penetration Testing</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:person role="Guest" href="https://distilledsecuritypodcast.com/people/brandon-eckert" img="https://img.transistorcdn.com/0XPCSiBJRLqe3gme3sCKXTJ7YgoRfoxQ6uVje9YTF6k/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMTY5/NDA2Mzk2ZWIxNDVi/MzM0MGYyNTU4OTUy/YTRkZC5wbmc.jpg">Brandon Eckert</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/318c010a/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/318c010a/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/318c010a/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/318c010a/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/318c010a/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 6: SEC Penalties, M&amp;A Security, and Due Diligence</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6: SEC Penalties, M&amp;A Security, and Due Diligence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5489d224-da2c-4865-8273-542435baf3b0</guid>
      <link>https://share.transistor.fm/s/9a773fb0</link>
      <description>
        <![CDATA[<p><strong>Episode 6: SEC Penalties, M&amp;A Security, and Due Diligence</strong></p><p><br>Welcome back to the <em>Distilled Security Podcast</em>! In this episode, hosts Justin, Rick, and Joe dive into the latest in cybersecurity, from regulatory challenges to pop culture:</p><p>Topics Covered</p><ol><li><strong>SEC Penalties for Cybersecurity Disclosures</strong><br>Discussing recent SEC penalties due to lapses in cybersecurity disclosure, the implications for companies, and how organizations can stay compliant.</li><li><strong>Cybersecurity Materiality and Disclosure Practices</strong><br>Tips on navigating the materiality assessment of cybersecurity incidents and ensuring compliance with auditors' disclosure requirements.</li><li><strong>Preparedness Through Tabletop Exercises</strong><br>Exploring tabletop exercises as a method to enhance readiness for cybersecurity disclosures.</li><li><strong>Security in Mergers &amp; Acquisitions</strong><br>The importance of aligning security philosophies, protecting supply chain integrity, and fast decision-making in M&amp;A processes.</li><li><strong>Pre-Mortem Analyses for Risk Mitigation</strong><br>Utilizing pre-mortem analyses to identify risks in acquisitions and ensure security compatibility before a merger.</li><li><strong>Best Practices for Selling a Company with Strong Security</strong><br>Tips on audit readiness, maintaining a secure posture, and what security leaders should prioritize to avoid penalties or discounts during acquisitions.</li><li><strong>Information Control in Modern Warfare</strong><br>How controlling information plays a strategic role, with examples from cyberpunk themes to illustrate the power of data control.</li><li><strong>Favorite Cybersecurity Movies</strong><br>A fun review of iconic cybersecurity movies, highlighting elements like data movement, IP address inaccuracies, and common movie hacking tropes.</li><li><strong>Due Diligence Strategies for Small Businesses</strong><br>Key steps for conducting effective due diligence, including using a risk-based approach to compliance and managing contracts efficiently.</li></ol><p><strong>Links</strong></p><ul><li><a href="https://cyberscoop.com/"><strong>Cyber Scoop</strong></a></li></ul><p><strong>Spirits</strong></p><ul><li><strong>Barrell Seagrass</strong> - A unique blend of American and Canadian rye whiskeys, each carefully selected and finished in Martinique Rhum, Madeira, and apricot brandy barrels.</li></ul><p><strong>Hosts</strong></p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline</a></li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn </a></li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum </a></li></ul><p><strong>Connect with Us</strong></p><ul><li><strong>Website:</strong> Distilled Security Podcast</li><li><strong>Twitter:</strong><a href="https://x.com/DisSecPod"> @DisSecPod</a></li><li><strong>Email:</strong> hello@distilledsecuritypodcast.com</li></ul><p><strong>Time Stamps</strong></p><ul><li>[00:01:25] SEC penalties for cybersecurity disclosure lapses</li><li>[00:05:16] Working with external auditors on cybersecurity disclosures</li><li>[00:09:30] Assessing cybersecurity materiality in disclosures</li><li>[00:11:45] Tabletop exercises to improve disclosure preparedness</li><li>[00:14:36] Cybersecurity considerations in M&amp;A</li><li>[00:19:12] Making fast, informed security decisions</li><li>[00:23:06] Pre-mortems for assessing acquisition risks</li><li>[00:25:12] Compatibility of security philosophies in M&amp;A</li><li>[00:30:20] Securing supply chains in acquisitions</li><li>[00:34:23] Steps to sell a company securely</li><li>[00:37:06] Preparing for audits in the sale process</li><li>[00:42:07] Hosts discuss favorite cybersecurity movies</li><li>[00:45:57] The strategic role of information in warfare</li><li>[00:48:49] Data transport themes in cyberpunk films</li><li>[00:52:36] The infamous fake IP addresses in movies</li><li>[00:56:01] Due diligence for small businesses and startups</li><li>[01:00:47] Centralized vs. decentralized security strategies</li><li>[01:02:20] Adopting a risk-based approach for security questionnaires</li><li>[01:06:05] Negotiating buyer risk assessments</li><li>[01:10:11] Leveraging compliance automation tools</li><li>[01:12:55] Managing contract risks effectively</li><li>[01:16:10] Ensuring alignment between contract terms and security questionnaires</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode 6: SEC Penalties, M&amp;A Security, and Due Diligence</strong></p><p><br>Welcome back to the <em>Distilled Security Podcast</em>! In this episode, hosts Justin, Rick, and Joe dive into the latest in cybersecurity, from regulatory challenges to pop culture:</p><p>Topics Covered</p><ol><li><strong>SEC Penalties for Cybersecurity Disclosures</strong><br>Discussing recent SEC penalties due to lapses in cybersecurity disclosure, the implications for companies, and how organizations can stay compliant.</li><li><strong>Cybersecurity Materiality and Disclosure Practices</strong><br>Tips on navigating the materiality assessment of cybersecurity incidents and ensuring compliance with auditors' disclosure requirements.</li><li><strong>Preparedness Through Tabletop Exercises</strong><br>Exploring tabletop exercises as a method to enhance readiness for cybersecurity disclosures.</li><li><strong>Security in Mergers &amp; Acquisitions</strong><br>The importance of aligning security philosophies, protecting supply chain integrity, and fast decision-making in M&amp;A processes.</li><li><strong>Pre-Mortem Analyses for Risk Mitigation</strong><br>Utilizing pre-mortem analyses to identify risks in acquisitions and ensure security compatibility before a merger.</li><li><strong>Best Practices for Selling a Company with Strong Security</strong><br>Tips on audit readiness, maintaining a secure posture, and what security leaders should prioritize to avoid penalties or discounts during acquisitions.</li><li><strong>Information Control in Modern Warfare</strong><br>How controlling information plays a strategic role, with examples from cyberpunk themes to illustrate the power of data control.</li><li><strong>Favorite Cybersecurity Movies</strong><br>A fun review of iconic cybersecurity movies, highlighting elements like data movement, IP address inaccuracies, and common movie hacking tropes.</li><li><strong>Due Diligence Strategies for Small Businesses</strong><br>Key steps for conducting effective due diligence, including using a risk-based approach to compliance and managing contracts efficiently.</li></ol><p><strong>Links</strong></p><ul><li><a href="https://cyberscoop.com/"><strong>Cyber Scoop</strong></a></li></ul><p><strong>Spirits</strong></p><ul><li><strong>Barrell Seagrass</strong> - A unique blend of American and Canadian rye whiskeys, each carefully selected and finished in Martinique Rhum, Madeira, and apricot brandy barrels.</li></ul><p><strong>Hosts</strong></p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline</a></li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn </a></li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum </a></li></ul><p><strong>Connect with Us</strong></p><ul><li><strong>Website:</strong> Distilled Security Podcast</li><li><strong>Twitter:</strong><a href="https://x.com/DisSecPod"> @DisSecPod</a></li><li><strong>Email:</strong> hello@distilledsecuritypodcast.com</li></ul><p><strong>Time Stamps</strong></p><ul><li>[00:01:25] SEC penalties for cybersecurity disclosure lapses</li><li>[00:05:16] Working with external auditors on cybersecurity disclosures</li><li>[00:09:30] Assessing cybersecurity materiality in disclosures</li><li>[00:11:45] Tabletop exercises to improve disclosure preparedness</li><li>[00:14:36] Cybersecurity considerations in M&amp;A</li><li>[00:19:12] Making fast, informed security decisions</li><li>[00:23:06] Pre-mortems for assessing acquisition risks</li><li>[00:25:12] Compatibility of security philosophies in M&amp;A</li><li>[00:30:20] Securing supply chains in acquisitions</li><li>[00:34:23] Steps to sell a company securely</li><li>[00:37:06] Preparing for audits in the sale process</li><li>[00:42:07] Hosts discuss favorite cybersecurity movies</li><li>[00:45:57] The strategic role of information in warfare</li><li>[00:48:49] Data transport themes in cyberpunk films</li><li>[00:52:36] The infamous fake IP addresses in movies</li><li>[00:56:01] Due diligence for small businesses and startups</li><li>[01:00:47] Centralized vs. decentralized security strategies</li><li>[01:02:20] Adopting a risk-based approach for security questionnaires</li><li>[01:06:05] Negotiating buyer risk assessments</li><li>[01:10:11] Leveraging compliance automation tools</li><li>[01:12:55] Managing contract risks effectively</li><li>[01:16:10] Ensuring alignment between contract terms and security questionnaires</li></ul>]]>
      </content:encoded>
      <pubDate>Fri, 08 Nov 2024 09:56:32 -0500</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/9a773fb0/dcd979c5.mp3" length="74276965" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>4641</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Episode 6: SEC Penalties, M&amp;A Security, and Due Diligence</strong></p><p><br>Welcome back to the <em>Distilled Security Podcast</em>! In this episode, hosts Justin, Rick, and Joe dive into the latest in cybersecurity, from regulatory challenges to pop culture:</p><p>Topics Covered</p><ol><li><strong>SEC Penalties for Cybersecurity Disclosures</strong><br>Discussing recent SEC penalties due to lapses in cybersecurity disclosure, the implications for companies, and how organizations can stay compliant.</li><li><strong>Cybersecurity Materiality and Disclosure Practices</strong><br>Tips on navigating the materiality assessment of cybersecurity incidents and ensuring compliance with auditors' disclosure requirements.</li><li><strong>Preparedness Through Tabletop Exercises</strong><br>Exploring tabletop exercises as a method to enhance readiness for cybersecurity disclosures.</li><li><strong>Security in Mergers &amp; Acquisitions</strong><br>The importance of aligning security philosophies, protecting supply chain integrity, and fast decision-making in M&amp;A processes.</li><li><strong>Pre-Mortem Analyses for Risk Mitigation</strong><br>Utilizing pre-mortem analyses to identify risks in acquisitions and ensure security compatibility before a merger.</li><li><strong>Best Practices for Selling a Company with Strong Security</strong><br>Tips on audit readiness, maintaining a secure posture, and what security leaders should prioritize to avoid penalties or discounts during acquisitions.</li><li><strong>Information Control in Modern Warfare</strong><br>How controlling information plays a strategic role, with examples from cyberpunk themes to illustrate the power of data control.</li><li><strong>Favorite Cybersecurity Movies</strong><br>A fun review of iconic cybersecurity movies, highlighting elements like data movement, IP address inaccuracies, and common movie hacking tropes.</li><li><strong>Due Diligence Strategies for Small Businesses</strong><br>Key steps for conducting effective due diligence, including using a risk-based approach to compliance and managing contracts efficiently.</li></ol><p><strong>Links</strong></p><ul><li><a href="https://cyberscoop.com/"><strong>Cyber Scoop</strong></a></li></ul><p><strong>Spirits</strong></p><ul><li><strong>Barrell Seagrass</strong> - A unique blend of American and Canadian rye whiskeys, each carefully selected and finished in Martinique Rhum, Madeira, and apricot brandy barrels.</li></ul><p><strong>Hosts</strong></p><ul><li><a href="https://www.linkedin.com/in/justinleapline/">Justin Leapline</a></li><li><a href="https://www.linkedin.com/in/wynnjoe/">Joe Wynn </a></li><li><a href="https://www.linkedin.com/in/rickyocum/">Rick Yocum </a></li></ul><p><strong>Connect with Us</strong></p><ul><li><strong>Website:</strong> Distilled Security Podcast</li><li><strong>Twitter:</strong><a href="https://x.com/DisSecPod"> @DisSecPod</a></li><li><strong>Email:</strong> hello@distilledsecuritypodcast.com</li></ul><p><strong>Time Stamps</strong></p><ul><li>[00:01:25] SEC penalties for cybersecurity disclosure lapses</li><li>[00:05:16] Working with external auditors on cybersecurity disclosures</li><li>[00:09:30] Assessing cybersecurity materiality in disclosures</li><li>[00:11:45] Tabletop exercises to improve disclosure preparedness</li><li>[00:14:36] Cybersecurity considerations in M&amp;A</li><li>[00:19:12] Making fast, informed security decisions</li><li>[00:23:06] Pre-mortems for assessing acquisition risks</li><li>[00:25:12] Compatibility of security philosophies in M&amp;A</li><li>[00:30:20] Securing supply chains in acquisitions</li><li>[00:34:23] Steps to sell a company securely</li><li>[00:37:06] Preparing for audits in the sale process</li><li>[00:42:07] Hosts discuss favorite cybersecurity movies</li><li>[00:45:57] The strategic role of information in warfare</li><li>[00:48:49] Data transport themes in cyberpunk films</li><li>[00:52:36] The infamous fake IP addresses in movies</li><li>[00:56:01] Due diligence for small businesses and startups</li><li>[01:00:47] Centralized vs. decentralized security strategies</li><li>[01:02:20] Adopting a risk-based approach for security questionnaires</li><li>[01:06:05] Negotiating buyer risk assessments</li><li>[01:10:11] Leveraging compliance automation tools</li><li>[01:12:55] Managing contract risks effectively</li><li>[01:16:10] Ensuring alignment between contract terms and security questionnaires</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9a773fb0/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9a773fb0/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9a773fb0/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9a773fb0/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/9a773fb0/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 5: Resume Reviews, Counter-Espionage, and Incident Response</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5: Resume Reviews, Counter-Espionage, and Incident Response</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c0e394bd-00bf-414a-b9a7-cb666bad576c</guid>
      <link>https://share.transistor.fm/s/1fdca557</link>
      <description>
        <![CDATA[<p>Join hosts Justin, Rick, and Joe as they cover:</p><ul><li><strong>Resume Review Insights:</strong> Joe offers valuable tips on resume writing, focusing on showcasing accomplishments and using metrics to stand out.</li><li><strong>Passion Projects and Hobbies:</strong> The team discusses how personal projects and volunteer work can make resumes more compelling by demonstrating a passion for the field.</li><li><strong>Community Engagement at TRISS</strong>: The hosts invite listeners to their booth at the upcoming Three Rivers Information Security Symposium (TRISS), where they will be offering resume reviews and engaging with attendees.</li><li><strong>Counter-Espionage and Pagers</strong>: A fascinating look at the use of pagers in recent counter-espionage operations, analyzing their effectiveness and ethical concerns.</li><li><strong>Supply Chain Security Concerns:</strong> A discussion on the risks tied to supply chain vulnerabilities, focusing on hardware inspections.</li><li><strong>Tabletop Exercises in Cybersecurity</strong>: The hosts highlight the importance of tabletop exercises to prepare organizations for security incidents, contrasting them with current trends in incident response training.</li><li><strong>School Violence Threats:</strong> An examination of the rise in school violence threats and the challenges schools face in managing these situations.</li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.threeriversinfosec.com/">Three Rivers Information Security Symposium (TRISS)</a></li><li><a href="https://www.dhs.gov/sites/default/files/2024-09/2024aepphasellusmaritimetradeandportcybersecurity.pdf">US Maritime Trade and Port Cybersecurity</a></li></ul><p><strong>Spirits</strong></p><ul><li>Boone 1833 12-Year-Old, Snyder's Flask (discontinued) - https://boonedistilling.com/</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join hosts Justin, Rick, and Joe as they cover:</p><ul><li><strong>Resume Review Insights:</strong> Joe offers valuable tips on resume writing, focusing on showcasing accomplishments and using metrics to stand out.</li><li><strong>Passion Projects and Hobbies:</strong> The team discusses how personal projects and volunteer work can make resumes more compelling by demonstrating a passion for the field.</li><li><strong>Community Engagement at TRISS</strong>: The hosts invite listeners to their booth at the upcoming Three Rivers Information Security Symposium (TRISS), where they will be offering resume reviews and engaging with attendees.</li><li><strong>Counter-Espionage and Pagers</strong>: A fascinating look at the use of pagers in recent counter-espionage operations, analyzing their effectiveness and ethical concerns.</li><li><strong>Supply Chain Security Concerns:</strong> A discussion on the risks tied to supply chain vulnerabilities, focusing on hardware inspections.</li><li><strong>Tabletop Exercises in Cybersecurity</strong>: The hosts highlight the importance of tabletop exercises to prepare organizations for security incidents, contrasting them with current trends in incident response training.</li><li><strong>School Violence Threats:</strong> An examination of the rise in school violence threats and the challenges schools face in managing these situations.</li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.threeriversinfosec.com/">Three Rivers Information Security Symposium (TRISS)</a></li><li><a href="https://www.dhs.gov/sites/default/files/2024-09/2024aepphasellusmaritimetradeandportcybersecurity.pdf">US Maritime Trade and Port Cybersecurity</a></li></ul><p><strong>Spirits</strong></p><ul><li>Boone 1833 12-Year-Old, Snyder's Flask (discontinued) - https://boonedistilling.com/</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 02 Oct 2024 18:50:22 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/1fdca557/1fb20e67.mp3" length="61134249" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>3819</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join hosts Justin, Rick, and Joe as they cover:</p><ul><li><strong>Resume Review Insights:</strong> Joe offers valuable tips on resume writing, focusing on showcasing accomplishments and using metrics to stand out.</li><li><strong>Passion Projects and Hobbies:</strong> The team discusses how personal projects and volunteer work can make resumes more compelling by demonstrating a passion for the field.</li><li><strong>Community Engagement at TRISS</strong>: The hosts invite listeners to their booth at the upcoming Three Rivers Information Security Symposium (TRISS), where they will be offering resume reviews and engaging with attendees.</li><li><strong>Counter-Espionage and Pagers</strong>: A fascinating look at the use of pagers in recent counter-espionage operations, analyzing their effectiveness and ethical concerns.</li><li><strong>Supply Chain Security Concerns:</strong> A discussion on the risks tied to supply chain vulnerabilities, focusing on hardware inspections.</li><li><strong>Tabletop Exercises in Cybersecurity</strong>: The hosts highlight the importance of tabletop exercises to prepare organizations for security incidents, contrasting them with current trends in incident response training.</li><li><strong>School Violence Threats:</strong> An examination of the rise in school violence threats and the challenges schools face in managing these situations.</li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.threeriversinfosec.com/">Three Rivers Information Security Symposium (TRISS)</a></li><li><a href="https://www.dhs.gov/sites/default/files/2024-09/2024aepphasellusmaritimetradeandportcybersecurity.pdf">US Maritime Trade and Port Cybersecurity</a></li></ul><p><strong>Spirits</strong></p><ul><li>Boone 1833 12-Year-Old, Snyder's Flask (discontinued) - https://boonedistilling.com/</li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline -<a href="https://www.linkedin.com/in/justinleapline/"> LinkedIn</a></li><li>Joe Wynn -<a href="https://www.linkedin.com/in/wynnjoe/"> LinkedIn</a></li><li>Rick Yocum -<a href="https://www.linkedin.com/in/rickyocum/"> LinkedIn</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com</li></ul><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/1fdca557/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1fdca557/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1fdca557/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/1fdca557/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/1fdca557/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 4: Ethics in Cybersecurity, Career Development, and Data Protection</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4: Ethics in Cybersecurity, Career Development, and Data Protection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6c9e6963-fad9-4692-82e7-42f39eb267c0</guid>
      <link>https://share.transistor.fm/s/dfb0b1c7</link>
      <description>
        <![CDATA[<p><strong>Episode 4: Ethics in Cybersecurity, Career Development, and Data Protection<br></strong><br></p><p>In Episode 4, we are joined by <strong>Doug Salah</strong> to explore some critical topics in cybersecurity and career growth.</p><p><br><strong>Key Topics</strong></p><ul><li><strong>Doug Salah’s Cybersecurity Journey</strong>: His transition into cybersecurity and current role in the industry.</li><li><strong>Networking in Cybersecurity</strong>: The value of building connections at cybersecurity conferences.</li><li><strong>TRISS (Three Rivers Information Security Symposium)</strong>: Insights into TRISS, its scholarships, and its impact on the community.</li><li><strong>Mid-Career Development</strong>: Doug’s thoughts on transitioning mid-career, setting goals, and maintaining integrity.</li><li><strong>Cybersecurity Ethics</strong>: A deep dive into ethics in the industry, ethical decision-making, and creating a Cyber Code of Honor.</li><li><strong>The Four Agreements</strong>: How Doug relates his personal ethics to the principles in <em>The Four Agreements</em>.</li><li><strong>Featured Spirit – Compass Box Spice Tree Scotch</strong>: A review of this week’s featured Scotch.</li><li><strong>National Public Data Background Check Breach</strong>: Discussion of the recent breach and its implications for data protection.</li><li><strong>Data Protection Tips</strong>: Tips on freezing credit and using services like <em>Delete Me</em> to protect personal data.</li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.threeriversinfosec.com/">Three Rivers Information Security Symposium (TRISS)</a> - <a href="https://www.threeriversinfosec.com/">https://www.threeriversinfosec.com/</a></li><li><a href="https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319">The Four Agreements</a> - <a href="https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319">https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319</a></li><li><a href="https://joindeleteme.com/">Delete Me Service</a> - <a href="https://joindeleteme.com/">https://joindeleteme.com/</a></li><li><a href="https://cybercodeofhonor.com/">The Code Of Honor - Embracing Ethics in Cybersecurity</a></li></ul><p><strong>Spirits</strong></p><ul><li><a href="https://www.compassboxwhisky.com/products/the-spice-tree">Compass Box Spice Tree Scotch</a> - <a href="https://www.compassboxwhisky.com/products/the-spice-tree">https://www.compassboxwhisky.com/products/the-spice-tree</a></li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline - <a href="https://www.linkedin.com/in/justinleapline/">https://www.linkedin.com/in/justinleapline/</a></li><li>Joe Wynn - <a href="https://www.linkedin.com/in/wynnjoe/">https://www.linkedin.com/in/wynnjoe/</a></li><li>Rick Yocum - <a href="https://www.linkedin.com/in/rickyocum/">https://www.linkedin.com/in/rickyocum/</a></li></ul><p><strong>Guest</strong></p><ul><li>Doug Salah - <a href="https://www.linkedin.com/in/dougsalah/">https://www.linkedin.com/in/dougsalah/</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode 4: Ethics in Cybersecurity, Career Development, and Data Protection<br></strong><br></p><p>In Episode 4, we are joined by <strong>Doug Salah</strong> to explore some critical topics in cybersecurity and career growth.</p><p><br><strong>Key Topics</strong></p><ul><li><strong>Doug Salah’s Cybersecurity Journey</strong>: His transition into cybersecurity and current role in the industry.</li><li><strong>Networking in Cybersecurity</strong>: The value of building connections at cybersecurity conferences.</li><li><strong>TRISS (Three Rivers Information Security Symposium)</strong>: Insights into TRISS, its scholarships, and its impact on the community.</li><li><strong>Mid-Career Development</strong>: Doug’s thoughts on transitioning mid-career, setting goals, and maintaining integrity.</li><li><strong>Cybersecurity Ethics</strong>: A deep dive into ethics in the industry, ethical decision-making, and creating a Cyber Code of Honor.</li><li><strong>The Four Agreements</strong>: How Doug relates his personal ethics to the principles in <em>The Four Agreements</em>.</li><li><strong>Featured Spirit – Compass Box Spice Tree Scotch</strong>: A review of this week’s featured Scotch.</li><li><strong>National Public Data Background Check Breach</strong>: Discussion of the recent breach and its implications for data protection.</li><li><strong>Data Protection Tips</strong>: Tips on freezing credit and using services like <em>Delete Me</em> to protect personal data.</li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.threeriversinfosec.com/">Three Rivers Information Security Symposium (TRISS)</a> - <a href="https://www.threeriversinfosec.com/">https://www.threeriversinfosec.com/</a></li><li><a href="https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319">The Four Agreements</a> - <a href="https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319">https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319</a></li><li><a href="https://joindeleteme.com/">Delete Me Service</a> - <a href="https://joindeleteme.com/">https://joindeleteme.com/</a></li><li><a href="https://cybercodeofhonor.com/">The Code Of Honor - Embracing Ethics in Cybersecurity</a></li></ul><p><strong>Spirits</strong></p><ul><li><a href="https://www.compassboxwhisky.com/products/the-spice-tree">Compass Box Spice Tree Scotch</a> - <a href="https://www.compassboxwhisky.com/products/the-spice-tree">https://www.compassboxwhisky.com/products/the-spice-tree</a></li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline - <a href="https://www.linkedin.com/in/justinleapline/">https://www.linkedin.com/in/justinleapline/</a></li><li>Joe Wynn - <a href="https://www.linkedin.com/in/wynnjoe/">https://www.linkedin.com/in/wynnjoe/</a></li><li>Rick Yocum - <a href="https://www.linkedin.com/in/rickyocum/">https://www.linkedin.com/in/rickyocum/</a></li></ul><p><strong>Guest</strong></p><ul><li>Doug Salah - <a href="https://www.linkedin.com/in/dougsalah/">https://www.linkedin.com/in/dougsalah/</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 09 Sep 2024 11:02:18 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/dfb0b1c7/c8a488e1.mp3" length="70504837" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>4405</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Episode 4: Ethics in Cybersecurity, Career Development, and Data Protection<br></strong><br></p><p>In Episode 4, we are joined by <strong>Doug Salah</strong> to explore some critical topics in cybersecurity and career growth.</p><p><br><strong>Key Topics</strong></p><ul><li><strong>Doug Salah’s Cybersecurity Journey</strong>: His transition into cybersecurity and current role in the industry.</li><li><strong>Networking in Cybersecurity</strong>: The value of building connections at cybersecurity conferences.</li><li><strong>TRISS (Three Rivers Information Security Symposium)</strong>: Insights into TRISS, its scholarships, and its impact on the community.</li><li><strong>Mid-Career Development</strong>: Doug’s thoughts on transitioning mid-career, setting goals, and maintaining integrity.</li><li><strong>Cybersecurity Ethics</strong>: A deep dive into ethics in the industry, ethical decision-making, and creating a Cyber Code of Honor.</li><li><strong>The Four Agreements</strong>: How Doug relates his personal ethics to the principles in <em>The Four Agreements</em>.</li><li><strong>Featured Spirit – Compass Box Spice Tree Scotch</strong>: A review of this week’s featured Scotch.</li><li><strong>National Public Data Background Check Breach</strong>: Discussion of the recent breach and its implications for data protection.</li><li><strong>Data Protection Tips</strong>: Tips on freezing credit and using services like <em>Delete Me</em> to protect personal data.</li></ul><p><strong>Links</strong></p><ul><li><a href="https://www.threeriversinfosec.com/">Three Rivers Information Security Symposium (TRISS)</a> - <a href="https://www.threeriversinfosec.com/">https://www.threeriversinfosec.com/</a></li><li><a href="https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319">The Four Agreements</a> - <a href="https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319">https://www.amazon.com/Four-Agreements-Practical-Personal-Freedom/dp/1878424319</a></li><li><a href="https://joindeleteme.com/">Delete Me Service</a> - <a href="https://joindeleteme.com/">https://joindeleteme.com/</a></li><li><a href="https://cybercodeofhonor.com/">The Code Of Honor - Embracing Ethics in Cybersecurity</a></li></ul><p><strong>Spirits</strong></p><ul><li><a href="https://www.compassboxwhisky.com/products/the-spice-tree">Compass Box Spice Tree Scotch</a> - <a href="https://www.compassboxwhisky.com/products/the-spice-tree">https://www.compassboxwhisky.com/products/the-spice-tree</a></li></ul><p><strong>Hosts</strong></p><ul><li>Justin Leapline - <a href="https://www.linkedin.com/in/justinleapline/">https://www.linkedin.com/in/justinleapline/</a></li><li>Joe Wynn - <a href="https://www.linkedin.com/in/wynnjoe/">https://www.linkedin.com/in/wynnjoe/</a></li><li>Rick Yocum - <a href="https://www.linkedin.com/in/rickyocum/">https://www.linkedin.com/in/rickyocum/</a></li></ul><p><strong>Guest</strong></p><ul><li>Doug Salah - <a href="https://www.linkedin.com/in/dougsalah/">https://www.linkedin.com/in/dougsalah/</a></li></ul><p><strong>Connect with Us</strong></p><ul><li>Website:<a href="https://distilledsecuritypodcast.com"> Distilled Security Podcast</a></li><li>Twitter:<a href="https://twitter.com/DisSecPod"> @DisSecPod</a></li><li>Email: hello@distilledsecuritypodcast.com<p></p></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:person role="Guest" href="https://distilledsecuritypodcast.com/people/doug-salah" img="https://img.transistorcdn.com/3z8Kf-wEjiOH3zd2QGMzy69hWW3CntyW8lGgcmaCt5w/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMGM5/OWMwNTljMTg3MjM3/MGJiN2EzMDA5YTI5/NjViMy5wbmc.jpg">Doug Salah</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/dfb0b1c7/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dfb0b1c7/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dfb0b1c7/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/dfb0b1c7/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/dfb0b1c7/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 3: Crowdstrike, North Korean Spies, and CISO Scapegoats</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3: Crowdstrike, North Korean Spies, and CISO Scapegoats</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">354387de-5749-4afc-95a6-4b0aedb71809</guid>
      <link>https://share.transistor.fm/s/5adb7b9c</link>
      <description>
        <![CDATA[<p><strong>Episode 3 of the Distilled Security Podcast is here!</strong></p><p><br>Join us this week as we jump into: </p><p><br></p><ul><li><strong>CrowdStrike Incident Analysis:</strong> A deep dive into a recent mishap by CrowdStrike that led to significant financial losses and operational disruptions, including 5.4 billion in estimated losses.</li><li><strong>Vendor Accountability:</strong> Exploring the legal and financial repercussions of security vendor failures.</li><li><strong>Business Continuity Planning:</strong> The importance of preparing for security vendor failures, including considering alternate vendors and the complexities of implementing such strategies.</li><li><strong>Kernel-Level Security Risks:</strong> A discussion surrounding kernel-level operations in security software, focusing on the controversy between CrowdStrike and SentinelOne.</li><li><strong>Manual Workarounds and Legacy Systems:</strong> The challenges of maintaining business operations during security incidents.</li><li><strong>Ransomware Recovery vs. Vendor Failures:</strong> Comparing ransomware attacks' impact and recovery processes with security vendor-induced failures.</li><li><strong>Password Management Vulnerabilities:</strong> The risks associated with dependency on password management systems like Thycotic/Delinea and LastPass, and the potential fallout if these systems experience downtime.</li><li><strong>BSides Pittsburgh Recap:</strong> the biggest BSidesPGH event yet. Hear the notes and highlights from the conference.</li><li><strong>North Korean Spy Hired By KnowBe4:</strong> Hear how a spy for N. Korea got by the defenses of KnowBe4, how they caught them, and steps they implemented to avoid this in the future.</li><li><strong>CISOs as Scapegoats:</strong> Are CISOs being pegged as scapegoats unfairly?</li></ul><p><br><strong>Links</strong></p><ul><li>Crowdstrike Incident - <a href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/</a></li><li>SentinelOne Response to Crowdstrike - SentinalOne on Crowdstrike Outage -<a href="https://www.crn.com/news/security/2024/sentinelone-ceo-on-crowdstrike-outage-not-just-an-honest-mistake"> https://www.crn.com/news/security/2024/sentinelone-ceo-on-crowdstrike-outage-not-just-an-honest-mistake</a></li><li>BSidesPGH - <a href="https://www.bsidespgh.com/">https://www.bsidespgh.com/</a></li><li>TRISS - <a href="https://www.threeriversinfosec.com/">https://www.threeriversinfosec.com/</a></li><li>KnowBe4 // N. Korean Spy - <a href="https://blog.knowbe4.com/cyberheistnews-vol-14-31-how-the-whole-world-now-knows-about-fake-north-korean-it-workers">https://blog.knowbe4.com/cyberheistnews-vol-14-31-how-the-whole-world-now-knows-about-fake-north-korean-it-workers</a></li><li>CISO as Scapegoats - <a href="https://www.thestack.technology/were-becoming-scapegoats-how-have-cisos-responded-to-sec-cyber-risk-disclosure-rules/">https://www.thestack.technology/were-becoming-scapegoats-how-have-cisos-responded-to-sec-cyber-risk-disclosure-rules/</a></li></ul><p><br><strong>Spirits</strong></p><ul><li>Rabbit Hole Cavehill // Four Grain Tripple Malt - <a href="https://www.rabbitholedistillery.com/pages/cavehill/">https://www.rabbitholedistillery.com/pages/cavehill/</a></li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline - https://www.linkedin.com/in/justinleapline/</li><li>Joe Wynn - https://www.linkedin.com/in/wynnjoe/</li><li>Rick Yocum - https://www.linkedin.com/in/rickyocum/</li></ul><p><br></p><p><strong>Connect with Us</strong></p><ul><li>Website: https://distilledsecuritypodcast.com</li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode 3 of the Distilled Security Podcast is here!</strong></p><p><br>Join us this week as we jump into: </p><p><br></p><ul><li><strong>CrowdStrike Incident Analysis:</strong> A deep dive into a recent mishap by CrowdStrike that led to significant financial losses and operational disruptions, including 5.4 billion in estimated losses.</li><li><strong>Vendor Accountability:</strong> Exploring the legal and financial repercussions of security vendor failures.</li><li><strong>Business Continuity Planning:</strong> The importance of preparing for security vendor failures, including considering alternate vendors and the complexities of implementing such strategies.</li><li><strong>Kernel-Level Security Risks:</strong> A discussion surrounding kernel-level operations in security software, focusing on the controversy between CrowdStrike and SentinelOne.</li><li><strong>Manual Workarounds and Legacy Systems:</strong> The challenges of maintaining business operations during security incidents.</li><li><strong>Ransomware Recovery vs. Vendor Failures:</strong> Comparing ransomware attacks' impact and recovery processes with security vendor-induced failures.</li><li><strong>Password Management Vulnerabilities:</strong> The risks associated with dependency on password management systems like Thycotic/Delinea and LastPass, and the potential fallout if these systems experience downtime.</li><li><strong>BSides Pittsburgh Recap:</strong> the biggest BSidesPGH event yet. Hear the notes and highlights from the conference.</li><li><strong>North Korean Spy Hired By KnowBe4:</strong> Hear how a spy for N. Korea got by the defenses of KnowBe4, how they caught them, and steps they implemented to avoid this in the future.</li><li><strong>CISOs as Scapegoats:</strong> Are CISOs being pegged as scapegoats unfairly?</li></ul><p><br><strong>Links</strong></p><ul><li>Crowdstrike Incident - <a href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/</a></li><li>SentinelOne Response to Crowdstrike - SentinalOne on Crowdstrike Outage -<a href="https://www.crn.com/news/security/2024/sentinelone-ceo-on-crowdstrike-outage-not-just-an-honest-mistake"> https://www.crn.com/news/security/2024/sentinelone-ceo-on-crowdstrike-outage-not-just-an-honest-mistake</a></li><li>BSidesPGH - <a href="https://www.bsidespgh.com/">https://www.bsidespgh.com/</a></li><li>TRISS - <a href="https://www.threeriversinfosec.com/">https://www.threeriversinfosec.com/</a></li><li>KnowBe4 // N. Korean Spy - <a href="https://blog.knowbe4.com/cyberheistnews-vol-14-31-how-the-whole-world-now-knows-about-fake-north-korean-it-workers">https://blog.knowbe4.com/cyberheistnews-vol-14-31-how-the-whole-world-now-knows-about-fake-north-korean-it-workers</a></li><li>CISO as Scapegoats - <a href="https://www.thestack.technology/were-becoming-scapegoats-how-have-cisos-responded-to-sec-cyber-risk-disclosure-rules/">https://www.thestack.technology/were-becoming-scapegoats-how-have-cisos-responded-to-sec-cyber-risk-disclosure-rules/</a></li></ul><p><br><strong>Spirits</strong></p><ul><li>Rabbit Hole Cavehill // Four Grain Tripple Malt - <a href="https://www.rabbitholedistillery.com/pages/cavehill/">https://www.rabbitholedistillery.com/pages/cavehill/</a></li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline - https://www.linkedin.com/in/justinleapline/</li><li>Joe Wynn - https://www.linkedin.com/in/wynnjoe/</li><li>Rick Yocum - https://www.linkedin.com/in/rickyocum/</li></ul><p><br></p><p><strong>Connect with Us</strong></p><ul><li>Website: https://distilledsecuritypodcast.com</li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 12 Aug 2024 14:32:56 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/5adb7b9c/0fd55bbc.mp3" length="68071370" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>4252</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Episode 3 of the Distilled Security Podcast is here!</strong></p><p><br>Join us this week as we jump into: </p><p><br></p><ul><li><strong>CrowdStrike Incident Analysis:</strong> A deep dive into a recent mishap by CrowdStrike that led to significant financial losses and operational disruptions, including 5.4 billion in estimated losses.</li><li><strong>Vendor Accountability:</strong> Exploring the legal and financial repercussions of security vendor failures.</li><li><strong>Business Continuity Planning:</strong> The importance of preparing for security vendor failures, including considering alternate vendors and the complexities of implementing such strategies.</li><li><strong>Kernel-Level Security Risks:</strong> A discussion surrounding kernel-level operations in security software, focusing on the controversy between CrowdStrike and SentinelOne.</li><li><strong>Manual Workarounds and Legacy Systems:</strong> The challenges of maintaining business operations during security incidents.</li><li><strong>Ransomware Recovery vs. Vendor Failures:</strong> Comparing ransomware attacks' impact and recovery processes with security vendor-induced failures.</li><li><strong>Password Management Vulnerabilities:</strong> The risks associated with dependency on password management systems like Thycotic/Delinea and LastPass, and the potential fallout if these systems experience downtime.</li><li><strong>BSides Pittsburgh Recap:</strong> the biggest BSidesPGH event yet. Hear the notes and highlights from the conference.</li><li><strong>North Korean Spy Hired By KnowBe4:</strong> Hear how a spy for N. Korea got by the defenses of KnowBe4, how they caught them, and steps they implemented to avoid this in the future.</li><li><strong>CISOs as Scapegoats:</strong> Are CISOs being pegged as scapegoats unfairly?</li></ul><p><br><strong>Links</strong></p><ul><li>Crowdstrike Incident - <a href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/</a></li><li>SentinelOne Response to Crowdstrike - SentinalOne on Crowdstrike Outage -<a href="https://www.crn.com/news/security/2024/sentinelone-ceo-on-crowdstrike-outage-not-just-an-honest-mistake"> https://www.crn.com/news/security/2024/sentinelone-ceo-on-crowdstrike-outage-not-just-an-honest-mistake</a></li><li>BSidesPGH - <a href="https://www.bsidespgh.com/">https://www.bsidespgh.com/</a></li><li>TRISS - <a href="https://www.threeriversinfosec.com/">https://www.threeriversinfosec.com/</a></li><li>KnowBe4 // N. Korean Spy - <a href="https://blog.knowbe4.com/cyberheistnews-vol-14-31-how-the-whole-world-now-knows-about-fake-north-korean-it-workers">https://blog.knowbe4.com/cyberheistnews-vol-14-31-how-the-whole-world-now-knows-about-fake-north-korean-it-workers</a></li><li>CISO as Scapegoats - <a href="https://www.thestack.technology/were-becoming-scapegoats-how-have-cisos-responded-to-sec-cyber-risk-disclosure-rules/">https://www.thestack.technology/were-becoming-scapegoats-how-have-cisos-responded-to-sec-cyber-risk-disclosure-rules/</a></li></ul><p><br><strong>Spirits</strong></p><ul><li>Rabbit Hole Cavehill // Four Grain Tripple Malt - <a href="https://www.rabbitholedistillery.com/pages/cavehill/">https://www.rabbitholedistillery.com/pages/cavehill/</a></li></ul><p><br></p><p><strong>Hosts</strong></p><ul><li>Justin Leapline - https://www.linkedin.com/in/justinleapline/</li><li>Joe Wynn - https://www.linkedin.com/in/wynnjoe/</li><li>Rick Yocum - https://www.linkedin.com/in/rickyocum/</li></ul><p><br></p><p><strong>Connect with Us</strong></p><ul><li>Website: https://distilledsecuritypodcast.com</li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/5adb7b9c/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/5adb7b9c/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/5adb7b9c/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/5adb7b9c/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/5adb7b9c/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 2: Tailoring Security Frameworks &amp; Leveraging AI</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2: Tailoring Security Frameworks &amp; Leveraging AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">34b0f39f-3807-4399-ad3d-932dfe5d2d41</guid>
      <link>https://share.transistor.fm/s/e819c167</link>
      <description>
        <![CDATA[<p><strong>Episode 2 of the Distilled Security Podcast is here!</strong></p><p><br>Join us this week as we jump into: </p><ul><li><strong>Exploring the critical importance of tailoring security frameworks:</strong> Aligning with an organization's specific goals and objectives</li><li><strong>Highlighting frameworks like NIST CSF and CIS</strong> to advance security programs effectively</li><li>Insights on aligning KPIs with the NIST CSF framework</li><li>Complementary use of frameworks like CIS to enhance security control measurement</li><li>Perspective on compliance and regulatory requirements</li><li>The role of AI in security programs</li><li><strong>Threats posed by deepfakes:</strong> Incorporating safeguards to protect organizations from deepfake risks and effectively leverage AI within security programs</li></ul><p><strong>Chapters</strong><br>00:00:00 - Introduction and Episode Overview<br>00:00:44 - Discussion on Security Frameworks<br>00:05:43 - Tailoring Frameworks<br>00:08:19 - Mapping and Compliance Challenges<br>00:17:16 - Tailoring for Small Organizations<br>00:19:15 - Upcoming Conferences<br>00:21:30 - Bourbon Review<br>00:25:00 - Audit Preparation Tips<br>00:27:02 - AI in Security<br>00:35:09 - Privacy Concerns with AI Toys<br>00:41:22 - Deepfakes in Security<br>01:05:59 - Closing Remarks</p><p><strong>Links and references</strong><br>https://securecontrolsframework.com</p><p>https://www.nist.gov/cyberframework</p><p>https://csrc.nist.gov/pubs/sp/1300/final</p><p>https://www.cisecurity.org/insights/white-papers/cis-controls-sme-guide</p><p><strong>Drink</strong><br>Whiskey Thief Door Knocker</p><p><a href="https://www.nist.gov/cyberframework"><br></a><strong>Hosts</strong></p><ul><li>Justin Leapline - <a href="https://www.linkedin.com/in/justinleapline/">https://www.linkedin.com/in/justinleapline/</a></li><li>Joe Wynn - <a href="https://www.linkedin.com/in/wynnjoe/">https://www.linkedin.com/in/wynnjoe/</a></li><li>Rick Yocum - <a href="https://www.linkedin.com/in/rickyocum/">https://www.linkedin.com/in/rickyocum/</a></li></ul><p>Connect with Us</p><ul><li>Website: <a href="https://distilledsecuritypodcast.com">https://distilledsecuritypodcast.com</a></li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode 2 of the Distilled Security Podcast is here!</strong></p><p><br>Join us this week as we jump into: </p><ul><li><strong>Exploring the critical importance of tailoring security frameworks:</strong> Aligning with an organization's specific goals and objectives</li><li><strong>Highlighting frameworks like NIST CSF and CIS</strong> to advance security programs effectively</li><li>Insights on aligning KPIs with the NIST CSF framework</li><li>Complementary use of frameworks like CIS to enhance security control measurement</li><li>Perspective on compliance and regulatory requirements</li><li>The role of AI in security programs</li><li><strong>Threats posed by deepfakes:</strong> Incorporating safeguards to protect organizations from deepfake risks and effectively leverage AI within security programs</li></ul><p><strong>Chapters</strong><br>00:00:00 - Introduction and Episode Overview<br>00:00:44 - Discussion on Security Frameworks<br>00:05:43 - Tailoring Frameworks<br>00:08:19 - Mapping and Compliance Challenges<br>00:17:16 - Tailoring for Small Organizations<br>00:19:15 - Upcoming Conferences<br>00:21:30 - Bourbon Review<br>00:25:00 - Audit Preparation Tips<br>00:27:02 - AI in Security<br>00:35:09 - Privacy Concerns with AI Toys<br>00:41:22 - Deepfakes in Security<br>01:05:59 - Closing Remarks</p><p><strong>Links and references</strong><br>https://securecontrolsframework.com</p><p>https://www.nist.gov/cyberframework</p><p>https://csrc.nist.gov/pubs/sp/1300/final</p><p>https://www.cisecurity.org/insights/white-papers/cis-controls-sme-guide</p><p><strong>Drink</strong><br>Whiskey Thief Door Knocker</p><p><a href="https://www.nist.gov/cyberframework"><br></a><strong>Hosts</strong></p><ul><li>Justin Leapline - <a href="https://www.linkedin.com/in/justinleapline/">https://www.linkedin.com/in/justinleapline/</a></li><li>Joe Wynn - <a href="https://www.linkedin.com/in/wynnjoe/">https://www.linkedin.com/in/wynnjoe/</a></li><li>Rick Yocum - <a href="https://www.linkedin.com/in/rickyocum/">https://www.linkedin.com/in/rickyocum/</a></li></ul><p>Connect with Us</p><ul><li>Website: <a href="https://distilledsecuritypodcast.com">https://distilledsecuritypodcast.com</a></li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 08 Jul 2024 10:00:00 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/e819c167/b2b6a10b.mp3" length="62752994" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>3920</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Episode 2 of the Distilled Security Podcast is here!</strong></p><p><br>Join us this week as we jump into: </p><ul><li><strong>Exploring the critical importance of tailoring security frameworks:</strong> Aligning with an organization's specific goals and objectives</li><li><strong>Highlighting frameworks like NIST CSF and CIS</strong> to advance security programs effectively</li><li>Insights on aligning KPIs with the NIST CSF framework</li><li>Complementary use of frameworks like CIS to enhance security control measurement</li><li>Perspective on compliance and regulatory requirements</li><li>The role of AI in security programs</li><li><strong>Threats posed by deepfakes:</strong> Incorporating safeguards to protect organizations from deepfake risks and effectively leverage AI within security programs</li></ul><p><strong>Chapters</strong><br>00:00:00 - Introduction and Episode Overview<br>00:00:44 - Discussion on Security Frameworks<br>00:05:43 - Tailoring Frameworks<br>00:08:19 - Mapping and Compliance Challenges<br>00:17:16 - Tailoring for Small Organizations<br>00:19:15 - Upcoming Conferences<br>00:21:30 - Bourbon Review<br>00:25:00 - Audit Preparation Tips<br>00:27:02 - AI in Security<br>00:35:09 - Privacy Concerns with AI Toys<br>00:41:22 - Deepfakes in Security<br>01:05:59 - Closing Remarks</p><p><strong>Links and references</strong><br>https://securecontrolsframework.com</p><p>https://www.nist.gov/cyberframework</p><p>https://csrc.nist.gov/pubs/sp/1300/final</p><p>https://www.cisecurity.org/insights/white-papers/cis-controls-sme-guide</p><p><strong>Drink</strong><br>Whiskey Thief Door Knocker</p><p><a href="https://www.nist.gov/cyberframework"><br></a><strong>Hosts</strong></p><ul><li>Justin Leapline - <a href="https://www.linkedin.com/in/justinleapline/">https://www.linkedin.com/in/justinleapline/</a></li><li>Joe Wynn - <a href="https://www.linkedin.com/in/wynnjoe/">https://www.linkedin.com/in/wynnjoe/</a></li><li>Rick Yocum - <a href="https://www.linkedin.com/in/rickyocum/">https://www.linkedin.com/in/rickyocum/</a></li></ul><p>Connect with Us</p><ul><li>Website: <a href="https://distilledsecuritypodcast.com">https://distilledsecuritypodcast.com</a></li><li>Twitter: @DisSecPod</li><li>Email: hello@distilledsecuritypodcast.com</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>frameworks, AI, KPIs, NIST CSF, CIS,CSF, CIS, profiling, controls, framework,interest groups, privacy, compliance, regulatory, contractual compliance,CSF, audit, controls framework, modify, compliance,CSF, risk assessment, defensibility, schedule, Security Controls Framework,compliance framework, controls, mapping, authoritative sources, control statement,tailoring, framework, PCI, controls, compliance,investment, GRC tool, conferences, Pittsburgh, community-driven,Seinfeld, whiskey, tasting, audit, silence,audit, organization, regulatory, counsel, AI,AI, security, governance, documents, policies,security, AI, time saving, privacy, Moxie,podcast, privacy, children, AI, toy,security, privacy, data breaches, lawsuits, monitoring,factors, GRC tools, AI, chatbots, RFIs,security team, sales team, assessment, passwords, policy mapping,security, deepfakes, incident response, newscast, trust-based economy,trust, process checkpoints, verification, financial controls, deepfakes,ACH fraud, small businesses, deep fake, cybersecurity framework, NIST,small business guide, CIS, Microsoft Recall, AI, screenshots,attacker, security, management, UBA, data,privacy, value, societal expectations, technology, mental health,shielding, inbox zero, context switching, consequences, manager mode,calendar, maker, manager, productivity, white space,Rise Calendar, Outlook, Free Busy, Privacy, Meeting Invite</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/e819c167/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e819c167/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e819c167/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/e819c167/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/e819c167/transcription" type="text/html"/>
    </item>
    <item>
      <title>Episode 1: College, Exec Comp, and New CISOs</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1: College, Exec Comp, and New CISOs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">771fcbbf-12a2-4d29-b7a9-b4fdfa7a101a</guid>
      <link>https://studio.youtube.com/video/6V0iXsWwdJ4</link>
      <description>
        <![CDATA[<p><strong>Welcome to the first episode of Distilled Security!<br></strong><br></p><p>Join us as we dive into a variety of exciting topics, including:</p><ul><li><strong>Is College Worth It?</strong>: We explore the value of higher education in today's world.</li><li><strong>Microsoft and Executive Compensation</strong>: Analyzing cybersecurity in executive pay at Microsoft.</li><li><strong>BSides Pittsburgh</strong>: Exciting talks are coming to BSidesPGH.</li><li><strong>Starting as a New CISO</strong>: Things to do first coming into a new company.</li></ul><p>Grab your favorite cocktail and tune in for an engaging and fun-filled discussion!</p><p><br><strong>Hosts</strong></p><ul><li>Justin Leapline - https://www.linkedin.com/in/justinleapline/</li><li>Joe Wynn - https://www.linkedin.com/in/wynnjoe/</li><li>Rick Yocum - https://www.linkedin.com/in/rickyocum/</li></ul><p><strong>Connect with Us</strong></p><ul><li><strong>Website:</strong> https://distilledsecuritypodcast.com</li><li><strong>Twitter:</strong> @DisSecPod</li><li><strong>Email:</strong> hello@distilledsecuritypodcast.com</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Welcome to the first episode of Distilled Security!<br></strong><br></p><p>Join us as we dive into a variety of exciting topics, including:</p><ul><li><strong>Is College Worth It?</strong>: We explore the value of higher education in today's world.</li><li><strong>Microsoft and Executive Compensation</strong>: Analyzing cybersecurity in executive pay at Microsoft.</li><li><strong>BSides Pittsburgh</strong>: Exciting talks are coming to BSidesPGH.</li><li><strong>Starting as a New CISO</strong>: Things to do first coming into a new company.</li></ul><p>Grab your favorite cocktail and tune in for an engaging and fun-filled discussion!</p><p><br><strong>Hosts</strong></p><ul><li>Justin Leapline - https://www.linkedin.com/in/justinleapline/</li><li>Joe Wynn - https://www.linkedin.com/in/wynnjoe/</li><li>Rick Yocum - https://www.linkedin.com/in/rickyocum/</li></ul><p><strong>Connect with Us</strong></p><ul><li><strong>Website:</strong> https://distilledsecuritypodcast.com</li><li><strong>Twitter:</strong> @DisSecPod</li><li><strong>Email:</strong> hello@distilledsecuritypodcast.com</li></ul>]]>
      </content:encoded>
      <pubDate>Fri, 07 Jun 2024 12:30:58 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/d2504501/e7ca2459.mp3" length="126690663" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>3909</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Welcome to the first episode of Distilled Security!<br></strong><br></p><p>Join us as we dive into a variety of exciting topics, including:</p><ul><li><strong>Is College Worth It?</strong>: We explore the value of higher education in today's world.</li><li><strong>Microsoft and Executive Compensation</strong>: Analyzing cybersecurity in executive pay at Microsoft.</li><li><strong>BSides Pittsburgh</strong>: Exciting talks are coming to BSidesPGH.</li><li><strong>Starting as a New CISO</strong>: Things to do first coming into a new company.</li></ul><p>Grab your favorite cocktail and tune in for an engaging and fun-filled discussion!</p><p><br><strong>Hosts</strong></p><ul><li>Justin Leapline - https://www.linkedin.com/in/justinleapline/</li><li>Joe Wynn - https://www.linkedin.com/in/wynnjoe/</li><li>Rick Yocum - https://www.linkedin.com/in/rickyocum/</li></ul><p><strong>Connect with Us</strong></p><ul><li><strong>Website:</strong> https://distilledsecuritypodcast.com</li><li><strong>Twitter:</strong> @DisSecPod</li><li><strong>Email:</strong> hello@distilledsecuritypodcast.com</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d2504501/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d2504501/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d2504501/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d2504501/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/d2504501/transcription" type="text/html"/>
    </item>
    <item>
      <title>Distilled Security Podcast Trailer</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Distilled Security Podcast Trailer</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">b5a39468-b8a6-4924-a7de-48b989e6d06e</guid>
      <link>https://share.transistor.fm/s/893e842b</link>
      <description>
        <![CDATA[<p>Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Sat, 01 Jun 2024 20:52:35 -0400</pubDate>
      <author>Justin Leapline, Joe Wynn, and Rick Yocum</author>
      <enclosure url="https://media.transistor.fm/893e842b/768be7b5.mp3" length="763744" type="audio/mpeg"/>
      <itunes:author>Justin Leapline, Joe Wynn, and Rick Yocum</itunes:author>
      <itunes:duration>45</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, governance, risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://episki.com" img="https://img.transistorcdn.com/UHshu3nS0M0m3c0HsBvtkZBCw_b1sxx0Nrm_xyzLUqo/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYjRm/YjNiMjEwMjdhODdk/ZGI0MmFiZWM0MzYy/MjJhZC5qcGc.jpg">Justin Leapline</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/joe-wynn" img="https://img.transistorcdn.com/MhZKx92wTvQ9GXfiHrLRR1GuWCUebk6d9OrBK0mDpEg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTM5/ZDdhNGFiMTA5OGY3/YTFlZDA4YjQ4N2E4/MmI2Ni5qcGc.jpg">Joe Wynn</podcast:person>
      <podcast:person role="Host" href="https://distilledsecuritypodcast.com/people/rick-yocum" img="https://img.transistorcdn.com/H1yLv9hjXi3ytimyWqSYUpdI1nKNEVKCbVwrqglu9mA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNj/ZjhiM2E0YTU5MjJj/YjNiN2EyZDNlNGNh/YjZmNi5qcGc.jpg">Rick Yocum</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/893e842b/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/893e842b/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/893e842b/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/893e842b/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/893e842b/transcription" type="text/html"/>
    </item>
  </channel>
</rss>
