<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/executive-security" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>eXecutive Security</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/executive-security</itunes:new-feed-url>
    <description>Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.</description>
    <copyright>© 2026 Gene Fay</copyright>
    <podcast:guid>1d04e7c6-1c44-5ce2-95d9-66e75383e047</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Mon, 20 Apr 2026 10:48:54 -0700</pubDate>
    <lastBuildDate>Mon, 20 Apr 2026 10:49:15 -0700</lastBuildDate>
    <link>https://threatx.com</link>
    <image>
      <url>https://img.transistorcdn.com/jzeC6HgoboGX3USX4PG0yBotbxPXVR7P_dfEOzqOOXY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzI4NTk0LzE2NDYy/MzMwNjMtYXJ0d29y/ay5qcGc.jpg</url>
      <title>eXecutive Security</title>
      <link>https://threatx.com</link>
    </image>
    <itunes:category text="Business">
      <itunes:category text="Careers"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Gene Fay</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/jzeC6HgoboGX3USX4PG0yBotbxPXVR7P_dfEOzqOOXY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzI4NTk0LzE2NDYy/MzMwNjMtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity.</itunes:summary>
    <itunes:subtitle>Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field of cybersecurity..</itunes:subtitle>
    <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
    <itunes:owner>
      <itunes:name>Neil DuPaul</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Mastering API Security and the Power of AI with Colin Domoney, CTO of Thinking of U</title>
      <itunes:title>Mastering API Security and the Power of AI with Colin Domoney, CTO of Thinking of U</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">228ea581-d83c-421d-98de-60c88c623fe1</guid>
      <link>https://executivesecurity.transistor.fm/episodes/mastering-API-Security-and-the-power-of-AI</link>
      <description>
        <![CDATA[<p><br>Colin Domoney, CTO and co-founder of Thinking of U, shares his career journey in cybersecurity and his expertise in API security. He started as a kid building electronics and crypto systems, which led him to develop battle-hardened defense systems. He gravitated towards software and eventually got into AppSec, diving into the deep end and fixing a million AppSec vulnerabilities. Colin emphasizes the importance of developers having security skills and offers advice on how to build something cool that is also secure. He discusses the unique challenges and opportunities in API security and the role of AI in the industry.</p><p><strong>Takeaways</strong></p><ul><li>Developers with security skills are highly sought after in the industry.</li><li>API security requires a different approach compared to standard web app security.</li><li>API security encompasses a wide range of tools and techniques, from shift left to runtime protection.</li><li>Colin's book, Defending APIs, is aimed at anyone tasked with defending APIs, with a focus on developers.</li><li>AI is a powerful tool that accelerates learning and problem-solving in various areas, including cybersecurity.</li><li>AI creates both opportunities and challenges in the industry, and it is important to stay informed and adapt to its impact.</li></ul><p><br></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>Colin Domoney, CTO and co-founder of Thinking of U, shares his career journey in cybersecurity and his expertise in API security. He started as a kid building electronics and crypto systems, which led him to develop battle-hardened defense systems. He gravitated towards software and eventually got into AppSec, diving into the deep end and fixing a million AppSec vulnerabilities. Colin emphasizes the importance of developers having security skills and offers advice on how to build something cool that is also secure. He discusses the unique challenges and opportunities in API security and the role of AI in the industry.</p><p><strong>Takeaways</strong></p><ul><li>Developers with security skills are highly sought after in the industry.</li><li>API security requires a different approach compared to standard web app security.</li><li>API security encompasses a wide range of tools and techniques, from shift left to runtime protection.</li><li>Colin's book, Defending APIs, is aimed at anyone tasked with defending APIs, with a focus on developers.</li><li>AI is a powerful tool that accelerates learning and problem-solving in various areas, including cybersecurity.</li><li>AI creates both opportunities and challenges in the industry, and it is important to stay informed and adapt to its impact.</li></ul><p><br></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Fri, 15 Nov 2024 07:37:05 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/1e07381c/965a55dc.mp3" length="35554187" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>1480</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>Colin Domoney, CTO and co-founder of Thinking of U, shares his career journey in cybersecurity and his expertise in API security. He started as a kid building electronics and crypto systems, which led him to develop battle-hardened defense systems. He gravitated towards software and eventually got into AppSec, diving into the deep end and fixing a million AppSec vulnerabilities. Colin emphasizes the importance of developers having security skills and offers advice on how to build something cool that is also secure. He discusses the unique challenges and opportunities in API security and the role of AI in the industry.</p><p><strong>Takeaways</strong></p><ul><li>Developers with security skills are highly sought after in the industry.</li><li>API security requires a different approach compared to standard web app security.</li><li>API security encompasses a wide range of tools and techniques, from shift left to runtime protection.</li><li>Colin's book, Defending APIs, is aimed at anyone tasked with defending APIs, with a focus on developers.</li><li>AI is a powerful tool that accelerates learning and problem-solving in various areas, including cybersecurity.</li><li>AI creates both opportunities and challenges in the industry, and it is important to stay informed and adapt to its impact.</li></ul><p><br></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Master Leadership Roles leveraging Strategic Insights and Business Tenets with Tom Heiser</title>
      <itunes:title>How to Master Leadership Roles leveraging Strategic Insights and Business Tenets with Tom Heiser</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0c3bb310-b991-487a-87bd-599920ce92fe</guid>
      <link>https://executivesecurity.transistor.fm/episodes/mastering-leadership-roles-with-tom-heiser</link>
      <description>
        <![CDATA[<p><strong>Summary:<br></strong>In this episode, Gene discusses management principles and leadership strategies for senior leaders and aspiring entrepreneurs with Tom Heiser, previously CEO of ClickSoftware, EVP at EMC, and President at RSA the cyber division of EMC. They cover topics such as opening the aperture, balancing strategy and tactics, embracing change, connecting the dots, and more. The conversation emphasizes the importance of learning from tough times, setting a clear vision, and problem-solving with a positive mindset.</p><p><strong>Takeaways</strong></p><ul><li>Balancing strategy and tactics is crucial for success in leadership roles.</li><li>Embracing change and learning from tough times are essential for personal and professional growth.</li><li>The rule of 15 degrees emphasizes the importance of iteration and continuous improvement in business strategies.</li><li>Asking 'why' five times to find the root cause is a valuable problem-solving technique.</li><li>Maintaining a positive mindset and focusing on the achievable is key to overcoming challenges in leadership and business.</li><li>Setting a clear vision and connecting the dots between current state and desired state is essential for success in business and leadership.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Summary:<br></strong>In this episode, Gene discusses management principles and leadership strategies for senior leaders and aspiring entrepreneurs with Tom Heiser, previously CEO of ClickSoftware, EVP at EMC, and President at RSA the cyber division of EMC. They cover topics such as opening the aperture, balancing strategy and tactics, embracing change, connecting the dots, and more. The conversation emphasizes the importance of learning from tough times, setting a clear vision, and problem-solving with a positive mindset.</p><p><strong>Takeaways</strong></p><ul><li>Balancing strategy and tactics is crucial for success in leadership roles.</li><li>Embracing change and learning from tough times are essential for personal and professional growth.</li><li>The rule of 15 degrees emphasizes the importance of iteration and continuous improvement in business strategies.</li><li>Asking 'why' five times to find the root cause is a valuable problem-solving technique.</li><li>Maintaining a positive mindset and focusing on the achievable is key to overcoming challenges in leadership and business.</li><li>Setting a clear vision and connecting the dots between current state and desired state is essential for success in business and leadership.</li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 25 Sep 2024 09:56:43 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/b5a178ab/e8893f4b.mp3" length="44140854" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>1838</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Summary:<br></strong>In this episode, Gene discusses management principles and leadership strategies for senior leaders and aspiring entrepreneurs with Tom Heiser, previously CEO of ClickSoftware, EVP at EMC, and President at RSA the cyber division of EMC. They cover topics such as opening the aperture, balancing strategy and tactics, embracing change, connecting the dots, and more. The conversation emphasizes the importance of learning from tough times, setting a clear vision, and problem-solving with a positive mindset.</p><p><strong>Takeaways</strong></p><ul><li>Balancing strategy and tactics is crucial for success in leadership roles.</li><li>Embracing change and learning from tough times are essential for personal and professional growth.</li><li>The rule of 15 degrees emphasizes the importance of iteration and continuous improvement in business strategies.</li><li>Asking 'why' five times to find the root cause is a valuable problem-solving technique.</li><li>Maintaining a positive mindset and focusing on the achievable is key to overcoming challenges in leadership and business.</li><li>Setting a clear vision and connecting the dots between current state and desired state is essential for success in business and leadership.</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title> Building Culture, Navigating Careers, and Securing the Future with Jim Alkove, CEO of Oleria</title>
      <itunes:title> Building Culture, Navigating Careers, and Securing the Future with Jim Alkove, CEO of Oleria</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c0df0524-00e1-4524-bf5f-dd7f1ff29ae1</guid>
      <link>https://executivesecurity.transistor.fm/episodes/building-culture-navigating-careers-with-jim-alkove-ceo-of-oleria</link>
      <description>
        <![CDATA[<p>Jim Alkove, CEO and co-founder of Olaria, shares his career journey and insights on cybersecurity training and becoming a board advisor. He emphasizes the importance of starting at the beginning and gaining experience in software engineering during his time at Microsoft. Alkove highlights the need for a more diverse pool of candidates and situational training to meet the workforce demands of the cybersecurity industry. He also discusses the significance of company culture and values in building successful teams. Alkove provides advice on moving laterally to gain broader skills and transitioning to advisory roles in early-stage companies.</p><p><strong>Key Takeaways</strong></p><ul><li>Move laterally to gain broader skillsets while in early-stage of careers.</li><li>Training needs to be more accessible to a diverse pool of candidates in order to meet the demands of the cybersecurity industry.</li><li>Company culture and values are crucial in building successful teams.</li><li>Write down your goals, be humble, and be open to learning and criticism.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jim Alkove, CEO and co-founder of Olaria, shares his career journey and insights on cybersecurity training and becoming a board advisor. He emphasizes the importance of starting at the beginning and gaining experience in software engineering during his time at Microsoft. Alkove highlights the need for a more diverse pool of candidates and situational training to meet the workforce demands of the cybersecurity industry. He also discusses the significance of company culture and values in building successful teams. Alkove provides advice on moving laterally to gain broader skills and transitioning to advisory roles in early-stage companies.</p><p><strong>Key Takeaways</strong></p><ul><li>Move laterally to gain broader skillsets while in early-stage of careers.</li><li>Training needs to be more accessible to a diverse pool of candidates in order to meet the demands of the cybersecurity industry.</li><li>Company culture and values are crucial in building successful teams.</li><li>Write down your goals, be humble, and be open to learning and criticism.</li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 18 Sep 2024 09:28:57 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/bee5a00c/e6d5aa94.mp3" length="50204647" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>2091</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Jim Alkove, CEO and co-founder of Olaria, shares his career journey and insights on cybersecurity training and becoming a board advisor. He emphasizes the importance of starting at the beginning and gaining experience in software engineering during his time at Microsoft. Alkove highlights the need for a more diverse pool of candidates and situational training to meet the workforce demands of the cybersecurity industry. He also discusses the significance of company culture and values in building successful teams. Alkove provides advice on moving laterally to gain broader skills and transitioning to advisory roles in early-stage companies.</p><p><strong>Key Takeaways</strong></p><ul><li>Move laterally to gain broader skillsets while in early-stage of careers.</li><li>Training needs to be more accessible to a diverse pool of candidates in order to meet the demands of the cybersecurity industry.</li><li>Company culture and values are crucial in building successful teams.</li><li>Write down your goals, be humble, and be open to learning and criticism.</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Expanding Cybersecurity Careers Beyond Hacking with Ed Adams, CEO of Security Innovation</title>
      <itunes:title>Expanding Cybersecurity Careers Beyond Hacking with Ed Adams, CEO of Security Innovation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e97df8b9-de9b-4db0-a148-bfc5a6a24a86</guid>
      <link>https://executivesecurity.transistor.fm/episodes/expanding-cybersecurity-careers-beyond-hacking</link>
      <description>
        <![CDATA[<p>In this episode, Gene Fay interviews Ed Adams, President and CEO at Security Innovation, about his journey into cybersecurity and his work in advancing software security practices. Ed shares his story of transitioning from quality assurance in software at Rational Software to founding Security Innovation, a company focused on application security and training. Ed also dives into his book, See Yourself in Cybersecurity Careers Beyond Hacking, which highlights the many career paths available in the cybersecurity industry beyond hands-on keyboard roles. He discusses the cybersecurity talent shortage, particularly how it affects underrepresented groups, and the need for organizations to rethink how they hire and retain talent.</p><p>Takeaways:</p><ul><li>There are many ways to start a career in cybersecurity, even from non-technical backgrounds.</li><li>Security is an integral part of software quality can help developers and organizations create more secure, reliable applications.</li><li>The book, See Yourself in Cybersecurity Careers Beyond Hacking, focuses on educating the next generation of cybersecurity professionals and promoting diversity in the field.</li><li>The cybersecurity talent shortage is not about the lack of skilled individuals, but about outdated hiring practices and insufficient investment in talent development.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Gene Fay interviews Ed Adams, President and CEO at Security Innovation, about his journey into cybersecurity and his work in advancing software security practices. Ed shares his story of transitioning from quality assurance in software at Rational Software to founding Security Innovation, a company focused on application security and training. Ed also dives into his book, See Yourself in Cybersecurity Careers Beyond Hacking, which highlights the many career paths available in the cybersecurity industry beyond hands-on keyboard roles. He discusses the cybersecurity talent shortage, particularly how it affects underrepresented groups, and the need for organizations to rethink how they hire and retain talent.</p><p>Takeaways:</p><ul><li>There are many ways to start a career in cybersecurity, even from non-technical backgrounds.</li><li>Security is an integral part of software quality can help developers and organizations create more secure, reliable applications.</li><li>The book, See Yourself in Cybersecurity Careers Beyond Hacking, focuses on educating the next generation of cybersecurity professionals and promoting diversity in the field.</li><li>The cybersecurity talent shortage is not about the lack of skilled individuals, but about outdated hiring practices and insufficient investment in talent development.</li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 11 Sep 2024 06:41:39 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/0e7c7ba2/636dbd94.mp3" length="36095209" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>1503</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Gene Fay interviews Ed Adams, President and CEO at Security Innovation, about his journey into cybersecurity and his work in advancing software security practices. Ed shares his story of transitioning from quality assurance in software at Rational Software to founding Security Innovation, a company focused on application security and training. Ed also dives into his book, See Yourself in Cybersecurity Careers Beyond Hacking, which highlights the many career paths available in the cybersecurity industry beyond hands-on keyboard roles. He discusses the cybersecurity talent shortage, particularly how it affects underrepresented groups, and the need for organizations to rethink how they hire and retain talent.</p><p>Takeaways:</p><ul><li>There are many ways to start a career in cybersecurity, even from non-technical backgrounds.</li><li>Security is an integral part of software quality can help developers and organizations create more secure, reliable applications.</li><li>The book, See Yourself in Cybersecurity Careers Beyond Hacking, focuses on educating the next generation of cybersecurity professionals and promoting diversity in the field.</li><li>The cybersecurity talent shortage is not about the lack of skilled individuals, but about outdated hiring practices and insufficient investment in talent development.</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Maturing Building Security in with Sammy Migues of Imbricate Security</title>
      <itunes:title>Maturing Building Security in with Sammy Migues of Imbricate Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef29bc15-b334-4000-a904-954c63e3986f</guid>
      <link>https://executivesecurity.transistor.fm/episodes/maturing-building-security-in-with-sammy-migues-of-imbricate-security</link>
      <description>
        <![CDATA[<p>In this episode, Gene Fay interviews Sammy Migues, Principal at Imbricate Security, about his journey into cybersecurity and his work on the Building Security in Maturity Model (BSIMM). Sammy shares his experience starting in computer science in the late 1970s and how he became a computer security professional. He explains the motivation behind creating the BSIMM and how it helps organizations measure and improve their software security practices. Sammy also discusses the trifecta for career success, which includes setting a strategy, translating business objectives into actionable steps, and contextualizing skills within the organization. Finally, Sammy shares his thoughts on the cybersecurity shortage and the challenges in hiring and retaining skilled professionals.</p><p><strong>Takeaways</strong></p><ul><li>Starting a career in cybersecurity can begin with a degree in computer science and a willingness to adapt and learn as the industry evolves.</li><li>The Building Security in Maturity Model (BSIM) is a framework that helps organizations measure and improve their software security practices.</li><li>The trifecta for career success in management includes setting a strategy, translating business objectives into actionable steps, and contextualizing skills within the organization.</li><li>The cybersecurity shortage is not just a lack of professionals, but also a result of challenging hiring processes and unrealistic job requirements.</li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Gene Fay interviews Sammy Migues, Principal at Imbricate Security, about his journey into cybersecurity and his work on the Building Security in Maturity Model (BSIMM). Sammy shares his experience starting in computer science in the late 1970s and how he became a computer security professional. He explains the motivation behind creating the BSIMM and how it helps organizations measure and improve their software security practices. Sammy also discusses the trifecta for career success, which includes setting a strategy, translating business objectives into actionable steps, and contextualizing skills within the organization. Finally, Sammy shares his thoughts on the cybersecurity shortage and the challenges in hiring and retaining skilled professionals.</p><p><strong>Takeaways</strong></p><ul><li>Starting a career in cybersecurity can begin with a degree in computer science and a willingness to adapt and learn as the industry evolves.</li><li>The Building Security in Maturity Model (BSIM) is a framework that helps organizations measure and improve their software security practices.</li><li>The trifecta for career success in management includes setting a strategy, translating business objectives into actionable steps, and contextualizing skills within the organization.</li><li>The cybersecurity shortage is not just a lack of professionals, but also a result of challenging hiring processes and unrealistic job requirements.</li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 31 Jul 2024 10:30:35 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/c7c4f98e/1862b513.mp3" length="46667337" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>1943</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Gene Fay interviews Sammy Migues, Principal at Imbricate Security, about his journey into cybersecurity and his work on the Building Security in Maturity Model (BSIMM). Sammy shares his experience starting in computer science in the late 1970s and how he became a computer security professional. He explains the motivation behind creating the BSIMM and how it helps organizations measure and improve their software security practices. Sammy also discusses the trifecta for career success, which includes setting a strategy, translating business objectives into actionable steps, and contextualizing skills within the organization. Finally, Sammy shares his thoughts on the cybersecurity shortage and the challenges in hiring and retaining skilled professionals.</p><p><strong>Takeaways</strong></p><ul><li>Starting a career in cybersecurity can begin with a degree in computer science and a willingness to adapt and learn as the industry evolves.</li><li>The Building Security in Maturity Model (BSIM) is a framework that helps organizations measure and improve their software security practices.</li><li>The trifecta for career success in management includes setting a strategy, translating business objectives into actionable steps, and contextualizing skills within the organization.</li><li>The cybersecurity shortage is not just a lack of professionals, but also a result of challenging hiring processes and unrealistic job requirements.</li></ul><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Pros &amp; Cons of Experience at Large Corporations vs Start-Ups with Jeff Hudesman, CISO of Pinwheel</title>
      <itunes:title>Pros &amp; Cons of Experience at Large Corporations vs Start-Ups with Jeff Hudesman, CISO of Pinwheel</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">404e59f1-2a03-4dc4-be3a-4acbb2053d27</guid>
      <link>https://executivesecurity.transistor.fm/episodes/jeff-hudesman-ciso-of-pinwheel</link>
      <description>
        <![CDATA[<p><strong>Summary:</strong><br>In this episode, Gene Fay interviews Jeff Hudesman, CISO at Pinwheel, about his career in cybersecurity. Jeff shares his journey from starting as an intern at Memorial Sloan Kettering Cancer Center to working at Sony and eventually joining Pinwheel. He discusses the differences between working in large companies like Sony and startups, highlighting the ability to be impactful and the agility of startups. Jeff also shares an anecdote about a security incident at a water treatment facility and emphasizes the importance of planning in cybersecurity.</p><p><strong>Takeaways:</strong></p><ul><li>Working in both large companies and startups can provide valuable experiences in cybersecurity.</li><li>Startups offer the opportunity to be impactful and make a significant difference.</li><li>Cybersecurity incidents can occur even in critical infrastructure facilities like water treatment plants.</li><li>Planning is indispensable in cybersecurity, as threats are dynamic and constantly changing.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Summary:</strong><br>In this episode, Gene Fay interviews Jeff Hudesman, CISO at Pinwheel, about his career in cybersecurity. Jeff shares his journey from starting as an intern at Memorial Sloan Kettering Cancer Center to working at Sony and eventually joining Pinwheel. He discusses the differences between working in large companies like Sony and startups, highlighting the ability to be impactful and the agility of startups. Jeff also shares an anecdote about a security incident at a water treatment facility and emphasizes the importance of planning in cybersecurity.</p><p><strong>Takeaways:</strong></p><ul><li>Working in both large companies and startups can provide valuable experiences in cybersecurity.</li><li>Startups offer the opportunity to be impactful and make a significant difference.</li><li>Cybersecurity incidents can occur even in critical infrastructure facilities like water treatment plants.</li><li>Planning is indispensable in cybersecurity, as threats are dynamic and constantly changing.</li></ul>]]>
      </content:encoded>
      <pubDate>Fri, 21 Jun 2024 08:10:12 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/6224af07/9b986e89.mp3" length="20775368" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>1297</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Summary:</strong><br>In this episode, Gene Fay interviews Jeff Hudesman, CISO at Pinwheel, about his career in cybersecurity. Jeff shares his journey from starting as an intern at Memorial Sloan Kettering Cancer Center to working at Sony and eventually joining Pinwheel. He discusses the differences between working in large companies like Sony and startups, highlighting the ability to be impactful and the agility of startups. Jeff also shares an anecdote about a security incident at a water treatment facility and emphasizes the importance of planning in cybersecurity.</p><p><strong>Takeaways:</strong></p><ul><li>Working in both large companies and startups can provide valuable experiences in cybersecurity.</li><li>Startups offer the opportunity to be impactful and make a significant difference.</li><li>Cybersecurity incidents can occur even in critical infrastructure facilities like water treatment plants.</li><li>Planning is indispensable in cybersecurity, as threats are dynamic and constantly changing.</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From Gaming to Cybersecurity with Omer Cohen, CISO of Descope</title>
      <itunes:title>From Gaming to Cybersecurity with Omer Cohen, CISO of Descope</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e587f596-b4b1-413a-a127-db8fec189ebe</guid>
      <link>https://executivesecurity.transistor.fm/episodes/from-gaming-to-cybersecurity-with-omer-cohen-ciso-of-descope</link>
      <description>
        <![CDATA[<p>Omer Cohen CISO of Descope shares his career story, highlights include:</p><ul><li>Joy in the constant variety of work in incident response</li><li>Benefits of a mature approach to cybersecurity as a start-up</li><li>Seeing his work in cybersecurity result in a real-world impact and the arrest and prosecution of cybercriminals</li><li>B-Sides and the fun of small in person meet-ups</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Omer Cohen CISO of Descope shares his career story, highlights include:</p><ul><li>Joy in the constant variety of work in incident response</li><li>Benefits of a mature approach to cybersecurity as a start-up</li><li>Seeing his work in cybersecurity result in a real-world impact and the arrest and prosecution of cybercriminals</li><li>B-Sides and the fun of small in person meet-ups</li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 16 May 2024 09:04:33 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/8ad5bd24/35bffadd.mp3" length="33920831" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>1413</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Omer Cohen CISO of Descope shares his career story, highlights include:</p><ul><li>Joy in the constant variety of work in incident response</li><li>Benefits of a mature approach to cybersecurity as a start-up</li><li>Seeing his work in cybersecurity result in a real-world impact and the arrest and prosecution of cybercriminals</li><li>B-Sides and the fun of small in person meet-ups</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, gaming, incident response, ciso</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Advice From a Cybersecurity Recruiter With Kyle McIntyre of McIntyre Assoc.</title>
      <itunes:title>Advice From a Cybersecurity Recruiter With Kyle McIntyre of McIntyre Assoc.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9075960c-ee5d-4def-9e4e-0614153e532d</guid>
      <link>https://executivesecurity.transistor.fm/episodes/advice-from-a-cybersecurity-recruiter-with-kyle-mcintyre-of-mcintyre-assoc</link>
      <description>
        <![CDATA[<p>Cybersecurity recruiter Kyle McIntyre offers unique guidance based on his work as a retained search specialist working with hiring managers (VPs &amp; C-Levels) in the cybersecurity industry in this episode. He and Gene discuss: </p><ul><li>How to conduct preliminary research on potential employers and career paths</li><li>How to reverse engineer desirable backgrounds to demystify potential career paths</li><li>Tips on crafting effective &amp; thoughtful outreach to hiring managers</li><li>Advice on optimizing your resume &amp; profile for breaking into cyber with no prior industry experience</li><li>How to manage imposter syndrome, anxiety and self-doubt during a job search</li><li>More</li></ul><p>Kyle McIntyre on LinkedIn: <a href="https://www.linkedin.com/in/thekylemcintyre/">https://www.linkedin.com/in/thekylemcintyre/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity recruiter Kyle McIntyre offers unique guidance based on his work as a retained search specialist working with hiring managers (VPs &amp; C-Levels) in the cybersecurity industry in this episode. He and Gene discuss: </p><ul><li>How to conduct preliminary research on potential employers and career paths</li><li>How to reverse engineer desirable backgrounds to demystify potential career paths</li><li>Tips on crafting effective &amp; thoughtful outreach to hiring managers</li><li>Advice on optimizing your resume &amp; profile for breaking into cyber with no prior industry experience</li><li>How to manage imposter syndrome, anxiety and self-doubt during a job search</li><li>More</li></ul><p>Kyle McIntyre on LinkedIn: <a href="https://www.linkedin.com/in/thekylemcintyre/">https://www.linkedin.com/in/thekylemcintyre/</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 11 Apr 2024 07:54:05 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/f5f5392b/cdc7b539.mp3" length="51194747" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OQHpKJCk8oJIcAr-vOpCodN9KNs7mpxRK1td-nZltSI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2OTk2ODEv/MTcwNTk1ODA5My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1280</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity recruiter Kyle McIntyre offers unique guidance based on his work as a retained search specialist working with hiring managers (VPs &amp; C-Levels) in the cybersecurity industry in this episode. He and Gene discuss: </p><ul><li>How to conduct preliminary research on potential employers and career paths</li><li>How to reverse engineer desirable backgrounds to demystify potential career paths</li><li>Tips on crafting effective &amp; thoughtful outreach to hiring managers</li><li>Advice on optimizing your resume &amp; profile for breaking into cyber with no prior industry experience</li><li>How to manage imposter syndrome, anxiety and self-doubt during a job search</li><li>More</li></ul><p>Kyle McIntyre on LinkedIn: <a href="https://www.linkedin.com/in/thekylemcintyre/">https://www.linkedin.com/in/thekylemcintyre/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tenets For Managing Yourself with Tom Heiser</title>
      <itunes:title>Tenets For Managing Yourself with Tom Heiser</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4bca3cf0-f8ef-4303-9df0-646f18899d03</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tenets-for-managing-yourself-with-tom-heiser</link>
      <description>
        <![CDATA[<p>In this episode, Gene Fay interviews Tom Heiser about his journey and shares tenets for managing oneself. The conversation covers topics such as execution, accountability, expressing passion, doing the best job possible, getting outside one's comfort zone, and focusing on what one can control.</p><p><strong>Takeaways</strong></p><p>Execution is key to success. Just do it.<br>Accountability is important in personal and professional growth.<br>Expressing passion and committing to one's work leads to fulfillment and success.<br>Doing the best job possible is a pathway to career advancement.<br>Getting outside one's comfort zone fosters personal and professional growth.<br>Focus on what you can control and be present in the current situation.<br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Gene Fay interviews Tom Heiser about his journey and shares tenets for managing oneself. The conversation covers topics such as execution, accountability, expressing passion, doing the best job possible, getting outside one's comfort zone, and focusing on what one can control.</p><p><strong>Takeaways</strong></p><p>Execution is key to success. Just do it.<br>Accountability is important in personal and professional growth.<br>Expressing passion and committing to one's work leads to fulfillment and success.<br>Doing the best job possible is a pathway to career advancement.<br>Getting outside one's comfort zone fosters personal and professional growth.<br>Focus on what you can control and be present in the current situation.<br></p>]]>
      </content:encoded>
      <pubDate>Thu, 14 Mar 2024 11:10:03 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/a00b21e2/b349cd29.mp3" length="88557132" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>2214</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Gene Fay interviews Tom Heiser about his journey and shares tenets for managing oneself. The conversation covers topics such as execution, accountability, expressing passion, doing the best job possible, getting outside one's comfort zone, and focusing on what one can control.</p><p><strong>Takeaways</strong></p><p>Execution is key to success. Just do it.<br>Accountability is important in personal and professional growth.<br>Expressing passion and committing to one's work leads to fulfillment and success.<br>Doing the best job possible is a pathway to career advancement.<br>Getting outside one's comfort zone fosters personal and professional growth.<br>Focus on what you can control and be present in the current situation.<br></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Power of a Business Perspective With Neil Bahadur of Wells Fargo</title>
      <itunes:title>The Power of a Business Perspective With Neil Bahadur of Wells Fargo</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b4888382-7920-47fa-8962-b015f31147c9</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-power-of-a-business-perspective-with-neil-bahadur-of-wells-fargo</link>
      <description>
        <![CDATA[<p>Neil Bahadur, Head of Product in Cybersecurity at Wells Fargo, developed a unique and valuable perspective by switching from security to business development and back to security. </p><p>In this episode, he and Gene discuss that transition and what he learned from it. They also discuss cybersecurity trends those new to the industry should be aware of, and more.</p><p>Neil Bahadur on LinkedIn: <a href="https://www.linkedin.com/in/neilbahadur/">https://www.linkedin.com/in/neilbahadur/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Neil Bahadur, Head of Product in Cybersecurity at Wells Fargo, developed a unique and valuable perspective by switching from security to business development and back to security. </p><p>In this episode, he and Gene discuss that transition and what he learned from it. They also discuss cybersecurity trends those new to the industry should be aware of, and more.</p><p>Neil Bahadur on LinkedIn: <a href="https://www.linkedin.com/in/neilbahadur/">https://www.linkedin.com/in/neilbahadur/</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Feb 2024 06:47:17 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/5ca6e7d9/b7c60161.mp3" length="59315687" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AH5uzmXl0FEEjyxqB_a1q9QXGAYWn6zb2_J2jMDsnV4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2OTY0OTUv/MTcwNTk1NjM0NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1483</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Neil Bahadur, Head of Product in Cybersecurity at Wells Fargo, developed a unique and valuable perspective by switching from security to business development and back to security. </p><p>In this episode, he and Gene discuss that transition and what he learned from it. They also discuss cybersecurity trends those new to the industry should be aware of, and more.</p><p>Neil Bahadur on LinkedIn: <a href="https://www.linkedin.com/in/neilbahadur/">https://www.linkedin.com/in/neilbahadur/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Are You Asking the Right Questions? With CISO Aaron Katz</title>
      <itunes:title>Are You Asking the Right Questions? With CISO Aaron Katz</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6939b320-a53c-4850-a020-96b58fc9da79</guid>
      <link>https://executivesecurity.transistor.fm/episodes/are-you-asking-the-right-questions-with-ciso-aaron-katz</link>
      <description>
        <![CDATA[<p>One of the most important parts of being a cybersecurity professional is knowing how to ask the right questions, says CISO Aaron Katz. </p><p><br>Aaron started his career as a consultant, and says that's where he honed his question skills. He thinks all aspiring cybersecurity pros should start out with consulting gigs – you learn the business side and what questions to ask, plus get a feel for cybersecurity as a whole, rather than just one tool or product.</p><p>He and Gene talk about this career path, plus his journey to CISO, why hiring managers are not good at finding cybersecurity candidates, and more.</p><p><br>Aaron Katz on LinkedIn: <a href="https://www.linkedin.com/in/pendraggon87/">https://www.linkedin.com/in/pendraggon87/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>One of the most important parts of being a cybersecurity professional is knowing how to ask the right questions, says CISO Aaron Katz. </p><p><br>Aaron started his career as a consultant, and says that's where he honed his question skills. He thinks all aspiring cybersecurity pros should start out with consulting gigs – you learn the business side and what questions to ask, plus get a feel for cybersecurity as a whole, rather than just one tool or product.</p><p>He and Gene talk about this career path, plus his journey to CISO, why hiring managers are not good at finding cybersecurity candidates, and more.</p><p><br>Aaron Katz on LinkedIn: <a href="https://www.linkedin.com/in/pendraggon87/">https://www.linkedin.com/in/pendraggon87/</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Feb 2024 06:24:39 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/fd2a91a9/ae6d9d5c.mp3" length="43970303" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/QttmKv6x2-5_JYMRY6ygxpaHs7xXkhgSFDlyz7bsiAk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2MDI3Njgv/MTcwNTk1NjQyNy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1099</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>One of the most important parts of being a cybersecurity professional is knowing how to ask the right questions, says CISO Aaron Katz. </p><p><br>Aaron started his career as a consultant, and says that's where he honed his question skills. He thinks all aspiring cybersecurity pros should start out with consulting gigs – you learn the business side and what questions to ask, plus get a feel for cybersecurity as a whole, rather than just one tool or product.</p><p>He and Gene talk about this career path, plus his journey to CISO, why hiring managers are not good at finding cybersecurity candidates, and more.</p><p><br>Aaron Katz on LinkedIn: <a href="https://www.linkedin.com/in/pendraggon87/">https://www.linkedin.com/in/pendraggon87/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Combine Giving Back With CPE Credits With Ed Giles of Erus Consulting</title>
      <itunes:title>How to Combine Giving Back With CPE Credits With Ed Giles of Erus Consulting</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e6b83c45-942f-4c53-bcd9-645be28dcd71</guid>
      <link>https://executivesecurity.transistor.fm/episodes/how-to-combine-giving-back-with-cpe-credits-with-ed-giles-of-erus-consulting</link>
      <description>
        <![CDATA[<p>Ed Giles runs cybersecurity seminars for seniors, and wants to spread the word that it's a great way to both get your CPEs and give back to your community. </p><p>Ed and Gene talk about those seminars, plus Ed's journey from English major to cybersecurity professional, the importance of thinking about security as a business enabler, and more.</p><p>Ed Giles on LinkedIn: <a href="https://www.linkedin.com/in/evgiles/">https://www.linkedin.com/in/evgiles/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ed Giles runs cybersecurity seminars for seniors, and wants to spread the word that it's a great way to both get your CPEs and give back to your community. </p><p>Ed and Gene talk about those seminars, plus Ed's journey from English major to cybersecurity professional, the importance of thinking about security as a business enabler, and more.</p><p>Ed Giles on LinkedIn: <a href="https://www.linkedin.com/in/evgiles/">https://www.linkedin.com/in/evgiles/</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 31 Jan 2024 10:34:48 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/609cae37/fd41e446.mp3" length="42785409" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CMYPP1ishtw4JLc2-XQMIHNXQAmRPueUEaOpozQ6C7g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1NjY1NTcv/MTcwNTk1NjEyNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1069</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Ed Giles runs cybersecurity seminars for seniors, and wants to spread the word that it's a great way to both get your CPEs and give back to your community. </p><p>Ed and Gene talk about those seminars, plus Ed's journey from English major to cybersecurity professional, the importance of thinking about security as a business enabler, and more.</p><p>Ed Giles on LinkedIn: <a href="https://www.linkedin.com/in/evgiles/">https://www.linkedin.com/in/evgiles/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How AI Will Change Cybersecurity Jobs With Tony Pietrocola of AgileBlue</title>
      <itunes:title>How AI Will Change Cybersecurity Jobs With Tony Pietrocola of AgileBlue</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">994228dc-c127-4aed-849c-77b4ff220525</guid>
      <link>https://executivesecurity.transistor.fm/episodes/how-ai-will-change-cybersecurity-jobs-with-tony-pietrocola-of-agileblue</link>
      <description>
        <![CDATA[<p>How is AI going to change entry-level cybersecurity jobs? Gene and AgileBlue president Tony Pietrocola discuss in this episode.</p><p>They also talk about:</p><ul><li>Tony's career and what AgileBlue does</li><li>How AI will affect both cybersecurity and cybercrime</li><li>What he's looking for in interns </li></ul><p>Tony Pietrocola on LinkedIn: <a href="https://www.linkedin.com/in/tonypietrocola/">https://www.linkedin.com/in/tonypietrocola/</a><br>AgileBlue: <a href="https://agileblue.com/">https://agileblue.com/</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How is AI going to change entry-level cybersecurity jobs? Gene and AgileBlue president Tony Pietrocola discuss in this episode.</p><p>They also talk about:</p><ul><li>Tony's career and what AgileBlue does</li><li>How AI will affect both cybersecurity and cybercrime</li><li>What he's looking for in interns </li></ul><p>Tony Pietrocola on LinkedIn: <a href="https://www.linkedin.com/in/tonypietrocola/">https://www.linkedin.com/in/tonypietrocola/</a><br>AgileBlue: <a href="https://agileblue.com/">https://agileblue.com/</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 31 Jan 2024 10:07:15 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/8ddc9113/2a04593c.mp3" length="29631184" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YT16wP523N-at51kxlLpTU79-yqfG6hOQhADOQarg4s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MTQ4NTEv/MTcwNTk1NjA0NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>741</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How is AI going to change entry-level cybersecurity jobs? Gene and AgileBlue president Tony Pietrocola discuss in this episode.</p><p>They also talk about:</p><ul><li>Tony's career and what AgileBlue does</li><li>How AI will affect both cybersecurity and cybercrime</li><li>What he's looking for in interns </li></ul><p>Tony Pietrocola on LinkedIn: <a href="https://www.linkedin.com/in/tonypietrocola/">https://www.linkedin.com/in/tonypietrocola/</a><br>AgileBlue: <a href="https://agileblue.com/">https://agileblue.com/</a></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Get Started as a Pen Tester With Phillip Wylie </title>
      <itunes:title>How to Get Started as a Pen Tester With Phillip Wylie </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b75e935d-b01a-4c4d-8ca6-618f9c7f4d31</guid>
      <link>https://executivesecurity.transistor.fm/episodes/how-to-get-started-as-a-pen-tester-with-phillip-wylie</link>
      <description>
        <![CDATA[<p>Want to start a career as a pen tester? Phillip Wylie literally wrote the book on the topic. </p><p>Gene and Phillip, co-author of The Pentester Blueprint: Starting a Career as an Ethical Hacker and host of the Phillip Wylie Show, have a wide-ranging and advice-filled conversation on:</p><ul><li>His career journey and his podcast</li><li>Starting a pen testing career</li><li>Collegiate Cyber Defense Competitions</li><li>How to leverage B-Sides</li><li>More</li></ul><p>Phillip Wylie on LinkedIn: <a href="https://www.linkedin.com/in/phillipwylie/">https://www.linkedin.com/in/phillipwylie/</a><br>The Pentester Blueprint: <a href="https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307">https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Want to start a career as a pen tester? Phillip Wylie literally wrote the book on the topic. </p><p>Gene and Phillip, co-author of The Pentester Blueprint: Starting a Career as an Ethical Hacker and host of the Phillip Wylie Show, have a wide-ranging and advice-filled conversation on:</p><ul><li>His career journey and his podcast</li><li>Starting a pen testing career</li><li>Collegiate Cyber Defense Competitions</li><li>How to leverage B-Sides</li><li>More</li></ul><p>Phillip Wylie on LinkedIn: <a href="https://www.linkedin.com/in/phillipwylie/">https://www.linkedin.com/in/phillipwylie/</a><br>The Pentester Blueprint: <a href="https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307">https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 25 Jan 2024 06:21:05 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/655c3003/2436c030.mp3" length="40508563" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MRr-FOtc0AlN3iHoyZN-Tku0UYupllVhdlJK5Ds_dRc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MDQ5NTQv/MTcwNTk1NTgyMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1013</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Want to start a career as a pen tester? Phillip Wylie literally wrote the book on the topic. </p><p>Gene and Phillip, co-author of The Pentester Blueprint: Starting a Career as an Ethical Hacker and host of the Phillip Wylie Show, have a wide-ranging and advice-filled conversation on:</p><ul><li>His career journey and his podcast</li><li>Starting a pen testing career</li><li>Collegiate Cyber Defense Competitions</li><li>How to leverage B-Sides</li><li>More</li></ul><p>Phillip Wylie on LinkedIn: <a href="https://www.linkedin.com/in/phillipwylie/">https://www.linkedin.com/in/phillipwylie/</a><br>The Pentester Blueprint: <a href="https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307">https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Changing CIO Role With Kimberly Anstett of Trellix</title>
      <itunes:title>The Changing CIO Role With Kimberly Anstett of Trellix</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">166e8baf-5523-456a-8886-adfb6d4d0db7</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-changing-cio-role-with-kimberly-anstett-of-trellix</link>
      <description>
        <![CDATA[<p>Kimberly Anstett has had a C-level cybersecurity position for about a decade. She's seen the CIO role transform, and shares her thoughts on that transformation in this episode. </p><p>She and Gene discuss her journey to CIO, how to inspire the next generation to embrace STEM careers, what she's looking for when hiring, and more. </p><p>Kimberly Anstett on LinkedIn: <a href="https://www.linkedin.com/in/kimberly-anstett-6b3a259/">https://www.linkedin.com/in/kimberly-anstett-6b3a259/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Kimberly Anstett has had a C-level cybersecurity position for about a decade. She's seen the CIO role transform, and shares her thoughts on that transformation in this episode. </p><p>She and Gene discuss her journey to CIO, how to inspire the next generation to embrace STEM careers, what she's looking for when hiring, and more. </p><p>Kimberly Anstett on LinkedIn: <a href="https://www.linkedin.com/in/kimberly-anstett-6b3a259/">https://www.linkedin.com/in/kimberly-anstett-6b3a259/</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 18 Jan 2024 10:37:39 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/2260c0ef/60b1c562.mp3" length="51277883" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yuYyMoibSPjZ8LP-JqMQDT3yFVjWIzN9RxhSAIvk6uY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2NjcyOTMv/MTcwMzg3OTA4Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1281</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Kimberly Anstett has had a C-level cybersecurity position for about a decade. She's seen the CIO role transform, and shares her thoughts on that transformation in this episode. </p><p>She and Gene discuss her journey to CIO, how to inspire the next generation to embrace STEM careers, what she's looking for when hiring, and more. </p><p>Kimberly Anstett on LinkedIn: <a href="https://www.linkedin.com/in/kimberly-anstett-6b3a259/">https://www.linkedin.com/in/kimberly-anstett-6b3a259/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Reskill to Work in Cybersecurity With Christine Gadsby of BlackBerry</title>
      <itunes:title>How to Reskill to Work in Cybersecurity With Christine Gadsby of BlackBerry</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d1bb870a-4233-4b1b-afe7-804feb850330</guid>
      <link>https://executivesecurity.transistor.fm/episodes/how-to-reskill-to-work-in-cybersecurity-with-christine-gadsby-of-blackberry</link>
      <description>
        <![CDATA[<p>Why should you work in cybersecurity? Because two things that aren't going away are tech and crime, says BlackBerry VP of Product Security Operations Christine Gadsby. </p><p>Christine and Gene talk about her journey from working in IT out of necessity to cybersecurity VP, how to reskill into cybersecurity, the Leadership Bench Program she developed at BlackBerry, her advice to those discouraged by the job hunt, and more.</p><p><br>Christine Gadsby on LinkedIn: <a href="https://www.linkedin.com/in/christinegadsby/">https://www.linkedin.com/in/christinegadsby/</a></p><p>Three Reasons Women Should Reskill to Work in Cybersecurity: <a href="https://blogs.blackberry.com/en/2023/03/3-reasons-women-should-reskill-to-work-in-cybersecurity">https://blogs.blackberry.com/en/2023/03/3-reasons-women-should-reskill-to-work-in-cybersecurity</a></p><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Why should you work in cybersecurity? Because two things that aren't going away are tech and crime, says BlackBerry VP of Product Security Operations Christine Gadsby. </p><p>Christine and Gene talk about her journey from working in IT out of necessity to cybersecurity VP, how to reskill into cybersecurity, the Leadership Bench Program she developed at BlackBerry, her advice to those discouraged by the job hunt, and more.</p><p><br>Christine Gadsby on LinkedIn: <a href="https://www.linkedin.com/in/christinegadsby/">https://www.linkedin.com/in/christinegadsby/</a></p><p>Three Reasons Women Should Reskill to Work in Cybersecurity: <a href="https://blogs.blackberry.com/en/2023/03/3-reasons-women-should-reskill-to-work-in-cybersecurity">https://blogs.blackberry.com/en/2023/03/3-reasons-women-should-reskill-to-work-in-cybersecurity</a></p><p> </p>]]>
      </content:encoded>
      <pubDate>Fri, 29 Dec 2023 09:52:13 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/3b775580/89a906f9.mp3" length="45636935" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/45fIp9sQcYbgnA6ZvZtSwFga97X_Uxy4ZPNfi2BIMgI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0OTA4OTAv/MTY5NDAyNDAzMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1141</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Why should you work in cybersecurity? Because two things that aren't going away are tech and crime, says BlackBerry VP of Product Security Operations Christine Gadsby. </p><p>Christine and Gene talk about her journey from working in IT out of necessity to cybersecurity VP, how to reskill into cybersecurity, the Leadership Bench Program she developed at BlackBerry, her advice to those discouraged by the job hunt, and more.</p><p><br>Christine Gadsby on LinkedIn: <a href="https://www.linkedin.com/in/christinegadsby/">https://www.linkedin.com/in/christinegadsby/</a></p><p>Three Reasons Women Should Reskill to Work in Cybersecurity: <a href="https://blogs.blackberry.com/en/2023/03/3-reasons-women-should-reskill-to-work-in-cybersecurity">https://blogs.blackberry.com/en/2023/03/3-reasons-women-should-reskill-to-work-in-cybersecurity</a></p><p> </p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Advice for Entry-Level Candidates With Jim Moran of Lifelong Learner Holdings</title>
      <itunes:title>Advice for Entry-Level Candidates With Jim Moran of Lifelong Learner Holdings</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">79c7fc48-cd5b-4c06-8c58-9a65493d8ce0</guid>
      <link>https://executivesecurity.transistor.fm/episodes/advice-for-entry-level-candidates-with-jim-moran-of-lifelong-learner-holdings</link>
      <description>
        <![CDATA[<p>Jim Moran has had a long and varied cybersecurity career, and offers some fantastic advice for those just starting out. </p><p>He and Gene talk about cybersecurity careers, what he's looking for in entry-level candidates, how to find the best career path for you, and more.</p><p><br>Jim Moran on LinkedIn: <a href="https://www.linkedin.com/in/jim-moran-0b112925/">https://www.linkedin.com/in/jim-moran-0b112925/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jim Moran has had a long and varied cybersecurity career, and offers some fantastic advice for those just starting out. </p><p>He and Gene talk about cybersecurity careers, what he's looking for in entry-level candidates, how to find the best career path for you, and more.</p><p><br>Jim Moran on LinkedIn: <a href="https://www.linkedin.com/in/jim-moran-0b112925/">https://www.linkedin.com/in/jim-moran-0b112925/</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 07 Dec 2023 10:54:46 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/03a92407/cc998c5c.mp3" length="28962568" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/b9kMn2vyFwYyAImqEgJjq3BUBjwWxIm9b7jKQTl_fQ4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0ODM0MzIv/MTY5MzQzMDU0My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>724</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Jim Moran has had a long and varied cybersecurity career, and offers some fantastic advice for those just starting out. </p><p>He and Gene talk about cybersecurity careers, what he's looking for in entry-level candidates, how to find the best career path for you, and more.</p><p><br>Jim Moran on LinkedIn: <a href="https://www.linkedin.com/in/jim-moran-0b112925/">https://www.linkedin.com/in/jim-moran-0b112925/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Critical Role of Community in Cybersecurity With Diana Kelley of Protect AI</title>
      <itunes:title>The Critical Role of Community in Cybersecurity With Diana Kelley of Protect AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0978f989-962b-441e-b38b-71c6cef5ccd1</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-critical-role-of-community-in-cybersecurity-with-diana-kelley-of-protect-ai</link>
      <description>
        <![CDATA[<p>Diana Kelley feels strongly that community plays a critical role in all careers, but especially cybersecurity. She explains why in this episode.</p><p>She and Gene also talk about increasing the number of females in cybersecurity, what she looks for in entry level candidates, and more. </p><p><br>Diana Kelley on LinkedIn: <a href="https://www.linkedin.com/in/dianakelleysecuritycurve/">https://www.linkedin.com/in/dianakelleysecuritycurve/</a><br>Executive Women's Forum: <a href="https://www.ewf-usa.com/">https://www.ewf-usa.com/</a><br>WICYS: <a href="https://www.wicys.org/">https://www.wicys.org/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Diana Kelley feels strongly that community plays a critical role in all careers, but especially cybersecurity. She explains why in this episode.</p><p>She and Gene also talk about increasing the number of females in cybersecurity, what she looks for in entry level candidates, and more. </p><p><br>Diana Kelley on LinkedIn: <a href="https://www.linkedin.com/in/dianakelleysecuritycurve/">https://www.linkedin.com/in/dianakelleysecuritycurve/</a><br>Executive Women's Forum: <a href="https://www.ewf-usa.com/">https://www.ewf-usa.com/</a><br>WICYS: <a href="https://www.wicys.org/">https://www.wicys.org/</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Nov 2023 07:13:56 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/6369f7be/37d719bc.mp3" length="57207527" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1V6GpUNmsVpU1bPm8SaeoeRmGWH7mr0XyNUZ1Oagnr4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0NzE0OTMv/MTY5MjgyMzkzOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1430</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Diana Kelley feels strongly that community plays a critical role in all careers, but especially cybersecurity. She explains why in this episode.</p><p>She and Gene also talk about increasing the number of females in cybersecurity, what she looks for in entry level candidates, and more. </p><p><br>Diana Kelley on LinkedIn: <a href="https://www.linkedin.com/in/dianakelleysecuritycurve/">https://www.linkedin.com/in/dianakelleysecuritycurve/</a><br>Executive Women's Forum: <a href="https://www.ewf-usa.com/">https://www.ewf-usa.com/</a><br>WICYS: <a href="https://www.wicys.org/">https://www.wicys.org/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Pursuing the Cybersecurity Practitioner Path With John Hammond of Huntress</title>
      <itunes:title>Pursuing the Cybersecurity Practitioner Path With John Hammond of Huntress</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">effe58f8-71a2-4ceb-92c4-e6f324a9f576</guid>
      <link>https://executivesecurity.transistor.fm/episodes/pursuing-the-cybersecurity-practitioner-path-with-john-hammond-of-huntress</link>
      <description>
        <![CDATA[<p>We talk a lot on this podcast about how to advance to the executive level within the cybersecurity field. But what if the C-level is not for you? </p><p>John Hammond is a security practitioner at heart and wants to stay that way. He shares his thoughts on building a practitioner career in this episode. </p><p>He and Gene also talk about his experience working for the Department of Defense and about John's prolific side job as a content creator. </p><p><br>John Hammond on LinkedIn: <a href="https://www.linkedin.com/in/johnhammond010/">https://www.linkedin.com/in/johnhammond010/</a></p><p>John Hammond on YouTube: <a href="https://www.youtube.com/johnhammond010">https://www.youtube.com/johnhammond010</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We talk a lot on this podcast about how to advance to the executive level within the cybersecurity field. But what if the C-level is not for you? </p><p>John Hammond is a security practitioner at heart and wants to stay that way. He shares his thoughts on building a practitioner career in this episode. </p><p>He and Gene also talk about his experience working for the Department of Defense and about John's prolific side job as a content creator. </p><p><br>John Hammond on LinkedIn: <a href="https://www.linkedin.com/in/johnhammond010/">https://www.linkedin.com/in/johnhammond010/</a></p><p>John Hammond on YouTube: <a href="https://www.youtube.com/johnhammond010">https://www.youtube.com/johnhammond010</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 08 Nov 2023 13:53:56 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/88e6faff/bb0a107d.mp3" length="36542554" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ozZXVf-CivXo4XbdyVrnvTrGqJYQwu7yMcQDB3OaziY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0NzE0ODQv/MTY5MjgyMzQyMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>913</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We talk a lot on this podcast about how to advance to the executive level within the cybersecurity field. But what if the C-level is not for you? </p><p>John Hammond is a security practitioner at heart and wants to stay that way. He shares his thoughts on building a practitioner career in this episode. </p><p>He and Gene also talk about his experience working for the Department of Defense and about John's prolific side job as a content creator. </p><p><br>John Hammond on LinkedIn: <a href="https://www.linkedin.com/in/johnhammond010/">https://www.linkedin.com/in/johnhammond010/</a></p><p>John Hammond on YouTube: <a href="https://www.youtube.com/johnhammond010">https://www.youtube.com/johnhammond010</a></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From Help Desk to Cybersecurity With Jeff Farinich of New American Funding</title>
      <itunes:title>From Help Desk to Cybersecurity With Jeff Farinich of New American Funding</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b7ea1204-c5d5-4a9a-801a-b78af8942e36</guid>
      <link>https://executivesecurity.transistor.fm/episodes/from-help-desk-to-cybersecurity-with-jeff-farinich-of-new-american-funding</link>
      <description>
        <![CDATA[<p>Want to make the transition from help desk to cybersecurity? Jeff Farinich has helped others make that transition and he shares his advice in this episode.</p><p>He and Gene also talk about the types of cybersecurity roles, what he looks for in entry level candidates, and more.</p><p>Jeff Farinich on LinkedIn: <a href="https://www.linkedin.com/in/jefffarinich/">https://www.linkedin.com/in/jefffarinich/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Want to make the transition from help desk to cybersecurity? Jeff Farinich has helped others make that transition and he shares his advice in this episode.</p><p>He and Gene also talk about the types of cybersecurity roles, what he looks for in entry level candidates, and more.</p><p>Jeff Farinich on LinkedIn: <a href="https://www.linkedin.com/in/jefffarinich/">https://www.linkedin.com/in/jefffarinich/</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 02 Nov 2023 07:47:08 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/5abac444/73e25d61.mp3" length="38997170" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/gQFl-Y5SDwC6pBx6RQ7KaFndfXUDaYOex4XzCxubiVY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0NzE0Nzkv/MTY5MjgyMjg2OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>975</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Want to make the transition from help desk to cybersecurity? Jeff Farinich has helped others make that transition and he shares his advice in this episode.</p><p>He and Gene also talk about the types of cybersecurity roles, what he looks for in entry level candidates, and more.</p><p>Jeff Farinich on LinkedIn: <a href="https://www.linkedin.com/in/jefffarinich/">https://www.linkedin.com/in/jefffarinich/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Military to FBI to Cybersecurity Executive With MK Palmore of Google</title>
      <itunes:title>Military to FBI to Cybersecurity Executive With MK Palmore of Google</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b037202-89df-46a2-bb60-cd89d6050eb3</guid>
      <link>https://executivesecurity.transistor.fm/episodes/military-to-fbi-to-cybersecurity-executive-with-mk-palmore-of-google</link>
      <description>
        <![CDATA[<p>MK Palmore has had a long and fascinating career -- from the military to the FBI to cybersecurity executive at Google. Don't miss his story.</p><p>He's also a Vice President of Cyversity and has great insights and ideas about bringing more diversity to the cybersecurity field.  </p><p>This is an important and valuable conversation for anyone looking to get into cybersecurity, especially those without technical skills, those with military backgrounds, or those from under-represented populations.</p><p>MK Palmore on LinkedIn: <a href="https://www.linkedin.com/in/mkpalmore/">https://www.linkedin.com/in/mkpalmore/</a></p><p>Cyversity: <a href="https://www.cyversity.org/">https://www.cyversity.org/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>MK Palmore has had a long and fascinating career -- from the military to the FBI to cybersecurity executive at Google. Don't miss his story.</p><p>He's also a Vice President of Cyversity and has great insights and ideas about bringing more diversity to the cybersecurity field.  </p><p>This is an important and valuable conversation for anyone looking to get into cybersecurity, especially those without technical skills, those with military backgrounds, or those from under-represented populations.</p><p>MK Palmore on LinkedIn: <a href="https://www.linkedin.com/in/mkpalmore/">https://www.linkedin.com/in/mkpalmore/</a></p><p>Cyversity: <a href="https://www.cyversity.org/">https://www.cyversity.org/</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 26 Oct 2023 11:17:57 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/7045b4c4/bd84a615.mp3" length="69878257" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0wN5LYwv6-ZPD9xpe41x--YVig1e9-kbtoxTiufFbv0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0NzA2NDMv/MTY5MjgwMjcyNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1747</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>MK Palmore has had a long and fascinating career -- from the military to the FBI to cybersecurity executive at Google. Don't miss his story.</p><p>He's also a Vice President of Cyversity and has great insights and ideas about bringing more diversity to the cybersecurity field.  </p><p>This is an important and valuable conversation for anyone looking to get into cybersecurity, especially those without technical skills, those with military backgrounds, or those from under-represented populations.</p><p>MK Palmore on LinkedIn: <a href="https://www.linkedin.com/in/mkpalmore/">https://www.linkedin.com/in/mkpalmore/</a></p><p>Cyversity: <a href="https://www.cyversity.org/">https://www.cyversity.org/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Role of Behavioral Science in Cybersecurity With Masha Sedova of Elevate Security</title>
      <itunes:title>The Role of Behavioral Science in Cybersecurity With Masha Sedova of Elevate Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21f0623a-422e-4bee-b1b0-850ddd56cc86</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-role-of-behavioral-science-in-cybersecurity-with-masha-sedova-of-elevate-security</link>
      <description>
        <![CDATA[<p>Interested in behavioral science? The training and awareness side of cybersecurity might be for you – and you should hear Masha Sedova’s story. She offers a fascinating look at the human attack surface – which presents a whole new set of challenges – and they aren’t all technical. She has built a career on solving these challenges, and she sheds light on this lesser-known side of the cybersecurity world.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Interested in behavioral science? The training and awareness side of cybersecurity might be for you – and you should hear Masha Sedova’s story. She offers a fascinating look at the human attack surface – which presents a whole new set of challenges – and they aren’t all technical. She has built a career on solving these challenges, and she sheds light on this lesser-known side of the cybersecurity world.</p>]]>
      </content:encoded>
      <pubDate>Thu, 19 Oct 2023 13:57:27 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/49f2b92d/bfef255e.mp3" length="49070479" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kfrxnKHaCLS2gPFRGTJ26O6uxtA8p4uCuDiHC1lH34w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzNzExOTYv/MTY4ODE0NjY1Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1227</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Interested in behavioral science? The training and awareness side of cybersecurity might be for you – and you should hear Masha Sedova’s story. She offers a fascinating look at the human attack surface – which presents a whole new set of challenges – and they aren’t all technical. She has built a career on solving these challenges, and she sheds light on this lesser-known side of the cybersecurity world.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Avoiding the 'Phantom Hacker' Scam</title>
      <itunes:title>Avoiding the 'Phantom Hacker' Scam</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">78c69434-f75c-45af-9f43-a6da4f581df2</guid>
      <link>https://executivesecurity.transistor.fm/episodes/avoiding-the-phantom-hacker-scam</link>
      <description>
        <![CDATA[<p>In this special episode, Gene encourages listeners to spread the word about the so-called "Phantom Hacker" scams targeting the elderly. </p><p>The FBI recently published an alert about these popular scams that attempt to convince senior citizens that their money is unsafe and they need to move it.</p><p>Gene outlines how the scam works, and how to protect the elderly in your life.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this special episode, Gene encourages listeners to spread the word about the so-called "Phantom Hacker" scams targeting the elderly. </p><p>The FBI recently published an alert about these popular scams that attempt to convince senior citizens that their money is unsafe and they need to move it.</p><p>Gene outlines how the scam works, and how to protect the elderly in your life.</p>]]>
      </content:encoded>
      <pubDate>Mon, 16 Oct 2023 14:19:21 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/652ad6cc/ff761642.mp3" length="10779098" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7uuUm5dpB_1y7XUioYvkHdKYqMMiMgbFX4GUg3ksMG0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1NDgzMTYv/MTY5NzQ5MTE2MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>269</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this special episode, Gene encourages listeners to spread the word about the so-called "Phantom Hacker" scams targeting the elderly. </p><p>The FBI recently published an alert about these popular scams that attempt to convince senior citizens that their money is unsafe and they need to move it.</p><p>Gene outlines how the scam works, and how to protect the elderly in your life.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Battling the Cybersecurity Intimidation Factor With Cindi Carter of Check Point</title>
      <itunes:title>Battling the Cybersecurity Intimidation Factor With Cindi Carter of Check Point</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fd5fb7e7-0418-4a7d-8ca0-b86a30a5402d</guid>
      <link>https://executivesecurity.transistor.fm/episodes/battling-the-cybersecurity-intimidation-factor-with-cindi-carter-of-check-point</link>
      <description>
        <![CDATA[<p>Cybersecurity is intimidating says Check Point CISO Cindi Carter. But she also says it shouldn’t be. Cindi and Gene talk about how to make cybersecurity more accessible in this episode of the eXecutive Security podcast. They also talk about community involvement, networking, and the advice she gives her mentees.</p><p> </p><p>Cindi Carter on LinkedIn: https://www.linkedin.com/in/cindibcarter/</p><p> </p><p>Check Point Software: https://www.linkedin.com/company/check-point-software-technologies/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity is intimidating says Check Point CISO Cindi Carter. But she also says it shouldn’t be. Cindi and Gene talk about how to make cybersecurity more accessible in this episode of the eXecutive Security podcast. They also talk about community involvement, networking, and the advice she gives her mentees.</p><p> </p><p>Cindi Carter on LinkedIn: https://www.linkedin.com/in/cindibcarter/</p><p> </p><p>Check Point Software: https://www.linkedin.com/company/check-point-software-technologies/</p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Oct 2023 12:08:35 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/5a0d6c63/ef2061ec.mp3" length="52146653" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iMNt42HPhMsrpWyOy8IEIO2RRh20EGpOj8IQnICK5tA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0MDQyODIv/MTY4ODE0NjI0MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1303</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity is intimidating says Check Point CISO Cindi Carter. But she also says it shouldn’t be. Cindi and Gene talk about how to make cybersecurity more accessible in this episode of the eXecutive Security podcast. They also talk about community involvement, networking, and the advice she gives her mentees.</p><p> </p><p>Cindi Carter on LinkedIn: https://www.linkedin.com/in/cindibcarter/</p><p> </p><p>Check Point Software: https://www.linkedin.com/company/check-point-software-technologies/</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>We're Thinking About Mentoring Wrong With Amanda Fennell of Prove</title>
      <itunes:title>We're Thinking About Mentoring Wrong With Amanda Fennell of Prove</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2c306469-bba9-44fa-b7e6-93adf0b500cc</guid>
      <link>https://executivesecurity.transistor.fm/episodes/were-thinking-about-mentoring-wrong-with-amanda-fennell-of-prove</link>
      <description>
        <![CDATA[<p>Most of us don't approach mentoring with the right mindset, says Amanda Fennell of Prove. Thinking of it as "sponsoring" rather than "mentoring" would be a step in the right direction. Gene and Amanda talk about this mindset shift, plus her work at Prove, her work teaching cybersecurity at Tulane, why one of her best security analysts picked up valuable skills from her time as a bartender, and more.</p><p>Amanda Fennell on LinkedIn: <a href="https://www.linkedin.com/in/afennell/">https://www.linkedin.com/in/afennell/</a><br>Prove on LinkedIn: <a href="https://www.linkedin.com/company/proveidentity/">https://www.linkedin.com/company/proveidentity/</a><br>Ron Gula "How to Conference": <a href="https://www.youtube.com/watch?v=NRLcBPW12bc">https://www.youtube.com/watch?v=NRLcBPW12bc</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Most of us don't approach mentoring with the right mindset, says Amanda Fennell of Prove. Thinking of it as "sponsoring" rather than "mentoring" would be a step in the right direction. Gene and Amanda talk about this mindset shift, plus her work at Prove, her work teaching cybersecurity at Tulane, why one of her best security analysts picked up valuable skills from her time as a bartender, and more.</p><p>Amanda Fennell on LinkedIn: <a href="https://www.linkedin.com/in/afennell/">https://www.linkedin.com/in/afennell/</a><br>Prove on LinkedIn: <a href="https://www.linkedin.com/company/proveidentity/">https://www.linkedin.com/company/proveidentity/</a><br>Ron Gula "How to Conference": <a href="https://www.youtube.com/watch?v=NRLcBPW12bc">https://www.youtube.com/watch?v=NRLcBPW12bc</a></p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Oct 2023 08:43:16 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/59e75dc7/17deb7e9.mp3" length="55415080" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0o5ygOgPKFsFyYrTQBEyLSOMPra9vd31ktusyBW3X70/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzOTkyOTgv/MTY5NjYwNjk5Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1385</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Most of us don't approach mentoring with the right mindset, says Amanda Fennell of Prove. Thinking of it as "sponsoring" rather than "mentoring" would be a step in the right direction. Gene and Amanda talk about this mindset shift, plus her work at Prove, her work teaching cybersecurity at Tulane, why one of her best security analysts picked up valuable skills from her time as a bartender, and more.</p><p>Amanda Fennell on LinkedIn: <a href="https://www.linkedin.com/in/afennell/">https://www.linkedin.com/in/afennell/</a><br>Prove on LinkedIn: <a href="https://www.linkedin.com/company/proveidentity/">https://www.linkedin.com/company/proveidentity/</a><br>Ron Gula "How to Conference": <a href="https://www.youtube.com/watch?v=NRLcBPW12bc">https://www.youtube.com/watch?v=NRLcBPW12bc</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Changing Cybersecurity Hiring With Haris Pylarinos of Hack The Box</title>
      <itunes:title>Changing Cybersecurity Hiring With Haris Pylarinos of Hack The Box</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9cf7397a-0fd7-4cf2-beec-2716b1d179ea</guid>
      <link>https://executivesecurity.transistor.fm/episodes/changing-cybersecurity-hiring-with-haris-pylaronis-of-hack-the-box</link>
      <description>
        <![CDATA[<p>Haris Pylarinos found cybersecurity training subpar, and too expensive, so he started a company to do better. Hack The Box is now a leading gamified cybersecurity upskilling, certification, and talent assessment platform with more than 2 million platform members. </p><p>In this episode, Haris and Gene talk about Hack The Box, its origins and goals; why training plays a key role in addressing the cybersecurity skills gap; why cybersecurity hiring practices need to change, and more.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Haris Pylarinos found cybersecurity training subpar, and too expensive, so he started a company to do better. Hack The Box is now a leading gamified cybersecurity upskilling, certification, and talent assessment platform with more than 2 million platform members. </p><p>In this episode, Haris and Gene talk about Hack The Box, its origins and goals; why training plays a key role in addressing the cybersecurity skills gap; why cybersecurity hiring practices need to change, and more.</p>]]>
      </content:encoded>
      <pubDate>Thu, 28 Sep 2023 13:20:18 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/71fa2e03/daa5ed5d.mp3" length="45106903" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ryDOj7XkQv3HHPIGcItt5Kl7WAnrqOqS1ZNIZvkiOU4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzOTMxNDQv/MTY4NzQ1MTM2My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1127</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Haris Pylarinos found cybersecurity training subpar, and too expensive, so he started a company to do better. Hack The Box is now a leading gamified cybersecurity upskilling, certification, and talent assessment platform with more than 2 million platform members. </p><p>In this episode, Haris and Gene talk about Hack The Box, its origins and goals; why training plays a key role in addressing the cybersecurity skills gap; why cybersecurity hiring practices need to change, and more.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building a Career in Cybersecurity With Yuri Diogenes of Microsoft</title>
      <itunes:title>Building a Career in Cybersecurity With Yuri Diogenes of Microsoft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b0b3403d-1e7e-4c10-8cbc-1827c54ed36c</guid>
      <link>https://executivesecurity.transistor.fm/episodes/building-a-career-in-cybersecurity-with-yuri-diogenes-of-microsoft</link>
      <description>
        <![CDATA[<p>The author of "Building a Career in Cybersecurity," Yuri Diogenes offers a wealth of knowledge, advice, and tips on entering this field in this episode. </p><p>He and Gene discuss:</p><ul><li>Yuri's career journey</li><li>His take on cybersecurity certifications </li><li>Why building a lab is important for those looking for entry-level roles</li><li>How to be intentional in your attendance at cybersecurity conferences </li><li>Why often the best technical person doesn’t get the job</li></ul><p>Yuri Diogenes on LinkedIn: <a href="https://www.linkedin.com/in/yuridiogenes/">https://www.linkedin.com/in/yuridiogenes/</a><br>Building a Career in Cybersecurity: https://a.co/d/ivHxIVL</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The author of "Building a Career in Cybersecurity," Yuri Diogenes offers a wealth of knowledge, advice, and tips on entering this field in this episode. </p><p>He and Gene discuss:</p><ul><li>Yuri's career journey</li><li>His take on cybersecurity certifications </li><li>Why building a lab is important for those looking for entry-level roles</li><li>How to be intentional in your attendance at cybersecurity conferences </li><li>Why often the best technical person doesn’t get the job</li></ul><p>Yuri Diogenes on LinkedIn: <a href="https://www.linkedin.com/in/yuridiogenes/">https://www.linkedin.com/in/yuridiogenes/</a><br>Building a Career in Cybersecurity: https://a.co/d/ivHxIVL</p>]]>
      </content:encoded>
      <pubDate>Mon, 25 Sep 2023 09:31:34 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/fe4ab7da/c304d95f.mp3" length="58310910" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yGGzxfGkMqsQuCCmPqXj6wqCtkrMPZtU66tdFx2F7ME/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MDg3NjEv/MTY5NTA2Nzg1Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1457</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The author of "Building a Career in Cybersecurity," Yuri Diogenes offers a wealth of knowledge, advice, and tips on entering this field in this episode. </p><p>He and Gene discuss:</p><ul><li>Yuri's career journey</li><li>His take on cybersecurity certifications </li><li>Why building a lab is important for those looking for entry-level roles</li><li>How to be intentional in your attendance at cybersecurity conferences </li><li>Why often the best technical person doesn’t get the job</li></ul><p>Yuri Diogenes on LinkedIn: <a href="https://www.linkedin.com/in/yuridiogenes/">https://www.linkedin.com/in/yuridiogenes/</a><br>Building a Career in Cybersecurity: https://a.co/d/ivHxIVL</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From English Major to C-Level Security Executive With Lance Hayden of Vericast</title>
      <itunes:title>From English Major to C-Level Security Executive With Lance Hayden of Vericast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2628473f-7e6d-416f-b6d8-240b60f8255a</guid>
      <link>https://executivesecurity.transistor.fm/episodes/from-english-major-to-c-level-security-executive-with-lance-hayden-of-vericast</link>
      <description>
        <![CDATA[<p>You don’t need a tech background to work in cybersecurity, says Lance Hayden, Chief Information Security Strategist at Vericast, and former English major.</p><p> </p><p>What skills and abilities do you need? Get Lance’s perspective in this episode. He and Gene also talk about his experience teaching cybersecurity at the Univeristy of Texas, and what he looks for in entry level candidates.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>You don’t need a tech background to work in cybersecurity, says Lance Hayden, Chief Information Security Strategist at Vericast, and former English major.</p><p> </p><p>What skills and abilities do you need? Get Lance’s perspective in this episode. He and Gene also talk about his experience teaching cybersecurity at the Univeristy of Texas, and what he looks for in entry level candidates.</p>]]>
      </content:encoded>
      <pubDate>Thu, 14 Sep 2023 10:47:49 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/a9db2e9a/9ee390b5.mp3" length="45466712" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/n0rOnTv55oHUPl6iPIx1WxmHoJJY7dcY8lHp3aLRTpY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzODY1MjUv/MTY4NjkyODI2NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1136</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>You don’t need a tech background to work in cybersecurity, says Lance Hayden, Chief Information Security Strategist at Vericast, and former English major.</p><p> </p><p>What skills and abilities do you need? Get Lance’s perspective in this episode. He and Gene also talk about his experience teaching cybersecurity at the Univeristy of Texas, and what he looks for in entry level candidates.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Working in Cybersecurity at a University With Eric Jacobsen of BU</title>
      <itunes:title>Working in Cybersecurity at a University With Eric Jacobsen of BU</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1a3c21e1-793f-4d99-9948-4d936e7e1f9f</guid>
      <link>https://executivesecurity.transistor.fm/episodes/working-in-cybersecurity-at-a-university-with-eric-jacobsen-of-bu</link>
      <description>
        <![CDATA[<p>Eric Jacobsen, Asst. VP and CISO at Boston University, is our first guest from the higher education space, and he offers a unique look at what it’s like to work in cybersecurity at a university. He and Gene talk about the benefits of working at an institution of higher learning, his path from a chemistry degree to cybersecurity leader, what he looks for when hiring for entry-level positions, and more.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Eric Jacobsen, Asst. VP and CISO at Boston University, is our first guest from the higher education space, and he offers a unique look at what it’s like to work in cybersecurity at a university. He and Gene talk about the benefits of working at an institution of higher learning, his path from a chemistry degree to cybersecurity leader, what he looks for when hiring for entry-level positions, and more.</p>]]>
      </content:encoded>
      <pubDate>Thu, 07 Sep 2023 11:13:36 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/b6ab27ab/b126a00d.mp3" length="29363215" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/54PNQXvnsh-w9FkvwMoqIXQsP5NYJxO7XHsK47DZV6E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMjk3NTEv/MTY4Mzc1NTAxMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>734</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Eric Jacobsen, Asst. VP and CISO at Boston University, is our first guest from the higher education space, and he offers a unique look at what it’s like to work in cybersecurity at a university. He and Gene talk about the benefits of working at an institution of higher learning, his path from a chemistry degree to cybersecurity leader, what he looks for when hiring for entry-level positions, and more.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Avoiding Cybersecurity Burnout With Sam Curry of Zscaler</title>
      <itunes:title>Avoiding Cybersecurity Burnout With Sam Curry of Zscaler</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d6dffb70-65d6-4713-aae2-41986e8436f4</guid>
      <link>https://executivesecurity.transistor.fm/episodes/avoiding-cybersecurity-burnout-with-sam-curry-of-zscaler</link>
      <description>
        <![CDATA[<p>Burnout is real and rampant among C-level cybersecurity professionals. How can you avoid it? Zscaler CISO Sam Curry shares his thoughts.</p><p>Gene and Sam also talk about making the path from secondary school to entry-level cybersecurity job easier, why collegiate cybersecurity competitions are important, and what's GOOD about cybersecurity careers (it's not all stress and burnout!). </p><p><br>Sam Curry on LinkedIn: <a href="https://www.linkedin.com/in/currysam/">https://www.linkedin.com/in/currysam/</a></p><p>Zscaler: <a href="https://www.zscaler.com/">https://www.zscaler.com/</a></p><p>Northeast Collegiate Cyber Defense League: https://neccdl.org/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Burnout is real and rampant among C-level cybersecurity professionals. How can you avoid it? Zscaler CISO Sam Curry shares his thoughts.</p><p>Gene and Sam also talk about making the path from secondary school to entry-level cybersecurity job easier, why collegiate cybersecurity competitions are important, and what's GOOD about cybersecurity careers (it's not all stress and burnout!). </p><p><br>Sam Curry on LinkedIn: <a href="https://www.linkedin.com/in/currysam/">https://www.linkedin.com/in/currysam/</a></p><p>Zscaler: <a href="https://www.zscaler.com/">https://www.zscaler.com/</a></p><p>Northeast Collegiate Cyber Defense League: https://neccdl.org/</p>]]>
      </content:encoded>
      <pubDate>Thu, 31 Aug 2023 06:33:49 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/5a25c83f/b1ea10c8.mp3" length="53257109" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xVU_3j6F-1l49PP4Er-FRjnKdqulDSBHyyMCSrfrV_I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0Njk5NDIv/MTY5MjczMzMzMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1331</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Burnout is real and rampant among C-level cybersecurity professionals. How can you avoid it? Zscaler CISO Sam Curry shares his thoughts.</p><p>Gene and Sam also talk about making the path from secondary school to entry-level cybersecurity job easier, why collegiate cybersecurity competitions are important, and what's GOOD about cybersecurity careers (it's not all stress and burnout!). </p><p><br>Sam Curry on LinkedIn: <a href="https://www.linkedin.com/in/currysam/">https://www.linkedin.com/in/currysam/</a></p><p>Zscaler: <a href="https://www.zscaler.com/">https://www.zscaler.com/</a></p><p>Northeast Collegiate Cyber Defense League: https://neccdl.org/</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Analyzing Results of Survey on Cybersecurity Skills Gap With Jeremy Ventura of ThreatX</title>
      <itunes:title>Analyzing Results of Survey on Cybersecurity Skills Gap With Jeremy Ventura of ThreatX</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b3b4d52f-c175-4ca7-8553-352b2b9823fc</guid>
      <link>https://executivesecurity.transistor.fm/episodes/analyzing-results-of-survey-on-cybersecurity-skills-gap-with-jeremy-ventura-of-threatx</link>
      <description>
        <![CDATA[<p>ThreatX surveyed 2,000 consumers in the US and UK about the cybersecurity skills gap – to get their thoughts on its causes and effects.</p><p>In this episode, Gene and ThreatX Field CISO Jeremy Ventura analyze the results, including:</p><ul><li>62% reported that if they or their child had more education around cybersecurity in school, they would have considered entering the field. </li></ul><p><br></p><ul><li>90% reported that they are concerned about the future of cybersecurity if more isn’t done at an earlier stage to expose students to the field.</li></ul><p><br></p><ul><li>78% are under the impression that a college degree is necessary to pursue a career in cybersecurity, and 67% thought a career in cybersecurity should be achievable through certifications or apprenticeships versus a 4-year+ college degree.</li></ul><p><br></p><ul><li>52% say engaging students of all backgrounds earlier in STEM/cybersecurity courses it will help minimize the talent shortage among the cybersecurity industry.</li></ul><p><br>Full survey results: <a href="https://info.threatx.com/hubfs/ug/ThreatX-global-2023-survey-cyber-talent-shortage.pdf">https://info.threatx.com/hubfs/ug/ThreatX-global-2023-survey-cyber-talent-shortage.pdf</a></p><p>Jeremy Ventura on LinkedIn: <a href="https://www.linkedin.com/in/jeremy-ventura-36204676">linkedin.com/in/jeremy-ventura-36204676</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>ThreatX surveyed 2,000 consumers in the US and UK about the cybersecurity skills gap – to get their thoughts on its causes and effects.</p><p>In this episode, Gene and ThreatX Field CISO Jeremy Ventura analyze the results, including:</p><ul><li>62% reported that if they or their child had more education around cybersecurity in school, they would have considered entering the field. </li></ul><p><br></p><ul><li>90% reported that they are concerned about the future of cybersecurity if more isn’t done at an earlier stage to expose students to the field.</li></ul><p><br></p><ul><li>78% are under the impression that a college degree is necessary to pursue a career in cybersecurity, and 67% thought a career in cybersecurity should be achievable through certifications or apprenticeships versus a 4-year+ college degree.</li></ul><p><br></p><ul><li>52% say engaging students of all backgrounds earlier in STEM/cybersecurity courses it will help minimize the talent shortage among the cybersecurity industry.</li></ul><p><br>Full survey results: <a href="https://info.threatx.com/hubfs/ug/ThreatX-global-2023-survey-cyber-talent-shortage.pdf">https://info.threatx.com/hubfs/ug/ThreatX-global-2023-survey-cyber-talent-shortage.pdf</a></p><p>Jeremy Ventura on LinkedIn: <a href="https://www.linkedin.com/in/jeremy-ventura-36204676">linkedin.com/in/jeremy-ventura-36204676</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Fri, 25 Aug 2023 12:15:40 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/fb379888/0e0d5d33.mp3" length="48464563" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9RwpDwZQYCFajik5cMJMT87nzUPC8znDcn9pJsnQ62Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0NzczMzUv/MTY5Mjk4NzYxMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1211</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>ThreatX surveyed 2,000 consumers in the US and UK about the cybersecurity skills gap – to get their thoughts on its causes and effects.</p><p>In this episode, Gene and ThreatX Field CISO Jeremy Ventura analyze the results, including:</p><ul><li>62% reported that if they or their child had more education around cybersecurity in school, they would have considered entering the field. </li></ul><p><br></p><ul><li>90% reported that they are concerned about the future of cybersecurity if more isn’t done at an earlier stage to expose students to the field.</li></ul><p><br></p><ul><li>78% are under the impression that a college degree is necessary to pursue a career in cybersecurity, and 67% thought a career in cybersecurity should be achievable through certifications or apprenticeships versus a 4-year+ college degree.</li></ul><p><br></p><ul><li>52% say engaging students of all backgrounds earlier in STEM/cybersecurity courses it will help minimize the talent shortage among the cybersecurity industry.</li></ul><p><br>Full survey results: <a href="https://info.threatx.com/hubfs/ug/ThreatX-global-2023-survey-cyber-talent-shortage.pdf">https://info.threatx.com/hubfs/ug/ThreatX-global-2023-survey-cyber-talent-shortage.pdf</a></p><p>Jeremy Ventura on LinkedIn: <a href="https://www.linkedin.com/in/jeremy-ventura-36204676">linkedin.com/in/jeremy-ventura-36204676</a></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Fraud vs. Cybersecurity With Nancy Schuehler of Verizon</title>
      <itunes:title>Fraud vs. Cybersecurity With Nancy Schuehler of Verizon</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">043d9bf3-c508-441a-ad6b-b563f7f4db70</guid>
      <link>https://executivesecurity.transistor.fm/episodes/fraud-vs-cybersecurity-with-nancy-schuehler-of-verizon</link>
      <description>
        <![CDATA[<p>What's the difference between working in fraud and working in cybersecurity? Nancy Schuehler, Director of Cyber Strategy and Program Execution at Verizon, has worked in both and breaks it down for our listeners.</p><p>She and Gene also dig into the pros and cons of working for a large enterprise, and of staying with one company for many years. </p><p>Nancy Schuehler on LinkedIn: <a href="https://www.linkedin.com/in/nancy-schuehler-87311610/">https://www.linkedin.com/in/nancy-schuehler-87311610/</a></p><p>Verizon cyber recruiting: <a href="https://verizon.com/cybersecurity">https://verizon.com/cybersecurity</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What's the difference between working in fraud and working in cybersecurity? Nancy Schuehler, Director of Cyber Strategy and Program Execution at Verizon, has worked in both and breaks it down for our listeners.</p><p>She and Gene also dig into the pros and cons of working for a large enterprise, and of staying with one company for many years. </p><p>Nancy Schuehler on LinkedIn: <a href="https://www.linkedin.com/in/nancy-schuehler-87311610/">https://www.linkedin.com/in/nancy-schuehler-87311610/</a></p><p>Verizon cyber recruiting: <a href="https://verizon.com/cybersecurity">https://verizon.com/cybersecurity</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 24 Aug 2023 06:38:47 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/6415419f/e4e54f33.mp3" length="45115360" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/XFwLwWafpWrhRruq_X3WXp6drIagKS4jaCzAVKBZYx0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0Njk5NTUv/MTY5MjczMzkxMi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1127</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What's the difference between working in fraud and working in cybersecurity? Nancy Schuehler, Director of Cyber Strategy and Program Execution at Verizon, has worked in both and breaks it down for our listeners.</p><p>She and Gene also dig into the pros and cons of working for a large enterprise, and of staying with one company for many years. </p><p>Nancy Schuehler on LinkedIn: <a href="https://www.linkedin.com/in/nancy-schuehler-87311610/">https://www.linkedin.com/in/nancy-schuehler-87311610/</a></p><p>Verizon cyber recruiting: <a href="https://verizon.com/cybersecurity">https://verizon.com/cybersecurity</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building a No-Experience Resume With Dane Jones of HighRadius</title>
      <itunes:title>Building a No-Experience Resume With Dane Jones of HighRadius</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e7dde00e-ac6a-4cb4-a081-33e4a550b126</guid>
      <link>https://executivesecurity.transistor.fm/episodes/building-a-no-experience-resume-with-dane-jones-of-highradius</link>
      <description>
        <![CDATA[<p>No experience? No problem. In this episode, CISO Dane Jones explains how to build a resume that highlights a passion and aptitude for cybersecurity without any work experience in the field.</p><p> <br>Dane Jones is CISO at HighRadius. He has been a security leader for many years, including at Lowe’s.</p><p>Dane Jones on LinkedIn: <a href="https://www.linkedin.com/in/daneejones/">https://www.linkedin.com/in/daneejones/</a></p><p>Is a career in cybersecurity right for me? <a href="https://www.isc2.org/thank-you/is-a-career-in-cybersecurity-right-for-me">https://www.isc2.org/thank-you/is-a-career-in-cybersecurity-right-for-me</a> </p><p>(ISC)² Cybersecurity Workforce Study: <a href="https://www.isc2.org/Research/Workforce-Study#">https://www.isc2.org/Research/Workforce-Study#</a> </p><p><strong> </strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>No experience? No problem. In this episode, CISO Dane Jones explains how to build a resume that highlights a passion and aptitude for cybersecurity without any work experience in the field.</p><p> <br>Dane Jones is CISO at HighRadius. He has been a security leader for many years, including at Lowe’s.</p><p>Dane Jones on LinkedIn: <a href="https://www.linkedin.com/in/daneejones/">https://www.linkedin.com/in/daneejones/</a></p><p>Is a career in cybersecurity right for me? <a href="https://www.isc2.org/thank-you/is-a-career-in-cybersecurity-right-for-me">https://www.isc2.org/thank-you/is-a-career-in-cybersecurity-right-for-me</a> </p><p>(ISC)² Cybersecurity Workforce Study: <a href="https://www.isc2.org/Research/Workforce-Study#">https://www.isc2.org/Research/Workforce-Study#</a> </p><p><strong> </strong></p>]]>
      </content:encoded>
      <pubDate>Mon, 21 Aug 2023 12:45:17 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/cff9c112/5236d03d.mp3" length="31514634" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2AZrnehtTh_rubwYGoiyo-vuXK09oFAPz9XzBmeTWRo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMjA3MTAv/MTY4MzIzMjMzNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>787</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>No experience? No problem. In this episode, CISO Dane Jones explains how to build a resume that highlights a passion and aptitude for cybersecurity without any work experience in the field.</p><p> <br>Dane Jones is CISO at HighRadius. He has been a security leader for many years, including at Lowe’s.</p><p>Dane Jones on LinkedIn: <a href="https://www.linkedin.com/in/daneejones/">https://www.linkedin.com/in/daneejones/</a></p><p>Is a career in cybersecurity right for me? <a href="https://www.isc2.org/thank-you/is-a-career-in-cybersecurity-right-for-me">https://www.isc2.org/thank-you/is-a-career-in-cybersecurity-right-for-me</a> </p><p>(ISC)² Cybersecurity Workforce Study: <a href="https://www.isc2.org/Research/Workforce-Study#">https://www.isc2.org/Research/Workforce-Study#</a> </p><p><strong> </strong></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Make Yourself an Expert in the New Thing With Ted Julian of Glasswing Ventures</title>
      <itunes:title>Make Yourself an Expert in the New Thing With Ted Julian of Glasswing Ventures</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ae9e19be-f6a7-4d53-99ed-aa06183140b4</guid>
      <link>https://executivesecurity.transistor.fm/episodes/make-yourself-an-expert-in-the-new-thing-with-ted-julian-of-glasswing-ventures</link>
      <description>
        <![CDATA[<p>Cybersecurity is a great field because of the all the change, says Ted Julian. But to succeed, you have to be proactive about that change. Ted and Gene talk about how to keep up with the change, plus about his experience in the early days of cybersecurity, what it’s like to work in product management, and why joining an early-stage company is so beneficial.</p><p>Ted Julian has held leadership positions in several security companies, including Devo and Resilient. He is currently a Venture Partner at Glasswing Ventures.</p><p><strong> </strong></p><p>Ted Julian on LinkedIn: <a href="https://www.linkedin.com/in/tedjulian/">https://www.linkedin.com/in/tedjulian/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity is a great field because of the all the change, says Ted Julian. But to succeed, you have to be proactive about that change. Ted and Gene talk about how to keep up with the change, plus about his experience in the early days of cybersecurity, what it’s like to work in product management, and why joining an early-stage company is so beneficial.</p><p>Ted Julian has held leadership positions in several security companies, including Devo and Resilient. He is currently a Venture Partner at Glasswing Ventures.</p><p><strong> </strong></p><p>Ted Julian on LinkedIn: <a href="https://www.linkedin.com/in/tedjulian/">https://www.linkedin.com/in/tedjulian/</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 10 Aug 2023 07:31:57 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/aed73eb6/68974538.mp3" length="48127263" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/y73K1VJ1pjYGW1f7g0iQF_YhHV1gAxZa8donjUM1LE8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMTk4NzYv/MTY4MzE3MjA5OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1203</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity is a great field because of the all the change, says Ted Julian. But to succeed, you have to be proactive about that change. Ted and Gene talk about how to keep up with the change, plus about his experience in the early days of cybersecurity, what it’s like to work in product management, and why joining an early-stage company is so beneficial.</p><p>Ted Julian has held leadership positions in several security companies, including Devo and Resilient. He is currently a Venture Partner at Glasswing Ventures.</p><p><strong> </strong></p><p>Ted Julian on LinkedIn: <a href="https://www.linkedin.com/in/tedjulian/">https://www.linkedin.com/in/tedjulian/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Exploring the MSSP Space With John Menezes of Stratejm</title>
      <itunes:title>Exploring the MSSP Space With John Menezes of Stratejm</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4b6e1bb6-6c41-48a4-8b77-35e298b05be2</guid>
      <link>https://executivesecurity.transistor.fm/episodes/exploring-the-mssp-space-with-john-menezes-of-stratejm</link>
      <description>
        <![CDATA[<p>Gene sits down with Stratejm CEO John Menezes to talk about working for an MSSP, plus gets John’s thoughts on hiring and nurturing the next generation of cybersecurity talent.</p><p>Stratejm: <a href="https://stratejm.com/">https://stratejm.com/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Gene sits down with Stratejm CEO John Menezes to talk about working for an MSSP, plus gets John’s thoughts on hiring and nurturing the next generation of cybersecurity talent.</p><p>Stratejm: <a href="https://stratejm.com/">https://stratejm.com/</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 31 Jul 2023 06:29:31 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/b98d28b1/09045ef4.mp3" length="38740587" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_APQLsZ_rGRX6XAq0oStzt_yZ6dgTwH6r2Rdvh1fDhk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzNTAzOTEv/MTY4NjY2NTI3OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>968</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Gene sits down with Stratejm CEO John Menezes to talk about working for an MSSP, plus gets John’s thoughts on hiring and nurturing the next generation of cybersecurity talent.</p><p>Stratejm: <a href="https://stratejm.com/">https://stratejm.com/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Role of Empathy in Cybersecurity With Randy Raw of Veterans United Home Loans</title>
      <itunes:title>The Role of Empathy in Cybersecurity With Randy Raw of Veterans United Home Loans</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8a556da1-a883-4872-91a9-952748da1f9b</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-role-of-empathy-in-cybersecurity-with-randy-raw-of-veterans-united-home-loans</link>
      <description>
        <![CDATA[<p>Success in cybersecurity is not about your technical skills, but your emotional intelligence, according to CISO Randy Raw. Randy and Gene talk about why he thinks this, plus his approach to hiring, why leaders need to be proactive in asking their reports how they want to be managed, why everyone needs both a coach and a sponsor, and more.</p><p>Randy Raw is the CISO at Veterans United Home Loans, where he has worked for almost 12 years. He is also a leadership coach at SABERS Coaching.</p><p> </p><p>Randy Raw on LinkedIn: <a href="https://www.linkedin.com/in/randyraw/">https://www.linkedin.com/in/randyraw/</a> </p><p>Randy Raw’s blog: <a href="https://randyraw.com">https://randyraw.com</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Success in cybersecurity is not about your technical skills, but your emotional intelligence, according to CISO Randy Raw. Randy and Gene talk about why he thinks this, plus his approach to hiring, why leaders need to be proactive in asking their reports how they want to be managed, why everyone needs both a coach and a sponsor, and more.</p><p>Randy Raw is the CISO at Veterans United Home Loans, where he has worked for almost 12 years. He is also a leadership coach at SABERS Coaching.</p><p> </p><p>Randy Raw on LinkedIn: <a href="https://www.linkedin.com/in/randyraw/">https://www.linkedin.com/in/randyraw/</a> </p><p>Randy Raw’s blog: <a href="https://randyraw.com">https://randyraw.com</a> </p>]]>
      </content:encoded>
      <pubDate>Thu, 27 Jul 2023 12:57:31 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/bc10ba0a/d6ff1fe9.mp3" length="47629427" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/SAunalCtUfrbZuXXi-q2A8llIX0rxLok7Ixd_8hWZMo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ3MTYv/MTY3OTg4NjYwOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1190</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Success in cybersecurity is not about your technical skills, but your emotional intelligence, according to CISO Randy Raw. Randy and Gene talk about why he thinks this, plus his approach to hiring, why leaders need to be proactive in asking their reports how they want to be managed, why everyone needs both a coach and a sponsor, and more.</p><p>Randy Raw is the CISO at Veterans United Home Loans, where he has worked for almost 12 years. He is also a leadership coach at SABERS Coaching.</p><p> </p><p>Randy Raw on LinkedIn: <a href="https://www.linkedin.com/in/randyraw/">https://www.linkedin.com/in/randyraw/</a> </p><p>Randy Raw’s blog: <a href="https://randyraw.com">https://randyraw.com</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Cybersecurity Success Means Putting Why Before What With Lowe's CISO Marc Varner</title>
      <itunes:title>Why Cybersecurity Success Means Putting Why Before What With Lowe's CISO Marc Varner</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9c90e8f4-6fad-4396-8aff-5269aa353bdf</guid>
      <link>https://executivesecurity.transistor.fm/episodes/why-cybersecurity-success-means-putting-why-before-what-with-lowes-ciso-marc-varner</link>
      <description>
        <![CDATA[<p>Lowe’s CISO Marc Varner has had a long career in cybersecurity, including CISO roles at Yum Brands and McDonald’s. Why does he think cybersecurity is a good career choice? Because there is always a new challenge. “What was the last really cool discovery or change in math?” he jokes. There’s something new in cybersecurity just about every day. </p><p>Tune in to his podcast episode with Gene to hear more. They discuss his journey, keys to success in the field, skills from other experiences that are transferable to cyber, and what he is looking for in entry level candidates.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Lowe’s CISO Marc Varner has had a long career in cybersecurity, including CISO roles at Yum Brands and McDonald’s. Why does he think cybersecurity is a good career choice? Because there is always a new challenge. “What was the last really cool discovery or change in math?” he jokes. There’s something new in cybersecurity just about every day. </p><p>Tune in to his podcast episode with Gene to hear more. They discuss his journey, keys to success in the field, skills from other experiences that are transferable to cyber, and what he is looking for in entry level candidates.</p>]]>
      </content:encoded>
      <pubDate>Thu, 20 Jul 2023 13:23:57 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/69a89f4b/f00bdc7c.mp3" length="57633417" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ydZZ5Q2IYe9ITUIvj2B6VjK6GeHZBu24d_Ee7A8LI5w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzNjAyNjcv/MTY4NjY2NDc2MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1441</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Lowe’s CISO Marc Varner has had a long career in cybersecurity, including CISO roles at Yum Brands and McDonald’s. Why does he think cybersecurity is a good career choice? Because there is always a new challenge. “What was the last really cool discovery or change in math?” he jokes. There’s something new in cybersecurity just about every day. </p><p>Tune in to his podcast episode with Gene to hear more. They discuss his journey, keys to success in the field, skills from other experiences that are transferable to cyber, and what he is looking for in entry level candidates.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Ignores the Geopolitical at Its Own Peril With Mark Houpt of DataBank</title>
      <itunes:title>Cybersecurity Ignores the Geopolitical at Its Own Peril With Mark Houpt of DataBank</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">39977bc8-f248-49ce-9b2a-59b7acf810c4</guid>
      <link>https://executivesecurity.transistor.fm/episodes/cybersecurity-ignores-the-geopolitical-at-its-own-peril-with-mark-houpt-of-databank</link>
      <description>
        <![CDATA[<p>Why is the geopolitical landscape critical to cybersecurity strategy? CISO Mark Houpt breaks it down in this episode. Mark also shares his advice to the college and high school students he mentors, how to approach the ever-changing nature of cybersecurity, and how to think about a college education.</p><p>Mark Houpt is the CISO at DataBank. Previously he held senior security roles at organizations including State Farm, Lincoln Christian University, and Sallie Mae. Mark served in the US Navy from 1991 to 1999.</p><p> </p><p>Mark Houpt on LinkedIn: <a href="https://www.linkedin.com/in/mark-houpt/">https://www.linkedin.com/in/mark-houpt/</a> </p><p>Mark’s recommended list of classes:</p><p>-        Microsoft CISO Workshop: <a href="https://learn.microsoft.com/en-us/security/ciso-workshop/ciso-workshop">https://learn.microsoft.com/en-us/security/ciso-workshop/ciso-workshop</a> </p><p>-        Ascend Education: <a href="https://ascendeducation.com/monthly-subscription/">https://ascendeducation.com/monthly-subscription/</a> </p><p>-        Amazon Cybersecurity Awareness Training: <a href="https://learnsecurity.amazon.com/en/index.html">https://learnsecurity.amazon.com/en/index.html</a> </p><p>-        Center for Development of Security Excellence: <a href="https://www.cdse.edu">https://www.cdse.edu</a> </p><p>-        ISC2 -Certified in Cybersecurity: <a href="https://www.isc2.org/1mcc">https://www.isc2.org/1mcc</a> </p><p>-        Cisco Networking Academy: <a href="https://skillsforall.com/course/introduction-to-cybersecurity">https://skillsforall.com/course/introduction-to-cybersecurity</a> </p><p>-        Cyberbit Remote Training: <a href="https://go.cyberbit.com/100k-worth-of-free-remote-cyber-range-training/?utm_source=nist_website&amp;utm_medium=list&amp;utm_campaign=free-remote-soc-team-training-nam">https://go.cyberbit.com/100k-worth-of-free-remote-cyber-range-training/?utm_source=nist_website&amp;utm_medium=list&amp;utm_campaign=free-remote-soc-team-training-nam</a> </p><p>-        StationX - 12 Month Trial: <a href="https://www.cybersecurityjobs.com/csj-training-fund/">https://www.cybersecurityjobs.com/csj-training-fund/</a> </p><p>-        Cyber Training 365: <a href="https://www.cybertraining365.com/cybertraining/FreeClasses">https://www.cybertraining365.com/cybertraining/FreeClasses</a> </p><p>-        Cyber Skyline Professional: <a href="https://cyberskyline.com/professional/purchase">https://cyberskyline.com/professional/purchase</a> </p><p>-        Cybrary: <a href="https://www.cybrary.it">https://www.cybrary.it</a> </p><p>-        EC.Council: <a href="https://www.eccouncil.org/cybersecurity-exchange/free-cybersecurity-resources-2022/">https://www.eccouncil.org/cybersecurity-exchange/free-cybersecurity-resources-2022/</a> </p><p>-        Elastic: <a href="https://www.elastic.co/training/free">https://www.elastic.co/training/free</a> </p><p>-        Evolve Academy: <a href="https://www.academy.evolvesecurity.com/cybersecurity-fundamentals">https://www.academy.evolvesecurity.com/cybersecurity-fundamentals</a> </p><p>-        Federal Virtual Training: <a href="https://fedvte.usalearning.gov">https://fedvte.usalearning.gov</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Why is the geopolitical landscape critical to cybersecurity strategy? CISO Mark Houpt breaks it down in this episode. Mark also shares his advice to the college and high school students he mentors, how to approach the ever-changing nature of cybersecurity, and how to think about a college education.</p><p>Mark Houpt is the CISO at DataBank. Previously he held senior security roles at organizations including State Farm, Lincoln Christian University, and Sallie Mae. Mark served in the US Navy from 1991 to 1999.</p><p> </p><p>Mark Houpt on LinkedIn: <a href="https://www.linkedin.com/in/mark-houpt/">https://www.linkedin.com/in/mark-houpt/</a> </p><p>Mark’s recommended list of classes:</p><p>-        Microsoft CISO Workshop: <a href="https://learn.microsoft.com/en-us/security/ciso-workshop/ciso-workshop">https://learn.microsoft.com/en-us/security/ciso-workshop/ciso-workshop</a> </p><p>-        Ascend Education: <a href="https://ascendeducation.com/monthly-subscription/">https://ascendeducation.com/monthly-subscription/</a> </p><p>-        Amazon Cybersecurity Awareness Training: <a href="https://learnsecurity.amazon.com/en/index.html">https://learnsecurity.amazon.com/en/index.html</a> </p><p>-        Center for Development of Security Excellence: <a href="https://www.cdse.edu">https://www.cdse.edu</a> </p><p>-        ISC2 -Certified in Cybersecurity: <a href="https://www.isc2.org/1mcc">https://www.isc2.org/1mcc</a> </p><p>-        Cisco Networking Academy: <a href="https://skillsforall.com/course/introduction-to-cybersecurity">https://skillsforall.com/course/introduction-to-cybersecurity</a> </p><p>-        Cyberbit Remote Training: <a href="https://go.cyberbit.com/100k-worth-of-free-remote-cyber-range-training/?utm_source=nist_website&amp;utm_medium=list&amp;utm_campaign=free-remote-soc-team-training-nam">https://go.cyberbit.com/100k-worth-of-free-remote-cyber-range-training/?utm_source=nist_website&amp;utm_medium=list&amp;utm_campaign=free-remote-soc-team-training-nam</a> </p><p>-        StationX - 12 Month Trial: <a href="https://www.cybersecurityjobs.com/csj-training-fund/">https://www.cybersecurityjobs.com/csj-training-fund/</a> </p><p>-        Cyber Training 365: <a href="https://www.cybertraining365.com/cybertraining/FreeClasses">https://www.cybertraining365.com/cybertraining/FreeClasses</a> </p><p>-        Cyber Skyline Professional: <a href="https://cyberskyline.com/professional/purchase">https://cyberskyline.com/professional/purchase</a> </p><p>-        Cybrary: <a href="https://www.cybrary.it">https://www.cybrary.it</a> </p><p>-        EC.Council: <a href="https://www.eccouncil.org/cybersecurity-exchange/free-cybersecurity-resources-2022/">https://www.eccouncil.org/cybersecurity-exchange/free-cybersecurity-resources-2022/</a> </p><p>-        Elastic: <a href="https://www.elastic.co/training/free">https://www.elastic.co/training/free</a> </p><p>-        Evolve Academy: <a href="https://www.academy.evolvesecurity.com/cybersecurity-fundamentals">https://www.academy.evolvesecurity.com/cybersecurity-fundamentals</a> </p><p>-        Federal Virtual Training: <a href="https://fedvte.usalearning.gov">https://fedvte.usalearning.gov</a> </p>]]>
      </content:encoded>
      <pubDate>Thu, 13 Jul 2023 12:21:39 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/e72a0c1a/545c6eca.mp3" length="55208738" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/j2BDC-0jsb61FW8NMCIT9dAb7kLGK5HSQgD0q1GSw-g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ3MTUv/MTY3OTg4NjUzOC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1380</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Why is the geopolitical landscape critical to cybersecurity strategy? CISO Mark Houpt breaks it down in this episode. Mark also shares his advice to the college and high school students he mentors, how to approach the ever-changing nature of cybersecurity, and how to think about a college education.</p><p>Mark Houpt is the CISO at DataBank. Previously he held senior security roles at organizations including State Farm, Lincoln Christian University, and Sallie Mae. Mark served in the US Navy from 1991 to 1999.</p><p> </p><p>Mark Houpt on LinkedIn: <a href="https://www.linkedin.com/in/mark-houpt/">https://www.linkedin.com/in/mark-houpt/</a> </p><p>Mark’s recommended list of classes:</p><p>-        Microsoft CISO Workshop: <a href="https://learn.microsoft.com/en-us/security/ciso-workshop/ciso-workshop">https://learn.microsoft.com/en-us/security/ciso-workshop/ciso-workshop</a> </p><p>-        Ascend Education: <a href="https://ascendeducation.com/monthly-subscription/">https://ascendeducation.com/monthly-subscription/</a> </p><p>-        Amazon Cybersecurity Awareness Training: <a href="https://learnsecurity.amazon.com/en/index.html">https://learnsecurity.amazon.com/en/index.html</a> </p><p>-        Center for Development of Security Excellence: <a href="https://www.cdse.edu">https://www.cdse.edu</a> </p><p>-        ISC2 -Certified in Cybersecurity: <a href="https://www.isc2.org/1mcc">https://www.isc2.org/1mcc</a> </p><p>-        Cisco Networking Academy: <a href="https://skillsforall.com/course/introduction-to-cybersecurity">https://skillsforall.com/course/introduction-to-cybersecurity</a> </p><p>-        Cyberbit Remote Training: <a href="https://go.cyberbit.com/100k-worth-of-free-remote-cyber-range-training/?utm_source=nist_website&amp;utm_medium=list&amp;utm_campaign=free-remote-soc-team-training-nam">https://go.cyberbit.com/100k-worth-of-free-remote-cyber-range-training/?utm_source=nist_website&amp;utm_medium=list&amp;utm_campaign=free-remote-soc-team-training-nam</a> </p><p>-        StationX - 12 Month Trial: <a href="https://www.cybersecurityjobs.com/csj-training-fund/">https://www.cybersecurityjobs.com/csj-training-fund/</a> </p><p>-        Cyber Training 365: <a href="https://www.cybertraining365.com/cybertraining/FreeClasses">https://www.cybertraining365.com/cybertraining/FreeClasses</a> </p><p>-        Cyber Skyline Professional: <a href="https://cyberskyline.com/professional/purchase">https://cyberskyline.com/professional/purchase</a> </p><p>-        Cybrary: <a href="https://www.cybrary.it">https://www.cybrary.it</a> </p><p>-        EC.Council: <a href="https://www.eccouncil.org/cybersecurity-exchange/free-cybersecurity-resources-2022/">https://www.eccouncil.org/cybersecurity-exchange/free-cybersecurity-resources-2022/</a> </p><p>-        Elastic: <a href="https://www.elastic.co/training/free">https://www.elastic.co/training/free</a> </p><p>-        Evolve Academy: <a href="https://www.academy.evolvesecurity.com/cybersecurity-fundamentals">https://www.academy.evolvesecurity.com/cybersecurity-fundamentals</a> </p><p>-        Federal Virtual Training: <a href="https://fedvte.usalearning.gov">https://fedvte.usalearning.gov</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From Construction to ER Nurse to Security Researcher With Alex Gatz of ThreatX</title>
      <itunes:title>From Construction to ER Nurse to Security Researcher With Alex Gatz of ThreatX</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2fc84081-b516-4763-93b6-a6bcb1c31c6f</guid>
      <link>https://executivesecurity.transistor.fm/episodes/from-construction-to-er-nurse-to-security-researcher-with-alex-gatz-of-threatx</link>
      <description>
        <![CDATA[<p>How do you make the jump from ER nurse to SOC analyst? Alex Gatz did it, and he’s sharing his insights and tips with the eXecutive Security podcast audience. Don’t miss this fascinating discussion about making a bold career change, the power of LinkedIn, what a security researcher does, the benefits of working for a startup, and more.</p><p>Alex Gatz is a senior security researcher at ThreatX. Previously, he worked as a data analyst and ER nurse at MidMichigan Health.</p><p><strong> </strong></p><p>Alex Gatz on LinkedIn: <a href="https://www.linkedin.com/in/alexgatz/">https://www.linkedin.com/in/alexgatz/</a> </p><p>Stephen Semmelroth: <a href="https://www.linkedin.com/in/semmelroth/">https://www.linkedin.com/in/semmelroth/</a> </p><p>We Hack Purple: <a href="https://www.linkedin.com/company/wehackpurple/">https://www.linkedin.com/company/wehackpurple/</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you make the jump from ER nurse to SOC analyst? Alex Gatz did it, and he’s sharing his insights and tips with the eXecutive Security podcast audience. Don’t miss this fascinating discussion about making a bold career change, the power of LinkedIn, what a security researcher does, the benefits of working for a startup, and more.</p><p>Alex Gatz is a senior security researcher at ThreatX. Previously, he worked as a data analyst and ER nurse at MidMichigan Health.</p><p><strong> </strong></p><p>Alex Gatz on LinkedIn: <a href="https://www.linkedin.com/in/alexgatz/">https://www.linkedin.com/in/alexgatz/</a> </p><p>Stephen Semmelroth: <a href="https://www.linkedin.com/in/semmelroth/">https://www.linkedin.com/in/semmelroth/</a> </p><p>We Hack Purple: <a href="https://www.linkedin.com/company/wehackpurple/">https://www.linkedin.com/company/wehackpurple/</a> </p>]]>
      </content:encoded>
      <pubDate>Fri, 30 Jun 2023 07:08:26 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/d7bc0a7d/a0e88c50.mp3" length="49024168" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cwewyy8uFkAk-UM5Dy7CW6C0hJ8EvYR2My2v4J1iH0g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ3MTMv/MTY3OTg4NjMxOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1225</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you make the jump from ER nurse to SOC analyst? Alex Gatz did it, and he’s sharing his insights and tips with the eXecutive Security podcast audience. Don’t miss this fascinating discussion about making a bold career change, the power of LinkedIn, what a security researcher does, the benefits of working for a startup, and more.</p><p>Alex Gatz is a senior security researcher at ThreatX. Previously, he worked as a data analyst and ER nurse at MidMichigan Health.</p><p><strong> </strong></p><p>Alex Gatz on LinkedIn: <a href="https://www.linkedin.com/in/alexgatz/">https://www.linkedin.com/in/alexgatz/</a> </p><p>Stephen Semmelroth: <a href="https://www.linkedin.com/in/semmelroth/">https://www.linkedin.com/in/semmelroth/</a> </p><p>We Hack Purple: <a href="https://www.linkedin.com/company/wehackpurple/">https://www.linkedin.com/company/wehackpurple/</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Your Network Matters More Than Your Resume With Mike Privette of Passport</title>
      <itunes:title>Your Network Matters More Than Your Resume With Mike Privette of Passport</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21296f27-aac4-429f-b410-c7832d922ac0</guid>
      <link>https://executivesecurity.transistor.fm/episodes/your-network-matters-more-than-your-resume-with-mike-privette-of-passport</link>
      <description>
        <![CDATA[<p>The job market has shifted dramatically in the past two years, and Mike Privette shares his thoughts on navigating it in this episode. He and Gene discuss things you can do TODAY to get your foot in the cybersecurity door. </p><p>Mike Privette is the CISO, VP of Information &amp; Cyber Security at Passport. He is also the founder of Return on Security, which publishes the Security, Funded newsletter. Previously, he held cybersecurity leadership roles at various organizations, including Defiance Digital, Truist, MetLife, and Ally Financial.</p><p> </p><p>Mike Privette on LinkedIn: <a href="https://www.linkedin.com/in/mikeprivette/">https://www.linkedin.com/in/mikeprivette/</a> </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The job market has shifted dramatically in the past two years, and Mike Privette shares his thoughts on navigating it in this episode. He and Gene discuss things you can do TODAY to get your foot in the cybersecurity door. </p><p>Mike Privette is the CISO, VP of Information &amp; Cyber Security at Passport. He is also the founder of Return on Security, which publishes the Security, Funded newsletter. Previously, he held cybersecurity leadership roles at various organizations, including Defiance Digital, Truist, MetLife, and Ally Financial.</p><p> </p><p>Mike Privette on LinkedIn: <a href="https://www.linkedin.com/in/mikeprivette/">https://www.linkedin.com/in/mikeprivette/</a> </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Jun 2023 14:06:21 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/ce7d6f08/6402484b.mp3" length="36575848" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hl-OgrZxU_BBEjS0WJ9BRarwcRRH-TDdjRQBdpeyzps/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ3MTIv/MTY3OTg4NjIxNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>914</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The job market has shifted dramatically in the past two years, and Mike Privette shares his thoughts on navigating it in this episode. He and Gene discuss things you can do TODAY to get your foot in the cybersecurity door. </p><p>Mike Privette is the CISO, VP of Information &amp; Cyber Security at Passport. He is also the founder of Return on Security, which publishes the Security, Funded newsletter. Previously, he held cybersecurity leadership roles at various organizations, including Defiance Digital, Truist, MetLife, and Ally Financial.</p><p> </p><p>Mike Privette on LinkedIn: <a href="https://www.linkedin.com/in/mikeprivette/">https://www.linkedin.com/in/mikeprivette/</a> </p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why You Need to Re-invent Yourself Every 3 Years With Faisal Bhutto of Calian</title>
      <itunes:title>Why You Need to Re-invent Yourself Every 3 Years With Faisal Bhutto of Calian</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">26f86db7-87b4-44cd-9542-af501af726fd</guid>
      <link>https://executivesecurity.transistor.fm/episodes/why-you-need-to-re-invent-yourself-every-3-years-with-faisal-bhutto-of-calian</link>
      <description>
        <![CDATA[<p>Key to a successful tech career? Re-inventing yourself every three years, says Faisal Bhutto, SVP of Cloud and Cybersecurity at Calian. Don’t go into tech if you’re not ready to be constantly learning and re-inventing yourself, he says. Hear more tips and advice from Faisal in his episode, including why money and promotions can’t be your only motivation, why you shouldn’t network only to look for a job, and how to get into cybersecurity without a tech background<strong>.</strong></p><p>Faisal Bhutto is SVP of Cloud and Cybersecurity at Calian IT &amp; Cyber Solutions. Previously, he was the co-founder of and COO at ENETsolutions.</p><p> </p><p>Faisal Bhutto on LinkedIn: <a href="https://www.linkedin.com/in/fbhutto/">https://www.linkedin.com/in/fbhutto/</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Key to a successful tech career? Re-inventing yourself every three years, says Faisal Bhutto, SVP of Cloud and Cybersecurity at Calian. Don’t go into tech if you’re not ready to be constantly learning and re-inventing yourself, he says. Hear more tips and advice from Faisal in his episode, including why money and promotions can’t be your only motivation, why you shouldn’t network only to look for a job, and how to get into cybersecurity without a tech background<strong>.</strong></p><p>Faisal Bhutto is SVP of Cloud and Cybersecurity at Calian IT &amp; Cyber Solutions. Previously, he was the co-founder of and COO at ENETsolutions.</p><p> </p><p>Faisal Bhutto on LinkedIn: <a href="https://www.linkedin.com/in/fbhutto/">https://www.linkedin.com/in/fbhutto/</a> </p>]]>
      </content:encoded>
      <pubDate>Thu, 22 Jun 2023 12:32:55 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/8e68b5fd/3ebfea51.mp3" length="54265194" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/W45Tmbi6Ny650TR38l7OPhJS9WzJlHypV8BksFXPdc4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ3MDUv/MTY3OTg4NjEzMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1356</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Key to a successful tech career? Re-inventing yourself every three years, says Faisal Bhutto, SVP of Cloud and Cybersecurity at Calian. Don’t go into tech if you’re not ready to be constantly learning and re-inventing yourself, he says. Hear more tips and advice from Faisal in his episode, including why money and promotions can’t be your only motivation, why you shouldn’t network only to look for a job, and how to get into cybersecurity without a tech background<strong>.</strong></p><p>Faisal Bhutto is SVP of Cloud and Cybersecurity at Calian IT &amp; Cyber Solutions. Previously, he was the co-founder of and COO at ENETsolutions.</p><p> </p><p>Faisal Bhutto on LinkedIn: <a href="https://www.linkedin.com/in/fbhutto/">https://www.linkedin.com/in/fbhutto/</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>My First 2 Years in Cybersecurity After the Military With Corey Nenno of Cargill</title>
      <itunes:title>My First 2 Years in Cybersecurity After the Military With Corey Nenno of Cargill</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c695b79-878a-4788-a80c-8c5367e6bc71</guid>
      <link>https://executivesecurity.transistor.fm/episodes/my-first-2-years-in-cybersecurity-after-the-military-with-corey-nenno-of-cargill</link>
      <description>
        <![CDATA[<p>Corey Nenno (aka That Cyber Guy) just transitioned out of the military and into the cybersecurity industry in 2021 – so this is an ideal episode for those currently in the military looking to soon enter the cybersecurity field. It’s also one of our most practical episodes, whether you’re in the military or not – it’s filled with tips and advice on what to put on your resume, how to pass the CISSP, how to find a mentor, and more.</p><p>Corey Nenno is a Senior Cyber Intelligence Analyst at Cargill. Previously, he spent 12 years in the US Army in Cyber and Information Technology fields.</p><p> </p><p>VetSec: <a href="http://www.veteransec.org">www.veteransec.org</a> </p><p>Corey Nenno on LinkedIn: <a href="https://www.linkedin.com/in/coreynenno/">https://www.linkedin.com/in/coreynenno/</a> </p><p>Cyber Mentor Dojo: <a href="https://cybermentordojo.com">https://cybermentordojo.com</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Corey Nenno (aka That Cyber Guy) just transitioned out of the military and into the cybersecurity industry in 2021 – so this is an ideal episode for those currently in the military looking to soon enter the cybersecurity field. It’s also one of our most practical episodes, whether you’re in the military or not – it’s filled with tips and advice on what to put on your resume, how to pass the CISSP, how to find a mentor, and more.</p><p>Corey Nenno is a Senior Cyber Intelligence Analyst at Cargill. Previously, he spent 12 years in the US Army in Cyber and Information Technology fields.</p><p> </p><p>VetSec: <a href="http://www.veteransec.org">www.veteransec.org</a> </p><p>Corey Nenno on LinkedIn: <a href="https://www.linkedin.com/in/coreynenno/">https://www.linkedin.com/in/coreynenno/</a> </p><p>Cyber Mentor Dojo: <a href="https://cybermentordojo.com">https://cybermentordojo.com</a> </p>]]>
      </content:encoded>
      <pubDate>Thu, 15 Jun 2023 05:41:46 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/595948b9/f478bcfa.mp3" length="35723567" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PGWnPQgOCFdWhw6SWdIZZ57H0oXmh8rB545TWs-QJrU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ2NDcv/MTY4NjgzMjkwNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>893</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Corey Nenno (aka That Cyber Guy) just transitioned out of the military and into the cybersecurity industry in 2021 – so this is an ideal episode for those currently in the military looking to soon enter the cybersecurity field. It’s also one of our most practical episodes, whether you’re in the military or not – it’s filled with tips and advice on what to put on your resume, how to pass the CISSP, how to find a mentor, and more.</p><p>Corey Nenno is a Senior Cyber Intelligence Analyst at Cargill. Previously, he spent 12 years in the US Army in Cyber and Information Technology fields.</p><p> </p><p>VetSec: <a href="http://www.veteransec.org">www.veteransec.org</a> </p><p>Corey Nenno on LinkedIn: <a href="https://www.linkedin.com/in/coreynenno/">https://www.linkedin.com/in/coreynenno/</a> </p><p>Cyber Mentor Dojo: <a href="https://cybermentordojo.com">https://cybermentordojo.com</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From the Front Lines in Iraq to the Boardroom With Alfredo Hickman of Obsidian Security</title>
      <itunes:title>From the Front Lines in Iraq to the Boardroom With Alfredo Hickman of Obsidian Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">54c2d824-373a-4149-ad02-d8e92d0aacef</guid>
      <link>https://executivesecurity.transistor.fm/episodes/from-the-front-lines-in-iraq-to-the-boardroom-with-alfredo-hickman-of-obsidian-security</link>
      <description>
        <![CDATA[<p>Alfredo Hickman fought the war on terror in the early 2000s in the Marine Corps infantry in Iraq. He shares some intense stories from his military experiences overseas with Gene, as well as how he transitioned from the front lines to a cybersecurity executive. Alfredo is passionate about helping veterans and giving back, and this episode is valuable for anyone looking to enter this industry, military or not. He shares details about his life and journey, his thoughts on cybersecurity trends in 2023, how the SANS Institute has been a resource for him and can be for others, his thoughts on mentoring, and more.</p><p>Alfredo Hickman is Head of Information Security at Obsidian Security. He previously held security leadership positions at Rackspace. Alfredo served in the US Marine Corps from 2003 to 2011.</p><p> </p><p>Alfredo Hickman on LinkedIn: <a href="https://www.linkedin.com/in/alfredohickman/">https://www.linkedin.com/in/alfredohickman/</a> </p><p>Obsidian Security: <a href="https://www.obsidiansecurity.com">https://www.obsidiansecurity.com</a> </p><p>SANS Institute: <a href="https://www.sans.org">https://www.sans.org</a> </p><p>#CyberMentoringMonday on Twitter and LinkedIn </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Alfredo Hickman fought the war on terror in the early 2000s in the Marine Corps infantry in Iraq. He shares some intense stories from his military experiences overseas with Gene, as well as how he transitioned from the front lines to a cybersecurity executive. Alfredo is passionate about helping veterans and giving back, and this episode is valuable for anyone looking to enter this industry, military or not. He shares details about his life and journey, his thoughts on cybersecurity trends in 2023, how the SANS Institute has been a resource for him and can be for others, his thoughts on mentoring, and more.</p><p>Alfredo Hickman is Head of Information Security at Obsidian Security. He previously held security leadership positions at Rackspace. Alfredo served in the US Marine Corps from 2003 to 2011.</p><p> </p><p>Alfredo Hickman on LinkedIn: <a href="https://www.linkedin.com/in/alfredohickman/">https://www.linkedin.com/in/alfredohickman/</a> </p><p>Obsidian Security: <a href="https://www.obsidiansecurity.com">https://www.obsidiansecurity.com</a> </p><p>SANS Institute: <a href="https://www.sans.org">https://www.sans.org</a> </p><p>#CyberMentoringMonday on Twitter and LinkedIn </p>]]>
      </content:encoded>
      <pubDate>Fri, 09 Jun 2023 11:26:56 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/9c5c550f/e731484f.mp3" length="46074847" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1lwChX2TGHycE9hv2m-QbAZ7jArjNiRyaBHfd72P_NQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ2NDIv/MTY3OTg4NTgzMi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1151</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Alfredo Hickman fought the war on terror in the early 2000s in the Marine Corps infantry in Iraq. He shares some intense stories from his military experiences overseas with Gene, as well as how he transitioned from the front lines to a cybersecurity executive. Alfredo is passionate about helping veterans and giving back, and this episode is valuable for anyone looking to enter this industry, military or not. He shares details about his life and journey, his thoughts on cybersecurity trends in 2023, how the SANS Institute has been a resource for him and can be for others, his thoughts on mentoring, and more.</p><p>Alfredo Hickman is Head of Information Security at Obsidian Security. He previously held security leadership positions at Rackspace. Alfredo served in the US Marine Corps from 2003 to 2011.</p><p> </p><p>Alfredo Hickman on LinkedIn: <a href="https://www.linkedin.com/in/alfredohickman/">https://www.linkedin.com/in/alfredohickman/</a> </p><p>Obsidian Security: <a href="https://www.obsidiansecurity.com">https://www.obsidiansecurity.com</a> </p><p>SANS Institute: <a href="https://www.sans.org">https://www.sans.org</a> </p><p>#CyberMentoringMonday on Twitter and LinkedIn </p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Using Social Media to Your Advantage With David Cross of Oracle</title>
      <itunes:title>Using Social Media to Your Advantage With David Cross of Oracle</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">212664e2-cc09-4841-a8f8-b8e2295a8a5f</guid>
      <link>https://executivesecurity.transistor.fm/episodes/using-social-media-to-your-advantage-with-david-cross-of-oracle</link>
      <description>
        <![CDATA[<p>David Cross’ advice for breaking into cybersecurity? Strategic use of gift cards. Get details on his networking through social media ideas in this episode. David transitioned out of the military into the world of high tech, where he has held numerous cybersecurity leadership roles. This episode is filled with practical tips and advice on demonstrating your skills to prospective employers, deciding what type of company to work for, transitioning military skills to the corporate world, networking, and more.</p><p>David Cross is the Senior Vice President, Chief Information Security Officer (CISO) of Oracle SaaS Cloud. Previously, he held senior leadership positions at numerous companies, including Google and Microsoft. David also served in the US Navy from 1991 to 1996.</p><p>David Cross on LinkedIn: <a href="https://www.linkedin.com/in/%E2%98%A2%EF%B8%8F-david-b-cross-b856657">linkedin.com/in/☢️-david-b-cross-b856657</a>  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>David Cross’ advice for breaking into cybersecurity? Strategic use of gift cards. Get details on his networking through social media ideas in this episode. David transitioned out of the military into the world of high tech, where he has held numerous cybersecurity leadership roles. This episode is filled with practical tips and advice on demonstrating your skills to prospective employers, deciding what type of company to work for, transitioning military skills to the corporate world, networking, and more.</p><p>David Cross is the Senior Vice President, Chief Information Security Officer (CISO) of Oracle SaaS Cloud. Previously, he held senior leadership positions at numerous companies, including Google and Microsoft. David also served in the US Navy from 1991 to 1996.</p><p>David Cross on LinkedIn: <a href="https://www.linkedin.com/in/%E2%98%A2%EF%B8%8F-david-b-cross-b856657">linkedin.com/in/☢️-david-b-cross-b856657</a>  </p>]]>
      </content:encoded>
      <pubDate>Thu, 01 Jun 2023 08:21:19 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/b63f14b6/9bdb802d.mp3" length="39591431" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/I3P3yLxRHNgnhddvE4o5-Q-a0K3tBWN8uVjX77TRaMg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ2NDAv/MTY3OTg4NTcwMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>989</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>David Cross’ advice for breaking into cybersecurity? Strategic use of gift cards. Get details on his networking through social media ideas in this episode. David transitioned out of the military into the world of high tech, where he has held numerous cybersecurity leadership roles. This episode is filled with practical tips and advice on demonstrating your skills to prospective employers, deciding what type of company to work for, transitioning military skills to the corporate world, networking, and more.</p><p>David Cross is the Senior Vice President, Chief Information Security Officer (CISO) of Oracle SaaS Cloud. Previously, he held senior leadership positions at numerous companies, including Google and Microsoft. David also served in the US Navy from 1991 to 1996.</p><p>David Cross on LinkedIn: <a href="https://www.linkedin.com/in/%E2%98%A2%EF%B8%8F-david-b-cross-b856657">linkedin.com/in/☢️-david-b-cross-b856657</a>  </p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Power of Advocating for Yourself With Parham Eftekhari of CyberRisk Alliance</title>
      <itunes:title>The Power of Advocating for Yourself With Parham Eftekhari of CyberRisk Alliance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a5eb89c8-91b6-481d-b4cb-42eed43a98a2</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-power-of-advocating-for-yourself-with-parham-eftekhari-of-cyberrisk-alliance</link>
      <description>
        <![CDATA[<p>Parham Eftekhari is a nationally recognized leader in cybersecurity, national security, and critical infrastructure. He currently serves as an Executive Vice President at CyberRisk Alliance, setting the vision and operating priorities for its executive development, CISO, and community solutions. Parham also serves as the chairman of the Institute for Critical Infrastructure Technology (ICIT), the nation's leading cybersecurity think tank which he founded in 2014, and advisory board member at MazeBolt Technologies and the Ready Rock Institute. Other leadership roles during his 15-year career include co-founder and V.P of research at the Government Technology Research Alliance and founder of the world’s first webcam cover manufacturer CamPatch.com.</p><p><strong> </strong></p><p>Parham Eftekhari LinkedIn: <a href="https://www.linkedin.com/in/parhamtech/">https://www.linkedin.com/in/parhamtech/</a> </p><p>Institute for Critical Infrastructure Technology (ICIT): <a href="https://icitech.org">https://icitech.org</a> </p><p>CyberRisk Alliance: <a href="https://www.cyberriskalliance.com">https://www.cyberriskalliance.com</a> </p><p>ISACA: <a href="https://www.isaca.org/why-isaca">https://www.isaca.org/why-isaca</a> </p><p>ISSA: <a href="https://www.issa.org">https://www.issa.org</a> </p><p>(ISC)2:<a href="https://www.isc2.org">https://www.isc2.org</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Parham Eftekhari is a nationally recognized leader in cybersecurity, national security, and critical infrastructure. He currently serves as an Executive Vice President at CyberRisk Alliance, setting the vision and operating priorities for its executive development, CISO, and community solutions. Parham also serves as the chairman of the Institute for Critical Infrastructure Technology (ICIT), the nation's leading cybersecurity think tank which he founded in 2014, and advisory board member at MazeBolt Technologies and the Ready Rock Institute. Other leadership roles during his 15-year career include co-founder and V.P of research at the Government Technology Research Alliance and founder of the world’s first webcam cover manufacturer CamPatch.com.</p><p><strong> </strong></p><p>Parham Eftekhari LinkedIn: <a href="https://www.linkedin.com/in/parhamtech/">https://www.linkedin.com/in/parhamtech/</a> </p><p>Institute for Critical Infrastructure Technology (ICIT): <a href="https://icitech.org">https://icitech.org</a> </p><p>CyberRisk Alliance: <a href="https://www.cyberriskalliance.com">https://www.cyberriskalliance.com</a> </p><p>ISACA: <a href="https://www.isaca.org/why-isaca">https://www.isaca.org/why-isaca</a> </p><p>ISSA: <a href="https://www.issa.org">https://www.issa.org</a> </p><p>(ISC)2:<a href="https://www.isc2.org">https://www.isc2.org</a> </p>]]>
      </content:encoded>
      <pubDate>Wed, 24 May 2023 07:15:41 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/f5193086/014e5373.mp3" length="55313935" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NLCBaEmXAiuczW9Fnn8L1cBkScI7GoUbMSVB_7Sgr8M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExOTI4Mjkv/MTY3NTQ0OTkwNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1382</itunes:duration>
      <itunes:summary>Key to career success according to Parham Eftekhari? Advocate for yourself, even if it doesn’t come naturally. He’s got great advice for those who feel uncomfortable with this suggestion, and for those looking to help and encourage those who are more introverted. In this episode, Gene and Parham also talk about his experience working in cybersecurity in the public sector and the opportunities available there, and about the CyberRisk Alliance and other organizations that could be valuable resources for those looking to enter or just starting out in cybersecurity.</itunes:summary>
      <itunes:subtitle>Key to career success according to Parham Eftekhari? Advocate for yourself, even if it doesn’t come naturally. He’s got great advice for those who feel uncomfortable with this suggestion, and for those looking to help and encourage those who are more intr</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Debunking Myths About Cybersecurity Careers With Rick Doten of Centene</title>
      <itunes:title>Debunking Myths About Cybersecurity Careers With Rick Doten of Centene</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cd643279-a013-48e1-a9cf-a6fa39ae277d</guid>
      <link>https://executivesecurity.transistor.fm/episodes/debunking-myths-about-cybersecurity-careers-with-rick-doten-of-centene</link>
      <description>
        <![CDATA[<p>Rick Doten is VP, Information Security at Centene Corporation. He has over 30 years of experience in the IT industry, the last 23 focused specifically on cyber security. He has worked as both CISO of multinational company, and a management consultant performing risk management and risk engineering to mature customer security and privacy programs.</p><p> </p><p>Rick Doten on LinkedIn: <a href="https://www.linkedin.com/in/rick-doten-633470177/">https://www.linkedin.com/in/rick-doten-633470177/</a> </p><p>Rick Doten YouTube channel: <a href="https://www.youtube.com/channel/UCSePMfJMI2PJ2qMrQrX9vIQ">https://www.youtube.com/channel/UCSePMfJMI2PJ2qMrQrX9vIQ</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Rick Doten is VP, Information Security at Centene Corporation. He has over 30 years of experience in the IT industry, the last 23 focused specifically on cyber security. He has worked as both CISO of multinational company, and a management consultant performing risk management and risk engineering to mature customer security and privacy programs.</p><p> </p><p>Rick Doten on LinkedIn: <a href="https://www.linkedin.com/in/rick-doten-633470177/">https://www.linkedin.com/in/rick-doten-633470177/</a> </p><p>Rick Doten YouTube channel: <a href="https://www.youtube.com/channel/UCSePMfJMI2PJ2qMrQrX9vIQ">https://www.youtube.com/channel/UCSePMfJMI2PJ2qMrQrX9vIQ</a> </p>]]>
      </content:encoded>
      <pubDate>Thu, 18 May 2023 11:17:07 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/b11f20f9/a56ee76b.mp3" length="46968120" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_L-p1RWXyGRxKF9UChgxybdVo7E7wM18xblvxF9hqDM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExOTI4MTAv/MTY3NTQ0OTMwNy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1174</itunes:duration>
      <itunes:summary>Cybersecurity has become unnecessarily intimidating, says Rick Doten in his podcast episode with Gene. He breaks down what it’s really like to work in cyber, and the skills and traits you actually need. He also offers some valuable, practical advice about resume writing, cloud security jobs, and security certifications.</itunes:summary>
      <itunes:subtitle>Cybersecurity has become unnecessarily intimidating, says Rick Doten in his podcast episode with Gene. He breaks down what it’s really like to work in cyber, and the skills and traits you actually need. He also offers some valuable, practical advice about</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Truth About Cybersecurity Marketing With Carol Meyers of Glasswing Ventures</title>
      <itunes:title>The Truth About Cybersecurity Marketing With Carol Meyers of Glasswing Ventures</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9fccc24d-09fa-4e29-8726-dedf5c6d27e8</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-truth-about-cybersecurity-marketing-with-carol-meyers-of-glasswing-ventures</link>
      <description>
        <![CDATA[<p>Carol Meyers is a partner at Glasswing Ventures, and independent board member, and an executive coach. She was formerly the CMO at Rapid7.</p><p><br></p><p>Carol Meyers on LinkedIn:<strong> </strong><a href="https://www.linkedin.com/in/caroljmeyers/">https://www.linkedin.com/in/caroljmeyers/</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Carol Meyers is a partner at Glasswing Ventures, and independent board member, and an executive coach. She was formerly the CMO at Rapid7.</p><p><br></p><p>Carol Meyers on LinkedIn:<strong> </strong><a href="https://www.linkedin.com/in/caroljmeyers/">https://www.linkedin.com/in/caroljmeyers/</a> </p>]]>
      </content:encoded>
      <pubDate>Fri, 12 May 2023 10:11:01 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/3f90c287/4e48298d.mp3" length="36554634" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_CxPedtPKWf4m-QCFlH4kzu4LTGth-7mw6cIlY125wU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjAwNzkv/MTY3MzIxMDA4Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>913</itunes:duration>
      <itunes:summary>Thinking about cybersecurity marketing? Former Rapid7 CMO Carol Meyers debunks some myths surrounding that career choice in her eXecutive Security podcast episode. Carol is also an executive coach and board member, and she offers some great career advice about knowing when to quit and playing to your strengths.</itunes:summary>
      <itunes:subtitle>Thinking about cybersecurity marketing? Former Rapid7 CMO Carol Meyers debunks some myths surrounding that career choice in her eXecutive Security podcast episode. Carol is also an executive coach and board member, and she offers some great career advice </itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>RSA Attendee Question: What's the No. 1 piece of advice you'd offer to someone trying to break into security?</title>
      <itunes:title>RSA Attendee Question: What's the No. 1 piece of advice you'd offer to someone trying to break into security?</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">ac42ebb7-ed3e-4b41-a337-dadc2c2d5298</guid>
      <link>https://executivesecurity.transistor.fm/episodes/rsa-attendee-question-whats-the-no-1-piece-of-advice-youd-offer-to-someone-trying-to-break-into-security</link>
      <description>
        <![CDATA[<p>At the recent RSA Conference in San Francisco, we decided to take advantage of all the cybersecurity professionals gathered in one place to get some advice for those looking to enter the industry. We asked attendees who visited the ThreatX booth, What's the No. 1 piece of advice you'd offer to someone trying to break into cybersecurity? We recorded more than 20 answers, and collected a few here for this podcast episode.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>At the recent RSA Conference in San Francisco, we decided to take advantage of all the cybersecurity professionals gathered in one place to get some advice for those looking to enter the industry. We asked attendees who visited the ThreatX booth, What's the No. 1 piece of advice you'd offer to someone trying to break into cybersecurity? We recorded more than 20 answers, and collected a few here for this podcast episode.</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 May 2023 08:58:30 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/51c0b527/4a743f65.mp3" length="21837321" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/oXqi_JB8hcmGqMNKroBrITDQlSaesPgIhOJWl_LFqdE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMjk3NTcv/MTY4MzkwNzI3Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>546</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>At the recent RSA Conference in San Francisco, we decided to take advantage of all the cybersecurity professionals gathered in one place to get some advice for those looking to enter the industry. We asked attendees who visited the ThreatX booth, What's the No. 1 piece of advice you'd offer to someone trying to break into cybersecurity? We recorded more than 20 answers, and collected a few here for this podcast episode.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Finding Opportunity in an Economic Downturn With Alyssa Robinson of HubSpot</title>
      <itunes:title>Finding Opportunity in an Economic Downturn With Alyssa Robinson of HubSpot</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6815bcec-012e-4378-b12d-4d2fe8a31647</guid>
      <link>https://executivesecurity.transistor.fm/episodes/finding-opportunity-in-an-economic-downturn-with-alyssa-robinson-of-hubspot</link>
      <description>
        <![CDATA[<p>It’s rough to start your career in an economic downturn, as many of our listeners are now finding out. Alyssa Robinson started her career in a down economy, but she found opportunity amidst the challenges. Listen to her episode to find out the silver linings of kicking off a career in uncertain times.</p><p>Alyssa Robinson is Deputy CISO at HubSpot and has had security leadership roles at several organizations, including Compete, Inc. and the Broad Institute.</p><p> </p><p>HubSpot: <a href="https://www.linkedin.com/company/hubspot/">https://www.linkedin.com/company/hubspot/</a> </p><p>Alyssa Robinson on LinkedIn: <a href="https://www.linkedin.com/in/alyssa-robinson-0a83231/">https://www.linkedin.com/in/alyssa-robinson-0a83231/</a> </p><p><strong> </strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>It’s rough to start your career in an economic downturn, as many of our listeners are now finding out. Alyssa Robinson started her career in a down economy, but she found opportunity amidst the challenges. Listen to her episode to find out the silver linings of kicking off a career in uncertain times.</p><p>Alyssa Robinson is Deputy CISO at HubSpot and has had security leadership roles at several organizations, including Compete, Inc. and the Broad Institute.</p><p> </p><p>HubSpot: <a href="https://www.linkedin.com/company/hubspot/">https://www.linkedin.com/company/hubspot/</a> </p><p>Alyssa Robinson on LinkedIn: <a href="https://www.linkedin.com/in/alyssa-robinson-0a83231/">https://www.linkedin.com/in/alyssa-robinson-0a83231/</a> </p><p><strong> </strong></p>]]>
      </content:encoded>
      <pubDate>Mon, 08 May 2023 07:20:48 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/77f59e84/6287c7ef.mp3" length="41398984" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UO2dQXVTjgmnsYRZ-tXL8wGsSEHHlti2bK9pILlKC_o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNjQ3MTQv/MTY3OTg4NjQ0NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1034</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>It’s rough to start your career in an economic downturn, as many of our listeners are now finding out. Alyssa Robinson started her career in a down economy, but she found opportunity amidst the challenges. Listen to her episode to find out the silver linings of kicking off a career in uncertain times.</p><p>Alyssa Robinson is Deputy CISO at HubSpot and has had security leadership roles at several organizations, including Compete, Inc. and the Broad Institute.</p><p> </p><p>HubSpot: <a href="https://www.linkedin.com/company/hubspot/">https://www.linkedin.com/company/hubspot/</a> </p><p>Alyssa Robinson on LinkedIn: <a href="https://www.linkedin.com/in/alyssa-robinson-0a83231/">https://www.linkedin.com/in/alyssa-robinson-0a83231/</a> </p><p><strong> </strong></p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tips and Techniques: Lessons Learned From ThreatX Hiring</title>
      <itunes:title>Tips and Techniques: Lessons Learned From ThreatX Hiring</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">58d079b2-b3af-45ca-a37a-0359f676ed1f</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tips-and-techniques-lessons-learned-from-threatx-hiring</link>
      <description>
        <![CDATA[<p>We recently received more than 4,000 resumes for a job listing for an entry-level security position. How does this number make sense considering the cybersecurity skills gap? Gene shares his thoughts in this short episode.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We recently received more than 4,000 resumes for a job listing for an entry-level security position. How does this number make sense considering the cybersecurity skills gap? Gene shares his thoughts in this short episode.</p>]]>
      </content:encoded>
      <pubDate>Thu, 04 May 2023 10:56:03 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/acb6574f/f3ef8d8b.mp3" length="13088361" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pKXdJZm403jbLnvtq9e8wgfl4n3MTNZX6vexEMSMv90/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMjA0Mjcv/MTY4MzIxODE5Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>327</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We recently received more than 4,000 resumes for a job listing for an entry-level security position. How does this number make sense considering the cybersecurity skills gap? Gene shares his thoughts in this short episode.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building a Personal Brand With Etan Basseri of Microsoft</title>
      <itunes:title>Building a Personal Brand With Etan Basseri of Microsoft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">deecbb79-333d-45aa-8762-8e51aa82a551</guid>
      <link>https://executivesecurity.transistor.fm/episodes/building-a-personal-brand-with-etan-basseri-of-microsoft</link>
      <description>
        <![CDATA[<p>Etan Basseri is a product manager on Microsoft's Identity Security team, working to prevent and detect identity compromise. During the course of his career, he’s held a range of roles across law, business development, consulting and product, so he frequently advises and mentors others on their career development.</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/basseri/">https://www.linkedin.com/in/basseri/ </a><br>Career Walking Decks 101: <a href="https://kkarenism.com/career-walking-decks-101/">https://kkarenism.com/career-walking-decks-101/</a><br> Microsoft Software &amp; Systems Academy (MSSA) – Microsoft Military Affairs: <a href="https://military.microsoft.com/mssa/">https://military.microsoft.com/mssa/</a><br> Cybrary: <a href="https://www.cybrary.it/info/homepaged/">https://www.cybrary.it/info/homepaged/</a><br> SANS Institute: <a href="https://www.sans.org/mlp/2/">https://www.sans.org/mlp/2/</a><br> (ISC)2: <a href="https://www.isc2.org/">https://www.isc2.org</a><br> Pluralsight: <a href="https://www.pluralsight.com/">https://www.pluralsight.com</a></p><p><strong> </strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Etan Basseri is a product manager on Microsoft's Identity Security team, working to prevent and detect identity compromise. During the course of his career, he’s held a range of roles across law, business development, consulting and product, so he frequently advises and mentors others on their career development.</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/basseri/">https://www.linkedin.com/in/basseri/ </a><br>Career Walking Decks 101: <a href="https://kkarenism.com/career-walking-decks-101/">https://kkarenism.com/career-walking-decks-101/</a><br> Microsoft Software &amp; Systems Academy (MSSA) – Microsoft Military Affairs: <a href="https://military.microsoft.com/mssa/">https://military.microsoft.com/mssa/</a><br> Cybrary: <a href="https://www.cybrary.it/info/homepaged/">https://www.cybrary.it/info/homepaged/</a><br> SANS Institute: <a href="https://www.sans.org/mlp/2/">https://www.sans.org/mlp/2/</a><br> (ISC)2: <a href="https://www.isc2.org/">https://www.isc2.org</a><br> Pluralsight: <a href="https://www.pluralsight.com/">https://www.pluralsight.com</a></p><p><strong> </strong></p>]]>
      </content:encoded>
      <pubDate>Fri, 28 Apr 2023 07:11:35 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/ea993200/e2bca025.mp3" length="60417157" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WCXYddCY4kpaZbpGQ5qsgNTBRh9tMa36mdJ2w8m5cJQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNTUzNDIv/MTY3Mjg1MjQ5Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1510</itunes:duration>
      <itunes:summary>Etan Basseri made a dramatic pivot mid-career from lawyer to high-tech professional. In this episode, he talks to Gene about his lessons learned from that journey. They also chat about identity security, building a personal brand, and how Microsoft is helping vets build careers.</itunes:summary>
      <itunes:subtitle>Etan Basseri made a dramatic pivot mid-career from lawyer to high-tech professional. In this episode, he talks to Gene about his lessons learned from that journey. They also chat about identity security, building a personal brand, and how Microsoft is hel</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tips and Techniques: RSA</title>
      <itunes:title>Tips and Techniques: RSA</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">0edec36e-ed4e-448c-9703-339fbb3e36e5</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tips-and-techniques-rsa</link>
      <description>
        <![CDATA[<p>New to RSA? Gene offers a few quick tips and some advice on navigating this massive cybersecurity conference for the first time.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>New to RSA? Gene offers a few quick tips and some advice on navigating this massive cybersecurity conference for the first time.</p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Apr 2023 11:13:54 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/b8c4e61c/69be69a0.mp3" length="9555505" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0tgvrczSLSyFjmnUS90toygpR2P-RIlXOmHMlI5butg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMDEyNjMv/MTY4MjEwMDgwMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>239</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>New to RSA? Gene offers a few quick tips and some advice on navigating this massive cybersecurity conference for the first time.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Stand Out as an Entry Level Candidate With Neil Weitzel of ThreatX</title>
      <itunes:title>How to Stand Out as an Entry Level Candidate With Neil Weitzel of ThreatX</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a0000a8f-64fc-4d95-ab11-7bbc5c55f423</guid>
      <link>https://executivesecurity.transistor.fm/episodes/how-to-stand-out-as-an-entry-level-candidate-with-neil-weitzel-of-threatx</link>
      <description>
        <![CDATA[<p>Neil is currently ThreatX’s SOC manager and has 15 years of experience in roles from user support to leading security programs. He has expertise in security architecture and cybersecurity best practices and is an active member of the security community. He has delivered lectures at DEF CON, OWASP, and local security meetups. Neil also acts as an adjunct lecturer on Software Engineering at Indiana University.</p><p> </p><p>Defcon: <a href="https://defcon.org">https://defcon.org</a> </p><p>BSides: <a href="http://www.securitybsides.com/w/page/12194156/FrontPage">http://www.securitybsides.com/w/page/12194156/FrontPage</a> </p><p>Neil Weitzel LinkedIn: <a href="https://www.linkedin.com/in/neilweitzel/">https://www.linkedin.com/in/neilweitzel/</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Neil is currently ThreatX’s SOC manager and has 15 years of experience in roles from user support to leading security programs. He has expertise in security architecture and cybersecurity best practices and is an active member of the security community. He has delivered lectures at DEF CON, OWASP, and local security meetups. Neil also acts as an adjunct lecturer on Software Engineering at Indiana University.</p><p> </p><p>Defcon: <a href="https://defcon.org">https://defcon.org</a> </p><p>BSides: <a href="http://www.securitybsides.com/w/page/12194156/FrontPage">http://www.securitybsides.com/w/page/12194156/FrontPage</a> </p><p>Neil Weitzel LinkedIn: <a href="https://www.linkedin.com/in/neilweitzel/">https://www.linkedin.com/in/neilweitzel/</a> </p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Apr 2023 14:05:21 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/0a1110ce/6d37a20a.mp3" length="45088666" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/qG0e81LKEWE7hYo6fcLbq75xGiNqSHUYXxynJHuwquI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNDMyMDIv/MTY3MTY2MDg3Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1127</itunes:duration>
      <itunes:summary>What are hiring managers looking for in entry level cybersecurity candidates? Get it straight from a hiring manager in this episode. Gene recently sat down with his colleague Neil Weitzel, ThreatX SOC Manager, to get his thoughts on hiring for the SOC. This episode is filled with lots of great advice on getting your foot in the cybersecurity door.</itunes:summary>
      <itunes:subtitle>What are hiring managers looking for in entry level cybersecurity candidates? Get it straight from a hiring manager in this episode. Gene recently sat down with his colleague Neil Weitzel, ThreatX SOC Manager, to get his thoughts on hiring for the SOC. Th</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Keys to Thriving as a Cybersecurity Executive With Ed Amoroso</title>
      <itunes:title>Keys to Thriving as a Cybersecurity Executive With Ed Amoroso</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42ccfe08-7b4b-4972-ad1d-27ba00b9bf0a</guid>
      <link>https://executivesecurity.transistor.fm/episodes/keys-to-thriving-as-a-cybersecurity-executive-with-ed-amoroso</link>
      <description>
        <![CDATA[<p>Edward Amoroso is the founder and CEO of Tag InfoSphere. He also teaches courses on cybersecurity at NYU and the Stevens Institute of Technology. Previously, he was the CISO of AT&amp;T for many years.</p><p> </p><p>Tag Cyber: <a href="https://www.tag-cyber.com">https://www.tag-cyber.com</a> </p><p>Cybrary: <a href="https://www.cybrary.it">https://www.cybrary.it</a> </p><p>SANS: <a href="https://www.sans.org">https://www.sans.org</a> </p><p>Coursera: <a href="https://www.coursera.org">https://www.coursera.org</a> </p><p>Edward Amoroso LinkedIn: <a href="https://www.linkedin.com/in/edward-amoroso/">https://www.linkedin.com/in/edward-amoroso/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Edward Amoroso is the founder and CEO of Tag InfoSphere. He also teaches courses on cybersecurity at NYU and the Stevens Institute of Technology. Previously, he was the CISO of AT&amp;T for many years.</p><p> </p><p>Tag Cyber: <a href="https://www.tag-cyber.com">https://www.tag-cyber.com</a> </p><p>Cybrary: <a href="https://www.cybrary.it">https://www.cybrary.it</a> </p><p>SANS: <a href="https://www.sans.org">https://www.sans.org</a> </p><p>Coursera: <a href="https://www.coursera.org">https://www.coursera.org</a> </p><p>Edward Amoroso LinkedIn: <a href="https://www.linkedin.com/in/edward-amoroso/">https://www.linkedin.com/in/edward-amoroso/</a></p>]]>
      </content:encoded>
      <pubDate>Fri, 24 Mar 2023 06:48:39 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/bbe4b6ff/cd279712.mp3" length="69413561" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/AvlPXXHIOh2roYwIyFDY-PRhCYYhH-OpUvmC1Xh-348/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNDMxOTkv/MTY3MTY2MDczNS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1735</itunes:duration>
      <itunes:summary>As the former CISO of AT&amp;amp;T, the founder and CEO of Tag InfoSphere, and a cybersecurity university professor, Ed Amoroso has a lot of insights and advice for our listeners. He and Gene talk about his experience teaching cybersecurity at a university level, how he reached the C-level in cybersecurity and stayed there for so long, how his company Tag InfoSphere can be a resource to those new in their careers, and more.</itunes:summary>
      <itunes:subtitle>As the former CISO of AT&amp;amp;T, the founder and CEO of Tag InfoSphere, and a cybersecurity university professor, Ed Amoroso has a lot of insights and advice for our listeners. He and Gene talk about his experience teaching cybersecurity at a university le</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Increasing the Awareness of Cybersecurity Careers With Julian Waits</title>
      <itunes:title>Increasing the Awareness of Cybersecurity Careers With Julian Waits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">821399f8-e739-49f8-beb7-722798ad1e04</guid>
      <link>https://executivesecurity.transistor.fm/episodes/increasing-the-awareness-of-cybersecurity-careers-with-julian-waits</link>
      <description>
        <![CDATA[<p>The SVP of Business Development and Strategic Alliances at Rapid7, Julian Waits has had a long and impressive career in the cybersecurity industry. He has held positions from software developer to field systems engineer, M&amp;A director, Sales VP, and CEO<strong>.</strong></p><p><strong> </strong></p><p>Cyversity: <a href="https://www.cyversity.or/">https://www.cyversity.or</a></p><p>ISAC: <a href="https://www.it-isac.org">https://www.it-isac.org</a><br> SANS: <a href="https://www.sans.org">https://www.sans.org</a><br> Julian Waits LinkedIn: <a href="https://www.linkedin.com/in/julianwaits/">https://www.linkedin.com/in/julianwaits/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The SVP of Business Development and Strategic Alliances at Rapid7, Julian Waits has had a long and impressive career in the cybersecurity industry. He has held positions from software developer to field systems engineer, M&amp;A director, Sales VP, and CEO<strong>.</strong></p><p><strong> </strong></p><p>Cyversity: <a href="https://www.cyversity.or/">https://www.cyversity.or</a></p><p>ISAC: <a href="https://www.it-isac.org">https://www.it-isac.org</a><br> SANS: <a href="https://www.sans.org">https://www.sans.org</a><br> Julian Waits LinkedIn: <a href="https://www.linkedin.com/in/julianwaits/">https://www.linkedin.com/in/julianwaits/</a></p>]]>
      </content:encoded>
      <pubDate>Fri, 10 Mar 2023 05:51:32 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/95cb5193/7f5cb09a.mp3" length="62003333" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YYl8U2G5jG9mdf6d_wMjIXv8Uv_y2oCngnsAY9uACGw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNDMxOTYv/MTY3MTY2MDYzOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1550</itunes:duration>
      <itunes:summary>Julian Waits never imagined he’d be a leader in the cybersecurity industry; in fact, he trained to become a professional jazz musician. Listen to his podcast episode to hear his journey from music to cyber, and how he is trying to raise awareness of the opportunities in cybersecurity for the next generation through mentoring and his work with Cyversity. He and Gene have a wide-ranging conversation that is inspiring, insightful, funny, and valuable.</itunes:summary>
      <itunes:subtitle>Julian Waits never imagined he’d be a leader in the cybersecurity industry; in fact, he trained to become a professional jazz musician. Listen to his podcast episode to hear his journey from music to cyber, and how he is trying to raise awareness of the o</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Preparing for the Executive Level With David Craigen of TK Elevator</title>
      <itunes:title>Preparing for the Executive Level With David Craigen of TK Elevator</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8cdaf0a9-ecd4-4480-9a7b-496630340e67</guid>
      <link>https://executivesecurity.transistor.fm/episodes/preparing-for-the-executive-level-with-david-craigen-of-tk-elevator</link>
      <description>
        <![CDATA[<p>David Craigen is the BU Information Security Officer, North America and Canada at TK Elevator. Previously, he held senior security leadership positions at several organizations, including Quikrete, BioIQ, and MiMedx.</p><p><strong> </strong></p><p>LinkedIn:<strong> </strong><a href="https://www.linkedin.com/in/davidcraigen/">https://www.linkedin.com/in/davidcraigen/</a><strong> </strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>David Craigen is the BU Information Security Officer, North America and Canada at TK Elevator. Previously, he held senior security leadership positions at several organizations, including Quikrete, BioIQ, and MiMedx.</p><p><strong> </strong></p><p>LinkedIn:<strong> </strong><a href="https://www.linkedin.com/in/davidcraigen/">https://www.linkedin.com/in/davidcraigen/</a><strong> </strong></p>]]>
      </content:encoded>
      <pubDate>Thu, 23 Feb 2023 12:48:26 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/1c8793f9/ea350d50.mp3" length="20961884" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BwMU3LPWud0xl4dPGQtxCOMo4JKIhsgrMgGSsGM4rwM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNDMxOTQv/MTY3MTY2MDQwOC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1308</itunes:duration>
      <itunes:summary>David Craigen worked his way up to the executive level and feels strongly that he needs to prepare and train those who work for him now to have his job later. He and Gene had a great conversation -- filled with practical advice – on everything from transitioning out of the military to figuring out which area of cybersecurity to work in to analyzing job descriptions.</itunes:summary>
      <itunes:subtitle>David Craigen worked his way up to the executive level and feels strongly that he needs to prepare and train those who work for him now to have his job later. He and Gene had a great conversation -- filled with practical advice – on everything from transi</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Hacking Benefits the Rich and Powerful With Bruce Schneier</title>
      <itunes:title>How Hacking Benefits the Rich and Powerful With Bruce Schneier</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">62a577a4-00ef-4e0c-abcc-b3ca6abbdbd6</guid>
      <link>https://executivesecurity.transistor.fm/episodes/how-hacking-benefits-the-rich-and-powerful-with-bruce-schneier</link>
      <description>
        <![CDATA[<p>Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist. He is the New York Times best-selling author of 14 books -- including A Hacker’s Mind -- as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.</p><p> </p><p>Schneier on Security blog: <a href="https://www.schneier.com">https://www.schneier.com</a>  </p><p>Cryto-Gram newsletter: <a href="https://www.schneier.com/crypto-gram/">https://www.schneier.com/crypto-gram/</a> </p><p>About A Hacker’s Mind: <a href="https://www.schneier.com/books/a-hackers-mind/">https://www.schneier.com/books/a-hackers-mind/</a>  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Bruce Schneier is an internationally renowned security technologist, called a “security guru” by the Economist. He is the New York Times best-selling author of 14 books -- including A Hacker’s Mind -- as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a fellow at the Berkman-Klein Center for Internet and Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation and AccessNow, and an advisory board member of EPIC and VerifiedVoting.org. He is the Chief of Security Architecture at Inrupt, Inc.</p><p> </p><p>Schneier on Security blog: <a href="https://www.schneier.com">https://www.schneier.com</a>  </p><p>Cryto-Gram newsletter: <a href="https://www.schneier.com/crypto-gram/">https://www.schneier.com/crypto-gram/</a> </p><p>About A Hacker’s Mind: <a href="https://www.schneier.com/books/a-hackers-mind/">https://www.schneier.com/books/a-hackers-mind/</a>  </p>]]>
      </content:encoded>
      <pubDate>Mon, 13 Feb 2023 09:23:58 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/6fb18443/fee7207e.mp3" length="52451075" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cWDSj--Ry5d0oCWU1xt4lvAjDYzba6vc_IEO7BoFzSk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExOTI4NTMv/MTY3NTQ1MTM3OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1311</itunes:duration>
      <itunes:summary>Hacking itself isn’t good or bad, but the intent behind it is. In his new book, internationally renowned security technologist Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society. He and Gene talk about this fascinating concept, how it’s central to our society, and how it can be checked. Bruce also offers his advice for those thinking about entering the cybersecurity industry. This is a not-to-be-missed episode from one of the most important voices in cybersecurity today.</itunes:summary>
      <itunes:subtitle>Hacking itself isn’t good or bad, but the intent behind it is. In his new book, internationally renowned security technologist Bruce Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society. He and </itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tips and Techniques: Goal Setting</title>
      <itunes:title>Tips and Techniques: Goal Setting</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6aa20cc3-0cd5-46b0-88e8-2d4a548735af</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tips-and-techniques-goal-setting</link>
      <description>
        <![CDATA[Having clear goals and a way to keep yourself accountable is often the key to success. Gene Fay has developed a system to keep himself focused on his yearly goals, and it involves a sticky note. Get his tips on goal setting in this Tips and Techniques episode.]]>
      </description>
      <content:encoded>
        <![CDATA[Having clear goals and a way to keep yourself accountable is often the key to success. Gene Fay has developed a system to keep himself focused on his yearly goals, and it involves a sticky note. Get his tips on goal setting in this Tips and Techniques episode.]]>
      </content:encoded>
      <pubDate>Thu, 02 Feb 2023 14:13:18 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/ebc45e45/a0adc0e0.mp3" length="15567547" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9ytHdCFml9FnQfKwLSP22z6kIvxZKeE4E7wCi69iu1E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNzI4ODQv/MTY3NDE2OTY5MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>389</itunes:duration>
      <itunes:summary>Having clear goals and a way to keep yourself accountable is often the key to success. Gene Fay has developed a system to keep himself focused on his yearly goals, and it involves a sticky note. Get his tips on goal setting in this Tips and Techniques episode.</itunes:summary>
      <itunes:subtitle>Having clear goals and a way to keep yourself accountable is often the key to success. Gene Fay has developed a system to keep himself focused on his yearly goals, and it involves a sticky note. Get his tips on goal setting in this Tips and Techniques epi</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Strengthening the Cybersecurity Industry With Connie Matthews Reynolds of ReynCon</title>
      <itunes:title>Strengthening the Cybersecurity Industry With Connie Matthews Reynolds of ReynCon</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">64b9b8d5-f94a-458a-9df9-5dcb6faa628a</guid>
      <link>https://executivesecurity.transistor.fm/episodes/strengthening-the-cybersecurity-industry-with-connie-matthews-reynolds-of-reyncon</link>
      <description>
        <![CDATA[<p>Connie Matthews Reynolds is the founder and CEO of ReynCon Educational Services and Training, which brings together security practitioners and individuals who want to build their skills, whether new to our field, or building skills for growth or a more cross-functional skill set. She is also a founding member of EmpoWE-R Women of Information Security and the president of the Central Ohio ISSA.</p><p> </p><p>Information Systems Security Association (ISSA): <a href="https://www.issa.org">https://www.issa.org</a> </p><p>EmpoWE-R Women of Infosec: <a href="https://www.empower-infosec.org">https://www.empower-infosec.org</a> </p><p>ReynCon Education Services &amp; Training: <a href="https://www.reynconsecurity.com">https://www.reynconsecurity.com</a> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/conniematthews/">https://www.linkedin.com/in/conniematthews/</a>  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Connie Matthews Reynolds is the founder and CEO of ReynCon Educational Services and Training, which brings together security practitioners and individuals who want to build their skills, whether new to our field, or building skills for growth or a more cross-functional skill set. She is also a founding member of EmpoWE-R Women of Information Security and the president of the Central Ohio ISSA.</p><p> </p><p>Information Systems Security Association (ISSA): <a href="https://www.issa.org">https://www.issa.org</a> </p><p>EmpoWE-R Women of Infosec: <a href="https://www.empower-infosec.org">https://www.empower-infosec.org</a> </p><p>ReynCon Education Services &amp; Training: <a href="https://www.reynconsecurity.com">https://www.reynconsecurity.com</a> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/conniematthews/">https://www.linkedin.com/in/conniematthews/</a>  </p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Jan 2023 08:30:21 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/4773bf93/71acba60.mp3" length="43624029" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vkZ9wz3s6k1K2bZ-EHz0Rl6vn3dF2TRu2GGa6rB7RRM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwOTI0NDkv/MTY2ODAyNjEzNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1090</itunes:duration>
      <itunes:summary>Connie Matthews Reynolds is dedicated to making cybersecurity a stronger and more diverse industry and is an extremely valuable resource for those new in or looking to enter cybersecurity. In her conversation with Gene, they talk about raising awareness of cybersecurity career opportunities, encouraging and celebrating women in infosec, how to interact with a mentor, and more. This episode will be especially helpful for those just starting out in cybersecurity or looking to enter the industry.</itunes:summary>
      <itunes:subtitle>Connie Matthews Reynolds is dedicated to making cybersecurity a stronger and more diverse industry and is an extremely valuable resource for those new in or looking to enter cybersecurity. In her conversation with Gene, they talk about raising awareness o</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tips and Techniques: Avoid This Phone Scam</title>
      <itunes:title>Tips and Techniques: Avoid This Phone Scam</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">824fceec-c8f3-43a8-8df0-8c4096d8c4a5</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tips-and-techniques-avoid-this-phone-scam</link>
      <description>
        <![CDATA[<p>Phone scam recording: <a href="https://www.youtube.com/@CPHarding">https://www.youtube.com/@CPHarding</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Phone scam recording: <a href="https://www.youtube.com/@CPHarding">https://www.youtube.com/@CPHarding</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 23 Jan 2023 11:53:37 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/e75e142a/154ba6d5.mp3" length="61210343" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DhdfBmhZDKNUEa1hcSy0RFX5JBbAqFOkxhglU7udcIM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjU2MjEv/MTY3MzU0MjUzMi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1530</itunes:duration>
      <itunes:summary>Criminals often use social engineering as a pre-cursor to exploiting cybersecurity vulnerabilities. But a recent popular criminal tactic is to use social engineering against the elderly via the phone. Gene shares the details of this dangerous scam in an effort to lessen the number of victims.</itunes:summary>
      <itunes:subtitle>Criminals often use social engineering as a pre-cursor to exploiting cybersecurity vulnerabilities. But a recent popular criminal tactic is to use social engineering against the elderly via the phone. Gene shares the details of this dangerous scam in an e</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Moving Beyond Transactional Behavior Is Key to Cybersecurity Success With Robert Rodriguez of SINET</title>
      <itunes:title>Why Moving Beyond Transactional Behavior Is Key to Cybersecurity Success With Robert Rodriguez of SINET</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">122c5333-abaa-4bbe-a83f-290b8386bf14</guid>
      <link>https://executivesecurity.transistor.fm/episodes/why-moving-beyond-transactional-behavior-is-key-to-cybersecurity-success-with-robert-rodriguez-of-sinet</link>
      <description>
        <![CDATA[<p>Robert D. Rodriguez is the Chairman &amp; Founder of SINET and a Venture Partner at SineWave Ventures. Previously, Robert advised and coordinated the public - private sector outreach for The Department of Homeland Security and other institutions, and served 22 years as a Special Agent with the United States Secret Service.</p><p> </p><p><a href="https://www.linkedin.com/in/rdrod/">https://www.linkedin.com/in/rdrod/</a> </p><p><a href="https://www.security-innovation.org">https://www.security-innovation.org</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Robert D. Rodriguez is the Chairman &amp; Founder of SINET and a Venture Partner at SineWave Ventures. Previously, Robert advised and coordinated the public - private sector outreach for The Department of Homeland Security and other institutions, and served 22 years as a Special Agent with the United States Secret Service.</p><p> </p><p><a href="https://www.linkedin.com/in/rdrod/">https://www.linkedin.com/in/rdrod/</a> </p><p><a href="https://www.security-innovation.org">https://www.security-innovation.org</a> </p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Jan 2023 06:37:06 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/e784af62/3eed8151.mp3" length="46671120" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/pyqqa-9YwF7UcPoIJCPS54m7_tlzsdEzytoA_KP3SeM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwNzgxODUv/MTY2NjgyMTcwNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1166</itunes:duration>
      <itunes:summary>Robert Rodriguez spent 22.5 years working as a Secret Service agent protecting presidents Reagan, Bush, and Clinton before founding SINET. He has a wealth of insights and advice for those new to or looking to advance within cybersecurity. He and Gene talk about his fascinating background, why someone should consider a career in cybersecurity, keys to success in cybersecurity, the transition from government to the private sector, and more.</itunes:summary>
      <itunes:subtitle>Robert Rodriguez spent 22.5 years working as a Secret Service agent protecting presidents Reagan, Bush, and Clinton before founding SINET. He has a wealth of insights and advice for those new to or looking to advance within cybersecurity. He and Gene talk</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Developing the Next Generation of Cybersecurity Professionals With Hayley Roberts of Distology</title>
      <itunes:title>Developing the Next Generation of Cybersecurity Professionals With Hayley Roberts of Distology</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ea66457d-bef1-42cc-944b-ac1ba8d2a568</guid>
      <link>https://executivesecurity.transistor.fm/episodes/developing-the-next-generation-of-cybersecurity-professionals-with-hayley-roberts-of-distology</link>
      <description>
        <![CDATA[<p>Hayley Roberts has been a tech executive for many years, and has been the CEO of Distology, an IT security distributor based in the UK, since 2015.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/hayley-roberts-69b5562/">https://www.linkedin.com/in/hayley-roberts-69b5562/</a> </p><p>Distology: <a href="https://www.distology.com">https://www.distology.com</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Hayley Roberts has been a tech executive for many years, and has been the CEO of Distology, an IT security distributor based in the UK, since 2015.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/hayley-roberts-69b5562/">https://www.linkedin.com/in/hayley-roberts-69b5562/</a> </p><p>Distology: <a href="https://www.distology.com">https://www.distology.com</a> </p>]]>
      </content:encoded>
      <pubDate>Thu, 29 Dec 2022 08:31:35 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/6216afef/3c589abe.mp3" length="51989849" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/R6xFRMM0EcLoZD8QInS2RTZbS2s3otijEEhBNBeeHWA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMzY1NTcv/MTY2Mzk1OTkzNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1299</itunes:duration>
      <itunes:summary>We don’t have a cybersecurity skills gap, says CEO Hayley Roberts, we have an attitude gap. Hayley and Gene discuss what she means by that in her eXecutive Security podcast episode. They also talk about how lack of awareness affects opportunity, diversity in cybersecurity, and more.</itunes:summary>
      <itunes:subtitle>We don’t have a cybersecurity skills gap, says CEO Hayley Roberts, we have an attitude gap. Hayley and Gene discuss what she means by that in her eXecutive Security podcast episode. They also talk about how lack of awareness affects opportunity, diversity</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Amplifying Diverse Thought in Cybersecurity With Akira Brand</title>
      <itunes:title>Amplifying Diverse Thought in Cybersecurity With Akira Brand</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">70df7cd7-270a-4ea2-a941-f0a1dd8ca878</guid>
      <link>https://executivesecurity.transistor.fm/episodes/amplifying-diverse-thought-in-cybersecurity-with-akira-brand</link>
      <description>
        <![CDATA[<p>Akira Brand is an experienced developer who has worked in Developer Relations for the past several years, most recently with Bright Security.</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/akirabrand/">https://www.linkedin.com/in/akirabrand/</a> </p><p>Artists Who Code: <a href="https://www.linkedin.com/company/artistswhocode/">https://www.linkedin.com/company/artistswhocode/</a> </p><p>Bright Security: <a href="https://brightsec.com">https://brightsec.com</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Akira Brand is an experienced developer who has worked in Developer Relations for the past several years, most recently with Bright Security.</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/akirabrand/">https://www.linkedin.com/in/akirabrand/</a> </p><p>Artists Who Code: <a href="https://www.linkedin.com/company/artistswhocode/">https://www.linkedin.com/company/artistswhocode/</a> </p><p>Bright Security: <a href="https://brightsec.com">https://brightsec.com</a> </p>]]>
      </content:encoded>
      <pubDate>Fri, 09 Dec 2022 07:43:27 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/4d083d79/80ff8386.mp3" length="49951369" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8ve7ma1UZBqtucidOdCZj0TVmm9LsFEgBofGR35f1gs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMzY1NTAv/MTY2Mzk1OTczNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1248</itunes:duration>
      <itunes:summary>Ever noticed a lot of cybersecurity professionals have music backgrounds? Akira Brand has a theory. She and Gene discuss that theory and so much more in her recent podcast episode. From shifting left, to diversity in cybersecurity, to developer relations, this conversation covers a lot of ground and offers a lot of great insights.</itunes:summary>
      <itunes:subtitle>Ever noticed a lot of cybersecurity professionals have music backgrounds? Akira Brand has a theory. She and Gene discuss that theory and so much more in her recent podcast episode. From shifting left, to diversity in cybersecurity, to developer relations,</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tips and Techniques: Networking</title>
      <itunes:title>Tips and Techniques: Networking</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b2541e78-e470-43cf-9fd9-45685774b190</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tips-and-techniques-networking</link>
      <description>
        <![CDATA[In this Tips and Techniques episode, eXecutive Security podcast host Gene Fay shares his advice and best practices for networking. Learning how to make the best of networking events is a powerful life skill that plays a big role in career success. With in-person events making a strong comeback post-pandemic, those early and not-so-early in their careers will find Gene’s practical tips valuable.]]>
      </description>
      <content:encoded>
        <![CDATA[In this Tips and Techniques episode, eXecutive Security podcast host Gene Fay shares his advice and best practices for networking. Learning how to make the best of networking events is a powerful life skill that plays a big role in career success. With in-person events making a strong comeback post-pandemic, those early and not-so-early in their careers will find Gene’s practical tips valuable.]]>
      </content:encoded>
      <pubDate>Thu, 01 Dec 2022 11:55:00 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/3536eecb/1d3660eb.mp3" length="10395616" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6qQBmxv8mQhJVZu32WAxuHXylx_gO-PeSuDbTWI8iM4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExMTU3MDMv/MTY2OTg0OTIwMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>260</itunes:duration>
      <itunes:summary>In this Tips and Techniques episode, eXecutive Security podcast host Gene Fay shares his advice and best practices for networking. Learning how to make the best of networking events is a powerful life skill that plays a big role in career success. With in-person events making a strong comeback post-pandemic, those early and not-so-early in their careers will find Gene’s practical tips valuable.</itunes:summary>
      <itunes:subtitle>In this Tips and Techniques episode, eXecutive Security podcast host Gene Fay shares his advice and best practices for networking. Learning how to make the best of networking events is a powerful life skill that plays a big role in career success. With in</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Empowering Women in Cybersecurity With Zenobia Godschalk</title>
      <itunes:title>Empowering Women in Cybersecurity With Zenobia Godschalk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">43bb7bf2-c6dd-4f6d-9038-d18979ba984c</guid>
      <link>https://executivesecurity.transistor.fm/episodes/empowering-women-in-cybersecurity-with-zenobia-godschalk</link>
      <description>
        <![CDATA[<p>Zenobia Godschalk has worked closely with many cybersecurity companies over the years as the founder of ZAG Communications, a PR and marketing firm serving technology companies, and is now SVP of Communications for Hedera. She also does a lot of philanthropic work in the technology space.</p><p><strong>                                                                                                                                    </strong></p><p>LinkedIn: <strong> </strong><a href="https://www.linkedin.com/in/zenobiaaustingodschalk/"><strong>https://www.linkedin.com/in/zenobiaaustingodschalk/</strong></a></p><p><a href="Dark%20Reading%20Article:%20https:/www.darkreading.com/remote-workforce/senior-level-women-leaders-cybersecurity-nonprofit">Dark Reading Article: https<strong>://www.darkreading.com/remote-workforce/senior-level-women-leaders-cybersecurity-nonprofit</strong></a></p><p>Forte Group:<strong> </strong><a href="https://forte-group.org/home-our-mission"><strong>https://forte-group.org/home-our-mission</strong></a></p><p>Andreessen Horowitz:<strong> </strong><a href="https://a16z.com"><strong>https://a16z.com</strong></a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Zenobia Godschalk has worked closely with many cybersecurity companies over the years as the founder of ZAG Communications, a PR and marketing firm serving technology companies, and is now SVP of Communications for Hedera. She also does a lot of philanthropic work in the technology space.</p><p><strong>                                                                                                                                    </strong></p><p>LinkedIn: <strong> </strong><a href="https://www.linkedin.com/in/zenobiaaustingodschalk/"><strong>https://www.linkedin.com/in/zenobiaaustingodschalk/</strong></a></p><p><a href="Dark%20Reading%20Article:%20https:/www.darkreading.com/remote-workforce/senior-level-women-leaders-cybersecurity-nonprofit">Dark Reading Article: https<strong>://www.darkreading.com/remote-workforce/senior-level-women-leaders-cybersecurity-nonprofit</strong></a></p><p>Forte Group:<strong> </strong><a href="https://forte-group.org/home-our-mission"><strong>https://forte-group.org/home-our-mission</strong></a></p><p>Andreessen Horowitz:<strong> </strong><a href="https://a16z.com"><strong>https://a16z.com</strong></a></p>]]>
      </content:encoded>
      <pubDate>Tue, 22 Nov 2022 10:37:23 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/1bb46e78/95aae405.mp3" length="46032789" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sDV0K4R4jvmv0RmyuPC4xywc91teEyARyLtxiPnl2Q4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTY1Nzkv/MTY2MjU4NzI5OS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1150</itunes:duration>
      <itunes:summary>Zenobia Godschalk is not only SVP of Communications at Hedera Hashgraph, but also on the board of the Forte Group, a non-profit with a mission to provide career development and advocacy for women execs in cybersecurity as well as newcomers. In her recent conversation with Gene, she shares some really interesting insights about women in cybersecurity, the role of education in addressing the cybersecurity skills gap, and about cybersecurity and cutting-edge technology like web3.</itunes:summary>
      <itunes:subtitle>Zenobia Godschalk is not only SVP of Communications at Hedera Hashgraph, but also on the board of the Forte Group, a non-profit with a mission to provide career development and advocacy for women execs in cybersecurity as well as newcomers. In her recent </itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Value of the Enlisted Mindset in Cybersecurity With Jennifer Reed of AWS</title>
      <itunes:title>The Value of the Enlisted Mindset in Cybersecurity With Jennifer Reed of AWS</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2ebb40d3-3d12-4146-b871-21bd5d4c7e23</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-value-of-the-enlisted-mindset-in-cybersecurity-with-jennifer-reed-of-aviatrix</link>
      <description>
        <![CDATA[<p>Jenn Reed has more than 25 years of product management and engineering experience in cloud networking infrastructure, security, governance, risk, and compliance across both the private and public sectors. She is currently Principal Partner SA, SPE at AWS and was formerly CISO at Aviatrix. Jenn served her country in the U.S. Marine Corps from 1995-2000 and again in 2003 during the Iraq war.</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/jennsreed/">https://www.linkedin.com/in/jennsreed/</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jenn Reed has more than 25 years of product management and engineering experience in cloud networking infrastructure, security, governance, risk, and compliance across both the private and public sectors. She is currently Principal Partner SA, SPE at AWS and was formerly CISO at Aviatrix. Jenn served her country in the U.S. Marine Corps from 1995-2000 and again in 2003 during the Iraq war.</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/jennsreed/">https://www.linkedin.com/in/jennsreed/</a> </p>]]>
      </content:encoded>
      <pubDate>Sun, 13 Nov 2022 11:22:08 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/a6773ca8/800676fa.mp3" length="53773106" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cgA1JZJTExPojy0VlWOSYK26CCtivbQxGMH7vsQ_EEc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk3OTk5Mi8x/NjY3OTU3MjY1LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1344</itunes:duration>
      <itunes:summary>A big key to Jenn Reed’s successful career? The enlisted mindset, she says. In the military, you don’t have all the information you need to get the job done. You have to understand the objective, then figure out how to solve the problem on your own. Jenn and Gene talk about why this type of mindset is so critical in cybersecurity, her advice for those who want to break into cyber, and what cybersecurity leaders can do to set up underrepresented populations for success in this industry.</itunes:summary>
      <itunes:subtitle>A big key to Jenn Reed’s successful career? The enlisted mindset, she says. In the military, you don’t have all the information you need to get the job done. You have to understand the objective, then figure out how to solve the problem on your own. Jenn </itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Aligning Business and Security With Brian Castagna of Seven Bridges</title>
      <itunes:title>Aligning Business and Security With Brian Castagna of Seven Bridges</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2198d871-41b2-4e25-a103-f7339fa3d44b</guid>
      <link>https://executivesecurity.transistor.fm/episodes/aligning-business-and-security-with-brian-castagna-of-seven-bridges</link>
      <description>
        <![CDATA[<p>Brian Castagna is the CISO at Seven Bridges, a leading biomedical data company. He is an experienced and skilled information security leader who has held security leadership positions at several organizations including Acquia and Oracle.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/brian-castagna-1890544/">https://www.linkedin.com/in/brian-castagna-1890544/</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Brian Castagna is the CISO at Seven Bridges, a leading biomedical data company. He is an experienced and skilled information security leader who has held security leadership positions at several organizations including Acquia and Oracle.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/brian-castagna-1890544/">https://www.linkedin.com/in/brian-castagna-1890544/</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 31 Oct 2022 06:37:19 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/8d3f803c/e86ae218.mp3" length="55019481" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/dh7_w6i17lzo6lxjctA_zgfmvDV_NEoQfAWAe9Hdtfo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk4NDYxNS8x/NjYwMjI2NDE0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1374</itunes:duration>
      <itunes:summary>Brian Castagna, CISO at Seven Bridges, sits down with Gene to talk about his career path, his lessons learned, and his advice for those who want to join this industry. They talk about Brian’s transition from consulting and auditing background to cybersecurity, why the alignment between business and security is key, how leaders can help to make cybersecurity more diverse, why someone should consider a career in cybersecurity, and practical ways to get your foot in the door.</itunes:summary>
      <itunes:subtitle>Brian Castagna, CISO at Seven Bridges, sits down with Gene to talk about his career path, his lessons learned, and his advice for those who want to join this industry. They talk about Brian’s transition from consulting and auditing background to cybersecu</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Traits Needed to Succeed in Cybersecurity With Ramachandra Hegde of Genpact</title>
      <itunes:title>Traits Needed to Succeed in Cybersecurity With Ramachandra Hegde of Genpact</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">32a0277f-5610-4490-b3dc-79d11e2ddf0c</guid>
      <link>https://executivesecurity.transistor.fm/episodes/traits-needed-to-succeed-in-cybersecurity-with-ramachandra-hegde-of-genpact</link>
      <description>
        <![CDATA[<p>Ramachandra Hegde is a senior executive with over 24 years of experience, including 12 years in global CISO roles, including with a Fortune 300 manufacturing multinational and a global professional services firm. He is currently senior vice president and CISO at Genpact.</p><p><strong> </strong></p><p>LinkedIn: https://www.linkedin.com/in/ramkhegde/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ramachandra Hegde is a senior executive with over 24 years of experience, including 12 years in global CISO roles, including with a Fortune 300 manufacturing multinational and a global professional services firm. He is currently senior vice president and CISO at Genpact.</p><p><strong> </strong></p><p>LinkedIn: https://www.linkedin.com/in/ramkhegde/</p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Oct 2022 08:18:39 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/bcad06dc/8f7f682f.mp3" length="34456248" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/SZshctymAD8DDgKc0UWC34Yyfrx-TJkCTKrUhOd-4RM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk3OTI5NC8x/NjYwMDU2OTg2LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>860</itunes:duration>
      <itunes:summary>The biggest CISO challenge? Prioritization, says Genpact CISO Ram Hegde. In this episode of eXecutive Security, Ram and Gene talk about the traits people need to survive and thrive in cybersecurity, including resilience, the ability to execute, and humility.</itunes:summary>
      <itunes:subtitle>The biggest CISO challenge? Prioritization, says Genpact CISO Ram Hegde. In this episode of eXecutive Security, Ram and Gene talk about the traits people need to survive and thrive in cybersecurity, including resilience, the ability to execute, and humili</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Looking for Cybersecurity Employees in New Ways With Dan Schiappa of Arctic Wolf</title>
      <itunes:title>Looking for Cybersecurity Employees in New Ways With Dan Schiappa of Arctic Wolf</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aa7b8ba1-66be-40da-96b8-81aad13c377a</guid>
      <link>https://executivesecurity.transistor.fm/episodes/looking-for-cybersecurity-employees-in-new-ways-with-dan-schiappa-of-arctic-wolf</link>
      <description>
        <![CDATA[<p>Dan Schiappa, the chief product officer at Arctic Wolf, has been a technology leader for many years at organizations including Sophos, RSA Security, and Microsoft.</p><p>LinkedIn: https://www.linkedin.com/in/daniel-schiappa-bbb1062/</p><p>University of Central Florida News: https://www.ucf.edu/news/cybersecurity-team-wins-4th-national-championship/</p><p>Arctic Wolf: https://arcticwolf.com/company/careers/</p><p><strong> </strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Dan Schiappa, the chief product officer at Arctic Wolf, has been a technology leader for many years at organizations including Sophos, RSA Security, and Microsoft.</p><p>LinkedIn: https://www.linkedin.com/in/daniel-schiappa-bbb1062/</p><p>University of Central Florida News: https://www.ucf.edu/news/cybersecurity-team-wins-4th-national-championship/</p><p>Arctic Wolf: https://arcticwolf.com/company/careers/</p><p><strong> </strong></p>]]>
      </content:encoded>
      <pubDate>Fri, 30 Sep 2022 06:39:26 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/aabf32c1/182b791e.mp3" length="39724823" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GOUZ3cltFNoepnlPgX8pfIjAaungUKywS-XfUslLGvM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk3OTI5MS8x/NjYwMDU2ODk4LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>992</itunes:duration>
      <itunes:summary>We have to stop looking for perfectly trained cybersecurity candidates says Dan Schiappa, it’s time to start training people with the right traits and temperament instead. Dan and Gene talk about how Arctic Wolf is trying to make this shift, plus about Dan’s journey from developer to cybersecurity professional, and why he thinks exposure to the business side of the house is an important key to success.</itunes:summary>
      <itunes:subtitle>We have to stop looking for perfectly trained cybersecurity candidates says Dan Schiappa, it’s time to start training people with the right traits and temperament instead. Dan and Gene talk about how Arctic Wolf is trying to make this shift, plus about Da</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Jumpstart a Cybersecurity Career With CTO Richard Ford</title>
      <itunes:title>How to Jumpstart a Cybersecurity Career With CTO Richard Ford</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f2d2cac7-dec2-4b1e-a60e-81532f403d0b</guid>
      <link>https://executivesecurity.transistor.fm/episodes/how-to-jumpstart-a-cybersecurity-career-with-cto-richard-ford-f3ca3e9f-e560-49da-aae8-e98a04a2e561</link>
      <description>
        <![CDATA[<p>Richard Ford is an experienced cybersecurity and technology leader. Currently the Chief Technology Officer at Praetorian, he has held leadership positions at many organizations, including Cyren, Forcepoint, and Raytheon. Richard also has a Ph.D. in Physics from the University of Oxford.</p><p><strong> </strong></p><p>Personal LinkedIn: <a href="https://www.linkedin.com/in/dr-ford/">https://www.linkedin.com/in/dr-ford/</a> </p><p>Praetorian LinkedIn: <a href="https://www.linkedin.com/company/praetorian/">https://www.linkedin.com/company/praetorian/</a> </p><p>ISC2: <a href="https://www.isc2.org">https://www.isc2.org</a> </p><p>BSides: <a href="https://bsideslv.org">https://bsideslv.org</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Richard Ford is an experienced cybersecurity and technology leader. Currently the Chief Technology Officer at Praetorian, he has held leadership positions at many organizations, including Cyren, Forcepoint, and Raytheon. Richard also has a Ph.D. in Physics from the University of Oxford.</p><p><strong> </strong></p><p>Personal LinkedIn: <a href="https://www.linkedin.com/in/dr-ford/">https://www.linkedin.com/in/dr-ford/</a> </p><p>Praetorian LinkedIn: <a href="https://www.linkedin.com/company/praetorian/">https://www.linkedin.com/company/praetorian/</a> </p><p>ISC2: <a href="https://www.isc2.org">https://www.isc2.org</a> </p><p>BSides: <a href="https://bsideslv.org">https://bsideslv.org</a> </p>]]>
      </content:encoded>
      <pubDate>Fri, 16 Sep 2022 06:29:47 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/a69dfc43/9b84ff74.mp3" length="67418808" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZnTfuD7oPfWljGeyAkxPYFVRxPRqS8wQ2Vg9CQ0kEn0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk5ODEwOC8x/NjYxMTg5MDYxLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1684</itunes:duration>
      <itunes:summary>Gene’s discussion with Praetorian CTO Richard Ford covers how his love of gaming started his path to cybersecurity, what the CTO role entails and keys to success, and his advice to those just starting out, even without a college degree.</itunes:summary>
      <itunes:subtitle>Gene’s discussion with Praetorian CTO Richard Ford covers how his love of gaming started his path to cybersecurity, what the CTO role entails and keys to success, and his advice to those just starting out, even without a college degree.</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>My Career Pivot to SOC Analyst With Lauren Campanara of ThreatX</title>
      <itunes:title>My Career Pivot to SOC Analyst With Lauren Campanara of ThreatX</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6f86687e-005d-4b16-8bf5-db6ee96ca1a6</guid>
      <link>https://executivesecurity.transistor.fm/episodes/my-career-pivot-to-soc-analyst-with-lauren-campanara-of-threatx</link>
      <description>
        <![CDATA[<p>Lauren is just starting her career in cybersecurity. She has a bachelor’s degree in cybersecurity from Champlain College and is a SOC Analyst at ThreatX.</p><p>LinkedIn: <a href="https://www.linkedin.com/in/laurencampanara/">https://www.linkedin.com/in/laurencampanara/</a> </p><p><strong> </strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Lauren is just starting her career in cybersecurity. She has a bachelor’s degree in cybersecurity from Champlain College and is a SOC Analyst at ThreatX.</p><p>LinkedIn: <a href="https://www.linkedin.com/in/laurencampanara/">https://www.linkedin.com/in/laurencampanara/</a> </p><p><strong> </strong></p>]]>
      </content:encoded>
      <pubDate>Fri, 02 Sep 2022 09:55:00 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/5372de3d/540869be.mp3" length="35968939" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CF2jcnks1kNuMr5I0KGGskTqL0iEExnU0yxzJAGQ4SY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk3NTIwNS8x/NjU5NjI1ODYyLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>898</itunes:duration>
      <itunes:summary>Lauren Campanara spent 12 years as a hairdresser, then made a big and bold decision to pursue a career in cybersecurity. In this episode, Gene talks to her about that transition and what it took to land her first role as a SOC analyst.</itunes:summary>
      <itunes:subtitle>Lauren Campanara spent 12 years as a hairdresser, then made a big and bold decision to pursue a career in cybersecurity. In this episode, Gene talks to her about that transition and what it took to land her first role as a SOC analyst.</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Importance of Mentoring With Ray Espinoza of Inspectiv</title>
      <itunes:title>The Importance of Mentoring With Ray Espinoza of Inspectiv</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2a190b33-e6d8-4b7c-b9cd-30a3205e896a</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-importance-of-mentoring-with-ray-espinoza-of-inspectiv</link>
      <description>
        <![CDATA[<p>Ray has more than 15 years of experience in the information security space and is currently CISO at Inspectiv. He has held leadership positions at numerous organizations including, Cobalt.io, Amazon, Proofpoint, and Cisco.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/ray-espinoza-b399821/">https://www.linkedin.com/in/ray-espinoza-b399821/</a> </p><p>Black Girls in Cyber: <a href="https://www.blackgirlsincyber.com">https://www.blackgirlsincyber.com</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ray has more than 15 years of experience in the information security space and is currently CISO at Inspectiv. He has held leadership positions at numerous organizations including, Cobalt.io, Amazon, Proofpoint, and Cisco.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/ray-espinoza-b399821/">https://www.linkedin.com/in/ray-espinoza-b399821/</a> </p><p>Black Girls in Cyber: <a href="https://www.blackgirlsincyber.com">https://www.blackgirlsincyber.com</a> </p>]]>
      </content:encoded>
      <pubDate>Fri, 26 Aug 2022 05:43:20 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/431994c8/dac949ac.mp3" length="48446699" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OVHDm5QgLN6Wpk4y3OqBmoTAVrLKhA20yMGdzbLRUDo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk3MTgxNy8x/NjU5NDQ3MzYwLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1210</itunes:duration>
      <itunes:summary>Mentoring is a big part of Ray Espinoza’s life, both personal and professional, and he shares his thoughts on being a mentor and being mentored in his recent discussion with Gene. He also talks about what he looks for in entry level candidates and why getting opinions from those outside of technology is often a smart move.</itunes:summary>
      <itunes:subtitle>Mentoring is a big part of Ray Espinoza’s life, both personal and professional, and he shares his thoughts on being a mentor and being mentored in his recent discussion with Gene. He also talks about what he looks for in entry level candidates and why get</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Importance of Storytelling in Cybersecurity with Maarten Van Horenbeeck</title>
      <itunes:title>The Importance of Storytelling in Cybersecurity with Maarten Van Horenbeeck</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">01c03dac-456c-454a-9d6f-b8ad655b0e75</guid>
      <link>https://executivesecurity.transistor.fm/episodes/the-importance-of-storytelling-in-cybersecurity-with-maarten-van-horenbeeck</link>
      <description>
        <![CDATA[<p>Maarten Van Horenbeeck, who is the chief information security officer at Zendesk, has more than 15 years of experience managing security organizations, which includes building the cybersecurity-threat intelligence team at Amazon, and working on the security teams at Google and Microsoft. He is also a former board member and Chairman of the Forum of Incident Response and Security Teams (FIRST).</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/maartenv/">https://www.linkedin.com/in/maartenv/</a></p><p>Chaos Computer Club: <a href="https://en.wikipedia.org/wiki/Chaos_Computer_Club">https://en.wikipedia.org/wiki/Chaos_Computer_Club</a> </p><p>NIST: <a href="https://www.nist.gov">https://www.nist.gov</a>  </p><p>MITRE: <a href="https://www.mitre.org">https://www.mitre.org</a> </p><p>Rand Institute: <a href="https://www.rand.org">https://www.rand.org</a> </p><p>FIRST: <a href="https://www.first.org">https://www.first.org</a> </p><p>Cloud Security Alliance: <a href="https://cloudsecurityalliance.org">https://cloudsecurityalliance.org</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Maarten Van Horenbeeck, who is the chief information security officer at Zendesk, has more than 15 years of experience managing security organizations, which includes building the cybersecurity-threat intelligence team at Amazon, and working on the security teams at Google and Microsoft. He is also a former board member and Chairman of the Forum of Incident Response and Security Teams (FIRST).</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/maartenv/">https://www.linkedin.com/in/maartenv/</a></p><p>Chaos Computer Club: <a href="https://en.wikipedia.org/wiki/Chaos_Computer_Club">https://en.wikipedia.org/wiki/Chaos_Computer_Club</a> </p><p>NIST: <a href="https://www.nist.gov">https://www.nist.gov</a>  </p><p>MITRE: <a href="https://www.mitre.org">https://www.mitre.org</a> </p><p>Rand Institute: <a href="https://www.rand.org">https://www.rand.org</a> </p><p>FIRST: <a href="https://www.first.org">https://www.first.org</a> </p><p>Cloud Security Alliance: <a href="https://cloudsecurityalliance.org">https://cloudsecurityalliance.org</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 22 Aug 2022 10:27:53 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/ce3d9096/403939e0.mp3" length="71914133" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2trRMiOn9svQX0ijZVIXLvXmYpwzUPdVoOYnsi2lIGA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk5ODExMi8x/NjYxMTg5MjUxLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1796</itunes:duration>
      <itunes:summary>Storytelling has been an important key to Maarten Van Horenbeeck’s success – in fact, two movies inspired his career in cybersecurity! Listen to his discussion with Gene to find out which movies, plus get his thoughts on resources to use to learn more about security, traits he looks for in entry level candidates, and more.</itunes:summary>
      <itunes:subtitle>Storytelling has been an important key to Maarten Van Horenbeeck’s success – in fact, two movies inspired his career in cybersecurity! Listen to his discussion with Gene to find out which movies, plus get his thoughts on resources to use to learn more abo</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tips and Techniques: Black Hat and Defcon</title>
      <itunes:title>Tips and Techniques: Black Hat and Defcon</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e9ba9aaa-bd44-4098-a7f0-18161f14ea87</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tips-and-techniques-black-hat-and-defcon</link>
      <description>
        <![CDATA[<p>Defcon:  https://defcon.org  <br>Black Hat: https://www.blackhat.com </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Defcon:  https://defcon.org  <br>Black Hat: https://www.blackhat.com </p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Aug 2022 04:03:07 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/49d40837/5dcbe147.mp3" length="16266630" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/VUy2t11TaRnahZHFOAzGfbMvb7yRVaM0ldT9lv9Tbvo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk4NTk0NS8x/NjYwMzA2OTg2LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>405</itunes:duration>
      <itunes:summary>What’s the deal with Black Hat and Defcon? What goes on at these conferences, and should those trying to break into cybersecurity consider attending? Gene Fay reports live from Black Hat on what these shows are all about and whether they’re worthwhile for those just starting their careers.
 </itunes:summary>
      <itunes:subtitle>What’s the deal with Black Hat and Defcon? What goes on at these conferences, and should those trying to break into cybersecurity consider attending? Gene Fay reports live from Black Hat on what these shows are all about and whether they’re worthwhile for</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why a Commitment to Employee Growth Matters With Jim Routh</title>
      <itunes:title>Why a Commitment to Employee Growth Matters With Jim Routh</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d4bd6c63-d46c-4b45-9723-fefb955b1ec6</guid>
      <link>https://executivesecurity.transistor.fm/episodes/why-a-commitment-to-employee-growth-matters-with-jim-routh</link>
      <description>
        <![CDATA[<p>Jim Routh has a long history in technology and cybersecurity as a leader and management consultant. He was formerly a cybersecurity leader for many large companies including MassMutual, CVS Health, Aetna, and JP Morgan Chase. He is also the former Board Chair for the Health Information Sharing &amp; Analysis Center (H-ISAC) where he served for five years and former Board member for the Financial Services Information Sharing &amp; Analysis Center (FS-ISAC). Jim currently sits on several Boards and acts as an advisor for several cybersecurity companies and venture funds. Jim brings to the boards a vast business and technology background and is considered a digital and cyber security industry expert and thought leader. Finally, Jim is an ICIT Fellow and an Adjunct Faculty member for NYU.</p><p>The Role of Cybersecurity Leaders as Educators: https://icitech.org/wp-content/uploads/2022/03/ICIT-Fellow-Perspective-The-Role-of-Cybersecurity-Leaders-as-Educators.pdf<br>LinkedIn: <a href="https://www.linkedin.com/in/jmrouth/">https://www.linkedin.com/in/jmrouth/</a> </p><p>Jim Routh's Book List:<br>Cybersecurity and Cyberwar by Singer and Friedman</p><p> </p><p>Dark Territory by Kaplan</p><p> </p><p>The Perfect Weapon by Sanger</p><p> </p><p>Sandworm by Greenberg</p><p> </p><p>The Cuckoo’s Egg by Stoll</p><p> </p><p>Spam Nation by Krebs</p><p> </p><p>Future Crimes by Goodman</p><p> </p><p>Data and Goliath by Schneier</p><p> </p><p>Confront and Conceal by Sanger</p><p> </p><p>The Fifth Domain by Clarke</p><p> </p><p>America the Vulnerable by Brenner</p><p> </p><p>The Code Book by Singh</p><p> </p><p>Algorithms to Live By by Christian and Griffiths</p><p> </p><p>Your Government Failed You by Clarke</p><p> </p><p>Sting of the Drone by Clarke</p><p> </p><p>Countdown to Zero Day by Zetter</p><p> </p><p>Software Security: Building Security In by McGraw</p><p> </p><p>@War by Harris</p><p> </p><p>Fight Fire With Fire by Tarun</p><p> </p><p>Kingpin by Poulsen</p><p> </p><p>The Age of Surveillance Capitalism by Zuboff</p><p> </p><p>The Internet in Everything by DeNardis</p><p> </p><p>Senior Cyber by Schober</p><p> </p><p>CISO Compass by Fitzgerald</p><p> </p><p>This Is How They Tell Me the World Ends by Perlroth</p><p> </p><p>Crimedotcom by White</p><p> </p><p>Big Breaches by Daswani and Elbayadi</p><p> </p><p>Innovating in a Secret World by Srivastava</p><p> </p><p>Cyber Mayday by Lohrmann and Tan</p><p> </p><p>Navigating the Cybersecurity Career Path by Patton</p><p> </p><p>Tribe of Hackers by Carey and Jin</p><p> </p><p>The PtaaS Book by Wong</p><p> </p><p>CyberJutsu by McCarty</p><p> </p><p>Cyber Defense Matrix by Yu</p><p> </p><p>Shape by Ellenberg</p><p> </p><p>So You Want to Talk About Race by Oluo</p><p> </p><p>White Fragility by Diangelo</p><p> </p><p>Hos to Be an Antiracist by Kendi</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jim Routh has a long history in technology and cybersecurity as a leader and management consultant. He was formerly a cybersecurity leader for many large companies including MassMutual, CVS Health, Aetna, and JP Morgan Chase. He is also the former Board Chair for the Health Information Sharing &amp; Analysis Center (H-ISAC) where he served for five years and former Board member for the Financial Services Information Sharing &amp; Analysis Center (FS-ISAC). Jim currently sits on several Boards and acts as an advisor for several cybersecurity companies and venture funds. Jim brings to the boards a vast business and technology background and is considered a digital and cyber security industry expert and thought leader. Finally, Jim is an ICIT Fellow and an Adjunct Faculty member for NYU.</p><p>The Role of Cybersecurity Leaders as Educators: https://icitech.org/wp-content/uploads/2022/03/ICIT-Fellow-Perspective-The-Role-of-Cybersecurity-Leaders-as-Educators.pdf<br>LinkedIn: <a href="https://www.linkedin.com/in/jmrouth/">https://www.linkedin.com/in/jmrouth/</a> </p><p>Jim Routh's Book List:<br>Cybersecurity and Cyberwar by Singer and Friedman</p><p> </p><p>Dark Territory by Kaplan</p><p> </p><p>The Perfect Weapon by Sanger</p><p> </p><p>Sandworm by Greenberg</p><p> </p><p>The Cuckoo’s Egg by Stoll</p><p> </p><p>Spam Nation by Krebs</p><p> </p><p>Future Crimes by Goodman</p><p> </p><p>Data and Goliath by Schneier</p><p> </p><p>Confront and Conceal by Sanger</p><p> </p><p>The Fifth Domain by Clarke</p><p> </p><p>America the Vulnerable by Brenner</p><p> </p><p>The Code Book by Singh</p><p> </p><p>Algorithms to Live By by Christian and Griffiths</p><p> </p><p>Your Government Failed You by Clarke</p><p> </p><p>Sting of the Drone by Clarke</p><p> </p><p>Countdown to Zero Day by Zetter</p><p> </p><p>Software Security: Building Security In by McGraw</p><p> </p><p>@War by Harris</p><p> </p><p>Fight Fire With Fire by Tarun</p><p> </p><p>Kingpin by Poulsen</p><p> </p><p>The Age of Surveillance Capitalism by Zuboff</p><p> </p><p>The Internet in Everything by DeNardis</p><p> </p><p>Senior Cyber by Schober</p><p> </p><p>CISO Compass by Fitzgerald</p><p> </p><p>This Is How They Tell Me the World Ends by Perlroth</p><p> </p><p>Crimedotcom by White</p><p> </p><p>Big Breaches by Daswani and Elbayadi</p><p> </p><p>Innovating in a Secret World by Srivastava</p><p> </p><p>Cyber Mayday by Lohrmann and Tan</p><p> </p><p>Navigating the Cybersecurity Career Path by Patton</p><p> </p><p>Tribe of Hackers by Carey and Jin</p><p> </p><p>The PtaaS Book by Wong</p><p> </p><p>CyberJutsu by McCarty</p><p> </p><p>Cyber Defense Matrix by Yu</p><p> </p><p>Shape by Ellenberg</p><p> </p><p>So You Want to Talk About Race by Oluo</p><p> </p><p>White Fragility by Diangelo</p><p> </p><p>Hos to Be an Antiracist by Kendi</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Aug 2022 07:19:26 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/f7ffe69b/95b4482e.mp3" length="78447693" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vtHCfQBHOxrTPlI6RjtWge0jkfgDCyTBAOOhSrrTbi0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk1NTIxNC8x/NjU4MjYxNTcyLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1960</itunes:duration>
      <itunes:summary>"Don't hire for roles," says former MassMutual CISO Jim Routh in his conversation with Gene Fay, "hire people and create roles." Jim and Gene have a far-reaching conversation with a lot of great advice and a little laughter. From his accidental entrance into cybersecurity to his thinking on how to nurture employees and advice on how to get a foot in the door, their discussion is a great resource for those new to the field or those struggling with the cybersecurity skills gap.</itunes:summary>
      <itunes:subtitle>"Don't hire for roles," says former MassMutual CISO Jim Routh in his conversation with Gene Fay, "hire people and create roles." Jim and Gene have a far-reaching conversation with a lot of great advice and a little laughter. From his accidental entrance i</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Lowering the Barrier to Entry in the Cybersecurity Field With Ron Gula of Gula Tech Adventures</title>
      <itunes:title>Lowering the Barrier to Entry in the Cybersecurity Field With Ron Gula of Gula Tech Adventures</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0f0d912c-58b0-41b6-ace4-4911c2294bff</guid>
      <link>https://executivesecurity.transistor.fm/episodes/lowering-the-barrier-to-entry-in-the-cybersecurity-field-with-ron-gula-of-gula-tech-adventures</link>
      <description>
        <![CDATA[<p>Ron is President at Gula Tech Adventures, which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. From 2002 to 2016, Ron was the co-founder and CEO of Tenable Network Security. He helped grow the company to 20,000 customers, raise $300m in venture capital and grow revenues to $100m, setting up the company for an IPO in 2018. Prior to Tenable, Ron was a cyber industry pioneer and developed one of the first commercial network intrusion detection systems called Dragon, ran risk mitigation for the first cloud company, was deploying network honeypots in the mid 90s for the DOD and was a penetration tester for the NSA and got to participate in some of the nation's first cyber exercises. Ron was also a captain in the Air Force.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/rongula/">https://www.linkedin.com/in/rongula/</a> </p><p>Gula Tech Adventures: <a href="https://www.gula.tech">https://www.gula.tech</a>  </p><p>Cybrary, Free Cybersecurity Training and Career Development: <a href="https://www.cybrary.it/">https://www.cybrary.it/</a>  </p><p>SANS Institute: <a href="https://www.sans.org">https://www.sans.org</a>   </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ron is President at Gula Tech Adventures, which focuses on cyber technology, cyber policy and recruiting more people to the cyber workforce. Since 2017, GTA has invested in dozens of cyber start-ups and funds and supported multiple cyber nonprofits and projects. From 2002 to 2016, Ron was the co-founder and CEO of Tenable Network Security. He helped grow the company to 20,000 customers, raise $300m in venture capital and grow revenues to $100m, setting up the company for an IPO in 2018. Prior to Tenable, Ron was a cyber industry pioneer and developed one of the first commercial network intrusion detection systems called Dragon, ran risk mitigation for the first cloud company, was deploying network honeypots in the mid 90s for the DOD and was a penetration tester for the NSA and got to participate in some of the nation's first cyber exercises. Ron was also a captain in the Air Force.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/rongula/">https://www.linkedin.com/in/rongula/</a> </p><p>Gula Tech Adventures: <a href="https://www.gula.tech">https://www.gula.tech</a>  </p><p>Cybrary, Free Cybersecurity Training and Career Development: <a href="https://www.cybrary.it/">https://www.cybrary.it/</a>  </p><p>SANS Institute: <a href="https://www.sans.org">https://www.sans.org</a>   </p>]]>
      </content:encoded>
      <pubDate>Mon, 08 Aug 2022 06:02:49 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/fce5737a/6414db95.mp3" length="64934382" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/73fD5Fsio81by3WNBGJsUJKfESRQt5AHCudkxEyb1Uk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk1MTA3Ni8x/NjU3ODAxNzg4LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1623</itunes:duration>
      <itunes:summary>Tenable co-founder Ron Gula is one of the most important figures in cybersecurity, and is now doing some of its most important charitable work with Gula Tech Adventures. He and Gene discuss his background in the military, his days starting Tenable, and how his foundation is working to help people enter the cybersecurity field.</itunes:summary>
      <itunes:subtitle>Tenable co-founder Ron Gula is one of the most important figures in cybersecurity, and is now doing some of its most important charitable work with Gula Tech Adventures. He and Gene discuss his background in the military, his days starting Tenable, and ho</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Balancing the Enforcer and Enabler Roles With Bill Brown of Abacus Insights</title>
      <itunes:title>Balancing the Enforcer and Enabler Roles With Bill Brown of Abacus Insights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">36d9bce5-99c4-481c-b125-22e93d240297</guid>
      <link>https://executivesecurity.transistor.fm/episodes/balancing-the-enforcer-and-enabler-roles-with-bill-brown-of-abacus-insights</link>
      <description>
        <![CDATA[<p>Bill Brown is an accomplished information technology and information security leader with experience leading M&amp;A Security Due Diligence Response and Remediation, and leading global teams in start-up, mid-size, and Fortune 1000 companies. Currently he is CISO and CIO at Abacus Insights and an advisory board member to ThreatWarrior. He has also held security leadership positions in ClickSoftware, Houghton Mifflin Harcourt, Veracode, and Iron Mountain.</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/billbrownusa/">https://www.linkedin.com/in/billbrownusa/</a> </p><p>HIPPA: <a href="https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act">https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act</a> </p><p>Hiitrust: <a href="https://en.wikipedia.org/wiki/HITRUST">https://en.wikipedia.org/wiki/HITRUST</a> </p><p>PII: <a href="https://www.techtarget.com/searchsecurity/definition/personally-identifiable-information-PII">https://www.techtarget.com/searchsecurity/definition/personally-identifiable-information-PII</a> </p><p>Cyber Warrior: <a href="https://www.cyberwarrior.com/">https://www.cyberwarrior.com/</a> </p><p>Cloud Security Alliance:  <a href="https://success.impartner.com/English/Customer/home.aspx">https://success.impartner.com/English/Customer/home.aspx</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Bill Brown is an accomplished information technology and information security leader with experience leading M&amp;A Security Due Diligence Response and Remediation, and leading global teams in start-up, mid-size, and Fortune 1000 companies. Currently he is CISO and CIO at Abacus Insights and an advisory board member to ThreatWarrior. He has also held security leadership positions in ClickSoftware, Houghton Mifflin Harcourt, Veracode, and Iron Mountain.</p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/billbrownusa/">https://www.linkedin.com/in/billbrownusa/</a> </p><p>HIPPA: <a href="https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act">https://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act</a> </p><p>Hiitrust: <a href="https://en.wikipedia.org/wiki/HITRUST">https://en.wikipedia.org/wiki/HITRUST</a> </p><p>PII: <a href="https://www.techtarget.com/searchsecurity/definition/personally-identifiable-information-PII">https://www.techtarget.com/searchsecurity/definition/personally-identifiable-information-PII</a> </p><p>Cyber Warrior: <a href="https://www.cyberwarrior.com/">https://www.cyberwarrior.com/</a> </p><p>Cloud Security Alliance:  <a href="https://success.impartner.com/English/Customer/home.aspx">https://success.impartner.com/English/Customer/home.aspx</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 01 Aug 2022 06:34:45 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/5af614bc/b77ac2ff.mp3" length="41961041" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/82oOoDk1d5y0qhZpQ5cd0SYV0xY4WQjAs3q7bYZXQhI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk0NTA1NS8x/NjU3NjUxNjM2LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1048</itunes:duration>
      <itunes:summary>Biggest influence on Bill Brown’s career? His stint as a technology director at a private boys’ school. Gene and Bill talk about that role plus his current challenges protecting healthcare data, what Bill calls the “CISO mullet,” and more. </itunes:summary>
      <itunes:subtitle>Biggest influence on Bill Brown’s career? His stint as a technology director at a private boys’ school. Gene and Bill talk about that role plus his current challenges protecting healthcare data, what Bill calls the “CISO mullet,” and more. </itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Debunking the Misconceptions of Entering the Cybersecurity Industry With James Carder of iOffce + SpaceIQ </title>
      <itunes:title>Debunking the Misconceptions of Entering the Cybersecurity Industry With James Carder of iOffce + SpaceIQ </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">331272f8-9c14-4771-a8f5-4ac3c7f716b6</guid>
      <link>https://executivesecurity.transistor.fm/episodes/debunking-the-misconceptions-of-entering-the-cybersecurity-industry-with-james-carder-of-logrhythm-labs</link>
      <description>
        <![CDATA[<p>James Carder is an experienced Chief Security Officer, research and development leader, cyber security services expert, and go to market executive with over 26 years in both corporate security and consulting for public and private companies across various industries, the Fortune 500, and U.S. Government. Currently, he is the Chief Security Officer at iOffice + SpaceIQ. James also served in the Air Force.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/carderj/">https://www.linkedin.com/in/carderj/ </a></p><p>Twitter: <a href="https://twitter.com/carderjames">https://twitter.com/carderjames</a> </p><p>ISSA: <a href="https://www.issa.org/">https://www.issa.org/</a></p><p>OWASP: <a href="https://owasp.org/">https://owasp.org/</a> </p><p>Cloud Security Alliance: <a href="https://cloudsecurityalliance.org/">https://cloudsecurityalliance.org/</a> </p><p>BSides: <a href="https://bsideslv.org/">https://bsideslv.org/</a> </p><p>U Minnesota Certificate Program: <a href="https://bootcamp.umn.edu/cybersecurity/">https://bootcamp.umn.edu/cybersecurity/</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>James Carder is an experienced Chief Security Officer, research and development leader, cyber security services expert, and go to market executive with over 26 years in both corporate security and consulting for public and private companies across various industries, the Fortune 500, and U.S. Government. Currently, he is the Chief Security Officer at iOffice + SpaceIQ. James also served in the Air Force.</p><p><strong> </strong></p><p>LinkedIn: <a href="https://www.linkedin.com/in/carderj/">https://www.linkedin.com/in/carderj/ </a></p><p>Twitter: <a href="https://twitter.com/carderjames">https://twitter.com/carderjames</a> </p><p>ISSA: <a href="https://www.issa.org/">https://www.issa.org/</a></p><p>OWASP: <a href="https://owasp.org/">https://owasp.org/</a> </p><p>Cloud Security Alliance: <a href="https://cloudsecurityalliance.org/">https://cloudsecurityalliance.org/</a> </p><p>BSides: <a href="https://bsideslv.org/">https://bsideslv.org/</a> </p><p>U Minnesota Certificate Program: <a href="https://bootcamp.umn.edu/cybersecurity/">https://bootcamp.umn.edu/cybersecurity/</a> </p>]]>
      </content:encoded>
      <pubDate>Mon, 25 Jul 2022 06:52:48 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/5a795714/d595562b.mp3" length="76409443" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/klmBqLCkeM-jCNJObHzN8up2uGwNsISisZgUC4tqNlk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk0NTA1My8x/NjU4Nzc0MDI0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1910</itunes:duration>
      <itunes:summary>Gene's conversation with former LogRhythm CSO and current iOffice + SpaceIQ CISO James Carder covers his role at LogRhythm, which was not a typical CSO role; how to get into cybersecurity, even without experience; what the specialization of cybersecurity means for those just entering the industry; how his military experience affected his career; and more.</itunes:summary>
      <itunes:subtitle>Gene's conversation with former LogRhythm CSO and current iOffice + SpaceIQ CISO James Carder covers his role at LogRhythm, which was not a typical CSO role; how to get into cybersecurity, even without experience; what the specialization of cybersecurity </itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Having the Mindset of an “Eternal Student” Is the Key to Success With Ian Amit of Rapid7  </title>
      <itunes:title>Why Having the Mindset of an “Eternal Student” Is the Key to Success With Ian Amit of Rapid7  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3aa1701a-86ea-4a29-89cd-1b9f72405dfa</guid>
      <link>https://executivesecurity.transistor.fm/episodes/why-having-the-mindset-of-an-eternal-student-is-the-key-to-success-with-ian-amit-of-rapid7</link>
      <description>
        <![CDATA[<p>Ian Amit is an executive manager in the security and software industry with vast experience in multiple fields - from enterprise security, through retail, to end-user software, large back-end systems, corporate security policy, regulatory compliance, and strategy. He has spoken at various customer-focused seminars such as DEFCON, RSA, BlackHat, BSides, and many more. </p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/iamit/">https://www.linkedin.com/in/iamit/</a> </p><p>DEFCON: <a href="https://defcon.org/">https://defcon.org</a></p><p>BSides: <a href="https://bsideslv.org/">https://bsideslv.org</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ian Amit is an executive manager in the security and software industry with vast experience in multiple fields - from enterprise security, through retail, to end-user software, large back-end systems, corporate security policy, regulatory compliance, and strategy. He has spoken at various customer-focused seminars such as DEFCON, RSA, BlackHat, BSides, and many more. </p><p> </p><p>LinkedIn: <a href="https://www.linkedin.com/in/iamit/">https://www.linkedin.com/in/iamit/</a> </p><p>DEFCON: <a href="https://defcon.org/">https://defcon.org</a></p><p>BSides: <a href="https://bsideslv.org/">https://bsideslv.org</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 18 Jul 2022 11:31:07 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/04ba91bb/f27dff1e.mp3" length="68652951" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/au4W3hogj1PHDx7rsY2RnUh-EcbzreIVFeeLqHbQFPc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk0NTA0OS8x/NjU3NjUxMzk3LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1716</itunes:duration>
      <itunes:summary>Gene Fay and Rapid7 Advisory CSO Ian Amit talk about what led to Ian's successful career in cybersecurity, including his refusal to ever think of himself as an "expert" in any subject and to always drive to learn more.</itunes:summary>
      <itunes:subtitle>Gene Fay and Rapid7 Advisory CSO Ian Amit talk about what led to Ian's successful career in cybersecurity, including his refusal to ever think of himself as an "expert" in any subject and to always drive to learn more.</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Turning Information Security Into an Inclusive Community With Tanya Janca of She Hacks Purple </title>
      <itunes:title>Turning Information Security Into an Inclusive Community With Tanya Janca of She Hacks Purple </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">81da4b10-36a4-4b6a-b6c5-8ddd9f20f216</guid>
      <link>https://executivesecurity.transistor.fm/episodes/turning-information-security-into-an-inclusive-community-with-tanya-janca-of-she-hacks-purple</link>
      <description>
        <![CDATA[<p>Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and weekly podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech. She values diversity, inclusion, and kindness. </p><p><br>LinkedIn: <a href="https://www.linkedin.com/in/tanya-janca/">https://www.linkedin.com/in/tanya-janca/</a></p><p> </p><p>Jobs in InfoSec: <a href="https://shehackspurple.ca/2022/01/01/jobs-in-information-security-infosec/">https://shehackspurple.ca/2022/01/01/jobs-in-information-security-infosec/</a> </p><p> </p><p>We Hack Purple Community: <a href="https://community.wehackpurple.com/">https://community.wehackpurple.com/</a></p><p> </p><p>#CyberMentoringMonday: <a href="https://twitter.com/search?q=%23CyberMentoringMonday&amp;src=typed_query&amp;f=live">https://twitter.com/search?q=%23CyberMentoringMonday&amp;src=typed_query&amp;f=live</a> </p><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and weekly podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won numerous awards, and has been everywhere from startups to public service to tech. She values diversity, inclusion, and kindness. </p><p><br>LinkedIn: <a href="https://www.linkedin.com/in/tanya-janca/">https://www.linkedin.com/in/tanya-janca/</a></p><p> </p><p>Jobs in InfoSec: <a href="https://shehackspurple.ca/2022/01/01/jobs-in-information-security-infosec/">https://shehackspurple.ca/2022/01/01/jobs-in-information-security-infosec/</a> </p><p> </p><p>We Hack Purple Community: <a href="https://community.wehackpurple.com/">https://community.wehackpurple.com/</a></p><p> </p><p>#CyberMentoringMonday: <a href="https://twitter.com/search?q=%23CyberMentoringMonday&amp;src=typed_query&amp;f=live">https://twitter.com/search?q=%23CyberMentoringMonday&amp;src=typed_query&amp;f=live</a> </p><p> </p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Jul 2022 11:59:44 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/d1b6963e/1390c698.mp3" length="65371257" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ngvfksP5T4nGqPPvuTEcwYDMEbTHdgIdgEspnIsScgM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk0NTA0Ni8x/NjU3NjUxMzA4LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1634</itunes:duration>
      <itunes:summary>Tanya Janca, aka She Hacks Purple, and Gene have a conversation that anyone trying to break into cybersecurity would find extremely valuable. You'll hear about the free resources available in her We Hack Purple community; how she is improving the diversity, inclusion, and accessibility of the infosec community; and her thoughts on mentoring and her very popular mentoring programs.</itunes:summary>
      <itunes:subtitle>Tanya Janca, aka She Hacks Purple, and Gene have a conversation that anyone trying to break into cybersecurity would find extremely valuable. You'll hear about the free resources available in her We Hack Purple community; how she is improving the diversit</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Cybersecurity’s Origins Inform Its Future with Chris Wysopal of Veracode</title>
      <itunes:title>How Cybersecurity’s Origins Inform Its Future with Chris Wysopal of Veracode</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1da07262-c57a-4dea-a107-6d29422eab19</guid>
      <link>https://executivesecurity.transistor.fm/episodes/how-cybersecurity-s-origins-inform-its-future-with-chris-wysopal-of-veracode</link>
      <description>
        <![CDATA[<p>Chris Wysopal is Co-Founder and Chief Technology Officer at Veracode, which pioneered the concept of using automated static binary analysis to discover vulnerabilities in software. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. Chris started his career as software engineer that first built commercial software and then migrated to the specialty of testing software for vulnerabilities. He has led highly productive and innovative software development teams and has performed product strategy and product management roles.</p><p> </p><p>Chris is a much sought-after expert on cybersecurity. He has been interviewed for most major technology and business publications, including New York Times, The Washington Post, WSJ, Forbes, Fortune, AP, Reuters, Newsweek, Dark Reading, MIT Tech Review, Wired, and many networks, including BBC, CNN, ABC, CBS, CNBC, PBS, Bloomberg, Fox News, and NPR. He has keynoted cybersecurity and technical conferences on 4 continents.</p><p>Link: <a href="https://www.linkedin.com/in/wysopal/">Chris Wysopal LinkedIn</a><br>Link: <a href="https://read.amazon.com/kp/embed?asin=B07J54F9KR&amp;preview=newtab&amp;linkCode=kpe&amp;ref_=cm_sw_r_kb_dp_Z1NNH43HGB4PK75Z2T6B">Cult of the Dead Cow by Joseph Menn</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Wysopal is Co-Founder and Chief Technology Officer at Veracode, which pioneered the concept of using automated static binary analysis to discover vulnerabilities in software. In the 1990’s, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. Chris started his career as software engineer that first built commercial software and then migrated to the specialty of testing software for vulnerabilities. He has led highly productive and innovative software development teams and has performed product strategy and product management roles.</p><p> </p><p>Chris is a much sought-after expert on cybersecurity. He has been interviewed for most major technology and business publications, including New York Times, The Washington Post, WSJ, Forbes, Fortune, AP, Reuters, Newsweek, Dark Reading, MIT Tech Review, Wired, and many networks, including BBC, CNN, ABC, CBS, CNBC, PBS, Bloomberg, Fox News, and NPR. He has keynoted cybersecurity and technical conferences on 4 continents.</p><p>Link: <a href="https://www.linkedin.com/in/wysopal/">Chris Wysopal LinkedIn</a><br>Link: <a href="https://read.amazon.com/kp/embed?asin=B07J54F9KR&amp;preview=newtab&amp;linkCode=kpe&amp;ref_=cm_sw_r_kb_dp_Z1NNH43HGB4PK75Z2T6B">Cult of the Dead Cow by Joseph Menn</a> </p>]]>
      </content:encoded>
      <pubDate>Wed, 29 Jun 2022 14:21:11 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/74778e1b/0dbfc722.mp3" length="81723800" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/g3m6N7DMqZLdeZJdhuHifgMLCRL5SvdQ7SROxFFK8EM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyODg2MS8x/NjU2MDA3OTc1LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>2043</itunes:duration>
      <itunes:summary>Were you the type of kid who took apart household appliances to see how they worked? Chris Wysopal was, and that curiosity led him to become one of the most important figures in the cybersecurity industry. Gene and Chris talk about everything from Chris’ days with the L0pht and testifying before Congress to how to break into the industry today.</itunes:summary>
      <itunes:subtitle>Were you the type of kid who took apart household appliances to see how they worked? Chris Wysopal was, and that curiosity led him to become one of the most important figures in the cybersecurity industry. Gene and Chris talk about everything from Chris’ </itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Being Curious, Connected, and Collaborative Are Key to Success With David McLeod of Cox Enterprises</title>
      <itunes:title>Why Being Curious, Connected, and Collaborative Are Key to Success With David McLeod of Cox Enterprises</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b9c86f23-12d6-432e-a629-e21037427d20</guid>
      <link>https://executivesecurity.transistor.fm/episodes/why-being-curious-connected-and-collaborative-are-key-to-success-with-david-mcleod-of-cox-enterprises</link>
      <description>
        <![CDATA[<p>David McLeod is the VP, Chief Information Security Officer at Cox Enterprises. He is an experienced Chief Information Security Officer who has demonstrated success across multiple industries. David has extensive skills in Privacy, Enterprise Risk Management, IT Strategy and Governance, and Information Risk Management. </p><p><a href="https://www.linkedin.com/in/businesscontrols/">David McLeod LinkedIn</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>David McLeod is the VP, Chief Information Security Officer at Cox Enterprises. He is an experienced Chief Information Security Officer who has demonstrated success across multiple industries. David has extensive skills in Privacy, Enterprise Risk Management, IT Strategy and Governance, and Information Risk Management. </p><p><a href="https://www.linkedin.com/in/businesscontrols/">David McLeod LinkedIn</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 23 Jun 2022 11:27:38 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/4efc3d2a/90c49a9c.mp3" length="54391287" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/gfugb9znWeVvJT10E8RnuVMxXh0L72Loorx1SbHYRfk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkyODgyNy8x/NjU2MDA3ODIzLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1359</itunes:duration>
      <itunes:summary>How to succeed in cybersecurity? “Stay curious,” says Cox Enterprises VP and CISO David McLeod. Gene sat down with David to talk about his background from mischief-making kid to the military to cybersecurity leader, why checking biases is critical, the value of connection, and more.</itunes:summary>
      <itunes:subtitle>How to succeed in cybersecurity? “Stay curious,” says Cox Enterprises VP and CISO David McLeod. Gene sat down with David to talk about his background from mischief-making kid to the military to cybersecurity leader, why checking biases is critical, the va</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>In InfoSec Change is the Only Constant with Patricia Titus of Markel</title>
      <itunes:title>In InfoSec Change is the Only Constant with Patricia Titus of Markel</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">93e7ed21-51c5-43b7-9e3c-c21ce1e397f9</guid>
      <link>https://executivesecurity.transistor.fm/episodes/in-infosec-change-is-the-only-constant-with-patricia-titus-of-markel</link>
      <description>
        <![CDATA[<p>Patti Titus is the Chief Privacy and Information Security Officer at Markel Corporation. She also serves on the Board of Directors for Black Kite and the Girl Scouts of the Commonwealth of Virginia. She was recognized as a 'Woman of Influence' by the Executive Women’s Forum in 2009 and the Silicon Valley Business Journal in 2013.</p><p>Patti has held numerous leadership positions in the cybersecurity industry, including at Freddie Mac, Symantec, Unisys Corporation and the Transportation Security Administration within the Department of Homeland Security.</p><p><a href="https://www.linkedin.com/in/patitus/">Patricia's Linkedin</a><br><a href="https://www.sans.org/">SANS Institute</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Patti Titus is the Chief Privacy and Information Security Officer at Markel Corporation. She also serves on the Board of Directors for Black Kite and the Girl Scouts of the Commonwealth of Virginia. She was recognized as a 'Woman of Influence' by the Executive Women’s Forum in 2009 and the Silicon Valley Business Journal in 2013.</p><p>Patti has held numerous leadership positions in the cybersecurity industry, including at Freddie Mac, Symantec, Unisys Corporation and the Transportation Security Administration within the Department of Homeland Security.</p><p><a href="https://www.linkedin.com/in/patitus/">Patricia's Linkedin</a><br><a href="https://www.sans.org/">SANS Institute</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 18 May 2022 09:56:53 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/f4390ad9/b6b78b42.mp3" length="79112334" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/QWplXftBuGIWKcqac-aAHWld-Ju169GDsb8djxgdUYg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg5MzU5OC8x/NjUyODkzMDEzLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1977</itunes:duration>
      <itunes:summary>Gene and Markel CISO Patti Titus discuss a wide range of topics, including the transition from the military to a cybersecurity career and why efforts to diversify the industry will fall short without a focus on inclusion.</itunes:summary>
      <itunes:subtitle>Gene and Markel CISO Patti Titus discuss a wide range of topics, including the transition from the military to a cybersecurity career and why efforts to diversify the industry will fall short without a focus on inclusion.</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building Autonomy and Diversity at Hubspot with Eric Richard</title>
      <itunes:title>Building Autonomy and Diversity at Hubspot with Eric Richard</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">df09b492-72d4-4b7a-9ffa-255189492385</guid>
      <link>https://executivesecurity.transistor.fm/episodes/building-autonomy-and-diversity-at-hubspot-with-eric-richard</link>
      <description>
        <![CDATA[<p>Eric Richard, SVP Engineering and CISO, <a href="https://www.hubspot.com/">Hubspot</a><br><a href="https://www.linkedin.com/in/ericrrichard/">Linkedin</a></p><p><a href="https://www.sans.org/">SANS Institute</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Eric Richard, SVP Engineering and CISO, <a href="https://www.hubspot.com/">Hubspot</a><br><a href="https://www.linkedin.com/in/ericrrichard/">Linkedin</a></p><p><a href="https://www.sans.org/">SANS Institute</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 25 Apr 2022 07:07:44 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/96c3693e/9d82f457.mp3" length="19498536" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/GU8DVg4r2O7r51q-rv3SCbrkCC3C_wqyT8tFm3OhbHc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg3MjkzNC8x/NjUwODk1NjY0LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1209</itunes:duration>
      <itunes:summary>CISO and SVP of Engineering at Hubspot, Eric Richard has seen his team grow from 50 developers to over 1,000. He shares strategies that have helped him scale and details about the multi-year effort Hubspot has taken to improve diversity throughout the organization.</itunes:summary>
      <itunes:subtitle>CISO and SVP of Engineering at Hubspot, Eric Richard has seen his team grow from 50 developers to over 1,000. He shares strategies that have helped him scale and details about the multi-year effort Hubspot has taken to improve diversity throughout the org</itunes:subtitle>
      <itunes:keywords>diversity, ciso, infosec, development, leadership</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tips &amp; Techniques: Writing Thank You Notes</title>
      <itunes:title>Tips &amp; Techniques: Writing Thank You Notes</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b3a5862c-e3d7-4f39-9702-b4658eb30dfd</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tips-techniques-writing-thank-you-notes</link>
      <description>
        <![CDATA[]]>
      </description>
      <content:encoded>
        <![CDATA[]]>
      </content:encoded>
      <pubDate>Tue, 29 Mar 2022 07:11:45 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/7c1c2277/0e7da1ce.mp3" length="5861235" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Zjt7hYbtuoOTlFW0jp68ik5W56piNFwB8-3ty-1p340/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg0NDk2Ni8x/NjQ4NTYzMTM1LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>357</itunes:duration>
      <itunes:summary>
        <![CDATA[]]>
      </itunes:summary>
      <itunes:keywords>job interviews</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Tom Quinn, T. Rowe Price</title>
      <itunes:title>Tom Quinn, T. Rowe Price</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">40680960-c416-4aef-9e61-f77087ec19f7</guid>
      <link>https://executivesecurity.transistor.fm/episodes/tom-quinn-t-rowe-price</link>
      <description>
        <![CDATA[<p>Special thanks to Tom Quinn for joining us in this episode:</p><ul><li><a href="https://www.linkedin.com/in/thomas-quinn-75a4a5/">Tom Quinn on Linkedin</a></li></ul><p>MomentumCyber: <a href="https://momentumcyber.com/">https://momentumcyber.com/ </a><br>Girl Security: <a href="https://www.girlsecurity.org/">https://www.girlsecurity.org/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Special thanks to Tom Quinn for joining us in this episode:</p><ul><li><a href="https://www.linkedin.com/in/thomas-quinn-75a4a5/">Tom Quinn on Linkedin</a></li></ul><p>MomentumCyber: <a href="https://momentumcyber.com/">https://momentumcyber.com/ </a><br>Girl Security: <a href="https://www.girlsecurity.org/">https://www.girlsecurity.org/</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Mar 2022 04:50:58 -0700</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/c58bcac8/6aacba36.mp3" length="20663893" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KXCxMda0wQcoldfIT_C8G3a3QcslFCXvFdK-8vEifbI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzgzMTYyMC8x/NjQ3MzQ1MDU4LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1278</itunes:duration>
      <itunes:summary>Gene and Tom Quinn discuss the value of taking the time to meet people and network and how important it is to cultivate a farm system when recruiting talent in cybersecurity.</itunes:summary>
      <itunes:subtitle>Gene and Tom Quinn discuss the value of taking the time to meet people and network and how important it is to cultivate a farm system when recruiting talent in cybersecurity.</itunes:subtitle>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Intro Trailer</title>
      <itunes:title>Intro Trailer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">43d7fc0a-b35a-48a7-ae4e-65ca42e03f15</guid>
      <link>https://executivesecurity.transistor.fm/episodes/intro-trailer</link>
      <description>
        <![CDATA[<p>Hello and welcome to the eXecutive Security podcast where we talk to CISOs and other leaders in cybersecurity about a career in this industry, specifically how to get into it, and how to advance. My name is Gene Fay and I'm the CEO of ThreatX an API security company and the host of the eXecutive Security podcast.</p><p>I started this podcast because of my two passions, cybersecurity and helping people find jobs in cyber. Over the last 17 years, I've been blessed to meet so many amazing people within this industry. People who taught me not only about cybersecurity, but how to be a great leader. For a while I've been thinking about how I can give back to the cybersecurity industry, which has been so good to me.</p><p>Also, I've been thinking about what I've learned from great leaders in this space, and I can share this knowledge with a lot of people. So this [00:01:00] is how this podcast was started. </p><p>If you were just thinking about getting into cybersecurity and want to learn how to get started, or if you're in the field and aspire to be a manager, VP, or CISO, this podcast is for you.</p><p>I hope you enjoy it. If you have any suggestions on guests or topics you want us to cover in the future, please send me an email at genedotfayatthreatxdotcom. Thanks a lot and I hope you enjoy the podcast.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Hello and welcome to the eXecutive Security podcast where we talk to CISOs and other leaders in cybersecurity about a career in this industry, specifically how to get into it, and how to advance. My name is Gene Fay and I'm the CEO of ThreatX an API security company and the host of the eXecutive Security podcast.</p><p>I started this podcast because of my two passions, cybersecurity and helping people find jobs in cyber. Over the last 17 years, I've been blessed to meet so many amazing people within this industry. People who taught me not only about cybersecurity, but how to be a great leader. For a while I've been thinking about how I can give back to the cybersecurity industry, which has been so good to me.</p><p>Also, I've been thinking about what I've learned from great leaders in this space, and I can share this knowledge with a lot of people. So this [00:01:00] is how this podcast was started. </p><p>If you were just thinking about getting into cybersecurity and want to learn how to get started, or if you're in the field and aspire to be a manager, VP, or CISO, this podcast is for you.</p><p>I hope you enjoy it. If you have any suggestions on guests or topics you want us to cover in the future, please send me an email at genedotfayatthreatxdotcom. Thanks a lot and I hope you enjoy the podcast.</p>]]>
      </content:encoded>
      <pubDate>Wed, 02 Mar 2022 12:07:05 -0800</pubDate>
      <author>Gene Fay</author>
      <enclosure url="https://media.transistor.fm/d3ac637f/83d6e070.mp3" length="2380323" type="audio/mpeg"/>
      <itunes:author>Gene Fay</itunes:author>
      <itunes:duration>121</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Hello and welcome to the eXecutive Security podcast where we talk to CISOs and other leaders in cybersecurity about a career in this industry, specifically how to get into it, and how to advance. My name is Gene Fay and I'm the CEO of ThreatX an API security company and the host of the eXecutive Security podcast.</p><p>I started this podcast because of my two passions, cybersecurity and helping people find jobs in cyber. Over the last 17 years, I've been blessed to meet so many amazing people within this industry. People who taught me not only about cybersecurity, but how to be a great leader. For a while I've been thinking about how I can give back to the cybersecurity industry, which has been so good to me.</p><p>Also, I've been thinking about what I've learned from great leaders in this space, and I can share this knowledge with a lot of people. So this [00:01:00] is how this podcast was started. </p><p>If you were just thinking about getting into cybersecurity and want to learn how to get started, or if you're in the field and aspire to be a manager, VP, or CISO, this podcast is for you.</p><p>I hope you enjoy it. If you have any suggestions on guests or topics you want us to cover in the future, please send me an email at genedotfayatthreatxdotcom. Thanks a lot and I hope you enjoy the podcast.</p>]]>
      </itunes:summary>
      <itunes:keywords>infosec, appsec, ciso, chief information security officer, api security, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d3ac637f/transcript.txt" type="text/plain"/>
    </item>
  </channel>
</rss>
