<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/locked-in-on-security" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Locked In On Security</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/locked-in-on-security</itunes:new-feed-url>
    <description>Locked In On Security is your go-to podcast for everything security-related. Gain exclusive insights from industry leaders, stay at the forefront with the latest solutions, and discover groundbreaking strategies that will forever change your approach to security. The industry is changing quickly—are you ready?</description>
    <copyright>© 2025 Alert Enterprise</copyright>
    <podcast:guid>968cc77f-a2d5-5030-a5fb-73de9d0836d5</podcast:guid>
    <podcast:locked owner="techsupport@brownbagmarketing.com">no</podcast:locked>
    <podcast:trailer pubdate="Thu, 01 Aug 2024 13:59:53 -0400" url="https://media.transistor.fm/404bf258/5acd223a.mp3" length="1548804" type="audio/mpeg">Locked In On Security | Official Trailer</podcast:trailer>
    <language>en</language>
    <pubDate>Mon, 12 May 2025 15:10:01 -0400</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 23:33:18 -0500</lastBuildDate>
    <link>https://alertenterprise.com/podcasts/</link>
    <image>
      <url>https://img.transistor.fm/rbhqgFsxqqhBeBsPk82zOCqH3Z5k2PNOcu3PvNQ68y0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNDM3/MDlmNTY4NWQ1Y2U2/OGEyZTRlZTk1ZThi/ZDAxMi5qcGc.jpg</url>
      <title>Locked In On Security</title>
      <link>https://alertenterprise.com/podcasts/</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Alert Enterprise</itunes:author>
    <itunes:image href="https://img.transistor.fm/rbhqgFsxqqhBeBsPk82zOCqH3Z5k2PNOcu3PvNQ68y0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNDM3/MDlmNTY4NWQ1Y2U2/OGEyZTRlZTk1ZThi/ZDAxMi5qcGc.jpg"/>
    <itunes:summary>Locked In On Security is your go-to podcast for everything security-related. Gain exclusive insights from industry leaders, stay at the forefront with the latest solutions, and discover groundbreaking strategies that will forever change your approach to security. The industry is changing quickly—are you ready?</itunes:summary>
    <itunes:subtitle>Locked In On Security is your go-to podcast for everything security-related.</itunes:subtitle>
    <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
    <itunes:owner>
      <itunes:name>Alert Enterprise</itunes:name>
      <itunes:email>techsupport@brownbagmarketing.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Episode 7 | RemotePhoto + Guardian: A recipe for access success</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7 | RemotePhoto + Guardian: A recipe for access success</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bea5e9af-0969-43ab-b72e-ba6e410da5a9</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>In this special mini-episode of Locked In On Security from the ISC West floor, host Willem Ryan chats with CloudCard’s Tony Erskine and Luke Rettstatt about the platform’s signature product, RemotePhoto, which enables users to easily and securely capture ID photos. Powered by AI, RemotePhoto integrates with PACS, mobile credentials and more to provide employees with instant, high-quality ID photos – without visiting an on-site credentialing center. Watch to learn more about how RemotePhoto and Guardian can provide organizations with automated, employee-centric access experiences through the entire hire-to-retire cycle.<br> <br> Explore more episodes: Alertenterprise.com/podcasts</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this special mini-episode of Locked In On Security from the ISC West floor, host Willem Ryan chats with CloudCard’s Tony Erskine and Luke Rettstatt about the platform’s signature product, RemotePhoto, which enables users to easily and securely capture ID photos. Powered by AI, RemotePhoto integrates with PACS, mobile credentials and more to provide employees with instant, high-quality ID photos – without visiting an on-site credentialing center. Watch to learn more about how RemotePhoto and Guardian can provide organizations with automated, employee-centric access experiences through the entire hire-to-retire cycle.<br> <br> Explore more episodes: Alertenterprise.com/podcasts</p>]]>
      </content:encoded>
      <pubDate>Mon, 12 May 2025 15:09:59 -0400</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/78803755/509a90ed.mp3" length="11178676" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/aPUav_fykVP1_DCtWEv-qyeRfUhHsqo2qXoAI0HfwE0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NDJl/NGFiYTE5MGRmY2Rm/ZTRlODEwMjgxN2My/NjNmNy5qcGc.jpg"/>
      <itunes:duration>456</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this special mini-episode of Locked In On Security from the ISC West floor, host Willem Ryan chats with CloudCard’s Tony Erskine and Luke Rettstatt about the platform’s signature product, RemotePhoto, which enables users to easily and securely capture ID photos. Powered by AI, RemotePhoto integrates with PACS, mobile credentials and more to provide employees with instant, high-quality ID photos – without visiting an on-site credentialing center. Watch to learn more about how RemotePhoto and Guardian can provide organizations with automated, employee-centric access experiences through the entire hire-to-retire cycle.<br> <br> Explore more episodes: Alertenterprise.com/podcasts</p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/78803755/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 6 | From Origin to the future of mobile access: A deep dive with HID</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6 | From Origin to the future of mobile access: A deep dive with HID</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2129c714-1ea7-4874-a61d-aaef8f6b0144</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>In this special on-site episode of <em>Locked In On Security</em>, Alert Enterprise’s Willem Ryan and Matt Bennett sit down with HID’s leadership team to talk about the future of access control. From the influence of tech giants entering the security space to user expectations around seamless access experiences, this conversation explores what’s driving innovation and adoption in mobile credentials.</p><p>Hear expert insights on how HID is leading the charge in mobile access technology, and how partnerships and evolving standards are shaping the next wave of secure, user-friendly identity experiences.</p><p>🎧 Explore more episodes at: <a href="https://alertenterprise.com/podcasts/">alertenterprise.com/podcasts</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this special on-site episode of <em>Locked In On Security</em>, Alert Enterprise’s Willem Ryan and Matt Bennett sit down with HID’s leadership team to talk about the future of access control. From the influence of tech giants entering the security space to user expectations around seamless access experiences, this conversation explores what’s driving innovation and adoption in mobile credentials.</p><p>Hear expert insights on how HID is leading the charge in mobile access technology, and how partnerships and evolving standards are shaping the next wave of secure, user-friendly identity experiences.</p><p>🎧 Explore more episodes at: <a href="https://alertenterprise.com/podcasts/">alertenterprise.com/podcasts</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 01 May 2025 10:41:24 -0400</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/6ff34c9b/a7181830.mp3" length="25915162" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/RCKhV82DG5pYftnLPnnNJwkniodO7-HsbEVaA9IG_Jk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MWI2/MTI5MGMzMTkyMzhm/NGVlOWQ0ODk0Njc3/OTZkZC5qcGc.jpg"/>
      <itunes:duration>1078</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this special on-site episode of <em>Locked In On Security</em>, Alert Enterprise’s Willem Ryan and Matt Bennett sit down with HID’s leadership team to talk about the future of access control. From the influence of tech giants entering the security space to user expectations around seamless access experiences, this conversation explores what’s driving innovation and adoption in mobile credentials.</p><p>Hear expert insights on how HID is leading the charge in mobile access technology, and how partnerships and evolving standards are shaping the next wave of secure, user-friendly identity experiences.</p><p>🎧 Explore more episodes at: <a href="https://alertenterprise.com/podcasts/">alertenterprise.com/podcasts</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6ff34c9b/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 5 | Mobile credentials: Go boldly into the digital frontier</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5 | Mobile credentials: Go boldly into the digital frontier</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">557a9e45-b551-4cbb-a630-35302db90440</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>What treasure awaits mobile credentials users on their quest for easier access? Convenience in the palm of their hands. In this episode of Locked In On Security, Phil Coppola –HID Business Development Director of Mobile Solutions — and Matt Bennett – Alert Enterprise VP of Mobile Access &amp; Strategic Partnerships – join host Willem Ryan for a conversation about the ease, sustainability and bright future of mobile credentials.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What treasure awaits mobile credentials users on their quest for easier access? Convenience in the palm of their hands. In this episode of Locked In On Security, Phil Coppola –HID Business Development Director of Mobile Solutions — and Matt Bennett – Alert Enterprise VP of Mobile Access &amp; Strategic Partnerships – join host Willem Ryan for a conversation about the ease, sustainability and bright future of mobile credentials.</p>]]>
      </content:encoded>
      <pubDate>Mon, 10 Mar 2025 12:58:36 -0400</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/01fb3742/157a75c6.mp3" length="21154634" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/UoN0dYfkFaeuPyqUBzyatrYBsMpl0UFFq1m_4tXz9SU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNzU2/NDIwZDAzMTY2MzQw/NWQ1M2FiYjMzYjdi/OWFiYy5qcGc.jpg"/>
      <itunes:duration>879</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What treasure awaits mobile credentials users on their quest for easier access? Convenience in the palm of their hands. In this episode of Locked In On Security, Phil Coppola –HID Business Development Director of Mobile Solutions — and Matt Bennett – Alert Enterprise VP of Mobile Access &amp; Strategic Partnerships – join host Willem Ryan for a conversation about the ease, sustainability and bright future of mobile credentials.</p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 4 | NFC Wallet Mobile Credentials: Answering the call for seamless, mobile-first security</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4 | NFC Wallet Mobile Credentials: Answering the call for seamless, mobile-first security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">489c854e-112c-4dbb-883f-fc1d8915b3bb</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>As digital transformation becomes more commonplace, security teams – and employees – are looking for easy, seamless ways to streamline and secure everyday workflows. The answer? Well, it’s probably in your hand right now: your smartphone. In this episode of Locked In On Security, Alert Enterprise’s new Vice President of Mobile Access &amp; Strategic Partnerships Matt Bennett joins host Willem Ryan for a candid conversation about Wallet Mobile Credentials and the growing need for mobile-first solutions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>As digital transformation becomes more commonplace, security teams – and employees – are looking for easy, seamless ways to streamline and secure everyday workflows. The answer? Well, it’s probably in your hand right now: your smartphone. In this episode of Locked In On Security, Alert Enterprise’s new Vice President of Mobile Access &amp; Strategic Partnerships Matt Bennett joins host Willem Ryan for a candid conversation about Wallet Mobile Credentials and the growing need for mobile-first solutions.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Dec 2024 13:46:21 -0500</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/97384b6b/e43dab32.mp3" length="65119515" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/MLbr9rC7uati8JKJNkdRBLx2AfJWnZHJrFhj3qrBymo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zNjIx/NjZiMjRjNzYxNjdi/NTQyYzBhOTE5NWY4/Y2Y1Ni5qcGc.jpg"/>
      <itunes:duration>2711</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>As digital transformation becomes more commonplace, security teams – and employees – are looking for easy, seamless ways to streamline and secure everyday workflows. The answer? Well, it’s probably in your hand right now: your smartphone. In this episode of Locked In On Security, Alert Enterprise’s new Vice President of Mobile Access &amp; Strategic Partnerships Matt Bennett joins host Willem Ryan for a candid conversation about Wallet Mobile Credentials and the growing need for mobile-first solutions.</p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 3 | AI At Your Side. Building the Next-Generation Physical Security Team Using Generative AI and Chatbots.</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3 | AI At Your Side. Building the Next-Generation Physical Security Team Using Generative AI and Chatbots.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c201b8b0-8ab9-43cd-8861-0f94facbd861</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>Calling all AI enthusiasts, skeptics and the plain curious: You won’t want to miss this episode. Alert Enterprise’s Yogesh Ailawadi and Jamshed Patel join host Willem Ryan for a conversation all about AI. What’s the difference between generative AI, traditional AI and LLMs? Are AI-powered chatbots coming for security jobs? And how does Alert Enterprise’s new privacy patent shield customer data from LLMs (hint: it does)? We’re putting it all on the table for discussion in this episode of Locked In On Security – join us!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Calling all AI enthusiasts, skeptics and the plain curious: You won’t want to miss this episode. Alert Enterprise’s Yogesh Ailawadi and Jamshed Patel join host Willem Ryan for a conversation all about AI. What’s the difference between generative AI, traditional AI and LLMs? Are AI-powered chatbots coming for security jobs? And how does Alert Enterprise’s new privacy patent shield customer data from LLMs (hint: it does)? We’re putting it all on the table for discussion in this episode of Locked In On Security – join us!</p>]]>
      </content:encoded>
      <pubDate>Mon, 11 Nov 2024 10:31:47 -0500</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/f7ac1e0d/699c922f.mp3" length="58466423" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/5-cYwYSue-D69JNNXl31gP3d3F6fLMf4KEJSB5-RQX8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMTVl/MWE1Mjg5ZjNhZjRk/YWIyYjU3NTcxNjc0/NjJhNS5wbmc.jpg"/>
      <itunes:duration>2434</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Calling all AI enthusiasts, skeptics and the plain curious: You won’t want to miss this episode. Alert Enterprise’s Yogesh Ailawadi and Jamshed Patel join host Willem Ryan for a conversation all about AI. What’s the difference between generative AI, traditional AI and LLMs? Are AI-powered chatbots coming for security jobs? And how does Alert Enterprise’s new privacy patent shield customer data from LLMs (hint: it does)? We’re putting it all on the table for discussion in this episode of Locked In On Security – join us!</p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f7ac1e0d/transcript.srt" type="application/x-subrip" rel="captions"/>
    </item>
    <item>
      <title>Episode 2 | GSX 2024: From Visitor Management to Mobile-Powered Solutions</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2 | GSX 2024: From Visitor Management to Mobile-Powered Solutions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">131f4f3e-a4eb-48bd-8ecc-deb78911240c</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>In this episode of <em>Locked In On Security</em>, Alert Enterprise’s Mike Harris and Brian Rafferty join hosts Willem Ryan and Reta Rooij for a deep dive into GSX 2024. Which topics were attendees talking about? How does physical security data help secure your facilities? And why is Emergency Mustering a big deal? Let’s lock in.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Locked In On Security</em>, Alert Enterprise’s Mike Harris and Brian Rafferty join hosts Willem Ryan and Reta Rooij for a deep dive into GSX 2024. Which topics were attendees talking about? How does physical security data help secure your facilities? And why is Emergency Mustering a big deal? Let’s lock in.</p>]]>
      </content:encoded>
      <pubDate>Thu, 17 Oct 2024 16:50:57 -0400</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/3bcf0ffa/2428df49.mp3" length="32835973" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/I3fmxhh0MnjSgY3OORhSdHIKSo10dH3rYWVNAnLEeWk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81MjFj/MDY0MTMxODQ3Zjc0/YWZjNjhhYTBmNjRh/N2M0MS5qcGc.jpg"/>
      <itunes:duration>1365</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Locked In On Security</em>, Alert Enterprise’s Mike Harris and Brian Rafferty join hosts Willem Ryan and Reta Rooij for a deep dive into GSX 2024. Which topics were attendees talking about? How does physical security data help secure your facilities? And why is Emergency Mustering a big deal? Let’s lock in.</p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Bonus Episode | Shift Happens: The Era of Physical-Cyber Security Convergence</title>
      <itunes:title>Bonus Episode | Shift Happens: The Era of Physical-Cyber Security Convergence</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">ccbdb7ca-bb26-41a6-97c5-6c8775672646</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>Welcome to this special Locked In On Security bonus episode, featuring Ter Govang, a seasoned security executive with over 20 years in STEM. Ter, a trusted advisor and thought leader, brings a wealth of experience in driving security strategy for complex organizations. She holds multiple certifications including ASIS CPP®️, ACMP CCMP™️, and ISC2 CISSP®️ and leads Portcullis Modern Inc., a certified Woman Owned Enterprise.  <br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3gyejByYUZTS2dvUWdURlk1dlp0WGx6NTg1d3xBQ3Jtc0tubGhIZFJ1dGhOeHBhMzJULWhxR0dnb1p2NVEyOWNjUHhQVmdNUVVuTmc2OEZqUnpJLXM4RmF0RFN5c2piMlJhQmhGVXVrMVBCQjB0VVVVUW5kMGxpRzNZQUZSSnJBWWxCcnE4R3JaUFRHS3gyc1duZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ftgovang%2F&amp;v=UCV_WTLmvnM">https://www.linkedin.com/in/tgovang/ </a> <br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbGNvaTBwemprZ2s3azNXczEyTXFyN0EzOXdGQXxBQ3Jtc0tuazE5bjFJQ3Bta09QRXEyZ0hYLXdRazlzdW5OalZtdmI0QWN5QmNQOFk2b1RGLTVEM21FRmpRYlZSYlFXLV9acWRZckZvNU5CdGtjZnVPa1c1TW8ya0Jmdl9vNVhNdWJjZjV3YVdYSmFLVGM5M1lUNA&amp;q=https%3A%2F%2Fwww.portcullismodern.com%2F&amp;v=UCV_WTLmvnM">https://www.portcullismodern.com/</a></p><p>Join us while we discuss the latest in security, focusing on the NIST Special Publication 800-82r3, Guide to Operational Technology (OT) Security, which provides updated guidance on Operational Technology (OT) security. We’ll cover its impact on physical security systems, address vulnerabilities in end devices, legacy systems, IoT components, and more.</p><p>Resources:</p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbW13Q1Flc2dVS1FtNVNFU25hOV9xQVlTUjZxQXxBQ3Jtc0tudW1Ca1R3RjgyOEtVNl84UlRELUhxQl9hc1I3LU1wMVJpZnhkU2l3dG40ZmE3YU5GY3R6aWF2ZGN5cDhfalRmcWt6bl9GaU9XamNNMUcwTVFfbW1jTklYdWJjd25OT0lyMnJ6ZzBSX2pGZHg0LWdGUQ&amp;q=https%3A%2F%2Falertenterprise.com%2Fblog%2Findustry_buzz%2Fexplaining-nist-sp-800-82r3-and-physical-security%2F&amp;v=UCV_WTLmvnM">https://alertenterprise.com/blog/industry_buzz/explaining-nist-sp-800-82r3-and-physical-security/</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjB3STVNYWNMWW8xaWkzbEZ5MTQ2em9oX2x0QXxBQ3Jtc0tuOThtUEZ2S3NTRkp0WW5Wa2pEVEZ3MHktMVJrWUJfeVRnazZFVXFQYzJWQWEzMnFnWVZCRDdQQUJfLUFicW5FVXc0UUh6dXJtWWZqb2tNSDk3T1JfV2laalhWNjVZaVF6eXlkdi1MMnM1OUt4WUFxUQ&amp;q=https%3A%2F%2Falertenterprise.com%2Fblog%2F2023%2F06%2F27%2Fmaking-security-a-business-enabler-how-to-create-a-security-360-program-2%2F&amp;v=UCV_WTLmvnM">https://alertenterprise.com/blog/2023/06/27/making-security-a-business-enabler-how-to-create-a-security-360-program-2/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to this special Locked In On Security bonus episode, featuring Ter Govang, a seasoned security executive with over 20 years in STEM. Ter, a trusted advisor and thought leader, brings a wealth of experience in driving security strategy for complex organizations. She holds multiple certifications including ASIS CPP®️, ACMP CCMP™️, and ISC2 CISSP®️ and leads Portcullis Modern Inc., a certified Woman Owned Enterprise.  <br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3gyejByYUZTS2dvUWdURlk1dlp0WGx6NTg1d3xBQ3Jtc0tubGhIZFJ1dGhOeHBhMzJULWhxR0dnb1p2NVEyOWNjUHhQVmdNUVVuTmc2OEZqUnpJLXM4RmF0RFN5c2piMlJhQmhGVXVrMVBCQjB0VVVVUW5kMGxpRzNZQUZSSnJBWWxCcnE4R3JaUFRHS3gyc1duZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ftgovang%2F&amp;v=UCV_WTLmvnM">https://www.linkedin.com/in/tgovang/ </a> <br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbGNvaTBwemprZ2s3azNXczEyTXFyN0EzOXdGQXxBQ3Jtc0tuazE5bjFJQ3Bta09QRXEyZ0hYLXdRazlzdW5OalZtdmI0QWN5QmNQOFk2b1RGLTVEM21FRmpRYlZSYlFXLV9acWRZckZvNU5CdGtjZnVPa1c1TW8ya0Jmdl9vNVhNdWJjZjV3YVdYSmFLVGM5M1lUNA&amp;q=https%3A%2F%2Fwww.portcullismodern.com%2F&amp;v=UCV_WTLmvnM">https://www.portcullismodern.com/</a></p><p>Join us while we discuss the latest in security, focusing on the NIST Special Publication 800-82r3, Guide to Operational Technology (OT) Security, which provides updated guidance on Operational Technology (OT) security. We’ll cover its impact on physical security systems, address vulnerabilities in end devices, legacy systems, IoT components, and more.</p><p>Resources:</p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbW13Q1Flc2dVS1FtNVNFU25hOV9xQVlTUjZxQXxBQ3Jtc0tudW1Ca1R3RjgyOEtVNl84UlRELUhxQl9hc1I3LU1wMVJpZnhkU2l3dG40ZmE3YU5GY3R6aWF2ZGN5cDhfalRmcWt6bl9GaU9XamNNMUcwTVFfbW1jTklYdWJjd25OT0lyMnJ6ZzBSX2pGZHg0LWdGUQ&amp;q=https%3A%2F%2Falertenterprise.com%2Fblog%2Findustry_buzz%2Fexplaining-nist-sp-800-82r3-and-physical-security%2F&amp;v=UCV_WTLmvnM">https://alertenterprise.com/blog/industry_buzz/explaining-nist-sp-800-82r3-and-physical-security/</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjB3STVNYWNMWW8xaWkzbEZ5MTQ2em9oX2x0QXxBQ3Jtc0tuOThtUEZ2S3NTRkp0WW5Wa2pEVEZ3MHktMVJrWUJfeVRnazZFVXFQYzJWQWEzMnFnWVZCRDdQQUJfLUFicW5FVXc0UUh6dXJtWWZqb2tNSDk3T1JfV2laalhWNjVZaVF6eXlkdi1MMnM1OUt4WUFxUQ&amp;q=https%3A%2F%2Falertenterprise.com%2Fblog%2F2023%2F06%2F27%2Fmaking-security-a-business-enabler-how-to-create-a-security-360-program-2%2F&amp;v=UCV_WTLmvnM">https://alertenterprise.com/blog/2023/06/27/making-security-a-business-enabler-how-to-create-a-security-360-program-2/</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 16 Sep 2024 17:01:00 -0400</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/1f5fdca8/cba4b042.mp3" length="36109553" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/hnE6HoKM5J-d92G__QJFZNTmr8F-6dKelNiNsh6-1l8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81OGFm/NDJmNjc2OWMwNzIx/YWYxMTUyZjczOWVl/Y2QyZS5qcGc.jpg"/>
      <itunes:duration>1503</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to this special Locked In On Security bonus episode, featuring Ter Govang, a seasoned security executive with over 20 years in STEM. Ter, a trusted advisor and thought leader, brings a wealth of experience in driving security strategy for complex organizations. She holds multiple certifications including ASIS CPP®️, ACMP CCMP™️, and ISC2 CISSP®️ and leads Portcullis Modern Inc., a certified Woman Owned Enterprise.  <br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa3gyejByYUZTS2dvUWdURlk1dlp0WGx6NTg1d3xBQ3Jtc0tubGhIZFJ1dGhOeHBhMzJULWhxR0dnb1p2NVEyOWNjUHhQVmdNUVVuTmc2OEZqUnpJLXM4RmF0RFN5c2piMlJhQmhGVXVrMVBCQjB0VVVVUW5kMGxpRzNZQUZSSnJBWWxCcnE4R3JaUFRHS3gyc1duZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ftgovang%2F&amp;v=UCV_WTLmvnM">https://www.linkedin.com/in/tgovang/ </a> <br><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbGNvaTBwemprZ2s3azNXczEyTXFyN0EzOXdGQXxBQ3Jtc0tuazE5bjFJQ3Bta09QRXEyZ0hYLXdRazlzdW5OalZtdmI0QWN5QmNQOFk2b1RGLTVEM21FRmpRYlZSYlFXLV9acWRZckZvNU5CdGtjZnVPa1c1TW8ya0Jmdl9vNVhNdWJjZjV3YVdYSmFLVGM5M1lUNA&amp;q=https%3A%2F%2Fwww.portcullismodern.com%2F&amp;v=UCV_WTLmvnM">https://www.portcullismodern.com/</a></p><p>Join us while we discuss the latest in security, focusing on the NIST Special Publication 800-82r3, Guide to Operational Technology (OT) Security, which provides updated guidance on Operational Technology (OT) security. We’ll cover its impact on physical security systems, address vulnerabilities in end devices, legacy systems, IoT components, and more.</p><p>Resources:</p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbW13Q1Flc2dVS1FtNVNFU25hOV9xQVlTUjZxQXxBQ3Jtc0tudW1Ca1R3RjgyOEtVNl84UlRELUhxQl9hc1I3LU1wMVJpZnhkU2l3dG40ZmE3YU5GY3R6aWF2ZGN5cDhfalRmcWt6bl9GaU9XamNNMUcwTVFfbW1jTklYdWJjd25OT0lyMnJ6ZzBSX2pGZHg0LWdGUQ&amp;q=https%3A%2F%2Falertenterprise.com%2Fblog%2Findustry_buzz%2Fexplaining-nist-sp-800-82r3-and-physical-security%2F&amp;v=UCV_WTLmvnM">https://alertenterprise.com/blog/industry_buzz/explaining-nist-sp-800-82r3-and-physical-security/</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjB3STVNYWNMWW8xaWkzbEZ5MTQ2em9oX2x0QXxBQ3Jtc0tuOThtUEZ2S3NTRkp0WW5Wa2pEVEZ3MHktMVJrWUJfeVRnazZFVXFQYzJWQWEzMnFnWVZCRDdQQUJfLUFicW5FVXc0UUh6dXJtWWZqb2tNSDk3T1JfV2laalhWNjVZaVF6eXlkdi1MMnM1OUt4WUFxUQ&amp;q=https%3A%2F%2Falertenterprise.com%2Fblog%2F2023%2F06%2F27%2Fmaking-security-a-business-enabler-how-to-create-a-security-360-program-2%2F&amp;v=UCV_WTLmvnM">https://alertenterprise.com/blog/2023/06/27/making-security-a-business-enabler-how-to-create-a-security-360-program-2/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 1 | Shift Happens: The Era of Physical-Cyber Security Convergence</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1 | Shift Happens: The Era of Physical-Cyber Security Convergence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c9c2272a-c000-4fd6-95c9-13d4801cf737</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>In the first episode of "Locked In On Security", hosts Willem Ryan and Reta Booij, joined by experts Yogesh Ailawadi and Lou Caputzal, ask the tough questions: Can a fragmented approach to security still work in today’s threat landscape? Is the real roadblock to convergence a cultural divide between cyber and physical security? Is physical security ready to have a seat at the boardroom table? Through eye-opening use cases, they reveal how a unified security approach isn't just a luxury—it’s a necessity. Are we ready to face the uncomfortable truth about legacy security measures? Tune in to find out.</p><p>Resources: <br><a href="https://alertenterprise.com/blog/white-paper/cyber-physical-security-convergence/">https://alertenterprise.com/blog/white-paper/cyber-physical-security-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/physical-cyber-convergence/">https://alertenterprise.com/blog/industry_buzz/physical-cyber-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/alert-enterprise-presents-the-sia-2024-security-convergence-report/">https://alertenterprise.com/blog/industry_buzz/alert-enterprise-presents-the-sia-2024-security-convergence-report/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/forbes-20-trends-for-leveraging-technology-for-cyber-and-physical-security/">https://alertenterprise.com/blog/industry_buzz/forbes-20-trends-for-leveraging-technology-for-cyber-and-physical-security/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/security-optimization-looking-beyond-traditional-definitions-of-convergence/">https://alertenterprise.com/blog/industry_buzz/security-optimization-looking-beyond-traditional-definitions-of-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/building-true-security-convergence/">https://alertenterprise.com/blog/industry_buzz/building-true-security-convergence/</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the first episode of "Locked In On Security", hosts Willem Ryan and Reta Booij, joined by experts Yogesh Ailawadi and Lou Caputzal, ask the tough questions: Can a fragmented approach to security still work in today’s threat landscape? Is the real roadblock to convergence a cultural divide between cyber and physical security? Is physical security ready to have a seat at the boardroom table? Through eye-opening use cases, they reveal how a unified security approach isn't just a luxury—it’s a necessity. Are we ready to face the uncomfortable truth about legacy security measures? Tune in to find out.</p><p>Resources: <br><a href="https://alertenterprise.com/blog/white-paper/cyber-physical-security-convergence/">https://alertenterprise.com/blog/white-paper/cyber-physical-security-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/physical-cyber-convergence/">https://alertenterprise.com/blog/industry_buzz/physical-cyber-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/alert-enterprise-presents-the-sia-2024-security-convergence-report/">https://alertenterprise.com/blog/industry_buzz/alert-enterprise-presents-the-sia-2024-security-convergence-report/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/forbes-20-trends-for-leveraging-technology-for-cyber-and-physical-security/">https://alertenterprise.com/blog/industry_buzz/forbes-20-trends-for-leveraging-technology-for-cyber-and-physical-security/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/security-optimization-looking-beyond-traditional-definitions-of-convergence/">https://alertenterprise.com/blog/industry_buzz/security-optimization-looking-beyond-traditional-definitions-of-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/building-true-security-convergence/">https://alertenterprise.com/blog/industry_buzz/building-true-security-convergence/</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 16 Sep 2024 16:57:25 -0400</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/6a3659ec/3a61fc47.mp3" length="53263396" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/5J-9MYcVmJcqjxV12-HdO7AjfL0KtzuF3uoVVlOKlRM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NGJk/MmIyNDFlMTFkZDcx/NjU2YTQyMjM0MGEw/MWViOS5qcGc.jpg"/>
      <itunes:duration>2217</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the first episode of "Locked In On Security", hosts Willem Ryan and Reta Booij, joined by experts Yogesh Ailawadi and Lou Caputzal, ask the tough questions: Can a fragmented approach to security still work in today’s threat landscape? Is the real roadblock to convergence a cultural divide between cyber and physical security? Is physical security ready to have a seat at the boardroom table? Through eye-opening use cases, they reveal how a unified security approach isn't just a luxury—it’s a necessity. Are we ready to face the uncomfortable truth about legacy security measures? Tune in to find out.</p><p>Resources: <br><a href="https://alertenterprise.com/blog/white-paper/cyber-physical-security-convergence/">https://alertenterprise.com/blog/white-paper/cyber-physical-security-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/physical-cyber-convergence/">https://alertenterprise.com/blog/industry_buzz/physical-cyber-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/alert-enterprise-presents-the-sia-2024-security-convergence-report/">https://alertenterprise.com/blog/industry_buzz/alert-enterprise-presents-the-sia-2024-security-convergence-report/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/forbes-20-trends-for-leveraging-technology-for-cyber-and-physical-security/">https://alertenterprise.com/blog/industry_buzz/forbes-20-trends-for-leveraging-technology-for-cyber-and-physical-security/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/security-optimization-looking-beyond-traditional-definitions-of-convergence/">https://alertenterprise.com/blog/industry_buzz/security-optimization-looking-beyond-traditional-definitions-of-convergence/</a><br><a href="https://alertenterprise.com/blog/industry_buzz/building-true-security-convergence/">https://alertenterprise.com/blog/industry_buzz/building-true-security-convergence/</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Locked In On Security | Official Trailer</title>
      <itunes:title>Locked In On Security | Official Trailer</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">1dd76245-f12d-47a2-9036-6f50bb65e6b2</guid>
      <link>https://alertenterprise.com/podcasts/</link>
      <description>
        <![CDATA[<p>Locked In On Security is your go-to podcast for everything security-related. Gain exclusive insights from industry leaders, stay at the forefront with the latest solutions, and discover groundbreaking strategies that will forever change your approach to security. The industry is changing quickly—are you ready?</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Locked In On Security is your go-to podcast for everything security-related. Gain exclusive insights from industry leaders, stay at the forefront with the latest solutions, and discover groundbreaking strategies that will forever change your approach to security. The industry is changing quickly—are you ready?</p>]]>
      </content:encoded>
      <pubDate>Thu, 01 Aug 2024 13:59:53 -0400</pubDate>
      <author>Alert Enterprise</author>
      <enclosure url="https://media.transistor.fm/404bf258/5acd223a.mp3" length="1548804" type="audio/mpeg"/>
      <itunes:author>Alert Enterprise</itunes:author>
      <itunes:image href="https://img.transistor.fm/0IE-7wDfOuPQz95SCwpg0WPCBTyAffvoW2D9wr6__24/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYzE2/YjdjZDViZTMxYmEz/NTgzZGZiZDAwNjE3/ZTBlNi5qcGc.jpg"/>
      <itunes:duration>61</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Locked In On Security is your go-to podcast for everything security-related. Gain exclusive insights from industry leaders, stay at the forefront with the latest solutions, and discover groundbreaking strategies that will forever change your approach to security. The industry is changing quickly—are you ready?</p>]]>
      </itunes:summary>
      <itunes:keywords>Access Control, Threats, Access points, Security Cameras, Computer Security, Threat Intelligence, Third party, Cybersecurity Solutions, Security Services, Best Practices, Enterprise Risk Management, Risk Management Plan, Mitigation, Data Privacy </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
