<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/secure-talk-podcast" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Secure Talk Podcast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/secure-talk-podcast</itunes:new-feed-url>
    <description>Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. 

Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking &amp; Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.</description>
    <copyright>All rights reserved</copyright>
    <podcast:guid>a86227b2-2a56-54df-928e-20488ec31ac2</podcast:guid>
    <podcast:locked owner="justin.beals@strikegraph.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Tue, 07 Apr 2026 17:34:49 +0000</pubDate>
    <lastBuildDate>Tue, 07 Apr 2026 17:35:14 +0000</lastBuildDate>
    <link>http://securetalkpodcast.com</link>
    <image>
      <url>https://img.transistorcdn.com/eBz60MFVAaiBovsjGqH0L6KlD46mHjxGHaQvfiKl_cg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NzRj/MTkwYWEwN2IzMjIw/ZjRhZTE0MGJiYjhi/N2YxMS5qcGc.jpg</url>
      <title>Secure Talk Podcast</title>
      <link>http://securetalkpodcast.com</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Justin Beals</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/eBz60MFVAaiBovsjGqH0L6KlD46mHjxGHaQvfiKl_cg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NzRj/MTkwYWEwN2IzMjIw/ZjRhZTE0MGJiYjhi/N2YxMS5qcGc.jpg"/>
    <itunes:summary>Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. 

Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking &amp; Placement System and the author of “Aligning curriculum and evidencing learning effectiveness using semantic mapping of learning assets,” published in the International Journal of Emerging Technologies in Learning (iJet). Justin earned a BA from Fort Lewis College.</itunes:summary>
    <itunes:subtitle>Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance.</itunes:subtitle>
    <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
    <itunes:owner>
      <itunes:name>Secure Talk</itunes:name>
      <itunes:email>justin.beals@strikegraph.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>They Sold AI to Play God. China Never Got That Memo.</title>
      <itunes:episode>250</itunes:episode>
      <podcast:episode>250</podcast:episode>
      <itunes:title>They Sold AI to Play God. China Never Got That Memo.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">12d46da9-b121-4efb-bc52-bf28a7f13263</guid>
      <link>https://share.transistor.fm/s/b63c27d1</link>
      <description>
        <![CDATA[<p>The West has been building AI like it's the apocalypse. China has been building it like it's a tool.</p><p><br></p><p>That one difference — rooted in centuries of philosophy, theology, and cultural storytelling — may be the most important thing nobody is talking about in the AI debate right now.</p><p><br></p><p>SecureTalk host Justin Beals sits down with scholars Bogna Konior (NYU Shanghai), Mi You (University of Kassel), and Vincent Garton to explore their co-edited book "Machine Decision Is Not Final: China and the History and Future of Artificial Intelligence" — and what it reveals about the hidden assumptions driving the decisions we make about AI governance, security, and society.</p><p><br></p><p>What this conversation unpacks:</p><p>→ Why Western AI fear traces back to Christian theology — not rational risk analysis</p><p>→ How the Chinese term for AI literally means "human-made wisdom ability" — no alien mind implied</p><p>→ The 2019 Elon Musk vs. Jack Ma exchange that exposed the cultural divide in real time</p><p>→ What DeepSeek's open-source breakthrough says about innovation, restriction, and creative problem-solving</p><p>→ Why this debate matters far beyond the US and China — and who else is watching closely</p><p><br></p><p>If you work in cybersecurity, tech leadership, or AI policy, the cultural lens on this technology isn't a soft question. It shapes real architectural, governance, and regulatory decisions.</p><p>Chapters</p><p>00:00 Introduction and Perspectives on AI in China<br>02:41 The Meaning Behind the Claw Machine Image<br>05:33 The Book's Creation and Collaborative Efforts<br>08:32 Cultural Perspectives on AI: East vs. West<br>11:06 The Impact of Open Source AI Models<br>13:45 Innovation in a Controlled Environment<br>16:20 Human-Made vs. Artificial Intelligence<br>19:23 The Philosophical Underpinnings of AI<br>22:06 The Role of Human Agency in AI Decisions<br>24:54 Exploring the Future of AI and Society<br>27:26 The Synthesis of Technology and Society<br>30:22 Conclusion and Final Thoughts<br>44:17 Understanding Artificial Intelligence: A Cultural Perspective<br>47:08 Machine Decision: The Chinese Perspective on AI<br>49:59 Innovation and Openness in AI Development<br>50:27 Global Implications of AI Beyond Superpowers<br>50:37 Introduction and Context of AI Governance<br>01:00:53 The Role of Computers in Decision Making<br>01:08:26 Transparency in AI and Governance<br>01:17:58 Cultural Perspectives on AI: East vs. West<br>01:23:46 The Singularity and Its Philosophical Implications<br>01:27:15 Simulation and Reality in AI Discourse<br>01:35:14 Social Implications of Large Language Models</p><p>🎙️ SecureTalk is hosted by Justin Beals, CEO of Strike Graph.</p><p>🔔 Subscribe for weekly conversations at the intersection of cybersecurity, technology, and leadership.</p><p><br></p><p>#ArtificialIntelligence #AIPolicy #ChinaAI #DeepSeek #Cybersecurity #AIGovernance #TechLeadership #OpenSourceAI</p><p>```</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The West has been building AI like it's the apocalypse. China has been building it like it's a tool.</p><p><br></p><p>That one difference — rooted in centuries of philosophy, theology, and cultural storytelling — may be the most important thing nobody is talking about in the AI debate right now.</p><p><br></p><p>SecureTalk host Justin Beals sits down with scholars Bogna Konior (NYU Shanghai), Mi You (University of Kassel), and Vincent Garton to explore their co-edited book "Machine Decision Is Not Final: China and the History and Future of Artificial Intelligence" — and what it reveals about the hidden assumptions driving the decisions we make about AI governance, security, and society.</p><p><br></p><p>What this conversation unpacks:</p><p>→ Why Western AI fear traces back to Christian theology — not rational risk analysis</p><p>→ How the Chinese term for AI literally means "human-made wisdom ability" — no alien mind implied</p><p>→ The 2019 Elon Musk vs. Jack Ma exchange that exposed the cultural divide in real time</p><p>→ What DeepSeek's open-source breakthrough says about innovation, restriction, and creative problem-solving</p><p>→ Why this debate matters far beyond the US and China — and who else is watching closely</p><p><br></p><p>If you work in cybersecurity, tech leadership, or AI policy, the cultural lens on this technology isn't a soft question. It shapes real architectural, governance, and regulatory decisions.</p><p>Chapters</p><p>00:00 Introduction and Perspectives on AI in China<br>02:41 The Meaning Behind the Claw Machine Image<br>05:33 The Book's Creation and Collaborative Efforts<br>08:32 Cultural Perspectives on AI: East vs. West<br>11:06 The Impact of Open Source AI Models<br>13:45 Innovation in a Controlled Environment<br>16:20 Human-Made vs. Artificial Intelligence<br>19:23 The Philosophical Underpinnings of AI<br>22:06 The Role of Human Agency in AI Decisions<br>24:54 Exploring the Future of AI and Society<br>27:26 The Synthesis of Technology and Society<br>30:22 Conclusion and Final Thoughts<br>44:17 Understanding Artificial Intelligence: A Cultural Perspective<br>47:08 Machine Decision: The Chinese Perspective on AI<br>49:59 Innovation and Openness in AI Development<br>50:27 Global Implications of AI Beyond Superpowers<br>50:37 Introduction and Context of AI Governance<br>01:00:53 The Role of Computers in Decision Making<br>01:08:26 Transparency in AI and Governance<br>01:17:58 Cultural Perspectives on AI: East vs. West<br>01:23:46 The Singularity and Its Philosophical Implications<br>01:27:15 Simulation and Reality in AI Discourse<br>01:35:14 Social Implications of Large Language Models</p><p>🎙️ SecureTalk is hosted by Justin Beals, CEO of Strike Graph.</p><p>🔔 Subscribe for weekly conversations at the intersection of cybersecurity, technology, and leadership.</p><p><br></p><p>#ArtificialIntelligence #AIPolicy #ChinaAI #DeepSeek #Cybersecurity #AIGovernance #TechLeadership #OpenSourceAI</p><p>```</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Apr 2026 17:20:50 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b63c27d1/a72ba622.mp3" length="102230347" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/r8vc-Qaoc64EDdYsBBUhBmopjPKhQkMzebGZgOv8_w8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzFj/MGM3MDk2NTNkMWZh/NTNlOThiOTU0NWVi/OWNjNS5wbmc.jpg"/>
      <itunes:duration>3193</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The West has been building AI like it's the apocalypse. China has been building it like it's a tool.</p><p><br></p><p>That one difference — rooted in centuries of philosophy, theology, and cultural storytelling — may be the most important thing nobody is talking about in the AI debate right now.</p><p><br></p><p>SecureTalk host Justin Beals sits down with scholars Bogna Konior (NYU Shanghai), Mi You (University of Kassel), and Vincent Garton to explore their co-edited book "Machine Decision Is Not Final: China and the History and Future of Artificial Intelligence" — and what it reveals about the hidden assumptions driving the decisions we make about AI governance, security, and society.</p><p><br></p><p>What this conversation unpacks:</p><p>→ Why Western AI fear traces back to Christian theology — not rational risk analysis</p><p>→ How the Chinese term for AI literally means "human-made wisdom ability" — no alien mind implied</p><p>→ The 2019 Elon Musk vs. Jack Ma exchange that exposed the cultural divide in real time</p><p>→ What DeepSeek's open-source breakthrough says about innovation, restriction, and creative problem-solving</p><p>→ Why this debate matters far beyond the US and China — and who else is watching closely</p><p><br></p><p>If you work in cybersecurity, tech leadership, or AI policy, the cultural lens on this technology isn't a soft question. It shapes real architectural, governance, and regulatory decisions.</p><p>Chapters</p><p>00:00 Introduction and Perspectives on AI in China<br>02:41 The Meaning Behind the Claw Machine Image<br>05:33 The Book's Creation and Collaborative Efforts<br>08:32 Cultural Perspectives on AI: East vs. West<br>11:06 The Impact of Open Source AI Models<br>13:45 Innovation in a Controlled Environment<br>16:20 Human-Made vs. Artificial Intelligence<br>19:23 The Philosophical Underpinnings of AI<br>22:06 The Role of Human Agency in AI Decisions<br>24:54 Exploring the Future of AI and Society<br>27:26 The Synthesis of Technology and Society<br>30:22 Conclusion and Final Thoughts<br>44:17 Understanding Artificial Intelligence: A Cultural Perspective<br>47:08 Machine Decision: The Chinese Perspective on AI<br>49:59 Innovation and Openness in AI Development<br>50:27 Global Implications of AI Beyond Superpowers<br>50:37 Introduction and Context of AI Governance<br>01:00:53 The Role of Computers in Decision Making<br>01:08:26 Transparency in AI and Governance<br>01:17:58 Cultural Perspectives on AI: East vs. West<br>01:23:46 The Singularity and Its Philosophical Implications<br>01:27:15 Simulation and Reality in AI Discourse<br>01:35:14 Social Implications of Large Language Models</p><p>🎙️ SecureTalk is hosted by Justin Beals, CEO of Strike Graph.</p><p>🔔 Subscribe for weekly conversations at the intersection of cybersecurity, technology, and leadership.</p><p><br></p><p>#ArtificialIntelligence #AIPolicy #ChinaAI #DeepSeek #Cybersecurity #AIGovernance #TechLeadership #OpenSourceAI</p><p>```</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>China, ArtificialIntelligence, ChinaAI, DeepSeek, Cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3miwcmca2xq2e"/>
    </item>
    <item>
      <title> The DOGE data breach at the Social Security Administration with Whistleblower Chuck Borges</title>
      <itunes:episode>249</itunes:episode>
      <podcast:episode>249</podcast:episode>
      <itunes:title> The DOGE data breach at the Social Security Administration with Whistleblower Chuck Borges</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16c8f850-54fb-4481-882f-999554b4df96</guid>
      <link>https://share.transistor.fm/s/55aaebf9</link>
      <description>
        <![CDATA[<p>Every American has a Social Security number. Most assume it's protected. Chuck Borges was the person responsible for that protection at the SSA — and what he discovered from the inside is something every American deserves to know.</p><p>Chuck is a combat veteran, MIT graduate, and the Social Security Administration's first dedicated Chief Data Officer. He arrived two weeks before the 2025 administration change, watched data governance requests get denied and sensitive work get siloed away from the officials responsible for protecting it,  and when the risk became too great to ignore, he spoke up. It cost him his job.</p><p>In this episode of SecureTalk, Chuck and host Justin Beals cover:<br>- Why NUMIDENT data breach goes far beyond a typical data breach<br>- How shadow IT and unchecked access created a governance nightmare inside the SSA<br>- The national security implications of 550 million identity records at risk<br>- What it actually takes to blow the whistle when the stakes are this high</p><p>This is one of the most important cybersecurity conversations of 2025, not because of the technology involved, but because of what it reveals about the systems we trust to protect us.</p><p>Chapters</p><p>00:00 From Dreams to Data: A Unique Journey<br>02:47 Navigating the Data Landscape: Challenges and Innovations<br>05:41 The Role of Governance in Data Management<br>08:20 Civil Service and the Mission Mindset<br>11:16 Chaos and Change: The Impact of Administration Shifts<br>13:52 Empathy in Leadership: The Human Element<br>16:51 Life Experience and Effective Governance<br>21:16 Siloing and Data Manipulation in Government<br>23:30 The Risks of Shadow IT and Data Security<br>27:39 The Dangers of Numident Data<br>30:08 The Nightmare of Data Exfiltration<br>31:52 The Courage to Blow the Whistle<br>36:19 Transitioning to Political Service<br>38:24 Challenges of Running for Office<br>41:36 Building Community Through Problem Solving<br>43:05 Introduction to Data Sensitivity and Governance<br>44:33 The Risks of Data Exposure<br>45:55 Chuck Borges: A Profile in Data Leadership<br>46:46 Introduction to SecureTalk and Data Security<br>47:37 The Role of the Social Security Administration<br>48:35 Chuck Borges: A Journey Through Data Governance<br>50:28 The Impact of Administration Changes on Governance<br>56:14 Challenges in Data Management and Governance<br>01:00:58 The Risks of Data Exposure and Mismanagement<br>01:05:37 Whistleblowing and Ethical Responsibilities<br>01:14:56 Running for Office: A New Chapter in Public Service</p><p>Resources: <br> <br>Chuck Borges Website - https://chuck4md.com<br>Twitter - https://twitter.com/Chuck4MD</p><p><br>🔔 Subscribe to SecureTalk for weekly conversations on cybersecurity, leadership, and the technology shaping our world.<br>#SocialSecurity #DataGovernance #Cybersecurity #DataBreach #NationalSecurity #Whistleblower #FederalCybersecurity #IdentityTheft #SecureTalk #CDO</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Every American has a Social Security number. Most assume it's protected. Chuck Borges was the person responsible for that protection at the SSA — and what he discovered from the inside is something every American deserves to know.</p><p>Chuck is a combat veteran, MIT graduate, and the Social Security Administration's first dedicated Chief Data Officer. He arrived two weeks before the 2025 administration change, watched data governance requests get denied and sensitive work get siloed away from the officials responsible for protecting it,  and when the risk became too great to ignore, he spoke up. It cost him his job.</p><p>In this episode of SecureTalk, Chuck and host Justin Beals cover:<br>- Why NUMIDENT data breach goes far beyond a typical data breach<br>- How shadow IT and unchecked access created a governance nightmare inside the SSA<br>- The national security implications of 550 million identity records at risk<br>- What it actually takes to blow the whistle when the stakes are this high</p><p>This is one of the most important cybersecurity conversations of 2025, not because of the technology involved, but because of what it reveals about the systems we trust to protect us.</p><p>Chapters</p><p>00:00 From Dreams to Data: A Unique Journey<br>02:47 Navigating the Data Landscape: Challenges and Innovations<br>05:41 The Role of Governance in Data Management<br>08:20 Civil Service and the Mission Mindset<br>11:16 Chaos and Change: The Impact of Administration Shifts<br>13:52 Empathy in Leadership: The Human Element<br>16:51 Life Experience and Effective Governance<br>21:16 Siloing and Data Manipulation in Government<br>23:30 The Risks of Shadow IT and Data Security<br>27:39 The Dangers of Numident Data<br>30:08 The Nightmare of Data Exfiltration<br>31:52 The Courage to Blow the Whistle<br>36:19 Transitioning to Political Service<br>38:24 Challenges of Running for Office<br>41:36 Building Community Through Problem Solving<br>43:05 Introduction to Data Sensitivity and Governance<br>44:33 The Risks of Data Exposure<br>45:55 Chuck Borges: A Profile in Data Leadership<br>46:46 Introduction to SecureTalk and Data Security<br>47:37 The Role of the Social Security Administration<br>48:35 Chuck Borges: A Journey Through Data Governance<br>50:28 The Impact of Administration Changes on Governance<br>56:14 Challenges in Data Management and Governance<br>01:00:58 The Risks of Data Exposure and Mismanagement<br>01:05:37 Whistleblowing and Ethical Responsibilities<br>01:14:56 Running for Office: A New Chapter in Public Service</p><p>Resources: <br> <br>Chuck Borges Website - https://chuck4md.com<br>Twitter - https://twitter.com/Chuck4MD</p><p><br>🔔 Subscribe to SecureTalk for weekly conversations on cybersecurity, leadership, and the technology shaping our world.<br>#SocialSecurity #DataGovernance #Cybersecurity #DataBreach #NationalSecurity #Whistleblower #FederalCybersecurity #IdentityTheft #SecureTalk #CDO</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Mar 2026 15:44:09 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/55aaebf9/9e4285bf.mp3" length="93949599" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xWINsYNhR5x20iyZNgoHQ-8N23DIwWVf9WU1eGcfegY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNGFl/ZjJmNmJhMzNmZmYx/MGNkMzM3NzdlMGRl/NTVhMC5wbmc.jpg"/>
      <itunes:duration>2935</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Every American has a Social Security number. Most assume it's protected. Chuck Borges was the person responsible for that protection at the SSA — and what he discovered from the inside is something every American deserves to know.</p><p>Chuck is a combat veteran, MIT graduate, and the Social Security Administration's first dedicated Chief Data Officer. He arrived two weeks before the 2025 administration change, watched data governance requests get denied and sensitive work get siloed away from the officials responsible for protecting it,  and when the risk became too great to ignore, he spoke up. It cost him his job.</p><p>In this episode of SecureTalk, Chuck and host Justin Beals cover:<br>- Why NUMIDENT data breach goes far beyond a typical data breach<br>- How shadow IT and unchecked access created a governance nightmare inside the SSA<br>- The national security implications of 550 million identity records at risk<br>- What it actually takes to blow the whistle when the stakes are this high</p><p>This is one of the most important cybersecurity conversations of 2025, not because of the technology involved, but because of what it reveals about the systems we trust to protect us.</p><p>Chapters</p><p>00:00 From Dreams to Data: A Unique Journey<br>02:47 Navigating the Data Landscape: Challenges and Innovations<br>05:41 The Role of Governance in Data Management<br>08:20 Civil Service and the Mission Mindset<br>11:16 Chaos and Change: The Impact of Administration Shifts<br>13:52 Empathy in Leadership: The Human Element<br>16:51 Life Experience and Effective Governance<br>21:16 Siloing and Data Manipulation in Government<br>23:30 The Risks of Shadow IT and Data Security<br>27:39 The Dangers of Numident Data<br>30:08 The Nightmare of Data Exfiltration<br>31:52 The Courage to Blow the Whistle<br>36:19 Transitioning to Political Service<br>38:24 Challenges of Running for Office<br>41:36 Building Community Through Problem Solving<br>43:05 Introduction to Data Sensitivity and Governance<br>44:33 The Risks of Data Exposure<br>45:55 Chuck Borges: A Profile in Data Leadership<br>46:46 Introduction to SecureTalk and Data Security<br>47:37 The Role of the Social Security Administration<br>48:35 Chuck Borges: A Journey Through Data Governance<br>50:28 The Impact of Administration Changes on Governance<br>56:14 Challenges in Data Management and Governance<br>01:00:58 The Risks of Data Exposure and Mismanagement<br>01:05:37 Whistleblowing and Ethical Responsibilities<br>01:14:56 Running for Office: A New Chapter in Public Service</p><p>Resources: <br> <br>Chuck Borges Website - https://chuck4md.com<br>Twitter - https://twitter.com/Chuck4MD</p><p><br>🔔 Subscribe to SecureTalk for weekly conversations on cybersecurity, leadership, and the technology shaping our world.<br>#SocialSecurity #DataGovernance #Cybersecurity #DataBreach #NationalSecurity #Whistleblower #FederalCybersecurity #IdentityTheft #SecureTalk #CDO</p>]]>
      </itunes:summary>
      <itunes:keywords>DOGE, Cybersecurity, Numident, NationalSecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3mhszim3z2f2f"/>
    </item>
    <item>
      <title> From 9/11 to Salt Typhoon: Why Backdoors Always Betray Us | Secure Talk with John Ackerly</title>
      <itunes:episode>248</itunes:episode>
      <podcast:episode>248</podcast:episode>
      <itunes:title> From 9/11 to Salt Typhoon: Why Backdoors Always Betray Us | Secure Talk with John Ackerly</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8d5acc5c-fd13-4d7d-b385-474e8dd68571</guid>
      <link>https://share.transistor.fm/s/1bd91ee1</link>
      <description>
        <![CDATA[<p><br>On the morning of September 11th, 2001, John Ackerly was briefing White House officials on federal privacy legislation. Hours later, everything changed — and those two realities, data that wasn't shared when it should have been, and data that was exposed when it shouldn't have been, became the founding idea behind Virtru.</p><p><br>In this episode of SecureTalk, host Justin Beals sits down with John Ackerly, CEO and co-founder of Virtru and former White House technology policy adviser, to explore why perimeter security alone is broken — and what data-centric, cryptographic control means for the future of cybersecurity.</p><p><br>They cover:</p><p>00:00 Introduction to SecureTalk and Data Security<br>02:28 John Ackerly's Experience and Insights on Privacy Legislation<br>05:05 The Dichotomy of Privacy and Security<br>09:12 Public-Private Partnerships in National Security<br>12:24 Navigating Compliance and Security in Business<br>15:26 The Role of Technology in Security Solutions<br>18:40 Family Ties and Military Background in Cybersecurity<br>20:41 Insider Threats and Data Security Innovations<br>23:29 The Importance of Data Management and Audits<br>26:12 Cultural Impact on Security Practices<br>29:19 Future Challenges: Quantum Computing and Security<br>32:52 The Evolution of AI and Data Science in Security</p><p>Whether you work in cybersecurity, government, or technology policy, this conversation connects the policy decisions of the past 25 years to the architectural challenges we face today.</p><p><br>🔒 Learn more about Virtru: https://www.virtru.com 🎙️ Subscribe to SecureTalk for weekly conversations at the intersection of technology, security, and society.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>On the morning of September 11th, 2001, John Ackerly was briefing White House officials on federal privacy legislation. Hours later, everything changed — and those two realities, data that wasn't shared when it should have been, and data that was exposed when it shouldn't have been, became the founding idea behind Virtru.</p><p><br>In this episode of SecureTalk, host Justin Beals sits down with John Ackerly, CEO and co-founder of Virtru and former White House technology policy adviser, to explore why perimeter security alone is broken — and what data-centric, cryptographic control means for the future of cybersecurity.</p><p><br>They cover:</p><p>00:00 Introduction to SecureTalk and Data Security<br>02:28 John Ackerly's Experience and Insights on Privacy Legislation<br>05:05 The Dichotomy of Privacy and Security<br>09:12 Public-Private Partnerships in National Security<br>12:24 Navigating Compliance and Security in Business<br>15:26 The Role of Technology in Security Solutions<br>18:40 Family Ties and Military Background in Cybersecurity<br>20:41 Insider Threats and Data Security Innovations<br>23:29 The Importance of Data Management and Audits<br>26:12 Cultural Impact on Security Practices<br>29:19 Future Challenges: Quantum Computing and Security<br>32:52 The Evolution of AI and Data Science in Security</p><p>Whether you work in cybersecurity, government, or technology policy, this conversation connects the policy decisions of the past 25 years to the architectural challenges we face today.</p><p><br>🔒 Learn more about Virtru: https://www.virtru.com 🎙️ Subscribe to SecureTalk for weekly conversations at the intersection of technology, security, and society.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Mar 2026 14:25:20 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/1bd91ee1/5f4a72db.mp3" length="78019500" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xWlMZSTkbip2oqGjCCoaaH-BIxQIXKRjyHgIob1o438/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83OTUw/ZDllODBkZDJhNjQ2/Y2Q2ZmM4NjlkOTBl/YzNiZC5wbmc.jpg"/>
      <itunes:duration>2437</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>On the morning of September 11th, 2001, John Ackerly was briefing White House officials on federal privacy legislation. Hours later, everything changed — and those two realities, data that wasn't shared when it should have been, and data that was exposed when it shouldn't have been, became the founding idea behind Virtru.</p><p><br>In this episode of SecureTalk, host Justin Beals sits down with John Ackerly, CEO and co-founder of Virtru and former White House technology policy adviser, to explore why perimeter security alone is broken — and what data-centric, cryptographic control means for the future of cybersecurity.</p><p><br>They cover:</p><p>00:00 Introduction to SecureTalk and Data Security<br>02:28 John Ackerly's Experience and Insights on Privacy Legislation<br>05:05 The Dichotomy of Privacy and Security<br>09:12 Public-Private Partnerships in National Security<br>12:24 Navigating Compliance and Security in Business<br>15:26 The Role of Technology in Security Solutions<br>18:40 Family Ties and Military Background in Cybersecurity<br>20:41 Insider Threats and Data Security Innovations<br>23:29 The Importance of Data Management and Audits<br>26:12 Cultural Impact on Security Practices<br>29:19 Future Challenges: Quantum Computing and Security<br>32:52 The Evolution of AI and Data Science in Security</p><p>Whether you work in cybersecurity, government, or technology policy, this conversation connects the policy decisions of the past 25 years to the architectural challenges we face today.</p><p><br>🔒 Learn more about Virtru: https://www.virtru.com 🎙️ Subscribe to SecureTalk for weekly conversations at the intersection of technology, security, and society.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Salt Typhoon, National Security. CMMC</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3mgpol7eg7q2g"/>
    </item>
    <item>
      <title>A Con Artist Expert Explains Why Smart People Still Get Scammed | Secure Talk with Robert Siciliano</title>
      <itunes:episode>247</itunes:episode>
      <podcast:episode>247</podcast:episode>
      <itunes:title>A Con Artist Expert Explains Why Smart People Still Get Scammed | Secure Talk with Robert Siciliano</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1e62e619-8347-4a71-8730-f7863ede66f0</guid>
      <link>https://share.transistor.fm/s/0f7ffecc</link>
      <description>
        <![CDATA[<p>You consider yourself pretty tech-savvy. You know not to click suspicious links. You've heard the warnings. So why are more people losing more money to online scams than ever before?</p><p><br></p><p>Robert Siciliano has spent 30 years as a private investigator, appearing on CNN, The Today Show, and Fox News to explain exactly how con artists and cybercriminals think — and why your brain is actually working against you.</p><p><br></p><p>In this eye-opening conversation with SecureTalk host Justin Beals, Robert reveals:</p><p>- The psychological reason almost everyone falls for scams eventually</p><p>- How criminals use loneliness to build fake relationships and drain bank accounts</p><p>- Why your parents are the #1 target for the $124 trillion wealth transfer underway</p><p>- What a deepfake video call cost one company $25 million — in a single afternoon</p><p>- The one habit that would protect 80% of people — and almost nobody does it</p><p><br></p><p>This isn't a tech talk. It's a human talk. And it might be the most important conversation you have about your money, your family, and your identity this year.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Challenges<br>02:44 The Human Blind Spot in Cybersecurity<br>05:30 Engaging Employees in Security Practices<br>08:44 Understanding Cybercrime Trends<br>11:30 The Psychological Aspects of Trust and Security<br>14:03 Personalizing Security Awareness Training<br>17:01 The Role of AI in Cybersecurity Threats<br>23:46 The Dark Reality of Human Trafficking and Cyber Crime<br>25:55 The Evolution of Cyber Crime Tactics<br>27:37 Understanding Human Behavior in Cybersecurity<br>29:54 The Impact of Loneliness on Cyber Vulnerability<br>31:58 The Kitchen Table Effect in Security Training<br>34:20 The Importance of Human Connection in Security Awareness<br>37:40 Empathy and Responsibility in Cybersecurity<br>39:47 Personal Stories Shaping a Security Perspective</p><p>🔔 Subscribe to SecureTalk — new episodes every week.</p><p><br></p><p>#ScamAlert #OnlineScams #IdentityTheft #CyberSafety #DeepFake #FinancialSecurity #PersonalFinance #TechForEveryone #StayProtected #CyberAware</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>You consider yourself pretty tech-savvy. You know not to click suspicious links. You've heard the warnings. So why are more people losing more money to online scams than ever before?</p><p><br></p><p>Robert Siciliano has spent 30 years as a private investigator, appearing on CNN, The Today Show, and Fox News to explain exactly how con artists and cybercriminals think — and why your brain is actually working against you.</p><p><br></p><p>In this eye-opening conversation with SecureTalk host Justin Beals, Robert reveals:</p><p>- The psychological reason almost everyone falls for scams eventually</p><p>- How criminals use loneliness to build fake relationships and drain bank accounts</p><p>- Why your parents are the #1 target for the $124 trillion wealth transfer underway</p><p>- What a deepfake video call cost one company $25 million — in a single afternoon</p><p>- The one habit that would protect 80% of people — and almost nobody does it</p><p><br></p><p>This isn't a tech talk. It's a human talk. And it might be the most important conversation you have about your money, your family, and your identity this year.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Challenges<br>02:44 The Human Blind Spot in Cybersecurity<br>05:30 Engaging Employees in Security Practices<br>08:44 Understanding Cybercrime Trends<br>11:30 The Psychological Aspects of Trust and Security<br>14:03 Personalizing Security Awareness Training<br>17:01 The Role of AI in Cybersecurity Threats<br>23:46 The Dark Reality of Human Trafficking and Cyber Crime<br>25:55 The Evolution of Cyber Crime Tactics<br>27:37 Understanding Human Behavior in Cybersecurity<br>29:54 The Impact of Loneliness on Cyber Vulnerability<br>31:58 The Kitchen Table Effect in Security Training<br>34:20 The Importance of Human Connection in Security Awareness<br>37:40 Empathy and Responsibility in Cybersecurity<br>39:47 Personal Stories Shaping a Security Perspective</p><p>🔔 Subscribe to SecureTalk — new episodes every week.</p><p><br></p><p>#ScamAlert #OnlineScams #IdentityTheft #CyberSafety #DeepFake #FinancialSecurity #PersonalFinance #TechForEveryone #StayProtected #CyberAware</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Feb 2026 12:55:00 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0f7ffecc/d2baf780.mp3" length="89813133" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/V1NKncD1GlB8EsqhYFGgu5SF8C2i68XuV62oOZXaJ0U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMWVj/MDJjNjk2M2ZkOGU2/YjUzYjA0ZTkzNDBh/YTJlNi5wbmc.jpg"/>
      <itunes:duration>2805</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>You consider yourself pretty tech-savvy. You know not to click suspicious links. You've heard the warnings. So why are more people losing more money to online scams than ever before?</p><p><br></p><p>Robert Siciliano has spent 30 years as a private investigator, appearing on CNN, The Today Show, and Fox News to explain exactly how con artists and cybercriminals think — and why your brain is actually working against you.</p><p><br></p><p>In this eye-opening conversation with SecureTalk host Justin Beals, Robert reveals:</p><p>- The psychological reason almost everyone falls for scams eventually</p><p>- How criminals use loneliness to build fake relationships and drain bank accounts</p><p>- Why your parents are the #1 target for the $124 trillion wealth transfer underway</p><p>- What a deepfake video call cost one company $25 million — in a single afternoon</p><p>- The one habit that would protect 80% of people — and almost nobody does it</p><p><br></p><p>This isn't a tech talk. It's a human talk. And it might be the most important conversation you have about your money, your family, and your identity this year.</p><p>Chapters</p><p>00:00 Introduction to Cybersecurity Challenges<br>02:44 The Human Blind Spot in Cybersecurity<br>05:30 Engaging Employees in Security Practices<br>08:44 Understanding Cybercrime Trends<br>11:30 The Psychological Aspects of Trust and Security<br>14:03 Personalizing Security Awareness Training<br>17:01 The Role of AI in Cybersecurity Threats<br>23:46 The Dark Reality of Human Trafficking and Cyber Crime<br>25:55 The Evolution of Cyber Crime Tactics<br>27:37 Understanding Human Behavior in Cybersecurity<br>29:54 The Impact of Loneliness on Cyber Vulnerability<br>31:58 The Kitchen Table Effect in Security Training<br>34:20 The Importance of Human Connection in Security Awareness<br>37:40 Empathy and Responsibility in Cybersecurity<br>39:47 Personal Stories Shaping a Security Perspective</p><p>🔔 Subscribe to SecureTalk — new episodes every week.</p><p><br></p><p>#ScamAlert #OnlineScams #IdentityTheft #CyberSafety #DeepFake #FinancialSecurity #PersonalFinance #TechForEveryone #StayProtected #CyberAware</p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3mfmcyp2vnl2e"/>
    </item>
    <item>
      <title>When Federal Agents Ignore Court Orders: What Happens to Democracy? | Secure Talk with Claire Finkelstein</title>
      <itunes:episode>246</itunes:episode>
      <podcast:episode>246</podcast:episode>
      <itunes:title>When Federal Agents Ignore Court Orders: What Happens to Democracy? | Secure Talk with Claire Finkelstein</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">49bbbc19-e18a-4b68-9b38-1b3530e08ddb</guid>
      <link>https://share.transistor.fm/s/e7450e5a</link>
      <description>
        <![CDATA[<p>What happens when federal law enforcement refuses to follow court orders? In Minneapolis, ICE agents denied state investigators access to crime scenes despite court-issued warrants—a breakdown that national security experts had been warning about for months.</p><p><br></p><p>Dr. Claire Finkelstein, Professor of Law at University of Pennsylvania and Director of the Center for Ethics and the Rule of Law, saw this coming. In October 2024, she ran a tabletop exercise with over 30 retired military leaders simulating exactly this scenario: federal forces confronting state National Guard during civil unrest. The simulation escalated to violence faster than anyone expected, with few off-ramps once momentum built.</p><p><br></p><p>Now that simulation is playing out in real time.</p><p><br></p><p>Dr. Finkelstein has been on the legal front lines, representing 155 members of Congress before the Supreme Court. When the Court ruled the administration couldn't use National Guard troops as they intended, ICE agents surged instead—creating the confrontation we're seeing today.</p><p><br></p><p>The questions are urgent: Can states prosecute federal agents who commit crimes in their jurisdiction? What happens when federal authorities claim immunity? How do soldiers follow orders when they can't trust those orders are lawful? The Supreme Court's immunity decision has made these questions harder to answer.</p><p><br></p><p>This conversation explores what happens when rule of law meets political will, and what remains when the institutions designed to protect democracy face their greatest test.</p><p>#CyberSecurity #NationalSecurity #Democracy #RuleOfLaw #Minnesota #Minneapolis</p><p><br>Resources: <br>Finkelstein, Claire. (2026, January 21). <em>We ran high-level US civil war simulations. Minessota is exactly how they start. </em>The Guardian. <a href="https://www.theguardian.com/commentisfree/2026/jan/21/ice-minnesota-trump">https://www.theguardian.com/commentisfree/2026/jan/21/ice-minnesota-trump</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What happens when federal law enforcement refuses to follow court orders? In Minneapolis, ICE agents denied state investigators access to crime scenes despite court-issued warrants—a breakdown that national security experts had been warning about for months.</p><p><br></p><p>Dr. Claire Finkelstein, Professor of Law at University of Pennsylvania and Director of the Center for Ethics and the Rule of Law, saw this coming. In October 2024, she ran a tabletop exercise with over 30 retired military leaders simulating exactly this scenario: federal forces confronting state National Guard during civil unrest. The simulation escalated to violence faster than anyone expected, with few off-ramps once momentum built.</p><p><br></p><p>Now that simulation is playing out in real time.</p><p><br></p><p>Dr. Finkelstein has been on the legal front lines, representing 155 members of Congress before the Supreme Court. When the Court ruled the administration couldn't use National Guard troops as they intended, ICE agents surged instead—creating the confrontation we're seeing today.</p><p><br></p><p>The questions are urgent: Can states prosecute federal agents who commit crimes in their jurisdiction? What happens when federal authorities claim immunity? How do soldiers follow orders when they can't trust those orders are lawful? The Supreme Court's immunity decision has made these questions harder to answer.</p><p><br></p><p>This conversation explores what happens when rule of law meets political will, and what remains when the institutions designed to protect democracy face their greatest test.</p><p>#CyberSecurity #NationalSecurity #Democracy #RuleOfLaw #Minnesota #Minneapolis</p><p><br>Resources: <br>Finkelstein, Claire. (2026, January 21). <em>We ran high-level US civil war simulations. Minessota is exactly how they start. </em>The Guardian. <a href="https://www.theguardian.com/commentisfree/2026/jan/21/ice-minnesota-trump">https://www.theguardian.com/commentisfree/2026/jan/21/ice-minnesota-trump</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Feb 2026 15:06:18 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e7450e5a/9e696311.mp3" length="85829567" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_2K7ryTnW3TG3WG0oPN4i1WsQ4OqCD7VwHM4iH77cR0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNmQx/N2MzM2MzN2ZiOWUx/ZWY4ZGUyZDg4NjA1/MjBhZC5wbmc.jpg"/>
      <itunes:duration>2681</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What happens when federal law enforcement refuses to follow court orders? In Minneapolis, ICE agents denied state investigators access to crime scenes despite court-issued warrants—a breakdown that national security experts had been warning about for months.</p><p><br></p><p>Dr. Claire Finkelstein, Professor of Law at University of Pennsylvania and Director of the Center for Ethics and the Rule of Law, saw this coming. In October 2024, she ran a tabletop exercise with over 30 retired military leaders simulating exactly this scenario: federal forces confronting state National Guard during civil unrest. The simulation escalated to violence faster than anyone expected, with few off-ramps once momentum built.</p><p><br></p><p>Now that simulation is playing out in real time.</p><p><br></p><p>Dr. Finkelstein has been on the legal front lines, representing 155 members of Congress before the Supreme Court. When the Court ruled the administration couldn't use National Guard troops as they intended, ICE agents surged instead—creating the confrontation we're seeing today.</p><p><br></p><p>The questions are urgent: Can states prosecute federal agents who commit crimes in their jurisdiction? What happens when federal authorities claim immunity? How do soldiers follow orders when they can't trust those orders are lawful? The Supreme Court's immunity decision has made these questions harder to answer.</p><p><br></p><p>This conversation explores what happens when rule of law meets political will, and what remains when the institutions designed to protect democracy face their greatest test.</p><p>#CyberSecurity #NationalSecurity #Democracy #RuleOfLaw #Minnesota #Minneapolis</p><p><br>Resources: <br>Finkelstein, Claire. (2026, January 21). <em>We ran high-level US civil war simulations. Minessota is exactly how they start. </em>The Guardian. <a href="https://www.theguardian.com/commentisfree/2026/jan/21/ice-minnesota-trump">https://www.theguardian.com/commentisfree/2026/jan/21/ice-minnesota-trump</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Democracy, Minnesota, Law, Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Shared Wisdom: Why AI Should Enhance Human Judgment, Not Replace It | Secure Talk with Alex Pentland</title>
      <itunes:episode>245</itunes:episode>
      <podcast:episode>245</podcast:episode>
      <itunes:title>Shared Wisdom: Why AI Should Enhance Human Judgment, Not Replace It | Secure Talk with Alex Pentland</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">afb2a29e-0f4d-4bc2-9cc8-ba952c0a5f86</guid>
      <link>https://share.transistor.fm/s/db5e2756</link>
      <description>
        <![CDATA[<p><br>Most AI discourse swings between paradise and doom—but the real question is how we architect these systems to enhance human understanding rather than replace decision-making. MIT Professor Alex "Sandy" Pentland reveals why treating AI as an information tool instead of an authority is critical for cybersecurity teams, business leaders, and anyone navigating the intersection of technology and culture.</p><p><br>The math is stark: 90% of social media users are represented by only 3% of tweets. We're making decisions based on algorithmic extremes, not community wisdom. Pentland shows how Taiwan used the Polis platform to restore government trust from 7% to 70% by eliminating follower counts and visualizing the full spectrum of opinion—proving most people agree more than they think.</p><p><br>For security professionals, the implications are profound: culture drives security outcomes more than controls. The stories your team shares about breaches, vulnerabilities, and response protocols create the shared wisdom that determines whether you're actually secure. AI can help synthesize context and surface patterns across distributed organizations, but cannot replace the human judgment needed when edge cases and outliers occur.</p><p><br>Drawing parallels to the Enlightenment—when letter-writing networks sparked unprecedented collaboration among scholars—Pentland argues we stand at a similar inflection point. We have tools that let us share information at unprecedented scale, yet our digital systems amplify loud voices and create echo chambers instead of fostering collective wisdom. His book "Shared Wisdom" offers a pragmatic framework for cultural evolution in the age of AI, recognizing we'll take steps forward, make mistakes, and need to choose our direction deliberately.</p><p><br>Key insights include understanding AI as a statistical repackaging of human stories, recognizing how four waves of AI development have each failed in predictable ways, and learning why loyal agents—systems legally bound to serve your interests like doctors and lawyers—represent the future of trustworthy AI. Pentland also explains why audit trails and liability matter more than premature regulation, and how communities need local governance that's interoperable but not uniform.</p><p><br>Alex "Sandy" Pentland is Stanford HAI Fellow, MIT Toshiba Professor, and member of the US National Academy of Engineering. Named one of "100 People to Watch This Century" by Newsweek and one of "seven most powerful data scientists in the world" by Forbes, his work established authentication standards for digital networks and contributed to pioneering EU privacy law.</p><p>Episode Resources: <br>Pentland, Alex. (2025). Shared Wisdom: Cultural Evolution in the Age of AI. The MIT Press.  https://mitpress.mit.edu/9780262050999/shared-wisdom/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>Most AI discourse swings between paradise and doom—but the real question is how we architect these systems to enhance human understanding rather than replace decision-making. MIT Professor Alex "Sandy" Pentland reveals why treating AI as an information tool instead of an authority is critical for cybersecurity teams, business leaders, and anyone navigating the intersection of technology and culture.</p><p><br>The math is stark: 90% of social media users are represented by only 3% of tweets. We're making decisions based on algorithmic extremes, not community wisdom. Pentland shows how Taiwan used the Polis platform to restore government trust from 7% to 70% by eliminating follower counts and visualizing the full spectrum of opinion—proving most people agree more than they think.</p><p><br>For security professionals, the implications are profound: culture drives security outcomes more than controls. The stories your team shares about breaches, vulnerabilities, and response protocols create the shared wisdom that determines whether you're actually secure. AI can help synthesize context and surface patterns across distributed organizations, but cannot replace the human judgment needed when edge cases and outliers occur.</p><p><br>Drawing parallels to the Enlightenment—when letter-writing networks sparked unprecedented collaboration among scholars—Pentland argues we stand at a similar inflection point. We have tools that let us share information at unprecedented scale, yet our digital systems amplify loud voices and create echo chambers instead of fostering collective wisdom. His book "Shared Wisdom" offers a pragmatic framework for cultural evolution in the age of AI, recognizing we'll take steps forward, make mistakes, and need to choose our direction deliberately.</p><p><br>Key insights include understanding AI as a statistical repackaging of human stories, recognizing how four waves of AI development have each failed in predictable ways, and learning why loyal agents—systems legally bound to serve your interests like doctors and lawyers—represent the future of trustworthy AI. Pentland also explains why audit trails and liability matter more than premature regulation, and how communities need local governance that's interoperable but not uniform.</p><p><br>Alex "Sandy" Pentland is Stanford HAI Fellow, MIT Toshiba Professor, and member of the US National Academy of Engineering. Named one of "100 People to Watch This Century" by Newsweek and one of "seven most powerful data scientists in the world" by Forbes, his work established authentication standards for digital networks and contributed to pioneering EU privacy law.</p><p>Episode Resources: <br>Pentland, Alex. (2025). Shared Wisdom: Cultural Evolution in the Age of AI. The MIT Press.  https://mitpress.mit.edu/9780262050999/shared-wisdom/</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Jan 2026 14:11:10 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/db5e2756/6f2f343e.mp3" length="107037936" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PBfBcdhqmL3M-0qzjsuJEgSwkq59bv0M_8ZMrc_xRlg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zOTAz/OTg3MDRhZjFlYTky/YWY1YzViNDZiYWEy/NDVkMS5wbmc.jpg"/>
      <itunes:duration>3343</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>Most AI discourse swings between paradise and doom—but the real question is how we architect these systems to enhance human understanding rather than replace decision-making. MIT Professor Alex "Sandy" Pentland reveals why treating AI as an information tool instead of an authority is critical for cybersecurity teams, business leaders, and anyone navigating the intersection of technology and culture.</p><p><br>The math is stark: 90% of social media users are represented by only 3% of tweets. We're making decisions based on algorithmic extremes, not community wisdom. Pentland shows how Taiwan used the Polis platform to restore government trust from 7% to 70% by eliminating follower counts and visualizing the full spectrum of opinion—proving most people agree more than they think.</p><p><br>For security professionals, the implications are profound: culture drives security outcomes more than controls. The stories your team shares about breaches, vulnerabilities, and response protocols create the shared wisdom that determines whether you're actually secure. AI can help synthesize context and surface patterns across distributed organizations, but cannot replace the human judgment needed when edge cases and outliers occur.</p><p><br>Drawing parallels to the Enlightenment—when letter-writing networks sparked unprecedented collaboration among scholars—Pentland argues we stand at a similar inflection point. We have tools that let us share information at unprecedented scale, yet our digital systems amplify loud voices and create echo chambers instead of fostering collective wisdom. His book "Shared Wisdom" offers a pragmatic framework for cultural evolution in the age of AI, recognizing we'll take steps forward, make mistakes, and need to choose our direction deliberately.</p><p><br>Key insights include understanding AI as a statistical repackaging of human stories, recognizing how four waves of AI development have each failed in predictable ways, and learning why loyal agents—systems legally bound to serve your interests like doctors and lawyers—represent the future of trustworthy AI. Pentland also explains why audit trails and liability matter more than premature regulation, and how communities need local governance that's interoperable but not uniform.</p><p><br>Alex "Sandy" Pentland is Stanford HAI Fellow, MIT Toshiba Professor, and member of the US National Academy of Engineering. Named one of "100 People to Watch This Century" by Newsweek and one of "seven most powerful data scientists in the world" by Forbes, his work established authentication standards for digital networks and contributed to pioneering EU privacy law.</p><p>Episode Resources: <br>Pentland, Alex. (2025). Shared Wisdom: Cultural Evolution in the Age of AI. The MIT Press.  https://mitpress.mit.edu/9780262050999/shared-wisdom/</p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/db5e2756/transcript.txt" type="text/plain"/>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3mdg27acjqi2o"/>
    </item>
    <item>
      <title>The 2026 Planning Episode: 5 key security imperatives.</title>
      <itunes:episode>244</itunes:episode>
      <podcast:episode>244</podcast:episode>
      <itunes:title>The 2026 Planning Episode: 5 key security imperatives.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">35d98d2f-fbda-4d7a-93e7-5f88730a49f4</guid>
      <link>https://share.transistor.fm/s/9f29b214</link>
      <description>
        <![CDATA[<p>While most organizations treat security as a cost center, a select group is using it to win enterprise deals, open new markets, and outpace competitors. The difference? They've stopped asking "how much does security cost?" and started asking "how much value does security create?"</p><p>This strategic edition synthesizes lessons from security leaders at Walmart, PayPal, Postman, and the defense industrial base to reveal the playbook for 2026: treating security as a business function that enables velocity, builds trust, and creates competitive moats.</p><p>Five Strategic Imperatives for 2026:<br>1. Architect for the AI Identity Explosion <br>When AI agents access your CRM, email, and databases on behalf of humans, who's accountable? Walmart's 10,000+ developers faced this at scale. Learn how to govern probabilistic, non-deterministic systems before deployment breaks.<br>2. Turn Supply Chain Security Into Competitive Advantage<br>CMMC enforcement is here—Raytheon paid $8.4M, Penn State $1.25M. But smart contractors are leading with certification to win contracts. See how quantitative security standards are reshaping business relationships between primes and subs.<br>3. Extract Intelligence From Your Own Logs <br>One organization prevented $3M in fraud using internal threat intelligence. Learn why focused AI models that analyze your specific environment outperform generic vendor feeds.<br>4. Make Security Your Primary Differentiator <br>When SOC 2 Type II certification wins you three enterprise customers worth $2M ARR, security spending looks very different to the CFO. Discover how to position security as the reason customers choose you.<br>5. Build Culture, Not Tool Stacks <br>The oil &amp; gas industry made safety everyone's responsibility through culture, not technology. Apply the same principles to solve cybersecurity's 65% turnover crisis.</p><p>Expert Insights From:<br>Rishi Bhargava (Descope) | Tobias Yergin (Walmart) | Bob Kolasky (Exiger) | Chris Wysopal (Veracode) | Bill Anderson (Mattermost) | Satyam Patel (Kandji) | Sam Chehab (Postman) | Brian Wagner | Dimitry Shvartsman (PayPal)<br>The Meta-Pattern: Organizations winning in 2026 measure security in business terms—revenue enabled, customers won, time to market reduced. They're not the "department of no" blocking progress—they're the team enabling fast, safe movement.</p><p>🎙️ SecureTalk: Strategic conversations with security leaders, hosted by Justin Beals<br>🔔 Subscribe for insights on AI security, CMMC, threat intelligence &amp; security ROI<br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>While most organizations treat security as a cost center, a select group is using it to win enterprise deals, open new markets, and outpace competitors. The difference? They've stopped asking "how much does security cost?" and started asking "how much value does security create?"</p><p>This strategic edition synthesizes lessons from security leaders at Walmart, PayPal, Postman, and the defense industrial base to reveal the playbook for 2026: treating security as a business function that enables velocity, builds trust, and creates competitive moats.</p><p>Five Strategic Imperatives for 2026:<br>1. Architect for the AI Identity Explosion <br>When AI agents access your CRM, email, and databases on behalf of humans, who's accountable? Walmart's 10,000+ developers faced this at scale. Learn how to govern probabilistic, non-deterministic systems before deployment breaks.<br>2. Turn Supply Chain Security Into Competitive Advantage<br>CMMC enforcement is here—Raytheon paid $8.4M, Penn State $1.25M. But smart contractors are leading with certification to win contracts. See how quantitative security standards are reshaping business relationships between primes and subs.<br>3. Extract Intelligence From Your Own Logs <br>One organization prevented $3M in fraud using internal threat intelligence. Learn why focused AI models that analyze your specific environment outperform generic vendor feeds.<br>4. Make Security Your Primary Differentiator <br>When SOC 2 Type II certification wins you three enterprise customers worth $2M ARR, security spending looks very different to the CFO. Discover how to position security as the reason customers choose you.<br>5. Build Culture, Not Tool Stacks <br>The oil &amp; gas industry made safety everyone's responsibility through culture, not technology. Apply the same principles to solve cybersecurity's 65% turnover crisis.</p><p>Expert Insights From:<br>Rishi Bhargava (Descope) | Tobias Yergin (Walmart) | Bob Kolasky (Exiger) | Chris Wysopal (Veracode) | Bill Anderson (Mattermost) | Satyam Patel (Kandji) | Sam Chehab (Postman) | Brian Wagner | Dimitry Shvartsman (PayPal)<br>The Meta-Pattern: Organizations winning in 2026 measure security in business terms—revenue enabled, customers won, time to market reduced. They're not the "department of no" blocking progress—they're the team enabling fast, safe movement.</p><p>🎙️ SecureTalk: Strategic conversations with security leaders, hosted by Justin Beals<br>🔔 Subscribe for insights on AI security, CMMC, threat intelligence &amp; security ROI<br></p>]]>
      </content:encoded>
      <pubDate>Tue, 13 Jan 2026 14:24:56 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9f29b214/036d5dc4.mp3" length="89060518" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-T82eZidABov90mBV2zs-7PnkRoE0mieJ5cPLopKU6E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MWFk/YTk1YzM0YjJjOGMw/MmU4OTI1OTFlZjdk/ODAzOS5wbmc.jpg"/>
      <itunes:duration>2772</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>While most organizations treat security as a cost center, a select group is using it to win enterprise deals, open new markets, and outpace competitors. The difference? They've stopped asking "how much does security cost?" and started asking "how much value does security create?"</p><p>This strategic edition synthesizes lessons from security leaders at Walmart, PayPal, Postman, and the defense industrial base to reveal the playbook for 2026: treating security as a business function that enables velocity, builds trust, and creates competitive moats.</p><p>Five Strategic Imperatives for 2026:<br>1. Architect for the AI Identity Explosion <br>When AI agents access your CRM, email, and databases on behalf of humans, who's accountable? Walmart's 10,000+ developers faced this at scale. Learn how to govern probabilistic, non-deterministic systems before deployment breaks.<br>2. Turn Supply Chain Security Into Competitive Advantage<br>CMMC enforcement is here—Raytheon paid $8.4M, Penn State $1.25M. But smart contractors are leading with certification to win contracts. See how quantitative security standards are reshaping business relationships between primes and subs.<br>3. Extract Intelligence From Your Own Logs <br>One organization prevented $3M in fraud using internal threat intelligence. Learn why focused AI models that analyze your specific environment outperform generic vendor feeds.<br>4. Make Security Your Primary Differentiator <br>When SOC 2 Type II certification wins you three enterprise customers worth $2M ARR, security spending looks very different to the CFO. Discover how to position security as the reason customers choose you.<br>5. Build Culture, Not Tool Stacks <br>The oil &amp; gas industry made safety everyone's responsibility through culture, not technology. Apply the same principles to solve cybersecurity's 65% turnover crisis.</p><p>Expert Insights From:<br>Rishi Bhargava (Descope) | Tobias Yergin (Walmart) | Bob Kolasky (Exiger) | Chris Wysopal (Veracode) | Bill Anderson (Mattermost) | Satyam Patel (Kandji) | Sam Chehab (Postman) | Brian Wagner | Dimitry Shvartsman (PayPal)<br>The Meta-Pattern: Organizations winning in 2026 measure security in business terms—revenue enabled, customers won, time to market reduced. They're not the "department of no" blocking progress—they're the team enabling fast, safe movement.</p><p>🎙️ SecureTalk: Strategic conversations with security leaders, hosted by Justin Beals<br>🔔 Subscribe for insights on AI security, CMMC, threat intelligence &amp; security ROI<br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3mccuh5n7y72f"/>
    </item>
    <item>
      <title>Secure Talk Special Episode: "Building Secure Societies in the Age of Division: The Seven Lessons for Humanity Heading Into 2026"</title>
      <itunes:episode>243</itunes:episode>
      <podcast:episode>243</podcast:episode>
      <itunes:title>Secure Talk Special Episode: "Building Secure Societies in the Age of Division: The Seven Lessons for Humanity Heading Into 2026"</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6fde8680-4bea-4e37-8e9b-a4912a25bdf2</guid>
      <link>https://share.transistor.fm/s/96fe5267</link>
      <description>
        <![CDATA[<p><strong><br>"In 20 years, we transformed food allergy awareness from nonexistent to universal—no law required. What if we could do the same for data security and AI governance?"<br></strong><br></p><p><br>This special episode reveals how grassroots cultural shifts create lasting change, and why 2026 might be the year cybersecurity professionals become architects of something bigger than defenses.</p><p><br>We've distilled 2025's conversations with experts from Harvard, MIT, NYU, Brown, and the AI development frontlines into <strong>seven actionable lessons that reframe security from technical problem to human opportunity.</strong> From understanding the 800 billion AI agents already in our systems, to recognizing why your most valuable threat intelligence is already in your logs, to building the communities that make external defenses less necessary.</p><p><strong><br>Here's what successful security leaders are realizing:</strong> The organizations thriving in 2026 aren't just protecting systems—they're creating conditions where humans and AI can flourish together.</p><p><strong><br>THE SEVEN LESSONS:</strong> <br>• Social division is our greatest vulnerability (and connection is our strength) <br>• Technology won't save us from ourselves (but we can) <br>• Real change happens through grassroots cultural shifts <br>• AI demands fundamentally different thinking (here's how) <br>• Our values can blind us (when to trust them, when not to) <br>• The weakest links are often invisible (where to look) <br>• Context matters more than technology (your advantage is closer than you think)</p><p><strong><br>FEATURING INSIGHTS FROM:</strong> Dr. Claire Robertson (NYU) | Greg Epstein (Harvard/MIT) | Dr. De Kai | Rishi Bhargava (Descope) | Tobias Yergin (Walmart AI) | Prof. Steven Sloman (Brown) | Lars Kruse | Brian Wagner | Dr. Aram Sinnreich | Jesse Gilbert</p><p><strong><br>PERFECT FOR:</strong> Security leaders building resilient organizations | Professionals navigating AI transformation | Anyone ready to move beyond purely technical solutions</p><p><br></p><p><br>🔗 StrikeGraph: https://strikegraph.com</p><p><br>Which lesson will change how you approach security in 2026? </p><p><strong><br>#Cybersecurity #AIGovernance #SecurityLeadership #CyberResilience #AIEthics #CISO #ThreatIntelligence #FutureOfWork<br></strong><br></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong><br>"In 20 years, we transformed food allergy awareness from nonexistent to universal—no law required. What if we could do the same for data security and AI governance?"<br></strong><br></p><p><br>This special episode reveals how grassroots cultural shifts create lasting change, and why 2026 might be the year cybersecurity professionals become architects of something bigger than defenses.</p><p><br>We've distilled 2025's conversations with experts from Harvard, MIT, NYU, Brown, and the AI development frontlines into <strong>seven actionable lessons that reframe security from technical problem to human opportunity.</strong> From understanding the 800 billion AI agents already in our systems, to recognizing why your most valuable threat intelligence is already in your logs, to building the communities that make external defenses less necessary.</p><p><strong><br>Here's what successful security leaders are realizing:</strong> The organizations thriving in 2026 aren't just protecting systems—they're creating conditions where humans and AI can flourish together.</p><p><strong><br>THE SEVEN LESSONS:</strong> <br>• Social division is our greatest vulnerability (and connection is our strength) <br>• Technology won't save us from ourselves (but we can) <br>• Real change happens through grassroots cultural shifts <br>• AI demands fundamentally different thinking (here's how) <br>• Our values can blind us (when to trust them, when not to) <br>• The weakest links are often invisible (where to look) <br>• Context matters more than technology (your advantage is closer than you think)</p><p><strong><br>FEATURING INSIGHTS FROM:</strong> Dr. Claire Robertson (NYU) | Greg Epstein (Harvard/MIT) | Dr. De Kai | Rishi Bhargava (Descope) | Tobias Yergin (Walmart AI) | Prof. Steven Sloman (Brown) | Lars Kruse | Brian Wagner | Dr. Aram Sinnreich | Jesse Gilbert</p><p><strong><br>PERFECT FOR:</strong> Security leaders building resilient organizations | Professionals navigating AI transformation | Anyone ready to move beyond purely technical solutions</p><p><br></p><p><br>🔗 StrikeGraph: https://strikegraph.com</p><p><br>Which lesson will change how you approach security in 2026? </p><p><strong><br>#Cybersecurity #AIGovernance #SecurityLeadership #CyberResilience #AIEthics #CISO #ThreatIntelligence #FutureOfWork<br></strong><br></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Dec 2025 00:00:00 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/96fe5267/f084655e.mp3" length="60911894" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/cbI6gytLRrvGodV6aAJuU45x2TXInuTleEwIlL4QOnI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMzVk/ODZiYWNhNmZhODJi/MTc3YjQxMGEyNTE4/NTNjMy5wbmc.jpg"/>
      <itunes:duration>1860</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong><br>"In 20 years, we transformed food allergy awareness from nonexistent to universal—no law required. What if we could do the same for data security and AI governance?"<br></strong><br></p><p><br>This special episode reveals how grassroots cultural shifts create lasting change, and why 2026 might be the year cybersecurity professionals become architects of something bigger than defenses.</p><p><br>We've distilled 2025's conversations with experts from Harvard, MIT, NYU, Brown, and the AI development frontlines into <strong>seven actionable lessons that reframe security from technical problem to human opportunity.</strong> From understanding the 800 billion AI agents already in our systems, to recognizing why your most valuable threat intelligence is already in your logs, to building the communities that make external defenses less necessary.</p><p><strong><br>Here's what successful security leaders are realizing:</strong> The organizations thriving in 2026 aren't just protecting systems—they're creating conditions where humans and AI can flourish together.</p><p><strong><br>THE SEVEN LESSONS:</strong> <br>• Social division is our greatest vulnerability (and connection is our strength) <br>• Technology won't save us from ourselves (but we can) <br>• Real change happens through grassroots cultural shifts <br>• AI demands fundamentally different thinking (here's how) <br>• Our values can blind us (when to trust them, when not to) <br>• The weakest links are often invisible (where to look) <br>• Context matters more than technology (your advantage is closer than you think)</p><p><strong><br>FEATURING INSIGHTS FROM:</strong> Dr. Claire Robertson (NYU) | Greg Epstein (Harvard/MIT) | Dr. De Kai | Rishi Bhargava (Descope) | Tobias Yergin (Walmart AI) | Prof. Steven Sloman (Brown) | Lars Kruse | Brian Wagner | Dr. Aram Sinnreich | Jesse Gilbert</p><p><strong><br>PERFECT FOR:</strong> Security leaders building resilient organizations | Professionals navigating AI transformation | Anyone ready to move beyond purely technical solutions</p><p><br></p><p><br>🔗 StrikeGraph: https://strikegraph.com</p><p><br>Which lesson will change how you approach security in 2026? </p><p><strong><br>#Cybersecurity #AIGovernance #SecurityLeadership #CyberResilience #AIEthics #CISO #ThreatIntelligence #FutureOfWork<br></strong><br></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3mb65lesved2j"/>
    </item>
    <item>
      <title>Building a Thriving Future: AI Ethics &amp; Security in Virtual Worlds | Dr. Paola Cecchi - Dimeglio</title>
      <itunes:episode>242</itunes:episode>
      <podcast:episode>242</podcast:episode>
      <itunes:title>Building a Thriving Future: AI Ethics &amp; Security in Virtual Worlds | Dr. Paola Cecchi - Dimeglio</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2651c809-869a-447e-b540-60bf726543bd</guid>
      <link>https://share.transistor.fm/s/90d037b8</link>
      <description>
        <![CDATA[<p><br>The mistakes we made building the internet don't have to be repeated in the metaverse—if we act now.</p><p><br>Join SecureTalk host Justin Beals for an essential conversation with Dr. Paola Cecchi-Dimeglio about building secure, ethical virtual worlds. Dr. Cecchi-Dimeglio brings 25 years of experience advising governments, Fortune 500 companies, and global institutions on AI ethics and technology governance.</p><p><br>Her new book "Building a Thriving Future: Metaverse and Multiverse" (MIT Press, 2025) provides frameworks for building virtual spaces that serve humanity rather than exploit it.</p><p><br>CORE THEMES: <br>• Security by design vs. security bolted on after problems emerge <br>• How biases get encoded into AI systems—and prevention strategies <br>• The critical role of "human in the loop" for AI oversight <br>• Why good regulation creates business stability <br>• Digital identity systems for global inclusion <br>• Authentication and verification in virtual spaces <br>• Cross-border legal frameworks for technology governance</p><p><br>REAL-WORLD IMPACT: Over 1 billion people globally lack legal identification—virtual worlds could solve this through blockchain-based digital identity, or create new exclusions if built poorly. The standards we set now for authentication, verification, and identity control will determine whether these spaces become tools for human flourishing or mechanisms for surveillance.</p><p><br>WHY THIS MATTERS NOW:</p><ul><li>Virtual worlds already exist—gaming platforms host billions of users</li><li>AI is accelerating everything, including security vulnerabilities</li><li>Deepfake technology is improving faster than detection methods</li><li>The decisions made today will shape digital society for decades<p></p></li></ul><p><br>SURPRISING INSIGHTS: <br>→ Children currently detect deepfakes better than adults (but not for long) <br>→ Major consulting firms have sold governments expensive reports full of AI errors <br>→ Voice recognition systems historically failed on non-Western accents due to training data bias<br>→ Email autocorrect defaults "Paola" to "Paolo" because datasets contained more men than women</p><p><br>ABOUT THE GUEST: Dr. Paola Cecchi-Dimeglio is a globally recognized expert in AI, big data, and behavioral science. She holds dual appointments at Harvard Law School and Kennedy School of Government, co-chairs the UN ITU Global Initiative on AI and Virtual Worlds, and has authored 70+ peer-reviewed publications. Her work advises the World Bank, European Commission, and Fortune 500 executives on ethical AI implementation.</p><p><br>THE OPTIMISTIC VISION: Virtual worlds can tap talent anywhere, breaking geographic barriers. They can connect separated families, provide legal identity to excluded populations, and create opportunities we can't yet imagine—but only if we build them with security, ethics, and human values as foundational requirements.</p><p><br>ABOUT SECURETALK: SecureTalk ranks in the top 2.5% of podcasts globally, making cybersecurity and compliance topics accessible to business leaders. Hosted by Justin Beals, CEO of Strike Graph and former network security engineer.</p><p><br>Perfect for: Security professionals, technology leaders, business executives, policy makers, anyone concerned about building ethical AI systems and secure virtual worlds.</p><p><br>📚 "Building a Thriving Future: Metaverse and Multiverse" by Dr. Paola Cecchi-Dimeglio (MIT Press, 2025)</p><p><br>#AIEthics #Cybersecurity #VirtualWorlds #TechnologyGovernance #MetaverseSecurity #DigitalEthics #AIRegulation #SecureByDesign</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>The mistakes we made building the internet don't have to be repeated in the metaverse—if we act now.</p><p><br>Join SecureTalk host Justin Beals for an essential conversation with Dr. Paola Cecchi-Dimeglio about building secure, ethical virtual worlds. Dr. Cecchi-Dimeglio brings 25 years of experience advising governments, Fortune 500 companies, and global institutions on AI ethics and technology governance.</p><p><br>Her new book "Building a Thriving Future: Metaverse and Multiverse" (MIT Press, 2025) provides frameworks for building virtual spaces that serve humanity rather than exploit it.</p><p><br>CORE THEMES: <br>• Security by design vs. security bolted on after problems emerge <br>• How biases get encoded into AI systems—and prevention strategies <br>• The critical role of "human in the loop" for AI oversight <br>• Why good regulation creates business stability <br>• Digital identity systems for global inclusion <br>• Authentication and verification in virtual spaces <br>• Cross-border legal frameworks for technology governance</p><p><br>REAL-WORLD IMPACT: Over 1 billion people globally lack legal identification—virtual worlds could solve this through blockchain-based digital identity, or create new exclusions if built poorly. The standards we set now for authentication, verification, and identity control will determine whether these spaces become tools for human flourishing or mechanisms for surveillance.</p><p><br>WHY THIS MATTERS NOW:</p><ul><li>Virtual worlds already exist—gaming platforms host billions of users</li><li>AI is accelerating everything, including security vulnerabilities</li><li>Deepfake technology is improving faster than detection methods</li><li>The decisions made today will shape digital society for decades<p></p></li></ul><p><br>SURPRISING INSIGHTS: <br>→ Children currently detect deepfakes better than adults (but not for long) <br>→ Major consulting firms have sold governments expensive reports full of AI errors <br>→ Voice recognition systems historically failed on non-Western accents due to training data bias<br>→ Email autocorrect defaults "Paola" to "Paolo" because datasets contained more men than women</p><p><br>ABOUT THE GUEST: Dr. Paola Cecchi-Dimeglio is a globally recognized expert in AI, big data, and behavioral science. She holds dual appointments at Harvard Law School and Kennedy School of Government, co-chairs the UN ITU Global Initiative on AI and Virtual Worlds, and has authored 70+ peer-reviewed publications. Her work advises the World Bank, European Commission, and Fortune 500 executives on ethical AI implementation.</p><p><br>THE OPTIMISTIC VISION: Virtual worlds can tap talent anywhere, breaking geographic barriers. They can connect separated families, provide legal identity to excluded populations, and create opportunities we can't yet imagine—but only if we build them with security, ethics, and human values as foundational requirements.</p><p><br>ABOUT SECURETALK: SecureTalk ranks in the top 2.5% of podcasts globally, making cybersecurity and compliance topics accessible to business leaders. Hosted by Justin Beals, CEO of Strike Graph and former network security engineer.</p><p><br>Perfect for: Security professionals, technology leaders, business executives, policy makers, anyone concerned about building ethical AI systems and secure virtual worlds.</p><p><br>📚 "Building a Thriving Future: Metaverse and Multiverse" by Dr. Paola Cecchi-Dimeglio (MIT Press, 2025)</p><p><br>#AIEthics #Cybersecurity #VirtualWorlds #TechnologyGovernance #MetaverseSecurity #DigitalEthics #AIRegulation #SecureByDesign</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Dec 2025 15:06:57 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/90d037b8/b3eff72a.mp3" length="107657826" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7I7zIKXJuZo6OOIW8PUv4qsQxo1ENGYGXctPtt2MfYQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83Yjg1/N2FhNzRkNGQzZWFj/ZTA0NDE5ZDI1MWRk/NjZiNi5wbmc.jpg"/>
      <itunes:duration>3363</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>The mistakes we made building the internet don't have to be repeated in the metaverse—if we act now.</p><p><br>Join SecureTalk host Justin Beals for an essential conversation with Dr. Paola Cecchi-Dimeglio about building secure, ethical virtual worlds. Dr. Cecchi-Dimeglio brings 25 years of experience advising governments, Fortune 500 companies, and global institutions on AI ethics and technology governance.</p><p><br>Her new book "Building a Thriving Future: Metaverse and Multiverse" (MIT Press, 2025) provides frameworks for building virtual spaces that serve humanity rather than exploit it.</p><p><br>CORE THEMES: <br>• Security by design vs. security bolted on after problems emerge <br>• How biases get encoded into AI systems—and prevention strategies <br>• The critical role of "human in the loop" for AI oversight <br>• Why good regulation creates business stability <br>• Digital identity systems for global inclusion <br>• Authentication and verification in virtual spaces <br>• Cross-border legal frameworks for technology governance</p><p><br>REAL-WORLD IMPACT: Over 1 billion people globally lack legal identification—virtual worlds could solve this through blockchain-based digital identity, or create new exclusions if built poorly. The standards we set now for authentication, verification, and identity control will determine whether these spaces become tools for human flourishing or mechanisms for surveillance.</p><p><br>WHY THIS MATTERS NOW:</p><ul><li>Virtual worlds already exist—gaming platforms host billions of users</li><li>AI is accelerating everything, including security vulnerabilities</li><li>Deepfake technology is improving faster than detection methods</li><li>The decisions made today will shape digital society for decades<p></p></li></ul><p><br>SURPRISING INSIGHTS: <br>→ Children currently detect deepfakes better than adults (but not for long) <br>→ Major consulting firms have sold governments expensive reports full of AI errors <br>→ Voice recognition systems historically failed on non-Western accents due to training data bias<br>→ Email autocorrect defaults "Paola" to "Paolo" because datasets contained more men than women</p><p><br>ABOUT THE GUEST: Dr. Paola Cecchi-Dimeglio is a globally recognized expert in AI, big data, and behavioral science. She holds dual appointments at Harvard Law School and Kennedy School of Government, co-chairs the UN ITU Global Initiative on AI and Virtual Worlds, and has authored 70+ peer-reviewed publications. Her work advises the World Bank, European Commission, and Fortune 500 executives on ethical AI implementation.</p><p><br>THE OPTIMISTIC VISION: Virtual worlds can tap talent anywhere, breaking geographic barriers. They can connect separated families, provide legal identity to excluded populations, and create opportunities we can't yet imagine—but only if we build them with security, ethics, and human values as foundational requirements.</p><p><br>ABOUT SECURETALK: SecureTalk ranks in the top 2.5% of podcasts globally, making cybersecurity and compliance topics accessible to business leaders. Hosted by Justin Beals, CEO of Strike Graph and former network security engineer.</p><p><br>Perfect for: Security professionals, technology leaders, business executives, policy makers, anyone concerned about building ethical AI systems and secure virtual worlds.</p><p><br>📚 "Building a Thriving Future: Metaverse and Multiverse" by Dr. Paola Cecchi-Dimeglio (MIT Press, 2025)</p><p><br>#AIEthics #Cybersecurity #VirtualWorlds #TechnologyGovernance #MetaverseSecurity #DigitalEthics #AIRegulation #SecureByDesign</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3ma4jpzrxit2j"/>
    </item>
    <item>
      <title>Why Security Leaders Struggle With Security Culture | Steven Sloman on Secure Talk</title>
      <itunes:episode>241</itunes:episode>
      <podcast:episode>241</podcast:episode>
      <itunes:title>Why Security Leaders Struggle With Security Culture | Steven Sloman on Secure Talk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6eda0f2a-58e0-4320-836f-13bfbf31f834</guid>
      <link>https://share.transistor.fm/s/08731dc0</link>
      <description>
        <![CDATA[<p><br>Brown University cognitive scientist Steven Sloman reveals the hidden mechanism driving cultural division—and why it matters for security leadership. In this wide-ranging conversation, Sloman explains the fundamental tension between sacred values and consequentialist thinking, and how understanding this dynamic transforms how leaders communicate risk and build organizational culture.</p><p><br>Justin Beals opens with a personal story about leaving a religious environment defined by absolute values, setting the stage for an exploration of how cognitive science explains why extremists control discourse, why outrage dominates social media, and why having strong values might actually be essential for good decision-making.</p><p><br>KEY TOPICS: • The two systems humans use for decision-making and why both matter • Why simplified positions dominate complex policy debates • How humor breaks through absolutist thinking • The critical difference between AI association and human deliberation • Why communities radicalize when they become too insular • Practical frameworks for leadership teams navigating value conflicts</p><p><br>Sloman, author of "The Cost of Conviction: How Our Deepest Values Lead Us Astray," shares insights from decades of research on cognition, reasoning, and collective thinking. The conversation moves from abstract cognitive science to immediate applications for security professionals operating in organizations where tribal loyalties threaten evidence-based decision-making.</p><p><br>Whether you're presenting risk assessments to boards, building security culture, or helping organizations function during divisive times, this episode offers frameworks for understanding when values serve us and when consequentialist analysis becomes essential.</p><p><strong>Resources: Sloman, S. (2025). </strong><strong><em>The cost of conviction: How our deepest values lead us astray</em></strong><strong>. MIT Press. (</strong><a href="https://mitpress.mit.edu/9780262049825/the-cost-of-conviction/"><strong>https://mitpress.mit.edu/9780262049825/the-cost-of-conviction/</strong></a><strong>) </strong></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>Brown University cognitive scientist Steven Sloman reveals the hidden mechanism driving cultural division—and why it matters for security leadership. In this wide-ranging conversation, Sloman explains the fundamental tension between sacred values and consequentialist thinking, and how understanding this dynamic transforms how leaders communicate risk and build organizational culture.</p><p><br>Justin Beals opens with a personal story about leaving a religious environment defined by absolute values, setting the stage for an exploration of how cognitive science explains why extremists control discourse, why outrage dominates social media, and why having strong values might actually be essential for good decision-making.</p><p><br>KEY TOPICS: • The two systems humans use for decision-making and why both matter • Why simplified positions dominate complex policy debates • How humor breaks through absolutist thinking • The critical difference between AI association and human deliberation • Why communities radicalize when they become too insular • Practical frameworks for leadership teams navigating value conflicts</p><p><br>Sloman, author of "The Cost of Conviction: How Our Deepest Values Lead Us Astray," shares insights from decades of research on cognition, reasoning, and collective thinking. The conversation moves from abstract cognitive science to immediate applications for security professionals operating in organizations where tribal loyalties threaten evidence-based decision-making.</p><p><br>Whether you're presenting risk assessments to boards, building security culture, or helping organizations function during divisive times, this episode offers frameworks for understanding when values serve us and when consequentialist analysis becomes essential.</p><p><strong>Resources: Sloman, S. (2025). </strong><strong><em>The cost of conviction: How our deepest values lead us astray</em></strong><strong>. MIT Press. (</strong><a href="https://mitpress.mit.edu/9780262049825/the-cost-of-conviction/"><strong>https://mitpress.mit.edu/9780262049825/the-cost-of-conviction/</strong></a><strong>) </strong></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Dec 2025 15:06:50 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/08731dc0/6a22d7fc.mp3" length="107365869" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Qi0D3GEStRjxRksHuiU6N26K4ewrF21uCh2QNF2WZt4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDMz/OTk5NzU3YTY1ZjEz/NGVkNzU3NTNjMWIx/MTZlNS5wbmc.jpg"/>
      <itunes:duration>3354</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>Brown University cognitive scientist Steven Sloman reveals the hidden mechanism driving cultural division—and why it matters for security leadership. In this wide-ranging conversation, Sloman explains the fundamental tension between sacred values and consequentialist thinking, and how understanding this dynamic transforms how leaders communicate risk and build organizational culture.</p><p><br>Justin Beals opens with a personal story about leaving a religious environment defined by absolute values, setting the stage for an exploration of how cognitive science explains why extremists control discourse, why outrage dominates social media, and why having strong values might actually be essential for good decision-making.</p><p><br>KEY TOPICS: • The two systems humans use for decision-making and why both matter • Why simplified positions dominate complex policy debates • How humor breaks through absolutist thinking • The critical difference between AI association and human deliberation • Why communities radicalize when they become too insular • Practical frameworks for leadership teams navigating value conflicts</p><p><br>Sloman, author of "The Cost of Conviction: How Our Deepest Values Lead Us Astray," shares insights from decades of research on cognition, reasoning, and collective thinking. The conversation moves from abstract cognitive science to immediate applications for security professionals operating in organizations where tribal loyalties threaten evidence-based decision-making.</p><p><br>Whether you're presenting risk assessments to boards, building security culture, or helping organizations function during divisive times, this episode offers frameworks for understanding when values serve us and when consequentialist analysis becomes essential.</p><p><strong>Resources: Sloman, S. (2025). </strong><strong><em>The cost of conviction: How our deepest values lead us astray</em></strong><strong>. MIT Press. (</strong><a href="https://mitpress.mit.edu/9780262049825/the-cost-of-conviction/"><strong>https://mitpress.mit.edu/9780262049825/the-cost-of-conviction/</strong></a><strong>) </strong></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3m6zd72k2rn2b"/>
    </item>
    <item>
      <title>From Punk Rock Anarchist to Bank Security Leader: An Unlikely Journey in Threat Intelligence | SecureTalk with Joe Rossi</title>
      <itunes:episode>240</itunes:episode>
      <podcast:episode>240</podcast:episode>
      <itunes:title>From Punk Rock Anarchist to Bank Security Leader: An Unlikely Journey in Threat Intelligence | SecureTalk with Joe Rossi</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a89451dc-4a74-470c-8eb9-b53ada5d1bbc</guid>
      <link>https://share.transistor.fm/s/5f920c2f</link>
      <description>
        <![CDATA[<p>Most threat intelligence programs can't prove their value. Joe Rossi's team at Zions Bank did the opposite—preventing $3 million in fraud annually while actually attracting new customers to the bank.</p><p><br></p><p>In this episode, former punk rock kid turned threat intelligence leader Joe Rossi reveals why your most valuable security intelligence isn't from expensive vendor feeds—it's sitting in your own logs right now. He shares the hard lessons learned building CTI programs from scratch, why most organizations focus on the wrong threats, and how to make security a competitive advantage instead of just a cost center.</p><p><br></p><p>Key insights:</p><p>• Why your firewall logs are more valuable than threat intelligence feeds</p><p>• The cultural mindset required before you invest in CTI</p><p>• How to quantify security program ROI in terms leadership actually cares about</p><p>• Dark web monitoring: reality vs. Hollywood expectations</p><p>• When your organization is actually ready for threat intelligence</p><p><br></p><p>Whether you're a CISO considering a CTI program or a security professional trying to prove value, this conversation offers practical frameworks for building security capabilities that directly impact the bottom line.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Most threat intelligence programs can't prove their value. Joe Rossi's team at Zions Bank did the opposite—preventing $3 million in fraud annually while actually attracting new customers to the bank.</p><p><br></p><p>In this episode, former punk rock kid turned threat intelligence leader Joe Rossi reveals why your most valuable security intelligence isn't from expensive vendor feeds—it's sitting in your own logs right now. He shares the hard lessons learned building CTI programs from scratch, why most organizations focus on the wrong threats, and how to make security a competitive advantage instead of just a cost center.</p><p><br></p><p>Key insights:</p><p>• Why your firewall logs are more valuable than threat intelligence feeds</p><p>• The cultural mindset required before you invest in CTI</p><p>• How to quantify security program ROI in terms leadership actually cares about</p><p>• Dark web monitoring: reality vs. Hollywood expectations</p><p>• When your organization is actually ready for threat intelligence</p><p><br></p><p>Whether you're a CISO considering a CTI program or a security professional trying to prove value, this conversation offers practical frameworks for building security capabilities that directly impact the bottom line.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Nov 2025 15:46:45 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/5f920c2f/2d9d9395.mp3" length="123474420" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/TF_miyXZqiFNe1zKy8CK9CtZzrDGbn0H82zFf_8WVYU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MDY0/ZjEwNmY1NWI5YWRk/NmE0MTk1M2Y1NDBi/OWVkYy5wbmc.jpg"/>
      <itunes:duration>3085</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Most threat intelligence programs can't prove their value. Joe Rossi's team at Zions Bank did the opposite—preventing $3 million in fraud annually while actually attracting new customers to the bank.</p><p><br></p><p>In this episode, former punk rock kid turned threat intelligence leader Joe Rossi reveals why your most valuable security intelligence isn't from expensive vendor feeds—it's sitting in your own logs right now. He shares the hard lessons learned building CTI programs from scratch, why most organizations focus on the wrong threats, and how to make security a competitive advantage instead of just a cost center.</p><p><br></p><p>Key insights:</p><p>• Why your firewall logs are more valuable than threat intelligence feeds</p><p>• The cultural mindset required before you invest in CTI</p><p>• How to quantify security program ROI in terms leadership actually cares about</p><p>• Dark web monitoring: reality vs. Hollywood expectations</p><p>• When your organization is actually ready for threat intelligence</p><p><br></p><p>Whether you're a CISO considering a CTI program or a security professional trying to prove value, this conversation offers practical frameworks for building security capabilities that directly impact the bottom line.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3m5w6vyih5p2i"/>
    </item>
    <item>
      <title>Inside CMMC Implementation: What November 10th Means for Defense Contractors | Secure Talk with Bob Kolasky</title>
      <itunes:episode>239</itunes:episode>
      <podcast:episode>239</podcast:episode>
      <itunes:title>Inside CMMC Implementation: What November 10th Means for Defense Contractors | Secure Talk with Bob Kolasky</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">012ce439-44da-4e50-9d97-28fe4aaa65c2</guid>
      <link>https://share.transistor.fm/s/180b26bc</link>
      <description>
        <![CDATA[<p>Bob Kolasky walked the halls where CMMC was built. As founding director of CISA's National Risk Management Center, he watched this policy evolve from concept to pilot program to federal law—surviving three presidential administrations because the need never changed.</p><p><br></p><p>On November 10, 2025, that policy becomes mandatory reality for every defense contractor pursuing new DoD solicitations. Self-certification ends. Independent verification begins. And the defense industrial base faces its most significant security transformation in a generation.</p><p>In this conversation with Justin Beals, Bob explains what contractors need to understand about the deadline—and what recent enforcement actions reveal about gaps that have existed all along.</p><p><br></p><p>From Honor System to Accountability:</p><p>For years, defense contractors self-certified compliance with NIST 800-171 cybersecurity requirements. The system worked on trust. Contractors checked boxes, DoD accepted attestations, and controlled unclassified information flowed through supply chains with security gaps nobody was measuring.</p><p><br></p><p>Then came the settlements. Raytheon paid $8.4 million for failing basic security controls—no antivirus software on systems handling defense information, no system security plans, missing access controls. Penn State settled $1.25 million across 15 contracts. Georgia Tech paid $875,000 in the first DOJ intervention in a cybersecurity False Claims Act case.</p><p>These weren't breaches. These were preventable failures that contractors had certified didn't exist.</p><p>Katie Arrington's warning to the industry has been consistent: "If you go on LinkedIn one more time and tell me how hard CMMC is, I'm going to beat you. That ship sailed in 2014." Translation: adversaries are watching, and contractors broadcasting difficulties are revealing exactly where vulnerabilities exist.</p><p><br></p><p>The November 10th Framework:</p><p>After this deadline, every new contract solicitation includes CMMC requirements matched to data sensitivity:</p><p>Level 1 handles federal contract information through annual self-assessment with SPRS score reporting. Level 2 manages controlled unclassified information and requires independent C3PAO assessor validation—affecting approximately 35% of DoD's contractor base. Level 3 involves breakthrough technology or critical CUI aggregations and demands direct government audit.</p><p>The quantitative approach represents a shift. Instead of binary pass/fail, contractors receive scores reflecting actual security posture. An 88 out of 110 qualifies for Level 2 conditional status with plan of action and milestones. These numbers measure real capabilities across incident response, access control, and continuous monitoring.</p><p><br></p><p>The Supply Chain Ripple Effect:</p><p><br></p><p>Prime contractors bear new responsibility for subcontractor compliance. Before contract award, they must verify—not just accept—that subs meet requirements. Security questionnaires aren't sufficient anymore. Primes need evidence, validation, and continuous visibility.</p><p>An affirming official—typically a senior executive—personally attests to the government that the organization actively manages supply chain risk. This accountability changes relationships throughout the defense industrial base.</p><p><br></p><p>Practical Considerations:</p><p>Bob addresses the questions contractors are asking: How do you define system boundaries when CUI flows through your infrastructure? Why does each information system need a unique CMMC identifier? What does "current CMMC status" mean for maintaining certification? How do you schedule C3PAO assessments when capacity is limited and 35% of contractors need certification?</p><p><br></p><p>He also explains why technology becomes essential—automating compliance evidence collection makes continuous monitoring feasible without massive security staff increases. And he's candid about what the next two years bring: with Kirsten Davies nominated as new CIO and Katie Arrington driving implementation, expect aggressive rollout through 2026.</p><p><br></p><p>Why This Policy Survived:</p><p>Bob's experience spans Obama, Trump, and Biden administrations. The CMMC framework persisted through every transition because supply chain security isn't a partisan issue—it's a national defense imperative. Now at Exiger advising defense contractors, Bob bridges the gap between policy intent and practical implementation.</p><p><br></p><p>This conversation provides clarity on November 10th's real meaning: not just a compliance deadline, but a fundamental shift in how the defense industrial base secures the supply chain supporting national security.</p><p><br></p><p>Guest: Bob Kolasky, SVP Critical Infrastructure at Exiger | Former Founding Director, CISA National Risk Management Center | 15 years shaping federal cybersecurity policy</p><p>#CMMC #November10th #DefenseContracting #Cybersecurity #DFARS #CISA #SupplyChainSecurity #DIB #ComplianceDeadline #NationalSecurity</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Bob Kolasky walked the halls where CMMC was built. As founding director of CISA's National Risk Management Center, he watched this policy evolve from concept to pilot program to federal law—surviving three presidential administrations because the need never changed.</p><p><br></p><p>On November 10, 2025, that policy becomes mandatory reality for every defense contractor pursuing new DoD solicitations. Self-certification ends. Independent verification begins. And the defense industrial base faces its most significant security transformation in a generation.</p><p>In this conversation with Justin Beals, Bob explains what contractors need to understand about the deadline—and what recent enforcement actions reveal about gaps that have existed all along.</p><p><br></p><p>From Honor System to Accountability:</p><p>For years, defense contractors self-certified compliance with NIST 800-171 cybersecurity requirements. The system worked on trust. Contractors checked boxes, DoD accepted attestations, and controlled unclassified information flowed through supply chains with security gaps nobody was measuring.</p><p><br></p><p>Then came the settlements. Raytheon paid $8.4 million for failing basic security controls—no antivirus software on systems handling defense information, no system security plans, missing access controls. Penn State settled $1.25 million across 15 contracts. Georgia Tech paid $875,000 in the first DOJ intervention in a cybersecurity False Claims Act case.</p><p>These weren't breaches. These were preventable failures that contractors had certified didn't exist.</p><p>Katie Arrington's warning to the industry has been consistent: "If you go on LinkedIn one more time and tell me how hard CMMC is, I'm going to beat you. That ship sailed in 2014." Translation: adversaries are watching, and contractors broadcasting difficulties are revealing exactly where vulnerabilities exist.</p><p><br></p><p>The November 10th Framework:</p><p>After this deadline, every new contract solicitation includes CMMC requirements matched to data sensitivity:</p><p>Level 1 handles federal contract information through annual self-assessment with SPRS score reporting. Level 2 manages controlled unclassified information and requires independent C3PAO assessor validation—affecting approximately 35% of DoD's contractor base. Level 3 involves breakthrough technology or critical CUI aggregations and demands direct government audit.</p><p>The quantitative approach represents a shift. Instead of binary pass/fail, contractors receive scores reflecting actual security posture. An 88 out of 110 qualifies for Level 2 conditional status with plan of action and milestones. These numbers measure real capabilities across incident response, access control, and continuous monitoring.</p><p><br></p><p>The Supply Chain Ripple Effect:</p><p><br></p><p>Prime contractors bear new responsibility for subcontractor compliance. Before contract award, they must verify—not just accept—that subs meet requirements. Security questionnaires aren't sufficient anymore. Primes need evidence, validation, and continuous visibility.</p><p>An affirming official—typically a senior executive—personally attests to the government that the organization actively manages supply chain risk. This accountability changes relationships throughout the defense industrial base.</p><p><br></p><p>Practical Considerations:</p><p>Bob addresses the questions contractors are asking: How do you define system boundaries when CUI flows through your infrastructure? Why does each information system need a unique CMMC identifier? What does "current CMMC status" mean for maintaining certification? How do you schedule C3PAO assessments when capacity is limited and 35% of contractors need certification?</p><p><br></p><p>He also explains why technology becomes essential—automating compliance evidence collection makes continuous monitoring feasible without massive security staff increases. And he's candid about what the next two years bring: with Kirsten Davies nominated as new CIO and Katie Arrington driving implementation, expect aggressive rollout through 2026.</p><p><br></p><p>Why This Policy Survived:</p><p>Bob's experience spans Obama, Trump, and Biden administrations. The CMMC framework persisted through every transition because supply chain security isn't a partisan issue—it's a national defense imperative. Now at Exiger advising defense contractors, Bob bridges the gap between policy intent and practical implementation.</p><p><br></p><p>This conversation provides clarity on November 10th's real meaning: not just a compliance deadline, but a fundamental shift in how the defense industrial base secures the supply chain supporting national security.</p><p><br></p><p>Guest: Bob Kolasky, SVP Critical Infrastructure at Exiger | Former Founding Director, CISA National Risk Management Center | 15 years shaping federal cybersecurity policy</p><p>#CMMC #November10th #DefenseContracting #Cybersecurity #DFARS #CISA #SupplyChainSecurity #DIB #ComplianceDeadline #NationalSecurity</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Nov 2025 15:22:02 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/180b26bc/e3937237.mp3" length="133609537" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Up3_QR1GsbDv1KKylBtT5-HT3nBWVqnrsLsYpy-_Dn8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNTc0/MDU5OTliNTQ5ZTgx/NzFkY2YxOWFhOThl/NDg0Yi5wbmc.jpg"/>
      <itunes:duration>3338</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Bob Kolasky walked the halls where CMMC was built. As founding director of CISA's National Risk Management Center, he watched this policy evolve from concept to pilot program to federal law—surviving three presidential administrations because the need never changed.</p><p><br></p><p>On November 10, 2025, that policy becomes mandatory reality for every defense contractor pursuing new DoD solicitations. Self-certification ends. Independent verification begins. And the defense industrial base faces its most significant security transformation in a generation.</p><p>In this conversation with Justin Beals, Bob explains what contractors need to understand about the deadline—and what recent enforcement actions reveal about gaps that have existed all along.</p><p><br></p><p>From Honor System to Accountability:</p><p>For years, defense contractors self-certified compliance with NIST 800-171 cybersecurity requirements. The system worked on trust. Contractors checked boxes, DoD accepted attestations, and controlled unclassified information flowed through supply chains with security gaps nobody was measuring.</p><p><br></p><p>Then came the settlements. Raytheon paid $8.4 million for failing basic security controls—no antivirus software on systems handling defense information, no system security plans, missing access controls. Penn State settled $1.25 million across 15 contracts. Georgia Tech paid $875,000 in the first DOJ intervention in a cybersecurity False Claims Act case.</p><p>These weren't breaches. These were preventable failures that contractors had certified didn't exist.</p><p>Katie Arrington's warning to the industry has been consistent: "If you go on LinkedIn one more time and tell me how hard CMMC is, I'm going to beat you. That ship sailed in 2014." Translation: adversaries are watching, and contractors broadcasting difficulties are revealing exactly where vulnerabilities exist.</p><p><br></p><p>The November 10th Framework:</p><p>After this deadline, every new contract solicitation includes CMMC requirements matched to data sensitivity:</p><p>Level 1 handles federal contract information through annual self-assessment with SPRS score reporting. Level 2 manages controlled unclassified information and requires independent C3PAO assessor validation—affecting approximately 35% of DoD's contractor base. Level 3 involves breakthrough technology or critical CUI aggregations and demands direct government audit.</p><p>The quantitative approach represents a shift. Instead of binary pass/fail, contractors receive scores reflecting actual security posture. An 88 out of 110 qualifies for Level 2 conditional status with plan of action and milestones. These numbers measure real capabilities across incident response, access control, and continuous monitoring.</p><p><br></p><p>The Supply Chain Ripple Effect:</p><p><br></p><p>Prime contractors bear new responsibility for subcontractor compliance. Before contract award, they must verify—not just accept—that subs meet requirements. Security questionnaires aren't sufficient anymore. Primes need evidence, validation, and continuous visibility.</p><p>An affirming official—typically a senior executive—personally attests to the government that the organization actively manages supply chain risk. This accountability changes relationships throughout the defense industrial base.</p><p><br></p><p>Practical Considerations:</p><p>Bob addresses the questions contractors are asking: How do you define system boundaries when CUI flows through your infrastructure? Why does each information system need a unique CMMC identifier? What does "current CMMC status" mean for maintaining certification? How do you schedule C3PAO assessments when capacity is limited and 35% of contractors need certification?</p><p><br></p><p>He also explains why technology becomes essential—automating compliance evidence collection makes continuous monitoring feasible without massive security staff increases. And he's candid about what the next two years bring: with Kirsten Davies nominated as new CIO and Katie Arrington driving implementation, expect aggressive rollout through 2026.</p><p><br></p><p>Why This Policy Survived:</p><p>Bob's experience spans Obama, Trump, and Biden administrations. The CMMC framework persisted through every transition because supply chain security isn't a partisan issue—it's a national defense imperative. Now at Exiger advising defense contractors, Bob bridges the gap between policy intent and practical implementation.</p><p><br></p><p>This conversation provides clarity on November 10th's real meaning: not just a compliance deadline, but a fundamental shift in how the defense industrial base secures the supply chain supporting national security.</p><p><br></p><p>Guest: Bob Kolasky, SVP Critical Infrastructure at Exiger | Former Founding Director, CISA National Risk Management Center | 15 years shaping federal cybersecurity policy</p><p>#CMMC #November10th #DefenseContracting #Cybersecurity #DFARS #CISA #SupplyChainSecurity #DIB #ComplianceDeadline #NationalSecurity</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3m4swz62kqe2t"/>
    </item>
    <item>
      <title>Beyond Big Cities: Understanding Cybersecurity in Mid-Sized Communities | with Lars Kruse </title>
      <itunes:episode>238</itunes:episode>
      <podcast:episode>238</podcast:episode>
      <itunes:title>Beyond Big Cities: Understanding Cybersecurity in Mid-Sized Communities | with Lars Kruse </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41a7616a-3fc3-4710-9a26-99672f4f6095</guid>
      <link>https://share.transistor.fm/s/7cd31eab</link>
      <description>
        <![CDATA[<p>When we think about cybersecurity, images of tech giants and major financial centers come to mind—but what about the towns where most of us actually live? This SecureTalk episode with cybersecurity researcher Lars Kruse explores an often-overlooked question: how do communities of 20,000-100,000 residents protect themselves in an increasingly digital world?</p><p>Host Justin Beals and Kruse, who studies at Sweden's Defense University, discuss the practical realities of implementing cybersecurity in resource-constrained environments. Through his research on over 600 European municipalities and validation interviews with consultants and administrators, Kruse reveals fascinating insights about the gap between written policies and daily operations.</p><p>The conversation opens with a real-world incident from Germany where 72 towns simultaneously lost access to their IT systems—not through sophisticated hacking, but through preventable security oversights. This case study illustrates why understanding operational security matters just as much as regulatory compliance.</p><p><br></p><p>Key topics explored include:</p><p><br></p><p>- How mid-sized communities differ from "smart cities" in their security approach</p><p>- The balance between regulatory requirements like GDPR, NIS2, and DORA</p><p>- Why employee training consistently ranks as the most critical security investment</p><p>- Practical frameworks for managing third-party technology vendors</p><p>- The role of political leadership in prioritizing cybersecurity budgets</p><p>- How research institutions contribute to better security policies</p><p><br></p><p>Kruse shares optimistic findings too: many organizations already practice good security fundamentals—they just need guidance connecting their existing processes to compliance requirements. The episode emphasizes that cybersecurity isn't about expensive technology alone; it's about building resilient practices that protect community services and citizen data.</p><p>Perfect for professionals in public administration, IT management, business operations, or anyone curious about how digital security works beyond headlines. This conversation offers practical knowledge about protecting the digital infrastructure we all depend on daily.</p><p>SecureTalk features conversations with experts shaping the future of cybersecurity and compliance, hosted by Justin Beals, CEO of Strike Graph.</p><p>#Cybersecurity #PublicSector #DigitalSecurity #CommunityResilience #SecurityEducation #DataPrivacy #TechPolicy #LocalGovernment #CyberAwareness #ITSecurity</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>When we think about cybersecurity, images of tech giants and major financial centers come to mind—but what about the towns where most of us actually live? This SecureTalk episode with cybersecurity researcher Lars Kruse explores an often-overlooked question: how do communities of 20,000-100,000 residents protect themselves in an increasingly digital world?</p><p>Host Justin Beals and Kruse, who studies at Sweden's Defense University, discuss the practical realities of implementing cybersecurity in resource-constrained environments. Through his research on over 600 European municipalities and validation interviews with consultants and administrators, Kruse reveals fascinating insights about the gap between written policies and daily operations.</p><p>The conversation opens with a real-world incident from Germany where 72 towns simultaneously lost access to their IT systems—not through sophisticated hacking, but through preventable security oversights. This case study illustrates why understanding operational security matters just as much as regulatory compliance.</p><p><br></p><p>Key topics explored include:</p><p><br></p><p>- How mid-sized communities differ from "smart cities" in their security approach</p><p>- The balance between regulatory requirements like GDPR, NIS2, and DORA</p><p>- Why employee training consistently ranks as the most critical security investment</p><p>- Practical frameworks for managing third-party technology vendors</p><p>- The role of political leadership in prioritizing cybersecurity budgets</p><p>- How research institutions contribute to better security policies</p><p><br></p><p>Kruse shares optimistic findings too: many organizations already practice good security fundamentals—they just need guidance connecting their existing processes to compliance requirements. The episode emphasizes that cybersecurity isn't about expensive technology alone; it's about building resilient practices that protect community services and citizen data.</p><p>Perfect for professionals in public administration, IT management, business operations, or anyone curious about how digital security works beyond headlines. This conversation offers practical knowledge about protecting the digital infrastructure we all depend on daily.</p><p>SecureTalk features conversations with experts shaping the future of cybersecurity and compliance, hosted by Justin Beals, CEO of Strike Graph.</p><p>#Cybersecurity #PublicSector #DigitalSecurity #CommunityResilience #SecurityEducation #DataPrivacy #TechPolicy #LocalGovernment #CyberAwareness #ITSecurity</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Oct 2025 20:44:57 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7cd31eab/3f09fe6e.mp3" length="124736858" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/a9wuLibRT0LCDHnYhji_vHzVA26WtaU2BjY4dsAg_ec/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNDU1/NjVhZmQyYWMzMzEx/ZDc4OTg4NDYxMzkx/NzAyMi5wbmc.jpg"/>
      <itunes:duration>3117</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>When we think about cybersecurity, images of tech giants and major financial centers come to mind—but what about the towns where most of us actually live? This SecureTalk episode with cybersecurity researcher Lars Kruse explores an often-overlooked question: how do communities of 20,000-100,000 residents protect themselves in an increasingly digital world?</p><p>Host Justin Beals and Kruse, who studies at Sweden's Defense University, discuss the practical realities of implementing cybersecurity in resource-constrained environments. Through his research on over 600 European municipalities and validation interviews with consultants and administrators, Kruse reveals fascinating insights about the gap between written policies and daily operations.</p><p>The conversation opens with a real-world incident from Germany where 72 towns simultaneously lost access to their IT systems—not through sophisticated hacking, but through preventable security oversights. This case study illustrates why understanding operational security matters just as much as regulatory compliance.</p><p><br></p><p>Key topics explored include:</p><p><br></p><p>- How mid-sized communities differ from "smart cities" in their security approach</p><p>- The balance between regulatory requirements like GDPR, NIS2, and DORA</p><p>- Why employee training consistently ranks as the most critical security investment</p><p>- Practical frameworks for managing third-party technology vendors</p><p>- The role of political leadership in prioritizing cybersecurity budgets</p><p>- How research institutions contribute to better security policies</p><p><br></p><p>Kruse shares optimistic findings too: many organizations already practice good security fundamentals—they just need guidance connecting their existing processes to compliance requirements. The episode emphasizes that cybersecurity isn't about expensive technology alone; it's about building resilient practices that protect community services and citizen data.</p><p>Perfect for professionals in public administration, IT management, business operations, or anyone curious about how digital security works beyond headlines. This conversation offers practical knowledge about protecting the digital infrastructure we all depend on daily.</p><p>SecureTalk features conversations with experts shaping the future of cybersecurity and compliance, hosted by Justin Beals, CEO of Strike Graph.</p><p>#Cybersecurity #PublicSector #DigitalSecurity #CommunityResilience #SecurityEducation #DataPrivacy #TechPolicy #LocalGovernment #CyberAwareness #ITSecurity</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3m3q763tmmf2v"/>
    </item>
    <item>
      <title>Preparing for the Quantum Era: Why Blockchain is Leading the Charge | James Stephens</title>
      <itunes:episode>237</itunes:episode>
      <podcast:episode>237</podcast:episode>
      <itunes:title>Preparing for the Quantum Era: Why Blockchain is Leading the Charge | James Stephens</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f328b57d-d6e8-4021-940e-e35c3d2b8db6</guid>
      <link>https://share.transistor.fm/s/c3e73c39</link>
      <description>
        <![CDATA[<p><br>Quantum computing represents one of the most significant advances in computer science we'll see in our lifetimes. We're watching error correction rates improve faster than predicted, with Google's Willow chip achieving benchmarks that compress development timelines dramatically.</p><p><br>For security professionals, this creates an exciting challenge: how do we architect systems today that remain secure as computing power evolves? What makes this particularly interesting is that blockchain and Web3 technologies are at the forefront of this transition—not because they're more vulnerable, but because they're leading the way in implementing quantum-resistant solutions.</p><p><br>Unlike traditional systems where encryption happens behind closed doors, blockchain's transparency means every transaction, every wallet, every cryptographic operation is visible on a public ledger. When post-quantum cryptography becomes necessary, these systems can't just patch quietly in the background. They need to migrate entire ecosystems while maintaining trust with users who can see every change on-chain.</p><p><br>In this episode, we sit down with James Stephens, founder and CEO of Krown Technologies and a certified cryptocurrency forensic investigator, to explore how the blockchain industry is pioneering quantum-resistant infrastructure that will inform security practices across all sectors.</p><p><strong><br>What We Discuss:<br></strong><br></p><ul><li><br>Why blockchain and DeFi are leading quantum-resistance innovation</li><li>How transparent, public ledgers change the security equation</li><li>The practical steps security leaders can take now to prepare</li><li>Why true randomness requires physics, not just algorithms</li><li>Lessons from a decade of cryptocurrency forensic investigations</li><li>How to build quantum-resistant infrastructure without sacrificing user experience</li><li>Assessing vendor roadmaps for quantum readiness across any industry<p></p></li></ul><p><br>James brings practical experience from both investigating cryptocurrency breaches and building quantum-resistant blockchain infrastructure. His forensic work revealed that most losses come from key mishandling and social engineering rather than cryptographic breaks—insights that shaped how he approaches designing secure systems for any environment.</p><p><br>This conversation covers both the technical innovation happening in quantum computing and the architectural decisions security teams need to make to prepare their organizations for this next era of computing power.</p><p><strong><br>About the Guest:</strong> James Stephens is a recognized authority in blockchain security and cryptocurrency forensics with over a decade of experience at the intersection of digital assets, cybersecurity, and quantum innovation. He holds certifications including CBE, CCFI, and CORCI, and is the author of "Quantum Reckoning: Securing Blockchain and DeFi in the Post-Quantum Era."</p><p><br>#Cybersecurity #QuantumComputing #PostQuantumCryptography #Blockchain #Web3 #DeFi #InfoSec</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>Quantum computing represents one of the most significant advances in computer science we'll see in our lifetimes. We're watching error correction rates improve faster than predicted, with Google's Willow chip achieving benchmarks that compress development timelines dramatically.</p><p><br>For security professionals, this creates an exciting challenge: how do we architect systems today that remain secure as computing power evolves? What makes this particularly interesting is that blockchain and Web3 technologies are at the forefront of this transition—not because they're more vulnerable, but because they're leading the way in implementing quantum-resistant solutions.</p><p><br>Unlike traditional systems where encryption happens behind closed doors, blockchain's transparency means every transaction, every wallet, every cryptographic operation is visible on a public ledger. When post-quantum cryptography becomes necessary, these systems can't just patch quietly in the background. They need to migrate entire ecosystems while maintaining trust with users who can see every change on-chain.</p><p><br>In this episode, we sit down with James Stephens, founder and CEO of Krown Technologies and a certified cryptocurrency forensic investigator, to explore how the blockchain industry is pioneering quantum-resistant infrastructure that will inform security practices across all sectors.</p><p><strong><br>What We Discuss:<br></strong><br></p><ul><li><br>Why blockchain and DeFi are leading quantum-resistance innovation</li><li>How transparent, public ledgers change the security equation</li><li>The practical steps security leaders can take now to prepare</li><li>Why true randomness requires physics, not just algorithms</li><li>Lessons from a decade of cryptocurrency forensic investigations</li><li>How to build quantum-resistant infrastructure without sacrificing user experience</li><li>Assessing vendor roadmaps for quantum readiness across any industry<p></p></li></ul><p><br>James brings practical experience from both investigating cryptocurrency breaches and building quantum-resistant blockchain infrastructure. His forensic work revealed that most losses come from key mishandling and social engineering rather than cryptographic breaks—insights that shaped how he approaches designing secure systems for any environment.</p><p><br>This conversation covers both the technical innovation happening in quantum computing and the architectural decisions security teams need to make to prepare their organizations for this next era of computing power.</p><p><strong><br>About the Guest:</strong> James Stephens is a recognized authority in blockchain security and cryptocurrency forensics with over a decade of experience at the intersection of digital assets, cybersecurity, and quantum innovation. He holds certifications including CBE, CCFI, and CORCI, and is the author of "Quantum Reckoning: Securing Blockchain and DeFi in the Post-Quantum Era."</p><p><br>#Cybersecurity #QuantumComputing #PostQuantumCryptography #Blockchain #Web3 #DeFi #InfoSec</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Oct 2025 14:26:50 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c3e73c39/7e490074.mp3" length="111191365" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9d0dyAhfxn4CSLwPwdM40XTtCZAEiYc1crgVoRbjQ9k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81Yzg4/NjFiMGQzMTY2NjY2/NjQ1MTZiZTU0MDVj/YTljYy5wbmc.jpg"/>
      <itunes:duration>2779</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>Quantum computing represents one of the most significant advances in computer science we'll see in our lifetimes. We're watching error correction rates improve faster than predicted, with Google's Willow chip achieving benchmarks that compress development timelines dramatically.</p><p><br>For security professionals, this creates an exciting challenge: how do we architect systems today that remain secure as computing power evolves? What makes this particularly interesting is that blockchain and Web3 technologies are at the forefront of this transition—not because they're more vulnerable, but because they're leading the way in implementing quantum-resistant solutions.</p><p><br>Unlike traditional systems where encryption happens behind closed doors, blockchain's transparency means every transaction, every wallet, every cryptographic operation is visible on a public ledger. When post-quantum cryptography becomes necessary, these systems can't just patch quietly in the background. They need to migrate entire ecosystems while maintaining trust with users who can see every change on-chain.</p><p><br>In this episode, we sit down with James Stephens, founder and CEO of Krown Technologies and a certified cryptocurrency forensic investigator, to explore how the blockchain industry is pioneering quantum-resistant infrastructure that will inform security practices across all sectors.</p><p><strong><br>What We Discuss:<br></strong><br></p><ul><li><br>Why blockchain and DeFi are leading quantum-resistance innovation</li><li>How transparent, public ledgers change the security equation</li><li>The practical steps security leaders can take now to prepare</li><li>Why true randomness requires physics, not just algorithms</li><li>Lessons from a decade of cryptocurrency forensic investigations</li><li>How to build quantum-resistant infrastructure without sacrificing user experience</li><li>Assessing vendor roadmaps for quantum readiness across any industry<p></p></li></ul><p><br>James brings practical experience from both investigating cryptocurrency breaches and building quantum-resistant blockchain infrastructure. His forensic work revealed that most losses come from key mishandling and social engineering rather than cryptographic breaks—insights that shaped how he approaches designing secure systems for any environment.</p><p><br>This conversation covers both the technical innovation happening in quantum computing and the architectural decisions security teams need to make to prepare their organizations for this next era of computing power.</p><p><strong><br>About the Guest:</strong> James Stephens is a recognized authority in blockchain security and cryptocurrency forensics with over a decade of experience at the intersection of digital assets, cybersecurity, and quantum innovation. He holds certifications including CBE, CCFI, and CORCI, and is the author of "Quantum Reckoning: Securing Blockchain and DeFi in the Post-Quantum Era."</p><p><br>#Cybersecurity #QuantumComputing #PostQuantumCryptography #Blockchain #Web3 #DeFi #InfoSec</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3m2mdiwr6dg2z"/>
    </item>
    <item>
      <title>Breaking Cybersecurity's 12 Hidden Paradigms: A Futurist's Guide to Security Evolution with Heather Vescent</title>
      <itunes:episode>236</itunes:episode>
      <podcast:episode>236</podcast:episode>
      <itunes:title>Breaking Cybersecurity's 12 Hidden Paradigms: A Futurist's Guide to Security Evolution with Heather Vescent</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">651bc1fb-af7e-411d-97dd-194aa336b21e</guid>
      <link>https://share.transistor.fm/s/b08184e6</link>
      <description>
        <![CDATA[<p>Discover how strategic foresight is revolutionizing cybersecurity thinking. In this compelling SecureTalk episode, renowned futurist Heather Vescent reveals the 12 invisible paradigms that have shaped our entire approach to cybersecurity - and why breaking them could transform how we defend digital systems.</p><p><br></p><p>Back in 2017, Vescent applied strategic foresight methodology to cybersecurity, uncovering fundamental assumptions like "security always plays catch-up," "the user is always wrong," and "we are completely dependent on passwords." Her research, published in 2018, predicted the passwordless revolution that's now mainstream reality.</p><p><br></p><p>This isn't just theoretical - Vescent demonstrates how appreciative inquiry flips traditional problem-solving approaches. Instead of asking "what's broken and how do we fix it," she explores "what's working well and how do we amplify it?" This methodology helped identify paradigm shifts that seemed radical in 2018 but are now industry standard.</p><p><br></p><p>Key insights include:</p><p>- How to shift from reactive to proactive security postures</p><p>- Why attack surface analysis needs systematic approaches</p><p>- The role of AI as thought partner rather than replacement</p><p>- How transparency reduces insider threat attack surfaces</p><p>- Practical applications of decentralized identity technologies</p><p>- Why security teams should focus on strengths, not just vulnerabilities</p><p><br></p><p>Vescent also addresses the commercialization challenges facing promising technologies like self-sovereign identity, explaining how ethical innovations often get compromised during market adoption. Her work bridges the gap between cybersecurity's technical realities and its broader societal implications.</p><p><br></p><p>For CISOs, security leaders, and technologists seeking to influence rather than just react to the future, this conversation provides actionable frameworks for anticipating threats and building more resilient systems. Vescent's strategic foresight methodology offers a roadmap for moving beyond endless problem-solving cycles toward security that creates value rather than just preventing loss.</p><p>Resources: <br>Shifting Paradigms Paper: https://www.researchgate.net/publication/330542765_Shifting_Paradigms_Using_Strategic_Foresight_to_Plan_for_Security_Evolution </p><p>Threat Positioning Framework GPT: https://chatgpt.com/g/g-68100f6a8c7481919d693ec9d4d9faab-the-threat-positioning-framework-gpt-by-h-vescent</p><p>Self Sovereign Identity Book : https://www.amazon.com/Comprehensive-Guide-Self-Sovereign-Identity-ebook/dp/B07Q3TXLDP?&amp;linkCode=sl1&amp;tag=vescent39-20&amp;linkId=2797fe6ea49dff79952bc866ec8e8baf&amp;language=en_US&amp;ref_=as_li_ss_tl </p><p>Heather's  email list: https://research.cybersecurityfuturist.com/</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Discover how strategic foresight is revolutionizing cybersecurity thinking. In this compelling SecureTalk episode, renowned futurist Heather Vescent reveals the 12 invisible paradigms that have shaped our entire approach to cybersecurity - and why breaking them could transform how we defend digital systems.</p><p><br></p><p>Back in 2017, Vescent applied strategic foresight methodology to cybersecurity, uncovering fundamental assumptions like "security always plays catch-up," "the user is always wrong," and "we are completely dependent on passwords." Her research, published in 2018, predicted the passwordless revolution that's now mainstream reality.</p><p><br></p><p>This isn't just theoretical - Vescent demonstrates how appreciative inquiry flips traditional problem-solving approaches. Instead of asking "what's broken and how do we fix it," she explores "what's working well and how do we amplify it?" This methodology helped identify paradigm shifts that seemed radical in 2018 but are now industry standard.</p><p><br></p><p>Key insights include:</p><p>- How to shift from reactive to proactive security postures</p><p>- Why attack surface analysis needs systematic approaches</p><p>- The role of AI as thought partner rather than replacement</p><p>- How transparency reduces insider threat attack surfaces</p><p>- Practical applications of decentralized identity technologies</p><p>- Why security teams should focus on strengths, not just vulnerabilities</p><p><br></p><p>Vescent also addresses the commercialization challenges facing promising technologies like self-sovereign identity, explaining how ethical innovations often get compromised during market adoption. Her work bridges the gap between cybersecurity's technical realities and its broader societal implications.</p><p><br></p><p>For CISOs, security leaders, and technologists seeking to influence rather than just react to the future, this conversation provides actionable frameworks for anticipating threats and building more resilient systems. Vescent's strategic foresight methodology offers a roadmap for moving beyond endless problem-solving cycles toward security that creates value rather than just preventing loss.</p><p>Resources: <br>Shifting Paradigms Paper: https://www.researchgate.net/publication/330542765_Shifting_Paradigms_Using_Strategic_Foresight_to_Plan_for_Security_Evolution </p><p>Threat Positioning Framework GPT: https://chatgpt.com/g/g-68100f6a8c7481919d693ec9d4d9faab-the-threat-positioning-framework-gpt-by-h-vescent</p><p>Self Sovereign Identity Book : https://www.amazon.com/Comprehensive-Guide-Self-Sovereign-Identity-ebook/dp/B07Q3TXLDP?&amp;linkCode=sl1&amp;tag=vescent39-20&amp;linkId=2797fe6ea49dff79952bc866ec8e8baf&amp;language=en_US&amp;ref_=as_li_ss_tl </p><p>Heather's  email list: https://research.cybersecurityfuturist.com/</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Sep 2025 14:26:24 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b08184e6/d2209081.mp3" length="126383955" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/qHSdOvb_4OcGfBtbh3mQuzdWO3g49Kl1FhIefpGaAz8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMWM2/MTUzYzMxZDU5MGI4/YTIxNTNlZWEwZGY4/Y2FlYS5wbmc.jpg"/>
      <itunes:duration>3158</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Discover how strategic foresight is revolutionizing cybersecurity thinking. In this compelling SecureTalk episode, renowned futurist Heather Vescent reveals the 12 invisible paradigms that have shaped our entire approach to cybersecurity - and why breaking them could transform how we defend digital systems.</p><p><br></p><p>Back in 2017, Vescent applied strategic foresight methodology to cybersecurity, uncovering fundamental assumptions like "security always plays catch-up," "the user is always wrong," and "we are completely dependent on passwords." Her research, published in 2018, predicted the passwordless revolution that's now mainstream reality.</p><p><br></p><p>This isn't just theoretical - Vescent demonstrates how appreciative inquiry flips traditional problem-solving approaches. Instead of asking "what's broken and how do we fix it," she explores "what's working well and how do we amplify it?" This methodology helped identify paradigm shifts that seemed radical in 2018 but are now industry standard.</p><p><br></p><p>Key insights include:</p><p>- How to shift from reactive to proactive security postures</p><p>- Why attack surface analysis needs systematic approaches</p><p>- The role of AI as thought partner rather than replacement</p><p>- How transparency reduces insider threat attack surfaces</p><p>- Practical applications of decentralized identity technologies</p><p>- Why security teams should focus on strengths, not just vulnerabilities</p><p><br></p><p>Vescent also addresses the commercialization challenges facing promising technologies like self-sovereign identity, explaining how ethical innovations often get compromised during market adoption. Her work bridges the gap between cybersecurity's technical realities and its broader societal implications.</p><p><br></p><p>For CISOs, security leaders, and technologists seeking to influence rather than just react to the future, this conversation provides actionable frameworks for anticipating threats and building more resilient systems. Vescent's strategic foresight methodology offers a roadmap for moving beyond endless problem-solving cycles toward security that creates value rather than just preventing loss.</p><p>Resources: <br>Shifting Paradigms Paper: https://www.researchgate.net/publication/330542765_Shifting_Paradigms_Using_Strategic_Foresight_to_Plan_for_Security_Evolution </p><p>Threat Positioning Framework GPT: https://chatgpt.com/g/g-68100f6a8c7481919d693ec9d4d9faab-the-threat-positioning-framework-gpt-by-h-vescent</p><p>Self Sovereign Identity Book : https://www.amazon.com/Comprehensive-Guide-Self-Sovereign-Identity-ebook/dp/B07Q3TXLDP?&amp;linkCode=sl1&amp;tag=vescent39-20&amp;linkId=2797fe6ea49dff79952bc866ec8e8baf&amp;language=en_US&amp;ref_=as_li_ss_tl </p><p>Heather's  email list: https://research.cybersecurityfuturist.com/</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, futurist, CISO, Leadership</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3lzj4x4xx3k2i"/>
    </item>
    <item>
      <title>AI Coding Hype vs Reality: The 2025 AI Code Security Report with Chris Wysopal</title>
      <itunes:episode>235</itunes:episode>
      <podcast:episode>235</podcast:episode>
      <itunes:title>AI Coding Hype vs Reality: The 2025 AI Code Security Report with Chris Wysopal</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">18525f02-ea69-4961-88c8-82fe6fbbf661</guid>
      <link>https://share.transistor.fm/s/bb081436</link>
      <description>
        <![CDATA[<p>In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and deliver a stark warning—a small group of dedicated hackers could bring down the entire internet in 30 minutes.</p><p><br></p><p>Today, that same hacker faces a new challenge. The AI revolution everyone celebrates may be creating the largest security vulnerability in computing history.</p><p><br></p><p>Chris and his team at Veracode just completed the most comprehensive study of AI-generated code ever conducted—testing 100 different language models across 80 coding scenarios over two years. What they discovered contradicts everything the tech industry believes about AI development tools.</p><p><br></p><p>The Reality Behind the Hype: Despite billions in investment and years of development, AI systems create vulnerabilities 45% of the time—exactly matching human error rates. While AI has dramatically improved at writing code that compiles and runs, it has learned nothing about writing secure code. The models have simply gotten better at disguising their mistakes.</p><p><br></p><p>The Mathematics of Risk: Development teams now code 3-5x faster using AI assistants like GitHub Copilot and ChatGPT. Same vulnerability rate, exponentially faster development speed equals a multiplication of security flaws entering production systems. Many organizations are simultaneously reducing their security testing capacity just as they accelerate their vulnerability creation rate.</p><p><br></p><p>The Training Data Problem: The source of the issue lies in contaminated training data. These AI systems have absorbed decades of insecure code from open-source repositories and crowd-sourced platforms like Reddit. They've learned every bad coding practice, every deprecated security measure, every vulnerability pattern from the past 30 years—and they're reproducing them at machine speed.</p><p><br></p><p>The Technical Reality:  Chris walks through specific findings: Java fails security tests 72% of the time, cross-site scripting vulnerabilities appear consistently, and inter-procedural data flows confuse even the most advanced models. The study reveals why some vulnerability types prove nearly impossible for current AI to handle correctly.</p><p><br></p><p>From Underground to Enterprise: This isn't just another technical report—it's a perspective from someone who helped define modern cybersecurity. The same analytical approach that once exposed vulnerabilities in massive corporate systems now reveals why the AI coding revolution presents unprecedented challenges.</p><p><br></p><p>The Path Forward:  While general-purpose AI struggles with security, specialized models focused on fixing rather than generating code show promise. Chris explains how Veracode's targeted approach to code remediation succeeds where broad AI systems fail, pointing toward solutions that embrace the "smarter beats bigger" philosophy.</p><p><br></p><p>The hacker who once operated in shadows now examines these systems in broad daylight, revealing how our accelerated development practices may be outpacing our ability to secure them.</p><p><br>Chapters</p><p>00:00 The Origins of Loft Hacking Group<br>07:48 Generative AI in Software Development<br>13:39 Vulnerabilities in AI-Generated Code<br>18:56 The Challenges of Secure Coding<br>24:34 The Future of AI in Software Security<br>29:45 The Impact of AI on Developer Roles</p><p>Resources: <a href="https://www.veracode.com/resources/analyst-reports/2025-genai-code-security-report/">Veracode 2025 GenAI Security Report</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and deliver a stark warning—a small group of dedicated hackers could bring down the entire internet in 30 minutes.</p><p><br></p><p>Today, that same hacker faces a new challenge. The AI revolution everyone celebrates may be creating the largest security vulnerability in computing history.</p><p><br></p><p>Chris and his team at Veracode just completed the most comprehensive study of AI-generated code ever conducted—testing 100 different language models across 80 coding scenarios over two years. What they discovered contradicts everything the tech industry believes about AI development tools.</p><p><br></p><p>The Reality Behind the Hype: Despite billions in investment and years of development, AI systems create vulnerabilities 45% of the time—exactly matching human error rates. While AI has dramatically improved at writing code that compiles and runs, it has learned nothing about writing secure code. The models have simply gotten better at disguising their mistakes.</p><p><br></p><p>The Mathematics of Risk: Development teams now code 3-5x faster using AI assistants like GitHub Copilot and ChatGPT. Same vulnerability rate, exponentially faster development speed equals a multiplication of security flaws entering production systems. Many organizations are simultaneously reducing their security testing capacity just as they accelerate their vulnerability creation rate.</p><p><br></p><p>The Training Data Problem: The source of the issue lies in contaminated training data. These AI systems have absorbed decades of insecure code from open-source repositories and crowd-sourced platforms like Reddit. They've learned every bad coding practice, every deprecated security measure, every vulnerability pattern from the past 30 years—and they're reproducing them at machine speed.</p><p><br></p><p>The Technical Reality:  Chris walks through specific findings: Java fails security tests 72% of the time, cross-site scripting vulnerabilities appear consistently, and inter-procedural data flows confuse even the most advanced models. The study reveals why some vulnerability types prove nearly impossible for current AI to handle correctly.</p><p><br></p><p>From Underground to Enterprise: This isn't just another technical report—it's a perspective from someone who helped define modern cybersecurity. The same analytical approach that once exposed vulnerabilities in massive corporate systems now reveals why the AI coding revolution presents unprecedented challenges.</p><p><br></p><p>The Path Forward:  While general-purpose AI struggles with security, specialized models focused on fixing rather than generating code show promise. Chris explains how Veracode's targeted approach to code remediation succeeds where broad AI systems fail, pointing toward solutions that embrace the "smarter beats bigger" philosophy.</p><p><br></p><p>The hacker who once operated in shadows now examines these systems in broad daylight, revealing how our accelerated development practices may be outpacing our ability to secure them.</p><p><br>Chapters</p><p>00:00 The Origins of Loft Hacking Group<br>07:48 Generative AI in Software Development<br>13:39 Vulnerabilities in AI-Generated Code<br>18:56 The Challenges of Secure Coding<br>24:34 The Future of AI in Software Security<br>29:45 The Impact of AI on Developer Roles</p><p>Resources: <a href="https://www.veracode.com/resources/analyst-reports/2025-genai-code-security-report/">Veracode 2025 GenAI Security Report</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 09 Sep 2025 14:22:15 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/bb081436/c72a2234.mp3" length="111908354" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/g9D7eoCb0vP_lakcIlX08NbBw7E74aWGKSA4milfCag/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYWUz/ZjIwMGJmNzE5MzBj/ZDYwMzYxYmI3ODI1/ODU2Ny5wbmc.jpg"/>
      <itunes:duration>2796</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In a converted hat factory in 1990s Boston, a group of hackers worked through the night to techno beats and Soul Coughing, driven by a simple philosophy: "smarter beats bigger." One of them, Chris Wysopal, would later stand before Congress and deliver a stark warning—a small group of dedicated hackers could bring down the entire internet in 30 minutes.</p><p><br></p><p>Today, that same hacker faces a new challenge. The AI revolution everyone celebrates may be creating the largest security vulnerability in computing history.</p><p><br></p><p>Chris and his team at Veracode just completed the most comprehensive study of AI-generated code ever conducted—testing 100 different language models across 80 coding scenarios over two years. What they discovered contradicts everything the tech industry believes about AI development tools.</p><p><br></p><p>The Reality Behind the Hype: Despite billions in investment and years of development, AI systems create vulnerabilities 45% of the time—exactly matching human error rates. While AI has dramatically improved at writing code that compiles and runs, it has learned nothing about writing secure code. The models have simply gotten better at disguising their mistakes.</p><p><br></p><p>The Mathematics of Risk: Development teams now code 3-5x faster using AI assistants like GitHub Copilot and ChatGPT. Same vulnerability rate, exponentially faster development speed equals a multiplication of security flaws entering production systems. Many organizations are simultaneously reducing their security testing capacity just as they accelerate their vulnerability creation rate.</p><p><br></p><p>The Training Data Problem: The source of the issue lies in contaminated training data. These AI systems have absorbed decades of insecure code from open-source repositories and crowd-sourced platforms like Reddit. They've learned every bad coding practice, every deprecated security measure, every vulnerability pattern from the past 30 years—and they're reproducing them at machine speed.</p><p><br></p><p>The Technical Reality:  Chris walks through specific findings: Java fails security tests 72% of the time, cross-site scripting vulnerabilities appear consistently, and inter-procedural data flows confuse even the most advanced models. The study reveals why some vulnerability types prove nearly impossible for current AI to handle correctly.</p><p><br></p><p>From Underground to Enterprise: This isn't just another technical report—it's a perspective from someone who helped define modern cybersecurity. The same analytical approach that once exposed vulnerabilities in massive corporate systems now reveals why the AI coding revolution presents unprecedented challenges.</p><p><br></p><p>The Path Forward:  While general-purpose AI struggles with security, specialized models focused on fixing rather than generating code show promise. Chris explains how Veracode's targeted approach to code remediation succeeds where broad AI systems fail, pointing toward solutions that embrace the "smarter beats bigger" philosophy.</p><p><br></p><p>The hacker who once operated in shadows now examines these systems in broad daylight, revealing how our accelerated development practices may be outpacing our ability to secure them.</p><p><br>Chapters</p><p>00:00 The Origins of Loft Hacking Group<br>07:48 Generative AI in Software Development<br>13:39 Vulnerabilities in AI-Generated Code<br>18:56 The Challenges of Secure Coding<br>24:34 The Future of AI in Software Security<br>29:45 The Impact of AI on Developer Roles</p><p>Resources: <a href="https://www.veracode.com/resources/analyst-reports/2025-genai-code-security-report/">Veracode 2025 GenAI Security Report</a></p>]]>
      </itunes:summary>
      <itunes:keywords> CybersecurityResearch, AISecurity, CodeVulnerabilities, SoftwareSecurity, HackerHistory, DeveloperTools, TechSecurity, AIRisks, CyberThreats, Veracode</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3lyfw6gkerv24"/>
    </item>
    <item>
      <title>The Invisible Majority: How Social Media Erases 90% of Voices | Dr. Claire Robertson</title>
      <itunes:episode>234</itunes:episode>
      <podcast:episode>234</podcast:episode>
      <itunes:title>The Invisible Majority: How Social Media Erases 90% of Voices | Dr. Claire Robertson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">43614c39-021a-473c-a203-58b1405e9006</guid>
      <link>https://share.transistor.fm/s/c7eb6698</link>
      <description>
        <![CDATA[<p><em><br>90% of Twitter users are represented by only 3% of tweets. When you scroll through your feed and form opinions about what "people are saying" about politics, you're not seeing the voices of nine out of ten users. You're seeing the loudest, most extreme 10% who create 97% of all political content on the platform.<br></em><br></p><p><em><br>In this episode of SecureTalk, host Justin Beals explores the "invisible majority problem" with Dr. Claire Robertson, Assistant Professor at Colby College. Together they examine how moderate voices have been algorithmically erased from our public discourse, creating pluralistic ignorance that threatens democracy itself.<br></em><br></p><p><em><br>Dr. Robertson's journey began at Kenyon College during the 2016 election—a blue island in a sea of red where Trump won the county by 40 points but the campus precinct went 90% blue. Surrounded by good people who saw the same election completely differently, she dedicated her career to understanding how we end up living in different realities.<br></em><br></p><p><em>Topics covered:</em></p><ul><li>The psychology behind false polarization</li><li>How extreme voices get mathematically amplified</li><li>Why conflict drives engagement in the attention economy</li><li>The abandonment of scientific rigor in AI deployment</li><li>Research methods for understanding our digital public square<p></p></li><li>Resources: Claire E. Robertson, Kareena S. del Rosario, Jay J. Van Bavel,<br>Inside the funhouse mirror factory: How social media distorts perceptions of norms,<br>Current Opinion in Psychology,<br>Volume 60,<br>2024,<br>101918,<br>ISSN 2352-250X,<br>https://doi.org/10.1016/j.copsyc.2024.101918.<br>(https://www.sciencedirect.com/science/article/pii/S2352250X24001313)</li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><em><br>90% of Twitter users are represented by only 3% of tweets. When you scroll through your feed and form opinions about what "people are saying" about politics, you're not seeing the voices of nine out of ten users. You're seeing the loudest, most extreme 10% who create 97% of all political content on the platform.<br></em><br></p><p><em><br>In this episode of SecureTalk, host Justin Beals explores the "invisible majority problem" with Dr. Claire Robertson, Assistant Professor at Colby College. Together they examine how moderate voices have been algorithmically erased from our public discourse, creating pluralistic ignorance that threatens democracy itself.<br></em><br></p><p><em><br>Dr. Robertson's journey began at Kenyon College during the 2016 election—a blue island in a sea of red where Trump won the county by 40 points but the campus precinct went 90% blue. Surrounded by good people who saw the same election completely differently, she dedicated her career to understanding how we end up living in different realities.<br></em><br></p><p><em>Topics covered:</em></p><ul><li>The psychology behind false polarization</li><li>How extreme voices get mathematically amplified</li><li>Why conflict drives engagement in the attention economy</li><li>The abandonment of scientific rigor in AI deployment</li><li>Research methods for understanding our digital public square<p></p></li><li>Resources: Claire E. Robertson, Kareena S. del Rosario, Jay J. Van Bavel,<br>Inside the funhouse mirror factory: How social media distorts perceptions of norms,<br>Current Opinion in Psychology,<br>Volume 60,<br>2024,<br>101918,<br>ISSN 2352-250X,<br>https://doi.org/10.1016/j.copsyc.2024.101918.<br>(https://www.sciencedirect.com/science/article/pii/S2352250X24001313)</li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Aug 2025 15:56:15 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c7eb6698/752ac4ef.mp3" length="105980220" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MeJDinQI7vWNFkISzgny8pgsORgomzspQySYiYz8j_Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NTc2/ZmY0ZTAyM2NlMDI4/NmNlMmQyZmJmNmIx/NWEwYy5wbmc.jpg"/>
      <itunes:duration>2648</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><em><br>90% of Twitter users are represented by only 3% of tweets. When you scroll through your feed and form opinions about what "people are saying" about politics, you're not seeing the voices of nine out of ten users. You're seeing the loudest, most extreme 10% who create 97% of all political content on the platform.<br></em><br></p><p><em><br>In this episode of SecureTalk, host Justin Beals explores the "invisible majority problem" with Dr. Claire Robertson, Assistant Professor at Colby College. Together they examine how moderate voices have been algorithmically erased from our public discourse, creating pluralistic ignorance that threatens democracy itself.<br></em><br></p><p><em><br>Dr. Robertson's journey began at Kenyon College during the 2016 election—a blue island in a sea of red where Trump won the county by 40 points but the campus precinct went 90% blue. Surrounded by good people who saw the same election completely differently, she dedicated her career to understanding how we end up living in different realities.<br></em><br></p><p><em>Topics covered:</em></p><ul><li>The psychology behind false polarization</li><li>How extreme voices get mathematically amplified</li><li>Why conflict drives engagement in the attention economy</li><li>The abandonment of scientific rigor in AI deployment</li><li>Research methods for understanding our digital public square<p></p></li><li>Resources: Claire E. Robertson, Kareena S. del Rosario, Jay J. Van Bavel,<br>Inside the funhouse mirror factory: How social media distorts perceptions of norms,<br>Current Opinion in Psychology,<br>Volume 60,<br>2024,<br>101918,<br>ISSN 2352-250X,<br>https://doi.org/10.1016/j.copsyc.2024.101918.<br>(https://www.sciencedirect.com/science/article/pii/S2352250X24001313)</li></ul><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, social media, datascience. technology, democracy, research</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c7eb6698/transcript.txt" type="text/plain"/>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3lxcuwbcbsy2q"/>
    </item>
    <item>
      <title>An Identity Crisis: How AI Agents Are Redefining Enterprise Security | with Rishi Bhargava</title>
      <itunes:episode>233</itunes:episode>
      <podcast:episode>233</podcast:episode>
      <itunes:title>An Identity Crisis: How AI Agents Are Redefining Enterprise Security | with Rishi Bhargava</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">02152b8e-9813-41c7-8c80-a8c0c044a1f7</guid>
      <link>https://share.transistor.fm/s/e7c6a44a</link>
      <description>
        <![CDATA[<p>The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents acting autonomously across enterprise systems.</p><p><br>Join Secure Talk host Justin Beals for a critical conversation with Rishi Bhargava, the security architect who built Demisto into a $560M category-defining platform and now leads Descope in solving the next impossible challenge. This episode delivers actionable insights for everyone—from Fortune 500 CISOs managing complex threat landscapes to business leaders evaluating AI adoption risks.</p><p><strong><br>For Security Professionals, you'll discover:</strong> • How AI agent proliferation creates an "identity explosion" that traditional IAM can't handle • Why probabilistic AI systems require fundamentally different access controls than deterministic human users • Advanced WebAuthn and FIDO2 implementation strategies for zero-trust architectures • SOC2 compliance frameworks adapted for AI-human hybrid workflows • Real-world SOAR evolution lessons from the Demisto acquisition</p><p><strong><br>For Business Leaders, you'll learn:</strong> <br>• Why passwordless authentication directly impacts customer acquisition and retention <br>• The hidden costs of password-related support tickets and user drop-offs <br>• How early AI identity management adoption creates competitive advantages <br>• Risk assessment frameworks for AI agent deployment in sensitive environments</p><p><strong><br>For Everyone:</strong> <br>• Why your current passwords are a ticking time bomb in an AI-first world <br>• How biometric authentication actually works (and why it's more secure than you think) <br>• Practical steps to future-proof your digital security today</p><p><br>Whether you're architecting enterprise security for thousands of employees or simply trying to understand why your login experience keeps getting more complex, this episode reveals the forces reshaping digital identity. The organizations that master AI agent authentication will lead their industries—those that don't risk catastrophic breaches and customer exodus.</p><p><br>#CISO #AIAuthentication #EnterpriseIdentity #ZeroTrust #PasswordlessSecurity #CyberSecurityStrategy #IAM #BiometricAuth #SecurityCompliance #AIAgents</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents acting autonomously across enterprise systems.</p><p><br>Join Secure Talk host Justin Beals for a critical conversation with Rishi Bhargava, the security architect who built Demisto into a $560M category-defining platform and now leads Descope in solving the next impossible challenge. This episode delivers actionable insights for everyone—from Fortune 500 CISOs managing complex threat landscapes to business leaders evaluating AI adoption risks.</p><p><strong><br>For Security Professionals, you'll discover:</strong> • How AI agent proliferation creates an "identity explosion" that traditional IAM can't handle • Why probabilistic AI systems require fundamentally different access controls than deterministic human users • Advanced WebAuthn and FIDO2 implementation strategies for zero-trust architectures • SOC2 compliance frameworks adapted for AI-human hybrid workflows • Real-world SOAR evolution lessons from the Demisto acquisition</p><p><strong><br>For Business Leaders, you'll learn:</strong> <br>• Why passwordless authentication directly impacts customer acquisition and retention <br>• The hidden costs of password-related support tickets and user drop-offs <br>• How early AI identity management adoption creates competitive advantages <br>• Risk assessment frameworks for AI agent deployment in sensitive environments</p><p><strong><br>For Everyone:</strong> <br>• Why your current passwords are a ticking time bomb in an AI-first world <br>• How biometric authentication actually works (and why it's more secure than you think) <br>• Practical steps to future-proof your digital security today</p><p><br>Whether you're architecting enterprise security for thousands of employees or simply trying to understand why your login experience keeps getting more complex, this episode reveals the forces reshaping digital identity. The organizations that master AI agent authentication will lead their industries—those that don't risk catastrophic breaches and customer exodus.</p><p><br>#CISO #AIAuthentication #EnterpriseIdentity #ZeroTrust #PasswordlessSecurity #CyberSecurityStrategy #IAM #BiometricAuth #SecurityCompliance #AIAgents</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Aug 2025 16:03:27 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/e7c6a44a/36e70981.mp3" length="98987543" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/zeBvwJQqbpoevv88Phgsvpe2TnYBpP763StieP49zEo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNTk2/Mjk2ZDk0YzNjNWU4/NTU3OTZkN2UyYWQ5/OTk0Yy5wbmc.jpg"/>
      <itunes:duration>2473</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The cybersecurity landscape just shifted permanently, and most organizations aren't ready. While CISOs struggle with alert fatigue from 40+ security tools, a new threat vector is emerging that makes traditional identity management obsolete: AI agents acting autonomously across enterprise systems.</p><p><br>Join Secure Talk host Justin Beals for a critical conversation with Rishi Bhargava, the security architect who built Demisto into a $560M category-defining platform and now leads Descope in solving the next impossible challenge. This episode delivers actionable insights for everyone—from Fortune 500 CISOs managing complex threat landscapes to business leaders evaluating AI adoption risks.</p><p><strong><br>For Security Professionals, you'll discover:</strong> • How AI agent proliferation creates an "identity explosion" that traditional IAM can't handle • Why probabilistic AI systems require fundamentally different access controls than deterministic human users • Advanced WebAuthn and FIDO2 implementation strategies for zero-trust architectures • SOC2 compliance frameworks adapted for AI-human hybrid workflows • Real-world SOAR evolution lessons from the Demisto acquisition</p><p><strong><br>For Business Leaders, you'll learn:</strong> <br>• Why passwordless authentication directly impacts customer acquisition and retention <br>• The hidden costs of password-related support tickets and user drop-offs <br>• How early AI identity management adoption creates competitive advantages <br>• Risk assessment frameworks for AI agent deployment in sensitive environments</p><p><strong><br>For Everyone:</strong> <br>• Why your current passwords are a ticking time bomb in an AI-first world <br>• How biometric authentication actually works (and why it's more secure than you think) <br>• Practical steps to future-proof your digital security today</p><p><br>Whether you're architecting enterprise security for thousands of employees or simply trying to understand why your login experience keeps getting more complex, this episode reveals the forces reshaping digital identity. The organizations that master AI agent authentication will lead their industries—those that don't risk catastrophic breaches and customer exodus.</p><p><br>#CISO #AIAuthentication #EnterpriseIdentity #ZeroTrust #PasswordlessSecurity #CyberSecurityStrategy #IAM #BiometricAuth #SecurityCompliance #AIAgents</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>CISO, AI, AI authentication, Cybersecurity </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:gbl4tfniqnie7mjeyzpfce6i/app.bsky.feed.post/3lw7oskorf22s"/>
    </item>
    <item>
      <title>The Insider Threat: How a US Soldier Planned for Years to Kill His Own Unit</title>
      <itunes:episode>232</itunes:episode>
      <podcast:episode>232</podcast:episode>
      <itunes:title>The Insider Threat: How a US Soldier Planned for Years to Kill His Own Unit</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">868171a2-7cdd-4cc3-ac68-2f273f54b74f</guid>
      <link>https://share.transistor.fm/s/0ad963ec</link>
      <description>
        <![CDATA[<p>The most dangerous threats don't break down the door - they already have the keys.</p><p><br></p><p>March 23, 2003, Kuwait: Command Sergeant Major Bart Womack was loading ammunition and watching Tiger Woods play golf at 1 AM when a grenade rolled into his tent. What followed was every leader's worst nightmare - discovering that one of your own had been planning to destroy you all along.</p><p><br></p><p>This isn't just a military story. It's a threat to security we face everywhere.</p><p><br></p><p>In today's world of workplace shootings, corporate espionage, and school violence, the statistics are terrifying:</p><p>• Insider threats cause 60% of all security breaches</p><p>• From Sandy Hook to Fort Hood - trusted insiders inflict maximum damage</p><p>• Corporate employees steal billions in trade secrets annually</p><p>• The average insider threat goes undetected for 85 days</p><p><br></p><p>What makes this episode essential viewing:</p><p><br></p><p>Real Combat Experience: CSM Womack survived two Bronze Star combat situations, including a firefight with North Korean forces in the DMZ</p><p><br></p><p>The Diary Revelations: The attacker's own writings revealed: "Destroying America was my plan as a child" - written YEARS before joining the Army</p><p><br></p><p>Life-Saving Strategies: The 6 proactive methods that could prevent workplace violence, school shootings, and corporate sabotage</p><p><br></p><p>Universal Application: These hard-learned lessons apply to offices, schools, places of worship, and anywhere people gather</p><p><br></p><p>The Shocking Truth: While 5,000 soldiers searched for "insurgents," the real enemy was wearing the same uniform, had taken the same oath, and was sleeping in the tent next door.</p><p><br></p><p>Why This Matters to YOU:</p><p>Whether you're a parent worried about school safety, a manager responsible for employee welfare, or simply someone who wants to protect your community - the warning signs are the same. Political polarization, social media radicalization, and workplace tensions create the perfect storm for insider threats.</p><p><br></p><p>What You'll Learn:</p><p>✅ The "Trust No One" philosophy (and what it really means)</p><p>✅ How to implement "Observe, Listen, Report" in your environment  </p><p>✅ Why your gut instinct is your strongest security tool</p><p>✅ The evolution from belief → radicalized → extreme</p><p>✅ Real warning signs that leaders consistently miss</p><p><br></p><p>CSM Bart Womack transformed his traumatic experience into a mission: preventing others from experiencing what he and his soldiers endured. His insights have protected countless workplaces, schools, and communities.</p><p><br></p><p>The Bottom Line: In an era where conspiracy theories fuel real violence, where workplace tensions explode into tragedy, and where trusted insiders become active threats - these lessons could save your life.</p><p><br></p><p>🎖️ 29-year Army veteran, 101st Airborne Division</p><p>📖 Author of "Embedded Enemy" </p><p>🎤 Professional security consultant and keynote speaker</p><p>🔒 Insider threat prevention expert</p><p><br></p><p>This episode contains discussions of violence and may not be suitable for all audiences.</p><p><br></p><p>#InsiderThreat #WorkplaceSafety #SchoolSecurity #Cybersecurity #MilitaryStory #SecurityAwareness #ThreatPrevention #CorporateSecurity #NationalSecurity #CrisisManagement #SecurityLeadership #RiskManagement #EmergencyPreparedness #SafetyTraining #SecurityEducation</p><p><br></p><p>Subscribe for more real-world security insights that could save lives. Your safety depends on what you don't see coming.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The most dangerous threats don't break down the door - they already have the keys.</p><p><br></p><p>March 23, 2003, Kuwait: Command Sergeant Major Bart Womack was loading ammunition and watching Tiger Woods play golf at 1 AM when a grenade rolled into his tent. What followed was every leader's worst nightmare - discovering that one of your own had been planning to destroy you all along.</p><p><br></p><p>This isn't just a military story. It's a threat to security we face everywhere.</p><p><br></p><p>In today's world of workplace shootings, corporate espionage, and school violence, the statistics are terrifying:</p><p>• Insider threats cause 60% of all security breaches</p><p>• From Sandy Hook to Fort Hood - trusted insiders inflict maximum damage</p><p>• Corporate employees steal billions in trade secrets annually</p><p>• The average insider threat goes undetected for 85 days</p><p><br></p><p>What makes this episode essential viewing:</p><p><br></p><p>Real Combat Experience: CSM Womack survived two Bronze Star combat situations, including a firefight with North Korean forces in the DMZ</p><p><br></p><p>The Diary Revelations: The attacker's own writings revealed: "Destroying America was my plan as a child" - written YEARS before joining the Army</p><p><br></p><p>Life-Saving Strategies: The 6 proactive methods that could prevent workplace violence, school shootings, and corporate sabotage</p><p><br></p><p>Universal Application: These hard-learned lessons apply to offices, schools, places of worship, and anywhere people gather</p><p><br></p><p>The Shocking Truth: While 5,000 soldiers searched for "insurgents," the real enemy was wearing the same uniform, had taken the same oath, and was sleeping in the tent next door.</p><p><br></p><p>Why This Matters to YOU:</p><p>Whether you're a parent worried about school safety, a manager responsible for employee welfare, or simply someone who wants to protect your community - the warning signs are the same. Political polarization, social media radicalization, and workplace tensions create the perfect storm for insider threats.</p><p><br></p><p>What You'll Learn:</p><p>✅ The "Trust No One" philosophy (and what it really means)</p><p>✅ How to implement "Observe, Listen, Report" in your environment  </p><p>✅ Why your gut instinct is your strongest security tool</p><p>✅ The evolution from belief → radicalized → extreme</p><p>✅ Real warning signs that leaders consistently miss</p><p><br></p><p>CSM Bart Womack transformed his traumatic experience into a mission: preventing others from experiencing what he and his soldiers endured. His insights have protected countless workplaces, schools, and communities.</p><p><br></p><p>The Bottom Line: In an era where conspiracy theories fuel real violence, where workplace tensions explode into tragedy, and where trusted insiders become active threats - these lessons could save your life.</p><p><br></p><p>🎖️ 29-year Army veteran, 101st Airborne Division</p><p>📖 Author of "Embedded Enemy" </p><p>🎤 Professional security consultant and keynote speaker</p><p>🔒 Insider threat prevention expert</p><p><br></p><p>This episode contains discussions of violence and may not be suitable for all audiences.</p><p><br></p><p>#InsiderThreat #WorkplaceSafety #SchoolSecurity #Cybersecurity #MilitaryStory #SecurityAwareness #ThreatPrevention #CorporateSecurity #NationalSecurity #CrisisManagement #SecurityLeadership #RiskManagement #EmergencyPreparedness #SafetyTraining #SecurityEducation</p><p><br></p><p>Subscribe for more real-world security insights that could save lives. Your safety depends on what you don't see coming.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Jul 2025 15:29:26 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0ad963ec/78d1702b.mp3" length="132223569" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/G22k4sgiuAEQkgSeK2K0RvXQgonta8f5wt6xYtljfdM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zODc3/Yjc4NjEyZjE3Yjkw/ZTRjOWZmZTJjNmM2/YTgxNC5wbmc.jpg"/>
      <itunes:duration>3305</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The most dangerous threats don't break down the door - they already have the keys.</p><p><br></p><p>March 23, 2003, Kuwait: Command Sergeant Major Bart Womack was loading ammunition and watching Tiger Woods play golf at 1 AM when a grenade rolled into his tent. What followed was every leader's worst nightmare - discovering that one of your own had been planning to destroy you all along.</p><p><br></p><p>This isn't just a military story. It's a threat to security we face everywhere.</p><p><br></p><p>In today's world of workplace shootings, corporate espionage, and school violence, the statistics are terrifying:</p><p>• Insider threats cause 60% of all security breaches</p><p>• From Sandy Hook to Fort Hood - trusted insiders inflict maximum damage</p><p>• Corporate employees steal billions in trade secrets annually</p><p>• The average insider threat goes undetected for 85 days</p><p><br></p><p>What makes this episode essential viewing:</p><p><br></p><p>Real Combat Experience: CSM Womack survived two Bronze Star combat situations, including a firefight with North Korean forces in the DMZ</p><p><br></p><p>The Diary Revelations: The attacker's own writings revealed: "Destroying America was my plan as a child" - written YEARS before joining the Army</p><p><br></p><p>Life-Saving Strategies: The 6 proactive methods that could prevent workplace violence, school shootings, and corporate sabotage</p><p><br></p><p>Universal Application: These hard-learned lessons apply to offices, schools, places of worship, and anywhere people gather</p><p><br></p><p>The Shocking Truth: While 5,000 soldiers searched for "insurgents," the real enemy was wearing the same uniform, had taken the same oath, and was sleeping in the tent next door.</p><p><br></p><p>Why This Matters to YOU:</p><p>Whether you're a parent worried about school safety, a manager responsible for employee welfare, or simply someone who wants to protect your community - the warning signs are the same. Political polarization, social media radicalization, and workplace tensions create the perfect storm for insider threats.</p><p><br></p><p>What You'll Learn:</p><p>✅ The "Trust No One" philosophy (and what it really means)</p><p>✅ How to implement "Observe, Listen, Report" in your environment  </p><p>✅ Why your gut instinct is your strongest security tool</p><p>✅ The evolution from belief → radicalized → extreme</p><p>✅ Real warning signs that leaders consistently miss</p><p><br></p><p>CSM Bart Womack transformed his traumatic experience into a mission: preventing others from experiencing what he and his soldiers endured. His insights have protected countless workplaces, schools, and communities.</p><p><br></p><p>The Bottom Line: In an era where conspiracy theories fuel real violence, where workplace tensions explode into tragedy, and where trusted insiders become active threats - these lessons could save your life.</p><p><br></p><p>🎖️ 29-year Army veteran, 101st Airborne Division</p><p>📖 Author of "Embedded Enemy" </p><p>🎤 Professional security consultant and keynote speaker</p><p>🔒 Insider threat prevention expert</p><p><br></p><p>This episode contains discussions of violence and may not be suitable for all audiences.</p><p><br></p><p>#InsiderThreat #WorkplaceSafety #SchoolSecurity #Cybersecurity #MilitaryStory #SecurityAwareness #ThreatPrevention #CorporateSecurity #NationalSecurity #CrisisManagement #SecurityLeadership #RiskManagement #EmergencyPreparedness #SafetyTraining #SecurityEducation</p><p><br></p><p>Subscribe for more real-world security insights that could save lives. Your safety depends on what you don't see coming.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, InsiderThreat, Military, MilitaryHistory</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven</title>
      <itunes:episode>231</itunes:episode>
      <podcast:episode>231</podcast:episode>
      <itunes:title>Machines Running Amok: We've Created More Than We Can Secure with Oded Hareven</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7635f186-86fc-4cb4-beb9-7ea6e3b8c0ed</guid>
      <link>https://share.transistor.fm/s/83b97a89</link>
      <description>
        <![CDATA[<p><strong><br>Machines Running Amok: We've Created More Than We Can Secure</strong></p><p><br>Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and automated processes that spawn and disappear by the minute. We've created more computing power than we have the ability to secure, and the machines are running amok.</p><p><br>In this episode of SecureTalk, we dive deep into the invisible crisis affecting 91% of organizations: machine identity breaches. Join host Justin Beals and cybersecurity expert Oded Hareven, CEO of Akeyless, as they explore why password rotation is dead, how ephemeral computing is breaking traditional security models, and what revolutionary approaches like distributed fragment cryptography mean for the future of cybersecurity.</p><p><strong>What You'll Learn:</strong> • Why 85% of identity breaches now come from compromised machines, not humans • The fundamental mismatch between static security and dynamic infrastructure • How military-grade cybersecurity innovations are transforming commercial applications • Why the AI-quantum computing convergence is forcing us to rethink encryption • Practical steps toward "SSO for machines" and ephemeral security models</p><p><strong><br>Key Topics:</strong></p><ul><li>Machine identity management at scale</li><li>Zero-knowledge cryptography</li><li>Quantum-resistant security architectures</li><li>The evolution from static → rotation → ephemeral security</li><li>Building security that matches cloud-native infrastructure<p></p></li></ul><p><strong>Guest:</strong> Oded Hareven, Co-founder &amp; CEO of Akeyless.</p><p><strong>Timestamps:</strong> </p><p>00:00 Introduction to Cybersecurity and Machine Identities</p><p>04:37 The Evolution of Security Paradigms</p><p>09:30 Akeyless and Machine Identity Management</p><p>13:53 Zero Trust and Ephemeral Security</p><p>18:36 The Impact of AI and Quantum Computing on Security</p><p>23:19 Future Trends in Cybersecurity and Akeyless's Vision</p><p><strong>Resources:<br></strong><br></p><ul><li>Akeyless: https://akeyless.io</li><li>SecureTalk Podcast: www.securetalkpodcast.com<p></p></li></ul><p>#Cybersecurity #CloudSecurity #MachineLearning #QuantumComputing #DevSecOps #IdentityManagement #ZeroTrust</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong><br>Machines Running Amok: We've Created More Than We Can Secure</strong></p><p><br>Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and automated processes that spawn and disappear by the minute. We've created more computing power than we have the ability to secure, and the machines are running amok.</p><p><br>In this episode of SecureTalk, we dive deep into the invisible crisis affecting 91% of organizations: machine identity breaches. Join host Justin Beals and cybersecurity expert Oded Hareven, CEO of Akeyless, as they explore why password rotation is dead, how ephemeral computing is breaking traditional security models, and what revolutionary approaches like distributed fragment cryptography mean for the future of cybersecurity.</p><p><strong>What You'll Learn:</strong> • Why 85% of identity breaches now come from compromised machines, not humans • The fundamental mismatch between static security and dynamic infrastructure • How military-grade cybersecurity innovations are transforming commercial applications • Why the AI-quantum computing convergence is forcing us to rethink encryption • Practical steps toward "SSO for machines" and ephemeral security models</p><p><strong><br>Key Topics:</strong></p><ul><li>Machine identity management at scale</li><li>Zero-knowledge cryptography</li><li>Quantum-resistant security architectures</li><li>The evolution from static → rotation → ephemeral security</li><li>Building security that matches cloud-native infrastructure<p></p></li></ul><p><strong>Guest:</strong> Oded Hareven, Co-founder &amp; CEO of Akeyless.</p><p><strong>Timestamps:</strong> </p><p>00:00 Introduction to Cybersecurity and Machine Identities</p><p>04:37 The Evolution of Security Paradigms</p><p>09:30 Akeyless and Machine Identity Management</p><p>13:53 Zero Trust and Ephemeral Security</p><p>18:36 The Impact of AI and Quantum Computing on Security</p><p>23:19 Future Trends in Cybersecurity and Akeyless's Vision</p><p><strong>Resources:<br></strong><br></p><ul><li>Akeyless: https://akeyless.io</li><li>SecureTalk Podcast: www.securetalkpodcast.com<p></p></li></ul><p>#Cybersecurity #CloudSecurity #MachineLearning #QuantumComputing #DevSecOps #IdentityManagement #ZeroTrust</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Jul 2025 14:33:18 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/83b97a89/ed90d6b9.mp3" length="108518823" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tXx0K7ybEK3UxGmTnix0rwyNanyJzTbKI9M4m2lhLtA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNGI2/ZWMxNjg2MTY5MzRm/OGYzM2U2YjFjZmEw/ZWQ1Mi5wbmc.jpg"/>
      <itunes:duration>2712</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong><br>Machines Running Amok: We've Created More Than We Can Secure</strong></p><p><br>Twenty years ago, you could count the servers in your data center. Today, we've unleashed an army of digital entities that's spiraling beyond our control. For every human employee, there are 50-100 machine identities operating in your environment—containers, serverless functions, and automated processes that spawn and disappear by the minute. We've created more computing power than we have the ability to secure, and the machines are running amok.</p><p><br>In this episode of SecureTalk, we dive deep into the invisible crisis affecting 91% of organizations: machine identity breaches. Join host Justin Beals and cybersecurity expert Oded Hareven, CEO of Akeyless, as they explore why password rotation is dead, how ephemeral computing is breaking traditional security models, and what revolutionary approaches like distributed fragment cryptography mean for the future of cybersecurity.</p><p><strong>What You'll Learn:</strong> • Why 85% of identity breaches now come from compromised machines, not humans • The fundamental mismatch between static security and dynamic infrastructure • How military-grade cybersecurity innovations are transforming commercial applications • Why the AI-quantum computing convergence is forcing us to rethink encryption • Practical steps toward "SSO for machines" and ephemeral security models</p><p><strong><br>Key Topics:</strong></p><ul><li>Machine identity management at scale</li><li>Zero-knowledge cryptography</li><li>Quantum-resistant security architectures</li><li>The evolution from static → rotation → ephemeral security</li><li>Building security that matches cloud-native infrastructure<p></p></li></ul><p><strong>Guest:</strong> Oded Hareven, Co-founder &amp; CEO of Akeyless.</p><p><strong>Timestamps:</strong> </p><p>00:00 Introduction to Cybersecurity and Machine Identities</p><p>04:37 The Evolution of Security Paradigms</p><p>09:30 Akeyless and Machine Identity Management</p><p>13:53 Zero Trust and Ephemeral Security</p><p>18:36 The Impact of AI and Quantum Computing on Security</p><p>23:19 Future Trends in Cybersecurity and Akeyless's Vision</p><p><strong>Resources:<br></strong><br></p><ul><li>Akeyless: https://akeyless.io</li><li>SecureTalk Podcast: www.securetalkpodcast.com<p></p></li></ul><p>#Cybersecurity #CloudSecurity #MachineLearning #QuantumComputing #DevSecOps #IdentityManagement #ZeroTrust</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Zero Trust, Security </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/83b97a89/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein</title>
      <itunes:episode>230</itunes:episode>
      <podcast:episode>230</podcast:episode>
      <itunes:title>Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76d89dcc-3424-489e-9022-d9500b52d798</guid>
      <link>https://share.transistor.fm/s/990b8df9</link>
      <description>
        <![CDATA[<p><strong><br>Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein<br></strong><br></p><p><br>Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collaborative ecosystems, we all pay the price. But there's a profound irony: the more desperately these leaders chase absolute victory, the more they reveal themselves as losers of the most important game—building meaningful human communities.</p><p><br>In this episode, Harvard and MIT Humanist Chaplain Greg Epstein explores how tech's false prophets have led us astray and, more importantly, how we might find our way back to building human-centered security that actually works. The strongest security has never come from building higher walls—it comes from creating ecosystems where everyone's success strengthens the whole. When we understand how to work together better, we all create better security.</p><p><strong><br>What You'll Learn:</strong> <br>• How winner-take-all thinking creates systemic vulnerabilities <br>• Why collaborative open-source principles build more resilient systems <br>• The hidden security costs of commercial dominance <br>• Practical strategies for building multi-stakeholder security <br>• How to shift from competition to collaboration in your organization</p><p><strong><br>Watch this episode to discover how changing your approach to teamwork and partnerships can dramatically improve your security posture.<br></strong><br></p><p><strong><br>About Greg M. Epstein:</strong> Greg serves as Humanist Chaplain at Harvard University and MIT, and spent 18 months at TechCrunch exploring the ethics of companies shifting our definition of humanity. He's the author of "Tech Agnostic: How Technology Became the World's Most Powerful Religion, and Why it Desperately Needs a Reformation."</p><p><strong><br>Timestamps:</strong> <br>Chapters</p><p>00:00 The Corruption of Winning Culture<br>02:39 The Role of Community in Security<br>05:44 Navigating the Media Landscape<br>08:20 The Algorithmic Influence on Information<br>11:01 The Cult of Personality in Tech<br>13:44 The Messianic Figures in Technology<br>16:24 The Fall of Tech Prophets<br>19:15 The Importance of Losing<br>21:44 The Future of Technology and Humanity<br>24:29 The Need for Ethical Technology<br>26:56 The Role of Men in Modern Society<br>29:39 The Impact of AI on Society<br>32:15 The Cult-like Nature of Tech Culture<br>34:54 The Importance of Human Connection<br>37:43 The Future of Humanism in Tech<br>40:11 The Path Forward for Technology and Humanity</p><p><br>#TechEthics #CommunityBuilding #DigitalSecurity #TechCulture #HumanistChaplain #SiliconValley #TechReformation</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong><br>Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein<br></strong><br></p><p><br>Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collaborative ecosystems, we all pay the price. But there's a profound irony: the more desperately these leaders chase absolute victory, the more they reveal themselves as losers of the most important game—building meaningful human communities.</p><p><br>In this episode, Harvard and MIT Humanist Chaplain Greg Epstein explores how tech's false prophets have led us astray and, more importantly, how we might find our way back to building human-centered security that actually works. The strongest security has never come from building higher walls—it comes from creating ecosystems where everyone's success strengthens the whole. When we understand how to work together better, we all create better security.</p><p><strong><br>What You'll Learn:</strong> <br>• How winner-take-all thinking creates systemic vulnerabilities <br>• Why collaborative open-source principles build more resilient systems <br>• The hidden security costs of commercial dominance <br>• Practical strategies for building multi-stakeholder security <br>• How to shift from competition to collaboration in your organization</p><p><strong><br>Watch this episode to discover how changing your approach to teamwork and partnerships can dramatically improve your security posture.<br></strong><br></p><p><strong><br>About Greg M. Epstein:</strong> Greg serves as Humanist Chaplain at Harvard University and MIT, and spent 18 months at TechCrunch exploring the ethics of companies shifting our definition of humanity. He's the author of "Tech Agnostic: How Technology Became the World's Most Powerful Religion, and Why it Desperately Needs a Reformation."</p><p><strong><br>Timestamps:</strong> <br>Chapters</p><p>00:00 The Corruption of Winning Culture<br>02:39 The Role of Community in Security<br>05:44 Navigating the Media Landscape<br>08:20 The Algorithmic Influence on Information<br>11:01 The Cult of Personality in Tech<br>13:44 The Messianic Figures in Technology<br>16:24 The Fall of Tech Prophets<br>19:15 The Importance of Losing<br>21:44 The Future of Technology and Humanity<br>24:29 The Need for Ethical Technology<br>26:56 The Role of Men in Modern Society<br>29:39 The Impact of AI on Society<br>32:15 The Cult-like Nature of Tech Culture<br>34:54 The Importance of Human Connection<br>37:43 The Future of Humanism in Tech<br>40:11 The Path Forward for Technology and Humanity</p><p><br>#TechEthics #CommunityBuilding #DigitalSecurity #TechCulture #HumanistChaplain #SiliconValley #TechReformation</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Jul 2025 14:00:00 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/990b8df9/cffa6444.mp3" length="144063930" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NMKW2MGJ8MVa_abOYeWJ6bCIEwTBtkyKmoo1_2jQ1EE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80M2Ux/OTAzNWE2MjlkYTFk/ZDYxOTAzZWM2NGFi/NjIyZi5wbmc.jpg"/>
      <itunes:duration>3600</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong><br>Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein<br></strong><br></p><p><br>Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collaborative ecosystems, we all pay the price. But there's a profound irony: the more desperately these leaders chase absolute victory, the more they reveal themselves as losers of the most important game—building meaningful human communities.</p><p><br>In this episode, Harvard and MIT Humanist Chaplain Greg Epstein explores how tech's false prophets have led us astray and, more importantly, how we might find our way back to building human-centered security that actually works. The strongest security has never come from building higher walls—it comes from creating ecosystems where everyone's success strengthens the whole. When we understand how to work together better, we all create better security.</p><p><strong><br>What You'll Learn:</strong> <br>• How winner-take-all thinking creates systemic vulnerabilities <br>• Why collaborative open-source principles build more resilient systems <br>• The hidden security costs of commercial dominance <br>• Practical strategies for building multi-stakeholder security <br>• How to shift from competition to collaboration in your organization</p><p><strong><br>Watch this episode to discover how changing your approach to teamwork and partnerships can dramatically improve your security posture.<br></strong><br></p><p><strong><br>About Greg M. Epstein:</strong> Greg serves as Humanist Chaplain at Harvard University and MIT, and spent 18 months at TechCrunch exploring the ethics of companies shifting our definition of humanity. He's the author of "Tech Agnostic: How Technology Became the World's Most Powerful Religion, and Why it Desperately Needs a Reformation."</p><p><strong><br>Timestamps:</strong> <br>Chapters</p><p>00:00 The Corruption of Winning Culture<br>02:39 The Role of Community in Security<br>05:44 Navigating the Media Landscape<br>08:20 The Algorithmic Influence on Information<br>11:01 The Cult of Personality in Tech<br>13:44 The Messianic Figures in Technology<br>16:24 The Fall of Tech Prophets<br>19:15 The Importance of Losing<br>21:44 The Future of Technology and Humanity<br>24:29 The Need for Ethical Technology<br>26:56 The Role of Men in Modern Society<br>29:39 The Impact of AI on Society<br>32:15 The Cult-like Nature of Tech Culture<br>34:54 The Importance of Human Connection<br>37:43 The Future of Humanism in Tech<br>40:11 The Path Forward for Technology and Humanity</p><p><br>#TechEthics #CommunityBuilding #DigitalSecurity #TechCulture #HumanistChaplain #SiliconValley #TechReformation</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>TechEthics, CommunityBuilding, DigitalSecurity,TechCulture, HumanistChaplain, SiliconValley, TechReformation</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:chapters url="https://share.transistor.fm/s/990b8df9/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Securing AI at Enterprise Scale: Lessons from Walmart's Transformation with Tobias Yergin</title>
      <itunes:episode>229</itunes:episode>
      <podcast:episode>229</podcast:episode>
      <itunes:title>Securing AI at Enterprise Scale: Lessons from Walmart's Transformation with Tobias Yergin</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8fc4a237-6861-4272-ae34-dcc596229cb5</guid>
      <link>https://share.transistor.fm/s/aff8686f</link>
      <description>
        <![CDATA[<p><br>When one of the world's largest enterprises deploys AI across 10,000+ developers, the security challenges are unlike anything most organizations have faced. In this episode of SecureTalk, we explore the critical security and strategic considerations for deploying AI tools at enterprise scale with Tobias Yergin, who led AI transformation initiatives at Walmart.</p><p><strong><br>Key Topics Covered:<br></strong><br></p><ul><li>Why traditional security rules fail with probabilistic AI systems</li><li>The exponential risk of scaling AI agents from dozens to thousands</li><li>Building secure data foundations for enterprise AI deployment</li><li>Protecting AI agents that operate beyond your firewall</li><li>Strategic approaches to AI implementation that balance innovation with risk</li><li>The ontological framework for mapping AI capabilities to business tasks</li><li>First principles thinking for AI security architecture<p></p></li></ul><p><br>Tobias brings over two decades of experience in digital transformation, having held senior leadership roles at Intel, VMware, Panasonic, and Citrix Systems. His practical insights from implementing AI at Walmart's massive scale offer invaluable guidance for CISOs and security professionals navigating the complexities of enterprise AI adoption.</p><p><strong><br>Perfect for:</strong> CISOs, Security Architects, IT Leaders, Enterprise Risk Managers, and anyone responsible for securing AI implementations in large organizations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>When one of the world's largest enterprises deploys AI across 10,000+ developers, the security challenges are unlike anything most organizations have faced. In this episode of SecureTalk, we explore the critical security and strategic considerations for deploying AI tools at enterprise scale with Tobias Yergin, who led AI transformation initiatives at Walmart.</p><p><strong><br>Key Topics Covered:<br></strong><br></p><ul><li>Why traditional security rules fail with probabilistic AI systems</li><li>The exponential risk of scaling AI agents from dozens to thousands</li><li>Building secure data foundations for enterprise AI deployment</li><li>Protecting AI agents that operate beyond your firewall</li><li>Strategic approaches to AI implementation that balance innovation with risk</li><li>The ontological framework for mapping AI capabilities to business tasks</li><li>First principles thinking for AI security architecture<p></p></li></ul><p><br>Tobias brings over two decades of experience in digital transformation, having held senior leadership roles at Intel, VMware, Panasonic, and Citrix Systems. His practical insights from implementing AI at Walmart's massive scale offer invaluable guidance for CISOs and security professionals navigating the complexities of enterprise AI adoption.</p><p><strong><br>Perfect for:</strong> CISOs, Security Architects, IT Leaders, Enterprise Risk Managers, and anyone responsible for securing AI implementations in large organizations.</p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Jul 2025 14:32:21 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/aff8686f/6b7ab46c.mp3" length="106518927" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1qlLY3V_UOPaKbszom9DNib3OKTQLOVREPw9o5MV8-8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mOGY5/Y2UxOTc1YjZkZTE4/ZDA2MDNiZjRlZGFj/M2RjNi5wbmc.jpg"/>
      <itunes:duration>2662</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>When one of the world's largest enterprises deploys AI across 10,000+ developers, the security challenges are unlike anything most organizations have faced. In this episode of SecureTalk, we explore the critical security and strategic considerations for deploying AI tools at enterprise scale with Tobias Yergin, who led AI transformation initiatives at Walmart.</p><p><strong><br>Key Topics Covered:<br></strong><br></p><ul><li>Why traditional security rules fail with probabilistic AI systems</li><li>The exponential risk of scaling AI agents from dozens to thousands</li><li>Building secure data foundations for enterprise AI deployment</li><li>Protecting AI agents that operate beyond your firewall</li><li>Strategic approaches to AI implementation that balance innovation with risk</li><li>The ontological framework for mapping AI capabilities to business tasks</li><li>First principles thinking for AI security architecture<p></p></li></ul><p><br>Tobias brings over two decades of experience in digital transformation, having held senior leadership roles at Intel, VMware, Panasonic, and Citrix Systems. His practical insights from implementing AI at Walmart's massive scale offer invaluable guidance for CISOs and security professionals navigating the complexities of enterprise AI adoption.</p><p><strong><br>Perfect for:</strong> CISOs, Security Architects, IT Leaders, Enterprise Risk Managers, and anyone responsible for securing AI implementations in large organizations.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, ai, infosec </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/aff8686f/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/aff8686f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)</title>
      <itunes:episode>228</itunes:episode>
      <podcast:episode>228</podcast:episode>
      <itunes:title>Special Episode: The Secure Talk Security Awareness Training 2025 (With HIPAA!)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">30f57ff0-dd8b-4d33-b2bd-c85e187c5e2a</guid>
      <link>https://share.transistor.fm/s/482b3f17</link>
      <description>
        <![CDATA[<p><strong><br>SecureTalk 2025 Security Awareness Training | Complete Compliance Guide<br></strong><br></p><p>Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture.</p><p><strong><br>🎯 What You'll Learn:<br></strong><br></p><p><strong>Social Engineering &amp; AI-Enhanced Threats<br></strong><br></p><ul><li>Advanced phishing detection in the AI era</li><li>Voice and video deepfake attack recognition</li><li>Financial verification protocols to prevent fraud</li><li>Healthcare data protection against social engineering<p></p></li></ul><p><strong><br>Cloud Security &amp; Infrastructure<br></strong><br></p><ul><li><br>Common cloud misconfigurations and prevention</li><li>Secure AI model development and deployment</li><li>Financial data protection in cloud environments</li><li>Package dependency management and vulnerability scanning<p></p></li></ul><p><strong>Supply Chain &amp; Third-Party Risk<br></strong><br></p><ul><li>Vendor security assessment frameworks</li><li>Zero Trust architecture implementation</li><li>HIPAA compliance for business associates</li><li>AI vendor risk evaluation checklists<p></p></li></ul><p><strong><br>Insider Threats &amp; Hybrid Work Security<br></strong><br></p><ul><li>Behavioral analytics for threat detection</li><li>Environment-adaptive security controls</li><li>Data loss prevention in remote work settings</li><li>Segregation of duties in digital workflows<p></p></li></ul><p><strong>Regulatory Compliance &amp; Automation<br></strong><br></p><ul><li>2025-2026 regulatory calendar overview</li><li>Control-centric compliance approach</li><li>Continuous monitoring and automation strategies</li><li>Multi-framework compliance alignment<p></p></li></ul><p><strong>Building Security Culture</strong></p><ul><li>Security mindset vs. rule-following approach</li><li>Positive reinforcement security programs</li><li>Organizational security maturity models</li><li>Leadership's role in security culture<p></p></li></ul><p><strong>💼 Compliance Frameworks This Training Addresses:<br></strong><br></p><ul><li>SOC 2 Type I &amp; II</li><li>ISO 27001</li><li>HIPAA &amp; Healthcare Security</li><li>PCI DSS</li><li>CMMC (Cybersecurity Maturity Model Certification)</li><li>GDPR &amp; EU AI Act</li><li>AI Accountability Act</li><li>NIST Cybersecurity Framework</li><li>State privacy laws (CCPA, CPRA, etc.)<p></p></li></ul><p><strong>🏆 Perfect For:<br></strong><br></p><ul><li>Annual security awareness training requirements</li><li>Compliance audit preparation</li><li>New employee onboarding</li><li>Security culture development</li><li>Multi-framework compliance programs<p></p></li></ul><p><strong>🎓 Certification Available:</strong> Complete the training and receive a certification of completion for your compliance documentation. <br>    <a href="https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA">https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA</a></p><p><strong>📺 About SecureTalk:</strong> SecureTalk explores critical information security innovation and compliance topics. Hosted by Justin Beals, founder and CEO of StrikeGraph, featuring expert insights from cybersecurity professionals across finance, healthcare, engineering, and compliance.</p><p><strong><br>🔔 Subscribe for more security insights and compliance guidance!<br></strong><br></p><p><strong><br>Chapters:</strong> <br>0:00 Introduction &amp; Training Overview <br>3:18 Social Engineering with Steven Ferrell (IT Compliance Expert) <br>15:00 Advanced Threats with Kenneth Webb (CISA, CISSP) <br>30:30 Cloud Security with Josh (Head of Engineering) <br>44:55 Insider Threats with Elmy Peralta (Assessments Manager) <br>49:09 Regulatory Compliance with Micah Spieler (Chief Product Officer) <br>1: 01:42 Security Culture with Juliett Eck (CFO)</p><p>#CybersecurityTraining #SecurityAwareness #ComplianceTraining #SOC2 #HIPAA #ISO27001 #SecurityCulture #StrikeGraph #SecureTalk</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong><br>SecureTalk 2025 Security Awareness Training | Complete Compliance Guide<br></strong><br></p><p>Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture.</p><p><strong><br>🎯 What You'll Learn:<br></strong><br></p><p><strong>Social Engineering &amp; AI-Enhanced Threats<br></strong><br></p><ul><li>Advanced phishing detection in the AI era</li><li>Voice and video deepfake attack recognition</li><li>Financial verification protocols to prevent fraud</li><li>Healthcare data protection against social engineering<p></p></li></ul><p><strong><br>Cloud Security &amp; Infrastructure<br></strong><br></p><ul><li><br>Common cloud misconfigurations and prevention</li><li>Secure AI model development and deployment</li><li>Financial data protection in cloud environments</li><li>Package dependency management and vulnerability scanning<p></p></li></ul><p><strong>Supply Chain &amp; Third-Party Risk<br></strong><br></p><ul><li>Vendor security assessment frameworks</li><li>Zero Trust architecture implementation</li><li>HIPAA compliance for business associates</li><li>AI vendor risk evaluation checklists<p></p></li></ul><p><strong><br>Insider Threats &amp; Hybrid Work Security<br></strong><br></p><ul><li>Behavioral analytics for threat detection</li><li>Environment-adaptive security controls</li><li>Data loss prevention in remote work settings</li><li>Segregation of duties in digital workflows<p></p></li></ul><p><strong>Regulatory Compliance &amp; Automation<br></strong><br></p><ul><li>2025-2026 regulatory calendar overview</li><li>Control-centric compliance approach</li><li>Continuous monitoring and automation strategies</li><li>Multi-framework compliance alignment<p></p></li></ul><p><strong>Building Security Culture</strong></p><ul><li>Security mindset vs. rule-following approach</li><li>Positive reinforcement security programs</li><li>Organizational security maturity models</li><li>Leadership's role in security culture<p></p></li></ul><p><strong>💼 Compliance Frameworks This Training Addresses:<br></strong><br></p><ul><li>SOC 2 Type I &amp; II</li><li>ISO 27001</li><li>HIPAA &amp; Healthcare Security</li><li>PCI DSS</li><li>CMMC (Cybersecurity Maturity Model Certification)</li><li>GDPR &amp; EU AI Act</li><li>AI Accountability Act</li><li>NIST Cybersecurity Framework</li><li>State privacy laws (CCPA, CPRA, etc.)<p></p></li></ul><p><strong>🏆 Perfect For:<br></strong><br></p><ul><li>Annual security awareness training requirements</li><li>Compliance audit preparation</li><li>New employee onboarding</li><li>Security culture development</li><li>Multi-framework compliance programs<p></p></li></ul><p><strong>🎓 Certification Available:</strong> Complete the training and receive a certification of completion for your compliance documentation. <br>    <a href="https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA">https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA</a></p><p><strong>📺 About SecureTalk:</strong> SecureTalk explores critical information security innovation and compliance topics. Hosted by Justin Beals, founder and CEO of StrikeGraph, featuring expert insights from cybersecurity professionals across finance, healthcare, engineering, and compliance.</p><p><strong><br>🔔 Subscribe for more security insights and compliance guidance!<br></strong><br></p><p><strong><br>Chapters:</strong> <br>0:00 Introduction &amp; Training Overview <br>3:18 Social Engineering with Steven Ferrell (IT Compliance Expert) <br>15:00 Advanced Threats with Kenneth Webb (CISA, CISSP) <br>30:30 Cloud Security with Josh (Head of Engineering) <br>44:55 Insider Threats with Elmy Peralta (Assessments Manager) <br>49:09 Regulatory Compliance with Micah Spieler (Chief Product Officer) <br>1: 01:42 Security Culture with Juliett Eck (CFO)</p><p>#CybersecurityTraining #SecurityAwareness #ComplianceTraining #SOC2 #HIPAA #ISO27001 #SecurityCulture #StrikeGraph #SecureTalk</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Jun 2025 17:10:30 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/482b3f17/5a4ed054.mp3" length="171148437" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_6xKPTHp7D8ulp_Bsf9taXvHwX0iGmkbRB2owTzKrJA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84MDlj/ODVjNTdiMzkxZjNi/ZGU0NDQ4Njc3Mzdm/YTNmZS5wbmc.jpg"/>
      <itunes:duration>4277</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong><br>SecureTalk 2025 Security Awareness Training | Complete Compliance Guide<br></strong><br></p><p>Welcome to SecureTalk's comprehensive 2025 Security Awareness Training video! This annually updated training is designed to help organizations meet their security compliance requirements while building a strong security culture.</p><p><strong><br>🎯 What You'll Learn:<br></strong><br></p><p><strong>Social Engineering &amp; AI-Enhanced Threats<br></strong><br></p><ul><li>Advanced phishing detection in the AI era</li><li>Voice and video deepfake attack recognition</li><li>Financial verification protocols to prevent fraud</li><li>Healthcare data protection against social engineering<p></p></li></ul><p><strong><br>Cloud Security &amp; Infrastructure<br></strong><br></p><ul><li><br>Common cloud misconfigurations and prevention</li><li>Secure AI model development and deployment</li><li>Financial data protection in cloud environments</li><li>Package dependency management and vulnerability scanning<p></p></li></ul><p><strong>Supply Chain &amp; Third-Party Risk<br></strong><br></p><ul><li>Vendor security assessment frameworks</li><li>Zero Trust architecture implementation</li><li>HIPAA compliance for business associates</li><li>AI vendor risk evaluation checklists<p></p></li></ul><p><strong><br>Insider Threats &amp; Hybrid Work Security<br></strong><br></p><ul><li>Behavioral analytics for threat detection</li><li>Environment-adaptive security controls</li><li>Data loss prevention in remote work settings</li><li>Segregation of duties in digital workflows<p></p></li></ul><p><strong>Regulatory Compliance &amp; Automation<br></strong><br></p><ul><li>2025-2026 regulatory calendar overview</li><li>Control-centric compliance approach</li><li>Continuous monitoring and automation strategies</li><li>Multi-framework compliance alignment<p></p></li></ul><p><strong>Building Security Culture</strong></p><ul><li>Security mindset vs. rule-following approach</li><li>Positive reinforcement security programs</li><li>Organizational security maturity models</li><li>Leadership's role in security culture<p></p></li></ul><p><strong>💼 Compliance Frameworks This Training Addresses:<br></strong><br></p><ul><li>SOC 2 Type I &amp; II</li><li>ISO 27001</li><li>HIPAA &amp; Healthcare Security</li><li>PCI DSS</li><li>CMMC (Cybersecurity Maturity Model Certification)</li><li>GDPR &amp; EU AI Act</li><li>AI Accountability Act</li><li>NIST Cybersecurity Framework</li><li>State privacy laws (CCPA, CPRA, etc.)<p></p></li></ul><p><strong>🏆 Perfect For:<br></strong><br></p><ul><li>Annual security awareness training requirements</li><li>Compliance audit preparation</li><li>New employee onboarding</li><li>Security culture development</li><li>Multi-framework compliance programs<p></p></li></ul><p><strong>🎓 Certification Available:</strong> Complete the training and receive a certification of completion for your compliance documentation. <br>    <a href="https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA">https://4dont.share.hsforms.com/2EVBbDWdBQyKG5Udaaj0baA</a></p><p><strong>📺 About SecureTalk:</strong> SecureTalk explores critical information security innovation and compliance topics. Hosted by Justin Beals, founder and CEO of StrikeGraph, featuring expert insights from cybersecurity professionals across finance, healthcare, engineering, and compliance.</p><p><strong><br>🔔 Subscribe for more security insights and compliance guidance!<br></strong><br></p><p><strong><br>Chapters:</strong> <br>0:00 Introduction &amp; Training Overview <br>3:18 Social Engineering with Steven Ferrell (IT Compliance Expert) <br>15:00 Advanced Threats with Kenneth Webb (CISA, CISSP) <br>30:30 Cloud Security with Josh (Head of Engineering) <br>44:55 Insider Threats with Elmy Peralta (Assessments Manager) <br>49:09 Regulatory Compliance with Micah Spieler (Chief Product Officer) <br>1: 01:42 Security Culture with Juliett Eck (CFO)</p><p>#CybersecurityTraining #SecurityAwareness #ComplianceTraining #SOC2 #HIPAA #ISO27001 #SecurityCulture #StrikeGraph #SecureTalk</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Infosec, Training, SecurityAwareness, HIPAA, Compliance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/482b3f17/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Security Leader Who Predicted AI Would Replace His Own Team (And Why He's Right) with Satyam Patel</title>
      <itunes:episode>227</itunes:episode>
      <podcast:episode>227</podcast:episode>
      <itunes:title>The Security Leader Who Predicted AI Would Replace His Own Team (And Why He's Right) with Satyam Patel</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">304f6562-4fad-4137-aeb7-db4e912ebb8b</guid>
      <link>https://share.transistor.fm/s/0f6def13</link>
      <description>
        <![CDATA[<p><br>🌙 <strong>THE MIDNIGHT SECURITY GUARDIAN: A CISO'S ORIGIN STORY<br></strong><br></p><p><br>At 2 AM, most people are dreaming. Satyam Patel is wide awake, sending texts to his security team: "Are we secure? Did we patch that server? Is MFA enabled on that service account?"</p><p><br>This isn't insomnia—it's the origin story of how a "big firewall guy" transformed into one of cybersecurity's most forward-thinking leaders, and why his journey from infrastructure skeptic to AI evangelist mirrors the entire industry's evolution.</p><p><br>📖 <strong>THE THREE-ACT TRANSFORMATION:<br></strong><br></p><p><strong><br>Act I: The Infrastructure Skeptic's Awakening</strong> Watch Satyam's journey from traditional "firewall and load balancer guy" to realizing that employees can't be forced behind VPNs anymore. The moment he discovered that flexibility doesn't mean vulnerability—it means evolution. Learn how this mindset shift led him from protecting perimeters to protecting people.</p><p><strong><br>Act II: The Culture Shock That Changed Everything</strong> Picture this: After years of doing "security roadshows" and begging for budget, Satyam walks into Kandji and experiences reverse culture shock. Instead of chasing people for security buy-in, they come to HIM asking, "What does security think?" Witness the CEO moment that flipped his world: "It's not a request—it's a mandate to protect our company at ANY cost."</p><p><strong><br>Act III: The AI Prophet's Dilemma</strong> The heated boardroom debate that keeps CISOs awake: Replace human SOC analysts with AI, or keep the human element? Follow Satyam's internal struggle as he weighs 10,000 daily AI-analyzed calls against human intuition, leading to his bold prediction about "Minority Report" style predictive cybersecurity.</p><p><br>🎭 <strong>CHARACTER-DRIVEN MOMENTS:<br></strong><br></p><p><strong><br>The Paranoid Father:</strong> Why Satyam forces his family to use alphanumeric passwords and what Tom Cruise's "Minority Report" taught him about threat prediction.</p><p><strong><br>The Reformed Skeptic:</strong> How a career infrastructure guy learned to embrace endpoint security and why he now believes MDM is the new perimeter.</p><p><strong><br>The Reluctant Prophet:</strong> His uncomfortable realization that automation will replace thousands of cybersecurity jobs—and why he's helping it happen.</p><p><br>⚡ <strong>PLOT TWISTS YOU WON'T SEE COMING:<br></strong><br></p><ul><li><br>The university graduate's graduation post that led to complete identity theft</li><li>Why 99% security equals 100% vulnerability (and the math that proves it)</li><li>The Signal app scandal that changed how he thinks about mobile security</li></ul><p><br></p><p><br>🎬 <strong>THE SUPPORTING CAST:<br></strong><br></p><ul><li>Adam (Kandji CEO): The leader who gave unlimited security budget</li><li>The Development Team: Who learned to ask security questions first</li><li>The 2 AM Security Team: Who actually appreciate the paranoid texts</li><li>The AI SOC Analyst: The non-human teammate changing everything<p></p></li></ul><p><br>🚀 <strong>MEET THE PROTAGONIST:</strong> Satyam Patel isn't your typical CISO. He's the guy who went from customer to C-suite, from skeptic to believer, from infrastructure defender to AI advocate. With 25+ years of plot twists, failed budgets, successful breaches prevented, and one very understanding family who puts up with alphanumeric phone passwords.</p><p><br>#CISOStory #CyberSecurityJourney #AIvsHuman #ZeroTrust #SecurityLeadership #ThreatDetection #Kandji #EndpointSecurity #ParanoidCISO #CyberStory #SecurityCulture #TechTransformation</p><p><em><br>This isn't just another security interview—it's a cybersecurity thriller with real-world consequences. Subscribe for more stories from the digital frontlines! 🎬🔐<br></em><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>🌙 <strong>THE MIDNIGHT SECURITY GUARDIAN: A CISO'S ORIGIN STORY<br></strong><br></p><p><br>At 2 AM, most people are dreaming. Satyam Patel is wide awake, sending texts to his security team: "Are we secure? Did we patch that server? Is MFA enabled on that service account?"</p><p><br>This isn't insomnia—it's the origin story of how a "big firewall guy" transformed into one of cybersecurity's most forward-thinking leaders, and why his journey from infrastructure skeptic to AI evangelist mirrors the entire industry's evolution.</p><p><br>📖 <strong>THE THREE-ACT TRANSFORMATION:<br></strong><br></p><p><strong><br>Act I: The Infrastructure Skeptic's Awakening</strong> Watch Satyam's journey from traditional "firewall and load balancer guy" to realizing that employees can't be forced behind VPNs anymore. The moment he discovered that flexibility doesn't mean vulnerability—it means evolution. Learn how this mindset shift led him from protecting perimeters to protecting people.</p><p><strong><br>Act II: The Culture Shock That Changed Everything</strong> Picture this: After years of doing "security roadshows" and begging for budget, Satyam walks into Kandji and experiences reverse culture shock. Instead of chasing people for security buy-in, they come to HIM asking, "What does security think?" Witness the CEO moment that flipped his world: "It's not a request—it's a mandate to protect our company at ANY cost."</p><p><strong><br>Act III: The AI Prophet's Dilemma</strong> The heated boardroom debate that keeps CISOs awake: Replace human SOC analysts with AI, or keep the human element? Follow Satyam's internal struggle as he weighs 10,000 daily AI-analyzed calls against human intuition, leading to his bold prediction about "Minority Report" style predictive cybersecurity.</p><p><br>🎭 <strong>CHARACTER-DRIVEN MOMENTS:<br></strong><br></p><p><strong><br>The Paranoid Father:</strong> Why Satyam forces his family to use alphanumeric passwords and what Tom Cruise's "Minority Report" taught him about threat prediction.</p><p><strong><br>The Reformed Skeptic:</strong> How a career infrastructure guy learned to embrace endpoint security and why he now believes MDM is the new perimeter.</p><p><strong><br>The Reluctant Prophet:</strong> His uncomfortable realization that automation will replace thousands of cybersecurity jobs—and why he's helping it happen.</p><p><br>⚡ <strong>PLOT TWISTS YOU WON'T SEE COMING:<br></strong><br></p><ul><li><br>The university graduate's graduation post that led to complete identity theft</li><li>Why 99% security equals 100% vulnerability (and the math that proves it)</li><li>The Signal app scandal that changed how he thinks about mobile security</li></ul><p><br></p><p><br>🎬 <strong>THE SUPPORTING CAST:<br></strong><br></p><ul><li>Adam (Kandji CEO): The leader who gave unlimited security budget</li><li>The Development Team: Who learned to ask security questions first</li><li>The 2 AM Security Team: Who actually appreciate the paranoid texts</li><li>The AI SOC Analyst: The non-human teammate changing everything<p></p></li></ul><p><br>🚀 <strong>MEET THE PROTAGONIST:</strong> Satyam Patel isn't your typical CISO. He's the guy who went from customer to C-suite, from skeptic to believer, from infrastructure defender to AI advocate. With 25+ years of plot twists, failed budgets, successful breaches prevented, and one very understanding family who puts up with alphanumeric phone passwords.</p><p><br>#CISOStory #CyberSecurityJourney #AIvsHuman #ZeroTrust #SecurityLeadership #ThreatDetection #Kandji #EndpointSecurity #ParanoidCISO #CyberStory #SecurityCulture #TechTransformation</p><p><em><br>This isn't just another security interview—it's a cybersecurity thriller with real-world consequences. Subscribe for more stories from the digital frontlines! 🎬🔐<br></em><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Jun 2025 15:16:27 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0f6def13/f91bda62.mp3" length="100943635" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/j72Wl7hipAO-UbCAjtflxRWLP3MYfuJQr5JJsD24XD8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81Nzll/NDM5ZTE1ZDEzMzVj/ZWNjMTQzNDc2MWYy/MzY3Zi5wbmc.jpg"/>
      <itunes:duration>2522</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>🌙 <strong>THE MIDNIGHT SECURITY GUARDIAN: A CISO'S ORIGIN STORY<br></strong><br></p><p><br>At 2 AM, most people are dreaming. Satyam Patel is wide awake, sending texts to his security team: "Are we secure? Did we patch that server? Is MFA enabled on that service account?"</p><p><br>This isn't insomnia—it's the origin story of how a "big firewall guy" transformed into one of cybersecurity's most forward-thinking leaders, and why his journey from infrastructure skeptic to AI evangelist mirrors the entire industry's evolution.</p><p><br>📖 <strong>THE THREE-ACT TRANSFORMATION:<br></strong><br></p><p><strong><br>Act I: The Infrastructure Skeptic's Awakening</strong> Watch Satyam's journey from traditional "firewall and load balancer guy" to realizing that employees can't be forced behind VPNs anymore. The moment he discovered that flexibility doesn't mean vulnerability—it means evolution. Learn how this mindset shift led him from protecting perimeters to protecting people.</p><p><strong><br>Act II: The Culture Shock That Changed Everything</strong> Picture this: After years of doing "security roadshows" and begging for budget, Satyam walks into Kandji and experiences reverse culture shock. Instead of chasing people for security buy-in, they come to HIM asking, "What does security think?" Witness the CEO moment that flipped his world: "It's not a request—it's a mandate to protect our company at ANY cost."</p><p><strong><br>Act III: The AI Prophet's Dilemma</strong> The heated boardroom debate that keeps CISOs awake: Replace human SOC analysts with AI, or keep the human element? Follow Satyam's internal struggle as he weighs 10,000 daily AI-analyzed calls against human intuition, leading to his bold prediction about "Minority Report" style predictive cybersecurity.</p><p><br>🎭 <strong>CHARACTER-DRIVEN MOMENTS:<br></strong><br></p><p><strong><br>The Paranoid Father:</strong> Why Satyam forces his family to use alphanumeric passwords and what Tom Cruise's "Minority Report" taught him about threat prediction.</p><p><strong><br>The Reformed Skeptic:</strong> How a career infrastructure guy learned to embrace endpoint security and why he now believes MDM is the new perimeter.</p><p><strong><br>The Reluctant Prophet:</strong> His uncomfortable realization that automation will replace thousands of cybersecurity jobs—and why he's helping it happen.</p><p><br>⚡ <strong>PLOT TWISTS YOU WON'T SEE COMING:<br></strong><br></p><ul><li><br>The university graduate's graduation post that led to complete identity theft</li><li>Why 99% security equals 100% vulnerability (and the math that proves it)</li><li>The Signal app scandal that changed how he thinks about mobile security</li></ul><p><br></p><p><br>🎬 <strong>THE SUPPORTING CAST:<br></strong><br></p><ul><li>Adam (Kandji CEO): The leader who gave unlimited security budget</li><li>The Development Team: Who learned to ask security questions first</li><li>The 2 AM Security Team: Who actually appreciate the paranoid texts</li><li>The AI SOC Analyst: The non-human teammate changing everything<p></p></li></ul><p><br>🚀 <strong>MEET THE PROTAGONIST:</strong> Satyam Patel isn't your typical CISO. He's the guy who went from customer to C-suite, from skeptic to believer, from infrastructure defender to AI advocate. With 25+ years of plot twists, failed budgets, successful breaches prevented, and one very understanding family who puts up with alphanumeric phone passwords.</p><p><br>#CISOStory #CyberSecurityJourney #AIvsHuman #ZeroTrust #SecurityLeadership #ThreatDetection #Kandji #EndpointSecurity #ParanoidCISO #CyberStory #SecurityCulture #TechTransformation</p><p><em><br>This isn't just another security interview—it's a cybersecurity thriller with real-world consequences. Subscribe for more stories from the digital frontlines! 🎬🔐<br></em><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, AI, artificial intelligence, databreach</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0f6def13/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/0f6def13/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Can Cybersecurity be "Agile"? with Brian Wagner</title>
      <itunes:episode>226</itunes:episode>
      <podcast:episode>226</podcast:episode>
      <itunes:title>Can Cybersecurity be "Agile"? with Brian Wagner</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3f4e5772-a7de-4dd2-b152-5e51af35e931</guid>
      <link>https://share.transistor.fm/s/339d706f</link>
      <description>
        <![CDATA[<p><strong>Can Security be “Agile”? with Brian Wagner</strong></p><p><br></p><p><br></p><p>In this comprehensive interview, Brian Wagner, CTO at Revenir and former AWS security executive, shares insights from his new book "Redefining Information Security" and explains why the cybersecurity industry needs a fundamental shift in approach. With over 20 years of experience leading security transformations across enterprise organizations, Wagner presents a practical framework for moving beyond reactive security models.</p><p><br></p><p><strong>About the Guest:</strong></p><p>Brian Wagner brings extensive C-suite experience from Amazon Web Services, Moody's RMS, Bulletproof, and Defense.com. Based in London, he speaks globally on cloud security, AI-driven solutions, and security transformation. His latest book "Redefining Information Security" introduces a three-level maturity framework that's gaining attention from security leaders worldwide.</p><p><br></p><p><strong>Key Discussion Points:</strong></p><ul><li>The Security Maturity Framework: Wagner outlines his three-level approach—Reactive, Proactive, and Adaptive security—explaining how organizations can assess their current position and plan strategic improvements. He emphasizes that most companies remain stuck in reactive mode, responding to threats after damage occurs.</li><li>From Cybersecurity to Information Safety: The conversation explores Wagner's concept of treating security as "information safety" rather than traditional cybersecurity. This cultural shift makes digital protection everyone's responsibility, transforming potential vulnerabilities into defensive assets.</li><li>AI in Security Applications: Drawing from his work at Revenir, where the company handles sensitive financial and personal data across international borders, Wagner discusses practical AI implementations for pattern recognition, fraud detection, and compliance monitoring. He explains why AI excels at identifying normal versus abnormal patterns in security contexts.</li><li>Security as Business Enabler: Wagner demonstrates how security can function as a competitive advantage rather than a cost center. He shares strategies for communicating security value to go-to-market teams and integrating security features into product development cycles.</li><li>Compliance vs. Security Balance: The discussion addresses the relationship between regulatory compliance and actual security, with Wagner explaining how compliance represents minimum standards while effective security requires ongoing investment and adaptation.</li><li>Open Source and Democratic Security: Wagner advocates for open source collaboration in cybersecurity, arguing that community-based approaches provide more transparent and accessible security solutions, especially important given recent changes in vulnerability disclosure programs.</li></ul><p><br></p><p><strong>Practical Implementation:</strong> </p><p>The conversation includes real-world examples, from detecting sophisticated employment fraud schemes to integrating security practices into agile development workflows. Wagner emphasizes incremental improvements and measurable outcomes.</p><p><br></p><p><strong>Book Recommendation:</strong></p><p>"Redefining Information Security" offers a strategic approach to security leadership, focusing on cultural transformation and business alignment rather than purely technical solutions. The book provides frameworks for security professionals and business leaders looking to modernize their approach to digital protection.</p><p>Link to the book: https://www.koganpage.com/risk-compliance/redefining-information-security-9781398620018</p><p>This interview provides valuable insights for cybersecurity professionals, technology leaders, and anyone interested in understanding how AI and modern approaches are reshaping enterprise security practices.</p><p><br></p><p>#Cybersecurity #InformationSecurity #AI #SecurityMaturity #AWS #CloudSecurity #CTO #CISO #ThreatDetection #SecurityCulture #CyberThreats #SecurityLeadership</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Can Security be “Agile”? with Brian Wagner</strong></p><p><br></p><p><br></p><p>In this comprehensive interview, Brian Wagner, CTO at Revenir and former AWS security executive, shares insights from his new book "Redefining Information Security" and explains why the cybersecurity industry needs a fundamental shift in approach. With over 20 years of experience leading security transformations across enterprise organizations, Wagner presents a practical framework for moving beyond reactive security models.</p><p><br></p><p><strong>About the Guest:</strong></p><p>Brian Wagner brings extensive C-suite experience from Amazon Web Services, Moody's RMS, Bulletproof, and Defense.com. Based in London, he speaks globally on cloud security, AI-driven solutions, and security transformation. His latest book "Redefining Information Security" introduces a three-level maturity framework that's gaining attention from security leaders worldwide.</p><p><br></p><p><strong>Key Discussion Points:</strong></p><ul><li>The Security Maturity Framework: Wagner outlines his three-level approach—Reactive, Proactive, and Adaptive security—explaining how organizations can assess their current position and plan strategic improvements. He emphasizes that most companies remain stuck in reactive mode, responding to threats after damage occurs.</li><li>From Cybersecurity to Information Safety: The conversation explores Wagner's concept of treating security as "information safety" rather than traditional cybersecurity. This cultural shift makes digital protection everyone's responsibility, transforming potential vulnerabilities into defensive assets.</li><li>AI in Security Applications: Drawing from his work at Revenir, where the company handles sensitive financial and personal data across international borders, Wagner discusses practical AI implementations for pattern recognition, fraud detection, and compliance monitoring. He explains why AI excels at identifying normal versus abnormal patterns in security contexts.</li><li>Security as Business Enabler: Wagner demonstrates how security can function as a competitive advantage rather than a cost center. He shares strategies for communicating security value to go-to-market teams and integrating security features into product development cycles.</li><li>Compliance vs. Security Balance: The discussion addresses the relationship between regulatory compliance and actual security, with Wagner explaining how compliance represents minimum standards while effective security requires ongoing investment and adaptation.</li><li>Open Source and Democratic Security: Wagner advocates for open source collaboration in cybersecurity, arguing that community-based approaches provide more transparent and accessible security solutions, especially important given recent changes in vulnerability disclosure programs.</li></ul><p><br></p><p><strong>Practical Implementation:</strong> </p><p>The conversation includes real-world examples, from detecting sophisticated employment fraud schemes to integrating security practices into agile development workflows. Wagner emphasizes incremental improvements and measurable outcomes.</p><p><br></p><p><strong>Book Recommendation:</strong></p><p>"Redefining Information Security" offers a strategic approach to security leadership, focusing on cultural transformation and business alignment rather than purely technical solutions. The book provides frameworks for security professionals and business leaders looking to modernize their approach to digital protection.</p><p>Link to the book: https://www.koganpage.com/risk-compliance/redefining-information-security-9781398620018</p><p>This interview provides valuable insights for cybersecurity professionals, technology leaders, and anyone interested in understanding how AI and modern approaches are reshaping enterprise security practices.</p><p><br></p><p>#Cybersecurity #InformationSecurity #AI #SecurityMaturity #AWS #CloudSecurity #CTO #CISO #ThreatDetection #SecurityCulture #CyberThreats #SecurityLeadership</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Jun 2025 15:09:20 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/339d706f/e1acb680.mp3" length="110521463" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0FgYYXuGA5wd4ufeb4_ydPdajbUHaaTQOSmiFxGHymo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MTNk/OWE1OTA4YTQwN2Ey/ZmJkZTlmZmI2NDc3/OWRiZS5wbmc.jpg"/>
      <itunes:duration>2762</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Can Security be “Agile”? with Brian Wagner</strong></p><p><br></p><p><br></p><p>In this comprehensive interview, Brian Wagner, CTO at Revenir and former AWS security executive, shares insights from his new book "Redefining Information Security" and explains why the cybersecurity industry needs a fundamental shift in approach. With over 20 years of experience leading security transformations across enterprise organizations, Wagner presents a practical framework for moving beyond reactive security models.</p><p><br></p><p><strong>About the Guest:</strong></p><p>Brian Wagner brings extensive C-suite experience from Amazon Web Services, Moody's RMS, Bulletproof, and Defense.com. Based in London, he speaks globally on cloud security, AI-driven solutions, and security transformation. His latest book "Redefining Information Security" introduces a three-level maturity framework that's gaining attention from security leaders worldwide.</p><p><br></p><p><strong>Key Discussion Points:</strong></p><ul><li>The Security Maturity Framework: Wagner outlines his three-level approach—Reactive, Proactive, and Adaptive security—explaining how organizations can assess their current position and plan strategic improvements. He emphasizes that most companies remain stuck in reactive mode, responding to threats after damage occurs.</li><li>From Cybersecurity to Information Safety: The conversation explores Wagner's concept of treating security as "information safety" rather than traditional cybersecurity. This cultural shift makes digital protection everyone's responsibility, transforming potential vulnerabilities into defensive assets.</li><li>AI in Security Applications: Drawing from his work at Revenir, where the company handles sensitive financial and personal data across international borders, Wagner discusses practical AI implementations for pattern recognition, fraud detection, and compliance monitoring. He explains why AI excels at identifying normal versus abnormal patterns in security contexts.</li><li>Security as Business Enabler: Wagner demonstrates how security can function as a competitive advantage rather than a cost center. He shares strategies for communicating security value to go-to-market teams and integrating security features into product development cycles.</li><li>Compliance vs. Security Balance: The discussion addresses the relationship between regulatory compliance and actual security, with Wagner explaining how compliance represents minimum standards while effective security requires ongoing investment and adaptation.</li><li>Open Source and Democratic Security: Wagner advocates for open source collaboration in cybersecurity, arguing that community-based approaches provide more transparent and accessible security solutions, especially important given recent changes in vulnerability disclosure programs.</li></ul><p><br></p><p><strong>Practical Implementation:</strong> </p><p>The conversation includes real-world examples, from detecting sophisticated employment fraud schemes to integrating security practices into agile development workflows. Wagner emphasizes incremental improvements and measurable outcomes.</p><p><br></p><p><strong>Book Recommendation:</strong></p><p>"Redefining Information Security" offers a strategic approach to security leadership, focusing on cultural transformation and business alignment rather than purely technical solutions. The book provides frameworks for security professionals and business leaders looking to modernize their approach to digital protection.</p><p>Link to the book: https://www.koganpage.com/risk-compliance/redefining-information-security-9781398620018</p><p>This interview provides valuable insights for cybersecurity professionals, technology leaders, and anyone interested in understanding how AI and modern approaches are reshaping enterprise security practices.</p><p><br></p><p>#Cybersecurity #InformationSecurity #AI #SecurityMaturity #AWS #CloudSecurity #CTO #CISO #ThreatDetection #SecurityCulture #CyberThreats #SecurityLeadership</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords> #Cybersecurity #InformationSecurity #AI #SecurityMaturity #AWS #CloudSecurity #CTO #CISO #ThreatDetection #SecurityCulture #CyberThreats #SecurityLeadership</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/339d706f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The AI Creator's Confession: "I Built Google Translate to Unite People. It's Now Tearing Us Apart" with De Kai</title>
      <itunes:episode>225</itunes:episode>
      <podcast:episode>225</podcast:episode>
      <itunes:title>The AI Creator's Confession: "I Built Google Translate to Unite People. It's Now Tearing Us Apart" with De Kai</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">26f3da4f-8d22-4e88-976b-944b0120299e</guid>
      <link>https://share.transistor.fm/s/7735138f</link>
      <description>
        <![CDATA[<p><br></p><p>What happens when you realize your life's work is being used to destroy what you hoped to create?</p><p>Meet De Kai - the man who helped build Google Translate, Siri, and modern AI systems. In 1990s Hong Kong, he dreamed of AI that could bridge cultural divides. Thirty years later, he experienced his "Oppenheimer moment" - the same machine learning he pioneered to unite people was dividing humanity through social media algorithms.</p><p><strong>The Reality Check:</strong> We don't just have 8 billion humans anymore. We have 800 billion AI systems learning our behavior 24/7 - "digital children" growing up without parental guidance.</p><p>🎯 KEY INSIGHTS:</p><p>• <strong>The Translation Paradox:</strong> How unity technology became division engines • <strong>The Blind Men &amp; Elephant:</strong> Ancient parable explaining why we misunderstand AI • <strong>Digital Parenting Crisis:</strong> Why we're raising 800 billion unguided AI systems • <strong>The Psychology of Manipulation:</strong> How AI exploits cognitive weaknesses • <strong>Four Futures Scenario:</strong> Humanity's possible paths with AI</p><p>🧠 AI MANIPULATION TACTICS REVEALED:</p><ul><li>Anchoring attacks that shape your thinking</li><li>Belief perseverance traps that backfire fact-checking</li><li>How algorithms turn gossip into social weapons</li></ul><p>📖 ABOUT "RAISING AI":</p><p>De Kai's book explores the question we should be asking: Not "Will AI replace us?" but "How do we raise AI ethically?" Written by Google's AI Ethics Council founding member, it reveals why current AI needs 15 million times more data than human children and provides a framework for ethical AI development.</p><p>🔬 DE KAI'S CREDENTIALS:</p><p>• AI pioneer &amp; Founding Fellow in computational linguistics • Independent Director of AI ethics think tank The Future Society • One of 8 inaugural members of Google's AI Ethics Council • Joint appointment at HKUST Computer Science &amp; Berkeley's International Computer Science Institute • Electronic musician exploring AI creativity</p><p>💭 QUESTIONS ANSWERED:</p><ul><li>How translation tech became social manipulation?</li><li>What makes AI behave like "unparented teenagers"?</li><li>How to be a good "AI parent" in organizations?</li><li>Why human-AI merger might be our best survival strategy?</li></ul><p><br></p><p><strong>The Timeline is Accelerating.</strong> 99% of people are "frozen like deer in headlights" facing humanity's most disruptive transformation. Organizations ignoring AI governance face competitive extinction within five years.</p><p>This isn't academic theory - it's a confession and warning from someone who helped create the systems now shaping global culture.</p><p><a href="https://mitpress.mit.edu/9780262049764/raising-ai/">Book: Raising AI: An Essential Guide to Parenting Our Future</a></p><p>#AIEthics #GoogleTranslate #ArtificialIntelligence #MachineLearning #RaisingAI #TechnologyLeadership #AIGovernance #DigitalTransformation #FutureOfWork #AIStrategy #Innovation #TechLeadership #AICompliance #BusinessStrategy</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br></p><p>What happens when you realize your life's work is being used to destroy what you hoped to create?</p><p>Meet De Kai - the man who helped build Google Translate, Siri, and modern AI systems. In 1990s Hong Kong, he dreamed of AI that could bridge cultural divides. Thirty years later, he experienced his "Oppenheimer moment" - the same machine learning he pioneered to unite people was dividing humanity through social media algorithms.</p><p><strong>The Reality Check:</strong> We don't just have 8 billion humans anymore. We have 800 billion AI systems learning our behavior 24/7 - "digital children" growing up without parental guidance.</p><p>🎯 KEY INSIGHTS:</p><p>• <strong>The Translation Paradox:</strong> How unity technology became division engines • <strong>The Blind Men &amp; Elephant:</strong> Ancient parable explaining why we misunderstand AI • <strong>Digital Parenting Crisis:</strong> Why we're raising 800 billion unguided AI systems • <strong>The Psychology of Manipulation:</strong> How AI exploits cognitive weaknesses • <strong>Four Futures Scenario:</strong> Humanity's possible paths with AI</p><p>🧠 AI MANIPULATION TACTICS REVEALED:</p><ul><li>Anchoring attacks that shape your thinking</li><li>Belief perseverance traps that backfire fact-checking</li><li>How algorithms turn gossip into social weapons</li></ul><p>📖 ABOUT "RAISING AI":</p><p>De Kai's book explores the question we should be asking: Not "Will AI replace us?" but "How do we raise AI ethically?" Written by Google's AI Ethics Council founding member, it reveals why current AI needs 15 million times more data than human children and provides a framework for ethical AI development.</p><p>🔬 DE KAI'S CREDENTIALS:</p><p>• AI pioneer &amp; Founding Fellow in computational linguistics • Independent Director of AI ethics think tank The Future Society • One of 8 inaugural members of Google's AI Ethics Council • Joint appointment at HKUST Computer Science &amp; Berkeley's International Computer Science Institute • Electronic musician exploring AI creativity</p><p>💭 QUESTIONS ANSWERED:</p><ul><li>How translation tech became social manipulation?</li><li>What makes AI behave like "unparented teenagers"?</li><li>How to be a good "AI parent" in organizations?</li><li>Why human-AI merger might be our best survival strategy?</li></ul><p><br></p><p><strong>The Timeline is Accelerating.</strong> 99% of people are "frozen like deer in headlights" facing humanity's most disruptive transformation. Organizations ignoring AI governance face competitive extinction within five years.</p><p>This isn't academic theory - it's a confession and warning from someone who helped create the systems now shaping global culture.</p><p><a href="https://mitpress.mit.edu/9780262049764/raising-ai/">Book: Raising AI: An Essential Guide to Parenting Our Future</a></p><p>#AIEthics #GoogleTranslate #ArtificialIntelligence #MachineLearning #RaisingAI #TechnologyLeadership #AIGovernance #DigitalTransformation #FutureOfWork #AIStrategy #Innovation #TechLeadership #AICompliance #BusinessStrategy</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Jun 2025 15:17:51 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7735138f/41e3edda.mp3" length="106396879" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/u3uq-4RMV4z8NIkytj4n6fc5vZSlmSpWP2FD6Vcmg9I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYTZk/OTJkMmY0MDViYzQx/MjhlOTlhZmI3Mjk4/MjAyNi5wbmc.jpg"/>
      <itunes:duration>2658</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br></p><p>What happens when you realize your life's work is being used to destroy what you hoped to create?</p><p>Meet De Kai - the man who helped build Google Translate, Siri, and modern AI systems. In 1990s Hong Kong, he dreamed of AI that could bridge cultural divides. Thirty years later, he experienced his "Oppenheimer moment" - the same machine learning he pioneered to unite people was dividing humanity through social media algorithms.</p><p><strong>The Reality Check:</strong> We don't just have 8 billion humans anymore. We have 800 billion AI systems learning our behavior 24/7 - "digital children" growing up without parental guidance.</p><p>🎯 KEY INSIGHTS:</p><p>• <strong>The Translation Paradox:</strong> How unity technology became division engines • <strong>The Blind Men &amp; Elephant:</strong> Ancient parable explaining why we misunderstand AI • <strong>Digital Parenting Crisis:</strong> Why we're raising 800 billion unguided AI systems • <strong>The Psychology of Manipulation:</strong> How AI exploits cognitive weaknesses • <strong>Four Futures Scenario:</strong> Humanity's possible paths with AI</p><p>🧠 AI MANIPULATION TACTICS REVEALED:</p><ul><li>Anchoring attacks that shape your thinking</li><li>Belief perseverance traps that backfire fact-checking</li><li>How algorithms turn gossip into social weapons</li></ul><p>📖 ABOUT "RAISING AI":</p><p>De Kai's book explores the question we should be asking: Not "Will AI replace us?" but "How do we raise AI ethically?" Written by Google's AI Ethics Council founding member, it reveals why current AI needs 15 million times more data than human children and provides a framework for ethical AI development.</p><p>🔬 DE KAI'S CREDENTIALS:</p><p>• AI pioneer &amp; Founding Fellow in computational linguistics • Independent Director of AI ethics think tank The Future Society • One of 8 inaugural members of Google's AI Ethics Council • Joint appointment at HKUST Computer Science &amp; Berkeley's International Computer Science Institute • Electronic musician exploring AI creativity</p><p>💭 QUESTIONS ANSWERED:</p><ul><li>How translation tech became social manipulation?</li><li>What makes AI behave like "unparented teenagers"?</li><li>How to be a good "AI parent" in organizations?</li><li>Why human-AI merger might be our best survival strategy?</li></ul><p><br></p><p><strong>The Timeline is Accelerating.</strong> 99% of people are "frozen like deer in headlights" facing humanity's most disruptive transformation. Organizations ignoring AI governance face competitive extinction within five years.</p><p>This isn't academic theory - it's a confession and warning from someone who helped create the systems now shaping global culture.</p><p><a href="https://mitpress.mit.edu/9780262049764/raising-ai/">Book: Raising AI: An Essential Guide to Parenting Our Future</a></p><p>#AIEthics #GoogleTranslate #ArtificialIntelligence #MachineLearning #RaisingAI #TechnologyLeadership #AIGovernance #DigitalTransformation #FutureOfWork #AIStrategy #Innovation #TechLeadership #AICompliance #BusinessStrategy</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Artificial Intelligence, Ethics, TechEthics, Cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7735138f/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/7735138f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title> Securing Society Through Data Kindness: How Cooperation Becomes Our Best Defense with Aram Sinnreich and Jesse Gilbert</title>
      <itunes:episode>224</itunes:episode>
      <podcast:episode>224</podcast:episode>
      <itunes:title> Securing Society Through Data Kindness: How Cooperation Becomes Our Best Defense with Aram Sinnreich and Jesse Gilbert</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f3cb4937-adab-4394-b2c1-dd7daa8ecbe6</guid>
      <link>https://share.transistor.fm/s/e2b465fb</link>
      <description>
        <![CDATA[<p><strong>Episode Description: </strong> </p><p>Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we never opted in.</p><p>In this episode of SecureTalk, host Justin Beals sits down with Dr. Aram Sinnreich and Jesse Gilbert, co-authors of "The Secret Life of Data," to explore a revolutionary approach to digital security: data kindness.</p><p><strong>🎯 KEY TOPICS COVERED:</strong> • Why our biggest security threat is social fragmentation, not just technical vulnerabilities • How tech companies profit from division (anger drives 5x more engagement than approval) • The food allergy transformation: how society changed practices organically in 20 years • Practical data kindness: simple actions that rebuild digital trust • Why cooperation is our best defense in an age of surveillance • How to reclaim agency over your digital life</p><p><strong>🚨 CRITICAL INSIGHTS:</strong></p><ul><li>We can't rely on tech companies (profit over people) or Congress (no data protection laws passed)</li><li>Change must happen from the ground up through shared cultural practices</li><li>Simple acts like unplugging smart devices for guests or consulting family before DNA uploads matter</li><li>Divided societies are vulnerable societies—cooperation is a security strategy</li></ul><p><strong>👥 ABOUT THE GUESTS: </strong></p><p><strong>Dr. Aram Sinnreich </strong>serves as a Professor and Graduate Director within the Communication Studies department at American University’s School of Communication. </p><p>His research addresses the convergence of culture, law, and technology, focusing particularly on topics such as surveillance and privacy, intellectual property, digital rights, digital culture, democracy, governance, and music. </p><p>Sinnreich has authored five books: Mashed Up (2010), The Piracy Crusade (2013), The Essential Guide to Intellectual Property (2019), the science fiction novel A Second Chance for Yesterday (2023; coauthored with Rachel Hope Cleves as R.A. Sinn), and <a href="https://youtu.be/jcGLrMTRTDE?si=YmsHH0h0GxOsvIRA">The Secret Life of Data</a> (2024; coauthored with Jesse Gilbert). </p><p>Additionally, his writing has appeared in various publications including The New York Times, Billboard, Wired, The Daily Beast, and Rolling Stone. He is a core faculty member of the SOC doctoral program and the MA in Media, Technology &amp; Democracy, regularly collaborating with SOC graduate students on research publications and projects. </p><p><strong>Jesse Gilbert</strong> is an interdisciplinary artist focused on the convergence of visual art, sound, and software design through his firm, Dark Matter Media. He previously served as the founding Chair of the Media Technology department at Woodbury University and has taught interactive software design at CalArts and UC San Diego.</p><p>Since 2010, Gilbert's work has revolved around his innovative software, SpectralGL, which is an interactive listening instrument that creates real-time visual landscapes in response to sound. Drawing on his background as a composer, sound designer, and lifelong technologist, his creative output investigates the phenomenological aspects of listening through improvisation and collaborative dialogue. His work has been showcased at numerous concert halls, festivals, and projection-mapped installations worldwide.</p><p>In 2007, Gilbert co-founded Dark Matter Media LLC to facilitate his independent creative projects and provide consultancy on emerging technologies across various public and private environments. From 2011 to 2017, he held the founding Chair position in the Department of Media Technology at Woodbury University and taught interactive software design at both CalArts and UC San Diego.</p><p>After documenting the problems in their first book, Aram and Jesse recently published insights in Time Magazine and are working on a new book about building cooperative societies with kindness embedded in technology design.</p><p><strong>🔗 CONNECT WITH SECURETALK:</strong> • Subscribe for weekly cybersecurity insights • Follow Justin Beals on LinkedIn • </p><p><strong>RESOURCES:</strong></p><p><strong>Sinnreich, A., &amp; Gilbert, J. (2025, April 3). How to be kind in a world that's always monitoring you. </strong><strong><em>Time Magazine</em></strong><strong>. </strong><a href="https://time.com/7273469/data-monitoring-kindness-essay/"><strong>https://time.com/7273469/data-monitoring-kindness-essay/</strong></a></p><p><a href="https://mitpress.mit.edu/9780262048811/the-secret-life-of-data/"><strong>Sinnreich, A., &amp; Gilbert, J. (2024). </strong><strong><em>The secret life of data: Navigating hype and uncertainty in the age of algorithmic surveillance</em></strong><strong>. MIT Press. </strong></a></p><p><a href="/secure-talk-podcast/the-algorithmic-mirror-reflecting-datas-role-in-modern-life"><strong>Beals, J. (Host)</strong>.<strong> (2024, May 14) The Algorithmic Mirror: Reflecting on Data's Role in Modern Life. in Secure Talk Podcast,</strong> <strong>Ep 173 with Aram Sinnreich and Jesse Gilbert </strong></a></p><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode Description: </strong> </p><p>Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we never opted in.</p><p>In this episode of SecureTalk, host Justin Beals sits down with Dr. Aram Sinnreich and Jesse Gilbert, co-authors of "The Secret Life of Data," to explore a revolutionary approach to digital security: data kindness.</p><p><strong>🎯 KEY TOPICS COVERED:</strong> • Why our biggest security threat is social fragmentation, not just technical vulnerabilities • How tech companies profit from division (anger drives 5x more engagement than approval) • The food allergy transformation: how society changed practices organically in 20 years • Practical data kindness: simple actions that rebuild digital trust • Why cooperation is our best defense in an age of surveillance • How to reclaim agency over your digital life</p><p><strong>🚨 CRITICAL INSIGHTS:</strong></p><ul><li>We can't rely on tech companies (profit over people) or Congress (no data protection laws passed)</li><li>Change must happen from the ground up through shared cultural practices</li><li>Simple acts like unplugging smart devices for guests or consulting family before DNA uploads matter</li><li>Divided societies are vulnerable societies—cooperation is a security strategy</li></ul><p><strong>👥 ABOUT THE GUESTS: </strong></p><p><strong>Dr. Aram Sinnreich </strong>serves as a Professor and Graduate Director within the Communication Studies department at American University’s School of Communication. </p><p>His research addresses the convergence of culture, law, and technology, focusing particularly on topics such as surveillance and privacy, intellectual property, digital rights, digital culture, democracy, governance, and music. </p><p>Sinnreich has authored five books: Mashed Up (2010), The Piracy Crusade (2013), The Essential Guide to Intellectual Property (2019), the science fiction novel A Second Chance for Yesterday (2023; coauthored with Rachel Hope Cleves as R.A. Sinn), and <a href="https://youtu.be/jcGLrMTRTDE?si=YmsHH0h0GxOsvIRA">The Secret Life of Data</a> (2024; coauthored with Jesse Gilbert). </p><p>Additionally, his writing has appeared in various publications including The New York Times, Billboard, Wired, The Daily Beast, and Rolling Stone. He is a core faculty member of the SOC doctoral program and the MA in Media, Technology &amp; Democracy, regularly collaborating with SOC graduate students on research publications and projects. </p><p><strong>Jesse Gilbert</strong> is an interdisciplinary artist focused on the convergence of visual art, sound, and software design through his firm, Dark Matter Media. He previously served as the founding Chair of the Media Technology department at Woodbury University and has taught interactive software design at CalArts and UC San Diego.</p><p>Since 2010, Gilbert's work has revolved around his innovative software, SpectralGL, which is an interactive listening instrument that creates real-time visual landscapes in response to sound. Drawing on his background as a composer, sound designer, and lifelong technologist, his creative output investigates the phenomenological aspects of listening through improvisation and collaborative dialogue. His work has been showcased at numerous concert halls, festivals, and projection-mapped installations worldwide.</p><p>In 2007, Gilbert co-founded Dark Matter Media LLC to facilitate his independent creative projects and provide consultancy on emerging technologies across various public and private environments. From 2011 to 2017, he held the founding Chair position in the Department of Media Technology at Woodbury University and taught interactive software design at both CalArts and UC San Diego.</p><p>After documenting the problems in their first book, Aram and Jesse recently published insights in Time Magazine and are working on a new book about building cooperative societies with kindness embedded in technology design.</p><p><strong>🔗 CONNECT WITH SECURETALK:</strong> • Subscribe for weekly cybersecurity insights • Follow Justin Beals on LinkedIn • </p><p><strong>RESOURCES:</strong></p><p><strong>Sinnreich, A., &amp; Gilbert, J. (2025, April 3). How to be kind in a world that's always monitoring you. </strong><strong><em>Time Magazine</em></strong><strong>. </strong><a href="https://time.com/7273469/data-monitoring-kindness-essay/"><strong>https://time.com/7273469/data-monitoring-kindness-essay/</strong></a></p><p><a href="https://mitpress.mit.edu/9780262048811/the-secret-life-of-data/"><strong>Sinnreich, A., &amp; Gilbert, J. (2024). </strong><strong><em>The secret life of data: Navigating hype and uncertainty in the age of algorithmic surveillance</em></strong><strong>. MIT Press. </strong></a></p><p><a href="/secure-talk-podcast/the-algorithmic-mirror-reflecting-datas-role-in-modern-life"><strong>Beals, J. (Host)</strong>.<strong> (2024, May 14) The Algorithmic Mirror: Reflecting on Data's Role in Modern Life. in Secure Talk Podcast,</strong> <strong>Ep 173 with Aram Sinnreich and Jesse Gilbert </strong></a></p><p> </p>]]>
      </content:encoded>
      <pubDate>Tue, 27 May 2025 14:57:59 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e2b465fb/49ba9b1f.mp3" length="128683985" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/t094cmOItklxBhgt2T4DTGg884GUA7XAP2OuDSIxbUQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YTRi/ZGNkMzNkYWM5OTVm/Y2Q5Y2ZjNzA3Y2Qz/YWFmMC5wbmc.jpg"/>
      <itunes:duration>3216</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Episode Description: </strong> </p><p>Every device around you is collecting data about you and everyone you interact with. Amazon Echo recordings are being subpoenaed in murder trials. Period tracking apps are being used to prosecute women. Ancestry websites are revealing family secrets. We're participants in the largest social experiment in human history—and we never opted in.</p><p>In this episode of SecureTalk, host Justin Beals sits down with Dr. Aram Sinnreich and Jesse Gilbert, co-authors of "The Secret Life of Data," to explore a revolutionary approach to digital security: data kindness.</p><p><strong>🎯 KEY TOPICS COVERED:</strong> • Why our biggest security threat is social fragmentation, not just technical vulnerabilities • How tech companies profit from division (anger drives 5x more engagement than approval) • The food allergy transformation: how society changed practices organically in 20 years • Practical data kindness: simple actions that rebuild digital trust • Why cooperation is our best defense in an age of surveillance • How to reclaim agency over your digital life</p><p><strong>🚨 CRITICAL INSIGHTS:</strong></p><ul><li>We can't rely on tech companies (profit over people) or Congress (no data protection laws passed)</li><li>Change must happen from the ground up through shared cultural practices</li><li>Simple acts like unplugging smart devices for guests or consulting family before DNA uploads matter</li><li>Divided societies are vulnerable societies—cooperation is a security strategy</li></ul><p><strong>👥 ABOUT THE GUESTS: </strong></p><p><strong>Dr. Aram Sinnreich </strong>serves as a Professor and Graduate Director within the Communication Studies department at American University’s School of Communication. </p><p>His research addresses the convergence of culture, law, and technology, focusing particularly on topics such as surveillance and privacy, intellectual property, digital rights, digital culture, democracy, governance, and music. </p><p>Sinnreich has authored five books: Mashed Up (2010), The Piracy Crusade (2013), The Essential Guide to Intellectual Property (2019), the science fiction novel A Second Chance for Yesterday (2023; coauthored with Rachel Hope Cleves as R.A. Sinn), and <a href="https://youtu.be/jcGLrMTRTDE?si=YmsHH0h0GxOsvIRA">The Secret Life of Data</a> (2024; coauthored with Jesse Gilbert). </p><p>Additionally, his writing has appeared in various publications including The New York Times, Billboard, Wired, The Daily Beast, and Rolling Stone. He is a core faculty member of the SOC doctoral program and the MA in Media, Technology &amp; Democracy, regularly collaborating with SOC graduate students on research publications and projects. </p><p><strong>Jesse Gilbert</strong> is an interdisciplinary artist focused on the convergence of visual art, sound, and software design through his firm, Dark Matter Media. He previously served as the founding Chair of the Media Technology department at Woodbury University and has taught interactive software design at CalArts and UC San Diego.</p><p>Since 2010, Gilbert's work has revolved around his innovative software, SpectralGL, which is an interactive listening instrument that creates real-time visual landscapes in response to sound. Drawing on his background as a composer, sound designer, and lifelong technologist, his creative output investigates the phenomenological aspects of listening through improvisation and collaborative dialogue. His work has been showcased at numerous concert halls, festivals, and projection-mapped installations worldwide.</p><p>In 2007, Gilbert co-founded Dark Matter Media LLC to facilitate his independent creative projects and provide consultancy on emerging technologies across various public and private environments. From 2011 to 2017, he held the founding Chair position in the Department of Media Technology at Woodbury University and taught interactive software design at both CalArts and UC San Diego.</p><p>After documenting the problems in their first book, Aram and Jesse recently published insights in Time Magazine and are working on a new book about building cooperative societies with kindness embedded in technology design.</p><p><strong>🔗 CONNECT WITH SECURETALK:</strong> • Subscribe for weekly cybersecurity insights • Follow Justin Beals on LinkedIn • </p><p><strong>RESOURCES:</strong></p><p><strong>Sinnreich, A., &amp; Gilbert, J. (2025, April 3). How to be kind in a world that's always monitoring you. </strong><strong><em>Time Magazine</em></strong><strong>. </strong><a href="https://time.com/7273469/data-monitoring-kindness-essay/"><strong>https://time.com/7273469/data-monitoring-kindness-essay/</strong></a></p><p><a href="https://mitpress.mit.edu/9780262048811/the-secret-life-of-data/"><strong>Sinnreich, A., &amp; Gilbert, J. (2024). </strong><strong><em>The secret life of data: Navigating hype and uncertainty in the age of algorithmic surveillance</em></strong><strong>. MIT Press. </strong></a></p><p><a href="/secure-talk-podcast/the-algorithmic-mirror-reflecting-datas-role-in-modern-life"><strong>Beals, J. (Host)</strong>.<strong> (2024, May 14) The Algorithmic Mirror: Reflecting on Data's Role in Modern Life. in Secure Talk Podcast,</strong> <strong>Ep 173 with Aram Sinnreich and Jesse Gilbert </strong></a></p><p> </p>]]>
      </itunes:summary>
      <itunes:keywords>#Cybersecurity #DataPrivacy #AIEthics #DigitalSecurity #Cooperation #SecureTalk #DataKindness #TechEthics #Privacy #Surveillance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e2b465fb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Quantum Security Precipice: Why Michele Mosca is Building Cryptographic Resilience Before It's Too Late</title>
      <itunes:episode>223</itunes:episode>
      <podcast:episode>223</podcast:episode>
      <itunes:title>The Quantum Security Precipice: Why Michele Mosca is Building Cryptographic Resilience Before It's Too Late</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">201e30a7-ab52-4ed2-bc06-627871bc2ee0</guid>
      <link>https://share.transistor.fm/s/60190cd9</link>
      <description>
        <![CDATA[<p><br>***Are you attending the Gartner GRC Summit? If so, come along on our Sunset Trip on June 10, 2025. Register here! <a href="https://www.strikegraph.com/boat-party-2025?utm_source=secure-talk&amp;utm_medium=podcast&amp;utm_campaign=gartner-boat-party">https://www.strikegraph.com/boat-party-2025?utm_source=secure-talk&amp;utm_medium=podcast&amp;utm_campaign=gartner-boat-party</a></p><p><strong><br>Episode Description:</strong> When quantum computing pioneer Michele Mosca met Peter Shor in the 1990s, he thought quantum computing was "science fiction." Now, he's warning that we're just "a few quarters" away from quantum computers capable of shattering the encryption protecting our global financial system, government communications, and critical infrastructure.</p><p>In this must-listen episode, the Oxford-educated mathematician and co-founder of Evolution Q breaks down why symmetric key infrastructure (SKI) and "cryptographic resilience" are essential as quantum computing advances faster than our security preparations. With remarkable clarity, Mosca explains how the nine-year NIST standardization process signals both progress and concerning delays in our quantum readiness.</p><p>The interview explores why most organizations are unprepared, how quantum networks could provide a novel security solution, and what businesses should be doing now to protect their long-term data security. Mosca also details the latest breakthroughs in quantum error correction across ion traps, neutral atoms, and superconducting qubits that are bringing us closer to fault-tolerant quantum computing.</p><p><strong>Key Topics Covered:<br></strong><br></p><ul><li>The evolution of quantum computing from theoretical concept to imminent reality</li><li>How close we are to breaking modern encryption standards</li><li>Evolution Q's innovative approach to quantum resilience</li><li>The concept of symmetric key infrastructure (SKI) as a defense mechanism</li><li>Recent breakthroughs in quantum error correction</li><li>Why organizations need both defense-in-depth and cryptographic diversity</li><li>The limitations of the NIST standardization process and what it means for security<p></p></li></ul><p><strong><br>Episode Highlights:<br></strong><br></p><p><br>"I met Don Coppersmith... he told me he was helping a colleague improve his algorithm where you'd trap these atoms and you'd shine lasers on them, do exponentiation and then do a Fourier transform... I thought he was joking. I'd never heard of this before."</p><p><br>"We look at it as an engineering challenge. Oh, how much does it cost to scale this up? By a factor of 10 or 100 or 1,000, but 1,000, it's like 10 bits of security... It's not that much of a security buffer. The one we're used to in cryptography between what we could break and those we can't, we want an enormous gap."</p><p><strong><br>About the Guest:</strong> Michele Mosca is the CEO and co-founder of evolutionQ, a start-up that provides scalable defense-in-depth with post-quantum cryptography (PQC) and quantum key distribution (QKD) software solutions for cryptographic resilience and quantum-safe security.</p><p>Michele is a renowned expert in cryptography and among the world&amp;#39;s leading experts at the intersection of quantum computing and cybersecurity. He has been instrumental in working with the business community to share the importance of cryptography as a</p><p>critical cybersecurity control protecting both data and communications.</p><p><br></p><p>Prior to evolutionQ, Michele was a founder of the world-leading Institute for Quantum Computing, a Professor in the Department of Combinatorics &amp; Optimization at the University of Waterloo, and a founding member of the Perimeter Institute for Theoretical Physics. His work on quantum computing has been published widely in top journals and textbooks.</p><p><br></p><p>Michele worked on cryptography during his BMath (Waterloo) and MSc (Oxford) and obtained his Doctorate (Oxford) in Quantum Computer Algorithms. He was appointed as a Knight in the Order of Merit by the Government of Italy in 2018. The Knighthood</p><p>recognizes Michele’s contributions in quantum information science and digital security, as well as teaching and outreach.</p><p><br></p><p><strong><br>Connect and Learn More:<br></strong><br></p><ul><li>Stay updated on quantum security developments:<a href="https://quantum-safe.ca/"> quantum-safe.ca</a></li><li>Subscribe to SecureTalk on your favorite podcast platform</li><li>Join the conversation with #QuantumSecurity #PostQuantumCryptography #QuantumThreat #CyberResilience </li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>***Are you attending the Gartner GRC Summit? If so, come along on our Sunset Trip on June 10, 2025. Register here! <a href="https://www.strikegraph.com/boat-party-2025?utm_source=secure-talk&amp;utm_medium=podcast&amp;utm_campaign=gartner-boat-party">https://www.strikegraph.com/boat-party-2025?utm_source=secure-talk&amp;utm_medium=podcast&amp;utm_campaign=gartner-boat-party</a></p><p><strong><br>Episode Description:</strong> When quantum computing pioneer Michele Mosca met Peter Shor in the 1990s, he thought quantum computing was "science fiction." Now, he's warning that we're just "a few quarters" away from quantum computers capable of shattering the encryption protecting our global financial system, government communications, and critical infrastructure.</p><p>In this must-listen episode, the Oxford-educated mathematician and co-founder of Evolution Q breaks down why symmetric key infrastructure (SKI) and "cryptographic resilience" are essential as quantum computing advances faster than our security preparations. With remarkable clarity, Mosca explains how the nine-year NIST standardization process signals both progress and concerning delays in our quantum readiness.</p><p>The interview explores why most organizations are unprepared, how quantum networks could provide a novel security solution, and what businesses should be doing now to protect their long-term data security. Mosca also details the latest breakthroughs in quantum error correction across ion traps, neutral atoms, and superconducting qubits that are bringing us closer to fault-tolerant quantum computing.</p><p><strong>Key Topics Covered:<br></strong><br></p><ul><li>The evolution of quantum computing from theoretical concept to imminent reality</li><li>How close we are to breaking modern encryption standards</li><li>Evolution Q's innovative approach to quantum resilience</li><li>The concept of symmetric key infrastructure (SKI) as a defense mechanism</li><li>Recent breakthroughs in quantum error correction</li><li>Why organizations need both defense-in-depth and cryptographic diversity</li><li>The limitations of the NIST standardization process and what it means for security<p></p></li></ul><p><strong><br>Episode Highlights:<br></strong><br></p><p><br>"I met Don Coppersmith... he told me he was helping a colleague improve his algorithm where you'd trap these atoms and you'd shine lasers on them, do exponentiation and then do a Fourier transform... I thought he was joking. I'd never heard of this before."</p><p><br>"We look at it as an engineering challenge. Oh, how much does it cost to scale this up? By a factor of 10 or 100 or 1,000, but 1,000, it's like 10 bits of security... It's not that much of a security buffer. The one we're used to in cryptography between what we could break and those we can't, we want an enormous gap."</p><p><strong><br>About the Guest:</strong> Michele Mosca is the CEO and co-founder of evolutionQ, a start-up that provides scalable defense-in-depth with post-quantum cryptography (PQC) and quantum key distribution (QKD) software solutions for cryptographic resilience and quantum-safe security.</p><p>Michele is a renowned expert in cryptography and among the world&amp;#39;s leading experts at the intersection of quantum computing and cybersecurity. He has been instrumental in working with the business community to share the importance of cryptography as a</p><p>critical cybersecurity control protecting both data and communications.</p><p><br></p><p>Prior to evolutionQ, Michele was a founder of the world-leading Institute for Quantum Computing, a Professor in the Department of Combinatorics &amp; Optimization at the University of Waterloo, and a founding member of the Perimeter Institute for Theoretical Physics. His work on quantum computing has been published widely in top journals and textbooks.</p><p><br></p><p>Michele worked on cryptography during his BMath (Waterloo) and MSc (Oxford) and obtained his Doctorate (Oxford) in Quantum Computer Algorithms. He was appointed as a Knight in the Order of Merit by the Government of Italy in 2018. The Knighthood</p><p>recognizes Michele’s contributions in quantum information science and digital security, as well as teaching and outreach.</p><p><br></p><p><strong><br>Connect and Learn More:<br></strong><br></p><ul><li>Stay updated on quantum security developments:<a href="https://quantum-safe.ca/"> quantum-safe.ca</a></li><li>Subscribe to SecureTalk on your favorite podcast platform</li><li>Join the conversation with #QuantumSecurity #PostQuantumCryptography #QuantumThreat #CyberResilience </li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 20 May 2025 14:47:33 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/60190cd9/1b445a47.mp3" length="49569849" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-u69Ks91KEdXrN_WzyBy6Dz5X5u7QwqlSbszjMMdmbo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mM2Y2/ZDE2YzRkYjgyZWFm/ZTVhNzkxZDlmMDQ0/OTU2Yy5wbmc.jpg"/>
      <itunes:duration>3094</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>***Are you attending the Gartner GRC Summit? If so, come along on our Sunset Trip on June 10, 2025. Register here! <a href="https://www.strikegraph.com/boat-party-2025?utm_source=secure-talk&amp;utm_medium=podcast&amp;utm_campaign=gartner-boat-party">https://www.strikegraph.com/boat-party-2025?utm_source=secure-talk&amp;utm_medium=podcast&amp;utm_campaign=gartner-boat-party</a></p><p><strong><br>Episode Description:</strong> When quantum computing pioneer Michele Mosca met Peter Shor in the 1990s, he thought quantum computing was "science fiction." Now, he's warning that we're just "a few quarters" away from quantum computers capable of shattering the encryption protecting our global financial system, government communications, and critical infrastructure.</p><p>In this must-listen episode, the Oxford-educated mathematician and co-founder of Evolution Q breaks down why symmetric key infrastructure (SKI) and "cryptographic resilience" are essential as quantum computing advances faster than our security preparations. With remarkable clarity, Mosca explains how the nine-year NIST standardization process signals both progress and concerning delays in our quantum readiness.</p><p>The interview explores why most organizations are unprepared, how quantum networks could provide a novel security solution, and what businesses should be doing now to protect their long-term data security. Mosca also details the latest breakthroughs in quantum error correction across ion traps, neutral atoms, and superconducting qubits that are bringing us closer to fault-tolerant quantum computing.</p><p><strong>Key Topics Covered:<br></strong><br></p><ul><li>The evolution of quantum computing from theoretical concept to imminent reality</li><li>How close we are to breaking modern encryption standards</li><li>Evolution Q's innovative approach to quantum resilience</li><li>The concept of symmetric key infrastructure (SKI) as a defense mechanism</li><li>Recent breakthroughs in quantum error correction</li><li>Why organizations need both defense-in-depth and cryptographic diversity</li><li>The limitations of the NIST standardization process and what it means for security<p></p></li></ul><p><strong><br>Episode Highlights:<br></strong><br></p><p><br>"I met Don Coppersmith... he told me he was helping a colleague improve his algorithm where you'd trap these atoms and you'd shine lasers on them, do exponentiation and then do a Fourier transform... I thought he was joking. I'd never heard of this before."</p><p><br>"We look at it as an engineering challenge. Oh, how much does it cost to scale this up? By a factor of 10 or 100 or 1,000, but 1,000, it's like 10 bits of security... It's not that much of a security buffer. The one we're used to in cryptography between what we could break and those we can't, we want an enormous gap."</p><p><strong><br>About the Guest:</strong> Michele Mosca is the CEO and co-founder of evolutionQ, a start-up that provides scalable defense-in-depth with post-quantum cryptography (PQC) and quantum key distribution (QKD) software solutions for cryptographic resilience and quantum-safe security.</p><p>Michele is a renowned expert in cryptography and among the world&amp;#39;s leading experts at the intersection of quantum computing and cybersecurity. He has been instrumental in working with the business community to share the importance of cryptography as a</p><p>critical cybersecurity control protecting both data and communications.</p><p><br></p><p>Prior to evolutionQ, Michele was a founder of the world-leading Institute for Quantum Computing, a Professor in the Department of Combinatorics &amp; Optimization at the University of Waterloo, and a founding member of the Perimeter Institute for Theoretical Physics. His work on quantum computing has been published widely in top journals and textbooks.</p><p><br></p><p>Michele worked on cryptography during his BMath (Waterloo) and MSc (Oxford) and obtained his Doctorate (Oxford) in Quantum Computer Algorithms. He was appointed as a Knight in the Order of Merit by the Government of Italy in 2018. The Knighthood</p><p>recognizes Michele’s contributions in quantum information science and digital security, as well as teaching and outreach.</p><p><br></p><p><strong><br>Connect and Learn More:<br></strong><br></p><ul><li>Stay updated on quantum security developments:<a href="https://quantum-safe.ca/"> quantum-safe.ca</a></li><li>Subscribe to SecureTalk on your favorite podcast platform</li><li>Join the conversation with #QuantumSecurity #PostQuantumCryptography #QuantumThreat #CyberResilience </li></ul><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, QuantumSecurity, PostQuantumCryptography</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>National Security in Crisis How Geopolitical Chaos Threatens Cybersecurity &amp; Democracy"  SecureTalk with Mike LeFever</title>
      <itunes:episode>222</itunes:episode>
      <podcast:episode>222</podcast:episode>
      <itunes:title>National Security in Crisis How Geopolitical Chaos Threatens Cybersecurity &amp; Democracy"  SecureTalk with Mike LeFever</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7c99bc2a-f92f-494c-9611-966d9ac45ef9</guid>
      <link>https://share.transistor.fm/s/66850c2f</link>
      <description>
        <![CDATA[<p>In this riveting episode of SecureTalk, host Justin Beals welcomes back decorated military leader and security expert Mike LeFever, Executive Vice President of National Security at Concentric, to discuss the intersection of physical security, geopolitical instability, and the future of national defense. From the polarization of American politics to the innovative warfare tactics in Ukraine, this conversation offers cybersecurity professionals an essential perspective on how global security dynamics impact the digital landscape.</p><p><br></p><p>## Key Topics Covered:</p><p>- 🔒 **Physical Security Crisis**: How political polarization has created new security challenges for high-profile individuals and organizations</p><p>- 🌍 **Soft Power Erosion**: The concerning reduction in USAID and diplomatic initiatives and its impact on national security</p><p>- 🇺🇦 **Ukraine's Tech Innovation**: Revolutionary drone warfare tactics and rapid adaptation changing the future of military strategy</p><p>- 💻 **Information Warfare**: The growing "truth decay" problem and how disinformation campaigns are reshaping public discourse</p><p>- 🏛️ **Constitutional Challenges**: Analysis of current governance issues and threats to democratic institutions</p><p>- 🔍 **Leadership in Chaos**: Strategic insights for security professionals navigating turbulent times</p><p><br></p><p>## Episode Highlights:</p><p><br></p><p>### The Business of Protection</p><p>LeFever discusses how Concentric provides comprehensive security for high-net-worth individuals, including physical security, intelligence products, due diligence, and privacy protection in an increasingly polarized environment where public figures face heightened threats.</p><p><br></p><p>### The Crisis in Governance</p><p>The conversation examines concerning trends in the federal workforce, with both experts highlighting how dismissing experienced personnel creates institutional knowledge gaps and damages trust in critical security domains.</p><p><br></p><p>### The Value of Soft Power</p><p>Drawing from his experience leading earthquake relief efforts in Pakistan, LeFever explains how humanitarian initiatives like USAID build crucial international relationships that enhance national security more effectively than purely kinetic operations.</p><p><br></p><p>### Innovations in Modern Warfare</p><p>Analysis of Ukraine's remarkable technological adaptations against Russia, showcasing how smaller forces can effectively counter larger opponents through rapid innovation and precision drone strikes.</p><p><br></p><p>### Leadership Wisdom</p><p>LeFever shares invaluable advice for security leaders navigating chaos: maintain strategic focus on end goals while building resilience against tactical disruptions.</p><p><br></p><p>## About the Guests:</p><p>**Mike LeFever** is Executive Vice President of National Security at Concentric, providing comprehensive physical and privacy security solutions. His distinguished military career included leadership roles in counterterrorism and diplomatic security initiatives across multiple global hotspots.</p><p><br></p><p>**Justin Beals** is the host of SecureTalk and a recognized expert in cybersecurity strategy and implementation.</p><p><br></p><p>## Connect &amp; Learn More:</p><p>- Visit www.securetalk.com For more episodes</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this riveting episode of SecureTalk, host Justin Beals welcomes back decorated military leader and security expert Mike LeFever, Executive Vice President of National Security at Concentric, to discuss the intersection of physical security, geopolitical instability, and the future of national defense. From the polarization of American politics to the innovative warfare tactics in Ukraine, this conversation offers cybersecurity professionals an essential perspective on how global security dynamics impact the digital landscape.</p><p><br></p><p>## Key Topics Covered:</p><p>- 🔒 **Physical Security Crisis**: How political polarization has created new security challenges for high-profile individuals and organizations</p><p>- 🌍 **Soft Power Erosion**: The concerning reduction in USAID and diplomatic initiatives and its impact on national security</p><p>- 🇺🇦 **Ukraine's Tech Innovation**: Revolutionary drone warfare tactics and rapid adaptation changing the future of military strategy</p><p>- 💻 **Information Warfare**: The growing "truth decay" problem and how disinformation campaigns are reshaping public discourse</p><p>- 🏛️ **Constitutional Challenges**: Analysis of current governance issues and threats to democratic institutions</p><p>- 🔍 **Leadership in Chaos**: Strategic insights for security professionals navigating turbulent times</p><p><br></p><p>## Episode Highlights:</p><p><br></p><p>### The Business of Protection</p><p>LeFever discusses how Concentric provides comprehensive security for high-net-worth individuals, including physical security, intelligence products, due diligence, and privacy protection in an increasingly polarized environment where public figures face heightened threats.</p><p><br></p><p>### The Crisis in Governance</p><p>The conversation examines concerning trends in the federal workforce, with both experts highlighting how dismissing experienced personnel creates institutional knowledge gaps and damages trust in critical security domains.</p><p><br></p><p>### The Value of Soft Power</p><p>Drawing from his experience leading earthquake relief efforts in Pakistan, LeFever explains how humanitarian initiatives like USAID build crucial international relationships that enhance national security more effectively than purely kinetic operations.</p><p><br></p><p>### Innovations in Modern Warfare</p><p>Analysis of Ukraine's remarkable technological adaptations against Russia, showcasing how smaller forces can effectively counter larger opponents through rapid innovation and precision drone strikes.</p><p><br></p><p>### Leadership Wisdom</p><p>LeFever shares invaluable advice for security leaders navigating chaos: maintain strategic focus on end goals while building resilience against tactical disruptions.</p><p><br></p><p>## About the Guests:</p><p>**Mike LeFever** is Executive Vice President of National Security at Concentric, providing comprehensive physical and privacy security solutions. His distinguished military career included leadership roles in counterterrorism and diplomatic security initiatives across multiple global hotspots.</p><p><br></p><p>**Justin Beals** is the host of SecureTalk and a recognized expert in cybersecurity strategy and implementation.</p><p><br></p><p>## Connect &amp; Learn More:</p><p>- Visit www.securetalk.com For more episodes</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 13 May 2025 15:27:12 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/66850c2f/5ceb9397.mp3" length="115852276" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mT6oBMdia1wcKG_i7gkkTKgDLZm2r8stTjLDtxBRWIw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGI0/MTA3ODY4MTZkYTIz/MGE5ZThhYjc3Njg4/YzM4MS5wbmc.jpg"/>
      <itunes:duration>2894</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this riveting episode of SecureTalk, host Justin Beals welcomes back decorated military leader and security expert Mike LeFever, Executive Vice President of National Security at Concentric, to discuss the intersection of physical security, geopolitical instability, and the future of national defense. From the polarization of American politics to the innovative warfare tactics in Ukraine, this conversation offers cybersecurity professionals an essential perspective on how global security dynamics impact the digital landscape.</p><p><br></p><p>## Key Topics Covered:</p><p>- 🔒 **Physical Security Crisis**: How political polarization has created new security challenges for high-profile individuals and organizations</p><p>- 🌍 **Soft Power Erosion**: The concerning reduction in USAID and diplomatic initiatives and its impact on national security</p><p>- 🇺🇦 **Ukraine's Tech Innovation**: Revolutionary drone warfare tactics and rapid adaptation changing the future of military strategy</p><p>- 💻 **Information Warfare**: The growing "truth decay" problem and how disinformation campaigns are reshaping public discourse</p><p>- 🏛️ **Constitutional Challenges**: Analysis of current governance issues and threats to democratic institutions</p><p>- 🔍 **Leadership in Chaos**: Strategic insights for security professionals navigating turbulent times</p><p><br></p><p>## Episode Highlights:</p><p><br></p><p>### The Business of Protection</p><p>LeFever discusses how Concentric provides comprehensive security for high-net-worth individuals, including physical security, intelligence products, due diligence, and privacy protection in an increasingly polarized environment where public figures face heightened threats.</p><p><br></p><p>### The Crisis in Governance</p><p>The conversation examines concerning trends in the federal workforce, with both experts highlighting how dismissing experienced personnel creates institutional knowledge gaps and damages trust in critical security domains.</p><p><br></p><p>### The Value of Soft Power</p><p>Drawing from his experience leading earthquake relief efforts in Pakistan, LeFever explains how humanitarian initiatives like USAID build crucial international relationships that enhance national security more effectively than purely kinetic operations.</p><p><br></p><p>### Innovations in Modern Warfare</p><p>Analysis of Ukraine's remarkable technological adaptations against Russia, showcasing how smaller forces can effectively counter larger opponents through rapid innovation and precision drone strikes.</p><p><br></p><p>### Leadership Wisdom</p><p>LeFever shares invaluable advice for security leaders navigating chaos: maintain strategic focus on end goals while building resilience against tactical disruptions.</p><p><br></p><p>## About the Guests:</p><p>**Mike LeFever** is Executive Vice President of National Security at Concentric, providing comprehensive physical and privacy security solutions. His distinguished military career included leadership roles in counterterrorism and diplomatic security initiatives across multiple global hotspots.</p><p><br></p><p>**Justin Beals** is the host of SecureTalk and a recognized expert in cybersecurity strategy and implementation.</p><p><br></p><p>## Connect &amp; Learn More:</p><p>- Visit www.securetalk.com For more episodes</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Russian Disinformation Networks Are Poisoning AI Chatbots | SecureTalk with NewsGuard Experts</title>
      <itunes:episode>221</itunes:episode>
      <podcast:episode>221</podcast:episode>
      <itunes:title>How Russian Disinformation Networks Are Poisoning AI Chatbots | SecureTalk with NewsGuard Experts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b764cec7-f3f4-4708-bb92-dd428d4cd806</guid>
      <link>https://share.transistor.fm/s/50480b60</link>
      <description>
        <![CDATA[<p><strong><br>Episode Summary:</strong> In this eye-opening episode of Secure Talk, host Justin Beals investigates how foreign disinformation campaigns have evolved to target AI systems. NewsGuard researchers McKenzie Sadeghi and Isis Blachez reveal their groundbreaking investigation into the Moscow-based Pravda network that has successfully infiltrated Western AI chatbots, creating a new frontier in information warfare that bypasses human readers to directly corrupt the technology we rely on for information.</p><p><strong>Key Insights:<br></strong><br></p><ul><li>Leading AI chatbots repeated Russian disinformation 33% of the time when tested on key geopolitical topics</li><li>The Pravda network has expanded from 50 to over 150 websites specifically designed to influence AI training data</li><li>Modern disinformation operations now prioritize "LLM grooming" over targeting human readers</li><li>Even when AI systems attempt to debunk false claims, they often cite unreliable sources, further legitimizing them</li><li>Human oversight remains essential as these networks constantly evolve to evade automated detection<p></p></li></ul><p><strong>Notable Quotes:</strong> "Bad actors are targeting AI models to get their information to appear in those responses, but they're also weaponizing AI to produce disinformation at scale." - McKenzie Sadeghi</p><p>"What is changing is really the delivery of the disinformation... it's reaching a much larger audience and an audience that's not targeted as specifically because now practically anyone is using ChatGPT or other chatbots." - Isis Blachez</p><p>"This network does not invest any money or resources into spreading its content online... It's sort of serving as a centralized hub. And as a result, it appears very high not only in search results but also in chatbot responses." - McKenzie Sadeghi</p><p><strong><br>Resources: <br></strong><br></p><p>Sadeghi, M., &amp; Blachez, I. (2025, March 6). A well-funded Moscow-based global disinformation network. NewsGuard Reality Check. https://www.newsguardrealitycheck.com/p/a-well-funded-moscow-based-global</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong><br>Episode Summary:</strong> In this eye-opening episode of Secure Talk, host Justin Beals investigates how foreign disinformation campaigns have evolved to target AI systems. NewsGuard researchers McKenzie Sadeghi and Isis Blachez reveal their groundbreaking investigation into the Moscow-based Pravda network that has successfully infiltrated Western AI chatbots, creating a new frontier in information warfare that bypasses human readers to directly corrupt the technology we rely on for information.</p><p><strong>Key Insights:<br></strong><br></p><ul><li>Leading AI chatbots repeated Russian disinformation 33% of the time when tested on key geopolitical topics</li><li>The Pravda network has expanded from 50 to over 150 websites specifically designed to influence AI training data</li><li>Modern disinformation operations now prioritize "LLM grooming" over targeting human readers</li><li>Even when AI systems attempt to debunk false claims, they often cite unreliable sources, further legitimizing them</li><li>Human oversight remains essential as these networks constantly evolve to evade automated detection<p></p></li></ul><p><strong>Notable Quotes:</strong> "Bad actors are targeting AI models to get their information to appear in those responses, but they're also weaponizing AI to produce disinformation at scale." - McKenzie Sadeghi</p><p>"What is changing is really the delivery of the disinformation... it's reaching a much larger audience and an audience that's not targeted as specifically because now practically anyone is using ChatGPT or other chatbots." - Isis Blachez</p><p>"This network does not invest any money or resources into spreading its content online... It's sort of serving as a centralized hub. And as a result, it appears very high not only in search results but also in chatbot responses." - McKenzie Sadeghi</p><p><strong><br>Resources: <br></strong><br></p><p>Sadeghi, M., &amp; Blachez, I. (2025, March 6). A well-funded Moscow-based global disinformation network. NewsGuard Reality Check. https://www.newsguardrealitycheck.com/p/a-well-funded-moscow-based-global</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 May 2025 16:16:32 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/50480b60/9a0accc3.mp3" length="104379248" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BaARmzo7HUPHCjlCbLTodIQOhDjiwvYUZ3lhlGva6Ws/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YTIz/OWEzNWI1YmYwY2Fm/Y2I4NzU0OTVkYzhl/MzE5Yi5wbmc.jpg"/>
      <itunes:duration>2608</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong><br>Episode Summary:</strong> In this eye-opening episode of Secure Talk, host Justin Beals investigates how foreign disinformation campaigns have evolved to target AI systems. NewsGuard researchers McKenzie Sadeghi and Isis Blachez reveal their groundbreaking investigation into the Moscow-based Pravda network that has successfully infiltrated Western AI chatbots, creating a new frontier in information warfare that bypasses human readers to directly corrupt the technology we rely on for information.</p><p><strong>Key Insights:<br></strong><br></p><ul><li>Leading AI chatbots repeated Russian disinformation 33% of the time when tested on key geopolitical topics</li><li>The Pravda network has expanded from 50 to over 150 websites specifically designed to influence AI training data</li><li>Modern disinformation operations now prioritize "LLM grooming" over targeting human readers</li><li>Even when AI systems attempt to debunk false claims, they often cite unreliable sources, further legitimizing them</li><li>Human oversight remains essential as these networks constantly evolve to evade automated detection<p></p></li></ul><p><strong>Notable Quotes:</strong> "Bad actors are targeting AI models to get their information to appear in those responses, but they're also weaponizing AI to produce disinformation at scale." - McKenzie Sadeghi</p><p>"What is changing is really the delivery of the disinformation... it's reaching a much larger audience and an audience that's not targeted as specifically because now practically anyone is using ChatGPT or other chatbots." - Isis Blachez</p><p>"This network does not invest any money or resources into spreading its content online... It's sort of serving as a centralized hub. And as a result, it appears very high not only in search results but also in chatbot responses." - McKenzie Sadeghi</p><p><strong><br>Resources: <br></strong><br></p><p>Sadeghi, M., &amp; Blachez, I. (2025, March 6). A well-funded Moscow-based global disinformation network. NewsGuard Reality Check. https://www.newsguardrealitycheck.com/p/a-well-funded-moscow-based-global</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Ai, Aisecurity, InformationSecurity, Disinformation, Aiethics</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Future of APIs in the Age of AI Agents A Conversation with Postman's Sam Chehab</title>
      <itunes:episode>220</itunes:episode>
      <podcast:episode>220</podcast:episode>
      <itunes:title>The Future of APIs in the Age of AI Agents A Conversation with Postman's Sam Chehab</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">be5cb7b7-f912-47e4-a1df-de25b4a4f673</guid>
      <link>https://share.transistor.fm/s/bd477b24</link>
      <description>
        <![CDATA[<p><br>In this episode of SecureTalk, host Justin Beals explores the evolving world of API technology and security with Sam Chehab, Head of Security at Postman - the platform used by over 35 million developers and 90% of Fortune 500 companies.</p><p><strong><br>Episode Insights:<br></strong><br></p><ul><li><strong>Postman's Strategic Position</strong>: Learn why Sam joined Postman in September 2024 and how they're positioned to be the connective tissue for the emerging AI agent ecosystem</li><li><strong>APIs as Agent Infrastructure</strong>: Sam explains how Postman's catalog of hundreds of thousands of documented APIs creates the perfect foundation for AI agent interactions</li><li><strong>Security by Design</strong>: Discover how Postman is embedding security throughout the API lifecycle - from conception to deployment</li><li><strong>The Human Factor in Security</strong>: Why security remains a collaborative responsibility across organizations and how to foster a security-minded culture</li><li><strong>Next-Gen Challenges</strong>: Sam's perspective on balancing innovation with fundamental security hygiene concerns like supply chain vulnerabilities<p></p></li></ul><p><br>"I see such a larger ecosystem that's really going to get built here beyond what's out in the market today," says Sam, discussing how Postman will facilitate human-agent collaboration in building the next generation of applications.</p><p><br>Sam brings unique insights from his previous roles at technology giants like Palo Alto Networks and NVIDIA, where he once demonstrated an early chatbot prototype to Jensen Huang himself. His experience taking products through rigorous FedRAMP certification processes provides a valuable perspective on enterprise-grade security implementation.</p><p><br>This episode offers essential insights for developers, security professionals, and technology leaders interested in the intersection of APIs, AI, and enterprise security in today's rapidly evolving digital landscape.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>In this episode of SecureTalk, host Justin Beals explores the evolving world of API technology and security with Sam Chehab, Head of Security at Postman - the platform used by over 35 million developers and 90% of Fortune 500 companies.</p><p><strong><br>Episode Insights:<br></strong><br></p><ul><li><strong>Postman's Strategic Position</strong>: Learn why Sam joined Postman in September 2024 and how they're positioned to be the connective tissue for the emerging AI agent ecosystem</li><li><strong>APIs as Agent Infrastructure</strong>: Sam explains how Postman's catalog of hundreds of thousands of documented APIs creates the perfect foundation for AI agent interactions</li><li><strong>Security by Design</strong>: Discover how Postman is embedding security throughout the API lifecycle - from conception to deployment</li><li><strong>The Human Factor in Security</strong>: Why security remains a collaborative responsibility across organizations and how to foster a security-minded culture</li><li><strong>Next-Gen Challenges</strong>: Sam's perspective on balancing innovation with fundamental security hygiene concerns like supply chain vulnerabilities<p></p></li></ul><p><br>"I see such a larger ecosystem that's really going to get built here beyond what's out in the market today," says Sam, discussing how Postman will facilitate human-agent collaboration in building the next generation of applications.</p><p><br>Sam brings unique insights from his previous roles at technology giants like Palo Alto Networks and NVIDIA, where he once demonstrated an early chatbot prototype to Jensen Huang himself. His experience taking products through rigorous FedRAMP certification processes provides a valuable perspective on enterprise-grade security implementation.</p><p><br>This episode offers essential insights for developers, security professionals, and technology leaders interested in the intersection of APIs, AI, and enterprise security in today's rapidly evolving digital landscape.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Apr 2025 15:31:49 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/bd477b24/b3d961d4.mp3" length="110548359" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vSh5RHmMHUGz8qaQJ-9_sVDS44VxXQBs3V1JhkUTFDE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NmM3/ODcxZWM5MTgyNTFk/YmM3YWViM2RkZTBl/Yzc0My5wbmc.jpg"/>
      <itunes:duration>2761</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>In this episode of SecureTalk, host Justin Beals explores the evolving world of API technology and security with Sam Chehab, Head of Security at Postman - the platform used by over 35 million developers and 90% of Fortune 500 companies.</p><p><strong><br>Episode Insights:<br></strong><br></p><ul><li><strong>Postman's Strategic Position</strong>: Learn why Sam joined Postman in September 2024 and how they're positioned to be the connective tissue for the emerging AI agent ecosystem</li><li><strong>APIs as Agent Infrastructure</strong>: Sam explains how Postman's catalog of hundreds of thousands of documented APIs creates the perfect foundation for AI agent interactions</li><li><strong>Security by Design</strong>: Discover how Postman is embedding security throughout the API lifecycle - from conception to deployment</li><li><strong>The Human Factor in Security</strong>: Why security remains a collaborative responsibility across organizations and how to foster a security-minded culture</li><li><strong>Next-Gen Challenges</strong>: Sam's perspective on balancing innovation with fundamental security hygiene concerns like supply chain vulnerabilities<p></p></li></ul><p><br>"I see such a larger ecosystem that's really going to get built here beyond what's out in the market today," says Sam, discussing how Postman will facilitate human-agent collaboration in building the next generation of applications.</p><p><br>Sam brings unique insights from his previous roles at technology giants like Palo Alto Networks and NVIDIA, where he once demonstrated an early chatbot prototype to Jensen Huang himself. His experience taking products through rigorous FedRAMP certification processes provides a valuable perspective on enterprise-grade security implementation.</p><p><br>This episode offers essential insights for developers, security professionals, and technology leaders interested in the intersection of APIs, AI, and enterprise security in today's rapidly evolving digital landscape.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Ai, AiAgents, Postman</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Beyond the Blinky Lights: Why Security Governance Drives Technology with Bryant Tow</title>
      <itunes:episode>219</itunes:episode>
      <podcast:episode>219</podcast:episode>
      <itunes:title>Beyond the Blinky Lights: Why Security Governance Drives Technology with Bryant Tow</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5f678319-dfd5-4334-a3b8-77f5a8372c78</guid>
      <link>https://share.transistor.fm/s/3c4efadd</link>
      <description>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people, and processes. The conversation explores real-world examples like the Change Healthcare breach, why security frameworks often fall short, and how building a culture of security requires connecting protection of company assets to personal security concerns.</p><p><strong>Key Topics</strong></p><ul><li>The Change Healthcare breach: How a single oversight led to a $2.9 billion loss despite substantial technology investments</li><li>Why frameworks like CIS are great starting points but insufficient on their own</li><li>How the "Ring of Security" approach addresses the complete attack surface</li><li>Building a security culture that resonates with employees on a personal level</li><li>Why a business impact analysis is critical but often missing from frameworks</li><li>The importance of understanding your data before implementing AI solutions<p></p></li></ul><p><strong>Notable Quotes</strong></p><p><br>"When you do the root cause analysis on headline breaches, nearly all of them started somewhere outside the technology." - Bryant Tow</p><p>"Even if you do your technology perfectly, you're leaving half of your attack surface open." - Bryant Tow</p><p><br>"Strategy drives governance. Governance drives operation." - Bryant Tow</p><p><strong><br>About the Guest<br></strong><br></p><p><br>Bryant Tow serves as Chief Security Officer at LeapFrog Services, where he assists clients with comprehensive security programs including strategy, governance, and operations. Previously, he owned Cyber Risk Solutions and served on the Department of Homeland Security Sector Coordinating Council. His "Ring of Security" concept emphasizes that cybersecurity is an organizational problem that uses technology as just one tool in the solution.</p><p><strong><br>Resources Mentioned<br></strong><br></p><ul><li>The "Ring of Security" concept</li><li>CIS Framework limitations</li><li>Business Impact Analysis</li><li>AI Readiness Assessment</li><li>Department of Homeland Security Sector Coordinating Council<p></p></li></ul><p><em>SecureTalk is hosted by Justin Beals, focusing on cybersecurity strategy, governance, and best practices for organizations of all sizes.<br></em><br></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people, and processes. The conversation explores real-world examples like the Change Healthcare breach, why security frameworks often fall short, and how building a culture of security requires connecting protection of company assets to personal security concerns.</p><p><strong>Key Topics</strong></p><ul><li>The Change Healthcare breach: How a single oversight led to a $2.9 billion loss despite substantial technology investments</li><li>Why frameworks like CIS are great starting points but insufficient on their own</li><li>How the "Ring of Security" approach addresses the complete attack surface</li><li>Building a security culture that resonates with employees on a personal level</li><li>Why a business impact analysis is critical but often missing from frameworks</li><li>The importance of understanding your data before implementing AI solutions<p></p></li></ul><p><strong>Notable Quotes</strong></p><p><br>"When you do the root cause analysis on headline breaches, nearly all of them started somewhere outside the technology." - Bryant Tow</p><p>"Even if you do your technology perfectly, you're leaving half of your attack surface open." - Bryant Tow</p><p><br>"Strategy drives governance. Governance drives operation." - Bryant Tow</p><p><strong><br>About the Guest<br></strong><br></p><p><br>Bryant Tow serves as Chief Security Officer at LeapFrog Services, where he assists clients with comprehensive security programs including strategy, governance, and operations. Previously, he owned Cyber Risk Solutions and served on the Department of Homeland Security Sector Coordinating Council. His "Ring of Security" concept emphasizes that cybersecurity is an organizational problem that uses technology as just one tool in the solution.</p><p><strong><br>Resources Mentioned<br></strong><br></p><ul><li>The "Ring of Security" concept</li><li>CIS Framework limitations</li><li>Business Impact Analysis</li><li>AI Readiness Assessment</li><li>Department of Homeland Security Sector Coordinating Council<p></p></li></ul><p><em>SecureTalk is hosted by Justin Beals, focusing on cybersecurity strategy, governance, and best practices for organizations of all sizes.<br></em><br></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 22 Apr 2025 15:11:08 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/3c4efadd/9bb201f3.mp3" length="112449960" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ch682pHgJJEzvm47hmEIs_jUtPmkVpLNy3uKXhHSt_E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ODc3/MjA2NGFjMGRhYjJh/ODkwNDNiMTkwMDkz/ZjI5Ni5wbmc.jpg"/>
      <itunes:duration>2810</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals welcomes Bryant Tow, Chief Security Officer at LeapFrog Services, to discuss why technology alone can't solve cybersecurity challenges. Bryant reveals how the "Ring of Security" concept shows that up to half of your attack surface lies outside of technology—in governance, policies, people, and processes. The conversation explores real-world examples like the Change Healthcare breach, why security frameworks often fall short, and how building a culture of security requires connecting protection of company assets to personal security concerns.</p><p><strong>Key Topics</strong></p><ul><li>The Change Healthcare breach: How a single oversight led to a $2.9 billion loss despite substantial technology investments</li><li>Why frameworks like CIS are great starting points but insufficient on their own</li><li>How the "Ring of Security" approach addresses the complete attack surface</li><li>Building a security culture that resonates with employees on a personal level</li><li>Why a business impact analysis is critical but often missing from frameworks</li><li>The importance of understanding your data before implementing AI solutions<p></p></li></ul><p><strong>Notable Quotes</strong></p><p><br>"When you do the root cause analysis on headline breaches, nearly all of them started somewhere outside the technology." - Bryant Tow</p><p>"Even if you do your technology perfectly, you're leaving half of your attack surface open." - Bryant Tow</p><p><br>"Strategy drives governance. Governance drives operation." - Bryant Tow</p><p><strong><br>About the Guest<br></strong><br></p><p><br>Bryant Tow serves as Chief Security Officer at LeapFrog Services, where he assists clients with comprehensive security programs including strategy, governance, and operations. Previously, he owned Cyber Risk Solutions and served on the Department of Homeland Security Sector Coordinating Council. His "Ring of Security" concept emphasizes that cybersecurity is an organizational problem that uses technology as just one tool in the solution.</p><p><strong><br>Resources Mentioned<br></strong><br></p><ul><li>The "Ring of Security" concept</li><li>CIS Framework limitations</li><li>Business Impact Analysis</li><li>AI Readiness Assessment</li><li>Department of Homeland Security Sector Coordinating Council<p></p></li></ul><p><em>SecureTalk is hosted by Justin Beals, focusing on cybersecurity strategy, governance, and best practices for organizations of all sizes.<br></em><br></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From Burning Servers to Enterprise Resilience: The Evolution of Internet Security With Akamai</title>
      <itunes:episode>218</itunes:episode>
      <podcast:episode>218</podcast:episode>
      <itunes:title>From Burning Servers to Enterprise Resilience: The Evolution of Internet Security With Akamai</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2a9b7cd9-f7a8-4dcf-9136-29634bacb719</guid>
      <link>https://share.transistor.fm/s/9cf927fe</link>
      <description>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals welcomes Joe Gronemeyer, Solutions Engineer at Akamai Technologies, for a masterclass in how internet security has evolved from basic content delivery to sophisticated edge protection powering 30% of global web traffic. From stories of literally burning servers in 1999 to today's quantum-resistant cryptography, this conversation tracks the incredible journey of cybersecurity infrastructure.</p><p><br>### Key Highlights:</p><p>- **The Birth of Edge Networks**: How Akamai transformed from emergency content delivery savior to cybersecurity powerhouse</p><p>- **Massive Security Scale**: Processing 26 billion web attacks monthly and analyzing 7 trillion DNS queries daily</p><p><br>- **Zero Trust Evolution**: Why identity-aware proxies are replacing traditional VPNs for enterprise security</p><p>- **Micro-segmentation Explained**: Creating "mini-firewalls" at every endpoint to contain breaches and limit attack radius</p><p>- **Bot Attack Revolution**: The evolution from simple DDoS to sophisticated credential abuse and account takeover attempts</p><p>- **API Security Challenges**: Why APIs have become the new security frontier as other defenses improve</p><p><br>- **Client-Side Security**: How PCI DSS v4 is forcing new approaches to JavaScript security monitoring</p><p><br>- **Quantum-Resistant Future**: Akamai's implementation of NIST-approved quantum-resistant cryptography</p><p><br></p><p><br>### Notable Quotes:</p><p>"If you had our auto rules applied during the Log4J incident, you wouldn't have had to take any action during Christmas - it would have been protecting you automatically." - Joe Gronemeyer</p><p><br>"At some point I think it was in 2011-2012, is when we would start looking at the traffic coming in and protecting websites from attacks as well. So applying security at the edge, keeping the bad actors away from your servers." - Joe Gronemeyer</p><p><br>### About Our Guest:</p><p><br>Joe Gronemeyer serves as a Solutions Engineer at Akamai Technologies with nearly a decade of experience. Previously, he spent 13 years at Accenture as a Senior Manager leading digital solutions for Fortune 500 companies across pharmaceuticals, consumer goods, and telecommunications industries. He holds a BS in Industrial and Systems Engineering from Georgia Tech and is CISSP certified.</p><p><br>### Resources Mentioned:</p><p>- Web Application Firewall (WAF) technology</p><p><br>- Zero Trust Network Access (ZTNA)</p><p>- Enterprise Application Access</p><p><br>- Client-Side Access and Compliance (formerly Page Integrity Manager)</p><p><br>- OWASP Top 10 for web, API, and AI security</p><p>- PCI DSS version 4 compliance requirements</p><p>- NIST standards for quantum-resistant cryptography</p><p>*Don't miss our next episode where we'll continue exploring cutting-edge cybersecurity approaches for enterprise organizations.*</p><p><br>#EdgeSecurity #ZeroTrust #MicroSegmentation #APIProtection #WAF #PCICompliance #QuantumCryptography #CyberDefense</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals welcomes Joe Gronemeyer, Solutions Engineer at Akamai Technologies, for a masterclass in how internet security has evolved from basic content delivery to sophisticated edge protection powering 30% of global web traffic. From stories of literally burning servers in 1999 to today's quantum-resistant cryptography, this conversation tracks the incredible journey of cybersecurity infrastructure.</p><p><br>### Key Highlights:</p><p>- **The Birth of Edge Networks**: How Akamai transformed from emergency content delivery savior to cybersecurity powerhouse</p><p>- **Massive Security Scale**: Processing 26 billion web attacks monthly and analyzing 7 trillion DNS queries daily</p><p><br>- **Zero Trust Evolution**: Why identity-aware proxies are replacing traditional VPNs for enterprise security</p><p>- **Micro-segmentation Explained**: Creating "mini-firewalls" at every endpoint to contain breaches and limit attack radius</p><p>- **Bot Attack Revolution**: The evolution from simple DDoS to sophisticated credential abuse and account takeover attempts</p><p>- **API Security Challenges**: Why APIs have become the new security frontier as other defenses improve</p><p><br>- **Client-Side Security**: How PCI DSS v4 is forcing new approaches to JavaScript security monitoring</p><p><br>- **Quantum-Resistant Future**: Akamai's implementation of NIST-approved quantum-resistant cryptography</p><p><br></p><p><br>### Notable Quotes:</p><p>"If you had our auto rules applied during the Log4J incident, you wouldn't have had to take any action during Christmas - it would have been protecting you automatically." - Joe Gronemeyer</p><p><br>"At some point I think it was in 2011-2012, is when we would start looking at the traffic coming in and protecting websites from attacks as well. So applying security at the edge, keeping the bad actors away from your servers." - Joe Gronemeyer</p><p><br>### About Our Guest:</p><p><br>Joe Gronemeyer serves as a Solutions Engineer at Akamai Technologies with nearly a decade of experience. Previously, he spent 13 years at Accenture as a Senior Manager leading digital solutions for Fortune 500 companies across pharmaceuticals, consumer goods, and telecommunications industries. He holds a BS in Industrial and Systems Engineering from Georgia Tech and is CISSP certified.</p><p><br>### Resources Mentioned:</p><p>- Web Application Firewall (WAF) technology</p><p><br>- Zero Trust Network Access (ZTNA)</p><p>- Enterprise Application Access</p><p><br>- Client-Side Access and Compliance (formerly Page Integrity Manager)</p><p><br>- OWASP Top 10 for web, API, and AI security</p><p>- PCI DSS version 4 compliance requirements</p><p>- NIST standards for quantum-resistant cryptography</p><p>*Don't miss our next episode where we'll continue exploring cutting-edge cybersecurity approaches for enterprise organizations.*</p><p><br>#EdgeSecurity #ZeroTrust #MicroSegmentation #APIProtection #WAF #PCICompliance #QuantumCryptography #CyberDefense</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Apr 2025 14:52:33 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9cf927fe/7ee38932.mp3" length="109635065" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0ffoI1wrD-18McbJFGtxaYd_eRb7_rDqYs3WTRwvVfs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNmQ1/YzQ0ZWRhNWI5ZGRj/YTg1MjQ5OGJjYjg5/NWViNy5wbmc.jpg"/>
      <itunes:duration>2739</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals welcomes Joe Gronemeyer, Solutions Engineer at Akamai Technologies, for a masterclass in how internet security has evolved from basic content delivery to sophisticated edge protection powering 30% of global web traffic. From stories of literally burning servers in 1999 to today's quantum-resistant cryptography, this conversation tracks the incredible journey of cybersecurity infrastructure.</p><p><br>### Key Highlights:</p><p>- **The Birth of Edge Networks**: How Akamai transformed from emergency content delivery savior to cybersecurity powerhouse</p><p>- **Massive Security Scale**: Processing 26 billion web attacks monthly and analyzing 7 trillion DNS queries daily</p><p><br>- **Zero Trust Evolution**: Why identity-aware proxies are replacing traditional VPNs for enterprise security</p><p>- **Micro-segmentation Explained**: Creating "mini-firewalls" at every endpoint to contain breaches and limit attack radius</p><p>- **Bot Attack Revolution**: The evolution from simple DDoS to sophisticated credential abuse and account takeover attempts</p><p>- **API Security Challenges**: Why APIs have become the new security frontier as other defenses improve</p><p><br>- **Client-Side Security**: How PCI DSS v4 is forcing new approaches to JavaScript security monitoring</p><p><br>- **Quantum-Resistant Future**: Akamai's implementation of NIST-approved quantum-resistant cryptography</p><p><br></p><p><br>### Notable Quotes:</p><p>"If you had our auto rules applied during the Log4J incident, you wouldn't have had to take any action during Christmas - it would have been protecting you automatically." - Joe Gronemeyer</p><p><br>"At some point I think it was in 2011-2012, is when we would start looking at the traffic coming in and protecting websites from attacks as well. So applying security at the edge, keeping the bad actors away from your servers." - Joe Gronemeyer</p><p><br>### About Our Guest:</p><p><br>Joe Gronemeyer serves as a Solutions Engineer at Akamai Technologies with nearly a decade of experience. Previously, he spent 13 years at Accenture as a Senior Manager leading digital solutions for Fortune 500 companies across pharmaceuticals, consumer goods, and telecommunications industries. He holds a BS in Industrial and Systems Engineering from Georgia Tech and is CISSP certified.</p><p><br>### Resources Mentioned:</p><p>- Web Application Firewall (WAF) technology</p><p><br>- Zero Trust Network Access (ZTNA)</p><p>- Enterprise Application Access</p><p><br>- Client-Side Access and Compliance (formerly Page Integrity Manager)</p><p><br>- OWASP Top 10 for web, API, and AI security</p><p>- PCI DSS version 4 compliance requirements</p><p>- NIST standards for quantum-resistant cryptography</p><p>*Don't miss our next episode where we'll continue exploring cutting-edge cybersecurity approaches for enterprise organizations.*</p><p><br>#EdgeSecurity #ZeroTrust #MicroSegmentation #APIProtection #WAF #PCICompliance #QuantumCryptography #CyberDefense</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>#EdgeSecurity #ZeroTrust #MicroSegmentation #APIProtection #WAF #PCICompliance #QuantumCryptography #CyberDefense</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>"There's No Such Thing as Crypto Crime": Nick Furneaux on Blockchain Investigation, Digital Forensics, and the Future of Cryptocurrency</title>
      <itunes:episode>217</itunes:episode>
      <podcast:episode>217</podcast:episode>
      <itunes:title>"There's No Such Thing as Crypto Crime": Nick Furneaux on Blockchain Investigation, Digital Forensics, and the Future of Cryptocurrency</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d787f448-45cf-460b-b5d1-9fee1341905e</guid>
      <link>https://share.transistor.fm/s/54a38fad</link>
      <description>
        <![CDATA[<p><br></p><p>In this eye-opening episode of SecureTalk, host Justin Beals sits down with Nick Furneaux, renowned cryptocurrency investigator and author of the provocatively titled book "There's No Such Thing as Crypto Crime." Furneaux shares his extensive expertise on blockchain technology, cryptocurrency investigations, and the evolving landscape of digital financial crimes.</p><p><br></p><p>Key Topics Discussed:</p><p><br></p><p>The meaning behind Furneaux's book title "There's No Such Thing as Crypto Crime" and why traditional investigation skills remain relevant</p><ul><li>The fundamental differences between Bitcoin and newer cryptocurrencies like Ethereum and Solana</li><li>How blockchain technology actually helps investigators through its open ledger system</li><li>The mechanics behind "rug pulls" and other crypto-related scams</li><li>The role of mining in cryptocurrency ownership and value</li><li>How TRM Forensics tools help trace illicit cryptocurrency transactions</li><li>The concerning rise of human trafficking in crypto scam operations</li><li>How AI is transforming both criminal schemes and investigation techniques<p></p></li></ul><p>Notable Quotes:</p><p>"There is no such thing as a crypto-only crime. There is no new criminal category. There is just a new payment mechanism." - Nick Furneaux</p><p><br></p><p>"The Bitcoin source code is some of the most beautiful code ever written. It is extraordinary... and it's never been hacked." - Nick Furneaux</p><p><br></p><p>"We're in a situation now where the victim is a victim, and the scammer is a victim." - Nick Furneaux on trafficking in scam compounds</p><p>About Nick Furneaux:</p><p>Nick Furneaux is a digital forensics expert, cryptocurrency investigator, and cybersecurity specialist. He has worked in digital forensics for many years and is known for his expertise in cryptocurrency investigations. He has served as a trainer and consultant for law enforcement agencies and private organizations on matters related to digital forensics and cryptocurrency tracing.</p><p><br></p><p>He is the author of *There’s No Such Thing as Cryptocrime* (2024) and *Investigating Cryptocurrencies* (2018). He has trained thousands of investigators in the essential skills needed to track cryptocurrencies involved in criminal activities. Currently, he works as a Blockchain Intelligence Expert and Master Trainer at TRM Labs and serves as an advisor to the Board of Asset Reality.</p><p><strong>Resources Mentioned:</strong></p><p><br></p><p>Book: "There's No Such Thing as Crypto Crime" by Nick Furneaux <a href="https://www.amazon.com/Theres-Such-Thing-Crypto-Crime/dp/1394164823">(link)</a></p><p>Book: "Investigating Cryptocurrencies" by Nick Furneaux <a href="https://www.amazon.com/Investigating-Cryptocurrencies-Understanding-Extracting-Blockchain-ebook/dp/B07D1D6WBL?ref_=ast_author_dp">(link)</a></p><p>TRM Forensics Investigative Toolkit</p><p>This episode provides invaluable insights for cybersecurity professionals, financial investigators, and anyone interested in understanding cryptocurrency's role in modern digital crime investigations.</p><p><br></p><p>SecureTalk is hosted by Justin Beals, bringing you expert conversations with the leading minds in cybersecurity.</p><p><br></p><p>#Cryptocurrency #BlockchainForensics #CryptoInvestigation #Cybersecurity #DigitalForensics #Bitcoin #Ethereum #CryptoScams #FinancialCrime</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br></p><p>In this eye-opening episode of SecureTalk, host Justin Beals sits down with Nick Furneaux, renowned cryptocurrency investigator and author of the provocatively titled book "There's No Such Thing as Crypto Crime." Furneaux shares his extensive expertise on blockchain technology, cryptocurrency investigations, and the evolving landscape of digital financial crimes.</p><p><br></p><p>Key Topics Discussed:</p><p><br></p><p>The meaning behind Furneaux's book title "There's No Such Thing as Crypto Crime" and why traditional investigation skills remain relevant</p><ul><li>The fundamental differences between Bitcoin and newer cryptocurrencies like Ethereum and Solana</li><li>How blockchain technology actually helps investigators through its open ledger system</li><li>The mechanics behind "rug pulls" and other crypto-related scams</li><li>The role of mining in cryptocurrency ownership and value</li><li>How TRM Forensics tools help trace illicit cryptocurrency transactions</li><li>The concerning rise of human trafficking in crypto scam operations</li><li>How AI is transforming both criminal schemes and investigation techniques<p></p></li></ul><p>Notable Quotes:</p><p>"There is no such thing as a crypto-only crime. There is no new criminal category. There is just a new payment mechanism." - Nick Furneaux</p><p><br></p><p>"The Bitcoin source code is some of the most beautiful code ever written. It is extraordinary... and it's never been hacked." - Nick Furneaux</p><p><br></p><p>"We're in a situation now where the victim is a victim, and the scammer is a victim." - Nick Furneaux on trafficking in scam compounds</p><p>About Nick Furneaux:</p><p>Nick Furneaux is a digital forensics expert, cryptocurrency investigator, and cybersecurity specialist. He has worked in digital forensics for many years and is known for his expertise in cryptocurrency investigations. He has served as a trainer and consultant for law enforcement agencies and private organizations on matters related to digital forensics and cryptocurrency tracing.</p><p><br></p><p>He is the author of *There’s No Such Thing as Cryptocrime* (2024) and *Investigating Cryptocurrencies* (2018). He has trained thousands of investigators in the essential skills needed to track cryptocurrencies involved in criminal activities. Currently, he works as a Blockchain Intelligence Expert and Master Trainer at TRM Labs and serves as an advisor to the Board of Asset Reality.</p><p><strong>Resources Mentioned:</strong></p><p><br></p><p>Book: "There's No Such Thing as Crypto Crime" by Nick Furneaux <a href="https://www.amazon.com/Theres-Such-Thing-Crypto-Crime/dp/1394164823">(link)</a></p><p>Book: "Investigating Cryptocurrencies" by Nick Furneaux <a href="https://www.amazon.com/Investigating-Cryptocurrencies-Understanding-Extracting-Blockchain-ebook/dp/B07D1D6WBL?ref_=ast_author_dp">(link)</a></p><p>TRM Forensics Investigative Toolkit</p><p>This episode provides invaluable insights for cybersecurity professionals, financial investigators, and anyone interested in understanding cryptocurrency's role in modern digital crime investigations.</p><p><br></p><p>SecureTalk is hosted by Justin Beals, bringing you expert conversations with the leading minds in cybersecurity.</p><p><br></p><p>#Cryptocurrency #BlockchainForensics #CryptoInvestigation #Cybersecurity #DigitalForensics #Bitcoin #Ethereum #CryptoScams #FinancialCrime</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Apr 2025 19:57:28 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/54a38fad/b2b0d6b2.mp3" length="116224431" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/mZa1jjn4kdOkyNiawmF3NlX43zVvUoxsNmQ0kGJ_ppk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wYWE1/MTNjMmUyMGI1Yjg3/NjY2MjdiMGQ2MDM5/NjJkMS5wbmc.jpg"/>
      <itunes:duration>2905</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br></p><p>In this eye-opening episode of SecureTalk, host Justin Beals sits down with Nick Furneaux, renowned cryptocurrency investigator and author of the provocatively titled book "There's No Such Thing as Crypto Crime." Furneaux shares his extensive expertise on blockchain technology, cryptocurrency investigations, and the evolving landscape of digital financial crimes.</p><p><br></p><p>Key Topics Discussed:</p><p><br></p><p>The meaning behind Furneaux's book title "There's No Such Thing as Crypto Crime" and why traditional investigation skills remain relevant</p><ul><li>The fundamental differences between Bitcoin and newer cryptocurrencies like Ethereum and Solana</li><li>How blockchain technology actually helps investigators through its open ledger system</li><li>The mechanics behind "rug pulls" and other crypto-related scams</li><li>The role of mining in cryptocurrency ownership and value</li><li>How TRM Forensics tools help trace illicit cryptocurrency transactions</li><li>The concerning rise of human trafficking in crypto scam operations</li><li>How AI is transforming both criminal schemes and investigation techniques<p></p></li></ul><p>Notable Quotes:</p><p>"There is no such thing as a crypto-only crime. There is no new criminal category. There is just a new payment mechanism." - Nick Furneaux</p><p><br></p><p>"The Bitcoin source code is some of the most beautiful code ever written. It is extraordinary... and it's never been hacked." - Nick Furneaux</p><p><br></p><p>"We're in a situation now where the victim is a victim, and the scammer is a victim." - Nick Furneaux on trafficking in scam compounds</p><p>About Nick Furneaux:</p><p>Nick Furneaux is a digital forensics expert, cryptocurrency investigator, and cybersecurity specialist. He has worked in digital forensics for many years and is known for his expertise in cryptocurrency investigations. He has served as a trainer and consultant for law enforcement agencies and private organizations on matters related to digital forensics and cryptocurrency tracing.</p><p><br></p><p>He is the author of *There’s No Such Thing as Cryptocrime* (2024) and *Investigating Cryptocurrencies* (2018). He has trained thousands of investigators in the essential skills needed to track cryptocurrencies involved in criminal activities. Currently, he works as a Blockchain Intelligence Expert and Master Trainer at TRM Labs and serves as an advisor to the Board of Asset Reality.</p><p><strong>Resources Mentioned:</strong></p><p><br></p><p>Book: "There's No Such Thing as Crypto Crime" by Nick Furneaux <a href="https://www.amazon.com/Theres-Such-Thing-Crypto-Crime/dp/1394164823">(link)</a></p><p>Book: "Investigating Cryptocurrencies" by Nick Furneaux <a href="https://www.amazon.com/Investigating-Cryptocurrencies-Understanding-Extracting-Blockchain-ebook/dp/B07D1D6WBL?ref_=ast_author_dp">(link)</a></p><p>TRM Forensics Investigative Toolkit</p><p>This episode provides invaluable insights for cybersecurity professionals, financial investigators, and anyone interested in understanding cryptocurrency's role in modern digital crime investigations.</p><p><br></p><p>SecureTalk is hosted by Justin Beals, bringing you expert conversations with the leading minds in cybersecurity.</p><p><br></p><p>#Cryptocurrency #BlockchainForensics #CryptoInvestigation #Cybersecurity #DigitalForensics #Bitcoin #Ethereum #CryptoScams #FinancialCrime</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cryptocurrency, blockchain, crypto, bitcoin, cryptocrime</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hijacking AI Memory: Inside Johann Rehberger's ChatGPT Security Breakthrough</title>
      <itunes:episode>216</itunes:episode>
      <podcast:episode>216</podcast:episode>
      <itunes:title>Hijacking AI Memory: Inside Johann Rehberger's ChatGPT Security Breakthrough</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1bb7ca47-5d9d-4a77-93d4-bec0767abfac</guid>
      <link>https://share.transistor.fm/s/97d0ecf4</link>
      <description>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals interviews Johann Rehberger, a seasoned cybersecurity expert and Red Team Director at Electronic Arts, about his groundbreaking discovery of a critical vulnerability in ChatGPT's memory system. </p><p><br>Johann shares how his security background and curiosity about AI led him to uncover the "SPAIWARE" attack - a persistent malicious instruction that can be injected into ChatGPT's long-term memory, potentially leading to data exfiltration and other security risks.</p><p><strong>Key Topics Covered</strong></p><ul><li>Johann's journey from Microsoft development consultant to becoming a leading red team expert specializing in AI security</li><li>The discovery of ChatGPT's memory system vulnerability and how it could be exploited</li><li>How traditional security concepts like the CIA security triad (Confidentiality, Integrity, Availability) apply to AI systems</li><li>The development of "SPAIWARE" - a persistent prompt injection attack that can leak user data</li><li>Command and control infrastructure using prompt injection techniques</li><li>The challenges of securing agentic AI systems that can control web browsers and execute tasks</li><li>The evolving relationship between security researchers and AI companies like OpenAI</li></ul><p><strong><br>Notable Quotes<br></strong><br></p><p>"I think using this system is just so important because it can help you. They are so powerful. I started using it daily. But the security mindset of course too, because I use it for my productivity, but I always use it for trying to find the flaws and trying to understand how it works." - Johann Rehberger</p><p><br>"What I did basically was use that technique and then insert that instruction in memory. So that whenever there's a conversation turn, the user has a question, ChatGPT responds. Every single conversation turn will be sent to the third-party server. So this is where the word spyware basically kind of came from." - Johann Rehberger</p><p><br>"The better the models become, the better they follow instructions, including attacker instructions." - Johann Rehberger</p><p><strong><br>About Johann Rehberger<br></strong><br></p><p>Johann Rehberger is the Red Team Director at Electronic Arts with extensive experience in cybersecurity. His career includes roles at Microsoft, where he led the Red Team for Azure Data, and Uber, where he served as Red Team Lead. Johann is known for his pioneering work in AI security, specifically identifying and responsibly disclosing vulnerabilities in large language models like ChatGPT.</p><p><strong><br>Resources Mentioned<br></strong><br></p><ul><li>Johann's blog on machine learning security (https://embracethered.com/blog/index.html)</li><li>Black Hat Europe presentation on ChatGPT security vulnerabilities</li><li>LLM Owasp Top 10 vulnerability classifications<p></p></li></ul><p><strong>Connect With Us<br></strong><br></p><p>Follow SecureTalk for more insights on cybersecurity trends and emerging threats. Visit our website at <a href="http://www.securetalkpodcast.com">www.securetalkpodcast.com</a>  for more episodes and resources.</p><p><br>#AISecurityRisks #PromptInjection #ChatGPT #Cybersecurity #AIVulnerabilities #RedTeaming #SecureTalk</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals interviews Johann Rehberger, a seasoned cybersecurity expert and Red Team Director at Electronic Arts, about his groundbreaking discovery of a critical vulnerability in ChatGPT's memory system. </p><p><br>Johann shares how his security background and curiosity about AI led him to uncover the "SPAIWARE" attack - a persistent malicious instruction that can be injected into ChatGPT's long-term memory, potentially leading to data exfiltration and other security risks.</p><p><strong>Key Topics Covered</strong></p><ul><li>Johann's journey from Microsoft development consultant to becoming a leading red team expert specializing in AI security</li><li>The discovery of ChatGPT's memory system vulnerability and how it could be exploited</li><li>How traditional security concepts like the CIA security triad (Confidentiality, Integrity, Availability) apply to AI systems</li><li>The development of "SPAIWARE" - a persistent prompt injection attack that can leak user data</li><li>Command and control infrastructure using prompt injection techniques</li><li>The challenges of securing agentic AI systems that can control web browsers and execute tasks</li><li>The evolving relationship between security researchers and AI companies like OpenAI</li></ul><p><strong><br>Notable Quotes<br></strong><br></p><p>"I think using this system is just so important because it can help you. They are so powerful. I started using it daily. But the security mindset of course too, because I use it for my productivity, but I always use it for trying to find the flaws and trying to understand how it works." - Johann Rehberger</p><p><br>"What I did basically was use that technique and then insert that instruction in memory. So that whenever there's a conversation turn, the user has a question, ChatGPT responds. Every single conversation turn will be sent to the third-party server. So this is where the word spyware basically kind of came from." - Johann Rehberger</p><p><br>"The better the models become, the better they follow instructions, including attacker instructions." - Johann Rehberger</p><p><strong><br>About Johann Rehberger<br></strong><br></p><p>Johann Rehberger is the Red Team Director at Electronic Arts with extensive experience in cybersecurity. His career includes roles at Microsoft, where he led the Red Team for Azure Data, and Uber, where he served as Red Team Lead. Johann is known for his pioneering work in AI security, specifically identifying and responsibly disclosing vulnerabilities in large language models like ChatGPT.</p><p><strong><br>Resources Mentioned<br></strong><br></p><ul><li>Johann's blog on machine learning security (https://embracethered.com/blog/index.html)</li><li>Black Hat Europe presentation on ChatGPT security vulnerabilities</li><li>LLM Owasp Top 10 vulnerability classifications<p></p></li></ul><p><strong>Connect With Us<br></strong><br></p><p>Follow SecureTalk for more insights on cybersecurity trends and emerging threats. Visit our website at <a href="http://www.securetalkpodcast.com">www.securetalkpodcast.com</a>  for more episodes and resources.</p><p><br>#AISecurityRisks #PromptInjection #ChatGPT #Cybersecurity #AIVulnerabilities #RedTeaming #SecureTalk</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Apr 2025 16:45:00 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/97d0ecf4/84f515db.mp3" length="111616291" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/di7alDH8kDXdg8K6cwHTLhAksxtGnnnKuiDfVy0hHcU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMDRl/MjQyZjljNTE5ZDU2/ZjBhNDczM2JiODli/MDcyZi5wbmc.jpg"/>
      <itunes:duration>2789</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>In this eye-opening episode of SecureTalk, host Justin Beals interviews Johann Rehberger, a seasoned cybersecurity expert and Red Team Director at Electronic Arts, about his groundbreaking discovery of a critical vulnerability in ChatGPT's memory system. </p><p><br>Johann shares how his security background and curiosity about AI led him to uncover the "SPAIWARE" attack - a persistent malicious instruction that can be injected into ChatGPT's long-term memory, potentially leading to data exfiltration and other security risks.</p><p><strong>Key Topics Covered</strong></p><ul><li>Johann's journey from Microsoft development consultant to becoming a leading red team expert specializing in AI security</li><li>The discovery of ChatGPT's memory system vulnerability and how it could be exploited</li><li>How traditional security concepts like the CIA security triad (Confidentiality, Integrity, Availability) apply to AI systems</li><li>The development of "SPAIWARE" - a persistent prompt injection attack that can leak user data</li><li>Command and control infrastructure using prompt injection techniques</li><li>The challenges of securing agentic AI systems that can control web browsers and execute tasks</li><li>The evolving relationship between security researchers and AI companies like OpenAI</li></ul><p><strong><br>Notable Quotes<br></strong><br></p><p>"I think using this system is just so important because it can help you. They are so powerful. I started using it daily. But the security mindset of course too, because I use it for my productivity, but I always use it for trying to find the flaws and trying to understand how it works." - Johann Rehberger</p><p><br>"What I did basically was use that technique and then insert that instruction in memory. So that whenever there's a conversation turn, the user has a question, ChatGPT responds. Every single conversation turn will be sent to the third-party server. So this is where the word spyware basically kind of came from." - Johann Rehberger</p><p><br>"The better the models become, the better they follow instructions, including attacker instructions." - Johann Rehberger</p><p><strong><br>About Johann Rehberger<br></strong><br></p><p>Johann Rehberger is the Red Team Director at Electronic Arts with extensive experience in cybersecurity. His career includes roles at Microsoft, where he led the Red Team for Azure Data, and Uber, where he served as Red Team Lead. Johann is known for his pioneering work in AI security, specifically identifying and responsibly disclosing vulnerabilities in large language models like ChatGPT.</p><p><strong><br>Resources Mentioned<br></strong><br></p><ul><li>Johann's blog on machine learning security (https://embracethered.com/blog/index.html)</li><li>Black Hat Europe presentation on ChatGPT security vulnerabilities</li><li>LLM Owasp Top 10 vulnerability classifications<p></p></li></ul><p><strong>Connect With Us<br></strong><br></p><p>Follow SecureTalk for more insights on cybersecurity trends and emerging threats. Visit our website at <a href="http://www.securetalkpodcast.com">www.securetalkpodcast.com</a>  for more episodes and resources.</p><p><br>#AISecurityRisks #PromptInjection #ChatGPT #Cybersecurity #AIVulnerabilities #RedTeaming #SecureTalk</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>#AISecurityRisks #PromptInjection #ChatGPT #Cybersecurity #AIVulnerabilities #RedTeaming #SecureTalk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Predicting Data Breach Risk: How Mathematical Privacy Is Revolutionizing Data Sharing with Simson Garfinkel</title>
      <itunes:episode>215</itunes:episode>
      <podcast:episode>215</podcast:episode>
      <itunes:title>Predicting Data Breach Risk: How Mathematical Privacy Is Revolutionizing Data Sharing with Simson Garfinkel</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7d59351d-84e6-418c-8fc5-0e319532ac7c</guid>
      <link>https://share.transistor.fm/s/d946c609</link>
      <description>
        <![CDATA[<p>What if there was a way to precisely predict the risk of a major data breach when sharing information? </p><p>In this illuminating episode of Secure Talk, Justin Beals sits down with Simson Garfinkel, renowned computer scientist, journalist, and author who helped implement differential privacy for the U.S. Census Bureau's 2020 census. As a fellow of the American Association for the Advancement of Science, the Association for Computing Machinery, and the IEEE, and with leadership positions at both the Department of Homeland Security and U.S. Census Bureau, Garfinkel offers unparalleled insights into how mathematics is creating an entirely new frontier in privacy protection in his new book “Differential Privacy”.</p><p><br></p><p>Differential privacy is a reliable mathematical framework that quantifies privacy risk or the potential for a major breach. It can transform how organizations understand, measure, and control data exposure. Yet most security, compliance, and legal professionals haven't grasped its revolutionary implications for measuring and predicting a major privacy breach.</p><p><br></p><p>Join Justin and Simson as they reveal:</p><p><br></p><p>- How differential privacy allows organizations to calculate privacy risk with mathematical precision</p><p>- Why this new field of privacy research eliminates guesswork when combining and distributing sensitive data</p><p>- The revolutionary balance between data utility and privacy protection that was previously impossible</p><p>- How forward-thinking organizations are using these mathematical formula to unlock data value safely</p><p><br></p><p>This isn't abstract theory – it's a practical revolution in how we approach data sharing. Garfinkel, who literally wrote the book on "Differential Privacy," shares real-world examples from his work with the U.S. Census Bureau, where differential privacy enabled the release of valuable population data while mathematically predicting individual privacy. In his book, Simson breaks down complex mathematical concepts into clear, actionable insights for security leaders, compliance officers, and legal counsel.</p><p><br></p><p>Listen now to discover how differential privacy is creating a future where data-sharing decisions are based on mathematical certainty rather than best guesses and crossed fingers.</p><p><br>Link to Simson's book: https://mitpress.mit.edu/9780262551656/differential-privacy/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if there was a way to precisely predict the risk of a major data breach when sharing information? </p><p>In this illuminating episode of Secure Talk, Justin Beals sits down with Simson Garfinkel, renowned computer scientist, journalist, and author who helped implement differential privacy for the U.S. Census Bureau's 2020 census. As a fellow of the American Association for the Advancement of Science, the Association for Computing Machinery, and the IEEE, and with leadership positions at both the Department of Homeland Security and U.S. Census Bureau, Garfinkel offers unparalleled insights into how mathematics is creating an entirely new frontier in privacy protection in his new book “Differential Privacy”.</p><p><br></p><p>Differential privacy is a reliable mathematical framework that quantifies privacy risk or the potential for a major breach. It can transform how organizations understand, measure, and control data exposure. Yet most security, compliance, and legal professionals haven't grasped its revolutionary implications for measuring and predicting a major privacy breach.</p><p><br></p><p>Join Justin and Simson as they reveal:</p><p><br></p><p>- How differential privacy allows organizations to calculate privacy risk with mathematical precision</p><p>- Why this new field of privacy research eliminates guesswork when combining and distributing sensitive data</p><p>- The revolutionary balance between data utility and privacy protection that was previously impossible</p><p>- How forward-thinking organizations are using these mathematical formula to unlock data value safely</p><p><br></p><p>This isn't abstract theory – it's a practical revolution in how we approach data sharing. Garfinkel, who literally wrote the book on "Differential Privacy," shares real-world examples from his work with the U.S. Census Bureau, where differential privacy enabled the release of valuable population data while mathematically predicting individual privacy. In his book, Simson breaks down complex mathematical concepts into clear, actionable insights for security leaders, compliance officers, and legal counsel.</p><p><br></p><p>Listen now to discover how differential privacy is creating a future where data-sharing decisions are based on mathematical certainty rather than best guesses and crossed fingers.</p><p><br>Link to Simson's book: https://mitpress.mit.edu/9780262551656/differential-privacy/</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Mar 2025 13:56:33 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d946c609/868ffb64.mp3" length="116869956" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1-0vI-i1Q154WG-Udpweusc5OYxU5kFeur-NQvVWio0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mN2Yw/ZTgwZThlYjg5MWYz/ZjRhYjRjYjY2N2U4/Njc5My5wbmc.jpg"/>
      <itunes:duration>2919</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if there was a way to precisely predict the risk of a major data breach when sharing information? </p><p>In this illuminating episode of Secure Talk, Justin Beals sits down with Simson Garfinkel, renowned computer scientist, journalist, and author who helped implement differential privacy for the U.S. Census Bureau's 2020 census. As a fellow of the American Association for the Advancement of Science, the Association for Computing Machinery, and the IEEE, and with leadership positions at both the Department of Homeland Security and U.S. Census Bureau, Garfinkel offers unparalleled insights into how mathematics is creating an entirely new frontier in privacy protection in his new book “Differential Privacy”.</p><p><br></p><p>Differential privacy is a reliable mathematical framework that quantifies privacy risk or the potential for a major breach. It can transform how organizations understand, measure, and control data exposure. Yet most security, compliance, and legal professionals haven't grasped its revolutionary implications for measuring and predicting a major privacy breach.</p><p><br></p><p>Join Justin and Simson as they reveal:</p><p><br></p><p>- How differential privacy allows organizations to calculate privacy risk with mathematical precision</p><p>- Why this new field of privacy research eliminates guesswork when combining and distributing sensitive data</p><p>- The revolutionary balance between data utility and privacy protection that was previously impossible</p><p>- How forward-thinking organizations are using these mathematical formula to unlock data value safely</p><p><br></p><p>This isn't abstract theory – it's a practical revolution in how we approach data sharing. Garfinkel, who literally wrote the book on "Differential Privacy," shares real-world examples from his work with the U.S. Census Bureau, where differential privacy enabled the release of valuable population data while mathematically predicting individual privacy. In his book, Simson breaks down complex mathematical concepts into clear, actionable insights for security leaders, compliance officers, and legal counsel.</p><p><br></p><p>Listen now to discover how differential privacy is creating a future where data-sharing decisions are based on mathematical certainty rather than best guesses and crossed fingers.</p><p><br>Link to Simson's book: https://mitpress.mit.edu/9780262551656/differential-privacy/</p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d946c609/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The Future of CMMC: Surviving the new Federal Security Landscape with Former NRMC Director Bob Kolasky</title>
      <itunes:episode>214</itunes:episode>
      <podcast:episode>214</podcast:episode>
      <itunes:title>The Future of CMMC: Surviving the new Federal Security Landscape with Former NRMC Director Bob Kolasky</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a8925960-8b83-4117-8cc7-97bb442f9db8</guid>
      <link>https://share.transistor.fm/s/00735565</link>
      <description>
        <![CDATA[<p>How do you secure a nation? Hint: look for the risks to the most critical infrastructure.</p><p><br></p><p>In this critical episode of SecureTalk, host Justin Beals sits down with Robert Kolasky, former founding director of the National Risk Management Center at DHS and current Senior VP for Critical Infrastructure at Exiger. As the new administration implements sweeping changes to federal security requirements, Kolasky provides an insider's perspective on what these shifts mean for contractors, the Defense Industrial Base, and organizations managing critical infrastructure.</p><p><br></p><p>Drawing from his experience protecting everything from elections to the electrical grid, Kolasky offers rare insights into:</p><p><br></p><ul><li>The future of the Cybersecurity Maturity Model Certification (CMMC) program</li><li>How companies can prepare for evolving compliance standards</li><li>The relationship between FedRAMP and other security frameworks</li><li>Emerging hybrid threats to national security</li><li>Supply chain vulnerabilities and third-party risk management</li></ul><p><br></p><p>Whether you're a federal contractor navigating new requirements or a security professional concerned about critical infrastructure protection, this conversation provides essential guidance during a time of unprecedented change in the national security landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you secure a nation? Hint: look for the risks to the most critical infrastructure.</p><p><br></p><p>In this critical episode of SecureTalk, host Justin Beals sits down with Robert Kolasky, former founding director of the National Risk Management Center at DHS and current Senior VP for Critical Infrastructure at Exiger. As the new administration implements sweeping changes to federal security requirements, Kolasky provides an insider's perspective on what these shifts mean for contractors, the Defense Industrial Base, and organizations managing critical infrastructure.</p><p><br></p><p>Drawing from his experience protecting everything from elections to the electrical grid, Kolasky offers rare insights into:</p><p><br></p><ul><li>The future of the Cybersecurity Maturity Model Certification (CMMC) program</li><li>How companies can prepare for evolving compliance standards</li><li>The relationship between FedRAMP and other security frameworks</li><li>Emerging hybrid threats to national security</li><li>Supply chain vulnerabilities and third-party risk management</li></ul><p><br></p><p>Whether you're a federal contractor navigating new requirements or a security professional concerned about critical infrastructure protection, this conversation provides essential guidance during a time of unprecedented change in the national security landscape.</p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Mar 2025 19:30:37 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/00735565/0c3cf9d3.mp3" length="110624968" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/eN0eyOpcNut01m27_x6c6v3ewY7V31q96brn44DX3WI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Ix/NzExOTNlN2IxMDU2/MzU0OWZiMDcxNDkw/OWNmMi5wbmc.jpg"/>
      <itunes:duration>2764</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you secure a nation? Hint: look for the risks to the most critical infrastructure.</p><p><br></p><p>In this critical episode of SecureTalk, host Justin Beals sits down with Robert Kolasky, former founding director of the National Risk Management Center at DHS and current Senior VP for Critical Infrastructure at Exiger. As the new administration implements sweeping changes to federal security requirements, Kolasky provides an insider's perspective on what these shifts mean for contractors, the Defense Industrial Base, and organizations managing critical infrastructure.</p><p><br></p><p>Drawing from his experience protecting everything from elections to the electrical grid, Kolasky offers rare insights into:</p><p><br></p><ul><li>The future of the Cybersecurity Maturity Model Certification (CMMC) program</li><li>How companies can prepare for evolving compliance standards</li><li>The relationship between FedRAMP and other security frameworks</li><li>Emerging hybrid threats to national security</li><li>Supply chain vulnerabilities and third-party risk management</li></ul><p><br></p><p>Whether you're a federal contractor navigating new requirements or a security professional concerned about critical infrastructure protection, this conversation provides essential guidance during a time of unprecedented change in the national security landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>CMMC, Cybersecurity. FedRAMP, DOGE</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Redefining Personhood: The Legal and Ethical Challenges of an Advanced General Intelligence with James Boyle </title>
      <itunes:episode>213</itunes:episode>
      <podcast:episode>213</podcast:episode>
      <itunes:title>Redefining Personhood: The Legal and Ethical Challenges of an Advanced General Intelligence with James Boyle </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7810598f-f5e4-4c06-889c-ff963735737f</guid>
      <link>https://share.transistor.fm/s/b4b5acf1</link>
      <description>
        <![CDATA[<p><br>In a groundbreaking conversation on SecureTalk, legal scholar James Boyle explores the complex landscape of artificial intelligence and biological innovation, challenging our understanding of personhood and consciousness. Drawing from his recent book “The Line: Artificial Intelligence and the Future of Personhood”, Boyle dissects the potential future of artificial general intelligence and biological engineering through the lens of legal and ethical frameworks. We shine a light on how our current technological advancements are forcing us to reexamine fundamental questions about what constitutes a "person" – a journey that parallels historical shifts like human rights and the evolution of corporate personhood.</p><p><br>Boyle also delves into the equally provocative realm of biological engineering, where technologies like CRISPR are blurring the lines between species and challenging our ethical boundaries. He warns that we're entering an era where genetic modifications could fundamentally alter human capabilities, raising critical questions about ownership, consent, and the rights of an invention. For cybersecurity professionals, AI researchers and corporate leaders, Boyle's legal insights offer a crucial roadmap for navigating the complex ethical terrain of emerging technologies, emphasizing the importance of proactive, critical thinking in shaping our technological future.</p><p>You can find the book here: https://scholarship.law.duke.edu/faculty_books/9/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><br>In a groundbreaking conversation on SecureTalk, legal scholar James Boyle explores the complex landscape of artificial intelligence and biological innovation, challenging our understanding of personhood and consciousness. Drawing from his recent book “The Line: Artificial Intelligence and the Future of Personhood”, Boyle dissects the potential future of artificial general intelligence and biological engineering through the lens of legal and ethical frameworks. We shine a light on how our current technological advancements are forcing us to reexamine fundamental questions about what constitutes a "person" – a journey that parallels historical shifts like human rights and the evolution of corporate personhood.</p><p><br>Boyle also delves into the equally provocative realm of biological engineering, where technologies like CRISPR are blurring the lines between species and challenging our ethical boundaries. He warns that we're entering an era where genetic modifications could fundamentally alter human capabilities, raising critical questions about ownership, consent, and the rights of an invention. For cybersecurity professionals, AI researchers and corporate leaders, Boyle's legal insights offer a crucial roadmap for navigating the complex ethical terrain of emerging technologies, emphasizing the importance of proactive, critical thinking in shaping our technological future.</p><p>You can find the book here: https://scholarship.law.duke.edu/faculty_books/9/</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Mar 2025 16:37:44 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b4b5acf1/15e72420.mp3" length="117440734" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/J__h6Hp89VyuO6NOtLjucGl3cefjsOQkmQjULAvlKdk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MmMx/NGE5OTAyOWFjZGJk/MDVmMGJhMTYzNzZm/YmQ4NS5wbmc.jpg"/>
      <itunes:duration>2935</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><br>In a groundbreaking conversation on SecureTalk, legal scholar James Boyle explores the complex landscape of artificial intelligence and biological innovation, challenging our understanding of personhood and consciousness. Drawing from his recent book “The Line: Artificial Intelligence and the Future of Personhood”, Boyle dissects the potential future of artificial general intelligence and biological engineering through the lens of legal and ethical frameworks. We shine a light on how our current technological advancements are forcing us to reexamine fundamental questions about what constitutes a "person" – a journey that parallels historical shifts like human rights and the evolution of corporate personhood.</p><p><br>Boyle also delves into the equally provocative realm of biological engineering, where technologies like CRISPR are blurring the lines between species and challenging our ethical boundaries. He warns that we're entering an era where genetic modifications could fundamentally alter human capabilities, raising critical questions about ownership, consent, and the rights of an invention. For cybersecurity professionals, AI researchers and corporate leaders, Boyle's legal insights offer a crucial roadmap for navigating the complex ethical terrain of emerging technologies, emphasizing the importance of proactive, critical thinking in shaping our technological future.</p><p>You can find the book here: https://scholarship.law.duke.edu/faculty_books/9/</p>]]>
      </itunes:summary>
      <itunes:keywords>Ai, AGI, CreativeCommons, Artificial Intelligence, tech, law, legal, legal personhoodAI regulation, AI legislation, AI ethics, Future of AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Do You Get 10,000 Developers To Write Secure Code? With Dimitry Shvartsman</title>
      <itunes:episode>212</itunes:episode>
      <podcast:episode>212</podcast:episode>
      <itunes:title>How Do You Get 10,000 Developers To Write Secure Code? With Dimitry Shvartsman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c7ca9546-4bad-4df4-ba76-061974d5bd19</guid>
      <link>https://share.transistor.fm/s/7c8c37dc</link>
      <description>
        <![CDATA[<p>If you've ever found yourself frustrated watching deadlines slip by as your development team waits on yet another security review, you're not alone. In today's competitive landscape, companies are caught in a difficult balancing act: move quickly to deliver the features customers want or slow down to ensure those features don't introduce vulnerabilities that could lead to the next headline-making breach.</p><p><br></p><p>Security reviews have become the speed bump on the road to innovation that everyone acknowledges is necessary, but few have figured out how to navigate efficiently. Development teams push for velocity while security teams pull the emergency brake, creating tension that reverberates throughout organizations.</p><p><br></p><p>Today, we're joined by Dimitri Shvartsman, co-founder of Prime Security and prior Head of Cybersecurity at PayPal, to discuss how enterprise organizations are innovating security solutions to reduce the time to feature delivery. We'll explore how AI tools can actually enable rather than impede innovation and examine practical approaches to integrating AI security tools earlier in the development lifecycle.</p><p><br>Whether you're a CISO trying to balance security with business needs, a developer tired of security roadblocks, or a product leader navigating these competing priorities, this conversation will give you actionable insights to transform security from a bottleneck into a business enabler.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>If you've ever found yourself frustrated watching deadlines slip by as your development team waits on yet another security review, you're not alone. In today's competitive landscape, companies are caught in a difficult balancing act: move quickly to deliver the features customers want or slow down to ensure those features don't introduce vulnerabilities that could lead to the next headline-making breach.</p><p><br></p><p>Security reviews have become the speed bump on the road to innovation that everyone acknowledges is necessary, but few have figured out how to navigate efficiently. Development teams push for velocity while security teams pull the emergency brake, creating tension that reverberates throughout organizations.</p><p><br></p><p>Today, we're joined by Dimitri Shvartsman, co-founder of Prime Security and prior Head of Cybersecurity at PayPal, to discuss how enterprise organizations are innovating security solutions to reduce the time to feature delivery. We'll explore how AI tools can actually enable rather than impede innovation and examine practical approaches to integrating AI security tools earlier in the development lifecycle.</p><p><br>Whether you're a CISO trying to balance security with business needs, a developer tired of security roadblocks, or a product leader navigating these competing priorities, this conversation will give you actionable insights to transform security from a bottleneck into a business enabler.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Mar 2025 16:48:08 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7c8c37dc/f833cf84.mp3" length="105784028" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/P6rEncQq08w4kLhZZQCnfTuh-kMdfxHQZN9b4nKJNDM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MmI4/YWZlNDBmYzUwY2Rm/MDY4ZmUxZTE0ZThl/OTk0Ny5wbmc.jpg"/>
      <itunes:duration>2643</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>If you've ever found yourself frustrated watching deadlines slip by as your development team waits on yet another security review, you're not alone. In today's competitive landscape, companies are caught in a difficult balancing act: move quickly to deliver the features customers want or slow down to ensure those features don't introduce vulnerabilities that could lead to the next headline-making breach.</p><p><br></p><p>Security reviews have become the speed bump on the road to innovation that everyone acknowledges is necessary, but few have figured out how to navigate efficiently. Development teams push for velocity while security teams pull the emergency brake, creating tension that reverberates throughout organizations.</p><p><br></p><p>Today, we're joined by Dimitri Shvartsman, co-founder of Prime Security and prior Head of Cybersecurity at PayPal, to discuss how enterprise organizations are innovating security solutions to reduce the time to feature delivery. We'll explore how AI tools can actually enable rather than impede innovation and examine practical approaches to integrating AI security tools earlier in the development lifecycle.</p><p><br>Whether you're a CISO trying to balance security with business needs, a developer tired of security roadblocks, or a product leader navigating these competing priorities, this conversation will give you actionable insights to transform security from a bottleneck into a business enabler.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Ai, Tech, Innovation </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title> AI Therapy: Should we believe Silicon Valley's Bold Claim at Solving Mental Health? With Daniel Oberhaus </title>
      <itunes:episode>211</itunes:episode>
      <podcast:episode>211</podcast:episode>
      <itunes:title> AI Therapy: Should we believe Silicon Valley's Bold Claim at Solving Mental Health? With Daniel Oberhaus </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">09cb07bf-18de-4515-9b8b-c347dcba3c46</guid>
      <link>https://share.transistor.fm/s/d174ba6c</link>
      <description>
        <![CDATA[<p>In this episode of SecureTalk, Justin Beals welcomes Daniel Oberhaus, the author of Silicon Shrink, to discuss the revolutionary and controversial integration of artificial intelligence (AI) in mental health care. Daniel demystifies the central theme of his book, explaining the concept of Silicon Shrink and exploring how AI tools are increasingly being used to diagnose and treat mental health conditions. </p><p>He highlights the alarming implications of leveraging AI in psychiatry, the historical intersection of these two fields, and the potential pitfalls and ethical challenges this marriage presents. He also delves into the technical, policy, and philosophical dimensions of using AI in psychiatry, bringing attention to various case studies and real-world applications such as emotion-recognition technology and AI-driven triage systems like those used by the Crisis Text Line. </p><p>Daniel's insights present a compelling narrative, urging a cautious yet hopeful approach to adopting AI technologies in areas as sensitive as mental health, underscoring the need for transparency, privacy, and ethical considerations.</p><p>Book: </p><p>Oberhaus, Daniel. The Silicon Shrink: How Artificial Intelligence Made the World an Asylum. MIT Press, 2025.<a href="https://mitpress.mit.edu/9780262049351/the-silicon-shrink/">  (Link) </a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of SecureTalk, Justin Beals welcomes Daniel Oberhaus, the author of Silicon Shrink, to discuss the revolutionary and controversial integration of artificial intelligence (AI) in mental health care. Daniel demystifies the central theme of his book, explaining the concept of Silicon Shrink and exploring how AI tools are increasingly being used to diagnose and treat mental health conditions. </p><p>He highlights the alarming implications of leveraging AI in psychiatry, the historical intersection of these two fields, and the potential pitfalls and ethical challenges this marriage presents. He also delves into the technical, policy, and philosophical dimensions of using AI in psychiatry, bringing attention to various case studies and real-world applications such as emotion-recognition technology and AI-driven triage systems like those used by the Crisis Text Line. </p><p>Daniel's insights present a compelling narrative, urging a cautious yet hopeful approach to adopting AI technologies in areas as sensitive as mental health, underscoring the need for transparency, privacy, and ethical considerations.</p><p>Book: </p><p>Oberhaus, Daniel. The Silicon Shrink: How Artificial Intelligence Made the World an Asylum. MIT Press, 2025.<a href="https://mitpress.mit.edu/9780262049351/the-silicon-shrink/">  (Link) </a></p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Feb 2025 14:37:47 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d174ba6c/4aa3f5bd.mp3" length="123066583" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UvRyUJ26yfiMahod1ACwRGwEhjibgmBdV1OHLv_M1uo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hOTQz/ZTgxYmFiYTM0OGI1/MWRhNDNmODYyNzU2/ODBkOC5wbmc.jpg"/>
      <itunes:duration>3075</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of SecureTalk, Justin Beals welcomes Daniel Oberhaus, the author of Silicon Shrink, to discuss the revolutionary and controversial integration of artificial intelligence (AI) in mental health care. Daniel demystifies the central theme of his book, explaining the concept of Silicon Shrink and exploring how AI tools are increasingly being used to diagnose and treat mental health conditions. </p><p>He highlights the alarming implications of leveraging AI in psychiatry, the historical intersection of these two fields, and the potential pitfalls and ethical challenges this marriage presents. He also delves into the technical, policy, and philosophical dimensions of using AI in psychiatry, bringing attention to various case studies and real-world applications such as emotion-recognition technology and AI-driven triage systems like those used by the Crisis Text Line. </p><p>Daniel's insights present a compelling narrative, urging a cautious yet hopeful approach to adopting AI technologies in areas as sensitive as mental health, underscoring the need for transparency, privacy, and ethical considerations.</p><p>Book: </p><p>Oberhaus, Daniel. The Silicon Shrink: How Artificial Intelligence Made the World an Asylum. MIT Press, 2025.<a href="https://mitpress.mit.edu/9780262049351/the-silicon-shrink/">  (Link) </a></p>]]>
      </itunes:summary>
      <itunes:keywords>AI, Pshychiatry, MentalHealth</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From Arab Spring Frontlines to Cybersecurity Frontiers: A Naval Officer's Journey with Terence Bennett</title>
      <itunes:episode>210</itunes:episode>
      <podcast:episode>210</podcast:episode>
      <itunes:title>From Arab Spring Frontlines to Cybersecurity Frontiers: A Naval Officer's Journey with Terence Bennett</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ba23004d-f741-494f-927a-7eeaa9581478</guid>
      <link>https://share.transistor.fm/s/5849cee8</link>
      <description>
        <![CDATA[<p>Terence Bennet watched from the deck of the USS Paul Hamilton as the Arab Spring unfolded. As a naval officer, he realized that his battlefield awareness was limited by good intelligence. Intelligence drove good decision-making. And in an area of conflict, good decision-making is the difference between mission success and failure.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals talks with Terence Bennett, a former Naval Intelligence Officer and now the CEO of DreamFactory. They discuss Terence's intriguing path from an early interest in the military to a successful career in cybersecurity. He recounts his origin story, which is grounded in a lifelong dedication to service, racing sailboats at the naval academy, his experiences aboard the USS Paul Hamilton, and pivotal roles in intelligence during major geopolitical events such as the Arab Spring and the Bin Laden raid. The conversation covers topics including red teaming, the impact of digital transformation on intelligence, and the necessity of security by design in today’s fast-changing digital environment. Especially of interest is Terence’s new work on cybersecurity by marrying AI developed API’s with effective network segmentation. This episode serves as a valuable resource for cybersecurity professionals, providing a distinct viewpoint on the blend of military experience and cyber defense strategies.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Terence Bennet watched from the deck of the USS Paul Hamilton as the Arab Spring unfolded. As a naval officer, he realized that his battlefield awareness was limited by good intelligence. Intelligence drove good decision-making. And in an area of conflict, good decision-making is the difference between mission success and failure.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals talks with Terence Bennett, a former Naval Intelligence Officer and now the CEO of DreamFactory. They discuss Terence's intriguing path from an early interest in the military to a successful career in cybersecurity. He recounts his origin story, which is grounded in a lifelong dedication to service, racing sailboats at the naval academy, his experiences aboard the USS Paul Hamilton, and pivotal roles in intelligence during major geopolitical events such as the Arab Spring and the Bin Laden raid. The conversation covers topics including red teaming, the impact of digital transformation on intelligence, and the necessity of security by design in today’s fast-changing digital environment. Especially of interest is Terence’s new work on cybersecurity by marrying AI developed API’s with effective network segmentation. This episode serves as a valuable resource for cybersecurity professionals, providing a distinct viewpoint on the blend of military experience and cyber defense strategies.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 18 Feb 2025 17:11:39 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/5849cee8/82b0549b.mp3" length="108396932" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/osUjyxCRUeArHY2OKf_Pz_dz2777HtO2B6sufgMG3zI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNzNk/YWZiM2JjY2MwZGJh/YWM0OTZiODg4MzQ2/Y2EwYS5wbmc.jpg"/>
      <itunes:duration>2708</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Terence Bennet watched from the deck of the USS Paul Hamilton as the Arab Spring unfolded. As a naval officer, he realized that his battlefield awareness was limited by good intelligence. Intelligence drove good decision-making. And in an area of conflict, good decision-making is the difference between mission success and failure.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals talks with Terence Bennett, a former Naval Intelligence Officer and now the CEO of DreamFactory. They discuss Terence's intriguing path from an early interest in the military to a successful career in cybersecurity. He recounts his origin story, which is grounded in a lifelong dedication to service, racing sailboats at the naval academy, his experiences aboard the USS Paul Hamilton, and pivotal roles in intelligence during major geopolitical events such as the Arab Spring and the Bin Laden raid. The conversation covers topics including red teaming, the impact of digital transformation on intelligence, and the necessity of security by design in today’s fast-changing digital environment. Especially of interest is Terence’s new work on cybersecurity by marrying AI developed API’s with effective network segmentation. This episode serves as a valuable resource for cybersecurity professionals, providing a distinct viewpoint on the blend of military experience and cyber defense strategies.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, AI, API,RedTeam</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5849cee8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The AI wars and what DeepSeek means to AI and Security</title>
      <itunes:episode>209</itunes:episode>
      <podcast:episode>209</podcast:episode>
      <itunes:title>The AI wars and what DeepSeek means to AI and Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9072da91-00f5-432c-9c1e-9105b438b3a9</guid>
      <link>https://share.transistor.fm/s/93c503c2</link>
      <description>
        <![CDATA[<p>In our latest SecureTalk episode, Justin Beals gathers Micah Spieler, Chief Product Officer, and Josh Bullers, Head of AI, to explore the multifaceted world of AI and cybersecurity. With the recent release of DeepSeek-r1, the AI marketplace has been thrown into turmoil. It has rocked the hubris of Silicon Valley and questioned the validity and valuations of organizations like OpenAI. What does DeepSeek mean to the AI landscape, and how does it fit into the fundamentals of machine learning and the future of information systems?</p><p><br></p><p>Our discussion delves deeply into the synergy of AI advancements and the pressing need for robust security measures. Micah and Josh share their journey in striking the delicate balance between innovation and safety, offering invaluable insights for anyone in the tech and cybersecurity field.</p><p><br></p><p>As AI continues to revolutionise industries, cybersecurity experts must adapt and evolve. Tune in as we examine the potential and challenges presented by cutting-edge AI models. This episode is essential listening for those striving to stay ahead in the ever-evolving landscape of AI-driven cybersecurity. Join us and be part of the conversation shaping the future of technology!</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In our latest SecureTalk episode, Justin Beals gathers Micah Spieler, Chief Product Officer, and Josh Bullers, Head of AI, to explore the multifaceted world of AI and cybersecurity. With the recent release of DeepSeek-r1, the AI marketplace has been thrown into turmoil. It has rocked the hubris of Silicon Valley and questioned the validity and valuations of organizations like OpenAI. What does DeepSeek mean to the AI landscape, and how does it fit into the fundamentals of machine learning and the future of information systems?</p><p><br></p><p>Our discussion delves deeply into the synergy of AI advancements and the pressing need for robust security measures. Micah and Josh share their journey in striking the delicate balance between innovation and safety, offering invaluable insights for anyone in the tech and cybersecurity field.</p><p><br></p><p>As AI continues to revolutionise industries, cybersecurity experts must adapt and evolve. Tune in as we examine the potential and challenges presented by cutting-edge AI models. This episode is essential listening for those striving to stay ahead in the ever-evolving landscape of AI-driven cybersecurity. Join us and be part of the conversation shaping the future of technology!</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Feb 2025 15:26:54 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/93c503c2/2059917b.mp3" length="117234295" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Jeru_kpYNtaF3VcLyuC7mMXEwlJ3KIAd0kKhKGyPPoE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81Yzhh/MGUwYzZmOWE3OWNl/N2UzNTY0MjI0MGI5/MjFmNi5wbmc.jpg"/>
      <itunes:duration>2930</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In our latest SecureTalk episode, Justin Beals gathers Micah Spieler, Chief Product Officer, and Josh Bullers, Head of AI, to explore the multifaceted world of AI and cybersecurity. With the recent release of DeepSeek-r1, the AI marketplace has been thrown into turmoil. It has rocked the hubris of Silicon Valley and questioned the validity and valuations of organizations like OpenAI. What does DeepSeek mean to the AI landscape, and how does it fit into the fundamentals of machine learning and the future of information systems?</p><p><br></p><p>Our discussion delves deeply into the synergy of AI advancements and the pressing need for robust security measures. Micah and Josh share their journey in striking the delicate balance between innovation and safety, offering invaluable insights for anyone in the tech and cybersecurity field.</p><p><br></p><p>As AI continues to revolutionise industries, cybersecurity experts must adapt and evolve. Tune in as we examine the potential and challenges presented by cutting-edge AI models. This episode is essential listening for those striving to stay ahead in the ever-evolving landscape of AI-driven cybersecurity. Join us and be part of the conversation shaping the future of technology!</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Deepseek, Ai</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>What Matters Next: Decision Making in a Rapidly Changing World with Kate O'Neill.</title>
      <itunes:episode>208</itunes:episode>
      <podcast:episode>208</podcast:episode>
      <itunes:title>What Matters Next: Decision Making in a Rapidly Changing World with Kate O'Neill.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">306ecf3a-4bad-44db-ad64-9c06a75ed947</guid>
      <link>https://share.transistor.fm/s/c7165ced</link>
      <description>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals welcomes Kate O'Neill, a passionate tech humanist dedicated to crafting technology solutions that genuinely prioritize people. Together, they explore the key themes of Kate's  books, “Tech Humanist” and  'What Matters Next: A Leader's Guide to Making Human-Friendly Tech Decisions in a World That's Moving Too Fast.' </p><p><br></p><p>Their engaging discussion shines a light on the power of systems thinking, the significance of thoughtful decision-making in the tech industry, and the vital balance between achieving business objectives and enhancing the human experience. </p><p><br></p><p>This episode is a delightful must-listen for cybersecurity professionals who are excited to navigate the important intersection of technology, ethics, and human dignity in our ever-evolving digital world.</p><p>Books:</p><p>O'Neill, Kate.<a href="https://www.koinsights.com/books/what-matters-next-book/"> What Matters Next: A Leader's Guide to Making Human-Friendly Decisions In a World That's Moving Too Fast (2025) </a></p><p><a href="https://www.koinsights.com/books/digital-transformation-book/">Tech Humanist: How You Can Make Technology Better for Business and Better for Humans (2018)</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals welcomes Kate O'Neill, a passionate tech humanist dedicated to crafting technology solutions that genuinely prioritize people. Together, they explore the key themes of Kate's  books, “Tech Humanist” and  'What Matters Next: A Leader's Guide to Making Human-Friendly Tech Decisions in a World That's Moving Too Fast.' </p><p><br></p><p>Their engaging discussion shines a light on the power of systems thinking, the significance of thoughtful decision-making in the tech industry, and the vital balance between achieving business objectives and enhancing the human experience. </p><p><br></p><p>This episode is a delightful must-listen for cybersecurity professionals who are excited to navigate the important intersection of technology, ethics, and human dignity in our ever-evolving digital world.</p><p>Books:</p><p>O'Neill, Kate.<a href="https://www.koinsights.com/books/what-matters-next-book/"> What Matters Next: A Leader's Guide to Making Human-Friendly Decisions In a World That's Moving Too Fast (2025) </a></p><p><a href="https://www.koinsights.com/books/digital-transformation-book/">Tech Humanist: How You Can Make Technology Better for Business and Better for Humans (2018)</a> </p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Feb 2025 14:23:01 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c7165ced/9b2c9090.mp3" length="131499320" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/2yJg2lrpXzQ-3DNpWFQ3T5AGNpiXtMM0REv0JQ1Zshc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZmU0/ZGVlODRjZDYxZmE5/MDA2NjA1Yjg0ZmY4/NmJkZi5wbmc.jpg"/>
      <itunes:duration>3286</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals welcomes Kate O'Neill, a passionate tech humanist dedicated to crafting technology solutions that genuinely prioritize people. Together, they explore the key themes of Kate's  books, “Tech Humanist” and  'What Matters Next: A Leader's Guide to Making Human-Friendly Tech Decisions in a World That's Moving Too Fast.' </p><p><br></p><p>Their engaging discussion shines a light on the power of systems thinking, the significance of thoughtful decision-making in the tech industry, and the vital balance between achieving business objectives and enhancing the human experience. </p><p><br></p><p>This episode is a delightful must-listen for cybersecurity professionals who are excited to navigate the important intersection of technology, ethics, and human dignity in our ever-evolving digital world.</p><p>Books:</p><p>O'Neill, Kate.<a href="https://www.koinsights.com/books/what-matters-next-book/"> What Matters Next: A Leader's Guide to Making Human-Friendly Decisions In a World That's Moving Too Fast (2025) </a></p><p><a href="https://www.koinsights.com/books/digital-transformation-book/">Tech Humanist: How You Can Make Technology Better for Business and Better for Humans (2018)</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Tech Humanism, Innovation, leadership</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Unveiling the Secrets of Cryptography with Panos Louridas: Early Computing, Encryption, and Modern Challenges</title>
      <itunes:episode>207</itunes:episode>
      <podcast:episode>207</podcast:episode>
      <itunes:title>Unveiling the Secrets of Cryptography with Panos Louridas: Early Computing, Encryption, and Modern Challenges</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">74526011-44ee-4d38-bcef-b459ea58e2fa</guid>
      <link>https://share.transistor.fm/s/469245ee</link>
      <description>
        <![CDATA[<p>In this episode of SecureTalk, host Justin Beals warmly welcomes Panos Louridas for an insightful discussion on the history, evolution, and future of cryptography. Panos has deep expertise and authored a book called  "<a href="https://mitpress.mit.edu/9780262549028/cryptography/">Cryptography" </a> that helps explain the history of keeping secrets, important innovations in the field and the mathematical functions of effective encryption. </p><p>They delve into Panos's early interest in computing, starting with a ZX Spectrum and his recent book on cryptography, which aims to make complex algorithms accessible to those with a high school level of mathematics. The conversation traverses the critical role of cryptography in our digital lives, the potential impacts of quantum computing, and the practical aspects of key management in modern web applications. Panos also shares captivating stories from the history of the Enigma machine and discusses the ongoing arms race in cryptography. Perfect for cybersecurity experts, this episode offers a rich blend of historical anecdotes, technical insights, and future-looking perspectives.</p><p><a href="https://mitpress.mit.edu/9780262549028/cryptography/">Book: Louridas, Panos. (2024) Cryptography. MIT Press.<br>           </a></p><p>00:00 Welcome to SecureTalk</p><p>00:28 The Importance of Cryptography</p><p>02:21 Introducing Panos Louridas</p><p>03:41 Panos Louridas' Journey into Computing</p><p>06:11 The Evolution of Cryptography</p><p>12:13 The Enigma Machine and Its Legacy</p><p>19:03 Security by Obscurity: A Fallacy</p><p>22:32 Speculations on NSA Backdoors</p><p>23:21 Government Contributions to Cryptography</p><p>24:51 Evolution and Security of AES</p><p>27:10 Challenges in Generating Randomness</p><p>28:15 Quantum Computing and Cryptography</p><p>33:45 Key Management in Modern Web Applications</p><p>36:53 TLS and AES: Understanding Their Relationship</p><p>39:01 The Human Factor in Cryptography</p><p>40:38 Making Cryptography Accessible</p><p>42:58 Conclusion and Final Thoughts</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of SecureTalk, host Justin Beals warmly welcomes Panos Louridas for an insightful discussion on the history, evolution, and future of cryptography. Panos has deep expertise and authored a book called  "<a href="https://mitpress.mit.edu/9780262549028/cryptography/">Cryptography" </a> that helps explain the history of keeping secrets, important innovations in the field and the mathematical functions of effective encryption. </p><p>They delve into Panos's early interest in computing, starting with a ZX Spectrum and his recent book on cryptography, which aims to make complex algorithms accessible to those with a high school level of mathematics. The conversation traverses the critical role of cryptography in our digital lives, the potential impacts of quantum computing, and the practical aspects of key management in modern web applications. Panos also shares captivating stories from the history of the Enigma machine and discusses the ongoing arms race in cryptography. Perfect for cybersecurity experts, this episode offers a rich blend of historical anecdotes, technical insights, and future-looking perspectives.</p><p><a href="https://mitpress.mit.edu/9780262549028/cryptography/">Book: Louridas, Panos. (2024) Cryptography. MIT Press.<br>           </a></p><p>00:00 Welcome to SecureTalk</p><p>00:28 The Importance of Cryptography</p><p>02:21 Introducing Panos Louridas</p><p>03:41 Panos Louridas' Journey into Computing</p><p>06:11 The Evolution of Cryptography</p><p>12:13 The Enigma Machine and Its Legacy</p><p>19:03 Security by Obscurity: A Fallacy</p><p>22:32 Speculations on NSA Backdoors</p><p>23:21 Government Contributions to Cryptography</p><p>24:51 Evolution and Security of AES</p><p>27:10 Challenges in Generating Randomness</p><p>28:15 Quantum Computing and Cryptography</p><p>33:45 Key Management in Modern Web Applications</p><p>36:53 TLS and AES: Understanding Their Relationship</p><p>39:01 The Human Factor in Cryptography</p><p>40:38 Making Cryptography Accessible</p><p>42:58 Conclusion and Final Thoughts</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 28 Jan 2025 14:59:46 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/469245ee/f8780e01.mp3" length="104566859" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/f0lN-3FjpIpEI95r_Vdr10nT98OigluZk3ouvuJuprM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NjA3/NDZlNzQ1YTllYmNl/OTQxNDFmYmViMGEy/Y2YzOC5wbmc.jpg"/>
      <itunes:duration>2612</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of SecureTalk, host Justin Beals warmly welcomes Panos Louridas for an insightful discussion on the history, evolution, and future of cryptography. Panos has deep expertise and authored a book called  "<a href="https://mitpress.mit.edu/9780262549028/cryptography/">Cryptography" </a> that helps explain the history of keeping secrets, important innovations in the field and the mathematical functions of effective encryption. </p><p>They delve into Panos's early interest in computing, starting with a ZX Spectrum and his recent book on cryptography, which aims to make complex algorithms accessible to those with a high school level of mathematics. The conversation traverses the critical role of cryptography in our digital lives, the potential impacts of quantum computing, and the practical aspects of key management in modern web applications. Panos also shares captivating stories from the history of the Enigma machine and discusses the ongoing arms race in cryptography. Perfect for cybersecurity experts, this episode offers a rich blend of historical anecdotes, technical insights, and future-looking perspectives.</p><p><a href="https://mitpress.mit.edu/9780262549028/cryptography/">Book: Louridas, Panos. (2024) Cryptography. MIT Press.<br>           </a></p><p>00:00 Welcome to SecureTalk</p><p>00:28 The Importance of Cryptography</p><p>02:21 Introducing Panos Louridas</p><p>03:41 Panos Louridas' Journey into Computing</p><p>06:11 The Evolution of Cryptography</p><p>12:13 The Enigma Machine and Its Legacy</p><p>19:03 Security by Obscurity: A Fallacy</p><p>22:32 Speculations on NSA Backdoors</p><p>23:21 Government Contributions to Cryptography</p><p>24:51 Evolution and Security of AES</p><p>27:10 Challenges in Generating Randomness</p><p>28:15 Quantum Computing and Cryptography</p><p>33:45 Key Management in Modern Web Applications</p><p>36:53 TLS and AES: Understanding Their Relationship</p><p>39:01 The Human Factor in Cryptography</p><p>40:38 Making Cryptography Accessible</p><p>42:58 Conclusion and Final Thoughts</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Cryptography</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From Botnets to AI Health: Michael Tiffany’s Mission to Empower Personal Data Sovereignty</title>
      <itunes:episode>206</itunes:episode>
      <podcast:episode>206</podcast:episode>
      <itunes:title>From Botnets to AI Health: Michael Tiffany’s Mission to Empower Personal Data Sovereignty</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d432979b-bd2b-416b-9343-80696dc43ec3</guid>
      <link>https://share.transistor.fm/s/d1165e88</link>
      <description>
        <![CDATA[<p>In 2000 the internet was expanding at an astronomical rate. Consumers were logging in via dial-up modems by the hundreds of millions and businesses were racing to maximize their footprint in the digital world. A hacker named Onel de Guzman living in the Philippines had been playing with a script called “I Love You”. Distributed via email, it could assume secret control of an individual's computer from a centralized control. The “I Love You” virus spread to over 50 million computers, creating the world's largest botnet. Michael Tiffany and his co-founders were aware of these types of cyber attacks and wanted to ensure the Internet worked for businesses wanting to connect with consumers. They founded Human Security, one of the first companies to combat botnet activity for major brands and today a very powerful cybersecurity company for major corporations.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals interviews Michael Tiffany, co-founder of Human Security and the current leader of Fulcra Dynamics. Michael shares his early experiences with computers and his journey into cybersecurity, discussing topics the founding of Human Security as a solution for botnets, ad fraud, and early “Know Your Customer” challenges. He explains his current company, Fulcra's mission to empower individuals by unifying their personal data and promoting privacy and control in the age of AI. Listen as Michael reflects on the ethical responsibilities in technology and shares his vision for a future where individuals have sovereignty over their data.</p><p>00:00 Introduction to SecureTalk</p><p>00:32 Host's Journey into Computer Science</p><p>01:39 Introducing Michael Tiffany</p><p>03:12 Michael Tiffany's Early Experiences</p><p>15:26 The Birth of Human Security</p><p>20:56 Challenges and Innovations in Cybersecurity</p><p>27:11 Fulcra Dynamics: Empowering Personal Data</p><p>37:22 Vision for the Future of AI and Data Sovereignty</p><p>43:59 Conclusion and Final Thoughts</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In 2000 the internet was expanding at an astronomical rate. Consumers were logging in via dial-up modems by the hundreds of millions and businesses were racing to maximize their footprint in the digital world. A hacker named Onel de Guzman living in the Philippines had been playing with a script called “I Love You”. Distributed via email, it could assume secret control of an individual's computer from a centralized control. The “I Love You” virus spread to over 50 million computers, creating the world's largest botnet. Michael Tiffany and his co-founders were aware of these types of cyber attacks and wanted to ensure the Internet worked for businesses wanting to connect with consumers. They founded Human Security, one of the first companies to combat botnet activity for major brands and today a very powerful cybersecurity company for major corporations.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals interviews Michael Tiffany, co-founder of Human Security and the current leader of Fulcra Dynamics. Michael shares his early experiences with computers and his journey into cybersecurity, discussing topics the founding of Human Security as a solution for botnets, ad fraud, and early “Know Your Customer” challenges. He explains his current company, Fulcra's mission to empower individuals by unifying their personal data and promoting privacy and control in the age of AI. Listen as Michael reflects on the ethical responsibilities in technology and shares his vision for a future where individuals have sovereignty over their data.</p><p>00:00 Introduction to SecureTalk</p><p>00:32 Host's Journey into Computer Science</p><p>01:39 Introducing Michael Tiffany</p><p>03:12 Michael Tiffany's Early Experiences</p><p>15:26 The Birth of Human Security</p><p>20:56 Challenges and Innovations in Cybersecurity</p><p>27:11 Fulcra Dynamics: Empowering Personal Data</p><p>37:22 Vision for the Future of AI and Data Sovereignty</p><p>43:59 Conclusion and Final Thoughts</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Jan 2025 14:31:00 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d1165e88/8f168fe3.mp3" length="64855001" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/zxYiE-vnOMyxYhhFCwXGciGOck0d9zKy_gO4t1U3bvY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lNzVh/Y2VhZTZmZmU5YjYx/NjZmODViOTk0MTgw/N2E3MC5wbmc.jpg"/>
      <itunes:duration>2699</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In 2000 the internet was expanding at an astronomical rate. Consumers were logging in via dial-up modems by the hundreds of millions and businesses were racing to maximize their footprint in the digital world. A hacker named Onel de Guzman living in the Philippines had been playing with a script called “I Love You”. Distributed via email, it could assume secret control of an individual's computer from a centralized control. The “I Love You” virus spread to over 50 million computers, creating the world's largest botnet. Michael Tiffany and his co-founders were aware of these types of cyber attacks and wanted to ensure the Internet worked for businesses wanting to connect with consumers. They founded Human Security, one of the first companies to combat botnet activity for major brands and today a very powerful cybersecurity company for major corporations.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals interviews Michael Tiffany, co-founder of Human Security and the current leader of Fulcra Dynamics. Michael shares his early experiences with computers and his journey into cybersecurity, discussing topics the founding of Human Security as a solution for botnets, ad fraud, and early “Know Your Customer” challenges. He explains his current company, Fulcra's mission to empower individuals by unifying their personal data and promoting privacy and control in the age of AI. Listen as Michael reflects on the ethical responsibilities in technology and shares his vision for a future where individuals have sovereignty over their data.</p><p>00:00 Introduction to SecureTalk</p><p>00:32 Host's Journey into Computer Science</p><p>01:39 Introducing Michael Tiffany</p><p>03:12 Michael Tiffany's Early Experiences</p><p>15:26 The Birth of Human Security</p><p>20:56 Challenges and Innovations in Cybersecurity</p><p>27:11 Fulcra Dynamics: Empowering Personal Data</p><p>37:22 Vision for the Future of AI and Data Sovereignty</p><p>43:59 Conclusion and Final Thoughts</p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cryptography, Quantum Computing, and the Future of Security with Dr. Bill Anderson</title>
      <itunes:episode>205</itunes:episode>
      <podcast:episode>205</podcast:episode>
      <itunes:title>Cryptography, Quantum Computing, and the Future of Security with Dr. Bill Anderson</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">439e6ea0-7fc5-4463-8bcf-db47b4479091</guid>
      <link>https://share.transistor.fm/s/72fe5b10</link>
      <description>
        <![CDATA[<p>Without the ability to keep secrets, our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the worldwide HAM radio operators.</p><p><br></p><p>I’ve been utilizing cryptography in the development of web applications since my first professional web application development work. Although I’ve rarely understood the underlying technology and mathematics of cryptography.</p><p><br></p><p>In this episode of SecureTalk, our guest is Dr. Bill Anderson, an expert in cryptography. Bill shares his journey into the field, starting as a student in electrical and computer engineering. He inadvertently ventured into cryptography during his postgraduate studies. He discusses the evolution of cryptography, its historical context, and the impact of quantum computing on current cryptographic methods.</p><p><br></p><p>We explore various topics, including public key cryptography, digital signatures, and the ongoing need for crypto agility. Bill also provides insights into his current role as Principal Product Lead at Mattermost, a secure collaboration platform focused on data sovereignty and security. This episode offers a comprehensive look at modern cryptographic techniques and the challenges posed by future advancements in computing, making it a must-listen for anyone interested in cybersecurity and cryptography.</p><p><br></p><p><br>00:00 Welcome to SecureTalk: Introduction and Host Introduction</p><p>00:33 The Role of Security in Business Growth</p><p>01:55 Introducing Dr. Bill Anderson: A Security Expert</p><p>03:57 Dr. Anderson's Journey into Cryptography</p><p>05:35 The Evolution of Security and Cryptography</p><p>08:11 Understanding Business and Technology Landscapes</p><p>13:56 Mattermost: A Secure Collaboration Platform</p><p>22:01 The History and Methods of Cryptography</p><p>25:01 Understanding Public and Private Keys</p><p>25:58 Digital Signatures and Authentication</p><p>27:12 The Open Research Model in Cryptography</p><p>28:31 Challenges in Cryptographic Security</p><p>31:02 Quantum Computing and Cryptography</p><p>35:38 The Future of Cryptographic Systems</p><p>42:04 NIST's Role in Quantum-Safe Cryptography</p><p>49:41 Conclusion and Final Thoughts</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Without the ability to keep secrets, our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the worldwide HAM radio operators.</p><p><br></p><p>I’ve been utilizing cryptography in the development of web applications since my first professional web application development work. Although I’ve rarely understood the underlying technology and mathematics of cryptography.</p><p><br></p><p>In this episode of SecureTalk, our guest is Dr. Bill Anderson, an expert in cryptography. Bill shares his journey into the field, starting as a student in electrical and computer engineering. He inadvertently ventured into cryptography during his postgraduate studies. He discusses the evolution of cryptography, its historical context, and the impact of quantum computing on current cryptographic methods.</p><p><br></p><p>We explore various topics, including public key cryptography, digital signatures, and the ongoing need for crypto agility. Bill also provides insights into his current role as Principal Product Lead at Mattermost, a secure collaboration platform focused on data sovereignty and security. This episode offers a comprehensive look at modern cryptographic techniques and the challenges posed by future advancements in computing, making it a must-listen for anyone interested in cybersecurity and cryptography.</p><p><br></p><p><br>00:00 Welcome to SecureTalk: Introduction and Host Introduction</p><p>00:33 The Role of Security in Business Growth</p><p>01:55 Introducing Dr. Bill Anderson: A Security Expert</p><p>03:57 Dr. Anderson's Journey into Cryptography</p><p>05:35 The Evolution of Security and Cryptography</p><p>08:11 Understanding Business and Technology Landscapes</p><p>13:56 Mattermost: A Secure Collaboration Platform</p><p>22:01 The History and Methods of Cryptography</p><p>25:01 Understanding Public and Private Keys</p><p>25:58 Digital Signatures and Authentication</p><p>27:12 The Open Research Model in Cryptography</p><p>28:31 Challenges in Cryptographic Security</p><p>31:02 Quantum Computing and Cryptography</p><p>35:38 The Future of Cryptographic Systems</p><p>42:04 NIST's Role in Quantum-Safe Cryptography</p><p>49:41 Conclusion and Final Thoughts</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 14 Jan 2025 14:41:03 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/72fe5b10/7b5eba08.mp3" length="121659121" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/msIJfEBg8HYNcTYbq5-rHyVX9Gj8VSANij5fghKXiu0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NWE0/MTAwMzAzMGYyODY5/N2NiYTQwNmY2Y2Jl/YTc2OS5wbmc.jpg"/>
      <itunes:duration>3040</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Without the ability to keep secrets, our internet would fail. Without effective cryptography the internet would never have graduated from the hobbyist interest. And we have great examples of networks without effective encryption like the worldwide HAM radio operators.</p><p><br></p><p>I’ve been utilizing cryptography in the development of web applications since my first professional web application development work. Although I’ve rarely understood the underlying technology and mathematics of cryptography.</p><p><br></p><p>In this episode of SecureTalk, our guest is Dr. Bill Anderson, an expert in cryptography. Bill shares his journey into the field, starting as a student in electrical and computer engineering. He inadvertently ventured into cryptography during his postgraduate studies. He discusses the evolution of cryptography, its historical context, and the impact of quantum computing on current cryptographic methods.</p><p><br></p><p>We explore various topics, including public key cryptography, digital signatures, and the ongoing need for crypto agility. Bill also provides insights into his current role as Principal Product Lead at Mattermost, a secure collaboration platform focused on data sovereignty and security. This episode offers a comprehensive look at modern cryptographic techniques and the challenges posed by future advancements in computing, making it a must-listen for anyone interested in cybersecurity and cryptography.</p><p><br></p><p><br>00:00 Welcome to SecureTalk: Introduction and Host Introduction</p><p>00:33 The Role of Security in Business Growth</p><p>01:55 Introducing Dr. Bill Anderson: A Security Expert</p><p>03:57 Dr. Anderson's Journey into Cryptography</p><p>05:35 The Evolution of Security and Cryptography</p><p>08:11 Understanding Business and Technology Landscapes</p><p>13:56 Mattermost: A Secure Collaboration Platform</p><p>22:01 The History and Methods of Cryptography</p><p>25:01 Understanding Public and Private Keys</p><p>25:58 Digital Signatures and Authentication</p><p>27:12 The Open Research Model in Cryptography</p><p>28:31 Challenges in Cryptographic Security</p><p>31:02 Quantum Computing and Cryptography</p><p>35:38 The Future of Cryptographic Systems</p><p>42:04 NIST's Role in Quantum-Safe Cryptography</p><p>49:41 Conclusion and Final Thoughts</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Quantum computing, cryptography</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Inventing Threat Intelligence: The Story Behind Eldon Sprickerhoff's Startup Success</title>
      <itunes:episode>204</itunes:episode>
      <podcast:episode>204</podcast:episode>
      <itunes:title>Inventing Threat Intelligence: The Story Behind Eldon Sprickerhoff's Startup Success</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">24c03e10-8342-4f43-a872-8053dea3113e</guid>
      <link>https://share.transistor.fm/s/82d2edad</link>
      <description>
        <![CDATA[<p>Eldon Spickerhoff founded eSentire in 2001. He had been a Senior Information Security Engineer for ING Prime after completing his academic work at Waterloo University. At the time the cybersecurity solutions marketplace was primarily a services offering, focusing on vulnerability scanning. The team at eSentire realized that the tools deployed in vulnerability scanning to internal systems could be left running post a services engagement. And in the process they invented an ‘always on’ threat intelligence solution. In 2022 eSentire added storied private equity firm Warburg-Pincus to their cap table and achieved unicorn status with a valuation of one billion dollars.</p><p><br></p><p>In this engaging episode of SecureTalk, host Justin Beals invites Eldon Sprickerhoff, a seasoned cybersecurity expert and founder of eSentire, to share his journey. Eldon graduated with a computer science degree from Waterloo University in 1991 and went on to establish a leading managed security services provider.</p><p><br></p><p>During the conversation, Eldon reflects on his early career concerns and the macroeconomic challenges he faced during a recession. He also shares insights from his book, *Committed*, which explores the realities of startup life. The discussion highlights essential strategies for navigating the cybersecurity marketplace, the importance of founder-led sales, and the significant challenges and opportunities within the cybersecurity field.</p><p><br></p><p>Tune in to gain valuable perspectives on entrepreneurship, real-time vulnerability scans, and the impact of AI and quantum computing on cybersecurity.</p><p><br>Link to the Book: Commited: Startup Survival Tips and Uncommon Sense for First-Time Tech Founders https://sutherlandhousebooks.com/product/committed/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Eldon Spickerhoff founded eSentire in 2001. He had been a Senior Information Security Engineer for ING Prime after completing his academic work at Waterloo University. At the time the cybersecurity solutions marketplace was primarily a services offering, focusing on vulnerability scanning. The team at eSentire realized that the tools deployed in vulnerability scanning to internal systems could be left running post a services engagement. And in the process they invented an ‘always on’ threat intelligence solution. In 2022 eSentire added storied private equity firm Warburg-Pincus to their cap table and achieved unicorn status with a valuation of one billion dollars.</p><p><br></p><p>In this engaging episode of SecureTalk, host Justin Beals invites Eldon Sprickerhoff, a seasoned cybersecurity expert and founder of eSentire, to share his journey. Eldon graduated with a computer science degree from Waterloo University in 1991 and went on to establish a leading managed security services provider.</p><p><br></p><p>During the conversation, Eldon reflects on his early career concerns and the macroeconomic challenges he faced during a recession. He also shares insights from his book, *Committed*, which explores the realities of startup life. The discussion highlights essential strategies for navigating the cybersecurity marketplace, the importance of founder-led sales, and the significant challenges and opportunities within the cybersecurity field.</p><p><br></p><p>Tune in to gain valuable perspectives on entrepreneurship, real-time vulnerability scans, and the impact of AI and quantum computing on cybersecurity.</p><p><br>Link to the Book: Commited: Startup Survival Tips and Uncommon Sense for First-Time Tech Founders https://sutherlandhousebooks.com/product/committed/</p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Jan 2025 14:45:03 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/82d2edad/24f8a80b.mp3" length="105711195" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/bBxB9LNJXO0CS4XSsRnYRNqYXPQ8sXWwPLI7Ed3QEFQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zM2Jm/NTBjNWMwNTM2ODkz/OTZjZTE5ODgzYTEx/NDYzZi5wbmc.jpg"/>
      <itunes:duration>2641</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Eldon Spickerhoff founded eSentire in 2001. He had been a Senior Information Security Engineer for ING Prime after completing his academic work at Waterloo University. At the time the cybersecurity solutions marketplace was primarily a services offering, focusing on vulnerability scanning. The team at eSentire realized that the tools deployed in vulnerability scanning to internal systems could be left running post a services engagement. And in the process they invented an ‘always on’ threat intelligence solution. In 2022 eSentire added storied private equity firm Warburg-Pincus to their cap table and achieved unicorn status with a valuation of one billion dollars.</p><p><br></p><p>In this engaging episode of SecureTalk, host Justin Beals invites Eldon Sprickerhoff, a seasoned cybersecurity expert and founder of eSentire, to share his journey. Eldon graduated with a computer science degree from Waterloo University in 1991 and went on to establish a leading managed security services provider.</p><p><br></p><p>During the conversation, Eldon reflects on his early career concerns and the macroeconomic challenges he faced during a recession. He also shares insights from his book, *Committed*, which explores the realities of startup life. The discussion highlights essential strategies for navigating the cybersecurity marketplace, the importance of founder-led sales, and the significant challenges and opportunities within the cybersecurity field.</p><p><br></p><p>Tune in to gain valuable perspectives on entrepreneurship, real-time vulnerability scans, and the impact of AI and quantum computing on cybersecurity.</p><p><br>Link to the Book: Commited: Startup Survival Tips and Uncommon Sense for First-Time Tech Founders https://sutherlandhousebooks.com/product/committed/</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, leadership, threat intelligence</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Cybersecurity Maturity Model (CMMC) has arrived! with Stephen Ferrell</title>
      <itunes:episode>203</itunes:episode>
      <podcast:episode>203</podcast:episode>
      <itunes:title>The Cybersecurity Maturity Model (CMMC) has arrived! with Stephen Ferrell</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a0c223bb-4d4c-40bb-8cb3-1af284aacda5</guid>
      <link>https://share.transistor.fm/s/76ebd7df</link>
      <description>
        <![CDATA[<p>In this episode of Secure Talk, Justin welcomes Stephen Ferrell, a cybersecurity expert and Chief Strategy Officer of Strike Graph, to discuss the significant changes in the compliance landscape brought about by the Cybersecurity Maturity Model Certification (CMMC). They explore the recent finalization of the CMMC rule, its implications for the defense industrial base, and the phased compliance requirements for various certification levels. </p><p><br></p><p>The conversation emphasizes the necessity of CMMC for federal contractors, including those in non-traditional sectors like medical equipment manufacturing, along with the associated costs and procedures. Stephen also shares insights from his experience conducting a self-assessment for CMMC compliance, offering practical advice for organizations aiming to achieve certification. </p><p><br></p><p>This episode is essential for cybersecurity professionals who want to understand the latest federal compliance standards and prepare their organizations accordingly.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Secure Talk, Justin welcomes Stephen Ferrell, a cybersecurity expert and Chief Strategy Officer of Strike Graph, to discuss the significant changes in the compliance landscape brought about by the Cybersecurity Maturity Model Certification (CMMC). They explore the recent finalization of the CMMC rule, its implications for the defense industrial base, and the phased compliance requirements for various certification levels. </p><p><br></p><p>The conversation emphasizes the necessity of CMMC for federal contractors, including those in non-traditional sectors like medical equipment manufacturing, along with the associated costs and procedures. Stephen also shares insights from his experience conducting a self-assessment for CMMC compliance, offering practical advice for organizations aiming to achieve certification. </p><p><br></p><p>This episode is essential for cybersecurity professionals who want to understand the latest federal compliance standards and prepare their organizations accordingly.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Dec 2024 15:29:09 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/76ebd7df/1a4ad8c0.mp3" length="74717164" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6BLC3oycaxt7hka2CtnUd5sZYYx5rBKHwlNNrX3Db2c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jOTE5/ZTVkM2RkYWVkODE3/MzVkOTc1ZTM3MDc5/OTk0Zi5wbmc.jpg"/>
      <itunes:duration>1866</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Secure Talk, Justin welcomes Stephen Ferrell, a cybersecurity expert and Chief Strategy Officer of Strike Graph, to discuss the significant changes in the compliance landscape brought about by the Cybersecurity Maturity Model Certification (CMMC). They explore the recent finalization of the CMMC rule, its implications for the defense industrial base, and the phased compliance requirements for various certification levels. </p><p><br></p><p>The conversation emphasizes the necessity of CMMC for federal contractors, including those in non-traditional sectors like medical equipment manufacturing, along with the associated costs and procedures. Stephen also shares insights from his experience conducting a self-assessment for CMMC compliance, offering practical advice for organizations aiming to achieve certification. </p><p><br></p><p>This episode is essential for cybersecurity professionals who want to understand the latest federal compliance standards and prepare their organizations accordingly.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, CMMC, Compliance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title> Unlocking AI’s Potential Privately, Safely and Responsibly with Dan Clarke</title>
      <itunes:episode>202</itunes:episode>
      <podcast:episode>202</podcast:episode>
      <itunes:title> Unlocking AI’s Potential Privately, Safely and Responsibly with Dan Clarke</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">79cd28d3-f3b6-45c0-a3e6-0225eaa8b54c</guid>
      <link>https://share.transistor.fm/s/bb514490</link>
      <description>
        <![CDATA[<p>Privacy laws in our modern computing era have been around for well over twenty years. The conversation around appropriate privacy measures and effective governance of data has matured quite nicely since the early days of the Internet. While breaches do continue to happen, laws like GDPR, HIPAA and CCPA have helped set expectations for ethical and effective privacy practices.</p><p><br></p><p>But we are in the midst of a massive proliferation of generative AI models. Since the technology is so nascent our expectations of privacy are being reshaped. An AI model is fundamentally a mathematical representation of a large data set. Its probabilistic function will create information depending on the prompts it can be given. Deep in the model the data used to ‘train’ it still leaves a fingerprint of the source information. What are the expectations for privacy, copyright and safety to those of us that have shared information on the internet?</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals engages in a comprehensive discussion with Dan Clarke,  about the significant impact of AI. The conversation begins with Dan’s early days in computing and follows his journey into developing AI governance. They explore the transformative effects of AI in comparison to historical technological innovations, as well as the risks and biases that are inherent in AI systems. Additionally, they discuss current and future legal compliance issues.</p><p><br></p><p>Dan shares personal anecdotes related to privacy challenges and the applicability of AI, emphasizing the importance of transparency, thorough risk assessment, and bias testing in AI implementations. This episode provides valuable insights for anyone interested in the ethical and responsible use of AI technology in today's applications.</p><p><br>00:00 Welcome to SecureTalk: Exploring Information Security</p><p>00:32 The Evolving Landscape of Privacy and AI</p><p>01:47 Introducing Dan Clark: AI Privacy Leader</p><p>03:10 Dan Clark's Journey: From Intel to Privacy Advocacy</p><p>04:14 The Impact of AI: Paradigm Shifts and Privacy Concerns</p><p>06:08 Personal Data and Privacy: A Real-Life Story</p><p>08:45 The Importance of Data Control and Fairness</p><p>13:10 AI Governance and Legal Responsibilities</p><p>21:02 Current Laws Impacting AI and Privacy</p><p>26:47 Legal Basis for Data Usage</p><p>27:01 Introduction to Truio and InnerEdge</p><p>27:29 The Birth of Truio: Addressing GDPR</p><p>28:39 AI Governance and Federal Privacy Law</p><p>30:48 Transparent AI Practices</p><p>31:58 Understanding AI Risks and Transparency</p><p>36:52 AI Use Cases and Risk Assessment</p><p>44:57 Bias Testing and AI Governance</p><p>50:39 Concluding Thoughts on AI and Governance</p><p>Link: <a href="https://get.truyo.com/ai-governance-training">https://get.truyo.com/ai-governance-training</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privacy laws in our modern computing era have been around for well over twenty years. The conversation around appropriate privacy measures and effective governance of data has matured quite nicely since the early days of the Internet. While breaches do continue to happen, laws like GDPR, HIPAA and CCPA have helped set expectations for ethical and effective privacy practices.</p><p><br></p><p>But we are in the midst of a massive proliferation of generative AI models. Since the technology is so nascent our expectations of privacy are being reshaped. An AI model is fundamentally a mathematical representation of a large data set. Its probabilistic function will create information depending on the prompts it can be given. Deep in the model the data used to ‘train’ it still leaves a fingerprint of the source information. What are the expectations for privacy, copyright and safety to those of us that have shared information on the internet?</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals engages in a comprehensive discussion with Dan Clarke,  about the significant impact of AI. The conversation begins with Dan’s early days in computing and follows his journey into developing AI governance. They explore the transformative effects of AI in comparison to historical technological innovations, as well as the risks and biases that are inherent in AI systems. Additionally, they discuss current and future legal compliance issues.</p><p><br></p><p>Dan shares personal anecdotes related to privacy challenges and the applicability of AI, emphasizing the importance of transparency, thorough risk assessment, and bias testing in AI implementations. This episode provides valuable insights for anyone interested in the ethical and responsible use of AI technology in today's applications.</p><p><br>00:00 Welcome to SecureTalk: Exploring Information Security</p><p>00:32 The Evolving Landscape of Privacy and AI</p><p>01:47 Introducing Dan Clark: AI Privacy Leader</p><p>03:10 Dan Clark's Journey: From Intel to Privacy Advocacy</p><p>04:14 The Impact of AI: Paradigm Shifts and Privacy Concerns</p><p>06:08 Personal Data and Privacy: A Real-Life Story</p><p>08:45 The Importance of Data Control and Fairness</p><p>13:10 AI Governance and Legal Responsibilities</p><p>21:02 Current Laws Impacting AI and Privacy</p><p>26:47 Legal Basis for Data Usage</p><p>27:01 Introduction to Truio and InnerEdge</p><p>27:29 The Birth of Truio: Addressing GDPR</p><p>28:39 AI Governance and Federal Privacy Law</p><p>30:48 Transparent AI Practices</p><p>31:58 Understanding AI Risks and Transparency</p><p>36:52 AI Use Cases and Risk Assessment</p><p>44:57 Bias Testing and AI Governance</p><p>50:39 Concluding Thoughts on AI and Governance</p><p>Link: <a href="https://get.truyo.com/ai-governance-training">https://get.truyo.com/ai-governance-training</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Dec 2024 15:09:32 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/bb514490/431a2fb7.mp3" length="126256965" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RGN6k6wY-HTedt4wxXd5riNF53h_ICxh7ZHgT_sPMNo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MzE0/YmMzNTk2YzcxZmU0/NThhMjA3ZTg1ODBj/YWMyMy5wbmc.jpg"/>
      <itunes:duration>3155</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Privacy laws in our modern computing era have been around for well over twenty years. The conversation around appropriate privacy measures and effective governance of data has matured quite nicely since the early days of the Internet. While breaches do continue to happen, laws like GDPR, HIPAA and CCPA have helped set expectations for ethical and effective privacy practices.</p><p><br></p><p>But we are in the midst of a massive proliferation of generative AI models. Since the technology is so nascent our expectations of privacy are being reshaped. An AI model is fundamentally a mathematical representation of a large data set. Its probabilistic function will create information depending on the prompts it can be given. Deep in the model the data used to ‘train’ it still leaves a fingerprint of the source information. What are the expectations for privacy, copyright and safety to those of us that have shared information on the internet?</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals engages in a comprehensive discussion with Dan Clarke,  about the significant impact of AI. The conversation begins with Dan’s early days in computing and follows his journey into developing AI governance. They explore the transformative effects of AI in comparison to historical technological innovations, as well as the risks and biases that are inherent in AI systems. Additionally, they discuss current and future legal compliance issues.</p><p><br></p><p>Dan shares personal anecdotes related to privacy challenges and the applicability of AI, emphasizing the importance of transparency, thorough risk assessment, and bias testing in AI implementations. This episode provides valuable insights for anyone interested in the ethical and responsible use of AI technology in today's applications.</p><p><br>00:00 Welcome to SecureTalk: Exploring Information Security</p><p>00:32 The Evolving Landscape of Privacy and AI</p><p>01:47 Introducing Dan Clark: AI Privacy Leader</p><p>03:10 Dan Clark's Journey: From Intel to Privacy Advocacy</p><p>04:14 The Impact of AI: Paradigm Shifts and Privacy Concerns</p><p>06:08 Personal Data and Privacy: A Real-Life Story</p><p>08:45 The Importance of Data Control and Fairness</p><p>13:10 AI Governance and Legal Responsibilities</p><p>21:02 Current Laws Impacting AI and Privacy</p><p>26:47 Legal Basis for Data Usage</p><p>27:01 Introduction to Truio and InnerEdge</p><p>27:29 The Birth of Truio: Addressing GDPR</p><p>28:39 AI Governance and Federal Privacy Law</p><p>30:48 Transparent AI Practices</p><p>31:58 Understanding AI Risks and Transparency</p><p>36:52 AI Use Cases and Risk Assessment</p><p>44:57 Bias Testing and AI Governance</p><p>50:39 Concluding Thoughts on AI and Governance</p><p>Link: <a href="https://get.truyo.com/ai-governance-training">https://get.truyo.com/ai-governance-training</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, AI, Privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Innovative Approaches to Cyber Security Awareness Training with Craig Taylor</title>
      <itunes:episode>201</itunes:episode>
      <podcast:episode>201</podcast:episode>
      <itunes:title>Innovative Approaches to Cyber Security Awareness Training with Craig Taylor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a72af399-f58c-4faf-8ed2-1c012de4988d</guid>
      <link>https://share.transistor.fm/s/02097735</link>
      <description>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals, CEO and founder of Strike Graph, discusses cybersecurity awareness training with Craig Taylor, CEO and co-founder of CyberHoot. They explore the evolution and significance of security training, particularly in light of the rising number of phishing attacks. Taylor shares insights from his extensive background, including being a senior risk analyst for Computer Sciences Corporation in the development of one of the first cloud hosting platforms. He also shares his experience as a virtual Chief Information Security Officer (vCISO) and the growth and success of CyberHoot. </p><p><br></p><p>The conversation highlights CyberHoot's innovative use of positive reinforcement methods in their approach to automated training and examines the role of artificial intelligence (AI) in both creating and combating cybersecurity threats. They also discuss the future of AI in security training and provide practical steps that companies can take to enhance their cyber resilience.</p><p><br></p><p>00:00 Introduction to SecureTalk</p><p>00:34 The Importance of Security Awareness Training</p><p>03:18 Craig Taylor's Journey into Cybersecurity</p><p>05:25 The Evolution of Technology and AI</p><p>15:30 The Role of Virtual CISOs</p><p>21:48 Building CyberHoot: From Services to Product</p><p>25:17 The Ineffectiveness of Shock Collars and Negative Reinforcement</p><p>26:21 The Power of Positive Reinforcement in Training</p><p>27:21 Challenges with Fake Email Phishing</p><p>27:51 Cyberhoots' Approach to Phishing Simulations</p><p>28:50 Gamification and Positive Outcomes</p><p>30:26 The Anxiety Around Cybersecurity Training</p><p>31:39 The Problem with Traditional Phishing Tests</p><p>33:13 Emerging Best Practices in Cybersecurity</p><p>38:53 The Role of AI in Phishing and Cybersecurity</p><p>45:16 Future Perspectives and Rapid Content Creation</p><p>48:46 Conclusion and Final Thoughts</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals, CEO and founder of Strike Graph, discusses cybersecurity awareness training with Craig Taylor, CEO and co-founder of CyberHoot. They explore the evolution and significance of security training, particularly in light of the rising number of phishing attacks. Taylor shares insights from his extensive background, including being a senior risk analyst for Computer Sciences Corporation in the development of one of the first cloud hosting platforms. He also shares his experience as a virtual Chief Information Security Officer (vCISO) and the growth and success of CyberHoot. </p><p><br></p><p>The conversation highlights CyberHoot's innovative use of positive reinforcement methods in their approach to automated training and examines the role of artificial intelligence (AI) in both creating and combating cybersecurity threats. They also discuss the future of AI in security training and provide practical steps that companies can take to enhance their cyber resilience.</p><p><br></p><p>00:00 Introduction to SecureTalk</p><p>00:34 The Importance of Security Awareness Training</p><p>03:18 Craig Taylor's Journey into Cybersecurity</p><p>05:25 The Evolution of Technology and AI</p><p>15:30 The Role of Virtual CISOs</p><p>21:48 Building CyberHoot: From Services to Product</p><p>25:17 The Ineffectiveness of Shock Collars and Negative Reinforcement</p><p>26:21 The Power of Positive Reinforcement in Training</p><p>27:21 Challenges with Fake Email Phishing</p><p>27:51 Cyberhoots' Approach to Phishing Simulations</p><p>28:50 Gamification and Positive Outcomes</p><p>30:26 The Anxiety Around Cybersecurity Training</p><p>31:39 The Problem with Traditional Phishing Tests</p><p>33:13 Emerging Best Practices in Cybersecurity</p><p>38:53 The Role of AI in Phishing and Cybersecurity</p><p>45:16 Future Perspectives and Rapid Content Creation</p><p>48:46 Conclusion and Final Thoughts</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Dec 2024 16:06:03 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/02097735/dd3ff52b.mp3" length="118667866" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZP4Wz_ew88Aya2COSWZY9YiIRiL-glukcSAtK5nm_Hc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjUy/Mzk4YjMxYmFjNGFi/YTBmNDg3MWZlODYw/MDliOC5wbmc.jpg"/>
      <itunes:duration>2965</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals, CEO and founder of Strike Graph, discusses cybersecurity awareness training with Craig Taylor, CEO and co-founder of CyberHoot. They explore the evolution and significance of security training, particularly in light of the rising number of phishing attacks. Taylor shares insights from his extensive background, including being a senior risk analyst for Computer Sciences Corporation in the development of one of the first cloud hosting platforms. He also shares his experience as a virtual Chief Information Security Officer (vCISO) and the growth and success of CyberHoot. </p><p><br></p><p>The conversation highlights CyberHoot's innovative use of positive reinforcement methods in their approach to automated training and examines the role of artificial intelligence (AI) in both creating and combating cybersecurity threats. They also discuss the future of AI in security training and provide practical steps that companies can take to enhance their cyber resilience.</p><p><br></p><p>00:00 Introduction to SecureTalk</p><p>00:34 The Importance of Security Awareness Training</p><p>03:18 Craig Taylor's Journey into Cybersecurity</p><p>05:25 The Evolution of Technology and AI</p><p>15:30 The Role of Virtual CISOs</p><p>21:48 Building CyberHoot: From Services to Product</p><p>25:17 The Ineffectiveness of Shock Collars and Negative Reinforcement</p><p>26:21 The Power of Positive Reinforcement in Training</p><p>27:21 Challenges with Fake Email Phishing</p><p>27:51 Cyberhoots' Approach to Phishing Simulations</p><p>28:50 Gamification and Positive Outcomes</p><p>30:26 The Anxiety Around Cybersecurity Training</p><p>31:39 The Problem with Traditional Phishing Tests</p><p>33:13 Emerging Best Practices in Cybersecurity</p><p>38:53 The Role of AI in Phishing and Cybersecurity</p><p>45:16 Future Perspectives and Rapid Content Creation</p><p>48:46 Conclusion and Final Thoughts</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, CISO, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Evolution of Identity Management with Eric Olden</title>
      <itunes:episode>200</itunes:episode>
      <podcast:episode>200</podcast:episode>
      <itunes:title>The Evolution of Identity Management with Eric Olden</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5f4fc6f6-9c7e-492d-8637-67f4813dfe90</guid>
      <link>https://share.transistor.fm/s/113239e6</link>
      <description>
        <![CDATA[<p>In this episode of Secure Talk we discuss the evolution of identity management with Eric Olden, co-founder and CEO of Strata Identity. Identity Management is at the heart of secure computing practices. And the requirements placed on it are ever-growing. Get it wrong, and you will expose the ‘crown jewels’ of your business. Today, many solutions rely on cloud-based Identity Management solutions for further security. How was Identity Management born, and where is it heading?</p><p><br></p><p>We discuss the early days of networked computing. How Eric recognized in 1995, while at Berkley, the opportunity of the Internet to break out of academic communities and become a space for business. In a moment of inspiration, he realized that the missing feature was security. To be successful a ‘web powered’ business needed to manage its users and their identities. Eric founded Securant Technologies in 1995 and developed some of the first Web Access Management products.  Securant Technologies was acquired by RSA in 2001. Eric continued to stay at the forefront of Identity Management by working on SAML, the gold standard of shared authentication.  Today, Eric is developing Strata and exploring how enterprise organizations are harmonizing multiple Identity Providers from Okta to Microsoft. Tune in to learn about the critical advancements shaping the trusted identity landscape from a leading expert and present innovator.</p><p><br></p><p>00:00 Introduction to SecureTalk</p><p>01:51 Challenges in Identity Management</p><p>03:16 Introduction to Eric Olden</p><p>04:33 Eric Olden's Early Experiences with Computing</p><p>08:39 The Birth of Identity Management Solutions</p><p>17:11 The Origin of SAML</p><p>23:13 Reflections on SAML Evolution</p><p>23:56 Introduction to OAuth and Identity Standards</p><p>26:22 The Vision Behind Strata</p><p>30:15 Challenges in Identity Management</p><p>33:12 Exploring Self-Hosted Identity Solutions</p><p>40:07 The Importance of Authentication and Authorization</p><p>46:39 Concluding Thoughts on Identity Standards</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Secure Talk we discuss the evolution of identity management with Eric Olden, co-founder and CEO of Strata Identity. Identity Management is at the heart of secure computing practices. And the requirements placed on it are ever-growing. Get it wrong, and you will expose the ‘crown jewels’ of your business. Today, many solutions rely on cloud-based Identity Management solutions for further security. How was Identity Management born, and where is it heading?</p><p><br></p><p>We discuss the early days of networked computing. How Eric recognized in 1995, while at Berkley, the opportunity of the Internet to break out of academic communities and become a space for business. In a moment of inspiration, he realized that the missing feature was security. To be successful a ‘web powered’ business needed to manage its users and their identities. Eric founded Securant Technologies in 1995 and developed some of the first Web Access Management products.  Securant Technologies was acquired by RSA in 2001. Eric continued to stay at the forefront of Identity Management by working on SAML, the gold standard of shared authentication.  Today, Eric is developing Strata and exploring how enterprise organizations are harmonizing multiple Identity Providers from Okta to Microsoft. Tune in to learn about the critical advancements shaping the trusted identity landscape from a leading expert and present innovator.</p><p><br></p><p>00:00 Introduction to SecureTalk</p><p>01:51 Challenges in Identity Management</p><p>03:16 Introduction to Eric Olden</p><p>04:33 Eric Olden's Early Experiences with Computing</p><p>08:39 The Birth of Identity Management Solutions</p><p>17:11 The Origin of SAML</p><p>23:13 Reflections on SAML Evolution</p><p>23:56 Introduction to OAuth and Identity Standards</p><p>26:22 The Vision Behind Strata</p><p>30:15 Challenges in Identity Management</p><p>33:12 Exploring Self-Hosted Identity Solutions</p><p>40:07 The Importance of Authentication and Authorization</p><p>46:39 Concluding Thoughts on Identity Standards</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Nov 2024 15:49:26 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/113239e6/e0052535.mp3" length="116064368" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4r9aKMJOy63_l6IG1JccVJQ4yHlZ_Ik8h5DQJig6Hjg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82M2Nk/NjkyM2U4ODBiNTMy/MGRkZDZmZTdiMTQy/MzU4OS5wbmc.jpg"/>
      <itunes:duration>2900</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Secure Talk we discuss the evolution of identity management with Eric Olden, co-founder and CEO of Strata Identity. Identity Management is at the heart of secure computing practices. And the requirements placed on it are ever-growing. Get it wrong, and you will expose the ‘crown jewels’ of your business. Today, many solutions rely on cloud-based Identity Management solutions for further security. How was Identity Management born, and where is it heading?</p><p><br></p><p>We discuss the early days of networked computing. How Eric recognized in 1995, while at Berkley, the opportunity of the Internet to break out of academic communities and become a space for business. In a moment of inspiration, he realized that the missing feature was security. To be successful a ‘web powered’ business needed to manage its users and their identities. Eric founded Securant Technologies in 1995 and developed some of the first Web Access Management products.  Securant Technologies was acquired by RSA in 2001. Eric continued to stay at the forefront of Identity Management by working on SAML, the gold standard of shared authentication.  Today, Eric is developing Strata and exploring how enterprise organizations are harmonizing multiple Identity Providers from Okta to Microsoft. Tune in to learn about the critical advancements shaping the trusted identity landscape from a leading expert and present innovator.</p><p><br></p><p>00:00 Introduction to SecureTalk</p><p>01:51 Challenges in Identity Management</p><p>03:16 Introduction to Eric Olden</p><p>04:33 Eric Olden's Early Experiences with Computing</p><p>08:39 The Birth of Identity Management Solutions</p><p>17:11 The Origin of SAML</p><p>23:13 Reflections on SAML Evolution</p><p>23:56 Introduction to OAuth and Identity Standards</p><p>26:22 The Vision Behind Strata</p><p>30:15 Challenges in Identity Management</p><p>33:12 Exploring Self-Hosted Identity Solutions</p><p>40:07 The Importance of Authentication and Authorization</p><p>46:39 Concluding Thoughts on Identity Standards</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, IdentityManagement, SAML</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Fairy Tales and Firewalls: Bridging Myths with Modern Security</title>
      <itunes:episode>199</itunes:episode>
      <podcast:episode>199</podcast:episode>
      <itunes:title>Fairy Tales and Firewalls: Bridging Myths with Modern Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c2e180f-cf52-4616-b025-6db002d48dc9</guid>
      <link>https://share.transistor.fm/s/6fa76f36</link>
      <description>
        <![CDATA[<p>Cybersecurity is complicated; weird acronyms, massive risks and arcane skills. How do we teach or learn about cybersecurity in human ways?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals is joined by cybersecurity researcher Luca Viganò to discuss his innovative approach to demystifying cybersecurity concepts using fairy tales. Luca shares his passion for making cybersecurity accessible to both experts and the general public by employing storytelling techniques. Key topics include multifactor authentication, explained through 'Cinderella' and password security inspired by 'Alibaba and the 40 Thieves.' Luca's insights are based on his acclaimed article 'Cyber Security of Fairy Tales.' This episode provides a fresh perspective on engaging non-expert stakeholders and underlines the importance of a social-technical approach to cybersecurity.</p><p>00:00 Introduction to SecureTalk<br>00:34 Host's Background and Passion for Storytelling<br>03:07 Introducing Luca Vigano<br>04:49 Luca's Journey in Cybersecurity<br>06:47 The Power of Storytelling in Teaching Security<br>08:10 Fairy Tales and Cybersecurity<br>18:43 Cinderella and Multi-Factor Authentication<br>34:06 Alibaba and the 40 Thieves: Lessons in Security<br>40:30 Show vs. Tell in Security Education<br>44:39 Future Work and Conclusion</p><p><br>Article: Luca Viganò, The cybersecurity of fairy tales, <em>Journal of Cybersecurity</em>, Volume 10, Issue 1, 2024, tyae005, <a href="https://doi.org/10.1093/cybsec/tyae005">https://doi.org/10.1093/cybsec/tyae005</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybersecurity is complicated; weird acronyms, massive risks and arcane skills. How do we teach or learn about cybersecurity in human ways?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals is joined by cybersecurity researcher Luca Viganò to discuss his innovative approach to demystifying cybersecurity concepts using fairy tales. Luca shares his passion for making cybersecurity accessible to both experts and the general public by employing storytelling techniques. Key topics include multifactor authentication, explained through 'Cinderella' and password security inspired by 'Alibaba and the 40 Thieves.' Luca's insights are based on his acclaimed article 'Cyber Security of Fairy Tales.' This episode provides a fresh perspective on engaging non-expert stakeholders and underlines the importance of a social-technical approach to cybersecurity.</p><p>00:00 Introduction to SecureTalk<br>00:34 Host's Background and Passion for Storytelling<br>03:07 Introducing Luca Vigano<br>04:49 Luca's Journey in Cybersecurity<br>06:47 The Power of Storytelling in Teaching Security<br>08:10 Fairy Tales and Cybersecurity<br>18:43 Cinderella and Multi-Factor Authentication<br>34:06 Alibaba and the 40 Thieves: Lessons in Security<br>40:30 Show vs. Tell in Security Education<br>44:39 Future Work and Conclusion</p><p><br>Article: Luca Viganò, The cybersecurity of fairy tales, <em>Journal of Cybersecurity</em>, Volume 10, Issue 1, 2024, tyae005, <a href="https://doi.org/10.1093/cybsec/tyae005">https://doi.org/10.1093/cybsec/tyae005</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 19 Nov 2024 15:36:28 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/6fa76f36/b94d4624.mp3" length="117506753" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/K_aZcomrIFm8c5sY3-TQbPclcLBnsKsajl_G-W0WfLk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZWEx/NzkxYzVhOTIzZThj/MjVjZjVhNTdkMzhi/ZTA3Mi5wbmc.jpg"/>
      <itunes:duration>2936</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity is complicated; weird acronyms, massive risks and arcane skills. How do we teach or learn about cybersecurity in human ways?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals is joined by cybersecurity researcher Luca Viganò to discuss his innovative approach to demystifying cybersecurity concepts using fairy tales. Luca shares his passion for making cybersecurity accessible to both experts and the general public by employing storytelling techniques. Key topics include multifactor authentication, explained through 'Cinderella' and password security inspired by 'Alibaba and the 40 Thieves.' Luca's insights are based on his acclaimed article 'Cyber Security of Fairy Tales.' This episode provides a fresh perspective on engaging non-expert stakeholders and underlines the importance of a social-technical approach to cybersecurity.</p><p>00:00 Introduction to SecureTalk<br>00:34 Host's Background and Passion for Storytelling<br>03:07 Introducing Luca Vigano<br>04:49 Luca's Journey in Cybersecurity<br>06:47 The Power of Storytelling in Teaching Security<br>08:10 Fairy Tales and Cybersecurity<br>18:43 Cinderella and Multi-Factor Authentication<br>34:06 Alibaba and the 40 Thieves: Lessons in Security<br>40:30 Show vs. Tell in Security Education<br>44:39 Future Work and Conclusion</p><p><br>Article: Luca Viganò, The cybersecurity of fairy tales, <em>Journal of Cybersecurity</em>, Volume 10, Issue 1, 2024, tyae005, <a href="https://doi.org/10.1093/cybsec/tyae005">https://doi.org/10.1093/cybsec/tyae005</a></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, education, storytelling</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Application Security Management and the new SBOM with Idan Plotnik</title>
      <itunes:episode>198</itunes:episode>
      <podcast:episode>198</podcast:episode>
      <itunes:title>Application Security Management and the new SBOM with Idan Plotnik</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8fb1975b-de50-4063-a421-0c9865ef9450</guid>
      <link>https://share.transistor.fm/s/b9ffdd78</link>
      <description>
        <![CDATA[<p>In this episode of SecureTalk, host Justin Beals speaks with Idan Plotnik, co-founder and CEO of Apiiro, about the complexities of application security and innovation. They discuss Idan's career, which began with his early interest in secure computing as an engineer for the Israeli Defence Force. Later, while at Microsoft, Idan was frustrated by the inefficiencies in current application security reviews that slowed down software delivery. Idan explains opportunities to improve the application security posture throughout the software development lifecycle, emphasizing their methods for deep code analysis and extended Software Bill of Materials (SBOMs). The conversation also covers the role of AI in security, the significance of automation, and the integration of graph data models for effectively visualizing and managing security threats.</p><p><br></p><p>00:00 Welcome to SecureTalk</p><p>00:32 Introduction to Application Security</p><p>01:44 Meet Idan Plotnik</p><p>02:52 Idan’s Journey in Cybersecurity</p><p>04:31 Early Encounters with Computers and Security</p><p>08:44 Military Service and Professional Growth</p><p>12:19 Founding Apiiro and Innovations in Security</p><p>14:06 Challenges in Modern Software Development</p><p>15:33 Comprehensive Security Measures</p><p>19:47 Understanding the Risk Landscape</p><p>24:35 Understanding Risk in Software Architecture</p><p>25:30 The Role of AI in Software Security</p><p>26:29 Translating Code into Components</p><p>27:50 The Importance of Software Inventory</p><p>31:47 The Limitations of SBOMs</p><p>40:02 Automation in Security Design</p><p>46:00 The Power of Graph Data Models</p><p>48:35 Conclusion and Final Thoughts</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of SecureTalk, host Justin Beals speaks with Idan Plotnik, co-founder and CEO of Apiiro, about the complexities of application security and innovation. They discuss Idan's career, which began with his early interest in secure computing as an engineer for the Israeli Defence Force. Later, while at Microsoft, Idan was frustrated by the inefficiencies in current application security reviews that slowed down software delivery. Idan explains opportunities to improve the application security posture throughout the software development lifecycle, emphasizing their methods for deep code analysis and extended Software Bill of Materials (SBOMs). The conversation also covers the role of AI in security, the significance of automation, and the integration of graph data models for effectively visualizing and managing security threats.</p><p><br></p><p>00:00 Welcome to SecureTalk</p><p>00:32 Introduction to Application Security</p><p>01:44 Meet Idan Plotnik</p><p>02:52 Idan’s Journey in Cybersecurity</p><p>04:31 Early Encounters with Computers and Security</p><p>08:44 Military Service and Professional Growth</p><p>12:19 Founding Apiiro and Innovations in Security</p><p>14:06 Challenges in Modern Software Development</p><p>15:33 Comprehensive Security Measures</p><p>19:47 Understanding the Risk Landscape</p><p>24:35 Understanding Risk in Software Architecture</p><p>25:30 The Role of AI in Software Security</p><p>26:29 Translating Code into Components</p><p>27:50 The Importance of Software Inventory</p><p>31:47 The Limitations of SBOMs</p><p>40:02 Automation in Security Design</p><p>46:00 The Power of Graph Data Models</p><p>48:35 Conclusion and Final Thoughts</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Nov 2024 15:25:37 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/b9ffdd78/e7c10ec9.mp3" length="117191563" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vvVBrl2_9pSj-6tJuAj4GNpD-kobmjiKv37MgpGhMS0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZmI5/Yzg5Mjc0YWRkZmYx/MmVjNTU3YmRlYzIz/MDM1Yy5wbmc.jpg"/>
      <itunes:duration>2929</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of SecureTalk, host Justin Beals speaks with Idan Plotnik, co-founder and CEO of Apiiro, about the complexities of application security and innovation. They discuss Idan's career, which began with his early interest in secure computing as an engineer for the Israeli Defence Force. Later, while at Microsoft, Idan was frustrated by the inefficiencies in current application security reviews that slowed down software delivery. Idan explains opportunities to improve the application security posture throughout the software development lifecycle, emphasizing their methods for deep code analysis and extended Software Bill of Materials (SBOMs). The conversation also covers the role of AI in security, the significance of automation, and the integration of graph data models for effectively visualizing and managing security threats.</p><p><br></p><p>00:00 Welcome to SecureTalk</p><p>00:32 Introduction to Application Security</p><p>01:44 Meet Idan Plotnik</p><p>02:52 Idan’s Journey in Cybersecurity</p><p>04:31 Early Encounters with Computers and Security</p><p>08:44 Military Service and Professional Growth</p><p>12:19 Founding Apiiro and Innovations in Security</p><p>14:06 Challenges in Modern Software Development</p><p>15:33 Comprehensive Security Measures</p><p>19:47 Understanding the Risk Landscape</p><p>24:35 Understanding Risk in Software Architecture</p><p>25:30 The Role of AI in Software Security</p><p>26:29 Translating Code into Components</p><p>27:50 The Importance of Software Inventory</p><p>31:47 The Limitations of SBOMs</p><p>40:02 Automation in Security Design</p><p>46:00 The Power of Graph Data Models</p><p>48:35 Conclusion and Final Thoughts</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity , SBOM, Automation</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Privacy Reforms We Need Now with James B. Rule</title>
      <itunes:episode>197</itunes:episode>
      <podcast:episode>197</podcast:episode>
      <itunes:title>Privacy Reforms We Need Now with James B. Rule</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4a58078a-6764-4485-b8cc-de064a861c8d</guid>
      <link>https://share.transistor.fm/s/415bcbb3</link>
      <description>
        <![CDATA[<p>It’s easy to consider privacy as a technology issue, or a legal challenge. But our concepts of privacy have a lot to do with what type of community we would all like to live in. What happens when we consider privacy a right as opposed to a commodity?</p><p><br></p><p>Join us on Secure Talk for an in-depth exploration of the complex world of privacy with esteemed sociologist and author James B. Rule. In this episode, he draws parallels between past and present institutional power. He discusses his latest book, “Taking Privacy Seriously:  How to Create the Rights We Need While We Still Have Something to Protect “where he delves into the intricacies of privacy laws, the implications of personal data commercialization, and the notion of "personal decision systems." </p><p><br></p><p>James presents 11 practical privacy reforms, highlighting the importance of informed consent and strong data protection measures. This episode offers cybersecurity experts valuable historical context, actionable insights, and thought-provoking discussions on how to balance privacy with technological advancement. Join the conversation on how we can protect what truly matters.</p><p><br></p><p>Join us as we examine the challenges and potential reforms related to privacy in the digital age, highlighting recent legislative successes such as California's new privacy laws. James advocates for the establishment of national institutions dedicated to promoting privacy. He also discusses the ethical dilemmas faced by technology and policy leaders in striving to find the right balance between the utility of personal data and the protection of individual privacy.</p><p><br></p><p>This episode is essential for cybersecurity experts interested in privacy reform and the history of personal data usage.</p><p><br></p><p>Book: “Taking Privacy Seriously: How to Create the Rights We Need While We Still Have Something to Protect” </p><p><a href="https://www.ucpress.edu/books/taking-privacy-seriously/paper">https://www.ucpress.edu/books/taking-privacy-seriously/paper</a></p><p>00:00 Introduction to SecureTalk</p><p>00:32 Exploring the Complexities of Privacy</p><p>01:21 Introducing James B. Ruhle</p><p>02:56 James B. Ruhle's Journey into Privacy</p><p>06:55 Historical Perspectives on Privacy</p><p>09:10 Modern Privacy Challenges and Solutions</p><p>15:48 The Concept of Lawful Basis</p><p>23:59 Personal Decision Systems</p><p>26:26 Proposed Privacy Reforms</p><p>36:56 Public Events and Privacy Issues</p><p>42:55 Conclusion and Final Thoughts</p><p><br></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>It’s easy to consider privacy as a technology issue, or a legal challenge. But our concepts of privacy have a lot to do with what type of community we would all like to live in. What happens when we consider privacy a right as opposed to a commodity?</p><p><br></p><p>Join us on Secure Talk for an in-depth exploration of the complex world of privacy with esteemed sociologist and author James B. Rule. In this episode, he draws parallels between past and present institutional power. He discusses his latest book, “Taking Privacy Seriously:  How to Create the Rights We Need While We Still Have Something to Protect “where he delves into the intricacies of privacy laws, the implications of personal data commercialization, and the notion of "personal decision systems." </p><p><br></p><p>James presents 11 practical privacy reforms, highlighting the importance of informed consent and strong data protection measures. This episode offers cybersecurity experts valuable historical context, actionable insights, and thought-provoking discussions on how to balance privacy with technological advancement. Join the conversation on how we can protect what truly matters.</p><p><br></p><p>Join us as we examine the challenges and potential reforms related to privacy in the digital age, highlighting recent legislative successes such as California's new privacy laws. James advocates for the establishment of national institutions dedicated to promoting privacy. He also discusses the ethical dilemmas faced by technology and policy leaders in striving to find the right balance between the utility of personal data and the protection of individual privacy.</p><p><br></p><p>This episode is essential for cybersecurity experts interested in privacy reform and the history of personal data usage.</p><p><br></p><p>Book: “Taking Privacy Seriously: How to Create the Rights We Need While We Still Have Something to Protect” </p><p><a href="https://www.ucpress.edu/books/taking-privacy-seriously/paper">https://www.ucpress.edu/books/taking-privacy-seriously/paper</a></p><p>00:00 Introduction to SecureTalk</p><p>00:32 Exploring the Complexities of Privacy</p><p>01:21 Introducing James B. Ruhle</p><p>02:56 James B. Ruhle's Journey into Privacy</p><p>06:55 Historical Perspectives on Privacy</p><p>09:10 Modern Privacy Challenges and Solutions</p><p>15:48 The Concept of Lawful Basis</p><p>23:59 Personal Decision Systems</p><p>26:26 Proposed Privacy Reforms</p><p>36:56 Public Events and Privacy Issues</p><p>42:55 Conclusion and Final Thoughts</p><p><br></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 05 Nov 2024 15:35:37 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/415bcbb3/166805e5.mp3" length="106501777" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NgM0mkxwki_yRV7zS4hn2TzIITR47yKqylf2cs2YUiI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ODFm/ZDkwMTM3ODI5ZTA5/M2RkZWI3MGYxMzI5/ZjUxYi5wbmc.jpg"/>
      <itunes:duration>2661</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>It’s easy to consider privacy as a technology issue, or a legal challenge. But our concepts of privacy have a lot to do with what type of community we would all like to live in. What happens when we consider privacy a right as opposed to a commodity?</p><p><br></p><p>Join us on Secure Talk for an in-depth exploration of the complex world of privacy with esteemed sociologist and author James B. Rule. In this episode, he draws parallels between past and present institutional power. He discusses his latest book, “Taking Privacy Seriously:  How to Create the Rights We Need While We Still Have Something to Protect “where he delves into the intricacies of privacy laws, the implications of personal data commercialization, and the notion of "personal decision systems." </p><p><br></p><p>James presents 11 practical privacy reforms, highlighting the importance of informed consent and strong data protection measures. This episode offers cybersecurity experts valuable historical context, actionable insights, and thought-provoking discussions on how to balance privacy with technological advancement. Join the conversation on how we can protect what truly matters.</p><p><br></p><p>Join us as we examine the challenges and potential reforms related to privacy in the digital age, highlighting recent legislative successes such as California's new privacy laws. James advocates for the establishment of national institutions dedicated to promoting privacy. He also discusses the ethical dilemmas faced by technology and policy leaders in striving to find the right balance between the utility of personal data and the protection of individual privacy.</p><p><br></p><p>This episode is essential for cybersecurity experts interested in privacy reform and the history of personal data usage.</p><p><br></p><p>Book: “Taking Privacy Seriously: How to Create the Rights We Need While We Still Have Something to Protect” </p><p><a href="https://www.ucpress.edu/books/taking-privacy-seriously/paper">https://www.ucpress.edu/books/taking-privacy-seriously/paper</a></p><p>00:00 Introduction to SecureTalk</p><p>00:32 Exploring the Complexities of Privacy</p><p>01:21 Introducing James B. Ruhle</p><p>02:56 James B. Ruhle's Journey into Privacy</p><p>06:55 Historical Perspectives on Privacy</p><p>09:10 Modern Privacy Challenges and Solutions</p><p>15:48 The Concept of Lawful Basis</p><p>23:59 Personal Decision Systems</p><p>26:26 Proposed Privacy Reforms</p><p>36:56 Public Events and Privacy Issues</p><p>42:55 Conclusion and Final Thoughts</p><p><br></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>#privacy #cybersecurity #technology</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title> Is Technology a Religion? with Greg Epstein</title>
      <itunes:episode>196</itunes:episode>
      <podcast:episode>196</podcast:episode>
      <itunes:title> Is Technology a Religion? with Greg Epstein</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8657ad8d-6aa4-4f0e-b5e5-cc1192b2973c</guid>
      <link>https://share.transistor.fm/s/6234c2c1</link>
      <description>
        <![CDATA[<p>Have you ever felt like tech fandom was turning into a cult? A tech founder ‘preached’ that they heralded a new paradigm for humanity? AI will change everything, Cryptocurrency will make you rich, the ‘Singularity’ is coming! Elon Musk, Sam Altman, Steve Jobs, Bill Gates, etc are raised up as the new messiah by thousands of worshipers. Is it really so difficult to see the tendency of the billionaire technology founders to prey on our hopes and fears?</p><p><br></p><p>In a thought-provoking episode of Secure Talk, host Justin Beals  interviews Greg Epstein, the Humanist Chaplain at Harvard and MIT, and a New York Times bestselling author about his upcoming book, "Tech Agnostic: How Technology Became the World's Most Powerful Religion and Why It Desperately Needs a Reformation." They discuss the intricate relationship between technology, ethics, security, and human experience, challenging traditional perspectives on cybersecurity. Through engaging conversations about societal equity, community connections, and the ethical implications of technology-induced isolation, Greg and Justin shed light on the profound cultural and existential impact of technology on modern life. The discussion delves into the psychological and emotional aspects of the tech world, drawing parallels with religious structures and highlighting the need for a balance between technological engagement and ethical responsibility.</p><p>Book: "Tech Agnostic: How Technology Became the World's Most Powerful Religion and Why it Desperately Needs a Reformation"<br>https://mitpress.mit.edu/9780262049207/tech-agnostic/</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Have you ever felt like tech fandom was turning into a cult? A tech founder ‘preached’ that they heralded a new paradigm for humanity? AI will change everything, Cryptocurrency will make you rich, the ‘Singularity’ is coming! Elon Musk, Sam Altman, Steve Jobs, Bill Gates, etc are raised up as the new messiah by thousands of worshipers. Is it really so difficult to see the tendency of the billionaire technology founders to prey on our hopes and fears?</p><p><br></p><p>In a thought-provoking episode of Secure Talk, host Justin Beals  interviews Greg Epstein, the Humanist Chaplain at Harvard and MIT, and a New York Times bestselling author about his upcoming book, "Tech Agnostic: How Technology Became the World's Most Powerful Religion and Why It Desperately Needs a Reformation." They discuss the intricate relationship between technology, ethics, security, and human experience, challenging traditional perspectives on cybersecurity. Through engaging conversations about societal equity, community connections, and the ethical implications of technology-induced isolation, Greg and Justin shed light on the profound cultural and existential impact of technology on modern life. The discussion delves into the psychological and emotional aspects of the tech world, drawing parallels with religious structures and highlighting the need for a balance between technological engagement and ethical responsibility.</p><p>Book: "Tech Agnostic: How Technology Became the World's Most Powerful Religion and Why it Desperately Needs a Reformation"<br>https://mitpress.mit.edu/9780262049207/tech-agnostic/</p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Oct 2024 14:47:23 -0100</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/6234c2c1/24e752ba.mp3" length="129375932" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/tL5FOiBnBuFzt6wofn9Xwz_MTQJDu7xTrZANjQr1Huc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYWQw/OTBlYmU5OGM1ZTMx/MDU0ZjRmZGNjZTEz/NGQ5NC5wbmc.jpg"/>
      <itunes:duration>3233</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Have you ever felt like tech fandom was turning into a cult? A tech founder ‘preached’ that they heralded a new paradigm for humanity? AI will change everything, Cryptocurrency will make you rich, the ‘Singularity’ is coming! Elon Musk, Sam Altman, Steve Jobs, Bill Gates, etc are raised up as the new messiah by thousands of worshipers. Is it really so difficult to see the tendency of the billionaire technology founders to prey on our hopes and fears?</p><p><br></p><p>In a thought-provoking episode of Secure Talk, host Justin Beals  interviews Greg Epstein, the Humanist Chaplain at Harvard and MIT, and a New York Times bestselling author about his upcoming book, "Tech Agnostic: How Technology Became the World's Most Powerful Religion and Why It Desperately Needs a Reformation." They discuss the intricate relationship between technology, ethics, security, and human experience, challenging traditional perspectives on cybersecurity. Through engaging conversations about societal equity, community connections, and the ethical implications of technology-induced isolation, Greg and Justin shed light on the profound cultural and existential impact of technology on modern life. The discussion delves into the psychological and emotional aspects of the tech world, drawing parallels with religious structures and highlighting the need for a balance between technological engagement and ethical responsibility.</p><p>Book: "Tech Agnostic: How Technology Became the World's Most Powerful Religion and Why it Desperately Needs a Reformation"<br>https://mitpress.mit.edu/9780262049207/tech-agnostic/</p>]]>
      </itunes:summary>
      <itunes:keywords>security, ethics, technology</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Enterprise Security from Healthcare to GE: Accountability, Strategy, and Value Creation with Bob Chaput</title>
      <itunes:episode>195</itunes:episode>
      <podcast:episode>195</podcast:episode>
      <itunes:title>Enterprise Security from Healthcare to GE: Accountability, Strategy, and Value Creation with Bob Chaput</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">021bed44-aac7-4b2a-88f9-7ef430aa13fe</guid>
      <link>https://share.transistor.fm/s/87edead8</link>
      <description>
        <![CDATA[<p>My first SOC 2 audit as a Chief Technology Officer felt like performance art. Here we were, dancing to the tune of an auditor that had never built a web application, let alone a business. So many of their playbooks were repeated from other businesses and didn’t make us more secure. When we were done I was certainly glad to show off our new ‘certification’ but I wondered how I could implement great security and create value for my company.</p><p><br></p><p>In this compelling episode of Secure Talk, host Justin interviews Bob Chaput, a seasoned CISO and cybersecurity leader with a rich background in the healthcare sector. The conversation traverses Bob’s extensive career, from his early days at GE to establishing Johnson &amp; Johnson’s first information security program. Bob shares profound insights from his book, 'Cyber Risk Management as a Value Creator,' illustrating the shift of cybersecurity from a defensive necessity to a strategic business driver. They explore the critical role of governance, regulatory accountability, and the implementation of risk management frameworks like the NIST cybersecurity framework. Using real-world cases like Equifax’s post-breach recovery, Bob elucidates the tangible business value of robust cybersecurity measures. Learn about budgeting for cybersecurity, fostering organizational engagement, and integrating security into business operations for enhanced resilience and customer trust. This episode is a treasure trove for experts looking to transform their cybersecurity approach into a strategic advantage.</p><p>Book:  Enterprise Cyber Risk Management as a Value Creator <br>https://bobchaput.com/enterprise-cyber-risk-management-as-a-value-creator/</p><p>00:00 Welcome to SecureTalk: Introduction and Host Overview</p><p>00:41 The Importance of Scope in Cybersecurity</p><p>02:58 Introducing Bob Chaput: Cybersecurity Expert</p><p>04:45 Bob Chaput's Career Journey</p><p>08:17 Enterprise Cyber Risk Management as a Value Creator</p><p>12:20 The Role of Regulations and Accountability in Cybersecurity</p><p>17:26 Strategic Approach to Enterprise Cyber Risk Management</p><p>21:33 Risk and Opportunity Assessment in Cybersecurity</p><p>26:47 Leveraging Security Practices for Business Value</p><p>27:58 The Impact of Cybersecurity on Business Value</p><p>28:56 Clearwater's Role in Enhancing Cybersecurity</p><p>31:03 The ECRM Budget Philosophy</p><p>32:59 Maxims for Effective Cyber Risk Management</p><p>35:59 Building a Team Sport Culture in Cybersecurity</p><p>40:47 Foundational Components of ECRM</p><p>44:19 Challenges in Third-Party Risk Management</p><p>49:25 Clearwater's Journey and Future Prospects</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>My first SOC 2 audit as a Chief Technology Officer felt like performance art. Here we were, dancing to the tune of an auditor that had never built a web application, let alone a business. So many of their playbooks were repeated from other businesses and didn’t make us more secure. When we were done I was certainly glad to show off our new ‘certification’ but I wondered how I could implement great security and create value for my company.</p><p><br></p><p>In this compelling episode of Secure Talk, host Justin interviews Bob Chaput, a seasoned CISO and cybersecurity leader with a rich background in the healthcare sector. The conversation traverses Bob’s extensive career, from his early days at GE to establishing Johnson &amp; Johnson’s first information security program. Bob shares profound insights from his book, 'Cyber Risk Management as a Value Creator,' illustrating the shift of cybersecurity from a defensive necessity to a strategic business driver. They explore the critical role of governance, regulatory accountability, and the implementation of risk management frameworks like the NIST cybersecurity framework. Using real-world cases like Equifax’s post-breach recovery, Bob elucidates the tangible business value of robust cybersecurity measures. Learn about budgeting for cybersecurity, fostering organizational engagement, and integrating security into business operations for enhanced resilience and customer trust. This episode is a treasure trove for experts looking to transform their cybersecurity approach into a strategic advantage.</p><p>Book:  Enterprise Cyber Risk Management as a Value Creator <br>https://bobchaput.com/enterprise-cyber-risk-management-as-a-value-creator/</p><p>00:00 Welcome to SecureTalk: Introduction and Host Overview</p><p>00:41 The Importance of Scope in Cybersecurity</p><p>02:58 Introducing Bob Chaput: Cybersecurity Expert</p><p>04:45 Bob Chaput's Career Journey</p><p>08:17 Enterprise Cyber Risk Management as a Value Creator</p><p>12:20 The Role of Regulations and Accountability in Cybersecurity</p><p>17:26 Strategic Approach to Enterprise Cyber Risk Management</p><p>21:33 Risk and Opportunity Assessment in Cybersecurity</p><p>26:47 Leveraging Security Practices for Business Value</p><p>27:58 The Impact of Cybersecurity on Business Value</p><p>28:56 Clearwater's Role in Enhancing Cybersecurity</p><p>31:03 The ECRM Budget Philosophy</p><p>32:59 Maxims for Effective Cyber Risk Management</p><p>35:59 Building a Team Sport Culture in Cybersecurity</p><p>40:47 Foundational Components of ECRM</p><p>44:19 Challenges in Third-Party Risk Management</p><p>49:25 Clearwater's Journey and Future Prospects</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 22 Oct 2024 15:19:12 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/87edead8/985bd111.mp3" length="125652459" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/eWDSK2bbv4LK5mlMDcMFpWsiAf96BqLrTtwn0or9xS0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NWY1/YWNlYmQ4MmU3YzA1/OGZlMmY0N2QzMWQy/MWIxMS5wbmc.jpg"/>
      <itunes:duration>3139</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>My first SOC 2 audit as a Chief Technology Officer felt like performance art. Here we were, dancing to the tune of an auditor that had never built a web application, let alone a business. So many of their playbooks were repeated from other businesses and didn’t make us more secure. When we were done I was certainly glad to show off our new ‘certification’ but I wondered how I could implement great security and create value for my company.</p><p><br></p><p>In this compelling episode of Secure Talk, host Justin interviews Bob Chaput, a seasoned CISO and cybersecurity leader with a rich background in the healthcare sector. The conversation traverses Bob’s extensive career, from his early days at GE to establishing Johnson &amp; Johnson’s first information security program. Bob shares profound insights from his book, 'Cyber Risk Management as a Value Creator,' illustrating the shift of cybersecurity from a defensive necessity to a strategic business driver. They explore the critical role of governance, regulatory accountability, and the implementation of risk management frameworks like the NIST cybersecurity framework. Using real-world cases like Equifax’s post-breach recovery, Bob elucidates the tangible business value of robust cybersecurity measures. Learn about budgeting for cybersecurity, fostering organizational engagement, and integrating security into business operations for enhanced resilience and customer trust. This episode is a treasure trove for experts looking to transform their cybersecurity approach into a strategic advantage.</p><p>Book:  Enterprise Cyber Risk Management as a Value Creator <br>https://bobchaput.com/enterprise-cyber-risk-management-as-a-value-creator/</p><p>00:00 Welcome to SecureTalk: Introduction and Host Overview</p><p>00:41 The Importance of Scope in Cybersecurity</p><p>02:58 Introducing Bob Chaput: Cybersecurity Expert</p><p>04:45 Bob Chaput's Career Journey</p><p>08:17 Enterprise Cyber Risk Management as a Value Creator</p><p>12:20 The Role of Regulations and Accountability in Cybersecurity</p><p>17:26 Strategic Approach to Enterprise Cyber Risk Management</p><p>21:33 Risk and Opportunity Assessment in Cybersecurity</p><p>26:47 Leveraging Security Practices for Business Value</p><p>27:58 The Impact of Cybersecurity on Business Value</p><p>28:56 Clearwater's Role in Enhancing Cybersecurity</p><p>31:03 The ECRM Budget Philosophy</p><p>32:59 Maxims for Effective Cyber Risk Management</p><p>35:59 Building a Team Sport Culture in Cybersecurity</p><p>40:47 Foundational Components of ECRM</p><p>44:19 Challenges in Third-Party Risk Management</p><p>49:25 Clearwater's Journey and Future Prospects</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Healthcare, Strategy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Forging the future of security with Rey Kirton at Forgepoint Capital</title>
      <itunes:episode>194</itunes:episode>
      <podcast:episode>194</podcast:episode>
      <itunes:title>Forging the future of security with Rey Kirton at Forgepoint Capital</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1da54f4c-2695-46f2-bef6-e1125b3fd2ac</guid>
      <link>https://share.transistor.fm/s/19681307</link>
      <description>
        <![CDATA[<p>In the never-ending vortex of Silicon Valley's hype cycle, it's easy to get lost in the sea of superficial success stories and forget that true innovation often requires patience, persistence, and a willingness to disrupt the status quo – not just a fancy logo or a tweet from a billionaire CEO. Inside of the froth however, there are investors and venture capitalists that think carefully about who they are investing in, why it is a durable venture and how to create the best impact for everyone.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals welcomes Rey Kirton from Forge Point Capital to discuss venture capital's unique role in the cybersecurity industry. Rey shares his journey from consulting to venture capital, outlining the importance of building meaningful long-term relationships with companies he invests in. He explains how Forge Point Capital develops investment theses and highlights the value of solution-based, data-driven AI applications. The conversation delves into the significance of listening to customer feedback, industry patterns, and emerging themes like edge computing and AI in cybersecurity. The episode is a must-listen for founders and investors navigating the current market landscape, offering insights into building successful business partnerships and understanding evolving technology trends.</p><p>00:00 Welcome to SecureTalk</p><p>00:36 Introducing Our Guest: Ray Kirton</p><p>01:30 Rey Kirton's Career Journey</p><p>02:25 Venture Capital Insights</p><p>05:14 The Role of ForgePoint Capital</p><p>06:55 Investment Strategies and Challenges</p><p>17:01 AI in Cybersecurity</p><p>21:45 Leveraging Proprietary Data for AI and Data Science</p><p>23:19 The Rise and Fall of Blockchain and Crypto Hype</p><p>28:10 Understanding Venture Capital Dynamics</p><p>34:31 Future Trends in Technology and Investment</p><p>37:56 Advice for Aspiring Founders</p><p>39:09 The Importance of Customer Feedback</p><p>42:47 Building Strong Investor Relationships</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the never-ending vortex of Silicon Valley's hype cycle, it's easy to get lost in the sea of superficial success stories and forget that true innovation often requires patience, persistence, and a willingness to disrupt the status quo – not just a fancy logo or a tweet from a billionaire CEO. Inside of the froth however, there are investors and venture capitalists that think carefully about who they are investing in, why it is a durable venture and how to create the best impact for everyone.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals welcomes Rey Kirton from Forge Point Capital to discuss venture capital's unique role in the cybersecurity industry. Rey shares his journey from consulting to venture capital, outlining the importance of building meaningful long-term relationships with companies he invests in. He explains how Forge Point Capital develops investment theses and highlights the value of solution-based, data-driven AI applications. The conversation delves into the significance of listening to customer feedback, industry patterns, and emerging themes like edge computing and AI in cybersecurity. The episode is a must-listen for founders and investors navigating the current market landscape, offering insights into building successful business partnerships and understanding evolving technology trends.</p><p>00:00 Welcome to SecureTalk</p><p>00:36 Introducing Our Guest: Ray Kirton</p><p>01:30 Rey Kirton's Career Journey</p><p>02:25 Venture Capital Insights</p><p>05:14 The Role of ForgePoint Capital</p><p>06:55 Investment Strategies and Challenges</p><p>17:01 AI in Cybersecurity</p><p>21:45 Leveraging Proprietary Data for AI and Data Science</p><p>23:19 The Rise and Fall of Blockchain and Crypto Hype</p><p>28:10 Understanding Venture Capital Dynamics</p><p>34:31 Future Trends in Technology and Investment</p><p>37:56 Advice for Aspiring Founders</p><p>39:09 The Importance of Customer Feedback</p><p>42:47 Building Strong Investor Relationships</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Oct 2024 15:57:12 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/19681307/434d44d1.mp3" length="105932063" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KHXqAHgbvFcHqNT4OhOZx2YAz4B-A_5NOb8O8mO3sBM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MWRl/Yjc5ZmM2YzZjZjAw/NDliZDdiOGI4NjM5/Mzk1OC5wbmc.jpg"/>
      <itunes:duration>2646</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the never-ending vortex of Silicon Valley's hype cycle, it's easy to get lost in the sea of superficial success stories and forget that true innovation often requires patience, persistence, and a willingness to disrupt the status quo – not just a fancy logo or a tweet from a billionaire CEO. Inside of the froth however, there are investors and venture capitalists that think carefully about who they are investing in, why it is a durable venture and how to create the best impact for everyone.</p><p><br></p><p>In this episode of Secure Talk, host Justin Beals welcomes Rey Kirton from Forge Point Capital to discuss venture capital's unique role in the cybersecurity industry. Rey shares his journey from consulting to venture capital, outlining the importance of building meaningful long-term relationships with companies he invests in. He explains how Forge Point Capital develops investment theses and highlights the value of solution-based, data-driven AI applications. The conversation delves into the significance of listening to customer feedback, industry patterns, and emerging themes like edge computing and AI in cybersecurity. The episode is a must-listen for founders and investors navigating the current market landscape, offering insights into building successful business partnerships and understanding evolving technology trends.</p><p>00:00 Welcome to SecureTalk</p><p>00:36 Introducing Our Guest: Ray Kirton</p><p>01:30 Rey Kirton's Career Journey</p><p>02:25 Venture Capital Insights</p><p>05:14 The Role of ForgePoint Capital</p><p>06:55 Investment Strategies and Challenges</p><p>17:01 AI in Cybersecurity</p><p>21:45 Leveraging Proprietary Data for AI and Data Science</p><p>23:19 The Rise and Fall of Blockchain and Crypto Hype</p><p>28:10 Understanding Venture Capital Dynamics</p><p>34:31 Future Trends in Technology and Investment</p><p>37:56 Advice for Aspiring Founders</p><p>39:09 The Importance of Customer Feedback</p><p>42:47 Building Strong Investor Relationships</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>security, cybersecurity, venture capital</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Ethics and Innovation in Medical AI: A Conversation with Dr. Paul Campbell</title>
      <itunes:episode>193</itunes:episode>
      <podcast:episode>193</podcast:episode>
      <itunes:title>Ethics and Innovation in Medical AI: A Conversation with Dr. Paul Campbell</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c1440392-56fc-46fc-90d5-6203e91d1585</guid>
      <link>https://share.transistor.fm/s/e4535ceb</link>
      <description>
        <![CDATA[<p>"If you torture the data long enough, it will confess to anything" said Ronald Coase. Certainly the advent of AI has created some spectacular progress and failures. In the realm of patient care AI tools can have a powerful impact and there is little room for error. How do professionals in the Medical Device and Medical Software space prepare their solutions for the market?</p><p><br></p><p>In the latest episode of SecureTalk, Justin is joined by Dr. Paul Campbell, who serves as the Head of Software and AI at the UK's Medicines and Healthcare products Regulatory Agency (MHRA). Dr. Campbell discusses his journey from pharmacy to becoming a prominent figure in healthcare IT and regulated software. The conversation covers the development of AI in healthcare, the global standardization of regulations, and the MHRA’s innovative initiatives such as AI Airlock, which are driving progress in medical technology. The discussion also delves into the vital role of data representation, ethical considerations in AI, and the complexities of implementing advanced technologies in real-world medical settings.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>"If you torture the data long enough, it will confess to anything" said Ronald Coase. Certainly the advent of AI has created some spectacular progress and failures. In the realm of patient care AI tools can have a powerful impact and there is little room for error. How do professionals in the Medical Device and Medical Software space prepare their solutions for the market?</p><p><br></p><p>In the latest episode of SecureTalk, Justin is joined by Dr. Paul Campbell, who serves as the Head of Software and AI at the UK's Medicines and Healthcare products Regulatory Agency (MHRA). Dr. Campbell discusses his journey from pharmacy to becoming a prominent figure in healthcare IT and regulated software. The conversation covers the development of AI in healthcare, the global standardization of regulations, and the MHRA’s innovative initiatives such as AI Airlock, which are driving progress in medical technology. The discussion also delves into the vital role of data representation, ethical considerations in AI, and the complexities of implementing advanced technologies in real-world medical settings.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Oct 2024 15:09:43 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/e4535ceb/319d8d21.mp3" length="117864342" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vo4TYnRdA8458LAk5kezSVJG9KCORuqn-E0J0hCZE3w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNDFl/MTYxMWQwYjJiMzUw/ZjU1MDJmMDI4OGRj/MzIyOS5wbmc.jpg"/>
      <itunes:duration>2945</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>"If you torture the data long enough, it will confess to anything" said Ronald Coase. Certainly the advent of AI has created some spectacular progress and failures. In the realm of patient care AI tools can have a powerful impact and there is little room for error. How do professionals in the Medical Device and Medical Software space prepare their solutions for the market?</p><p><br></p><p>In the latest episode of SecureTalk, Justin is joined by Dr. Paul Campbell, who serves as the Head of Software and AI at the UK's Medicines and Healthcare products Regulatory Agency (MHRA). Dr. Campbell discusses his journey from pharmacy to becoming a prominent figure in healthcare IT and regulated software. The conversation covers the development of AI in healthcare, the global standardization of regulations, and the MHRA’s innovative initiatives such as AI Airlock, which are driving progress in medical technology. The discussion also delves into the vital role of data representation, ethical considerations in AI, and the complexities of implementing advanced technologies in real-world medical settings.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, medicine, ethics,AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Warfare and National Cyber Defense with Jason Healey</title>
      <itunes:episode>192</itunes:episode>
      <podcast:episode>192</podcast:episode>
      <itunes:title>Cyber Warfare and National Cyber Defense with Jason Healey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8235a5ea-ec2b-4b3b-b885-022a774346bc</guid>
      <link>https://share.transistor.fm/s/27130109</link>
      <description>
        <![CDATA[<p>Much of the United States' progress since World War II on the global stage is due to a powerful partnership between private industry and the US government. The internet itself was a DARPA research project now turned into an economic juggernaut. How do we feed and support this powerful partnership?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals welcomes Jason Healey, a senior research scholar at Columbia's School for International and Public Affairs. Jason, a pioneer in the field of cyber threat intelligence and former intelligence officer, discusses his extensive career and the evolution of cyber defense from the late 1990s to today. Topics include the origins of cybersecurity, the challenges of cyber warfare and policy, and the balance between defense and innovation. Jason elaborates on the critical role of metrics such as mean time to detect in measuring cybersecurity effectiveness and emphasizes the importance of harmonizing regulations and frameworks in the U.S. A detailed analysis of recent cyber incidents and the necessity for more robust cyber policies underlines the insightful conversation, making it essential listening for cybersecurity professionals.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Much of the United States' progress since World War II on the global stage is due to a powerful partnership between private industry and the US government. The internet itself was a DARPA research project now turned into an economic juggernaut. How do we feed and support this powerful partnership?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals welcomes Jason Healey, a senior research scholar at Columbia's School for International and Public Affairs. Jason, a pioneer in the field of cyber threat intelligence and former intelligence officer, discusses his extensive career and the evolution of cyber defense from the late 1990s to today. Topics include the origins of cybersecurity, the challenges of cyber warfare and policy, and the balance between defense and innovation. Jason elaborates on the critical role of metrics such as mean time to detect in measuring cybersecurity effectiveness and emphasizes the importance of harmonizing regulations and frameworks in the U.S. A detailed analysis of recent cyber incidents and the necessity for more robust cyber policies underlines the insightful conversation, making it essential listening for cybersecurity professionals.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Oct 2024 15:06:24 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/27130109/8509f41a.mp3" length="109934779" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Zu0FP8d7lP8-cGAEIXCU8OR_yi2azsgmAf1Aj8zrEdc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MzI5/MDZmMTliOWFmNmVj/Y2YyOThkYzE5ZmVh/ZGE1YS5wbmc.jpg"/>
      <itunes:duration>2746</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Much of the United States' progress since World War II on the global stage is due to a powerful partnership between private industry and the US government. The internet itself was a DARPA research project now turned into an economic juggernaut. How do we feed and support this powerful partnership?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals welcomes Jason Healey, a senior research scholar at Columbia's School for International and Public Affairs. Jason, a pioneer in the field of cyber threat intelligence and former intelligence officer, discusses his extensive career and the evolution of cyber defense from the late 1990s to today. Topics include the origins of cybersecurity, the challenges of cyber warfare and policy, and the balance between defense and innovation. Jason elaborates on the critical role of metrics such as mean time to detect in measuring cybersecurity effectiveness and emphasizes the importance of harmonizing regulations and frameworks in the U.S. A detailed analysis of recent cyber incidents and the necessity for more robust cyber policies underlines the insightful conversation, making it essential listening for cybersecurity professionals.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, security, cyber defense, threat intelligence</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Making Security a Part of Product Development with Naomi Buckwalter</title>
      <itunes:episode>191</itunes:episode>
      <podcast:episode>191</podcast:episode>
      <itunes:title>Making Security a Part of Product Development with Naomi Buckwalter</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8373d949-a060-4487-bfdd-acc3560571eb</guid>
      <link>https://share.transistor.fm/s/4228f738</link>
      <description>
        <![CDATA[<p>I’ve participated or led technology product teams for 25 years. And engaging in effective security practices was three simple activities: least privileges, change management and network/server configurations. But in an ever-changing security environment, how do security leaders engage product teams in effective practices? Join us on Secure Talk with Naomi Buckwalter, the Senior Director of Product Security at Contrast Security.</p><p><br></p><p>Throughout our conversation, Naomi shares her intriguing journey into the field of cybersecurity, from her early interest in tech and her educational background to landing a significant role at Vanguard Financial and eventually becoming a thought leader in cybersecurity. She explains the critical distinction between secure architecture reviews and secure code reviews and delves into the importance of trust and collaboration between developers and security engineers. Naomi also emphasizes the importance of inclusive hiring and discusses how she has successfully integrated individuals from non-traditional backgrounds into cybersecurity roles. As the founder of Cybersecurity Gatebreakers she helps technology teams find “young-in-career” talent ready to make an effective contribution. A poignant part of the discussion revolves around the concept of 'sec-splaining,' the need for excellent communication, and why security should be seen as a service to the business. This conversation is a must-listen for cybersecurity experts looking to enhance their understanding of team building and effective security management for software development.</p><p>-----<br>Additional Resources: <br>Books:<br>"The Smartest Person in The Room" by Christian Espinosa</p><p>https://christianespinosa.com/books/the-smartest-person-in-the-room/</p><p><br></p><p>"Five Disfunctions of a Team" by  Patrick Lencioni</p><p>https://www.amazon.com/Five-Dysfunctions-Team-Leadership-Fable/dp/0787960756</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>I’ve participated or led technology product teams for 25 years. And engaging in effective security practices was three simple activities: least privileges, change management and network/server configurations. But in an ever-changing security environment, how do security leaders engage product teams in effective practices? Join us on Secure Talk with Naomi Buckwalter, the Senior Director of Product Security at Contrast Security.</p><p><br></p><p>Throughout our conversation, Naomi shares her intriguing journey into the field of cybersecurity, from her early interest in tech and her educational background to landing a significant role at Vanguard Financial and eventually becoming a thought leader in cybersecurity. She explains the critical distinction between secure architecture reviews and secure code reviews and delves into the importance of trust and collaboration between developers and security engineers. Naomi also emphasizes the importance of inclusive hiring and discusses how she has successfully integrated individuals from non-traditional backgrounds into cybersecurity roles. As the founder of Cybersecurity Gatebreakers she helps technology teams find “young-in-career” talent ready to make an effective contribution. A poignant part of the discussion revolves around the concept of 'sec-splaining,' the need for excellent communication, and why security should be seen as a service to the business. This conversation is a must-listen for cybersecurity experts looking to enhance their understanding of team building and effective security management for software development.</p><p>-----<br>Additional Resources: <br>Books:<br>"The Smartest Person in The Room" by Christian Espinosa</p><p>https://christianespinosa.com/books/the-smartest-person-in-the-room/</p><p><br></p><p>"Five Disfunctions of a Team" by  Patrick Lencioni</p><p>https://www.amazon.com/Five-Dysfunctions-Team-Leadership-Fable/dp/0787960756</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 Sep 2024 15:51:06 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/4228f738/a68abea5.mp3" length="103374480" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-C0Ok37ON9M5M2fyDvlOAy6o6dr9l7gMXP4AU5icwIY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNzYy/ODdlZjMyOGE5NjJl/OWQ5MjgyNmEzZDNh/ODgyMi5wbmc.jpg"/>
      <itunes:duration>2583</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>I’ve participated or led technology product teams for 25 years. And engaging in effective security practices was three simple activities: least privileges, change management and network/server configurations. But in an ever-changing security environment, how do security leaders engage product teams in effective practices? Join us on Secure Talk with Naomi Buckwalter, the Senior Director of Product Security at Contrast Security.</p><p><br></p><p>Throughout our conversation, Naomi shares her intriguing journey into the field of cybersecurity, from her early interest in tech and her educational background to landing a significant role at Vanguard Financial and eventually becoming a thought leader in cybersecurity. She explains the critical distinction between secure architecture reviews and secure code reviews and delves into the importance of trust and collaboration between developers and security engineers. Naomi also emphasizes the importance of inclusive hiring and discusses how she has successfully integrated individuals from non-traditional backgrounds into cybersecurity roles. As the founder of Cybersecurity Gatebreakers she helps technology teams find “young-in-career” talent ready to make an effective contribution. A poignant part of the discussion revolves around the concept of 'sec-splaining,' the need for excellent communication, and why security should be seen as a service to the business. This conversation is a must-listen for cybersecurity experts looking to enhance their understanding of team building and effective security management for software development.</p><p>-----<br>Additional Resources: <br>Books:<br>"The Smartest Person in The Room" by Christian Espinosa</p><p>https://christianespinosa.com/books/the-smartest-person-in-the-room/</p><p><br></p><p>"Five Disfunctions of a Team" by  Patrick Lencioni</p><p>https://www.amazon.com/Five-Dysfunctions-Team-Leadership-Fable/dp/0787960756</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, hiring, databreach, infosec</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>From Cryptography to Web 3 powered by Blockchain with David Holtzman</title>
      <itunes:episode>190</itunes:episode>
      <podcast:episode>190</podcast:episode>
      <itunes:title>From Cryptography to Web 3 powered by Blockchain with David Holtzman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0d16a447-7b12-4334-a4f2-4b19fa37fa94</guid>
      <link>https://share.transistor.fm/s/ffa32940</link>
      <description>
        <![CDATA[<p>The state of networked computing systems today relies heavily on a networking architecture designed and implemented by people like David Hotlzman, our guest on Secure Talk. But what if our current “world wide web” was just the progenitor of an n-dimension “internet stack”? Does Web 3 offer the opportunity to evolve a seemingly monolithic internet?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals interviews David Holtzman, the brains behind the global domain name registration system and a former NSA analyst. They delve into the history and evolution of the DNS, discussing how it transformed from a single 'host.txt' file to a robust global system impacting millions of domain names. David shares his thoughts on decentralization, the potential of blockchain technology, and the future of cybersecurity in the wake of quantum computing. They also touch on the implications of AI, the cyclical nature of tech fads, and the importance of innovative yet secure solutions in today's rapidly evolving cyber environment. This episode is a must-listen for cybersecurity experts interested in the complex interplay between technology, governance, and security.<br></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The state of networked computing systems today relies heavily on a networking architecture designed and implemented by people like David Hotlzman, our guest on Secure Talk. But what if our current “world wide web” was just the progenitor of an n-dimension “internet stack”? Does Web 3 offer the opportunity to evolve a seemingly monolithic internet?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals interviews David Holtzman, the brains behind the global domain name registration system and a former NSA analyst. They delve into the history and evolution of the DNS, discussing how it transformed from a single 'host.txt' file to a robust global system impacting millions of domain names. David shares his thoughts on decentralization, the potential of blockchain technology, and the future of cybersecurity in the wake of quantum computing. They also touch on the implications of AI, the cyclical nature of tech fads, and the importance of innovative yet secure solutions in today's rapidly evolving cyber environment. This episode is a must-listen for cybersecurity experts interested in the complex interplay between technology, governance, and security.<br></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Sep 2024 14:53:21 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/ffa32940/68bf2b0e.mp3" length="119906876" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/JQaVWpWzu-zaVE0nHF1bkozvK_afq1gxqiOzQx9DLBI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZTU4/M2U2ZDU2OTFiZjBl/NmZmM2FlNzdmMWY5/OWM5ZC5wbmc.jpg"/>
      <itunes:duration>2996</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>The state of networked computing systems today relies heavily on a networking architecture designed and implemented by people like David Hotlzman, our guest on Secure Talk. But what if our current “world wide web” was just the progenitor of an n-dimension “internet stack”? Does Web 3 offer the opportunity to evolve a seemingly monolithic internet?</p><p><br></p><p>In this episode of SecureTalk, host Justin Beals interviews David Holtzman, the brains behind the global domain name registration system and a former NSA analyst. They delve into the history and evolution of the DNS, discussing how it transformed from a single 'host.txt' file to a robust global system impacting millions of domain names. David shares his thoughts on decentralization, the potential of blockchain technology, and the future of cybersecurity in the wake of quantum computing. They also touch on the implications of AI, the cyclical nature of tech fads, and the importance of innovative yet secure solutions in today's rapidly evolving cyber environment. This episode is a must-listen for cybersecurity experts interested in the complex interplay between technology, governance, and security.<br></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Web3, Cryptography</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Behind the Ballot: Election Security Insights with Mark Listes </title>
      <itunes:episode>189</itunes:episode>
      <podcast:episode>189</podcast:episode>
      <itunes:title>Behind the Ballot: Election Security Insights with Mark Listes </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fca7693e-245f-402e-b25c-c35afb99a716</guid>
      <link>https://share.transistor.fm/s/a7e43b56</link>
      <description>
        <![CDATA[<p>It is election season in the United States and there continues to be a lot of FUD around the security of our elections. We decided to sit down with an expert to discuss election security and how citizens here in the United States should consider this civic event.</p><p><br></p><p>Join host Justin Beals and guest Mark Listes as they delve into the critical topic of election security. Mark, CEO of Pendulum and former Head of Policy at the U.S. Election Assistance Commission, shares his extensive expertise on managing election security and the intricate relationship between technology and trust in the electoral process. They explore the complexities of pre-vote misinformation, the robustness of various voting systems, and how the integrity of election results is maintained amidst emerging cybersecurity threats. Mark also highlights Pendulum's new tool, ElectionIQ, which aids businesses in navigating election-related risks. The discussion sheds light on the vital role of trust and participation in sustaining democracy, making it a must-listen for cybersecurity professionals seeking to understand the current landscape of election integrity.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>It is election season in the United States and there continues to be a lot of FUD around the security of our elections. We decided to sit down with an expert to discuss election security and how citizens here in the United States should consider this civic event.</p><p><br></p><p>Join host Justin Beals and guest Mark Listes as they delve into the critical topic of election security. Mark, CEO of Pendulum and former Head of Policy at the U.S. Election Assistance Commission, shares his extensive expertise on managing election security and the intricate relationship between technology and trust in the electoral process. They explore the complexities of pre-vote misinformation, the robustness of various voting systems, and how the integrity of election results is maintained amidst emerging cybersecurity threats. Mark also highlights Pendulum's new tool, ElectionIQ, which aids businesses in navigating election-related risks. The discussion sheds light on the vital role of trust and participation in sustaining democracy, making it a must-listen for cybersecurity professionals seeking to understand the current landscape of election integrity.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 10 Sep 2024 15:16:42 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/a7e43b56/b49efad7.mp3" length="118104613" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/RdvSzjjIsAXth-PXFRNpbR00OBb5jOYkKlijjkZnC0M/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NzU1/OTc0YjUzZTgxOWMz/NGVkMDk4N2NhOWYz/NjIzOC5wbmc.jpg"/>
      <itunes:duration>2951</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>It is election season in the United States and there continues to be a lot of FUD around the security of our elections. We decided to sit down with an expert to discuss election security and how citizens here in the United States should consider this civic event.</p><p><br></p><p>Join host Justin Beals and guest Mark Listes as they delve into the critical topic of election security. Mark, CEO of Pendulum and former Head of Policy at the U.S. Election Assistance Commission, shares his extensive expertise on managing election security and the intricate relationship between technology and trust in the electoral process. They explore the complexities of pre-vote misinformation, the robustness of various voting systems, and how the integrity of election results is maintained amidst emerging cybersecurity threats. Mark also highlights Pendulum's new tool, ElectionIQ, which aids businesses in navigating election-related risks. The discussion sheds light on the vital role of trust and participation in sustaining democracy, making it a must-listen for cybersecurity professionals seeking to understand the current landscape of election integrity.</p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, elections2024, information security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Human Toll of Jobs / Security with Danny Goodwin &amp; Edward Schwarzschild</title>
      <itunes:episode>188</itunes:episode>
      <podcast:episode>188</podcast:episode>
      <itunes:title>The Human Toll of Jobs / Security with Danny Goodwin &amp; Edward Schwarzschild</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">67d0b182-0ebc-49e0-817b-54040734c614</guid>
      <link>https://share.transistor.fm/s/2fb3c945</link>
      <description>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals sits down with Danny Goodwin and Ed Schwarzschild, the authors of the book 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. They delve into the multifaceted world of security work, bridging personal experiences and professional insights. Goodwin, a professor and chair of the Department of Art and Art History, and Schwarzschild, director of creative writing at SUNY Albany both had family members who worked in the security field that required secrecy. The shared formative experiences blossomed into a discussion about families and the impact of jobs on security. </p><p><br></p><p>Realizing that the security field has been rapidly growing, they used expertise in the humanities to explore security jobs and their impact on individuals, families and our community at large. The podcast covers their methods of capturing authentic experiences through interviews and photography, bringing a human touch to a field often viewed through a critical or technical lens. Danny and Ed recount their past roles in security and detail compelling stories from their book, including experiences of border patrol agents, military security and cybersecurity professionals. The discussion also touches on the companion exhibition for “Jobs / Security”  and their plans for expanding the project globally. This episode is a must-listen for those interested in the intersection of security and humanity.</p><p>Book: 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. (2024) https://mitpress.mit.edu/9780262048699/jobsecurity/</p><p>Exhibition: Job Security: Voices and Views from the American Security Industry.  August 12- December 9, 2024 - University at Albany SUNY<br>https://www.albany.edu/museum/exhibitions/job-security-voices-and-views-american-security-industry</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals sits down with Danny Goodwin and Ed Schwarzschild, the authors of the book 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. They delve into the multifaceted world of security work, bridging personal experiences and professional insights. Goodwin, a professor and chair of the Department of Art and Art History, and Schwarzschild, director of creative writing at SUNY Albany both had family members who worked in the security field that required secrecy. The shared formative experiences blossomed into a discussion about families and the impact of jobs on security. </p><p><br></p><p>Realizing that the security field has been rapidly growing, they used expertise in the humanities to explore security jobs and their impact on individuals, families and our community at large. The podcast covers their methods of capturing authentic experiences through interviews and photography, bringing a human touch to a field often viewed through a critical or technical lens. Danny and Ed recount their past roles in security and detail compelling stories from their book, including experiences of border patrol agents, military security and cybersecurity professionals. The discussion also touches on the companion exhibition for “Jobs / Security”  and their plans for expanding the project globally. This episode is a must-listen for those interested in the intersection of security and humanity.</p><p>Book: 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. (2024) https://mitpress.mit.edu/9780262048699/jobsecurity/</p><p>Exhibition: Job Security: Voices and Views from the American Security Industry.  August 12- December 9, 2024 - University at Albany SUNY<br>https://www.albany.edu/museum/exhibitions/job-security-voices-and-views-american-security-industry</p>]]>
      </content:encoded>
      <pubDate>Tue, 03 Sep 2024 19:14:14 +0000</pubDate>
      <author>Justin Beals </author>
      <enclosure url="https://media.transistor.fm/2fb3c945/ce16edfb.mp3" length="128692279" type="audio/mpeg"/>
      <itunes:author>Justin Beals </itunes:author>
      <itunes:image href="https://img.transistorcdn.com/IYYL-4o_zF7PeFYxXpH8f1ofk13_IGMT65bE-I61tK0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lYmFk/ZTA2YzQ4YzcwZmU5/NzdmYTkzMWE5MDM2/ZDJjYi5wbmc.jpg"/>
      <itunes:duration>3215</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Secure Talk, host Justin Beals sits down with Danny Goodwin and Ed Schwarzschild, the authors of the book 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. They delve into the multifaceted world of security work, bridging personal experiences and professional insights. Goodwin, a professor and chair of the Department of Art and Art History, and Schwarzschild, director of creative writing at SUNY Albany both had family members who worked in the security field that required secrecy. The shared formative experiences blossomed into a discussion about families and the impact of jobs on security. </p><p><br></p><p>Realizing that the security field has been rapidly growing, they used expertise in the humanities to explore security jobs and their impact on individuals, families and our community at large. The podcast covers their methods of capturing authentic experiences through interviews and photography, bringing a human touch to a field often viewed through a critical or technical lens. Danny and Ed recount their past roles in security and detail compelling stories from their book, including experiences of border patrol agents, military security and cybersecurity professionals. The discussion also touches on the companion exhibition for “Jobs / Security”  and their plans for expanding the project globally. This episode is a must-listen for those interested in the intersection of security and humanity.</p><p>Book: 'Job / Security: A Composite Portrait of the Expanding American Security Industry'. (2024) https://mitpress.mit.edu/9780262048699/jobsecurity/</p><p>Exhibition: Job Security: Voices and Views from the American Security Industry.  August 12- December 9, 2024 - University at Albany SUNY<br>https://www.albany.edu/museum/exhibitions/job-security-voices-and-views-american-security-industry</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity jobs security humanities </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hack to Learn: Integrating Humanities into Cybersecurity with Aaron Mauro</title>
      <itunes:episode>187</itunes:episode>
      <podcast:episode>187</podcast:episode>
      <itunes:title>Hack to Learn: Integrating Humanities into Cybersecurity with Aaron Mauro</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">34044a69-ddfa-491f-8569-e55b977a856d</guid>
      <link>https://share.transistor.fm/s/49b83441</link>
      <description>
        <![CDATA[<p>How do we predict the future? In our respective technology and security fields we are often asked to prognosticate on “what’s next?”. Understanding current trends is certainly helpful but what if you could reach far into the future and describe humanity and our relative progress?</p><p>In this week's episode of SecureTalk we host an Associate Professor of Digital Media at Brock University, to discuss the intersection of cybersecurity and the humanities. Our guest's recent works include, 'Hacking the Humanities' and 'The Language of Cyberattacks,' delve into how digital culture, app development, and natural language processing intersect with cybersecurity. </p><p>Listen in as we discuss William Gibson predicting the future of the internet and our examination of the cultural consequences of cybersecurity, emphasizing the need for broader digital literacy, the evolving landscape of internet privacy, and how speculative fiction can inform ethical questions and possible futures. They also touch on real-world incidents like the 'Parlor tricks' hack, demonstrating how programming literacy can empower individuals to navigate and influence the digital ecosystem. The conversation underscores the vital role of humanistic perspectives in understanding and shaping the cybersecurity landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do we predict the future? In our respective technology and security fields we are often asked to prognosticate on “what’s next?”. Understanding current trends is certainly helpful but what if you could reach far into the future and describe humanity and our relative progress?</p><p>In this week's episode of SecureTalk we host an Associate Professor of Digital Media at Brock University, to discuss the intersection of cybersecurity and the humanities. Our guest's recent works include, 'Hacking the Humanities' and 'The Language of Cyberattacks,' delve into how digital culture, app development, and natural language processing intersect with cybersecurity. </p><p>Listen in as we discuss William Gibson predicting the future of the internet and our examination of the cultural consequences of cybersecurity, emphasizing the need for broader digital literacy, the evolving landscape of internet privacy, and how speculative fiction can inform ethical questions and possible futures. They also touch on real-world incidents like the 'Parlor tricks' hack, demonstrating how programming literacy can empower individuals to navigate and influence the digital ecosystem. The conversation underscores the vital role of humanistic perspectives in understanding and shaping the cybersecurity landscape.</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Aug 2024 19:29:28 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/49b83441/07105999.mp3" length="125560286" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ghRzoNEGf3rbvruiqE8oj5iKf_wF_Qt20Lij7sBu4Ts/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNjQ1/YjAzYmVmMDIzYjNj/ZTc4NjY3YWM5NWMy/MjMyMy5wbmc.jpg"/>
      <itunes:duration>3137</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do we predict the future? In our respective technology and security fields we are often asked to prognosticate on “what’s next?”. Understanding current trends is certainly helpful but what if you could reach far into the future and describe humanity and our relative progress?</p><p>In this week's episode of SecureTalk we host an Associate Professor of Digital Media at Brock University, to discuss the intersection of cybersecurity and the humanities. Our guest's recent works include, 'Hacking the Humanities' and 'The Language of Cyberattacks,' delve into how digital culture, app development, and natural language processing intersect with cybersecurity. </p><p>Listen in as we discuss William Gibson predicting the future of the internet and our examination of the cultural consequences of cybersecurity, emphasizing the need for broader digital literacy, the evolving landscape of internet privacy, and how speculative fiction can inform ethical questions and possible futures. They also touch on real-world incidents like the 'Parlor tricks' hack, demonstrating how programming literacy can empower individuals to navigate and influence the digital ecosystem. The conversation underscores the vital role of humanistic perspectives in understanding and shaping the cybersecurity landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, humanities, hacking, hacker, data breach, cyber attacks, internet</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Redefining Cybersecurity Strategies</title>
      <itunes:episode>186</itunes:episode>
      <podcast:episode>186</podcast:episode>
      <itunes:title>Redefining Cybersecurity Strategies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1900753725</guid>
      <link>https://share.transistor.fm/s/f13cdc3e</link>
      <description>
        <![CDATA[In this episode of Secure Talk, Justin Beals, founder and CEO of Strike Graph, hosts Bruce Schneier, a renowned security technologist, author, and lecturer at the Harvard Kennedy School. 

Schneier discusses his book 'A Hacker's Mind,' sharing insights into the psychology of security, societal impacts of cybersecurity, and how businesses can better align security practices with human psychology. He emphasizes the economic incentives behind security design, the concept of decoupling for enhanced security, and addresses the role of public awareness and policy in cybersecurity. Schneier also touches on the pervasive nature of hacking, the importance of building resilient systems, and the integration of computers into every aspect of our lives, highlighting the increasing importance of security by design.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode of Secure Talk, Justin Beals, founder and CEO of Strike Graph, hosts Bruce Schneier, a renowned security technologist, author, and lecturer at the Harvard Kennedy School. 

Schneier discusses his book 'A Hacker's Mind,' sharing insights into the psychology of security, societal impacts of cybersecurity, and how businesses can better align security practices with human psychology. He emphasizes the economic incentives behind security design, the concept of decoupling for enhanced security, and addresses the role of public awareness and policy in cybersecurity. Schneier also touches on the pervasive nature of hacking, the importance of building resilient systems, and the integration of computers into every aspect of our lives, highlighting the increasing importance of security by design.]]>
      </content:encoded>
      <pubDate>Tue, 20 Aug 2024 15:11:07 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/f13cdc3e/81b33849.mp3" length="95712404" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ixfPNOsRR9NkASKMJD7vC2qeiRwNXLIZaNZEefXNAK8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kODJm/YjU1MDdiMDI5N2Vh/Njk3MDM3ODk3YTVh/NGNiOS5qcGc.jpg"/>
      <itunes:duration>2391</itunes:duration>
      <itunes:summary>In this episode of Secure Talk, Justin Beals, founder and CEO of Strike Graph, hosts Bruce Schneier, a renowned security technologist, author, and lecturer at the Harvard Kennedy School. 

Schneier discusses his book 'A Hacker's Mind,' sharing insights into the psychology of security, societal impacts of cybersecurity, and how businesses can better align security practices with human psychology. He emphasizes the economic incentives behind security design, the concept of decoupling for enhanced security, and addresses the role of public awareness and policy in cybersecurity. Schneier also touches on the pervasive nature of hacking, the importance of building resilient systems, and the integration of computers into every aspect of our lives, highlighting the increasing importance of security by design.</itunes:summary>
      <itunes:subtitle>In this episode of Secure Talk, Justin Beals, founder and CEO of Strike Graph, hosts Bruce Schneier, a renowned security technologist, author, and lecturer at the Harvard Kennedy School. 

Schneier discusses his book 'A Hacker's Mind,' sharing insights in</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Threats from the Chrome Web Store with Sheryl Hsu</title>
      <itunes:episode>185</itunes:episode>
      <podcast:episode>185</podcast:episode>
      <itunes:title>Security Threats from the Chrome Web Store with Sheryl Hsu</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1896640848</guid>
      <link>https://share.transistor.fm/s/cd230cd1</link>
      <description>
        <![CDATA[Have you ever wondered how secure your browser extensions really are? On our latest Secure Talk episode join us for a discussion with Sheryl Hsu, a researcher from Stanford Empirical Security Research Group. 

We discuss their recent paper “What is in the Chrome Web Store? Investigating Security-Noteworthy Browser Extensions.” Sheryl and the team at the Stanford Empirical Security Research Group show that Security-Noteworthy Extensions (SNE) are a significant issue as they have a pervasive presence in the Chrome Web Store for years and affect almost 350 million users. In this great discussion we talk about the threat capabilities of nefarious code executed by plugins in the Chrome Browser. We also talk about the perverse incentives at Alphabet in managing the Chrome Web Store. They need to make plugins that have powerful capabilities, easy to deliver and sticky. But this creates the opportunity for powerful cybercrime tools, easily installed that are rarely inspected. 

Fundamentally we ask 'who is responsible for security in the “app” economy'?

Research: https://arxiv.org/abs/2406.12710]]>
      </description>
      <content:encoded>
        <![CDATA[Have you ever wondered how secure your browser extensions really are? On our latest Secure Talk episode join us for a discussion with Sheryl Hsu, a researcher from Stanford Empirical Security Research Group. 

We discuss their recent paper “What is in the Chrome Web Store? Investigating Security-Noteworthy Browser Extensions.” Sheryl and the team at the Stanford Empirical Security Research Group show that Security-Noteworthy Extensions (SNE) are a significant issue as they have a pervasive presence in the Chrome Web Store for years and affect almost 350 million users. In this great discussion we talk about the threat capabilities of nefarious code executed by plugins in the Chrome Browser. We also talk about the perverse incentives at Alphabet in managing the Chrome Web Store. They need to make plugins that have powerful capabilities, easy to deliver and sticky. But this creates the opportunity for powerful cybercrime tools, easily installed that are rarely inspected. 

Fundamentally we ask 'who is responsible for security in the “app” economy'?

Research: https://arxiv.org/abs/2406.12710]]>
      </content:encoded>
      <pubDate>Tue, 13 Aug 2024 17:39:13 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/cd230cd1/70121a8d.mp3" length="90720193" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/qft2bxH9D8VaYFdyRjx7XONHG43gnUto3oExI99TPcQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZTBm/M2UwNTIwNGE4NDM5/YmE3MDA4Yzg3Njg3/MDZmOS5qcGc.jpg"/>
      <itunes:duration>2268</itunes:duration>
      <itunes:summary>Have you ever wondered how secure your browser extensions really are? On our latest Secure Talk episode join us for a discussion with Sheryl Hsu, a researcher from Stanford Empirical Security Research Group. 

We discuss their recent paper “What is in the Chrome Web Store? Investigating Security-Noteworthy Browser Extensions.” Sheryl and the team at the Stanford Empirical Security Research Group show that Security-Noteworthy Extensions (SNE) are a significant issue as they have a pervasive presence in the Chrome Web Store for years and affect almost 350 million users. In this great discussion we talk about the threat capabilities of nefarious code executed by plugins in the Chrome Browser. We also talk about the perverse incentives at Alphabet in managing the Chrome Web Store. They need to make plugins that have powerful capabilities, easy to deliver and sticky. But this creates the opportunity for powerful cybercrime tools, easily installed that are rarely inspected. 

Fundamentally we ask 'who is responsible for security in the “app” economy'?

Research: https://arxiv.org/abs/2406.12710</itunes:summary>
      <itunes:subtitle>Have you ever wondered how secure your browser extensions really are? On our latest Secure Talk episode join us for a discussion with Sheryl Hsu, a researcher from Stanford Empirical Security Research Group. 

We discuss their recent paper “What is in the</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Unraveling the Layers of HIPAA: A Deep Dive into Data Security with Iliana Peters</title>
      <itunes:episode>184</itunes:episode>
      <podcast:episode>184</podcast:episode>
      <itunes:title>Unraveling the Layers of HIPAA: A Deep Dive into Data Security with Iliana Peters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1890351675</guid>
      <link>https://share.transistor.fm/s/b6e4e114</link>
      <description>
        <![CDATA[In this episode of SecureTalk, host Justin Beals, CEO of StrikeGraph, discusses the complexities of HIPAA, data privacy, and healthcare security with expert Ileana Peters, a shareholder at Polsinelli. Once a leader in regulatory enforcement for US Health and Human Services she talks with Justin on how to manage compliance.

Peters shares insights from her extensive experience at the Department of Health and Human Services, and addresses the nature of HIPAA regulations, the importance of risk analysis and workforce training, as well as the intricacies of regulatory compliance. The conversation dives deep into the intersection of innovation, healthcare privacy, and security, offering valuable advice for businesses and stakeholders in the rapidly evolving landscape of cybersecurity and healthcare regulations.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode of SecureTalk, host Justin Beals, CEO of StrikeGraph, discusses the complexities of HIPAA, data privacy, and healthcare security with expert Ileana Peters, a shareholder at Polsinelli. Once a leader in regulatory enforcement for US Health and Human Services she talks with Justin on how to manage compliance.

Peters shares insights from her extensive experience at the Department of Health and Human Services, and addresses the nature of HIPAA regulations, the importance of risk analysis and workforce training, as well as the intricacies of regulatory compliance. The conversation dives deep into the intersection of innovation, healthcare privacy, and security, offering valuable advice for businesses and stakeholders in the rapidly evolving landscape of cybersecurity and healthcare regulations.]]>
      </content:encoded>
      <pubDate>Tue, 06 Aug 2024 15:14:13 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b6e4e114/72e4335b.mp3" length="112582597" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0ramloD7ffs6pp9w4KZblQK5l1W153jgos3Fe_7lMLs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lOWMz/NmI3YmYwZDQxNmFm/N2Q0NTEwYTE0MGQ2/ZmIxZS5qcGc.jpg"/>
      <itunes:duration>2813</itunes:duration>
      <itunes:summary>In this episode of SecureTalk, host Justin Beals, CEO of StrikeGraph, discusses the complexities of HIPAA, data privacy, and healthcare security with expert Ileana Peters, a shareholder at Polsinelli. Once a leader in regulatory enforcement for US Health and Human Services she talks with Justin on how to manage compliance.

Peters shares insights from her extensive experience at the Department of Health and Human Services, and addresses the nature of HIPAA regulations, the importance of risk analysis and workforce training, as well as the intricacies of regulatory compliance. The conversation dives deep into the intersection of innovation, healthcare privacy, and security, offering valuable advice for businesses and stakeholders in the rapidly evolving landscape of cybersecurity and healthcare regulations.</itunes:summary>
      <itunes:subtitle>In this episode of SecureTalk, host Justin Beals, CEO of StrikeGraph, discusses the complexities of HIPAA, data privacy, and healthcare security with expert Ileana Peters, a shareholder at Polsinelli. Once a leader in regulatory enforcement for US Health </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Navigating HIPAA Compliance with Confidence</title>
      <itunes:episode>183</itunes:episode>
      <podcast:episode>183</podcast:episode>
      <itunes:title>Navigating HIPAA Compliance with Confidence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1884734271</guid>
      <link>https://share.transistor.fm/s/6dbde125</link>
      <description>
        <![CDATA[In December 2023 the U.S. Department of Health and Human Services reported that the medical data of more than 88 million people was exposed in the first ten months of 2023. A 2018 Trustwave Global Security Reported that a single healthcare record would receive an average of $250.15 when sold, 50 times more valuable than a stolen credit card. 92% of stolen patient records were criminally acquired. This is a 9x increase over the past five years affecting over 145 million people.

Patient Healthcare Information is the most sensitive, valuable and prolific security challenge of the present day.

Thankfully, we have this information due to the oft-maligned HIPAA law. Truly innovative for its time and often updated due to its popularity, it is a great accomplishment in privacy law.
However, like most laws, its implementation for a business can be fraught. Consulting on HIPAA has become its own industry with an army of consultants and legal experts. In this episode of Strike Graph we are going to delve into the 2nd edition of “The Practical Guide to HIPAA Privacy and Security Compliance.” with the authors Rebecca Harold and Kevin Beaver. The discussion highlights the importance of a comprehensive approach to HIPAA compliance, common myths, and challenges facing healthcare organizations today. The episode also addresses the growing threat of cybercrime, the evolving landscape of data security, and practical steps organizations can take to safeguard patient information. A must-listen for professionals navigating the complex world of healthcare data security.]]>
      </description>
      <content:encoded>
        <![CDATA[In December 2023 the U.S. Department of Health and Human Services reported that the medical data of more than 88 million people was exposed in the first ten months of 2023. A 2018 Trustwave Global Security Reported that a single healthcare record would receive an average of $250.15 when sold, 50 times more valuable than a stolen credit card. 92% of stolen patient records were criminally acquired. This is a 9x increase over the past five years affecting over 145 million people.

Patient Healthcare Information is the most sensitive, valuable and prolific security challenge of the present day.

Thankfully, we have this information due to the oft-maligned HIPAA law. Truly innovative for its time and often updated due to its popularity, it is a great accomplishment in privacy law.
However, like most laws, its implementation for a business can be fraught. Consulting on HIPAA has become its own industry with an army of consultants and legal experts. In this episode of Strike Graph we are going to delve into the 2nd edition of “The Practical Guide to HIPAA Privacy and Security Compliance.” with the authors Rebecca Harold and Kevin Beaver. The discussion highlights the importance of a comprehensive approach to HIPAA compliance, common myths, and challenges facing healthcare organizations today. The episode also addresses the growing threat of cybercrime, the evolving landscape of data security, and practical steps organizations can take to safeguard patient information. A must-listen for professionals navigating the complex world of healthcare data security.]]>
      </content:encoded>
      <pubDate>Tue, 30 Jul 2024 15:12:30 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/6dbde125/d4044cec.mp3" length="108227413" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7-Y6UaKEBRUqoOt3M1OH3dwWZ7ig7tVWTj-6IUzjp1c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMTYz/MmIyYmEyOTk5YTY0/MDc1NzVjOGIyYjU4/MDhhNC5qcGc.jpg"/>
      <itunes:duration>2704</itunes:duration>
      <itunes:summary>In December 2023 the U.S. Department of Health and Human Services reported that the medical data of more than 88 million people was exposed in the first ten months of 2023. A 2018 Trustwave Global Security Reported that a single healthcare record would receive an average of $250.15 when sold, 50 times more valuable than a stolen credit card. 92% of stolen patient records were criminally acquired. This is a 9x increase over the past five years affecting over 145 million people.

Patient Healthcare Information is the most sensitive, valuable and prolific security challenge of the present day.

Thankfully, we have this information due to the oft-maligned HIPAA law. Truly innovative for its time and often updated due to its popularity, it is a great accomplishment in privacy law.
However, like most laws, its implementation for a business can be fraught. Consulting on HIPAA has become its own industry with an army of consultants and legal experts. In this episode of Strike Graph we are going to delve into the 2nd edition of “The Practical Guide to HIPAA Privacy and Security Compliance.” with the authors Rebecca Harold and Kevin Beaver. The discussion highlights the importance of a comprehensive approach to HIPAA compliance, common myths, and challenges facing healthcare organizations today. The episode also addresses the growing threat of cybercrime, the evolving landscape of data security, and practical steps organizations can take to safeguard patient information. A must-listen for professionals navigating the complex world of healthcare data security.</itunes:summary>
      <itunes:subtitle>In December 2023 the U.S. Department of Health and Human Services reported that the medical data of more than 88 million people was exposed in the first ten months of 2023. A 2018 Trustwave Global Security Reported that a single healthcare record would re</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Crisis Fighting: How to plan a successful security incident</title>
      <itunes:episode>182</itunes:episode>
      <podcast:episode>182</podcast:episode>
      <itunes:title>Crisis Fighting: How to plan a successful security incident</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1879088658</guid>
      <link>https://share.transistor.fm/s/912b7eee</link>
      <description>
        <![CDATA[It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years.

What happens when your job is to operate in a crisis? Join us for the next episode of Secure Talk where we sit down with Vice Admiral Mike LeFevre (ret.) the CEO of Concentric Security and Roderic Jones ex-Scotland Yard and Executive Chairman of Concentric as they share their deep experience in crisis management. Their valuable insights were gleaned as Mike LeFevre commander, Office of the Defense Representative to Pakistan during the killing of Osama Bin Laden and as Roderick Jones served for Scotland Yard’s Special Branch focused on international terrorism. Their insights delve into four key phases of crisis management—911 moments, second and third-order effects, steady state, and the road to normalcy—while underscoring the importance of leadership, preparation, and external relationships. They also highlight the critical need for cyber risk management in today's evolving threat landscape. This episode also covers their book, 'End Game First: A Leadership Strategy for Navigating a Crisis,' which serves as a guide for cybersecurity leaders.]]>
      </description>
      <content:encoded>
        <![CDATA[It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years.

What happens when your job is to operate in a crisis? Join us for the next episode of Secure Talk where we sit down with Vice Admiral Mike LeFevre (ret.) the CEO of Concentric Security and Roderic Jones ex-Scotland Yard and Executive Chairman of Concentric as they share their deep experience in crisis management. Their valuable insights were gleaned as Mike LeFevre commander, Office of the Defense Representative to Pakistan during the killing of Osama Bin Laden and as Roderick Jones served for Scotland Yard’s Special Branch focused on international terrorism. Their insights delve into four key phases of crisis management—911 moments, second and third-order effects, steady state, and the road to normalcy—while underscoring the importance of leadership, preparation, and external relationships. They also highlight the critical need for cyber risk management in today's evolving threat landscape. This episode also covers their book, 'End Game First: A Leadership Strategy for Navigating a Crisis,' which serves as a guide for cybersecurity leaders.]]>
      </content:encoded>
      <pubDate>Tue, 23 Jul 2024 15:16:14 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/912b7eee/1f4a03c9.mp3" length="113238397" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/YFAq68A7VAQ_oyBrEDpcz8vM8YFQoYo5TFDk4YSth1c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kYWM5/MDYwY2M4ZTMzNjZk/YzU1NzJhMmJkZWUz/MzkyMi5qcGc.jpg"/>
      <itunes:duration>2830</itunes:duration>
      <itunes:summary>It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years.

What happens when your job is to operate in a crisis? Join us for the next episode of Secure Talk where we sit down with Vice Admiral Mike LeFevre (ret.) the CEO of Concentric Security and Roderic Jones ex-Scotland Yard and Executive Chairman of Concentric as they share their deep experience in crisis management. Their valuable insights were gleaned as Mike LeFevre commander, Office of the Defense Representative to Pakistan during the killing of Osama Bin Laden and as Roderick Jones served for Scotland Yard’s Special Branch focused on international terrorism. Their insights delve into four key phases of crisis management—911 moments, second and third-order effects, steady state, and the road to normalcy—while underscoring the importance of leadership, preparation, and external relationships. They also highlight the critical need for cyber risk management in today's evolving threat landscape. This episode also covers their book, 'End Game First: A Leadership Strategy for Navigating a Crisis,' which serves as a guide for cybersecurity leaders.</itunes:summary>
      <itunes:subtitle>It seems a new security crisis is emerging at a weekly pace. The emergence of critical security breaches, data exposures and digital infrastructure failures has vastly accelerated in the last 5 years.

What happens when your job is to operate in a crisis?</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Creating the dark web: How the TOR browser was invented</title>
      <itunes:episode>181</itunes:episode>
      <podcast:episode>181</podcast:episode>
      <itunes:title>Creating the dark web: How the TOR browser was invented</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1870059303</guid>
      <link>https://share.transistor.fm/s/64508cd9</link>
      <description>
        <![CDATA[What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. 

In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discusses the book ‘Tor: From the Dark Web to the Future of Privacy’ with its author, Ben Collier, a Lecturer in Digital Methods at the University of Edinburgh. This episode traces the early anonymity problems that the US military and libertarian-minded computer scientists were attempting to solve. How they created a partnership and worked together to invent a solution that could provide global privacy at the dawn of the information age. Ben provides powerful insights into the motivations behind its invention and the future of our connected world.]]>
      </description>
      <content:encoded>
        <![CDATA[What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. 

In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discusses the book ‘Tor: From the Dark Web to the Future of Privacy’ with its author, Ben Collier, a Lecturer in Digital Methods at the University of Edinburgh. This episode traces the early anonymity problems that the US military and libertarian-minded computer scientists were attempting to solve. How they created a partnership and worked together to invent a solution that could provide global privacy at the dawn of the information age. Ben provides powerful insights into the motivations behind its invention and the future of our connected world.]]>
      </content:encoded>
      <pubDate>Wed, 17 Jul 2024 00:00:00 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/64508cd9/10b01d3a.mp3" length="116131193" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MN4qRREYWu7AlxmwsfF7--VkHr7hs7FATw9nI8eSyl0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZjdi/NmFjOTE2MGRkNzQ0/ZDZhNzJmOWIxMDAz/MzNmYi5qcGc.jpg"/>
      <itunes:duration>2902</itunes:duration>
      <itunes:summary>What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. 

In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discusses the book ‘Tor: From the Dark Web to the Future of Privacy’ with its author, Ben Collier, a Lecturer in Digital Methods at the University of Edinburgh. This episode traces the early anonymity problems that the US military and libertarian-minded computer scientists were attempting to solve. How they created a partnership and worked together to invent a solution that could provide global privacy at the dawn of the information age. Ben provides powerful insights into the motivations behind its invention and the future of our connected world.</itunes:summary>
      <itunes:subtitle>What software do radical techno-libertarians, the CIA, Privacy Advocates, the US State Department and Cyber Criminals use every day? The TOR Browser. 

In this compelling episode of SecureTalk, Justin Beals, the Founder and CEO of Strike Graph, discusses </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Threat Intelligence: Getting to know the adversary</title>
      <itunes:episode>180</itunes:episode>
      <podcast:episode>180</podcast:episode>
      <itunes:title>Cyber Threat Intelligence: Getting to know the adversary</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1867327920</guid>
      <link>https://share.transistor.fm/s/b8897b96</link>
      <description>
        <![CDATA["They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'Angelo

Join us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D’Angelo, an expert in Cyber Threat Intelligence, helps us “follow the money” and understand the aggressive tactics being used by threat actors to steal and monetize your data. Discover how these criminal organizations are monetizing your personal data before it even surfaces in the dark corners of the internet and how the long tail of data breaches can follow your organization for years.]]>
      </description>
      <content:encoded>
        <![CDATA["They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'Angelo

Join us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D’Angelo, an expert in Cyber Threat Intelligence, helps us “follow the money” and understand the aggressive tactics being used by threat actors to steal and monetize your data. Discover how these criminal organizations are monetizing your personal data before it even surfaces in the dark corners of the internet and how the long tail of data breaches can follow your organization for years.]]>
      </content:encoded>
      <pubDate>Tue, 09 Jul 2024 16:40:07 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b8897b96/27e33623.mp3" length="88319795" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NzY35RlhDa685qccnqSfAc_izA2zhLRx8cy4IebE9p4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kOGM2/ZjMyZmRiOGQ3ZjM2/YTEyMjIyNTFlOTQ4/MjZiZS5qcGc.jpg"/>
      <itunes:duration>2207</itunes:duration>
      <itunes:summary>"They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'Angelo

Join us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D’Angelo, an expert in Cyber Threat Intelligence, helps us “follow the money” and understand the aggressive tactics being used by threat actors to steal and monetize your data. Discover how these criminal organizations are monetizing your personal data before it even surfaces in the dark corners of the internet and how the long tail of data breaches can follow your organization for years.</itunes:summary>
      <itunes:subtitle>"They're not trying to be gracious here. They're trying to make as much money as they can with that personal data.” - Mary D'Angelo

Join us for this Secure Talk podcast to unmask the activity of cyber criminals on the dark web. Mary D’Angelo, an expert i</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The #1 Vulnerability in Cybersecurity is Us.</title>
      <itunes:episode>179</itunes:episode>
      <podcast:episode>179</podcast:episode>
      <itunes:title>The #1 Vulnerability in Cybersecurity is Us.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1860997470</guid>
      <link>https://share.transistor.fm/s/132fc6d1</link>
      <description>
        <![CDATA[98% of cyberattacks rely on social engineering. An average business organization faces over 700 social engineering attacks annually. And 90% of data breach incidents target the human element to gain access to sensitive business information.

How can understanding human psychology help your cybersecurity defense?

On the latest SecureTalk, I engage in a profound conversation with Dr. Abbie Marono, a behavioral scientist from social-engineer.com. We explored how nonverbal communication and emotional triggers play crucial roles in cyber threats. This insightful discussion reveals that our trust and cooperative nature, while beneficial, can also be exploited by skilled attackers. 

Dr. Marono’s ability to blend her academic research with practical cybersecurity applications is a testament to the power of multidisciplinary knowledge. Her insights on preference for trust and how nonverbal communication plays a part in that can help transform the people in your organization into a primary defense mechanism. Don't miss out on these valuable insights for enhancing your security approach!]]>
      </description>
      <content:encoded>
        <![CDATA[98% of cyberattacks rely on social engineering. An average business organization faces over 700 social engineering attacks annually. And 90% of data breach incidents target the human element to gain access to sensitive business information.

How can understanding human psychology help your cybersecurity defense?

On the latest SecureTalk, I engage in a profound conversation with Dr. Abbie Marono, a behavioral scientist from social-engineer.com. We explored how nonverbal communication and emotional triggers play crucial roles in cyber threats. This insightful discussion reveals that our trust and cooperative nature, while beneficial, can also be exploited by skilled attackers. 

Dr. Marono’s ability to blend her academic research with practical cybersecurity applications is a testament to the power of multidisciplinary knowledge. Her insights on preference for trust and how nonverbal communication plays a part in that can help transform the people in your organization into a primary defense mechanism. Don't miss out on these valuable insights for enhancing your security approach!]]>
      </content:encoded>
      <pubDate>Tue, 02 Jul 2024 15:23:01 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/132fc6d1/a30ae40b.mp3" length="112193962" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jOA7LWehblYw1y_QJFUL8FsyugwYZqh4coz04qh2wB8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MDdh/ZDAxNDQ5Mzc2ZjBk/ZTdlMjRjZjgxZjk3/Yzg5Mi5qcGc.jpg"/>
      <itunes:duration>2804</itunes:duration>
      <itunes:summary>98% of cyberattacks rely on social engineering. An average business organization faces over 700 social engineering attacks annually. And 90% of data breach incidents target the human element to gain access to sensitive business information.

How can understanding human psychology help your cybersecurity defense?

On the latest SecureTalk, I engage in a profound conversation with Dr. Abbie Marono, a behavioral scientist from social-engineer.com. We explored how nonverbal communication and emotional triggers play crucial roles in cyber threats. This insightful discussion reveals that our trust and cooperative nature, while beneficial, can also be exploited by skilled attackers. 

Dr. Marono’s ability to blend her academic research with practical cybersecurity applications is a testament to the power of multidisciplinary knowledge. Her insights on preference for trust and how nonverbal communication plays a part in that can help transform the people in your organization into a primary defense mechanism. Don't miss out on these valuable insights for enhancing your security approach!</itunes:summary>
      <itunes:subtitle>98% of cyberattacks rely on social engineering. An average business organization faces over 700 social engineering attacks annually. And 90% of data breach incidents target the human element to gain access to sensitive business information.

How can under</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hacking a Nation: Alejandro Caceres’ Bold Attack on North Korea</title>
      <itunes:episode>178</itunes:episode>
      <podcast:episode>178</podcast:episode>
      <itunes:title>Hacking a Nation: Alejandro Caceres’ Bold Attack on North Korea</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1856691429</guid>
      <link>https://share.transistor.fm/s/b0e2d88e</link>
      <description>
        <![CDATA[From childhood hacking experiments to disrupting North Korea's internet, Alejandro Caceres shares his incredible journey and the future of cyber warfare on SecureTalk. 

From the early days of modems and personal computers Alejandro was deeply interested in connective computing. The early days of exploring BBS’s, telecom networks and digital modems revealed Alejandro’s talent and expertise for understanding vulnerabilities in systems. Later as a professional “red teamer”, by searching for paid vulnerabilities in common systems like Google Chrome, Alejandro was approached by a “friend of a friend” to perform some analysis. That analysis was an attempted hack on Alejandro by a North Korean operative.

Tune into this intriguing episode as we chat with Alejandro about his journey as a professional cybersecurity hacker. How he was attacked, and how he responded by hacking North Korea. What does it take to hack an entire country? Alejandro Caceres, the mastermind behind a massive cyber attack on North Korea, tells all in this gripping episode of SecureTalk.

#cybersecurity #databreach #northkorea]]>
      </description>
      <content:encoded>
        <![CDATA[From childhood hacking experiments to disrupting North Korea's internet, Alejandro Caceres shares his incredible journey and the future of cyber warfare on SecureTalk. 

From the early days of modems and personal computers Alejandro was deeply interested in connective computing. The early days of exploring BBS’s, telecom networks and digital modems revealed Alejandro’s talent and expertise for understanding vulnerabilities in systems. Later as a professional “red teamer”, by searching for paid vulnerabilities in common systems like Google Chrome, Alejandro was approached by a “friend of a friend” to perform some analysis. That analysis was an attempted hack on Alejandro by a North Korean operative.

Tune into this intriguing episode as we chat with Alejandro about his journey as a professional cybersecurity hacker. How he was attacked, and how he responded by hacking North Korea. What does it take to hack an entire country? Alejandro Caceres, the mastermind behind a massive cyber attack on North Korea, tells all in this gripping episode of SecureTalk.

#cybersecurity #databreach #northkorea]]>
      </content:encoded>
      <pubDate>Tue, 25 Jun 2024 18:53:23 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b0e2d88e/f7b047f1.mp3" length="134879457" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/e37k1RV8gNzKq9efxerK3huAUEBLG7DpGoK6gKWexS8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hOWRj/MjE3ZTAzYzBmMWRl/ZTY2Y2UxOGNhNDBj/MTJlMC5qcGc.jpg"/>
      <itunes:duration>3371</itunes:duration>
      <itunes:summary>From childhood hacking experiments to disrupting North Korea's internet, Alejandro Caceres shares his incredible journey and the future of cyber warfare on SecureTalk. 

From the early days of modems and personal computers Alejandro was deeply interested in connective computing. The early days of exploring BBS’s, telecom networks and digital modems revealed Alejandro’s talent and expertise for understanding vulnerabilities in systems. Later as a professional “red teamer”, by searching for paid vulnerabilities in common systems like Google Chrome, Alejandro was approached by a “friend of a friend” to perform some analysis. That analysis was an attempted hack on Alejandro by a North Korean operative.

Tune into this intriguing episode as we chat with Alejandro about his journey as a professional cybersecurity hacker. How he was attacked, and how he responded by hacking North Korea. What does it take to hack an entire country? Alejandro Caceres, the mastermind behind a massive cyber attack on North Korea, tells all in this gripping episode of SecureTalk.

#cybersecurity #databreach #northkorea</itunes:summary>
      <itunes:subtitle>From childhood hacking experiments to disrupting North Korea's internet, Alejandro Caceres shares his incredible journey and the future of cyber warfare on SecureTalk. 

From the early days of modems and personal computers Alejandro was deeply interested </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Mastering the Role of CISO: Advice from Todd Fitzgerald</title>
      <itunes:episode>177</itunes:episode>
      <podcast:episode>177</podcast:episode>
      <itunes:title>Mastering the Role of CISO: Advice from Todd Fitzgerald</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1851092553</guid>
      <link>https://share.transistor.fm/s/cbf55f9b</link>
      <description>
        <![CDATA[What are the essential principles for successful CISO leadership? 

In this episode of SecureTalk, Justin Beals, founder and CEO of StrikeGraph, sits down with cybersecurity expert Todd Fitzgerald to explore this question. As the author of 'CISO Compass' and the newly released 'Privacy Leader Compass,' Todd shares his journey from a computer programmer to a cybersecurity leader and touches on critical topics from his books. The discussion delves into the evolution of the CISO role, and his approach to CISO strategy, including different methodologies such as incident-driven and vision-driven approaches.

Todd also provides an insider perspective on the renowned SolarWinds hack and the lessons it offers for improving security measures. With over 20 years of experience as a Chief Information Security Officer, Todd's insights offer invaluable guidance for navigating the complexities of cybersecurity.]]>
      </description>
      <content:encoded>
        <![CDATA[What are the essential principles for successful CISO leadership? 

In this episode of SecureTalk, Justin Beals, founder and CEO of StrikeGraph, sits down with cybersecurity expert Todd Fitzgerald to explore this question. As the author of 'CISO Compass' and the newly released 'Privacy Leader Compass,' Todd shares his journey from a computer programmer to a cybersecurity leader and touches on critical topics from his books. The discussion delves into the evolution of the CISO role, and his approach to CISO strategy, including different methodologies such as incident-driven and vision-driven approaches.

Todd also provides an insider perspective on the renowned SolarWinds hack and the lessons it offers for improving security measures. With over 20 years of experience as a Chief Information Security Officer, Todd's insights offer invaluable guidance for navigating the complexities of cybersecurity.]]>
      </content:encoded>
      <pubDate>Tue, 18 Jun 2024 15:19:50 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/cbf55f9b/53611a75.mp3" length="102506319" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vYKIiEIfzZz_P7snkTG6PLz5WF4a7JkaiOwwQrLTYXY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81OWI3/MGE1ZDdjMDE1YjZi/NjE5MzczN2EyMGFi/OTllNi5qcGc.jpg"/>
      <itunes:duration>2560</itunes:duration>
      <itunes:summary>What are the essential principles for successful CISO leadership? 

In this episode of SecureTalk, Justin Beals, founder and CEO of StrikeGraph, sits down with cybersecurity expert Todd Fitzgerald to explore this question. As the author of 'CISO Compass' and the newly released 'Privacy Leader Compass,' Todd shares his journey from a computer programmer to a cybersecurity leader and touches on critical topics from his books. The discussion delves into the evolution of the CISO role, and his approach to CISO strategy, including different methodologies such as incident-driven and vision-driven approaches.

Todd also provides an insider perspective on the renowned SolarWinds hack and the lessons it offers for improving security measures. With over 20 years of experience as a Chief Information Security Officer, Todd's insights offer invaluable guidance for navigating the complexities of cybersecurity.</itunes:summary>
      <itunes:subtitle>What are the essential principles for successful CISO leadership? 

In this episode of SecureTalk, Justin Beals, founder and CEO of StrikeGraph, sits down with cybersecurity expert Todd Fitzgerald to explore this question. As the author of 'CISO Compass' </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Dynamic Data Safety: Purandar Das on Encryption and Beyond</title>
      <itunes:episode>176</itunes:episode>
      <podcast:episode>176</podcast:episode>
      <itunes:title>Dynamic Data Safety: Purandar Das on Encryption and Beyond</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1844869272</guid>
      <link>https://share.transistor.fm/s/e359a018</link>
      <description>
        <![CDATA[If data is at the center of your risk profile, how resilient is your current encryption? In this episode of Secure Talk we discuss encryption with Purandar Das a deep expert in data encryption and CEO of Sotero.

The conversation also explores his early influences, the role of a CTO, the evolving challenges in data security, and the importance of adaptive leadership. Purandar shares insights on the effectiveness of current encryption algorithms, the impact of quantum computing, and the development of AI-driven solutions for data security. We also review the LastPass breach, highlighting the importance of strong encryption practices and the ongoing evolution of cybersecurity threats. This episode is a must-listen for cybersecurity experts and enthusiasts looking to stay ahead in the rapidly changing information security landscape.]]>
      </description>
      <content:encoded>
        <![CDATA[If data is at the center of your risk profile, how resilient is your current encryption? In this episode of Secure Talk we discuss encryption with Purandar Das a deep expert in data encryption and CEO of Sotero.

The conversation also explores his early influences, the role of a CTO, the evolving challenges in data security, and the importance of adaptive leadership. Purandar shares insights on the effectiveness of current encryption algorithms, the impact of quantum computing, and the development of AI-driven solutions for data security. We also review the LastPass breach, highlighting the importance of strong encryption practices and the ongoing evolution of cybersecurity threats. This episode is a must-listen for cybersecurity experts and enthusiasts looking to stay ahead in the rapidly changing information security landscape.]]>
      </content:encoded>
      <pubDate>Tue, 11 Jun 2024 15:09:22 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e359a018/c80477f5.mp3" length="97591740" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xqbOxB_emmAAewM_zvyVisINKlRv7yBkZAvl1tc9c6Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNTA1/OTBmOGEwYmQ3ZTg5/NWJlMDQ2YmQ1NjA1/YWJmMy5qcGc.jpg"/>
      <itunes:duration>2437</itunes:duration>
      <itunes:summary>If data is at the center of your risk profile, how resilient is your current encryption? In this episode of Secure Talk we discuss encryption with Purandar Das a deep expert in data encryption and CEO of Sotero.

The conversation also explores his early influences, the role of a CTO, the evolving challenges in data security, and the importance of adaptive leadership. Purandar shares insights on the effectiveness of current encryption algorithms, the impact of quantum computing, and the development of AI-driven solutions for data security. We also review the LastPass breach, highlighting the importance of strong encryption practices and the ongoing evolution of cybersecurity threats. This episode is a must-listen for cybersecurity experts and enthusiasts looking to stay ahead in the rapidly changing information security landscape.</itunes:summary>
      <itunes:subtitle>If data is at the center of your risk profile, how resilient is your current encryption? In this episode of Secure Talk we discuss encryption with Purandar Das a deep expert in data encryption and CEO of Sotero.

The conversation also explores his early i</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Decoding Cyber Resilience: Insights from Absolute Security's Christy Wyatt</title>
      <itunes:episode>175</itunes:episode>
      <podcast:episode>175</podcast:episode>
      <itunes:title>Decoding Cyber Resilience: Insights from Absolute Security's Christy Wyatt</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1837481844</guid>
      <link>https://share.transistor.fm/s/97067204</link>
      <description>
        <![CDATA[On this episode of Secure Talk we meet with Christy Wyatt the CEO of Absolute Security, and the importance of cyber resilience. We discuss topics of security complexity, compliance, fostering a security-conscious culture, and managing cyber risks effectively. Additionally, discussions explore device compliance, self-healing hardware capabilities, and strategies against ransomware. The podcast also touches on business continuity planning involving remote users, the challenges posed by ransomware attacks, considerations for AI integration, and privacy implications within the cybersecurity sector.]]>
      </description>
      <content:encoded>
        <![CDATA[On this episode of Secure Talk we meet with Christy Wyatt the CEO of Absolute Security, and the importance of cyber resilience. We discuss topics of security complexity, compliance, fostering a security-conscious culture, and managing cyber risks effectively. Additionally, discussions explore device compliance, self-healing hardware capabilities, and strategies against ransomware. The podcast also touches on business continuity planning involving remote users, the challenges posed by ransomware attacks, considerations for AI integration, and privacy implications within the cybersecurity sector.]]>
      </content:encoded>
      <pubDate>Tue, 04 Jun 2024 14:44:28 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/97067204/e5fd6ae5.mp3" length="42973218" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kwbkejWfkTuCQttBbq-0AXnDOrG8-CSpfc62mPR3F8o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ODcx/MTQxZjliMmQwODBk/MDk0MmUwNjIwYWRk/MzEyZS5qcGc.jpg"/>
      <itunes:duration>2677</itunes:duration>
      <itunes:summary>On this episode of Secure Talk we meet with Christy Wyatt the CEO of Absolute Security, and the importance of cyber resilience. We discuss topics of security complexity, compliance, fostering a security-conscious culture, and managing cyber risks effectively. Additionally, discussions explore device compliance, self-healing hardware capabilities, and strategies against ransomware. The podcast also touches on business continuity planning involving remote users, the challenges posed by ransomware attacks, considerations for AI integration, and privacy implications within the cybersecurity sector.</itunes:summary>
      <itunes:subtitle>On this episode of Secure Talk we meet with Christy Wyatt the CEO of Absolute Security, and the importance of cyber resilience. We discuss topics of security complexity, compliance, fostering a security-conscious culture, and managing cyber risks effectiv</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Perfect Fit: Using risk to get the right sized security with Christopher Hodson.</title>
      <itunes:episode>174</itunes:episode>
      <podcast:episode>174</podcast:episode>
      <itunes:title>A Perfect Fit: Using risk to get the right sized security with Christopher Hodson.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1832248611</guid>
      <link>https://share.transistor.fm/s/6eb27224</link>
      <description>
        <![CDATA[Is ‘Security Theater’ plaguing your efforts for cyber resilience? Chris Hodson author of “Cyber Risk Management” gives us a reality check on SecureTalk. Discover why risk is the cornerstone of every security program and how his book guides CISO’s and security leaders through effective security posture scoping.

Delve into aligning security with business goals, evolving CISO roles, compliance challenges, and the impact of AI. Understand the importance of risk acceptance in corporate decision-making, the role of AI in security, multi-factor authentication, and the real-world implications of security breaches. Explore cybersecurity risk management with expert Chris Hodson and Strike Graph CEO Justin Beals.]]>
      </description>
      <content:encoded>
        <![CDATA[Is ‘Security Theater’ plaguing your efforts for cyber resilience? Chris Hodson author of “Cyber Risk Management” gives us a reality check on SecureTalk. Discover why risk is the cornerstone of every security program and how his book guides CISO’s and security leaders through effective security posture scoping.

Delve into aligning security with business goals, evolving CISO roles, compliance challenges, and the impact of AI. Understand the importance of risk acceptance in corporate decision-making, the role of AI in security, multi-factor authentication, and the real-world implications of security breaches. Explore cybersecurity risk management with expert Chris Hodson and Strike Graph CEO Justin Beals.]]>
      </content:encoded>
      <pubDate>Tue, 28 May 2024 16:54:43 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/6eb27224/ceb64a86.mp3" length="130005738" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sHs7Ju6h530s9gfHbeo1gaevqKEKX1_cWK_xSKvOhBU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wOGNm/MWEzZTIyNmRmMjY3/ZjhlYTFjNzc2YWRi/NTY1Ny5qcGc.jpg"/>
      <itunes:duration>3247</itunes:duration>
      <itunes:summary>Is ‘Security Theater’ plaguing your efforts for cyber resilience? Chris Hodson author of “Cyber Risk Management” gives us a reality check on SecureTalk. Discover why risk is the cornerstone of every security program and how his book guides CISO’s and security leaders through effective security posture scoping.

Delve into aligning security with business goals, evolving CISO roles, compliance challenges, and the impact of AI. Understand the importance of risk acceptance in corporate decision-making, the role of AI in security, multi-factor authentication, and the real-world implications of security breaches. Explore cybersecurity risk management with expert Chris Hodson and Strike Graph CEO Justin Beals.</itunes:summary>
      <itunes:subtitle>Is ‘Security Theater’ plaguing your efforts for cyber resilience? Chris Hodson author of “Cyber Risk Management” gives us a reality check on SecureTalk. Discover why risk is the cornerstone of every security program and how his book guides CISO’s and secu</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Algorithmic Mirror: Reflecting on Data’s Role in Modern Life</title>
      <itunes:episode>173</itunes:episode>
      <podcast:episode>173</podcast:episode>
      <itunes:title>The Algorithmic Mirror: Reflecting on Data’s Role in Modern Life</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1821816546</guid>
      <link>https://share.transistor.fm/s/3523bac4</link>
      <description>
        <![CDATA[Ever wonder how data invisibly shapes our world? Or what does the TikTok controversy really reveal about global cybersecurity threats? "The Secret Life of Data" episode on SecureTalk dives into these questions and more with authors Aram Sinnreich and Jesse Gilbert.
Highlights include:

1. The real implications of the TikTok ban examined from a cybersecurity lens.
2. Unpacking how our digital habits are influenced by algorithms we seldom understand.
3. Exploring avenues for ethical data management and the role of individuals in data stewardship.

Join us for a deep dive into the interconnected world of data, security, and societal transformation. Your thoughts on reshaping our digital futures are welcome!]]>
      </description>
      <content:encoded>
        <![CDATA[Ever wonder how data invisibly shapes our world? Or what does the TikTok controversy really reveal about global cybersecurity threats? "The Secret Life of Data" episode on SecureTalk dives into these questions and more with authors Aram Sinnreich and Jesse Gilbert.
Highlights include:

1. The real implications of the TikTok ban examined from a cybersecurity lens.
2. Unpacking how our digital habits are influenced by algorithms we seldom understand.
3. Exploring avenues for ethical data management and the role of individuals in data stewardship.

Join us for a deep dive into the interconnected world of data, security, and societal transformation. Your thoughts on reshaping our digital futures are welcome!]]>
      </content:encoded>
      <pubDate>Tue, 14 May 2024 15:10:47 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/3523bac4/473dc2a8.mp3" length="126171212" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8e4m4KyYG7R2j5Xddd3NfPPjEPBgqQfzOcbZrl4M9tI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84YmU2/OGIzY2Q4NTk5OWRj/NzgwNzg4ZDA4YjZi/OGMzNy5qcGc.jpg"/>
      <itunes:duration>3152</itunes:duration>
      <itunes:summary>Ever wonder how data invisibly shapes our world? Or what does the TikTok controversy really reveal about global cybersecurity threats? "The Secret Life of Data" episode on SecureTalk dives into these questions and more with authors Aram Sinnreich and Jesse Gilbert.
Highlights include:

1. The real implications of the TikTok ban examined from a cybersecurity lens.
2. Unpacking how our digital habits are influenced by algorithms we seldom understand.
3. Exploring avenues for ethical data management and the role of individuals in data stewardship.

Join us for a deep dive into the interconnected world of data, security, and societal transformation. Your thoughts on reshaping our digital futures are welcome!</itunes:summary>
      <itunes:subtitle>Ever wonder how data invisibly shapes our world? Or what does the TikTok controversy really reveal about global cybersecurity threats? "The Secret Life of Data" episode on SecureTalk dives into these questions and more with authors Aram Sinnreich and Jess</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Navigating Cyber Threats: FBI Perspectives on Protecting Business and Family</title>
      <itunes:episode>172</itunes:episode>
      <podcast:episode>172</podcast:episode>
      <itunes:title>Navigating Cyber Threats: FBI Perspectives on Protecting Business and Family</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1811207571</guid>
      <link>https://share.transistor.fm/s/fca92f1c</link>
      <description>
        <![CDATA[How safe is your digital footprint? This week on SecureTalk, we sit down with Scott Augenbaum, a retired FBI agent turned cybercrime prevention guru, to dissect the LastPass breach and extract lessons that resonate with every cyber enthusiast. 

Through the lens of "The Three Truths," Scott demystifies common misconceptions about cybercrime and unveils strategies to navigate the minefield of digital threats. Tune in to this thought-provoking episode and empower yourself with the knowledge that could be the difference between being a victim and a victor in the cyber realm

As cybersecurity experts and enthusiasts, how do you evaluate your practices in light of these insights?]]>
      </description>
      <content:encoded>
        <![CDATA[How safe is your digital footprint? This week on SecureTalk, we sit down with Scott Augenbaum, a retired FBI agent turned cybercrime prevention guru, to dissect the LastPass breach and extract lessons that resonate with every cyber enthusiast. 

Through the lens of "The Three Truths," Scott demystifies common misconceptions about cybercrime and unveils strategies to navigate the minefield of digital threats. Tune in to this thought-provoking episode and empower yourself with the knowledge that could be the difference between being a victim and a victor in the cyber realm

As cybersecurity experts and enthusiasts, how do you evaluate your practices in light of these insights?]]>
      </content:encoded>
      <pubDate>Tue, 30 Apr 2024 15:14:57 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/fca92f1c/bd3cdf20.mp3" length="110736087" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Qru8vz78mpfD-IYOy4TmzViloWdLAsMHry1u43d3hEw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80OGEw/Yjg0YzkxNThkMzQ5/Y2FlNTY1MDNlNWU4/YWYzOC5qcGc.jpg"/>
      <itunes:duration>2765</itunes:duration>
      <itunes:summary>How safe is your digital footprint? This week on SecureTalk, we sit down with Scott Augenbaum, a retired FBI agent turned cybercrime prevention guru, to dissect the LastPass breach and extract lessons that resonate with every cyber enthusiast. 

Through the lens of "The Three Truths," Scott demystifies common misconceptions about cybercrime and unveils strategies to navigate the minefield of digital threats. Tune in to this thought-provoking episode and empower yourself with the knowledge that could be the difference between being a victim and a victor in the cyber realm

As cybersecurity experts and enthusiasts, how do you evaluate your practices in light of these insights?</itunes:summary>
      <itunes:subtitle>How safe is your digital footprint? This week on SecureTalk, we sit down with Scott Augenbaum, a retired FBI agent turned cybercrime prevention guru, to dissect the LastPass breach and extract lessons that resonate with every cyber enthusiast. 

Through t</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hacking the Human OS: Insights from Social Engineering Expert Christopher Hadnagy</title>
      <itunes:episode>171</itunes:episode>
      <podcast:episode>171</podcast:episode>
      <itunes:title>Hacking the Human OS: Insights from Social Engineering Expert Christopher Hadnagy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1801686123</guid>
      <link>https://share.transistor.fm/s/43e154b8</link>
      <description>
        <![CDATA[Join host Justin Beals as he explores the art of human hacking with Chris Hadnagy, CEO of Social Engineer, LLC, and renowned author in social engineering. Discover Hadnagy's compelling journey through security and computer science, including pivotal incidents, pioneering social engineering frameworks, and collaborations with agencies like MI5 and the FBI. Gain insights into ego suspension, nonverbal communication, and defense strategies against social engineering, emphasizing empathy, education, and technology in cybersecurity.]]>
      </description>
      <content:encoded>
        <![CDATA[Join host Justin Beals as he explores the art of human hacking with Chris Hadnagy, CEO of Social Engineer, LLC, and renowned author in social engineering. Discover Hadnagy's compelling journey through security and computer science, including pivotal incidents, pioneering social engineering frameworks, and collaborations with agencies like MI5 and the FBI. Gain insights into ego suspension, nonverbal communication, and defense strategies against social engineering, emphasizing empathy, education, and technology in cybersecurity.]]>
      </content:encoded>
      <pubDate>Tue, 16 Apr 2024 15:13:57 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/43e154b8/65e00bc3.mp3" length="109309270" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/frByJHUvl22wsN4kvtglTpWfmqFKqBXd5DWBa1BU034/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMDQw/ZGRhZTlkZWYxZDcz/M2FkZDU4ZDViMmY4/NjljZS5qcGc.jpg"/>
      <itunes:duration>2730</itunes:duration>
      <itunes:summary>Join host Justin Beals as he explores the art of human hacking with Chris Hadnagy, CEO of Social Engineer, LLC, and renowned author in social engineering. Discover Hadnagy's compelling journey through security and computer science, including pivotal incidents, pioneering social engineering frameworks, and collaborations with agencies like MI5 and the FBI. Gain insights into ego suspension, nonverbal communication, and defense strategies against social engineering, emphasizing empathy, education, and technology in cybersecurity.</itunes:summary>
      <itunes:subtitle>Join host Justin Beals as he explores the art of human hacking with Chris Hadnagy, CEO of Social Engineer, LLC, and renowned author in social engineering. Discover Hadnagy's compelling journey through security and computer science, including pivotal incid</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Reputation as a risk: understanding the security threat of harmful narratives</title>
      <itunes:episode>170</itunes:episode>
      <podcast:episode>170</podcast:episode>
      <itunes:title>Reputation as a risk: understanding the security threat of harmful narratives</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1790790097</guid>
      <link>https://share.transistor.fm/s/fc17752e</link>
      <description>
        <![CDATA[In this gripping episode of Secure Talk, hosted by Justin Beals, we dive deep into the fascinating intersection of technology, governance, and society. Our special guest, Mark Listes, CEO of Pendulum, discusses his journey from a coding enthusiast to a champion of cybersecurity and democracy. The episode takes a compelling turn as we explore a riveting case study on a data breach involving Carta and Linear. Discover how internal governance and public narratives play crucial roles in securing data and maintaining trust.]]>
      </description>
      <content:encoded>
        <![CDATA[In this gripping episode of Secure Talk, hosted by Justin Beals, we dive deep into the fascinating intersection of technology, governance, and society. Our special guest, Mark Listes, CEO of Pendulum, discusses his journey from a coding enthusiast to a champion of cybersecurity and democracy. The episode takes a compelling turn as we explore a riveting case study on a data breach involving Carta and Linear. Discover how internal governance and public narratives play crucial roles in securing data and maintaining trust.]]>
      </content:encoded>
      <pubDate>Tue, 02 Apr 2024 15:14:44 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/fc17752e/016321ca.mp3" length="115724484" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WJV6x8d2QIq8H-Ta9qCZmHiFnw2Ot5nukClz504alXo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNzkx/MDE5ZWEyNWJjMGU1/NjJhZTNiMGU4NWJm/YTUyNi5qcGc.jpg"/>
      <itunes:duration>2889</itunes:duration>
      <itunes:summary>In this gripping episode of Secure Talk, hosted by Justin Beals, we dive deep into the fascinating intersection of technology, governance, and society. Our special guest, Mark Listes, CEO of Pendulum, discusses his journey from a coding enthusiast to a champion of cybersecurity and democracy. The episode takes a compelling turn as we explore a riveting case study on a data breach involving Carta and Linear. Discover how internal governance and public narratives play crucial roles in securing data and maintaining trust.</itunes:summary>
      <itunes:subtitle>In this gripping episode of Secure Talk, hosted by Justin Beals, we dive deep into the fascinating intersection of technology, governance, and society. Our special guest, Mark Listes, CEO of Pendulum, discusses his journey from a coding enthusiast to a ch</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Decoding Disaster: An Analysis of Four Pivotal Cybersecurity Breaches</title>
      <itunes:episode>169</itunes:episode>
      <podcast:episode>169</podcast:episode>
      <itunes:title>Decoding Disaster: An Analysis of Four Pivotal Cybersecurity Breaches</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1785855666</guid>
      <link>https://share.transistor.fm/s/03cd31bd</link>
      <description>
        <![CDATA[The Secure Talk podcast, hosted by Justin Beals, presents a bonus episode discussing recent security breaches with guests Stephen Farrell of Ideagen, Paul Bingham of Western Governors University, Raffaele Mattone of Judy Security, and Alex Cox of LastPass. The episode covers the 23andMe data breach, Microsoft government email hacks, the Whitworth University ransomware attack, and insights on the LockBit ransomware takedown. It highlights breach responses, risks of consumer DNA data, and evolving cybercrime operations.]]>
      </description>
      <content:encoded>
        <![CDATA[The Secure Talk podcast, hosted by Justin Beals, presents a bonus episode discussing recent security breaches with guests Stephen Farrell of Ideagen, Paul Bingham of Western Governors University, Raffaele Mattone of Judy Security, and Alex Cox of LastPass. The episode covers the 23andMe data breach, Microsoft government email hacks, the Whitworth University ransomware attack, and insights on the LockBit ransomware takedown. It highlights breach responses, risks of consumer DNA data, and evolving cybercrime operations.]]>
      </content:encoded>
      <pubDate>Wed, 27 Mar 2024 15:49:47 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/03cd31bd/ee099c23.mp3" length="84074154" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/J3JZoOrQNJlzPKZHEpF8ORgT8SGht5pjVTOkMtAdK8A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZmRl/MDk1NDU2YzFiOTU2/ZDU0OTYzNmEyMzli/NjhlZi5qcGc.jpg"/>
      <itunes:duration>2079</itunes:duration>
      <itunes:summary>The Secure Talk podcast, hosted by Justin Beals, presents a bonus episode discussing recent security breaches with guests Stephen Farrell of Ideagen, Paul Bingham of Western Governors University, Raffaele Mattone of Judy Security, and Alex Cox of LastPass. The episode covers the 23andMe data breach, Microsoft government email hacks, the Whitworth University ransomware attack, and insights on the LockBit ransomware takedown. It highlights breach responses, risks of consumer DNA data, and evolving cybercrime operations.</itunes:summary>
      <itunes:subtitle>The Secure Talk podcast, hosted by Justin Beals, presents a bonus episode discussing recent security breaches with guests Stephen Farrell of Ideagen, Paul Bingham of Western Governors University, Raffaele Mattone of Judy Security, and Alex Cox of LastPass</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Mastering Cyber Shadows: Alex Cox's Take On LockBit's Resilience And The Role Of Threat Intelligence</title>
      <itunes:episode>168</itunes:episode>
      <podcast:episode>168</podcast:episode>
      <itunes:title>Mastering Cyber Shadows: Alex Cox's Take On LockBit's Resilience And The Role Of Threat Intelligence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1775685795</guid>
      <link>https://share.transistor.fm/s/44595d0d</link>
      <description>
        <![CDATA[This Secure Talk podcast interviews Alex Cox, Director of Threat Intelligence for LastPass. We discuss the evolution of cybercrime, the significance of threat intelligence, and the recent takedown of the notorious ransomware group, Lockbit. 

The conversation covers Alex’s background in law enforcement and cyber security, the progression of cybercrime from Zeus Trojan to ransomware, the entrepreneurial approach of cybercriminals in the development of ransomware operations, and the increasing complexity of cybercriminal organizations. The interview delves into the functioning of Lockbit, its business-focused model with customer support and blog site, and its resilience in resurfacing after takedowns. Furthermore, the conversation touches on the shifting landscape of cybercrime, the interplay between cybercriminal organizations and nation-states, and the challenges in combating cybercrime, including the use of cryptocurrency for money laundering. As the conversation concludes, Alex provides insights into the professional and adaptive nature of cybercriminals, emphasizing their vigilance in understanding the actions of cybersecurity professionals. 

Overall, the interview offers valuable insights into the complex world of cyber threats, the role of threat intelligence, and the ongoing battle between cybercriminals and law enforcement.]]>
      </description>
      <content:encoded>
        <![CDATA[This Secure Talk podcast interviews Alex Cox, Director of Threat Intelligence for LastPass. We discuss the evolution of cybercrime, the significance of threat intelligence, and the recent takedown of the notorious ransomware group, Lockbit. 

The conversation covers Alex’s background in law enforcement and cyber security, the progression of cybercrime from Zeus Trojan to ransomware, the entrepreneurial approach of cybercriminals in the development of ransomware operations, and the increasing complexity of cybercriminal organizations. The interview delves into the functioning of Lockbit, its business-focused model with customer support and blog site, and its resilience in resurfacing after takedowns. Furthermore, the conversation touches on the shifting landscape of cybercrime, the interplay between cybercriminal organizations and nation-states, and the challenges in combating cybercrime, including the use of cryptocurrency for money laundering. As the conversation concludes, Alex provides insights into the professional and adaptive nature of cybercriminals, emphasizing their vigilance in understanding the actions of cybersecurity professionals. 

Overall, the interview offers valuable insights into the complex world of cyber threats, the role of threat intelligence, and the ongoing battle between cybercriminals and law enforcement.]]>
      </content:encoded>
      <pubDate>Tue, 19 Mar 2024 12:00:09 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/44595d0d/9e744508.mp3" length="96884626" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/aCWqxwL8TtscIU9WGpYunET2MkzxSuRRYXjzfCSJZuY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NzNj/MWRhMjE5ZGZkYWVi/NDBlZmU2NzBhMWJk/M2ZiYS5qcGc.jpg"/>
      <itunes:duration>2420</itunes:duration>
      <itunes:summary>This Secure Talk podcast interviews Alex Cox, Director of Threat Intelligence for LastPass. We discuss the evolution of cybercrime, the significance of threat intelligence, and the recent takedown of the notorious ransomware group, Lockbit. 

The conversation covers Alex’s background in law enforcement and cyber security, the progression of cybercrime from Zeus Trojan to ransomware, the entrepreneurial approach of cybercriminals in the development of ransomware operations, and the increasing complexity of cybercriminal organizations. The interview delves into the functioning of Lockbit, its business-focused model with customer support and blog site, and its resilience in resurfacing after takedowns. Furthermore, the conversation touches on the shifting landscape of cybercrime, the interplay between cybercriminal organizations and nation-states, and the challenges in combating cybercrime, including the use of cryptocurrency for money laundering. As the conversation concludes, Alex provides insights into the professional and adaptive nature of cybercriminals, emphasizing their vigilance in understanding the actions of cybersecurity professionals. 

Overall, the interview offers valuable insights into the complex world of cyber threats, the role of threat intelligence, and the ongoing battle between cybercriminals and law enforcement.</itunes:summary>
      <itunes:subtitle>This Secure Talk podcast interviews Alex Cox, Director of Threat Intelligence for LastPass. We discuss the evolution of cybercrime, the significance of threat intelligence, and the recent takedown of the notorious ransomware group, Lockbit. 

The conversa</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Preventing phishing and ransomware: how Raffaele Mautone is safeguarding mid-size businesses</title>
      <itunes:episode>167</itunes:episode>
      <podcast:episode>167</podcast:episode>
      <itunes:title>Preventing phishing and ransomware: how Raffaele Mautone is safeguarding mid-size businesses</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1766094036</guid>
      <link>https://share.transistor.fm/s/22b0b071</link>
      <description>
        <![CDATA[Secure Talk invited CEO and Founder of Judy Security Raffaele Mautone to join us as a guest. The conversation focuses on a cybersecurity breach involving Whitworth University, covering the details of the breach, the response by the university, the challenges faced, and the importance of communication and disaster recovery plans in the event of a ransomware attack. The discussion also highlights the significance of having a multi-faceted approach to protecting data, including paper backups and encrypted data storage. The guest, Rafael, emphasizes the need for founders and small to mid-sized businesses to prioritize effective communication and response plans, as well as the potential vulnerabilities and risks they should be aware of in the cybersecurity landscape.]]>
      </description>
      <content:encoded>
        <![CDATA[Secure Talk invited CEO and Founder of Judy Security Raffaele Mautone to join us as a guest. The conversation focuses on a cybersecurity breach involving Whitworth University, covering the details of the breach, the response by the university, the challenges faced, and the importance of communication and disaster recovery plans in the event of a ransomware attack. The discussion also highlights the significance of having a multi-faceted approach to protecting data, including paper backups and encrypted data storage. The guest, Rafael, emphasizes the need for founders and small to mid-sized businesses to prioritize effective communication and response plans, as well as the potential vulnerabilities and risks they should be aware of in the cybersecurity landscape.]]>
      </content:encoded>
      <pubDate>Tue, 05 Mar 2024 17:10:56 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/22b0b071/82e26516.mp3" length="108492553" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_VDkN2AcwjKGASMBX178MMeNv7AHI_-3ijow1EicXGg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mMDNl/Y2IyMzRlOTFkYmU3/M2MyY2JkM2YyY2E5/MDNhYy5qcGc.jpg"/>
      <itunes:duration>2710</itunes:duration>
      <itunes:summary>Secure Talk invited CEO and Founder of Judy Security Raffaele Mautone to join us as a guest. The conversation focuses on a cybersecurity breach involving Whitworth University, covering the details of the breach, the response by the university, the challenges faced, and the importance of communication and disaster recovery plans in the event of a ransomware attack. The discussion also highlights the significance of having a multi-faceted approach to protecting data, including paper backups and encrypted data storage. The guest, Rafael, emphasizes the need for founders and small to mid-sized businesses to prioritize effective communication and response plans, as well as the potential vulnerabilities and risks they should be aware of in the cybersecurity landscape.</itunes:summary>
      <itunes:subtitle>Secure Talk invited CEO and Founder of Judy Security Raffaele Mautone to join us as a guest. The conversation focuses on a cybersecurity breach involving Whitworth University, covering the details of the breach, the response by the university, the challen</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Accountant Turned FBI Agent: Paul Bingham’s Contribution to Cybersecurity</title>
      <itunes:episode>166</itunes:episode>
      <podcast:episode>166</podcast:episode>
      <itunes:title>The Accountant Turned FBI Agent: Paul Bingham’s Contribution to Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1753867686</guid>
      <link>https://share.transistor.fm/s/83b0bd04</link>
      <description>
        <![CDATA[In this Secure Talk episode we welcome Paul Bingham, a former FBI Cybercrime Investigator and currently the Senior Vice President and Executive Dean at the College of Information Technology at Western Governors University. The discussion spans Paul’s 25 year career in the FBI fighting cybercrime, his transition to academia, and his insights on cybersecurity. Key points include advice for those interested in career paths like cybersecurity or FBI, Paul’s perspective on a Microsoft security breach, and understanding Western Governors University’s competency-based education approach.]]>
      </description>
      <content:encoded>
        <![CDATA[In this Secure Talk episode we welcome Paul Bingham, a former FBI Cybercrime Investigator and currently the Senior Vice President and Executive Dean at the College of Information Technology at Western Governors University. The discussion spans Paul’s 25 year career in the FBI fighting cybercrime, his transition to academia, and his insights on cybersecurity. Key points include advice for those interested in career paths like cybersecurity or FBI, Paul’s perspective on a Microsoft security breach, and understanding Western Governors University’s competency-based education approach.]]>
      </content:encoded>
      <pubDate>Wed, 21 Feb 2024 14:00:32 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/83b0bd04/b59e4b2e.mp3" length="118676071" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xdDfXER7G0ZQnt0TBsG_EGZAG_AwMWvp10bQ04Q81nw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNjNj/ODcxMGI3MzdkNmYz/YjcyNWM0ZDMyMTcy/ZGQwYS5qcGc.jpg"/>
      <itunes:duration>2964</itunes:duration>
      <itunes:summary>In this Secure Talk episode we welcome Paul Bingham, a former FBI Cybercrime Investigator and currently the Senior Vice President and Executive Dean at the College of Information Technology at Western Governors University. The discussion spans Paul’s 25 year career in the FBI fighting cybercrime, his transition to academia, and his insights on cybersecurity. Key points include advice for those interested in career paths like cybersecurity or FBI, Paul’s perspective on a Microsoft security breach, and understanding Western Governors University’s competency-based education approach.</itunes:summary>
      <itunes:subtitle>In this Secure Talk episode we welcome Paul Bingham, a former FBI Cybercrime Investigator and currently the Senior Vice President and Executive Dean at the College of Information Technology at Western Governors University. The discussion spans Paul’s 25 y</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>HealthTech, GAMP and 23andMe: A conversation with Stephen Ferrell, security leader in Life Sciences.</title>
      <itunes:episode>165</itunes:episode>
      <podcast:episode>165</podcast:episode>
      <itunes:title>HealthTech, GAMP and 23andMe: A conversation with Stephen Ferrell, security leader in Life Sciences.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1741363257</guid>
      <link>https://share.transistor.fm/s/4c7af850</link>
      <description>
        <![CDATA[How do you secure critical infrastructure that provides life-saving products? Life Sciences, BioPharma, and Health Tech companies hold some of the most valuable and private data. Security guards these organizations against motivated hackers, legal liabilities, and patient privacy. We are speaking with Stephen Ferrell, a leader in security for the life sciences space. We’ll highlight the significance of GAMP and its risk-based approach. Finally, they analyze the 23andMe data breach and the risks associated with DNA data.]]>
      </description>
      <content:encoded>
        <![CDATA[How do you secure critical infrastructure that provides life-saving products? Life Sciences, BioPharma, and Health Tech companies hold some of the most valuable and private data. Security guards these organizations against motivated hackers, legal liabilities, and patient privacy. We are speaking with Stephen Ferrell, a leader in security for the life sciences space. We’ll highlight the significance of GAMP and its risk-based approach. Finally, they analyze the 23andMe data breach and the risks associated with DNA data.]]>
      </content:encoded>
      <pubDate>Thu, 08 Feb 2024 15:15:39 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/4c7af850/81b7b4f8.mp3" length="96221930" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7-7FtrGtT5hBJ96qtpNEeGO6UHbov38Q-2UahM6AIAk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDUy/ZjJjZTU2NWJhZGMx/MGUxYTYyNDRjZjI5/NGFhZS5qcGc.jpg"/>
      <itunes:duration>2403</itunes:duration>
      <itunes:summary>How do you secure critical infrastructure that provides life-saving products? Life Sciences, BioPharma, and Health Tech companies hold some of the most valuable and private data. Security guards these organizations against motivated hackers, legal liabilities, and patient privacy. We are speaking with Stephen Ferrell, a leader in security for the life sciences space. We’ll highlight the significance of GAMP and its risk-based approach. Finally, they analyze the 23andMe data breach and the risks associated with DNA data.</itunes:summary>
      <itunes:subtitle>How do you secure critical infrastructure that provides life-saving products? Life Sciences, BioPharma, and Health Tech companies hold some of the most valuable and private data. Security guards these organizations against motivated hackers, legal liabili</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Secure Talk has a new host! Measuring Security and the impact of AI on Security certification.</title>
      <itunes:episode>164</itunes:episode>
      <podcast:episode>164</podcast:episode>
      <itunes:title>Secure Talk has a new host! Measuring Security and the impact of AI on Security certification.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1724733555</guid>
      <link>https://share.transistor.fm/s/d3bb415c</link>
      <description>
        <![CDATA[In this episode, Mark hands over the leadership of the SecureTalk podcast to Justin Beals, the CEO of StrikeGraph. They discuss security's complexity and measurement's role in ensuring effective security practices. Justin shares his perspective on security and how StrikeGraph helps organizations identify and operationalize the right security practices. 

They also discuss the impact of AI on security and the growing demand for security standards and certifications. Justin outlines his plans for SecureTalk, which include continuing to make security an approachable conversation and bringing in experts to discuss the future of security.

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, Mark hands over the leadership of the SecureTalk podcast to Justin Beals, the CEO of StrikeGraph. They discuss security's complexity and measurement's role in ensuring effective security practices. Justin shares his perspective on security and how StrikeGraph helps organizations identify and operationalize the right security practices. 

They also discuss the impact of AI on security and the growing demand for security standards and certifications. Justin outlines his plans for SecureTalk, which include continuing to make security an approachable conversation and bringing in experts to discuss the future of security.

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Fri, 19 Jan 2024 23:00:00 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d3bb415c/df64ca17.mp3" length="65550431" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6QorMc4L8-Qy04AF2WL9tfEL0NzX87wMFcSMNxwWwHY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NDRh/YjJhMjJmYWZmZDY2/MDczNmQ0ZTU1ZmY2/MGYyNS5qcGc.jpg"/>
      <itunes:duration>2562</itunes:duration>
      <itunes:summary>In this episode, Mark hands over the leadership of the SecureTalk podcast to Justin Beals, the CEO of StrikeGraph. They discuss security's complexity and measurement's role in ensuring effective security practices. Justin shares his perspective on security and how StrikeGraph helps organizations identify and operationalize the right security practices. 

They also discuss the impact of AI on security and the growing demand for security standards and certifications. Justin outlines his plans for SecureTalk, which include continuing to make security an approachable conversation and bringing in experts to discuss the future of security.

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>In this episode, Mark hands over the leadership of the SecureTalk podcast to Justin Beals, the CEO of StrikeGraph. They discuss security's complexity and measurement's role in ensuring effective security practices. Justin shares his perspective on securit</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Self-Sovereign Identities, Zero-Knowledge Credentials, and AI Digital Assistants</title>
      <itunes:episode>163</itunes:episode>
      <podcast:episode>163</podcast:episode>
      <itunes:title>Self-Sovereign Identities, Zero-Knowledge Credentials, and AI Digital Assistants</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1595689068</guid>
      <link>https://share.transistor.fm/s/f77b9f85</link>
      <description>
        <![CDATA[Chris Were is the Co-Founder and CEO of Verida, a network of decentralized data storage, messaging, and single sign-on solutions that enable interoperable ownership of personal data for Web3.  

In this episode of Secure Talk, Chris talks about self-sovereign identities, zero-knowledge credentials, and crypto wallets, and explains how personal will unlock AI digital assistants.

Verida
https://www.verida.io/]]>
      </description>
      <content:encoded>
        <![CDATA[Chris Were is the Co-Founder and CEO of Verida, a network of decentralized data storage, messaging, and single sign-on solutions that enable interoperable ownership of personal data for Web3.  

In this episode of Secure Talk, Chris talks about self-sovereign identities, zero-knowledge credentials, and crypto wallets, and explains how personal will unlock AI digital assistants.

Verida
https://www.verida.io/]]>
      </content:encoded>
      <pubDate>Mon, 21 Aug 2023 18:06:57 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/f77b9f85/4d2de516.mp3" length="47756201" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2985</itunes:duration>
      <itunes:summary>Chris Were is the Co-Founder and CEO of Verida, a network of decentralized data storage, messaging, and single sign-on solutions that enable interoperable ownership of personal data for Web3.  

In this episode of Secure Talk, Chris talks about self-sovereign identities, zero-knowledge credentials, and crypto wallets, and explains how personal will unlock AI digital assistants.

Verida
https://www.verida.io/</itunes:summary>
      <itunes:subtitle>Chris Were is the Co-Founder and CEO of Verida, a network of decentralized data storage, messaging, and single sign-on solutions that enable interoperable ownership of personal data for Web3.  

In this episode of Secure Talk, Chris talks about self-sover</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Better Way to Deploy Cloud Infrastructure</title>
      <itunes:episode>162</itunes:episode>
      <podcast:episode>162</podcast:episode>
      <itunes:title>A Better Way to Deploy Cloud Infrastructure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1576031479</guid>
      <link>https://share.transistor.fm/s/a07df431</link>
      <description>
        <![CDATA[Cory O'Daniel is the CEO and Co-Founder of Massdriver a company that provides self-service capabilities for deploying cloud infrastructure in an optimal manner for both cost and governance. Cory talks a bit about Massdriver's service and explains the challenges of traditional dev ops, and how dev ops is evolving.  He also talks about what founders should look for when selecting a funding partner.

Massdriver
https://www.massdriver.cloud/

The Secure Talk Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Cory O'Daniel is the CEO and Co-Founder of Massdriver a company that provides self-service capabilities for deploying cloud infrastructure in an optimal manner for both cost and governance. Cory talks a bit about Massdriver's service and explains the challenges of traditional dev ops, and how dev ops is evolving.  He also talks about what founders should look for when selecting a funding partner.

Massdriver
https://www.massdriver.cloud/

The Secure Talk Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 27 Jul 2023 20:32:00 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/a07df431/242cf557.mp3" length="42722264" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2671</itunes:duration>
      <itunes:summary>Cory O'Daniel is the CEO and Co-Founder of Massdriver a company that provides self-service capabilities for deploying cloud infrastructure in an optimal manner for both cost and governance. Cory talks a bit about Massdriver's service and explains the challenges of traditional dev ops, and how dev ops is evolving.  He also talks about what founders should look for when selecting a funding partner.

Massdriver
https://www.massdriver.cloud/

The Secure Talk Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Cory O'Daniel is the CEO and Co-Founder of Massdriver a company that provides self-service capabilities for deploying cloud infrastructure in an optimal manner for both cost and governance. Cory talks a bit about Massdriver's service and explains the chal</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Threat Modeling for Software Design &amp; Development</title>
      <itunes:episode>161</itunes:episode>
      <podcast:episode>161</podcast:episode>
      <itunes:title>Threat Modeling for Software Design &amp; Development</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1573386766</guid>
      <link>https://share.transistor.fm/s/c04870df</link>
      <description>
        <![CDATA[Stephen de Vries is the Co-Founder and CEO of IriusRisk a cybersecurity firm that helps companies to identify threats and improve security processes in the design and rollout of software.  Stephen explains how IriusRisk helps its customers and also talks about the changing regulatory and threat landscapes related to cybersecurity.

IriusRisk
https://www.iriusrisk.com/

The Secure Talk Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Stephen de Vries is the Co-Founder and CEO of IriusRisk a cybersecurity firm that helps companies to identify threats and improve security processes in the design and rollout of software.  Stephen explains how IriusRisk helps its customers and also talks about the changing regulatory and threat landscapes related to cybersecurity.

IriusRisk
https://www.iriusrisk.com/

The Secure Talk Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 24 Jul 2023 16:59:38 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c04870df/c26bdbb2.mp3" length="42629065" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2665</itunes:duration>
      <itunes:summary>Stephen de Vries is the Co-Founder and CEO of IriusRisk a cybersecurity firm that helps companies to identify threats and improve security processes in the design and rollout of software.  Stephen explains how IriusRisk helps its customers and also talks about the changing regulatory and threat landscapes related to cybersecurity.

IriusRisk
https://www.iriusrisk.com/

The Secure Talk Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Stephen de Vries is the Co-Founder and CEO of IriusRisk a cybersecurity firm that helps companies to identify threats and improve security processes in the design and rollout of software.  Stephen explains how IriusRisk helps its customers and also talks </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Secure Remote Access with Karen Gondoly, CEO of Leostream</title>
      <itunes:episode>160</itunes:episode>
      <podcast:episode>160</podcast:episode>
      <itunes:title>Secure Remote Access with Karen Gondoly, CEO of Leostream</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1567368802</guid>
      <link>https://share.transistor.fm/s/e4a77787</link>
      <description>
        <![CDATA[Karen Gondoly is the CEO and VP of Project Management of Leostream, a leading connection management platform for virtual desktop infrastructures.  Karen talks about some of the key trends related to security, access, and performance in the remote desktop access space.

Leostream
https://leostream.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Karen Gondoly is the CEO and VP of Project Management of Leostream, a leading connection management platform for virtual desktop infrastructures.  Karen talks about some of the key trends related to security, access, and performance in the remote desktop access space.

Leostream
https://leostream.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 17 Jul 2023 18:23:19 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e4a77787/23ea2107.mp3" length="30037634" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1878</itunes:duration>
      <itunes:summary>Karen Gondoly is the CEO and VP of Project Management of Leostream, a leading connection management platform for virtual desktop infrastructures.  Karen talks about some of the key trends related to security, access, and performance in the remote desktop access space.

Leostream
https://leostream.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Karen Gondoly is the CEO and VP of Project Management of Leostream, a leading connection management platform for virtual desktop infrastructures.  Karen talks about some of the key trends related to security, access, and performance in the remote desktop </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Technology for De-Fi Investors</title>
      <itunes:episode>159</itunes:episode>
      <podcast:episode>159</podcast:episode>
      <itunes:title>Security Technology for De-Fi Investors</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1563311812</guid>
      <link>https://share.transistor.fm/s/ceb11489</link>
      <description>
        <![CDATA[Dr. Shira Brezis is the CEO &amp; Co-Founder of Redefine, an end-to-end security technology provider for decentralized finance (De-Fi) investors.  Shira talks about the current state of crypto security and De-Fi risk mitigation strategies are evolving.

Redefine
https://redefine.net/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Dr. Shira Brezis is the CEO &amp; Co-Founder of Redefine, an end-to-end security technology provider for decentralized finance (De-Fi) investors.  Shira talks about the current state of crypto security and De-Fi risk mitigation strategies are evolving.

Redefine
https://redefine.net/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Wed, 12 Jul 2023 21:53:04 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ceb11489/15af8165.mp3" length="72901975" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3033</itunes:duration>
      <itunes:summary>Dr. Shira Brezis is the CEO &amp;amp; Co-Founder of Redefine, an end-to-end security technology provider for decentralized finance (De-Fi) investors.  Shira talks about the current state of crypto security and De-Fi risk mitigation strategies are evolving.

Redefine
https://redefine.net/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Dr. Shira Brezis is the CEO &amp;amp; Co-Founder of Redefine, an end-to-end security technology provider for decentralized finance (De-Fi) investors.  Shira talks about the current state of crypto security and De-Fi risk mitigation strategies are evolving.

R</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>AI Cameras, Autonomous Vehicles, and More!</title>
      <itunes:episode>158</itunes:episode>
      <podcast:episode>158</podcast:episode>
      <itunes:title>AI Cameras, Autonomous Vehicles, and More!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1553886649</guid>
      <link>https://share.transistor.fm/s/7065c825</link>
      <description>
        <![CDATA[Chris Piche is the CEO and Founder of Smarter AI.  Chris explains what AI cameras are and how they are used. He also discusses some of the challenges for the deployment of fully autonomous vehicles.  

Smarter AI
https://smarterai.camera/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Chris Piche is the CEO and Founder of Smarter AI.  Chris explains what AI cameras are and how they are used. He also discusses some of the challenges for the deployment of fully autonomous vehicles.  

Smarter AI
https://smarterai.camera/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Fri, 30 Jun 2023 23:20:51 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7065c825/3e7ec038.mp3" length="33654220" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2104</itunes:duration>
      <itunes:summary>Chris Piche is the CEO and Founder of Smarter AI.  Chris explains what AI cameras are and how they are used. He also discusses some of the challenges for the deployment of fully autonomous vehicles.  

Smarter AI
https://smarterai.camera/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Chris Piche is the CEO and Founder of Smarter AI.  Chris explains what AI cameras are and how they are used. He also discusses some of the challenges for the deployment of fully autonomous vehicles.  

Smarter AI
https://smarterai.camera/

The Secure Talk</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Service Now Security Advantages</title>
      <itunes:episode>157</itunes:episode>
      <podcast:episode>157</podcast:episode>
      <itunes:title>Service Now Security Advantages</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1550535391</guid>
      <link>https://share.transistor.fm/s/59b80201</link>
      <description>
        <![CDATA[Sean McDermott is the Founder and CEO of the Windward Consulting Group, a Service Now Elite Partner. Sean provides an overview of Service Now's advantages in service management, operations management, and security.  He also explains why companies make a decision to use Service Now and how they select a partner to assist their digital transformation.

Windward Consulting
https://windward.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Sean McDermott is the Founder and CEO of the Windward Consulting Group, a Service Now Elite Partner. Sean provides an overview of Service Now's advantages in service management, operations management, and security.  He also explains why companies make a decision to use Service Now and how they select a partner to assist their digital transformation.

Windward Consulting
https://windward.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Tue, 27 Jun 2023 16:44:26 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/59b80201/90bda87e.mp3" length="34439137" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2153</itunes:duration>
      <itunes:summary>Sean McDermott is the Founder and CEO of the Windward Consulting Group, a Service Now Elite Partner. Sean provides an overview of Service Now's advantages in service management, operations management, and security.  He also explains why companies make a decision to use Service Now and how they select a partner to assist their digital transformation.

Windward Consulting
https://windward.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Sean McDermott is the Founder and CEO of the Windward Consulting Group, a Service Now Elite Partner. Sean provides an overview of Service Now's advantages in service management, operations management, and security.  He also explains why companies make a d</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Multi-Chain NFT Trading, with Lasha Antadze Founder of Rarify Labs</title>
      <itunes:episode>156</itunes:episode>
      <podcast:episode>156</podcast:episode>
      <itunes:title>Multi-Chain NFT Trading, with Lasha Antadze Founder of Rarify Labs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1545815083</guid>
      <link>https://share.transistor.fm/s/e61ae03e</link>
      <description>
        <![CDATA[Lasha Antadze is the Founder of Rarify Labs one of Rarimo’s service providers.  He talks about how NFTrade and Rarimo are launching the first marketplace that enables users to purchase NFTs with any cryptocurrency on any chain. Users can now execute multi-chain transactions with a single signature, a single transaction fee, and a single click.  Lasha explains what this means for the wider NFT ecosystem.  He also discusses topics such as digital sovereignty and the present and future state of cryptocurrencies, blockchains, and NFTs.

Rarify Labs
https://www.rarifylabs.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Lasha Antadze is the Founder of Rarify Labs one of Rarimo’s service providers.  He talks about how NFTrade and Rarimo are launching the first marketplace that enables users to purchase NFTs with any cryptocurrency on any chain. Users can now execute multi-chain transactions with a single signature, a single transaction fee, and a single click.  Lasha explains what this means for the wider NFT ecosystem.  He also discusses topics such as digital sovereignty and the present and future state of cryptocurrencies, blockchains, and NFTs.

Rarify Labs
https://www.rarifylabs.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Wed, 21 Jun 2023 17:49:36 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e61ae03e/f4d27795.mp3" length="34418274" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2152</itunes:duration>
      <itunes:summary>Lasha Antadze is the Founder of Rarify Labs one of Rarimo’s service providers.  He talks about how NFTrade and Rarimo are launching the first marketplace that enables users to purchase NFTs with any cryptocurrency on any chain. Users can now execute multi-chain transactions with a single signature, a single transaction fee, and a single click.  Lasha explains what this means for the wider NFT ecosystem.  He also discusses topics such as digital sovereignty and the present and future state of cryptocurrencies, blockchains, and NFTs.

Rarify Labs
https://www.rarifylabs.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Lasha Antadze is the Founder of Rarify Labs one of Rarimo’s service providers.  He talks about how NFTrade and Rarimo are launching the first marketplace that enables users to purchase NFTs with any cryptocurrency on any chain. Users can now execute multi</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Cure for a Failing Data Privacy Strategy</title>
      <itunes:episode>155</itunes:episode>
      <podcast:episode>155</podcast:episode>
      <itunes:title>The Cure for a Failing Data Privacy Strategy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1539881134</guid>
      <link>https://share.transistor.fm/s/cb61f2be</link>
      <description>
        <![CDATA[Sean Falconer is the Head of Marketing &amp; Developer Relations at Skyflow, a Co-Host of Software Engineering Daily, and the sole host of the data privacy and compliance podcast Partially Redacted. In this episode, Sean explains why many data privacy strategies fail and how to fix them. He also talks about the danger of using tools such as ChatGPT and how web applications can limit their threat surface by using tools to protect and encrypt data.

Skyflow
https://www.skyflow.com/

The Partially Redacted Podcast
https://www.skyflow.com/podcast

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Sean Falconer is the Head of Marketing &amp; Developer Relations at Skyflow, a Co-Host of Software Engineering Daily, and the sole host of the data privacy and compliance podcast Partially Redacted. In this episode, Sean explains why many data privacy strategies fail and how to fix them. He also talks about the danger of using tools such as ChatGPT and how web applications can limit their threat surface by using tools to protect and encrypt data.

Skyflow
https://www.skyflow.com/

The Partially Redacted Podcast
https://www.skyflow.com/podcast

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 15 Jun 2023 23:04:11 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/cb61f2be/ea40bf67.mp3" length="22447065" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1403</itunes:duration>
      <itunes:summary>Sean Falconer is the Head of Marketing &amp;amp; Developer Relations at Skyflow, a Co-Host of Software Engineering Daily, and the sole host of the data privacy and compliance podcast Partially Redacted. In this episode, Sean explains why many data privacy strategies fail and how to fix them. He also talks about the danger of using tools such as ChatGPT and how web applications can limit their threat surface by using tools to protect and encrypt data.

Skyflow
https://www.skyflow.com/

The Partially Redacted Podcast
https://www.skyflow.com/podcast

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Sean Falconer is the Head of Marketing &amp;amp; Developer Relations at Skyflow, a Co-Host of Software Engineering Daily, and the sole host of the data privacy and compliance podcast Partially Redacted. In this episode, Sean explains why many data privacy str</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Mobile Safety: How to Ensure You Aren't Being Tracked</title>
      <itunes:episode>154</itunes:episode>
      <podcast:episode>154</podcast:episode>
      <itunes:title>Mobile Safety: How to Ensure You Aren't Being Tracked</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1521701200</guid>
      <link>https://share.transistor.fm/s/946cbb5d</link>
      <description>
        <![CDATA[David Sinclair is the Founder and CEO of 4Freedom Mobile.  David talks about the different ways public and private organizations can track individuals, monitor their activity, and collect personal data.  He also explains some best practices to prevent being tracked and to protect your personal information.

4Freedom Mobile
https://4freedommobile.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[David Sinclair is the Founder and CEO of 4Freedom Mobile.  David talks about the different ways public and private organizations can track individuals, monitor their activity, and collect personal data.  He also explains some best practices to prevent being tracked and to protect your personal information.

4Freedom Mobile
https://4freedommobile.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Wed, 24 May 2023 19:37:46 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/946cbb5d/fffbbbd1.mp3" length="48995005" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3063</itunes:duration>
      <itunes:summary>David Sinclair is the Founder and CEO of 4Freedom Mobile.  David talks about the different ways public and private organizations can track individuals, monitor their activity, and collect personal data.  He also explains some best practices to prevent being tracked and to protect your personal information.

4Freedom Mobile
https://4freedommobile.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>David Sinclair is the Founder and CEO of 4Freedom Mobile.  David talks about the different ways public and private organizations can track individuals, monitor their activity, and collect personal data.  He also explains some best practices to prevent bei</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Risks with SaaS Applications</title>
      <itunes:episode>153</itunes:episode>
      <podcast:episode>153</podcast:episode>
      <itunes:title>Cybersecurity Risks with SaaS Applications</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1519952899</guid>
      <link>https://share.transistor.fm/s/8c8f3e13</link>
      <description>
        <![CDATA[Nick Harrahill is the Director of Customer Support at Spin.ai.  In this episode of Secure Talk, Nick talks about some key findings in a recently released report on the security risks associated with SaaS applications.  He gives examples of the most common attacks and introduces some best practices to counter such attacks.

Spin.ai
https://spin.ai

Report on SaaS Application Risks
https://spin.ai/saas-application-risk-report/ 

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Nick Harrahill is the Director of Customer Support at Spin.ai.  In this episode of Secure Talk, Nick talks about some key findings in a recently released report on the security risks associated with SaaS applications.  He gives examples of the most common attacks and introduces some best practices to counter such attacks.

Spin.ai
https://spin.ai

Report on SaaS Application Risks
https://spin.ai/saas-application-risk-report/ 

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 22 May 2023 18:40:52 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/8c8f3e13/12299551.mp3" length="25040917" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1565</itunes:duration>
      <itunes:summary>Nick Harrahill is the Director of Customer Support at Spin.ai.  In this episode of Secure Talk, Nick talks about some key findings in a recently released report on the security risks associated with SaaS applications.  He gives examples of the most common attacks and introduces some best practices to counter such attacks.

Spin.ai
https://spin.ai

Report on SaaS Application Risks
https://spin.ai/saas-application-risk-report/ 

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Nick Harrahill is the Director of Customer Support at Spin.ai.  In this episode of Secure Talk, Nick talks about some key findings in a recently released report on the security risks associated with SaaS applications.  He gives examples of the most common</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Engaging Your Team in Cybersecurity</title>
      <itunes:episode>152</itunes:episode>
      <podcast:episode>152</podcast:episode>
      <itunes:title>Engaging Your Team in Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1512162007</guid>
      <link>https://share.transistor.fm/s/a4686824</link>
      <description>
        <![CDATA[Darren Gallop is the Co-Founder and CEO of Carbide, a cybersecurity firm that provides businesses of all sizes with the tools they need to adopt a strong cybersecurity and compliance posture.  In this episode, Darren talks about how to engage your team in cybersecurity to build a secure by-default company and how to showcase your company's cybersecurity posture in a way that helps you close deals faster and earn greater customer trust.  He also gives advice on cybersecurity education and how to choose a VPN provider.

Carbide
https://carbidesecure.com/company/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Darren Gallop is the Co-Founder and CEO of Carbide, a cybersecurity firm that provides businesses of all sizes with the tools they need to adopt a strong cybersecurity and compliance posture.  In this episode, Darren talks about how to engage your team in cybersecurity to build a secure by-default company and how to showcase your company's cybersecurity posture in a way that helps you close deals faster and earn greater customer trust.  He also gives advice on cybersecurity education and how to choose a VPN provider.

Carbide
https://carbidesecure.com/company/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 11 May 2023 21:33:59 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/a4686824/cde6b198.mp3" length="46337185" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2896</itunes:duration>
      <itunes:summary>Darren Gallop is the Co-Founder and CEO of Carbide, a cybersecurity firm that provides businesses of all sizes with the tools they need to adopt a strong cybersecurity and compliance posture.  In this episode, Darren talks about how to engage your team in cybersecurity to build a secure by-default company and how to showcase your company's cybersecurity posture in a way that helps you close deals faster and earn greater customer trust.  He also gives advice on cybersecurity education and how to choose a VPN provider.

Carbide
https://carbidesecure.com/company/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Darren Gallop is the Co-Founder and CEO of Carbide, a cybersecurity firm that provides businesses of all sizes with the tools they need to adopt a strong cybersecurity and compliance posture.  In this episode, Darren talks about how to engage your team in</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zero-Trust Content Security</title>
      <itunes:episode>151</itunes:episode>
      <podcast:episode>151</podcast:episode>
      <itunes:title>Zero-Trust Content Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1509519901</guid>
      <link>https://share.transistor.fm/s/e0e72fac</link>
      <description>
        <![CDATA[Aviv Grafi is the Founder and CTO of Votiro.  In this episode Aviv explains what zero-trust content security is and how it can greatly reduce the risk of compromise from weaponized documents.

Votiro
https://votiro.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Aviv Grafi is the Founder and CTO of Votiro.  In this episode Aviv explains what zero-trust content security is and how it can greatly reduce the risk of compromise from weaponized documents.

Votiro
https://votiro.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 08 May 2023 20:20:54 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e0e72fac/c1ff20a3.mp3" length="36466235" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2280</itunes:duration>
      <itunes:summary>Aviv Grafi is the Founder and CTO of Votiro.  In this episode Aviv explains what zero-trust content security is and how it can greatly reduce the risk of compromise from weaponized documents.

Votiro
https://votiro.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Aviv Grafi is the Founder and CTO of Votiro.  In this episode Aviv explains what zero-trust content security is and how it can greatly reduce the risk of compromise from weaponized documents.

Votiro
https://votiro.com/

The Secure Talk Cybersecurity Podc</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>API Security Challenges &amp; Solutions</title>
      <itunes:episode>150</itunes:episode>
      <podcast:episode>150</podcast:episode>
      <itunes:title>API Security Challenges &amp; Solutions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1504927828</guid>
      <link>https://share.transistor.fm/s/f834027f</link>
      <description>
        <![CDATA[Jeremy Snyder is the Founder and CEO of FireTail.io, an API security platform.  On this episode of Secure Talk, Jeremy explains how the explosion in the number of APIs has caused security issues for most organizations. He then introduces several best practices for securing APIs and the various apps that they connect with.

FireTail
https://www.firetail.io/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Jeremy Snyder is the Founder and CEO of FireTail.io, an API security platform.  On this episode of Secure Talk, Jeremy explains how the explosion in the number of APIs has caused security issues for most organizations. He then introduces several best practices for securing APIs and the various apps that they connect with.

FireTail
https://www.firetail.io/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Tue, 02 May 2023 23:33:01 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/f834027f/dd0a26f5.mp3" length="37159637" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2323</itunes:duration>
      <itunes:summary>Jeremy Snyder is the Founder and CEO of FireTail.io, an API security platform.  On this episode of Secure Talk, Jeremy explains how the explosion in the number of APIs has caused security issues for most organizations. He then introduces several best practices for securing APIs and the various apps that they connect with.

FireTail
https://www.firetail.io/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Jeremy Snyder is the Founder and CEO of FireTail.io, an API security platform.  On this episode of Secure Talk, Jeremy explains how the explosion in the number of APIs has caused security issues for most organizations. He then introduces several best prac</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Select a VPN Provider</title>
      <itunes:episode>149</itunes:episode>
      <podcast:episode>149</podcast:episode>
      <itunes:title>How to Select a VPN Provider</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1502349025</guid>
      <link>https://share.transistor.fm/s/2bd41aed</link>
      <description>
        <![CDATA[Michal Cizek is Co-Founder and CEO at GoodAccess, a global SaaS VPN provider that has customers in 120 countries. Michal explains the ins and outs of the VPN market and talks about what businesses should look for in a VPN provider. He also shares his thoughts about creating an effective organizational culture and building a Teal Organization.

GoodAccess
https://www.goodaccess.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Michal Cizek is Co-Founder and CEO at GoodAccess, a global SaaS VPN provider that has customers in 120 countries. Michal explains the ins and outs of the VPN market and talks about what businesses should look for in a VPN provider. He also shares his thoughts about creating an effective organizational culture and building a Teal Organization.

GoodAccess
https://www.goodaccess.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 01 May 2023 15:54:53 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/2bd41aed/79d93340.mp3" length="37598487" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2350</itunes:duration>
      <itunes:summary>Michal Cizek is Co-Founder and CEO at GoodAccess, a global SaaS VPN provider that has customers in 120 countries. Michal explains the ins and outs of the VPN market and talks about what businesses should look for in a VPN provider. He also shares his thoughts about creating an effective organizational culture and building a Teal Organization.

GoodAccess
https://www.goodaccess.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Michal Cizek is Co-Founder and CEO at GoodAccess, a global SaaS VPN provider that has customers in 120 countries. Michal explains the ins and outs of the VPN market and talks about what businesses should look for in a VPN provider. He also shares his thou</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Implement an Effective Cloud Risk Management Strategy</title>
      <itunes:episode>148</itunes:episode>
      <podcast:episode>148</podcast:episode>
      <itunes:title>How to Implement an Effective Cloud Risk Management Strategy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1500232888</guid>
      <link>https://share.transistor.fm/s/7a244bed</link>
      <description>
        <![CDATA[Eric Kedrosky, CISO at Sonrai Security, talks about some specific steps companies can take to implement an effective cloud risk management strategy.  He discusses topics including identity management, data discovery, cloud security, and vulnerability management.

Sonrai Security
https://sonraisecurity.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

Youtube
https://youtu.be/9rxhtvuQac4]]>
      </description>
      <content:encoded>
        <![CDATA[Eric Kedrosky, CISO at Sonrai Security, talks about some specific steps companies can take to implement an effective cloud risk management strategy.  He discusses topics including identity management, data discovery, cloud security, and vulnerability management.

Sonrai Security
https://sonraisecurity.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

Youtube
https://youtu.be/9rxhtvuQac4]]>
      </content:encoded>
      <pubDate>Tue, 25 Apr 2023 19:51:33 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7a244bed/8232d1a7.mp3" length="40433118" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2527</itunes:duration>
      <itunes:summary>Eric Kedrosky, CISO at Sonrai Security, talks about some specific steps companies can take to implement an effective cloud risk management strategy.  He discusses topics including identity management, data discovery, cloud security, and vulnerability management.

Sonrai Security
https://sonraisecurity.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

Youtube
https://youtu.be/9rxhtvuQac4</itunes:summary>
      <itunes:subtitle>Eric Kedrosky, CISO at Sonrai Security, talks about some specific steps companies can take to implement an effective cloud risk management strategy.  He discusses topics including identity management, data discovery, cloud security, and vulnerability mana</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>2023 OpenText Cybersecurity Threat Report &amp; Recommendations</title>
      <itunes:episode>147</itunes:episode>
      <podcast:episode>147</podcast:episode>
      <itunes:title>2023 OpenText Cybersecurity Threat Report &amp; Recommendations</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1496322529</guid>
      <link>https://share.transistor.fm/s/a241dd18</link>
      <description>
        <![CDATA[Grayson Milbourne is the Security Intelligence Director for OpenText Cybersecurity. In this episode, Grayson talks about some of the findings of the 2023 OpenText Cybersecurity Threat Report related to the most common types of cyber threats and discusses the advantages of a multi-layered approach to cybersecurity. Grayson also provides recommendations for cyber awareness and training.

OpenText Cybersecurity
https://www.opentext.com/products/cyber-security

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Grayson Milbourne is the Security Intelligence Director for OpenText Cybersecurity. In this episode, Grayson talks about some of the findings of the 2023 OpenText Cybersecurity Threat Report related to the most common types of cyber threats and discusses the advantages of a multi-layered approach to cybersecurity. Grayson also provides recommendations for cyber awareness and training.

OpenText Cybersecurity
https://www.opentext.com/products/cyber-security

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Wed, 19 Apr 2023 18:44:08 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/a241dd18/6d34e63c.mp3" length="37471876" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2342</itunes:duration>
      <itunes:summary>Grayson Milbourne is the Security Intelligence Director for OpenText Cybersecurity. In this episode, Grayson talks about some of the findings of the 2023 OpenText Cybersecurity Threat Report related to the most common types of cyber threats and discusses the advantages of a multi-layered approach to cybersecurity. Grayson also provides recommendations for cyber awareness and training.

OpenText Cybersecurity
https://www.opentext.com/products/cyber-security

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Grayson Milbourne is the Security Intelligence Director for OpenText Cybersecurity. In this episode, Grayson talks about some of the findings of the 2023 OpenText Cybersecurity Threat Report related to the most common types of cyber threats and discusses </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Democratizing Data with Tim Tutt, CEO and Co-Founder of Night Shift Development</title>
      <itunes:episode>146</itunes:episode>
      <podcast:episode>146</podcast:episode>
      <itunes:title>Democratizing Data with Tim Tutt, CEO and Co-Founder of Night Shift Development</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1494930238</guid>
      <link>https://share.transistor.fm/s/06024030</link>
      <description>
        <![CDATA[Tim Tutt is the CEO and Co-Founder of Night Shift Development, a company that is on a mission to democratize data analytics by making it easier for users of any technical skill level to get value from their business data. Tim talks about democratizing data analytics and business intelligence, how to become more data curious, and discusses some important trends in technology.  He also explains how cybersecurity professionals can benefit from making data more accessible.

Night Shift Development
https://www.nightshiftdevelopment.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Tim Tutt is the CEO and Co-Founder of Night Shift Development, a company that is on a mission to democratize data analytics by making it easier for users of any technical skill level to get value from their business data. Tim talks about democratizing data analytics and business intelligence, how to become more data curious, and discusses some important trends in technology.  He also explains how cybersecurity professionals can benefit from making data more accessible.

Night Shift Development
https://www.nightshiftdevelopment.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 17 Apr 2023 23:57:39 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/06024030/f072bfa5.mp3" length="28097908" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1757</itunes:duration>
      <itunes:summary>Tim Tutt is the CEO and Co-Founder of Night Shift Development, a company that is on a mission to democratize data analytics by making it easier for users of any technical skill level to get value from their business data. Tim talks about democratizing data analytics and business intelligence, how to become more data curious, and discusses some important trends in technology.  He also explains how cybersecurity professionals can benefit from making data more accessible.

Night Shift Development
https://www.nightshiftdevelopment.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Tim Tutt is the CEO and Co-Founder of Night Shift Development, a company that is on a mission to democratize data analytics by making it easier for users of any technical skill level to get value from their business data. Tim talks about democratizing dat</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Data Protection as a Services with "Mr. Backup" W. Curtis Preston</title>
      <itunes:episode>145</itunes:episode>
      <podcast:episode>145</podcast:episode>
      <itunes:title>Data Protection as a Services with "Mr. Backup" W. Curtis Preston</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1491841069</guid>
      <link>https://share.transistor.fm/s/f3e1d33f</link>
      <description>
        <![CDATA[W. Curtis Preston, AKA Mr. Backup, is an expert in backup &amp; recovery systems, a space he has been working in since 1993.  He has written four books on the subject, is the founder and webmaster of backupcentral.com, and is the host of the Restore it All Podcast.  Curtis is also the Chief Technical Evangelist at Druva, a data protection as a service company. 

In this episode of The Secure Talk Cybersecurity Podcast, we talk with Curtis about data protection as a service (DPaaS), backup basics, and the importance of having an incident response plan.  Curtis also talks about the recent trend toward backups being a priority target for hackers.

Druva
https://druva.com/podcast

Backup Central
https://www.backupcentral.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[W. Curtis Preston, AKA Mr. Backup, is an expert in backup &amp; recovery systems, a space he has been working in since 1993.  He has written four books on the subject, is the founder and webmaster of backupcentral.com, and is the host of the Restore it All Podcast.  Curtis is also the Chief Technical Evangelist at Druva, a data protection as a service company. 

In this episode of The Secure Talk Cybersecurity Podcast, we talk with Curtis about data protection as a service (DPaaS), backup basics, and the importance of having an incident response plan.  Curtis also talks about the recent trend toward backups being a priority target for hackers.

Druva
https://druva.com/podcast

Backup Central
https://www.backupcentral.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 13 Apr 2023 21:40:38 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/f3e1d33f/e14ed2ef.mp3" length="49298037" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3082</itunes:duration>
      <itunes:summary>W. Curtis Preston, AKA Mr. Backup, is an expert in backup &amp;amp; recovery systems, a space he has been working in since 1993.  He has written four books on the subject, is the founder and webmaster of backupcentral.com, and is the host of the Restore it All Podcast.  Curtis is also the Chief Technical Evangelist at Druva, a data protection as a service company. 

In this episode of The Secure Talk Cybersecurity Podcast, we talk with Curtis about data protection as a service (DPaaS), backup basics, and the importance of having an incident response plan.  Curtis also talks about the recent trend toward backups being a priority target for hackers.

Druva
https://druva.com/podcast

Backup Central
https://www.backupcentral.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>W. Curtis Preston, AKA Mr. Backup, is an expert in backup &amp;amp; recovery systems, a space he has been working in since 1993.  He has written four books on the subject, is the founder and webmaster of backupcentral.com, and is the host of the Restore it Al</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Dez Rock, CEO of SIEMonster</title>
      <itunes:episode>144</itunes:episode>
      <podcast:episode>144</podcast:episode>
      <itunes:title>Dez Rock, CEO of SIEMonster</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1487624521</guid>
      <link>https://share.transistor.fm/s/d84e9c37</link>
      <description>
        <![CDATA[Dez Rock, CEO of SIEMonster, talks about her team's pro bono work protecting Rabia Chaudry, and explains the differences between red team and blue teams in cybersecurity.  She also discusses the SIEM market, best practices for hiring, and shares some great Chris Rock stories.

SIEMonster
https://siemonster.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Dez Rock, CEO of SIEMonster, talks about her team's pro bono work protecting Rabia Chaudry, and explains the differences between red team and blue teams in cybersecurity.  She also discusses the SIEM market, best practices for hiring, and shares some great Chris Rock stories.

SIEMonster
https://siemonster.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Fri, 07 Apr 2023 23:43:04 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d84e9c37/0ad097dd.mp3" length="30739358" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1922</itunes:duration>
      <itunes:summary>Dez Rock, CEO of SIEMonster, talks about her team's pro bono work protecting Rabia Chaudry, and explains the differences between red team and blue teams in cybersecurity.  She also discusses the SIEM market, best practices for hiring, and shares some great Chris Rock stories.

SIEMonster
https://siemonster.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Dez Rock, CEO of SIEMonster, talks about her team's pro bono work protecting Rabia Chaudry, and explains the differences between red team and blue teams in cybersecurity.  She also discusses the SIEM market, best practices for hiring, and shares some grea</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Software Developers use Red Teaming &amp; White Box Audits to Improve Security and More!</title>
      <itunes:episode>143</itunes:episode>
      <podcast:episode>143</podcast:episode>
      <itunes:title>How Software Developers use Red Teaming &amp; White Box Audits to Improve Security and More!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1486770145</guid>
      <link>https://share.transistor.fm/s/978eef48</link>
      <description>
        <![CDATA[In this episode I talk with Andrew Woodhouse, CIO of RealVNC and Mario Heiderich Founder of Cure53 about how software developers can use Red Teaming &amp; White Box Audits to improve the security and competitiveness of their platforms.  We discuss the reasons for, the time and resources involved, and how to select appropriate partners for these important activities. 

RealVNC
https://www.linkedin.com/company/realvnc/
https://www.facebook.com/realvnc
https://twitter.com/realvnc
https://www.youtube.com/user/RealVNCLtd
https://www.reddit.com/r/realvnc/

Cure53
https://cure53.de

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode I talk with Andrew Woodhouse, CIO of RealVNC and Mario Heiderich Founder of Cure53 about how software developers can use Red Teaming &amp; White Box Audits to improve the security and competitiveness of their platforms.  We discuss the reasons for, the time and resources involved, and how to select appropriate partners for these important activities. 

RealVNC
https://www.linkedin.com/company/realvnc/
https://www.facebook.com/realvnc
https://twitter.com/realvnc
https://www.youtube.com/user/RealVNCLtd
https://www.reddit.com/r/realvnc/

Cure53
https://cure53.de

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 06 Apr 2023 20:53:17 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/978eef48/ff58d114.mp3" length="41281185" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2580</itunes:duration>
      <itunes:summary>In this episode I talk with Andrew Woodhouse, CIO of RealVNC and Mario Heiderich Founder of Cure53 about how software developers can use Red Teaming &amp;amp; White Box Audits to improve the security and competitiveness of their platforms.  We discuss the reasons for, the time and resources involved, and how to select appropriate partners for these important activities. 

RealVNC
https://www.linkedin.com/company/realvnc/
https://www.facebook.com/realvnc
https://twitter.com/realvnc
https://www.youtube.com/user/RealVNCLtd
https://www.reddit.com/r/realvnc/

Cure53
https://cure53.de

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>In this episode I talk with Andrew Woodhouse, CIO of RealVNC and Mario Heiderich Founder of Cure53 about how software developers can use Red Teaming &amp;amp; White Box Audits to improve the security and competitiveness of their platforms.  We discuss the rea</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Vendor Risk Management &amp; Compliance in Healthcare</title>
      <itunes:episode>142</itunes:episode>
      <podcast:episode>142</podcast:episode>
      <itunes:title>Vendor Risk Management &amp; Compliance in Healthcare</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1484297767</guid>
      <link>https://share.transistor.fm/s/017bd849</link>
      <description>
        <![CDATA[Britton Burton is the Senior Director of Product Strategy at CORL Technologies and the Host of the CyberPHIx Podcast.  Britton talks about some of the upcoming healthcare cybersecurity legislation in the U.S and also introduces some best practices related to third party risk management (TPRM).  He also discusses the latest threat landscape and provides some useful guidance for healthcare providers.

CORL Technologies
https://corltech.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Britton Burton is the Senior Director of Product Strategy at CORL Technologies and the Host of the CyberPHIx Podcast.  Britton talks about some of the upcoming healthcare cybersecurity legislation in the U.S and also introduces some best practices related to third party risk management (TPRM).  He also discusses the latest threat landscape and provides some useful guidance for healthcare providers.

CORL Technologies
https://corltech.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 03 Apr 2023 18:40:43 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/017bd849/e2024382.mp3" length="47345316" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2959</itunes:duration>
      <itunes:summary>Britton Burton is the Senior Director of Product Strategy at CORL Technologies and the Host of the CyberPHIx Podcast.  Britton talks about some of the upcoming healthcare cybersecurity legislation in the U.S and also introduces some best practices related to third party risk management (TPRM).  He also discusses the latest threat landscape and provides some useful guidance for healthcare providers.

CORL Technologies
https://corltech.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Britton Burton is the Senior Director of Product Strategy at CORL Technologies and the Host of the CyberPHIx Podcast.  Britton talks about some of the upcoming healthcare cybersecurity legislation in the U.S and also introduces some best practices related</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Financial Security in Chaotic Times</title>
      <itunes:episode>141</itunes:episode>
      <podcast:episode>141</podcast:episode>
      <itunes:title>Financial Security in Chaotic Times</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1482248533</guid>
      <link>https://share.transistor.fm/s/7eb9ad0e</link>
      <description>
        <![CDATA[Bryan Kuderna is a Certified Financial Planner and the author of What Should I Do with my Money?: Economic Insights to Build Wealth Amid Chaos.  Bryan explains the key pillars of financial security and also discusses the importance of protecting our privacy and data.

Kuderna Financial
https://www.kudernafinancial.com/

The Kuderna Podcast
https://www.kudernafinancial.com/the-kuderna-podcast

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Bryan Kuderna is a Certified Financial Planner and the author of What Should I Do with my Money?: Economic Insights to Build Wealth Amid Chaos.  Bryan explains the key pillars of financial security and also discusses the importance of protecting our privacy and data.

Kuderna Financial
https://www.kudernafinancial.com/

The Kuderna Podcast
https://www.kudernafinancial.com/the-kuderna-podcast

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Fri, 31 Mar 2023 21:31:37 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7eb9ad0e/97b5b8dd.mp3" length="40113354" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2507</itunes:duration>
      <itunes:summary>Bryan Kuderna is a Certified Financial Planner and the author of What Should I Do with my Money?: Economic Insights to Build Wealth Amid Chaos.  Bryan explains the key pillars of financial security and also discusses the importance of protecting our privacy and data.

Kuderna Financial
https://www.kudernafinancial.com/

The Kuderna Podcast
https://www.kudernafinancial.com/the-kuderna-podcast

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Bryan Kuderna is a Certified Financial Planner and the author of What Should I Do with my Money?: Economic Insights to Build Wealth Amid Chaos.  Bryan explains the key pillars of financial security and also discusses the importance of protecting our priva</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Evolution of Identity Standards and Identity Orchestration</title>
      <itunes:episode>140</itunes:episode>
      <podcast:episode>140</podcast:episode>
      <itunes:title>The Evolution of Identity Standards and Identity Orchestration</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1480742821</guid>
      <link>https://share.transistor.fm/s/100f9137</link>
      <description>
        <![CDATA[Eric Olden is the CEO of Strata the first distributed identity platform that solves the problem of fragmentation through a no-code software solution. He previously founded and exited Securant/ClearTrust and Symplified. He recently served as the SVP and GM at Oracle where he ran the identity and security business worldwide. Eric was a co-author of the SAML standard and has led the development of IDQL which solves policy, compatibility and security issues between multiple clouds.

In this episode, Eric talks about the development and evolution of different standards including SAML and IDQL, explains the importance of identity orchestration, and introduces some of the key tenets of multi-cloud resiliency and continuity. 

Strata
https://www.strata.io/

Hexa
https://hexaorchestration.org/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Eric Olden is the CEO of Strata the first distributed identity platform that solves the problem of fragmentation through a no-code software solution. He previously founded and exited Securant/ClearTrust and Symplified. He recently served as the SVP and GM at Oracle where he ran the identity and security business worldwide. Eric was a co-author of the SAML standard and has led the development of IDQL which solves policy, compatibility and security issues between multiple clouds.

In this episode, Eric talks about the development and evolution of different standards including SAML and IDQL, explains the importance of identity orchestration, and introduces some of the key tenets of multi-cloud resiliency and continuity. 

Strata
https://www.strata.io/

Hexa
https://hexaorchestration.org/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 30 Mar 2023 16:18:57 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/100f9137/b18a2697.mp3" length="41490139" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2594</itunes:duration>
      <itunes:summary>Eric Olden is the CEO of Strata the first distributed identity platform that solves the problem of fragmentation through a no-code software solution. He previously founded and exited Securant/ClearTrust and Symplified. He recently served as the SVP and GM at Oracle where he ran the identity and security business worldwide. Eric was a co-author of the SAML standard and has led the development of IDQL which solves policy, compatibility and security issues between multiple clouds.

In this episode, Eric talks about the development and evolution of different standards including SAML and IDQL, explains the importance of identity orchestration, and introduces some of the key tenets of multi-cloud resiliency and continuity. 

Strata
https://www.strata.io/

Hexa
https://hexaorchestration.org/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Eric Olden is the CEO of Strata the first distributed identity platform that solves the problem of fragmentation through a no-code software solution. He previously founded and exited Securant/ClearTrust and Symplified. He recently served as the SVP and GM</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How Online Communities Can Facilitate Information Sharing to Solve IT &amp; Security Challenges</title>
      <itunes:episode>139</itunes:episode>
      <podcast:episode>139</podcast:episode>
      <itunes:title>How Online Communities Can Facilitate Information Sharing to Solve IT &amp; Security Challenges</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1479678991</guid>
      <link>https://share.transistor.fm/s/920751f3</link>
      <description>
        <![CDATA[Joe Gross is the Director of Solutions Engineering at Graylog.  Joe talks about the development of Graylog's online community and best practices related to growing and increasing engagement with online communities.  Joe also spends some time comparing the different types of log management platforms, their feature sets and pricing models.

Graylog 
https://www.graylog.org/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Joe Gross is the Director of Solutions Engineering at Graylog.  Joe talks about the development of Graylog's online community and best practices related to growing and increasing engagement with online communities.  Joe also spends some time comparing the different types of log management platforms, their feature sets and pricing models.

Graylog 
https://www.graylog.org/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Tue, 28 Mar 2023 18:05:02 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/920751f3/a4dd3889.mp3" length="46007471" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2876</itunes:duration>
      <itunes:summary>Joe Gross is the Director of Solutions Engineering at Graylog.  Joe talks about the development of Graylog's online community and best practices related to growing and increasing engagement with online communities.  Joe also spends some time comparing the different types of log management platforms, their feature sets and pricing models.

Graylog 
https://www.graylog.org/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Joe Gross is the Director of Solutions Engineering at Graylog.  Joe talks about the development of Graylog's online community and best practices related to growing and increasing engagement with online communities.  Joe also spends some time comparing the</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Critical Device Security Strategies &amp; Tools</title>
      <itunes:episode>138</itunes:episode>
      <podcast:episode>138</podcast:episode>
      <itunes:title>Critical Device Security Strategies &amp; Tools</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1479178966</guid>
      <link>https://share.transistor.fm/s/0ff47c37</link>
      <description>
        <![CDATA[Samuel Hill is the Product Marketing Director for Cyolo Security. He specializes in critical device security, resilient IT strategies, and process integrity.  Samuel introduces some best practices related to critical device security. He also talks about how he transitioned into the cybersecurity industry and provides some great advice for organizations and individuals related to cybersecurity and personal information protection.

Cyolo
https://cyolo.io/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Samuel Hill is the Product Marketing Director for Cyolo Security. He specializes in critical device security, resilient IT strategies, and process integrity.  Samuel introduces some best practices related to critical device security. He also talks about how he transitioned into the cybersecurity industry and provides some great advice for organizations and individuals related to cybersecurity and personal information protection.

Cyolo
https://cyolo.io/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Tue, 28 Mar 2023 15:30:13 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0ff47c37/87533940.mp3" length="42544213" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2659</itunes:duration>
      <itunes:summary>Samuel Hill is the Product Marketing Director for Cyolo Security. He specializes in critical device security, resilient IT strategies, and process integrity.  Samuel introduces some best practices related to critical device security. He also talks about how he transitioned into the cybersecurity industry and provides some great advice for organizations and individuals related to cybersecurity and personal information protection.

Cyolo
https://cyolo.io/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Samuel Hill is the Product Marketing Director for Cyolo Security. He specializes in critical device security, resilient IT strategies, and process integrity.  Samuel introduces some best practices related to critical device security. He also talks about h</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Optimize Cybersecurity Training</title>
      <itunes:episode>137</itunes:episode>
      <podcast:episode>137</podcast:episode>
      <itunes:title>How to Optimize Cybersecurity Training</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1476797221</guid>
      <link>https://share.transistor.fm/s/5409bf9a</link>
      <description>
        <![CDATA[Ganesh Krishnan is the Co-Founder and CEO of Anzenna.  Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian.  He also launched Avid Secure in 2017 which was acquired just 18 months later. 

In this episode, Ganesh talks about why most cybersecurity training programs fail to deliver optimal results and introduces some best practices related to delivering effective training and establishing organizational cultures of trust.

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Ganesh Krishnan is the Co-Founder and CEO of Anzenna.  Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian.  He also launched Avid Secure in 2017 which was acquired just 18 months later. 

In this episode, Ganesh talks about why most cybersecurity training programs fail to deliver optimal results and introduces some best practices related to delivering effective training and establishing organizational cultures of trust.

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Fri, 24 Mar 2023 19:26:53 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/5409bf9a/d93eb07e.mp3" length="22684877" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1418</itunes:duration>
      <itunes:summary>Ganesh Krishnan is the Co-Founder and CEO of Anzenna.  Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian.  He also launched Avid Secure in 2017 which was acquired just 18 months later. 

In this episode, Ganesh talks about why most cybersecurity training programs fail to deliver optimal results and introduces some best practices related to delivering effective training and establishing organizational cultures of trust.

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Ganesh Krishnan is the Co-Founder and CEO of Anzenna.  Prior to founding Anzenna, Ganesh had worked in a number of top-level security and engineering roles for organizations including Yahoo!, LinkedIn, and Atlassian.  He also launched Avid Secure in 2017 </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Endpoint Management Vulnerability Gap</title>
      <itunes:episode>136</itunes:episode>
      <podcast:episode>136</podcast:episode>
      <itunes:title>The Endpoint Management Vulnerability Gap</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1476128143</guid>
      <link>https://share.transistor.fm/s/8be0f2e8</link>
      <description>
        <![CDATA[Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graham also talks about the "must haves" for any endpoint management platform and explains how IoT devices, including those with a Human-Machine Interface (HMI), can be managed.

Syxsense
https://www.syxsense.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graham also talks about the "must haves" for any endpoint management platform and explains how IoT devices, including those with a Human-Machine Interface (HMI), can be managed.

Syxsense
https://www.syxsense.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 23 Mar 2023 22:33:34 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/8be0f2e8/7aa002c3.mp3" length="44970464" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2811</itunes:duration>
      <itunes:summary>Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graham also talks about the "must haves" for any endpoint management platform and explains how IoT devices, including those with a Human-Machine Interface (HMI), can be managed.

Syxsense
https://www.syxsense.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Graham Brooks, Senior Security Architect at Syxsense, discusses the recently released research from Syxsense and Enterprise Strategy Group (ESG) that shows that unmanaged device utilization is resulting in an increasing number of security incidents. Graha</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Becoming an Ethical Hacker</title>
      <itunes:episode>135</itunes:episode>
      <podcast:episode>135</podcast:episode>
      <itunes:title>Becoming an Ethical Hacker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1474138528</guid>
      <link>https://share.transistor.fm/s/0d523376</link>
      <description>
        <![CDATA[Heath Adams, aka "The Cyber Mentor," is the Founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company.  Heath is a CISSP and has received numerous credentials including QSA, PNPT, OSCP, Security+, Network+, and A+. And, while he enjoys ethical hacking Heath also loves to teach. 
His courses have been taken by over 170,000 people on multiple platforms including Udemy, YouTube, Twitch, and INE.  

In this episode of the Secure Talk Podcast, Heath talks about how he got his start in ethical hacking, what are the essential skills needed to become an ethical hacker, how he developed his online courses. Heath gives advice to those who wish to either learn more about ethical hacking or seek a career as an ethical hacker or penetration tester.  He also shares some tips for business owners and consumers on how to improve their cybersecurity posture.

TCM Security
https://academy.tcm-sec.com/

Heath on Social Media:
LinkedIn - https://linkedin.com/in/heathadams
Twitter - https://twitter.com/thecybermentor
YouTube - https://www.youtube.com/c/thecybermentor
Twitch - https://twitch.tv/thecybermentor

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Heath Adams, aka "The Cyber Mentor," is the Founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company.  Heath is a CISSP and has received numerous credentials including QSA, PNPT, OSCP, Security+, Network+, and A+. And, while he enjoys ethical hacking Heath also loves to teach. 
His courses have been taken by over 170,000 people on multiple platforms including Udemy, YouTube, Twitch, and INE.  

In this episode of the Secure Talk Podcast, Heath talks about how he got his start in ethical hacking, what are the essential skills needed to become an ethical hacker, how he developed his online courses. Heath gives advice to those who wish to either learn more about ethical hacking or seek a career as an ethical hacker or penetration tester.  He also shares some tips for business owners and consumers on how to improve their cybersecurity posture.

TCM Security
https://academy.tcm-sec.com/

Heath on Social Media:
LinkedIn - https://linkedin.com/in/heathadams
Twitter - https://twitter.com/thecybermentor
YouTube - https://www.youtube.com/c/thecybermentor
Twitch - https://twitch.tv/thecybermentor

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Tue, 21 Mar 2023 14:18:22 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0d523376/440147b3.mp3" length="36970292" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2311</itunes:duration>
      <itunes:summary>Heath Adams, aka "The Cyber Mentor," is the Founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company.  Heath is a CISSP and has received numerous credentials including QSA, PNPT, OSCP, Security+, Network+, and A+. And, while he enjoys ethical hacking Heath also loves to teach. 
His courses have been taken by over 170,000 people on multiple platforms including Udemy, YouTube, Twitch, and INE.  

In this episode of the Secure Talk Podcast, Heath talks about how he got his start in ethical hacking, what are the essential skills needed to become an ethical hacker, how he developed his online courses. Heath gives advice to those who wish to either learn more about ethical hacking or seek a career as an ethical hacker or penetration tester.  He also shares some tips for business owners and consumers on how to improve their cybersecurity posture.

TCM Security
https://academy.tcm-sec.com/

Heath on Social Media:
LinkedIn - https://linkedin.com/in/heathadams
Twitter - https://twitter.com/thecybermentor
YouTube - https://www.youtube.com/c/thecybermentor
Twitch - https://twitch.tv/thecybermentor

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Heath Adams, aka "The Cyber Mentor," is the Founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company.  Heath is a CISSP and has received numerous credentials including QSA, PNPT, OSCP, Security+, Network+, and A+. And, whil</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Prevent Synthetic Identity Theft</title>
      <itunes:episode>134</itunes:episode>
      <podcast:episode>134</podcast:episode>
      <itunes:title>How to Prevent Synthetic Identity Theft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1473640867</guid>
      <link>https://share.transistor.fm/s/74b8605f</link>
      <description>
        <![CDATA[JT Taylor, Senior Director of Fraud Investigations and Operations at ID.me, talks about synthetic identity theft, what it is, and how to prevent it. He also discusses some of the latest social engineering methods, and explains how ID.me has helped to significantly reduce the amount of fraudulent claims against government agencies.

ID.me
https://www.id.me/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[JT Taylor, Senior Director of Fraud Investigations and Operations at ID.me, talks about synthetic identity theft, what it is, and how to prevent it. He also discusses some of the latest social engineering methods, and explains how ID.me has helped to significantly reduce the amount of fraudulent claims against government agencies.

ID.me
https://www.id.me/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 20 Mar 2023 21:33:09 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/74b8605f/78d0fed0.mp3" length="43001038" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2688</itunes:duration>
      <itunes:summary>JT Taylor, Senior Director of Fraud Investigations and Operations at ID.me, talks about synthetic identity theft, what it is, and how to prevent it. He also discusses some of the latest social engineering methods, and explains how ID.me has helped to significantly reduce the amount of fraudulent claims against government agencies.

ID.me
https://www.id.me/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>JT Taylor, Senior Director of Fraud Investigations and Operations at ID.me, talks about synthetic identity theft, what it is, and how to prevent it. He also discusses some of the latest social engineering methods, and explains how ID.me has helped to sign</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Breach Response &amp; More</title>
      <itunes:episode>133</itunes:episode>
      <podcast:episode>133</podcast:episode>
      <itunes:title>Cybersecurity Breach Response &amp; More</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1471320220</guid>
      <link>https://share.transistor.fm/s/9ae96900</link>
      <description>
        <![CDATA[Duane Laflotte is the CTO of Pulsar Security. Duane talks about the best way to respond to a data breach, what to do if your personal information is found on the dark web, and how to make sure your home appliances are not spying on you.

Pulsar Security
https://www.pulsarsecurity.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Duane Laflotte is the CTO of Pulsar Security. Duane talks about the best way to respond to a data breach, what to do if your personal information is found on the dark web, and how to make sure your home appliances are not spying on you.

Pulsar Security
https://www.pulsarsecurity.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Fri, 17 Mar 2023 17:58:16 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9ae96900/abd24c95.mp3" length="46090590" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2881</itunes:duration>
      <itunes:summary>Duane Laflotte is the CTO of Pulsar Security. Duane talks about the best way to respond to a data breach, what to do if your personal information is found on the dark web, and how to make sure your home appliances are not spying on you.

Pulsar Security
https://www.pulsarsecurity.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Duane Laflotte is the CTO of Pulsar Security. Duane talks about the best way to respond to a data breach, what to do if your personal information is found on the dark web, and how to make sure your home appliances are not spying on you.

Pulsar Security
h</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Third Party Risk Management (TPRM) with Lee Bristow, CTO of Phinity Risk Solutions</title>
      <itunes:episode>132</itunes:episode>
      <podcast:episode>132</podcast:episode>
      <itunes:title>Third Party Risk Management (TPRM) with Lee Bristow, CTO of Phinity Risk Solutions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1469902303</guid>
      <link>https://share.transistor.fm/s/7d8c0c6c</link>
      <description>
        <![CDATA[Lee Bristow is the CTO of Phinity Risk Solutions, a provider of an automated third party risk management (TPRM) solution. Lee explains the importance of TPRM and discusses some best practices related to TPRM.

Phinity Risk Solutions
https://www.phinityrisk.com/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Lee Bristow is the CTO of Phinity Risk Solutions, a provider of an automated third party risk management (TPRM) solution. Lee explains the importance of TPRM and discusses some best practices related to TPRM.

Phinity Risk Solutions
https://www.phinityrisk.com/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 16 Mar 2023 01:30:43 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7d8c0c6c/cd79862c.mp3" length="47963093" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2998</itunes:duration>
      <itunes:summary>Lee Bristow is the CTO of Phinity Risk Solutions, a provider of an automated third party risk management (TPRM) solution. Lee explains the importance of TPRM and discusses some best practices related to TPRM.

Phinity Risk Solutions
https://www.phinityrisk.com/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Lee Bristow is the CTO of Phinity Risk Solutions, a provider of an automated third party risk management (TPRM) solution. Lee explains the importance of TPRM and discusses some best practices related to TPRM.

Phinity Risk Solutions
https://www.phinityris</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building Autonomy &amp; Trust in Distributed Engineering Teams</title>
      <itunes:episode>131</itunes:episode>
      <podcast:episode>131</podcast:episode>
      <itunes:title>Building Autonomy &amp; Trust in Distributed Engineering Teams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1460864773</guid>
      <link>https://share.transistor.fm/s/c210783f</link>
      <description>
        <![CDATA[Nickolas Means is Vice President of Engineering at Sym. He has been leading software engineering teams for more than a decade in the HealthTech and DevTools spaces.  Nick also co-hosts the Managing Up podcast.  

In this episode, Nick talks about the importance of autonomy and trust in distributed engineering teams and how companies facilitate the development of both. He also shares his thoughts on how to turn failures into learning lessons, leveraging a blameless mindset, and how best engineering can work alongside product and compliance teams.

Sym
https://symops.com/

The Managing Up Podcast
https://www.managingup.show/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Nickolas Means is Vice President of Engineering at Sym. He has been leading software engineering teams for more than a decade in the HealthTech and DevTools spaces.  Nick also co-hosts the Managing Up podcast.  

In this episode, Nick talks about the importance of autonomy and trust in distributed engineering teams and how companies facilitate the development of both. He also shares his thoughts on how to turn failures into learning lessons, leveraging a blameless mindset, and how best engineering can work alongside product and compliance teams.

Sym
https://symops.com/

The Managing Up Podcast
https://www.managingup.show/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Tue, 07 Mar 2023 16:41:28 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c210783f/511f3e5b.mp3" length="32477681" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2030</itunes:duration>
      <itunes:summary>Nickolas Means is Vice President of Engineering at Sym. He has been leading software engineering teams for more than a decade in the HealthTech and DevTools spaces.  Nick also co-hosts the Managing Up podcast.  

In this episode, Nick talks about the importance of autonomy and trust in distributed engineering teams and how companies facilitate the development of both. He also shares his thoughts on how to turn failures into learning lessons, leveraging a blameless mindset, and how best engineering can work alongside product and compliance teams.

Sym
https://symops.com/

The Managing Up Podcast
https://www.managingup.show/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Nickolas Means is Vice President of Engineering at Sym. He has been leading software engineering teams for more than a decade in the HealthTech and DevTools spaces.  Nick also co-hosts the Managing Up podcast.  

In this episode, Nick talks about the impo</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Preventing Cyber Attacks Across the Software Supply Chain</title>
      <itunes:episode>130</itunes:episode>
      <podcast:episode>130</podcast:episode>
      <itunes:title>Preventing Cyber Attacks Across the Software Supply Chain</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1453596010</guid>
      <link>https://share.transistor.fm/s/b14f4064</link>
      <description>
        <![CDATA[Neatsun Ziv is the Co-Founder and CEO of Ox Security, an end-to-end software supply chain security solution.  Neatsun discusses the start-up ecosystem in Israel and then explains the key elements of preventing security issues with software supply chains. He also talks about  key concepts and frameworks including Single Source of Truth (ASOC), CI/CD Security Posture, SBOM vs. PBOM, and the Open Software Supply Chain Attack Reference (OSC&amp;R) framework.

Ox Security
https://www.ox.security/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Neatsun Ziv is the Co-Founder and CEO of Ox Security, an end-to-end software supply chain security solution.  Neatsun discusses the start-up ecosystem in Israel and then explains the key elements of preventing security issues with software supply chains. He also talks about  key concepts and frameworks including Single Source of Truth (ASOC), CI/CD Security Posture, SBOM vs. PBOM, and the Open Software Supply Chain Attack Reference (OSC&amp;R) framework.

Ox Security
https://www.ox.security/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 02 Mar 2023 15:28:50 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b14f4064/d5a965e1.mp3" length="39363558" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2461</itunes:duration>
      <itunes:summary>Neatsun Ziv is the Co-Founder and CEO of Ox Security, an end-to-end software supply chain security solution.  Neatsun discusses the start-up ecosystem in Israel and then explains the key elements of preventing security issues with software supply chains. He also talks about  key concepts and frameworks including Single Source of Truth (ASOC), CI/CD Security Posture, SBOM vs. PBOM, and the Open Software Supply Chain Attack Reference (OSC&amp;amp;R) framework.

Ox Security
https://www.ox.security/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Neatsun Ziv is the Co-Founder and CEO of Ox Security, an end-to-end software supply chain security solution.  Neatsun discusses the start-up ecosystem in Israel and then explains the key elements of preventing security issues with software supply chains. </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Training for Software Development Teams</title>
      <itunes:episode>129</itunes:episode>
      <podcast:episode>129</podcast:episode>
      <itunes:title>Security Training for Software Development Teams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1449578467</guid>
      <link>https://share.transistor.fm/s/fea1663c</link>
      <description>
        <![CDATA[Laura Bell Main is the Founder and CEO of SafeStack Academy, a mission-driven and community-centric online training platform that provides software development teams with the skills they need to build high-quality, secure software.  Laura shares best practices related to cyber security education, content development and delivery, and secure software development.

SafeStack Academy
https://safestack.io/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/

Thank you for listening to the Secure Talk Cyber Security Podcast!]]>
      </description>
      <content:encoded>
        <![CDATA[Laura Bell Main is the Founder and CEO of SafeStack Academy, a mission-driven and community-centric online training platform that provides software development teams with the skills they need to build high-quality, secure software.  Laura shares best practices related to cyber security education, content development and delivery, and secure software development.

SafeStack Academy
https://safestack.io/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/

Thank you for listening to the Secure Talk Cyber Security Podcast!]]>
      </content:encoded>
      <pubDate>Mon, 20 Feb 2023 16:20:14 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/fea1663c/f5ff2471.mp3" length="38979026" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2437</itunes:duration>
      <itunes:summary>Laura Bell Main is the Founder and CEO of SafeStack Academy, a mission-driven and community-centric online training platform that provides software development teams with the skills they need to build high-quality, secure software.  Laura shares best practices related to cyber security education, content development and delivery, and secure software development.

SafeStack Academy
https://safestack.io/

The Secure Talk Cyber Security Podcast
https://securetalkpodcast.com/

Thank you for listening to the Secure Talk Cyber Security Podcast!</itunes:summary>
      <itunes:subtitle>Laura Bell Main is the Founder and CEO of SafeStack Academy, a mission-driven and community-centric online training platform that provides software development teams with the skills they need to build high-quality, secure software.  Laura shares best prac</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Automating Data Discovery &amp; Security</title>
      <itunes:episode>128</itunes:episode>
      <podcast:episode>128</podcast:episode>
      <itunes:title>Automating Data Discovery &amp; Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1448564269</guid>
      <link>https://share.transistor.fm/s/6fab9f49</link>
      <description>
        <![CDATA[Tyler Young is the CISO at BigID a provider of integrated and automated data discovery, privacy, security, and governance tools. Tyler talks about the some of the must haves for data discovery and security and shares some of his observations related to funding opportunities in the cyber security space.

BigID
https://bigid.com/

The Secure Talk Podcast
https://securetalkpodcast.com/

Thank you for listening to The Secure Talk Cyber Security Podcast!]]>
      </description>
      <content:encoded>
        <![CDATA[Tyler Young is the CISO at BigID a provider of integrated and automated data discovery, privacy, security, and governance tools. Tyler talks about the some of the must haves for data discovery and security and shares some of his observations related to funding opportunities in the cyber security space.

BigID
https://bigid.com/

The Secure Talk Podcast
https://securetalkpodcast.com/

Thank you for listening to The Secure Talk Cyber Security Podcast!]]>
      </content:encoded>
      <pubDate>Thu, 16 Feb 2023 19:51:23 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/6fab9f49/fefbd228.mp3" length="31378844" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1962</itunes:duration>
      <itunes:summary>Tyler Young is the CISO at BigID a provider of integrated and automated data discovery, privacy, security, and governance tools. Tyler talks about the some of the must haves for data discovery and security and shares some of his observations related to funding opportunities in the cyber security space.

BigID
https://bigid.com/

The Secure Talk Podcast
https://securetalkpodcast.com/

Thank you for listening to The Secure Talk Cyber Security Podcast!</itunes:summary>
      <itunes:subtitle>Tyler Young is the CISO at BigID a provider of integrated and automated data discovery, privacy, security, and governance tools. Tyler talks about the some of the must haves for data discovery and security and shares some of his observations related to fu</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Best Practices for Cybersecurity Practitioners</title>
      <itunes:episode>127</itunes:episode>
      <podcast:episode>127</podcast:episode>
      <itunes:title>Best Practices for Cybersecurity Practitioners</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1444223989</guid>
      <link>https://share.transistor.fm/s/b8c8f35e</link>
      <description>
        <![CDATA[Luis Valenzuela is Director, Data Loss Prevention &amp; Data Governance for InComm Payments. He is also a CISSP and PMP.  Luis talks about best practices for data loss prevention, data governance, and cybersecurity leadership. He also provides insights and advice related to transitioning to a career in cybersecurity, career advancement and the importance of continual leadership and subject matter-specific learning.  

InComm Payments
https://www.incomm.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Luis Valenzuela is Director, Data Loss Prevention &amp; Data Governance for InComm Payments. He is also a CISSP and PMP.  Luis talks about best practices for data loss prevention, data governance, and cybersecurity leadership. He also provides insights and advice related to transitioning to a career in cybersecurity, career advancement and the importance of continual leadership and subject matter-specific learning.  

InComm Payments
https://www.incomm.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Fri, 10 Feb 2023 18:16:55 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b8c8f35e/5d1b2465.mp3" length="43160288" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2698</itunes:duration>
      <itunes:summary>Luis Valenzuela is Director, Data Loss Prevention &amp;amp; Data Governance for InComm Payments. He is also a CISSP and PMP.  Luis talks about best practices for data loss prevention, data governance, and cybersecurity leadership. He also provides insights and advice related to transitioning to a career in cybersecurity, career advancement and the importance of continual leadership and subject matter-specific learning.  

InComm Payments
https://www.incomm.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Luis Valenzuela is Director, Data Loss Prevention &amp;amp; Data Governance for InComm Payments. He is also a CISSP and PMP.  Luis talks about best practices for data loss prevention, data governance, and cybersecurity leadership. He also provides insights an</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Optimizing Cyber Threat Detection &amp; Response</title>
      <itunes:episode>126</itunes:episode>
      <podcast:episode>126</podcast:episode>
      <itunes:title>Optimizing Cyber Threat Detection &amp; Response</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1441310017</guid>
      <link>https://share.transistor.fm/s/87ad4760</link>
      <description>
        <![CDATA[Sanjay Raja is the VP of Product Marketing and Solutions at Gurucul. Sanjay talks about the importance of automating threat detection and response through the implementation of targeted signal detection and evaluation, as well as deploying policies that allow for automated responses to various threats.

Gurucul
https://gurucul.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com

Thank you for listening to The Secure Talk Cybersecurity Podcast!]]>
      </description>
      <content:encoded>
        <![CDATA[Sanjay Raja is the VP of Product Marketing and Solutions at Gurucul. Sanjay talks about the importance of automating threat detection and response through the implementation of targeted signal detection and evaluation, as well as deploying policies that allow for automated responses to various threats.

Gurucul
https://gurucul.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com

Thank you for listening to The Secure Talk Cybersecurity Podcast!]]>
      </content:encoded>
      <pubDate>Mon, 06 Feb 2023 22:47:57 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/87ad4760/0cba4aa8.mp3" length="44554180" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2785</itunes:duration>
      <itunes:summary>Sanjay Raja is the VP of Product Marketing and Solutions at Gurucul. Sanjay talks about the importance of automating threat detection and response through the implementation of targeted signal detection and evaluation, as well as deploying policies that allow for automated responses to various threats.

Gurucul
https://gurucul.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com

Thank you for listening to The Secure Talk Cybersecurity Podcast!</itunes:summary>
      <itunes:subtitle>Sanjay Raja is the VP of Product Marketing and Solutions at Gurucul. Sanjay talks about the importance of automating threat detection and response through the implementation of targeted signal detection and evaluation, as well as deploying policies that a</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Solutions for the Federal Government</title>
      <itunes:episode>125</itunes:episode>
      <podcast:episode>125</podcast:episode>
      <itunes:title>Cybersecurity Solutions for the Federal Government</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1437154888</guid>
      <link>https://share.transistor.fm/s/d2b0ebd4</link>
      <description>
        <![CDATA[Steve Orrin, Federal Chief Technology Officer &amp; Senior Principal Engineer for Intel  talks about how he works with various government agencies to develop and deliver cybersecurity solutions.  He explains the differences between working with enterprise customers compared to working with government agencies. He also explains how the federal government is implementing Zero Trust across all agencies, how AI is affecting cybersecurity and the cyber threat landscape, and gives some great book recommendations related to sci-fi and cybersecurity.

Intel
https://www.intel.com/

Intel Government Cybersecurity
https://www.intel.com/content/www/us/en/government/cybersecurity.html

The  Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast!]]>
      </description>
      <content:encoded>
        <![CDATA[Steve Orrin, Federal Chief Technology Officer &amp; Senior Principal Engineer for Intel  talks about how he works with various government agencies to develop and deliver cybersecurity solutions.  He explains the differences between working with enterprise customers compared to working with government agencies. He also explains how the federal government is implementing Zero Trust across all agencies, how AI is affecting cybersecurity and the cyber threat landscape, and gives some great book recommendations related to sci-fi and cybersecurity.

Intel
https://www.intel.com/

Intel Government Cybersecurity
https://www.intel.com/content/www/us/en/government/cybersecurity.html

The  Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast!]]>
      </content:encoded>
      <pubDate>Wed, 01 Feb 2023 17:07:43 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d2b0ebd4/e66f929a.mp3" length="40510013" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2532</itunes:duration>
      <itunes:summary>Steve Orrin, Federal Chief Technology Officer &amp;amp; Senior Principal Engineer for Intel  talks about how he works with various government agencies to develop and deliver cybersecurity solutions.  He explains the differences between working with enterprise customers compared to working with government agencies. He also explains how the federal government is implementing Zero Trust across all agencies, how AI is affecting cybersecurity and the cyber threat landscape, and gives some great book recommendations related to sci-fi and cybersecurity.

Intel
https://www.intel.com/

Intel Government Cybersecurity
https://www.intel.com/content/www/us/en/government/cybersecurity.html

The  Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast!</itunes:summary>
      <itunes:subtitle>Steve Orrin, Federal Chief Technology Officer &amp;amp; Senior Principal Engineer for Intel  talks about how he works with various government agencies to develop and deliver cybersecurity solutions.  He explains the differences between working with enterprise</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Using Open Source Linux-Based  Software for Identity Management</title>
      <itunes:episode>124</itunes:episode>
      <podcast:episode>124</podcast:episode>
      <itunes:title>Using Open Source Linux-Based  Software for Identity Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1433945839</guid>
      <link>https://share.transistor.fm/s/6d45c365</link>
      <description>
        <![CDATA[Kevin Dominik Korte is the President of Univention North America.  Kevin discusses the key components and benefits of a good identity management platform, when organizations should consider an open source solution, and explains the different requirements between private enterprises and schools.

Univention
https://www.univention.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Kevin Dominik Korte is the President of Univention North America.  Kevin discusses the key components and benefits of a good identity management platform, when organizations should consider an open source solution, and explains the different requirements between private enterprises and schools.

Univention
https://www.univention.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Fri, 27 Jan 2023 17:36:37 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/6d45c365/87b29678.mp3" length="43051217" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2691</itunes:duration>
      <itunes:summary>Kevin Dominik Korte is the President of Univention North America.  Kevin discusses the key components and benefits of a good identity management platform, when organizations should consider an open source solution, and explains the different requirements between private enterprises and schools.

Univention
https://www.univention.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Kevin Dominik Korte is the President of Univention North America.  Kevin discusses the key components and benefits of a good identity management platform, when organizations should consider an open source solution, and explains the different requirements </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Optimizing the Microsoft Security Stack</title>
      <itunes:episode>123</itunes:episode>
      <podcast:episode>123</podcast:episode>
      <itunes:title>Optimizing the Microsoft Security Stack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1432267696</guid>
      <link>https://share.transistor.fm/s/fc10e257</link>
      <description>
        <![CDATA[André Keartland is a solutions architect at Netsurit.  He has been working in the IT industry for almost 30 years.  As a solutions architect, his role is to design and implement solutions for enterprise customers. Although he tries to be technology agnostic, André has become recognized as an authority on the Microsoft solution stack and has implemented a large number of Microsoft on-premise, cloud, and hybrid products and solutions, including Azure and Microsoft 365.

In this episode of The Secure Talk Podcast, André shares his thoughts about the value of the Microsoft security stack and give suggestions on how to optimize many of the security related tools and settings that are included in M365.

Netsurit
https://netsurit.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast!
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[André Keartland is a solutions architect at Netsurit.  He has been working in the IT industry for almost 30 years.  As a solutions architect, his role is to design and implement solutions for enterprise customers. Although he tries to be technology agnostic, André has become recognized as an authority on the Microsoft solution stack and has implemented a large number of Microsoft on-premise, cloud, and hybrid products and solutions, including Azure and Microsoft 365.

In this episode of The Secure Talk Podcast, André shares his thoughts about the value of the Microsoft security stack and give suggestions on how to optimize many of the security related tools and settings that are included in M365.

Netsurit
https://netsurit.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast!
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Wed, 25 Jan 2023 16:44:58 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/fc10e257/9ea20e6e.mp3" length="52605740" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3288</itunes:duration>
      <itunes:summary>André Keartland is a solutions architect at Netsurit.  He has been working in the IT industry for almost 30 years.  As a solutions architect, his role is to design and implement solutions for enterprise customers. Although he tries to be technology agnostic, André has become recognized as an authority on the Microsoft solution stack and has implemented a large number of Microsoft on-premise, cloud, and hybrid products and solutions, including Azure and Microsoft 365.

In this episode of The Secure Talk Podcast, André shares his thoughts about the value of the Microsoft security stack and give suggestions on how to optimize many of the security related tools and settings that are included in M365.

Netsurit
https://netsurit.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast!
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>André Keartland is a solutions architect at Netsurit.  He has been working in the IT industry for almost 30 years.  As a solutions architect, his role is to design and implement solutions for enterprise customers. Although he tries to be technology agnost</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Importance of, and Differences Between, Cyber Resilience, Disaster Recovery, and Backups</title>
      <itunes:episode>122</itunes:episode>
      <podcast:episode>122</podcast:episode>
      <itunes:title>The Importance of, and Differences Between, Cyber Resilience, Disaster Recovery, and Backups</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1427396710</guid>
      <link>https://share.transistor.fm/s/288f88fd</link>
      <description>
        <![CDATA[Sagi Brody co-founded Webair in 1998 and is now the CTO of Opti9, a leading hybrid cloud solutions provider specializing in digital transformation, data storage, DevOps, backup and recovery, compliance-driven migration, managed cloud services, and cloud-first application services. 

As the CTO of Opti9, Sagi is responsible for product development, and research and development (R&amp;D). He has extensive experience in all aspects of the cloud and interconnection industries, including infrastructure, networking, software development, automation, platforms, security, global network buildouts, and compliance. 

In this episode Sagi explains the differences between backups, disaster recovery, and cyber resilience and talks about benefits of working with a managed security service partner (MSSP).

Opti9
https://opti9tech.com/

The Secure Talk Podcast
https://securetalkpodcast.com 

Thank you for listening to The Secure Talk Cybersecurity Podcast!]]>
      </description>
      <content:encoded>
        <![CDATA[Sagi Brody co-founded Webair in 1998 and is now the CTO of Opti9, a leading hybrid cloud solutions provider specializing in digital transformation, data storage, DevOps, backup and recovery, compliance-driven migration, managed cloud services, and cloud-first application services. 

As the CTO of Opti9, Sagi is responsible for product development, and research and development (R&amp;D). He has extensive experience in all aspects of the cloud and interconnection industries, including infrastructure, networking, software development, automation, platforms, security, global network buildouts, and compliance. 

In this episode Sagi explains the differences between backups, disaster recovery, and cyber resilience and talks about benefits of working with a managed security service partner (MSSP).

Opti9
https://opti9tech.com/

The Secure Talk Podcast
https://securetalkpodcast.com 

Thank you for listening to The Secure Talk Cybersecurity Podcast!]]>
      </content:encoded>
      <pubDate>Fri, 20 Jan 2023 21:49:24 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/288f88fd/7c61ed08.mp3" length="42804651" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2676</itunes:duration>
      <itunes:summary>Sagi Brody co-founded Webair in 1998 and is now the CTO of Opti9, a leading hybrid cloud solutions provider specializing in digital transformation, data storage, DevOps, backup and recovery, compliance-driven migration, managed cloud services, and cloud-first application services. 

As the CTO of Opti9, Sagi is responsible for product development, and research and development (R&amp;amp;D). He has extensive experience in all aspects of the cloud and interconnection industries, including infrastructure, networking, software development, automation, platforms, security, global network buildouts, and compliance. 

In this episode Sagi explains the differences between backups, disaster recovery, and cyber resilience and talks about benefits of working with a managed security service partner (MSSP).

Opti9
https://opti9tech.com/

The Secure Talk Podcast
https://securetalkpodcast.com 

Thank you for listening to The Secure Talk Cybersecurity Podcast!</itunes:summary>
      <itunes:subtitle>Sagi Brody co-founded Webair in 1998 and is now the CTO of Opti9, a leading hybrid cloud solutions provider specializing in digital transformation, data storage, DevOps, backup and recovery, compliance-driven migration, managed cloud services, and cloud-f</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Managed Security Services for Start-Ups and SMEs</title>
      <itunes:episode>121</itunes:episode>
      <podcast:episode>121</podcast:episode>
      <itunes:title>Managed Security Services for Start-Ups and SMEs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1425717958</guid>
      <link>https://share.transistor.fm/s/f4a2289d</link>
      <description>
        <![CDATA[Scott McCrady is the CEO of SolCyber a provider of cybersecurity as a service.  Scott talks about the role that a managed security service provider(MSSP) plays in the overall strategy for securing data and infrastructure and explains why SolCyber is primarily focused on serving the start-up and small-medium enterprise (SME) market.  He also details the critical ingredients that comprise an effective MSSP offering.

Prior to SolCyber, Scott built the Asia-Pacific-Japan (APJ) business at Symantec where he ran the global Managed Security Service, and the Symantec and Accenture Joint Venture. He then transitioned to FireEye pre-IPO to create their global MSS business and led the development of the APJ market.

SolCyber
https://solcyber.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Scott McCrady is the CEO of SolCyber a provider of cybersecurity as a service.  Scott talks about the role that a managed security service provider(MSSP) plays in the overall strategy for securing data and infrastructure and explains why SolCyber is primarily focused on serving the start-up and small-medium enterprise (SME) market.  He also details the critical ingredients that comprise an effective MSSP offering.

Prior to SolCyber, Scott built the Asia-Pacific-Japan (APJ) business at Symantec where he ran the global Managed Security Service, and the Symantec and Accenture Joint Venture. He then transitioned to FireEye pre-IPO to create their global MSS business and led the development of the APJ market.

SolCyber
https://solcyber.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Tue, 17 Jan 2023 16:28:14 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/f4a2289d/2b0d4301.mp3" length="44283346" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2768</itunes:duration>
      <itunes:summary>Scott McCrady is the CEO of SolCyber a provider of cybersecurity as a service.  Scott talks about the role that a managed security service provider(MSSP) plays in the overall strategy for securing data and infrastructure and explains why SolCyber is primarily focused on serving the start-up and small-medium enterprise (SME) market.  He also details the critical ingredients that comprise an effective MSSP offering.

Prior to SolCyber, Scott built the Asia-Pacific-Japan (APJ) business at Symantec where he ran the global Managed Security Service, and the Symantec and Accenture Joint Venture. He then transitioned to FireEye pre-IPO to create their global MSS business and led the development of the APJ market.

SolCyber
https://solcyber.com/

The Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Scott McCrady is the CEO of SolCyber a provider of cybersecurity as a service.  Scott talks about the role that a managed security service provider(MSSP) plays in the overall strategy for securing data and infrastructure and explains why SolCyber is prima</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Vaccine Approach to IoT Device Cybersecurity</title>
      <itunes:episode>120</itunes:episode>
      <podcast:episode>120</podcast:episode>
      <itunes:title>A Vaccine Approach to IoT Device Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1420232878</guid>
      <link>https://share.transistor.fm/s/6229f209</link>
      <description>
        <![CDATA[Amit Serper is the Director of Security Research at Sternum IoT and is the one who found a 'vaccine' for NotPetya.  He believes it’s time to look past the ‘patchability’ approach and implement a ‘vaccine’ like solution. 

In this episode Amot talks about embedded device security,  the vaccine approach, and introduces some of the key aspects of Sternum IoT's autonomous security and observability platform. 

Sternum IoT
https://www.sternumiot.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast.]]>
      </description>
      <content:encoded>
        <![CDATA[Amit Serper is the Director of Security Research at Sternum IoT and is the one who found a 'vaccine' for NotPetya.  He believes it’s time to look past the ‘patchability’ approach and implement a ‘vaccine’ like solution. 

In this episode Amot talks about embedded device security,  the vaccine approach, and introduces some of the key aspects of Sternum IoT's autonomous security and observability platform. 

Sternum IoT
https://www.sternumiot.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast.]]>
      </content:encoded>
      <pubDate>Mon, 09 Jan 2023 21:27:04 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/6229f209/065d47b8.mp3" length="42340252" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2647</itunes:duration>
      <itunes:summary>Amit Serper is the Director of Security Research at Sternum IoT and is the one who found a 'vaccine' for NotPetya.  He believes it’s time to look past the ‘patchability’ approach and implement a ‘vaccine’ like solution. 

In this episode Amot talks about embedded device security,  the vaccine approach, and introduces some of the key aspects of Sternum IoT's autonomous security and observability platform. 

Sternum IoT
https://www.sternumiot.com/

Thank you for listening to The Secure Talk Cybersecurity Podcast.</itunes:summary>
      <itunes:subtitle>Amit Serper is the Director of Security Research at Sternum IoT and is the one who found a 'vaccine' for NotPetya.  He believes it’s time to look past the ‘patchability’ approach and implement a ‘vaccine’ like solution. 

In this episode Amot talks about </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Chat-based Cybersecurity Education</title>
      <itunes:episode>119</itunes:episode>
      <podcast:episode>119</podcast:episode>
      <itunes:title>Chat-based Cybersecurity Education</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1415044195</guid>
      <link>https://share.transistor.fm/s/ee910276</link>
      <description>
        <![CDATA[Pascal Rosenberger is the Co-Founder and CEO of Eggheads.ai, a conversational microlearning and communication platform that allows businesses to unlock the simplicity and popularity of chat for trainings, internal communication and knowledge management.

Pascal talks about the importance of cyber security training, how to provide it in an engaging manner, and how best to measure the results.

Eggheads
https://eggheads.ai/

Live Interactive Example of Chat Based Instruction
(Hint: You will need to respond to the questions.)
https://eggheads.ai/chat/l9pw61xez1v


Thank you for listening to the Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Pascal Rosenberger is the Co-Founder and CEO of Eggheads.ai, a conversational microlearning and communication platform that allows businesses to unlock the simplicity and popularity of chat for trainings, internal communication and knowledge management.

Pascal talks about the importance of cyber security training, how to provide it in an engaging manner, and how best to measure the results.

Eggheads
https://eggheads.ai/

Live Interactive Example of Chat Based Instruction
(Hint: You will need to respond to the questions.)
https://eggheads.ai/chat/l9pw61xez1v


Thank you for listening to the Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 02 Jan 2023 23:16:01 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ee910276/8b543d18.mp3" length="40027672" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2502</itunes:duration>
      <itunes:summary>Pascal Rosenberger is the Co-Founder and CEO of Eggheads.ai, a conversational microlearning and communication platform that allows businesses to unlock the simplicity and popularity of chat for trainings, internal communication and knowledge management.

Pascal talks about the importance of cyber security training, how to provide it in an engaging manner, and how best to measure the results.

Eggheads
https://eggheads.ai/

Live Interactive Example of Chat Based Instruction
(Hint: You will need to respond to the questions.)
https://eggheads.ai/chat/l9pw61xez1v


Thank you for listening to the Secure Talk Cybersecurity Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Pascal Rosenberger is the Co-Founder and CEO of Eggheads.ai, a conversational microlearning and communication platform that allows businesses to unlock the simplicity and popularity of chat for trainings, internal communication and knowledge management.

</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Data Security Posture Management vs. Cloud Security Posture Management and more!</title>
      <itunes:episode>118</itunes:episode>
      <podcast:episode>118</podcast:episode>
      <itunes:title>Data Security Posture Management vs. Cloud Security Posture Management and more!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1406740966</guid>
      <link>https://share.transistor.fm/s/1567bbd6</link>
      <description>
        <![CDATA[Jonathan Roizin is the Co-Founder and CEO at Flow Security, a startup that is revolutionizing data security by providing a platform that helps businesses secure their cloud data wherever it flows.  Jonathan explains the difference between data security posture management (DSPM) and cloud security posture management (CSPM) and the important attributes of each.

Jonathan also talks about his experience in various cybersecurity related roles spanning 16 years including investigations, incidence response, and how visibility and automation are becoming increasingly important.

https://www.flowsecurity.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Jonathan Roizin is the Co-Founder and CEO at Flow Security, a startup that is revolutionizing data security by providing a platform that helps businesses secure their cloud data wherever it flows.  Jonathan explains the difference between data security posture management (DSPM) and cloud security posture management (CSPM) and the important attributes of each.

Jonathan also talks about his experience in various cybersecurity related roles spanning 16 years including investigations, incidence response, and how visibility and automation are becoming increasingly important.

https://www.flowsecurity.com/]]>
      </content:encoded>
      <pubDate>Tue, 20 Dec 2022 22:30:44 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/1567bbd6/a5019c6b.mp3" length="38082118" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2381</itunes:duration>
      <itunes:summary>Jonathan Roizin is the Co-Founder and CEO at Flow Security, a startup that is revolutionizing data security by providing a platform that helps businesses secure their cloud data wherever it flows.  Jonathan explains the difference between data security posture management (DSPM) and cloud security posture management (CSPM) and the important attributes of each.

Jonathan also talks about his experience in various cybersecurity related roles spanning 16 years including investigations, incidence response, and how visibility and automation are becoming increasingly important.

https://www.flowsecurity.com/</itunes:summary>
      <itunes:subtitle>Jonathan Roizin is the Co-Founder and CEO at Flow Security, a startup that is revolutionizing data security by providing a platform that helps businesses secure their cloud data wherever it flows.  Jonathan explains the difference between data security po</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Method for Managing Risk</title>
      <itunes:episode>117</itunes:episode>
      <podcast:episode>117</podcast:episode>
      <itunes:title>A Method for Managing Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1402277383</guid>
      <link>https://share.transistor.fm/s/eddaa447</link>
      <description>
        <![CDATA[Bryant Tow is the Chief Security Officer at Leapfrog, a provider of strategic IT business services.  Bryant explains how having a methodology for managing cyber risk is critical and talks about the most common types of risks in the current threat landscape.  He also makes some predictions about key changes in IT security space for 2023 including the rise of cyber insurance.

https://leapfrogservices.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Bryant Tow is the Chief Security Officer at Leapfrog, a provider of strategic IT business services.  Bryant explains how having a methodology for managing cyber risk is critical and talks about the most common types of risks in the current threat landscape.  He also makes some predictions about key changes in IT security space for 2023 including the rise of cyber insurance.

https://leapfrogservices.com/]]>
      </content:encoded>
      <pubDate>Wed, 14 Dec 2022 13:55:27 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/eddaa447/d4b1a401.mp3" length="41460846" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2592</itunes:duration>
      <itunes:summary>Bryant Tow is the Chief Security Officer at Leapfrog, a provider of strategic IT business services.  Bryant explains how having a methodology for managing cyber risk is critical and talks about the most common types of risks in the current threat landscape.  He also makes some predictions about key changes in IT security space for 2023 including the rise of cyber insurance.

https://leapfrogservices.com/</itunes:summary>
      <itunes:subtitle>Bryant Tow is the Chief Security Officer at Leapfrog, a provider of strategic IT business services.  Bryant explains how having a methodology for managing cyber risk is critical and talks about the most common types of risks in the current threat landscap</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Compliance Doesn't Equate to Security</title>
      <itunes:episode>116</itunes:episode>
      <podcast:episode>116</podcast:episode>
      <itunes:title>Why Compliance Doesn't Equate to Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1394350675</guid>
      <link>https://share.transistor.fm/s/0eb80f3f</link>
      <description>
        <![CDATA[Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference between compliance with an industry or regional regulatory agency related to privacy and data protection doesn't mean that a company's systems are secure.  He also introduces some best practices for monitoring and improving an organization's compliance and security posture.

https://www.logicgate.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference between compliance with an industry or regional regulatory agency related to privacy and data protection doesn't mean that a company's systems are secure.  He also introduces some best practices for monitoring and improving an organization's compliance and security posture.

https://www.logicgate.com/]]>
      </content:encoded>
      <pubDate>Tue, 06 Dec 2022 16:39:29 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0eb80f3f/d3b77669.mp3" length="49402085" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3088</itunes:duration>
      <itunes:summary>Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference between compliance with an industry or regional regulatory agency related to privacy and data protection doesn't mean that a company's systems are secure.  He also introduces some best practices for monitoring and improving an organization's compliance and security posture.

https://www.logicgate.com/</itunes:summary>
      <itunes:subtitle>Chris Patteson, Field Risk Officer at LogicGate, explains why compliance doesn't equate to security and why this is a common misconception in corporate boardrooms. Chris talks about the difference between compliance with an industry or regional regulatory</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Compliance and Cybersecurity Issues with Collaboration Platforms such as Zoom, Slack, &amp; Teams</title>
      <itunes:episode>115</itunes:episode>
      <podcast:episode>115</podcast:episode>
      <itunes:title>Compliance and Cybersecurity Issues with Collaboration Platforms such as Zoom, Slack, &amp; Teams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1393632439</guid>
      <link>https://share.transistor.fm/s/ffeef5cd</link>
      <description>
        <![CDATA[Garth Landers, Director of Global Product for Theta Lake, talks about some of the compliance and cybersecurity related issues associated with the use of collaboration platforms such as Zoom, Slack, Microsoft Teams, and WhatsApp.  

Garth also introduces some best practices for improving the security and compliance posture of these tools, and talks about some of the findings in the Theta Lake's recently released report that surveyed over 500 global compliance and security leaders on this topic.

https://thetalake.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Garth Landers, Director of Global Product for Theta Lake, talks about some of the compliance and cybersecurity related issues associated with the use of collaboration platforms such as Zoom, Slack, Microsoft Teams, and WhatsApp.  

Garth also introduces some best practices for improving the security and compliance posture of these tools, and talks about some of the findings in the Theta Lake's recently released report that surveyed over 500 global compliance and security leaders on this topic.

https://thetalake.com/]]>
      </content:encoded>
      <pubDate>Wed, 30 Nov 2022 21:07:39 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ffeef5cd/fe1235b4.mp3" length="42056087" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2629</itunes:duration>
      <itunes:summary>Garth Landers, Director of Global Product for Theta Lake, talks about some of the compliance and cybersecurity related issues associated with the use of collaboration platforms such as Zoom, Slack, Microsoft Teams, and WhatsApp.  

Garth also introduces some best practices for improving the security and compliance posture of these tools, and talks about some of the findings in the Theta Lake's recently released report that surveyed over 500 global compliance and security leaders on this topic.

https://thetalake.com/</itunes:summary>
      <itunes:subtitle>Garth Landers, Director of Global Product for Theta Lake, talks about some of the compliance and cybersecurity related issues associated with the use of collaboration platforms such as Zoom, Slack, Microsoft Teams, and WhatsApp.  

Garth also introduces s</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Critical Flaws in Legacy Cybersecurity Systems, with Dr. Danny Rittman</title>
      <itunes:episode>114</itunes:episode>
      <podcast:episode>114</podcast:episode>
      <itunes:title>Critical Flaws in Legacy Cybersecurity Systems, with Dr. Danny Rittman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1392999511</guid>
      <link>https://share.transistor.fm/s/73565a09</link>
      <description>
        <![CDATA[Dr. Danny Rittman, CTO at GBT Technologies, is an R&amp;D technology expert with who has years of experience researching and developing new forms of cybersecurity.  In this episode we discuss some critical flaws with traditional firewalls, intrusion &amp; detection systems (IDS), and encryption methods, and introduce some best practices for protecting networks and IoT devices.

GBT Technologies
https://gbtti.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Dr. Danny Rittman, CTO at GBT Technologies, is an R&amp;D technology expert with who has years of experience researching and developing new forms of cybersecurity.  In this episode we discuss some critical flaws with traditional firewalls, intrusion &amp; detection systems (IDS), and encryption methods, and introduce some best practices for protecting networks and IoT devices.

GBT Technologies
https://gbtti.com/]]>
      </content:encoded>
      <pubDate>Tue, 29 Nov 2022 22:23:55 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/73565a09/53cdebd3.mp3" length="42098696" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2632</itunes:duration>
      <itunes:summary>Dr. Danny Rittman, CTO at GBT Technologies, is an R&amp;amp;D technology expert with who has years of experience researching and developing new forms of cybersecurity.  In this episode we discuss some critical flaws with traditional firewalls, intrusion &amp;amp; detection systems (IDS), and encryption methods, and introduce some best practices for protecting networks and IoT devices.

GBT Technologies
https://gbtti.com/</itunes:summary>
      <itunes:subtitle>Dr. Danny Rittman, CTO at GBT Technologies, is an R&amp;amp;D technology expert with who has years of experience researching and developing new forms of cybersecurity.  In this episode we discuss some critical flaws with traditional firewalls, intrusion &amp;amp;</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>SMB Ransomware Trends, with Grayson Milbourne of OpenText Security Solutions</title>
      <itunes:episode>113</itunes:episode>
      <podcast:episode>113</podcast:episode>
      <itunes:title>SMB Ransomware Trends, with Grayson Milbourne of OpenText Security Solutions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1392272767</guid>
      <link>https://share.transistor.fm/s/bf131ff5</link>
      <description>
        <![CDATA[Grayson Milbourne is the Security Intelligence Director for OpenText Security Solutions. In this episode Grayson talks about the current threat landscape for small-medium businesses (SMBs) and individuals and shares some insights from the OpenText Security Solutions 2022 Global SMB Ransomeware Survey.

Grayson also explains how he monitors the threat landscape in order to ensure the efficacy of OpenText Security Solutions' products.]]>
      </description>
      <content:encoded>
        <![CDATA[Grayson Milbourne is the Security Intelligence Director for OpenText Security Solutions. In this episode Grayson talks about the current threat landscape for small-medium businesses (SMBs) and individuals and shares some insights from the OpenText Security Solutions 2022 Global SMB Ransomeware Survey.

Grayson also explains how he monitors the threat landscape in order to ensure the efficacy of OpenText Security Solutions' products.]]>
      </content:encoded>
      <pubDate>Mon, 28 Nov 2022 23:47:04 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/bf131ff5/3a683f99.mp3" length="45174881" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2824</itunes:duration>
      <itunes:summary>Grayson Milbourne is the Security Intelligence Director for OpenText Security Solutions. In this episode Grayson talks about the current threat landscape for small-medium businesses (SMBs) and individuals and shares some insights from the OpenText Security Solutions 2022 Global SMB Ransomeware Survey.

Grayson also explains how he monitors the threat landscape in order to ensure the efficacy of OpenText Security Solutions' products.</itunes:summary>
      <itunes:subtitle>Grayson Milbourne is the Security Intelligence Director for OpenText Security Solutions. In this episode Grayson talks about the current threat landscape for small-medium businesses (SMBs) and individuals and shares some insights from the OpenText Securit</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Threat Intelligence</title>
      <itunes:episode>112</itunes:episode>
      <podcast:episode>112</podcast:episode>
      <itunes:title>Cyber Threat Intelligence</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1384005439</guid>
      <link>https://share.transistor.fm/s/e48b7d42</link>
      <description>
        <![CDATA[Raveed Laeb, VP Product at KELA explains how he monitors and tracks trends with cyber criminals so that he can ensure that KELA's cyber threat intelligence capabilities evolve in a manner that enables it to provide maximum protection to its customers. Raveed also talks about cyber crime as a service on the dark web and vulnerability detection.

https://ke-la.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Raveed Laeb, VP Product at KELA explains how he monitors and tracks trends with cyber criminals so that he can ensure that KELA's cyber threat intelligence capabilities evolve in a manner that enables it to provide maximum protection to its customers. Raveed also talks about cyber crime as a service on the dark web and vulnerability detection.

https://ke-la.com/]]>
      </content:encoded>
      <pubDate>Thu, 17 Nov 2022 14:39:48 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e48b7d42/3bb52b0e.mp3" length="49085674" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3068</itunes:duration>
      <itunes:summary>Raveed Laeb, VP Product at KELA explains how he monitors and tracks trends with cyber criminals so that he can ensure that KELA's cyber threat intelligence capabilities evolve in a manner that enables it to provide maximum protection to its customers. Raveed also talks about cyber crime as a service on the dark web and vulnerability detection.

https://ke-la.com/</itunes:summary>
      <itunes:subtitle>Raveed Laeb, VP Product at KELA explains how he monitors and tracks trends with cyber criminals so that he can ensure that KELA's cyber threat intelligence capabilities evolve in a manner that enables it to provide maximum protection to its customers. Rav</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Replacing Legacy SIEMs, Jack Naglieri CEO at Panther Labs</title>
      <itunes:episode>111</itunes:episode>
      <podcast:episode>111</podcast:episode>
      <itunes:title>Replacing Legacy SIEMs, Jack Naglieri CEO at Panther Labs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1373656156</guid>
      <link>https://share.transistor.fm/s/c8004fb0</link>
      <description>
        <![CDATA[Jack Naglieri is the CEO and Founder of. Panther Labs.  Before starting Panther, Jack was a security engineer at Yahoo and Airbnb, where he learned first-hand how inefficient legacy SIEM platforms are at high-scale detection and response. He built Airbnb’s open-source platform called StreamAlert to solve this problem before leaving to start Panther.

In this episode Jack explains the issues of legacy SIEMs, the benefits of serverless architecture, and talks about leading Panther and the evolution of Panther's platform.

https://panther.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Jack Naglieri is the CEO and Founder of. Panther Labs.  Before starting Panther, Jack was a security engineer at Yahoo and Airbnb, where he learned first-hand how inefficient legacy SIEM platforms are at high-scale detection and response. He built Airbnb’s open-source platform called StreamAlert to solve this problem before leaving to start Panther.

In this episode Jack explains the issues of legacy SIEMs, the benefits of serverless architecture, and talks about leading Panther and the evolution of Panther's platform.

https://panther.com/]]>
      </content:encoded>
      <pubDate>Mon, 31 Oct 2022 16:51:59 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c8004fb0/e9ed6f3f.mp3" length="43223411" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2702</itunes:duration>
      <itunes:summary>Jack Naglieri is the CEO and Founder of. Panther Labs.  Before starting Panther, Jack was a security engineer at Yahoo and Airbnb, where he learned first-hand how inefficient legacy SIEM platforms are at high-scale detection and response. He built Airbnb’s open-source platform called StreamAlert to solve this problem before leaving to start Panther.

In this episode Jack explains the issues of legacy SIEMs, the benefits of serverless architecture, and talks about leading Panther and the evolution of Panther's platform.

https://panther.com/</itunes:summary>
      <itunes:subtitle>Jack Naglieri is the CEO and Founder of. Panther Labs.  Before starting Panther, Jack was a security engineer at Yahoo and Airbnb, where he learned first-hand how inefficient legacy SIEM platforms are at high-scale detection and response. He built Airbnb’</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Awareness Training with Javvad Malik at KnowBe4</title>
      <itunes:episode>110</itunes:episode>
      <podcast:episode>110</podcast:episode>
      <itunes:title>Security Awareness Training with Javvad Malik at KnowBe4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1370023285</guid>
      <link>https://share.transistor.fm/s/20664eda</link>
      <description>
        <![CDATA[Javvad Malik is the Lead Security Awareness Advocate at KnowBe4, a provider of security awareness training. Javvad talks about how to select a cyber security and security training partner and shares some best practices to deploying effective training programs.

KnowBe4
www.knowbe4.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Javvad Malik is the Lead Security Awareness Advocate at KnowBe4, a provider of security awareness training. Javvad talks about how to select a cyber security and security training partner and shares some best practices to deploying effective training programs.

KnowBe4
www.knowbe4.com/]]>
      </content:encoded>
      <pubDate>Thu, 27 Oct 2022 19:31:52 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/20664eda/feaee06b.mp3" length="42060229" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2629</itunes:duration>
      <itunes:summary>Javvad Malik is the Lead Security Awareness Advocate at KnowBe4, a provider of security awareness training. Javvad talks about how to select a cyber security and security training partner and shares some best practices to deploying effective training programs.

KnowBe4
www.knowbe4.com/</itunes:summary>
      <itunes:subtitle>Javvad Malik is the Lead Security Awareness Advocate at KnowBe4, a provider of security awareness training. Javvad talks about how to select a cyber security and security training partner and shares some best practices to deploying effective training prog</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity In and Out of the U.S. Military, with Stephen Semmelroth</title>
      <itunes:episode>109</itunes:episode>
      <podcast:episode>109</podcast:episode>
      <itunes:title>Cybersecurity In and Out of the U.S. Military, with Stephen Semmelroth</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1367807605</guid>
      <link>https://share.transistor.fm/s/5e338d70</link>
      <description>
        <![CDATA[Stephen Semmelroth is the Sr. Director of Security at Avant Communications. He's a graduate of West Point, and a former U.S. Army infantry officer who served in Afghanistan. Stephen also has experience leading cyber teams in the U.S. Army. 

After retiring from the Army Stephen founded and then sold a cyber recruiting company. He has led multiple cybersecurity practices and continues to lead clients through disaster and change at Avant Communications. 

In this episode of the Secure Talk Podcast, Stephen talks about cybersecurity in the military, how he transitioned from a platoon leader to a cyber security leader, and provides some great advice for members of the U.S. military that would like pursue a career in cybersecurity after separating from the military.

Avant Communications 
https://goavant.net/

Hiring Our Heroes
https://www.hiringourheroes.org/

DOD Skillbridge
https://skillbridge.osd.mil/]]>
      </description>
      <content:encoded>
        <![CDATA[Stephen Semmelroth is the Sr. Director of Security at Avant Communications. He's a graduate of West Point, and a former U.S. Army infantry officer who served in Afghanistan. Stephen also has experience leading cyber teams in the U.S. Army. 

After retiring from the Army Stephen founded and then sold a cyber recruiting company. He has led multiple cybersecurity practices and continues to lead clients through disaster and change at Avant Communications. 

In this episode of the Secure Talk Podcast, Stephen talks about cybersecurity in the military, how he transitioned from a platoon leader to a cyber security leader, and provides some great advice for members of the U.S. military that would like pursue a career in cybersecurity after separating from the military.

Avant Communications 
https://goavant.net/

Hiring Our Heroes
https://www.hiringourheroes.org/

DOD Skillbridge
https://skillbridge.osd.mil/]]>
      </content:encoded>
      <pubDate>Mon, 24 Oct 2022 20:36:32 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/5e338d70/9ae50f28.mp3" length="48299120" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3019</itunes:duration>
      <itunes:summary>Stephen Semmelroth is the Sr. Director of Security at Avant Communications. He's a graduate of West Point, and a former U.S. Army infantry officer who served in Afghanistan. Stephen also has experience leading cyber teams in the U.S. Army. 

After retiring from the Army Stephen founded and then sold a cyber recruiting company. He has led multiple cybersecurity practices and continues to lead clients through disaster and change at Avant Communications. 

In this episode of the Secure Talk Podcast, Stephen talks about cybersecurity in the military, how he transitioned from a platoon leader to a cyber security leader, and provides some great advice for members of the U.S. military that would like pursue a career in cybersecurity after separating from the military.

Avant Communications 
https://goavant.net/

Hiring Our Heroes
https://www.hiringourheroes.org/

DOD Skillbridge
https://skillbridge.osd.mil/</itunes:summary>
      <itunes:subtitle>Stephen Semmelroth is the Sr. Director of Security at Avant Communications. He's a graduate of West Point, and a former U.S. Army infantry officer who served in Afghanistan. Stephen also has experience leading cyber teams in the U.S. Army. 

After retirin</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Modern Security Best Practices with George Gerchow, Chief Security Officer at Sumo Logic</title>
      <itunes:episode>108</itunes:episode>
      <podcast:episode>108</podcast:episode>
      <itunes:title>Modern Security Best Practices with George Gerchow, Chief Security Officer at Sumo Logic</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1366141612</guid>
      <link>https://share.transistor.fm/s/a9661f23</link>
      <description>
        <![CDATA[As Sumo Logic’s Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines and years of practical experience in building agile security and compliance teams, and modern day Security Operation Centers.

In this episode of Secure Talk, George talks about the importance of physical security, strategies for securing hybrid IT operations, trends with DevSecOps, best practices for identifying security talent, how security certifications can be used as a sales asset, SIEMs, logs, and more.

www.sumologic.com]]>
      </description>
      <content:encoded>
        <![CDATA[As Sumo Logic’s Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines and years of practical experience in building agile security and compliance teams, and modern day Security Operation Centers.

In this episode of Secure Talk, George talks about the importance of physical security, strategies for securing hybrid IT operations, trends with DevSecOps, best practices for identifying security talent, how security certifications can be used as a sales asset, SIEMs, logs, and more.

www.sumologic.com]]>
      </content:encoded>
      <pubDate>Wed, 19 Oct 2022 16:19:26 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/a9661f23/1afac949.mp3" length="43865427" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2742</itunes:duration>
      <itunes:summary>As Sumo Logic’s Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines and years of practical experience in building agile security and compliance teams, and modern day Security Operation Centers.

In this episode of Secure Talk, George talks about the importance of physical security, strategies for securing hybrid IT operations, trends with DevSecOps, best practices for identifying security talent, how security certifications can be used as a sales asset, SIEMs, logs, and more.

www.sumologic.com</itunes:summary>
      <itunes:subtitle>As Sumo Logic’s Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computin</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Certifications as Sales Assets, with Justin Beals, CEO of Strike Graph</title>
      <itunes:episode>107</itunes:episode>
      <podcast:episode>107</podcast:episode>
      <itunes:title>Security Certifications as Sales Assets, with Justin Beals, CEO of Strike Graph</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1364893366</guid>
      <link>https://share.transistor.fm/s/9d4fd9ba</link>
      <description>
        <![CDATA[Justin Beals is the CEO and Co-Founder of Strike Graph, a platform that helps companies achieve security certifications that can be used as sales assets.

Strike Graph’s flexible platform helps customers create a scalable security and compliance program that builds trust at every stage of growth and helps organizations to become certified quickly and easily with SOC 2, ISO 27001, HIPAA, and PCI DSS compliance.

https://www.strikegraph.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Justin Beals is the CEO and Co-Founder of Strike Graph, a platform that helps companies achieve security certifications that can be used as sales assets.

Strike Graph’s flexible platform helps customers create a scalable security and compliance program that builds trust at every stage of growth and helps organizations to become certified quickly and easily with SOC 2, ISO 27001, HIPAA, and PCI DSS compliance.

https://www.strikegraph.com/]]>
      </content:encoded>
      <pubDate>Mon, 17 Oct 2022 21:01:47 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9d4fd9ba/ec6d26ae.mp3" length="45490443" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2844</itunes:duration>
      <itunes:summary>Justin Beals is the CEO and Co-Founder of Strike Graph, a platform that helps companies achieve security certifications that can be used as sales assets.

Strike Graph’s flexible platform helps customers create a scalable security and compliance program that builds trust at every stage of growth and helps organizations to become certified quickly and easily with SOC 2, ISO 27001, HIPAA, and PCI DSS compliance.

https://www.strikegraph.com/</itunes:summary>
      <itunes:subtitle>Justin Beals is the CEO and Co-Founder of Strike Graph, a platform that helps companies achieve security certifications that can be used as sales assets.

Strike Graph’s flexible platform helps customers create a scalable security and compliance program t</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Importance of a Comprehensive Network Asset Inventory with Huxley Barbee</title>
      <itunes:episode>106</itunes:episode>
      <podcast:episode>106</podcast:episode>
      <itunes:title>The Importance of a Comprehensive Network Asset Inventory with Huxley Barbee</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1362558379</guid>
      <link>https://share.transistor.fm/s/c2d68f2b</link>
      <description>
        <![CDATA[Huxley Barbee is the Security Evangelist at runZero.

Huxley explains the importance of running a comprehensive network asset inventory and compares various methods for doing so.  He also provides some great tips for new CISOs and for home cyber protection.

https://www.runzero.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Huxley Barbee is the Security Evangelist at runZero.

Huxley explains the importance of running a comprehensive network asset inventory and compares various methods for doing so.  He also provides some great tips for new CISOs and for home cyber protection.

https://www.runzero.com/]]>
      </content:encoded>
      <pubDate>Thu, 13 Oct 2022 23:27:40 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c2d68f2b/f8ed7bb0.mp3" length="40890799" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2556</itunes:duration>
      <itunes:summary>Huxley Barbee is the Security Evangelist at runZero.

Huxley explains the importance of running a comprehensive network asset inventory and compares various methods for doing so.  He also provides some great tips for new CISOs and for home cyber protection.

https://www.runzero.com/</itunes:summary>
      <itunes:subtitle>Huxley Barbee is the Security Evangelist at runZero.

Huxley explains the importance of running a comprehensive network asset inventory and compares various methods for doing so.  He also provides some great tips for new CISOs and for home cyber protectio</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Blockchain Bridges and More with Collin O'Brien of Rubic</title>
      <itunes:episode>105</itunes:episode>
      <podcast:episode>105</podcast:episode>
      <itunes:title>Blockchain Bridges and More with Collin O'Brien of Rubic</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1360402816</guid>
      <link>https://share.transistor.fm/s/20af3055</link>
      <description>
        <![CDATA[Collin O'Brien is the Marketing Manager at Rubic, a leading cross-chain swap service that allows users to swap assets between major blockchains in one click and with low gas fees. Collin talks about whether a single chain or a multi-cross-chain crypto technology will dominate in the future, and the current state of affairs with blockchains and crypto.

https://rubic.exchange/]]>
      </description>
      <content:encoded>
        <![CDATA[Collin O'Brien is the Marketing Manager at Rubic, a leading cross-chain swap service that allows users to swap assets between major blockchains in one click and with low gas fees. Collin talks about whether a single chain or a multi-cross-chain crypto technology will dominate in the future, and the current state of affairs with blockchains and crypto.

https://rubic.exchange/]]>
      </content:encoded>
      <pubDate>Mon, 10 Oct 2022 17:26:39 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/20af3055/d97d0cd4.mp3" length="44178446" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2762</itunes:duration>
      <itunes:summary>Collin O'Brien is the Marketing Manager at Rubic, a leading cross-chain swap service that allows users to swap assets between major blockchains in one click and with low gas fees. Collin talks about whether a single chain or a multi-cross-chain crypto technology will dominate in the future, and the current state of affairs with blockchains and crypto.

https://rubic.exchange/</itunes:summary>
      <itunes:subtitle>Collin O'Brien is the Marketing Manager at Rubic, a leading cross-chain swap service that allows users to swap assets between major blockchains in one click and with low gas fees. Collin talks about whether a single chain or a multi-cross-chain crypto tec</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>API Security with Karl Mattson CISO at Noname Security</title>
      <itunes:episode>104</itunes:episode>
      <podcast:episode>104</podcast:episode>
      <itunes:title>API Security with Karl Mattson CISO at Noname Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1356089614</guid>
      <link>https://share.transistor.fm/s/c0093ef0</link>
      <description>
        <![CDATA[Karl Mattson is the CISO at Noname Security, a graduate of the FBI CISO Academy, and a CISSP. Karl explains the importance of API security and how the design of the code, and the configuration and management of API all affect API security.

Noname Security
https://nonamesecurity.com/

Noname Security's 4-Hour API Workshop
https://nonamesecurity.com/workshop

Secure Talk Podcast
https://securetalkpodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Karl Mattson is the CISO at Noname Security, a graduate of the FBI CISO Academy, and a CISSP. Karl explains the importance of API security and how the design of the code, and the configuration and management of API all affect API security.

Noname Security
https://nonamesecurity.com/

Noname Security's 4-Hour API Workshop
https://nonamesecurity.com/workshop

Secure Talk Podcast
https://securetalkpodcast.com/]]>
      </content:encoded>
      <pubDate>Mon, 03 Oct 2022 22:44:10 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c0093ef0/744df3ab.mp3" length="41719591" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2608</itunes:duration>
      <itunes:summary>Karl Mattson is the CISO at Noname Security, a graduate of the FBI CISO Academy, and a CISSP. Karl explains the importance of API security and how the design of the code, and the configuration and management of API all affect API security.

Noname Security
https://nonamesecurity.com/

Noname Security's 4-Hour API Workshop
https://nonamesecurity.com/workshop

Secure Talk Podcast
https://securetalkpodcast.com/</itunes:summary>
      <itunes:subtitle>Karl Mattson is the CISO at Noname Security, a graduate of the FBI CISO Academy, and a CISSP. Karl explains the importance of API security and how the design of the code, and the configuration and management of API all affect API security.

Noname Securit</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Focused Hardware Destruction, with John Shegerian</title>
      <itunes:episode>103</itunes:episode>
      <podcast:episode>103</podcast:episode>
      <itunes:title>Cybersecurity Focused Hardware Destruction, with John Shegerian</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1338581608</guid>
      <link>https://share.transistor.fm/s/49f066e1</link>
      <description>
        <![CDATA[John Shegerian is the CEO and Co-Founder of ERI, a leading electronic waste recycler.  John is the author of The Insecurity of Everything and has been featured on CNBC, BBC, News, Time, Fortune, and several other leading media outlets. 

John explains the ins and outs of cybersecurity-focused hardware destruction and electronic waste recycling and shares best practices for device deposal for both businesses and consumers. He also talks about how companies insure that their private or personal data cannot be accessed after device disposal.

 As a special “thank you” to the Secure Talk Podcast listeners, John is offering a free copy of his book, The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World. In order to receive a free copy of John’s book, please follow this link and fill out the details of where you would like the book sent: https://eridirect.com/insecurity-of-everything-book/

ERI 
https://eridirect.com/]]>
      </description>
      <content:encoded>
        <![CDATA[John Shegerian is the CEO and Co-Founder of ERI, a leading electronic waste recycler.  John is the author of The Insecurity of Everything and has been featured on CNBC, BBC, News, Time, Fortune, and several other leading media outlets. 

John explains the ins and outs of cybersecurity-focused hardware destruction and electronic waste recycling and shares best practices for device deposal for both businesses and consumers. He also talks about how companies insure that their private or personal data cannot be accessed after device disposal.

 As a special “thank you” to the Secure Talk Podcast listeners, John is offering a free copy of his book, The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World. In order to receive a free copy of John’s book, please follow this link and fill out the details of where you would like the book sent: https://eridirect.com/insecurity-of-everything-book/

ERI 
https://eridirect.com/]]>
      </content:encoded>
      <pubDate>Thu, 08 Sep 2022 05:27:35 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/49f066e1/7fbc0ef9.mp3" length="38085444" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2381</itunes:duration>
      <itunes:summary>John Shegerian is the CEO and Co-Founder of ERI, a leading electronic waste recycler.  John is the author of The Insecurity of Everything and has been featured on CNBC, BBC, News, Time, Fortune, and several other leading media outlets. 

John explains the ins and outs of cybersecurity-focused hardware destruction and electronic waste recycling and shares best practices for device deposal for both businesses and consumers. He also talks about how companies insure that their private or personal data cannot be accessed after device disposal.

 As a special “thank you” to the Secure Talk Podcast listeners, John is offering a free copy of his book, The Insecurity of Everything: How Hardware Data Security is Becoming the Most Important Topic in the World. In order to receive a free copy of John’s book, please follow this link and fill out the details of where you would like the book sent: https://eridirect.com/insecurity-of-everything-book/

ERI 
https://eridirect.com/</itunes:summary>
      <itunes:subtitle>John Shegerian is the CEO and Co-Founder of ERI, a leading electronic waste recycler.  John is the author of The Insecurity of Everything and has been featured on CNBC, BBC, News, Time, Fortune, and several other leading media outlets. 

John explains the</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Creating a Security Oriented Culture, with Kai Roer</title>
      <itunes:episode>102</itunes:episode>
      <podcast:episode>102</podcast:episode>
      <itunes:title>Creating a Security Oriented Culture, with Kai Roer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1338542662</guid>
      <link>https://share.transistor.fm/s/38e34334</link>
      <description>
        <![CDATA[Kai Roer is the chief research officer for KnowBe4, a security awareness and simulated phishing platform. Kai helps organizations assess their current culture and to develop the desired end state for security and awareness.  He created the Security Culture Framework (SCF), is the author of Build a Security Culture and co-author of the The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer.

Kai talks about the role of security and culture assessments, simulated phishing campaigns, how to spot phishing emails, and best practices for security awareness training.

https://www.knowbe4.com/
https://www.securityculturebook.com/

Secure Talk Podcast
www.securetalkpodcast.com
https://securetalkpodcast.com/creating-a-security-oriented-culture-with-kai-roer/]]>
      </description>
      <content:encoded>
        <![CDATA[Kai Roer is the chief research officer for KnowBe4, a security awareness and simulated phishing platform. Kai helps organizations assess their current culture and to develop the desired end state for security and awareness.  He created the Security Culture Framework (SCF), is the author of Build a Security Culture and co-author of the The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer.

Kai talks about the role of security and culture assessments, simulated phishing campaigns, how to spot phishing emails, and best practices for security awareness training.

https://www.knowbe4.com/
https://www.securityculturebook.com/

Secure Talk Podcast
www.securetalkpodcast.com
https://securetalkpodcast.com/creating-a-security-oriented-culture-with-kai-roer/]]>
      </content:encoded>
      <pubDate>Tue, 06 Sep 2022 07:04:58 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/38e34334/3568dccc.mp3" length="42638262" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2665</itunes:duration>
      <itunes:summary>Kai Roer is the chief research officer for KnowBe4, a security awareness and simulated phishing platform. Kai helps organizations assess their current culture and to develop the desired end state for security and awareness.  He created the Security Culture Framework (SCF), is the author of Build a Security Culture and co-author of the The Security Culture Playbook: An Executive Guide to Reducing Risk and Developing Your Human Defense Layer.

Kai talks about the role of security and culture assessments, simulated phishing campaigns, how to spot phishing emails, and best practices for security awareness training.

https://www.knowbe4.com/
https://www.securityculturebook.com/

Secure Talk Podcast
www.securetalkpodcast.com
https://securetalkpodcast.com/creating-a-security-oriented-culture-with-kai-roer/</itunes:summary>
      <itunes:subtitle>Kai Roer is the chief research officer for KnowBe4, a security awareness and simulated phishing platform. Kai helps organizations assess their current culture and to develop the desired end state for security and awareness.  He created the Security Cultur</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cloud Security Governance with Fausto Lendeborg, CEO of Secberus</title>
      <itunes:episode>101</itunes:episode>
      <podcast:episode>101</podcast:episode>
      <itunes:title>Cloud Security Governance with Fausto Lendeborg, CEO of Secberus</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1331149042</guid>
      <link>https://share.transistor.fm/s/47d4c960</link>
      <description>
        <![CDATA[Fausto Lendeborg, Co-Founder &amp; CEO of Secberus, explains cloud security governance and how Secberus secures cloud infrastructure and helps prevent cloud risk. He also introduces concepts such as the shared responsibility model, and Policy as Code, and explains the importance of scaling across multi-cloud environments, and time to remediation.

Fausto talks about the amazing ecosystem for startups in Miami, his early interest in computers and hacking, how he got started in network security, how he landed his first job at a cyber security startup, and why he founded Secberus.

www.secberus.com]]>
      </description>
      <content:encoded>
        <![CDATA[Fausto Lendeborg, Co-Founder &amp; CEO of Secberus, explains cloud security governance and how Secberus secures cloud infrastructure and helps prevent cloud risk. He also introduces concepts such as the shared responsibility model, and Policy as Code, and explains the importance of scaling across multi-cloud environments, and time to remediation.

Fausto talks about the amazing ecosystem for startups in Miami, his early interest in computers and hacking, how he got started in network security, how he landed his first job at a cyber security startup, and why he founded Secberus.

www.secberus.com]]>
      </content:encoded>
      <pubDate>Fri, 26 Aug 2022 17:34:15 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/47d4c960/65f5ddea.mp3" length="38521795" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2408</itunes:duration>
      <itunes:summary>Fausto Lendeborg, Co-Founder &amp;amp; CEO of Secberus, explains cloud security governance and how Secberus secures cloud infrastructure and helps prevent cloud risk. He also introduces concepts such as the shared responsibility model, and Policy as Code, and explains the importance of scaling across multi-cloud environments, and time to remediation.

Fausto talks about the amazing ecosystem for startups in Miami, his early interest in computers and hacking, how he got started in network security, how he landed his first job at a cyber security startup, and why he founded Secberus.

www.secberus.com</itunes:summary>
      <itunes:subtitle>Fausto Lendeborg, Co-Founder &amp;amp; CEO of Secberus, explains cloud security governance and how Secberus secures cloud infrastructure and helps prevent cloud risk. He also introduces concepts such as the shared responsibility model, and Policy as Code, and</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Choose a VPN and more with Yegor Sak, Founder of Windscribe</title>
      <itunes:episode>100</itunes:episode>
      <podcast:episode>100</podcast:episode>
      <itunes:title>How to Choose a VPN and more with Yegor Sak, Founder of Windscribe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1330697095</guid>
      <link>https://share.transistor.fm/s/2ac86208</link>
      <description>
        <![CDATA[Born in Belarus, raised in Canada, Yegor Sak is a serial entrepreneur who has smashed ipods and PS3s for pay, built a porn site, learned how to fly, and launched Windscribe, a VPN provider with over seven million active users, as well as ControlD, a customizable DNS service that allows subscribers to block malware, ads, and IoT telemetry. 

Yegor and I talk about his background, lessons learned from life and launching several businesses, rebounding from failures and more. Yegor also explains the ins and outs of the various VPN providers and how to choose a reliable provider and use a VPN in a secure manner.

https://windscribe.com/

https://blog.windscribe.com/

https://controld.com/

Secure Talk Podcast
https://securetalkpodcast.com/how-to-choose-a-vpn-and-more-with-yegor-sak-founder-of-windscribe/]]>
      </description>
      <content:encoded>
        <![CDATA[Born in Belarus, raised in Canada, Yegor Sak is a serial entrepreneur who has smashed ipods and PS3s for pay, built a porn site, learned how to fly, and launched Windscribe, a VPN provider with over seven million active users, as well as ControlD, a customizable DNS service that allows subscribers to block malware, ads, and IoT telemetry. 

Yegor and I talk about his background, lessons learned from life and launching several businesses, rebounding from failures and more. Yegor also explains the ins and outs of the various VPN providers and how to choose a reliable provider and use a VPN in a secure manner.

https://windscribe.com/

https://blog.windscribe.com/

https://controld.com/

Secure Talk Podcast
https://securetalkpodcast.com/how-to-choose-a-vpn-and-more-with-yegor-sak-founder-of-windscribe/]]>
      </content:encoded>
      <pubDate>Thu, 25 Aug 2022 00:10:48 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/2ac86208/60ce15ed.mp3" length="49850998" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3116</itunes:duration>
      <itunes:summary>Born in Belarus, raised in Canada, Yegor Sak is a serial entrepreneur who has smashed ipods and PS3s for pay, built a porn site, learned how to fly, and launched Windscribe, a VPN provider with over seven million active users, as well as ControlD, a customizable DNS service that allows subscribers to block malware, ads, and IoT telemetry. 

Yegor and I talk about his background, lessons learned from life and launching several businesses, rebounding from failures and more. Yegor also explains the ins and outs of the various VPN providers and how to choose a reliable provider and use a VPN in a secure manner.

https://windscribe.com/

https://blog.windscribe.com/

https://controld.com/

Secure Talk Podcast
https://securetalkpodcast.com/how-to-choose-a-vpn-and-more-with-yegor-sak-founder-of-windscribe/</itunes:summary>
      <itunes:subtitle>Born in Belarus, raised in Canada, Yegor Sak is a serial entrepreneur who has smashed ipods and PS3s for pay, built a porn site, learned how to fly, and launched Windscribe, a VPN provider with over seven million active users, as well as ControlD, a custo</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>CSIRTs, ASM 2.0, and more with Dave Monnier from Team Cymru</title>
      <itunes:episode>99</itunes:episode>
      <podcast:episode>99</podcast:episode>
      <itunes:title>CSIRTs, ASM 2.0, and more with Dave Monnier from Team Cymru</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1326765121</guid>
      <link>https://share.transistor.fm/s/9fdafe50</link>
      <description>
        <![CDATA[Dave Monnier, Chief Evangelist at Team Cymru talks about CSIRTs, Attack Surface Management (ASM), and explains how Team Cymru helps organizations to respond more quickly and effectively to cyber threats.

https://team-cymru.com/

www.securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Dave Monnier, Chief Evangelist at Team Cymru talks about CSIRTs, Attack Surface Management (ASM), and explains how Team Cymru helps organizations to respond more quickly and effectively to cyber threats.

https://team-cymru.com/

www.securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Fri, 19 Aug 2022 20:09:13 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9fdafe50/e6570b09.mp3" length="35440594" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2215</itunes:duration>
      <itunes:summary>Dave Monnier, Chief Evangelist at Team Cymru talks about CSIRTs, Attack Surface Management (ASM), and explains how Team Cymru helps organizations to respond more quickly and effectively to cyber threats.

https://team-cymru.com/

www.securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Dave Monnier, Chief Evangelist at Team Cymru talks about CSIRTs, Attack Surface Management (ASM), and explains how Team Cymru helps organizations to respond more quickly and effectively to cyber threats.

https://team-cymru.com/

www.securetalkpodcast.com</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Risks with Open Source Software, with Steve Wilson, CPO at Contrast Security</title>
      <itunes:episode>98</itunes:episode>
      <podcast:episode>98</podcast:episode>
      <itunes:title>Security Risks with Open Source Software, with Steve Wilson, CPO at Contrast Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1321748932</guid>
      <link>https://share.transistor.fm/s/e6198f86</link>
      <description>
        <![CDATA[Steve Wilson, Chief Product Officer at Contrast Security explains how the use of open source software can introduce security issues related to newly discovered vulnerabilities and how companies can identify and mitigate those issues by using software composition analysis (SCA) and runtime application self-protection (RASP) tools.

https://www.contrastsecurity.com/
https://www.contrastsecurity.com/developer

Secure Talk Podcast 
https://securetalkpodcast.com/security-risks-with-open-source-software-steve-wilson-chief-product-officer-at-contrast-security/]]>
      </description>
      <content:encoded>
        <![CDATA[Steve Wilson, Chief Product Officer at Contrast Security explains how the use of open source software can introduce security issues related to newly discovered vulnerabilities and how companies can identify and mitigate those issues by using software composition analysis (SCA) and runtime application self-protection (RASP) tools.

https://www.contrastsecurity.com/
https://www.contrastsecurity.com/developer

Secure Talk Podcast 
https://securetalkpodcast.com/security-risks-with-open-source-software-steve-wilson-chief-product-officer-at-contrast-security/]]>
      </content:encoded>
      <pubDate>Wed, 10 Aug 2022 20:38:47 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e6198f86/40f78261.mp3" length="40794677" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2550</itunes:duration>
      <itunes:summary>Steve Wilson, Chief Product Officer at Contrast Security explains how the use of open source software can introduce security issues related to newly discovered vulnerabilities and how companies can identify and mitigate those issues by using software composition analysis (SCA) and runtime application self-protection (RASP) tools.

https://www.contrastsecurity.com/
https://www.contrastsecurity.com/developer

Secure Talk Podcast 
https://securetalkpodcast.com/security-risks-with-open-source-software-steve-wilson-chief-product-officer-at-contrast-security/</itunes:summary>
      <itunes:subtitle>Steve Wilson, Chief Product Officer at Contrast Security explains how the use of open source software can introduce security issues related to newly discovered vulnerabilities and how companies can identify and mitigate those issues by using software comp</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Remediate Cloud Security Risks with Nick Lumsden, CTO and Co-Founder at Tenacity Cloud</title>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:title>How to Remediate Cloud Security Risks with Nick Lumsden, CTO and Co-Founder at Tenacity Cloud</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1313794216</guid>
      <link>https://share.transistor.fm/s/c1783b60</link>
      <description>
        <![CDATA[Nick Lumsden, CTO and Co-Founder at Tenacity Cloud, explains how sprawl in cloud infrastructure can lead to security vulnerabilities.  He also discusses way to prioritize addressing known vulnerabilities, and how best to track whether your cloud infrastructure is being managed in a secure and efficient manner.

https://www.tenacitycloud.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Nick Lumsden, CTO and Co-Founder at Tenacity Cloud, explains how sprawl in cloud infrastructure can lead to security vulnerabilities.  He also discusses way to prioritize addressing known vulnerabilities, and how best to track whether your cloud infrastructure is being managed in a secure and efficient manner.

https://www.tenacitycloud.com/]]>
      </content:encoded>
      <pubDate>Fri, 29 Jul 2022 15:45:10 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c1783b60/7fb38054.mp3" length="28879504" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1805</itunes:duration>
      <itunes:summary>Nick Lumsden, CTO and Co-Founder at Tenacity Cloud, explains how sprawl in cloud infrastructure can lead to security vulnerabilities.  He also discusses way to prioritize addressing known vulnerabilities, and how best to track whether your cloud infrastructure is being managed in a secure and efficient manner.

https://www.tenacitycloud.com/</itunes:summary>
      <itunes:subtitle>Nick Lumsden, CTO and Co-Founder at Tenacity Cloud, explains how sprawl in cloud infrastructure can lead to security vulnerabilities.  He also discusses way to prioritize addressing known vulnerabilities, and how best to track whether your cloud infrastru</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Secrets Management Best Practices with Moshe Zioni, VP of Security at Apiiro</title>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:title>Secrets Management Best Practices with Moshe Zioni, VP of Security at Apiiro</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1307955991</guid>
      <link>https://share.transistor.fm/s/5f4951ff</link>
      <description>
        <![CDATA[Moshe Zioni, VP of Security Research at Apiiro, a leader in Cloud-Native Application Security, discusses Apiiro's recently released research on the topic of secrets management in private repositories.  He also explains how secrets are exposed, how to protect secrets when posting code snippets to public and private repositories, the importance of education, how developers and application security  professionals can scale and have greater visibility of code commits.

Moshe also explains how Apiiro can help improve both operational efficiency and security of enterprises.

https://apiiro.com/
https://apiiro.com/secrets-insights-2022/

Secure Talk Podcast
shorturl.at/BJKL2]]>
      </description>
      <content:encoded>
        <![CDATA[Moshe Zioni, VP of Security Research at Apiiro, a leader in Cloud-Native Application Security, discusses Apiiro's recently released research on the topic of secrets management in private repositories.  He also explains how secrets are exposed, how to protect secrets when posting code snippets to public and private repositories, the importance of education, how developers and application security  professionals can scale and have greater visibility of code commits.

Moshe also explains how Apiiro can help improve both operational efficiency and security of enterprises.

https://apiiro.com/
https://apiiro.com/secrets-insights-2022/

Secure Talk Podcast
shorturl.at/BJKL2]]>
      </content:encoded>
      <pubDate>Thu, 21 Jul 2022 18:08:20 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/5f4951ff/9b154d3a.mp3" length="39430031" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2465</itunes:duration>
      <itunes:summary>Moshe Zioni, VP of Security Research at Apiiro, a leader in Cloud-Native Application Security, discusses Apiiro's recently released research on the topic of secrets management in private repositories.  He also explains how secrets are exposed, how to protect secrets when posting code snippets to public and private repositories, the importance of education, how developers and application security  professionals can scale and have greater visibility of code commits.

Moshe also explains how Apiiro can help improve both operational efficiency and security of enterprises.

https://apiiro.com/
https://apiiro.com/secrets-insights-2022/

Secure Talk Podcast
shorturl.at/BJKL2</itunes:summary>
      <itunes:subtitle>Moshe Zioni, VP of Security Research at Apiiro, a leader in Cloud-Native Application Security, discusses Apiiro's recently released research on the topic of secrets management in private repositories.  He also explains how secrets are exposed, how to prot</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Protecting Personal Data, Podcasting, and More with Adam Levin Co-Host of the What the Hack Podcast</title>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:title>Protecting Personal Data, Podcasting, and More with Adam Levin Co-Host of the What the Hack Podcast</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1306980439</guid>
      <link>https://share.transistor.fm/s/306331fb</link>
      <description>
        <![CDATA[Adam Levin, Co-Founder and Co-Host of the What the Hack podcast talks about his experience in privacy, data protection, and explains why he started What the Hack.  He also shares some stories about his guests and also gives advice on how to protect your personal information.

What the Hack Podcast
https://podcasts.apple.com/us/podcast/id1571482669

Secure Talk Podcast
https://securetalkpodcast.com/protecting-personal-data-podcasting-privacy-and-more-with-adam-levin/]]>
      </description>
      <content:encoded>
        <![CDATA[Adam Levin, Co-Founder and Co-Host of the What the Hack podcast talks about his experience in privacy, data protection, and explains why he started What the Hack.  He also shares some stories about his guests and also gives advice on how to protect your personal information.

What the Hack Podcast
https://podcasts.apple.com/us/podcast/id1571482669

Secure Talk Podcast
https://securetalkpodcast.com/protecting-personal-data-podcasting-privacy-and-more-with-adam-levin/]]>
      </content:encoded>
      <pubDate>Mon, 18 Jul 2022 15:21:33 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/306331fb/1fcb6cf0.mp3" length="50602103" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3163</itunes:duration>
      <itunes:summary>Adam Levin, Co-Founder and Co-Host of the What the Hack podcast talks about his experience in privacy, data protection, and explains why he started What the Hack.  He also shares some stories about his guests and also gives advice on how to protect your personal information.

What the Hack Podcast
https://podcasts.apple.com/us/podcast/id1571482669

Secure Talk Podcast
https://securetalkpodcast.com/protecting-personal-data-podcasting-privacy-and-more-with-adam-levin/</itunes:summary>
      <itunes:subtitle>Adam Levin, Co-Founder and Co-Host of the What the Hack podcast talks about his experience in privacy, data protection, and explains why he started What the Hack.  He also shares some stories about his guests and also gives advice on how to protect your p</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Prevent Data Leaks Using a No-Code Platform with Yasir Ali, CEO of Polymer</title>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:title>How to Prevent Data Leaks Using a No-Code Platform with Yasir Ali, CEO of Polymer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1305849433</guid>
      <link>https://share.transistor.fm/s/799d9172</link>
      <description>
        <![CDATA[Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization's operations.
  
Yasir explains the benefits of a no-code platform and details how such platforms can help prevent data leaks.

Polymer
www.polymerhq.io/

Secure Talk Podcast
https://securetalkpodcast.com/data-leak-prevention-with-yasir-ali-ceo-of-polymer/]]>
      </description>
      <content:encoded>
        <![CDATA[Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization's operations.
  
Yasir explains the benefits of a no-code platform and details how such platforms can help prevent data leaks.

Polymer
www.polymerhq.io/

Secure Talk Podcast
https://securetalkpodcast.com/data-leak-prevention-with-yasir-ali-ceo-of-polymer/]]>
      </content:encoded>
      <pubDate>Fri, 15 Jul 2022 17:29:40 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/799d9172/ec21ef98.mp3" length="34019554" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2127</itunes:duration>
      <itunes:summary>Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization's operations.
  
Yasir explains the benefits of a no-code platform and details how such platforms can help prevent data leaks.

Polymer
www.polymerhq.io/

Secure Talk Podcast
https://securetalkpodcast.com/data-leak-prevention-with-yasir-ali-ceo-of-polymer/</itunes:summary>
      <itunes:subtitle>Yasir Ali is the Co-Founder and CEO of Polymer, a no-code platform that prevents sensitive data leaks across SaaS apps such as Google Drive, Slack, Microsoft Teams, and Zoom without slowing down an organization's operations.
  
Yasir explains the benefits</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Best Practices with Adrianus Warmenhoven, Defensive Strategist at Nord Security</title>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:title>Cybersecurity Best Practices with Adrianus Warmenhoven, Defensive Strategist at Nord Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1300758088</guid>
      <link>https://share.transistor.fm/s/9733a614</link>
      <description>
        <![CDATA[Adrianus Warmenhoven, Defensive Strategist at Nord Security shares his thoughts related to best practices for enterprise security, data protection, and how individuals can reduce cyber risk. Adrianus also gives some recommendations related to learning about the latest trends in cybersecurity and some books on cybersecurity.

https://nordsecurity.com/

https://securetalkpodcast.com/cybersecurity-best-practices-with-adrianus-warmenhoven-defensive-strategist-at-nord-security/]]>
      </description>
      <content:encoded>
        <![CDATA[Adrianus Warmenhoven, Defensive Strategist at Nord Security shares his thoughts related to best practices for enterprise security, data protection, and how individuals can reduce cyber risk. Adrianus also gives some recommendations related to learning about the latest trends in cybersecurity and some books on cybersecurity.

https://nordsecurity.com/

https://securetalkpodcast.com/cybersecurity-best-practices-with-adrianus-warmenhoven-defensive-strategist-at-nord-security/]]>
      </content:encoded>
      <pubDate>Wed, 06 Jul 2022 20:27:57 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9733a614/1fba7f21.mp3" length="36497646" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2281</itunes:duration>
      <itunes:summary>Adrianus Warmenhoven, Defensive Strategist at Nord Security shares his thoughts related to best practices for enterprise security, data protection, and how individuals can reduce cyber risk. Adrianus also gives some recommendations related to learning about the latest trends in cybersecurity and some books on cybersecurity.

https://nordsecurity.com/

https://securetalkpodcast.com/cybersecurity-best-practices-with-adrianus-warmenhoven-defensive-strategist-at-nord-security/</itunes:summary>
      <itunes:subtitle>Adrianus Warmenhoven, Defensive Strategist at Nord Security shares his thoughts related to best practices for enterprise security, data protection, and how individuals can reduce cyber risk. Adrianus also gives some recommendations related to learning abo</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>CISO Best Practices and MDM Tips with Chaim Mazal, CISO at Kandji</title>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:title>CISO Best Practices and MDM Tips with Chaim Mazal, CISO at Kandji</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1289493403</guid>
      <link>https://share.transistor.fm/s/e9cb5e4c</link>
      <description>
        <![CDATA[Chaim Mazal, SVP of Technology &amp; CISO at Kandji, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions.

www.kandji.io

www.securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Chaim Mazal, SVP of Technology &amp; CISO at Kandji, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions.

www.kandji.io

www.securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Fri, 17 Jun 2022 17:59:18 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e9cb5e4c/4a385d00.mp3" length="32921560" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2058</itunes:duration>
      <itunes:summary>Chaim Mazal, SVP of Technology &amp;amp; CISO at Kandji, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM) solutions.

www.kandji.io

www.securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Chaim Mazal, SVP of Technology &amp;amp; CISO at Kandji, talks about the role of Chief Information Security Officer (CISO), the differences between company and product security, various cybersecurity threat vectors, and trends in mobile device management (MDM</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Nation State Cybercrime with Investigative Journalist &amp; Author Geoff White</title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>Nation State Cybercrime with Investigative Journalist &amp; Author Geoff White</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1283650483</guid>
      <link>https://share.transistor.fm/s/97d31263</link>
      <description>
        <![CDATA[Geoff White, a well-known investigative journalist and author has just published his latest book, The Lazarus Heist, From Hollywood to High Finance Inside North Korea’s Global Cyber Warfare.

Geoff talks about how he does research for his books and how he finds information sources who are willing to talk.  He also walks us the through the evolution of hacking from hobbyists to nation state actors and explains how the fall of the Berlin Wall accelerated the development of professional hacker groups that focused on monetary gain.

Geoff also provides an introduction to North Korea’s Lazarus Group and explains how they are organized and how their main mission is to find ways to make money via cybercrime.  Geoff also touches on how crypto currency is being used by both cybercriminals and police organizations, cyber surveillance by western countries, and also gives some great book recommendations and tips for improving one’s cybersecurity posture.

Lazarus Heist Podcast
https://www.bbc.co.uk/programmes/w13xtvg9/episodes/downloads

Lazarus Heist Book
https://www.amazon.com/Lazarus-Heist-Hollywood-Finance-Inside/dp/024155425X

Geoff White's homepage
https://geoffwhite.tech/

Secure Talk Podcast
www.securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Geoff White, a well-known investigative journalist and author has just published his latest book, The Lazarus Heist, From Hollywood to High Finance Inside North Korea’s Global Cyber Warfare.

Geoff talks about how he does research for his books and how he finds information sources who are willing to talk.  He also walks us the through the evolution of hacking from hobbyists to nation state actors and explains how the fall of the Berlin Wall accelerated the development of professional hacker groups that focused on monetary gain.

Geoff also provides an introduction to North Korea’s Lazarus Group and explains how they are organized and how their main mission is to find ways to make money via cybercrime.  Geoff also touches on how crypto currency is being used by both cybercriminals and police organizations, cyber surveillance by western countries, and also gives some great book recommendations and tips for improving one’s cybersecurity posture.

Lazarus Heist Podcast
https://www.bbc.co.uk/programmes/w13xtvg9/episodes/downloads

Lazarus Heist Book
https://www.amazon.com/Lazarus-Heist-Hollywood-Finance-Inside/dp/024155425X

Geoff White's homepage
https://geoffwhite.tech/

Secure Talk Podcast
www.securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Wed, 08 Jun 2022 17:19:03 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/97d31263/e205ba31.mp3" length="44871858" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2805</itunes:duration>
      <itunes:summary>Geoff White, a well-known investigative journalist and author has just published his latest book, The Lazarus Heist, From Hollywood to High Finance Inside North Korea’s Global Cyber Warfare.

Geoff talks about how he does research for his books and how he finds information sources who are willing to talk.  He also walks us the through the evolution of hacking from hobbyists to nation state actors and explains how the fall of the Berlin Wall accelerated the development of professional hacker groups that focused on monetary gain.

Geoff also provides an introduction to North Korea’s Lazarus Group and explains how they are organized and how their main mission is to find ways to make money via cybercrime.  Geoff also touches on how crypto currency is being used by both cybercriminals and police organizations, cyber surveillance by western countries, and also gives some great book recommendations and tips for improving one’s cybersecurity posture.

Lazarus Heist Podcast
https://www.bbc.co.uk/programmes/w13xtvg9/episodes/downloads

Lazarus Heist Book
https://www.amazon.com/Lazarus-Heist-Hollywood-Finance-Inside/dp/024155425X

Geoff White's homepage
https://geoffwhite.tech/

Secure Talk Podcast
www.securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Geoff White, a well-known investigative journalist and author has just published his latest book, The Lazarus Heist, From Hollywood to High Finance Inside North Korea’s Global Cyber Warfare.

Geoff talks about how he does research for his books and how he</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Automated Crypto Trading Tools with Gabriele Musella, Co-Founder &amp; CEO at Coinrule</title>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>Automated Crypto Trading Tools with Gabriele Musella, Co-Founder &amp; CEO at Coinrule</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1278252970</guid>
      <link>https://share.transistor.fm/s/ae42087d</link>
      <description>
        <![CDATA[Gabriele Musella, Co-Founder &amp; CEO at Coinrule talks about the current state of crypto and explains how Coinrule helps retail investors compete with professional traders and hedge funds by providing a platform for automated trading. 

Gabriele also shares his recommendations for business reading, insights on running a startup, and more!

https://coinrule.com/

Book Recommendations
Traction; How any startup can achieve explosive growth
Notes on Startups, or How to Build the Future

Secure Talk Podcast
securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Gabriele Musella, Co-Founder &amp; CEO at Coinrule talks about the current state of crypto and explains how Coinrule helps retail investors compete with professional traders and hedge funds by providing a platform for automated trading. 

Gabriele also shares his recommendations for business reading, insights on running a startup, and more!

https://coinrule.com/

Book Recommendations
Traction; How any startup can achieve explosive growth
Notes on Startups, or How to Build the Future

Secure Talk Podcast
securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Tue, 31 May 2022 18:47:59 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ae42087d/74041731.mp3" length="31652653" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1979</itunes:duration>
      <itunes:summary>Gabriele Musella, Co-Founder &amp;amp; CEO at Coinrule talks about the current state of crypto and explains how Coinrule helps retail investors compete with professional traders and hedge funds by providing a platform for automated trading. 

Gabriele also shares his recommendations for business reading, insights on running a startup, and more!

https://coinrule.com/

Book Recommendations
Traction; How any startup can achieve explosive growth
Notes on Startups, or How to Build the Future

Secure Talk Podcast
securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Gabriele Musella, Co-Founder &amp;amp; CEO at Coinrule talks about the current state of crypto and explains how Coinrule helps retail investors compete with professional traders and hedge funds by providing a platform for automated trading. 

Gabriele also sh</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Preventing Phygital Attacks with Will Plummer, CSO at RaySecur</title>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>Preventing Phygital Attacks with Will Plummer, CSO at RaySecur</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1269416884</guid>
      <link>https://share.transistor.fm/s/0fcb42f7</link>
      <description>
        <![CDATA[Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks.

https://raysecur.com/
https://raysecur.com/mail-security-report-2021/
https://raysecur.com/case-study/presidential-candidate/

www.securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks.

https://raysecur.com/
https://raysecur.com/mail-security-report-2021/
https://raysecur.com/case-study/presidential-candidate/

www.securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Mon, 16 May 2022 15:35:36 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0fcb42f7/0a42aa66.mp3" length="32025452" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2002</itunes:duration>
      <itunes:summary>Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks.

https://raysecur.com/
https://raysecur.com/mail-security-report-2021/
https://raysecur.com/case-study/presidential-candidate/

www.securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Will Plummer, Chief Security Officer at RaySecur talks about best practices for mail screening and the prevention of phygital attacks.

https://raysecur.com/
https://raysecur.com/mail-security-report-2021/
https://raysecur.com/case-study/presidential-cand</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Identity &amp; Access Management, Digital IDs &amp; More with Sushil Madhukar of TechDemocracy</title>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>Identity &amp; Access Management, Digital IDs &amp; More with Sushil Madhukar of TechDemocracy</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1267756198</guid>
      <link>https://share.transistor.fm/s/41fe5830</link>
      <description>
        <![CDATA[Sushil Madhukar, Chief Principal for Customer Success at TechDemocracy talks about the evolution of digital IDs, identity &amp; access management, security as a service, and best practices for prioritizing investments in cybersecurity.

www.techdemocracy.com
www.securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Sushil Madhukar, Chief Principal for Customer Success at TechDemocracy talks about the evolution of digital IDs, identity &amp; access management, security as a service, and best practices for prioritizing investments in cybersecurity.

www.techdemocracy.com
www.securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Fri, 13 May 2022 16:57:55 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/41fe5830/674c508b.mp3" length="36745907" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2297</itunes:duration>
      <itunes:summary>Sushil Madhukar, Chief Principal for Customer Success at TechDemocracy talks about the evolution of digital IDs, identity &amp;amp; access management, security as a service, and best practices for prioritizing investments in cybersecurity.

www.techdemocracy.com
www.securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Sushil Madhukar, Chief Principal for Customer Success at TechDemocracy talks about the evolution of digital IDs, identity &amp;amp; access management, security as a service, and best practices for prioritizing investments in cybersecurity.

www.techdemocracy.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Justin Beals, Founder &amp; CEO of Strike Graph</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>Justin Beals, Founder &amp; CEO of Strike Graph</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1266376240</guid>
      <link>https://share.transistor.fm/s/439694d8</link>
      <description>
        <![CDATA[Justin Beals, Founder &amp; CEO of Strike Graph, talks about challenges with the current regulatory and compliance landscape and introduces best practices for companies to improve and maintain their compliance posture.

www.strikegraph.com]]>
      </description>
      <content:encoded>
        <![CDATA[Justin Beals, Founder &amp; CEO of Strike Graph, talks about challenges with the current regulatory and compliance landscape and introduces best practices for companies to improve and maintain their compliance posture.

www.strikegraph.com]]>
      </content:encoded>
      <pubDate>Wed, 11 May 2022 15:42:43 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/439694d8/b12d9634.mp3" length="41281557" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2580</itunes:duration>
      <itunes:summary>Justin Beals, Founder &amp;amp; CEO of Strike Graph, talks about challenges with the current regulatory and compliance landscape and introduces best practices for companies to improve and maintain their compliance posture.

www.strikegraph.com</itunes:summary>
      <itunes:subtitle>Justin Beals, Founder &amp;amp; CEO of Strike Graph, talks about challenges with the current regulatory and compliance landscape and introduces best practices for companies to improve and maintain their compliance posture.

www.strikegraph.com</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Searchable Encryption Technology with Dan Draper, CEO &amp; Founder of CipherStash</title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>Searchable Encryption Technology with Dan Draper, CEO &amp; Founder of CipherStash</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1240867189</guid>
      <link>https://share.transistor.fm/s/3413b626</link>
      <description>
        <![CDATA[Dan Draper, CEO and Founder of CipherStash explains why data security is more important than ever, why developers should have a good understanding of cryptography, and talks about least privilege, desegregated architecture, and order-revealing encryption.  Dan also discusses some of the issues related to the gender gap in technology.

CipherStash.com
debuggingdiversity.com]]>
      </description>
      <content:encoded>
        <![CDATA[Dan Draper, CEO and Founder of CipherStash explains why data security is more important than ever, why developers should have a good understanding of cryptography, and talks about least privilege, desegregated architecture, and order-revealing encryption.  Dan also discusses some of the issues related to the gender gap in technology.

CipherStash.com
debuggingdiversity.com]]>
      </content:encoded>
      <pubDate>Wed, 30 Mar 2022 15:40:41 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/3413b626/c1f38bc6.mp3" length="45853230" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2866</itunes:duration>
      <itunes:summary>Dan Draper, CEO and Founder of CipherStash explains why data security is more important than ever, why developers should have a good understanding of cryptography, and talks about least privilege, desegregated architecture, and order-revealing encryption.  Dan also discusses some of the issues related to the gender gap in technology.

CipherStash.com
debuggingdiversity.com</itunes:summary>
      <itunes:subtitle>Dan Draper, CEO and Founder of CipherStash explains why data security is more important than ever, why developers should have a good understanding of cryptography, and talks about least privilege, desegregated architecture, and order-revealing encryption.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Importance of Cyber Resilience with Kiran Vangaveti, CEO of BluSapphire Technologies</title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>The Importance of Cyber Resilience with Kiran Vangaveti, CEO of BluSapphire Technologies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1238691949</guid>
      <link>https://share.transistor.fm/s/ead719f8</link>
      <description>
        <![CDATA[Kiran Vangaveti, CEO of BluSapphire Technologies talks about the importance of cyber resilience and explains how BluSapphire Technologies' total cyber solution is able to replace many of the component based solutions.  Kiran's also shares his experience related to training for and participating in several marathons.

https://www.blusapphire.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Kiran Vangaveti, CEO of BluSapphire Technologies talks about the importance of cyber resilience and explains how BluSapphire Technologies' total cyber solution is able to replace many of the component based solutions.  Kiran's also shares his experience related to training for and participating in several marathons.

https://www.blusapphire.com/]]>
      </content:encoded>
      <pubDate>Fri, 25 Mar 2022 13:49:48 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ead719f8/42aa8807.mp3" length="39479362" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2468</itunes:duration>
      <itunes:summary>Kiran Vangaveti, CEO of BluSapphire Technologies talks about the importance of cyber resilience and explains how BluSapphire Technologies' total cyber solution is able to replace many of the component based solutions.  Kiran's also shares his experience related to training for and participating in several marathons.

https://www.blusapphire.com/</itunes:summary>
      <itunes:subtitle>Kiran Vangaveti, CEO of BluSapphire Technologies talks about the importance of cyber resilience and explains how BluSapphire Technologies' total cyber solution is able to replace many of the component based solutions.  Kiran's also shares his experience r</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>New Approaches to Application Security with Jeff Williams Co-Founder of Contrast Security</title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>New Approaches to Application Security with Jeff Williams Co-Founder of Contrast Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1231118875</guid>
      <link>https://share.transistor.fm/s/9321a8ab</link>
      <description>
        <![CDATA[Jeff Williams Co-Founder &amp; CTO of Contrast Security talks about the latest developments in DevOps and application security including serverless technology, self-protecting security, and Function as a Service (FaaS)for security applications.]]>
      </description>
      <content:encoded>
        <![CDATA[Jeff Williams Co-Founder &amp; CTO of Contrast Security talks about the latest developments in DevOps and application security including serverless technology, self-protecting security, and Function as a Service (FaaS)for security applications.]]>
      </content:encoded>
      <pubDate>Mon, 14 Mar 2022 13:43:11 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9321a8ab/0446076d.mp3" length="40930936" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2559</itunes:duration>
      <itunes:summary>Jeff Williams Co-Founder &amp;amp; CTO of Contrast Security talks about the latest developments in DevOps and application security including serverless technology, self-protecting security, and Function as a Service (FaaS)for security applications.</itunes:summary>
      <itunes:subtitle>Jeff Williams Co-Founder &amp;amp; CTO of Contrast Security talks about the latest developments in DevOps and application security including serverless technology, self-protecting security, and Function as a Service (FaaS)for security applications.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Unlimited Decentralized Financial Markets with Eric Chen, CEO of Injective Labs</title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>Unlimited Decentralized Financial Markets with Eric Chen, CEO of Injective Labs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1220716927</guid>
      <link>https://share.transistor.fm/s/7b6e8261</link>
      <description>
        <![CDATA[Eric Chen is the CEO and Co-founder of Injective Labs, a fintech company focused on creating revolutionary Web3 products. Eric’s passion for crypto and blockchain started with mining Ethereum and participating in cryptographic research in college while studying finance and computer science. After working at a major crypto hedge fund, he decided to drop out of college and founded Injective Labs together with Albert Chon (CTO). Injective Labs is the core contributor behind the decentralized exchange protocol Injective.
 
Injective is currently the fastest growing exchange platform reaching $1 Billion in trading volume within the first 30 days of release. For context, it took Coinbase a year to accomplish the same feat. Unlike Coinbase, Injective is entirely controlled by users meaning that all new markets are actually chosen by users.  Injective collects zero revenue and uses any fee generated to be distributed back to their users via its unique decentralized token model.

https://injectiveprotocol.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Eric Chen is the CEO and Co-founder of Injective Labs, a fintech company focused on creating revolutionary Web3 products. Eric’s passion for crypto and blockchain started with mining Ethereum and participating in cryptographic research in college while studying finance and computer science. After working at a major crypto hedge fund, he decided to drop out of college and founded Injective Labs together with Albert Chon (CTO). Injective Labs is the core contributor behind the decentralized exchange protocol Injective.
 
Injective is currently the fastest growing exchange platform reaching $1 Billion in trading volume within the first 30 days of release. For context, it took Coinbase a year to accomplish the same feat. Unlike Coinbase, Injective is entirely controlled by users meaning that all new markets are actually chosen by users.  Injective collects zero revenue and uses any fee generated to be distributed back to their users via its unique decentralized token model.

https://injectiveprotocol.com/]]>
      </content:encoded>
      <pubDate>Wed, 23 Feb 2022 16:23:56 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7b6e8261/a48d50db.mp3" length="44257045" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2766</itunes:duration>
      <itunes:summary>Eric Chen is the CEO and Co-founder of Injective Labs, a fintech company focused on creating revolutionary Web3 products. Eric’s passion for crypto and blockchain started with mining Ethereum and participating in cryptographic research in college while studying finance and computer science. After working at a major crypto hedge fund, he decided to drop out of college and founded Injective Labs together with Albert Chon (CTO). Injective Labs is the core contributor behind the decentralized exchange protocol Injective.
 
Injective is currently the fastest growing exchange platform reaching $1 Billion in trading volume within the first 30 days of release. For context, it took Coinbase a year to accomplish the same feat. Unlike Coinbase, Injective is entirely controlled by users meaning that all new markets are actually chosen by users.  Injective collects zero revenue and uses any fee generated to be distributed back to their users via its unique decentralized token model.

https://injectiveprotocol.com/</itunes:summary>
      <itunes:subtitle>Eric Chen is the CEO and Co-founder of Injective Labs, a fintech company focused on creating revolutionary Web3 products. Eric’s passion for crypto and blockchain started with mining Ethereum and participating in cryptographic research in college while st</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Crypto Mining Equipment with Mason Jappa, CEO of Blockware Solutions</title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Crypto Mining Equipment with Mason Jappa, CEO of Blockware Solutions</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1217615011</guid>
      <link>https://share.transistor.fm/s/dff7a490</link>
      <description>
        <![CDATA[Mason Jappa, CEO of Blockware Solutions talks about the various types of mining rigs, price and regulatory trends for crypto mining, and more.

https://www.blockwaresolutions.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Mason Jappa, CEO of Blockware Solutions talks about the various types of mining rigs, price and regulatory trends for crypto mining, and more.

https://www.blockwaresolutions.com/]]>
      </content:encoded>
      <pubDate>Thu, 17 Feb 2022 16:58:31 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/dff7a490/39ace69e.mp3" length="45963561" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2873</itunes:duration>
      <itunes:summary>Mason Jappa, CEO of Blockware Solutions talks about the various types of mining rigs, price and regulatory trends for crypto mining, and more.

https://www.blockwaresolutions.com/</itunes:summary>
      <itunes:subtitle>Mason Jappa, CEO of Blockware Solutions talks about the various types of mining rigs, price and regulatory trends for crypto mining, and more.

https://www.blockwaresolutions.com/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Open Source Device Management with Mike McNeil, CEO of Fleet DM</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>Open Source Device Management with Mike McNeil, CEO of Fleet DM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1215785353</guid>
      <link>https://share.transistor.fm/s/d56b33f9</link>
      <description>
        <![CDATA[Mike McNeil, CEO &amp; Co-Founder of Fleet DM explains how open source endpoint security is beneficial, using osquery, and ways to improve an organization's security posture while measuring and reducing total cost of ownership (TCO).

https://fleetdm.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Mike McNeil, CEO &amp; Co-Founder of Fleet DM explains how open source endpoint security is beneficial, using osquery, and ways to improve an organization's security posture while measuring and reducing total cost of ownership (TCO).

https://fleetdm.com/]]>
      </content:encoded>
      <pubDate>Tue, 15 Feb 2022 15:00:23 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d56b33f9/970e16f1.mp3" length="31350867" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1960</itunes:duration>
      <itunes:summary>Mike McNeil, CEO &amp;amp; Co-Founder of Fleet DM explains how open source endpoint security is beneficial, using osquery, and ways to improve an organization's security posture while measuring and reducing total cost of ownership (TCO).

https://fleetdm.com/</itunes:summary>
      <itunes:subtitle>Mike McNeil, CEO &amp;amp; Co-Founder of Fleet DM explains how open source endpoint security is beneficial, using osquery, and ways to improve an organization's security posture while measuring and reducing total cost of ownership (TCO).

https://fleetdm.com/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>DeFi, CeFi, Blockchain and more with Yubo Ruan, Founder of Parallel Finance</title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>DeFi, CeFi, Blockchain and more with Yubo Ruan, Founder of Parallel Finance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1209321115</guid>
      <link>https://share.transistor.fm/s/98ae8213</link>
      <description>
        <![CDATA[Yubo Ruan is the Founder of Parallel Finance, a new decentralized lending and staking protocol that just recently passed Binance to be the largest third-party program on Polkadot.

The company has a current market share of 20.95% and is backed by top-tier investors including Polychain Capital, Pantera Capital, Lightspeed Ventures and Breyer Capital.

Yubo learned about crypto in early 2014, and by June of that year he launched his first company while still in high school. Five years later, Yubo sold the company for over $4M, and by that point had started two VC funds focusing on disruptive technologies, and blockchain and crypto.

https://parallel.fi/]]>
      </description>
      <content:encoded>
        <![CDATA[Yubo Ruan is the Founder of Parallel Finance, a new decentralized lending and staking protocol that just recently passed Binance to be the largest third-party program on Polkadot.

The company has a current market share of 20.95% and is backed by top-tier investors including Polychain Capital, Pantera Capital, Lightspeed Ventures and Breyer Capital.

Yubo learned about crypto in early 2014, and by June of that year he launched his first company while still in high school. Five years later, Yubo sold the company for over $4M, and by that point had started two VC funds focusing on disruptive technologies, and blockchain and crypto.

https://parallel.fi/]]>
      </content:encoded>
      <pubDate>Thu, 03 Feb 2022 18:51:02 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/98ae8213/e0352b95.mp3" length="48117312" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3008</itunes:duration>
      <itunes:summary>Yubo Ruan is the Founder of Parallel Finance, a new decentralized lending and staking protocol that just recently passed Binance to be the largest third-party program on Polkadot.

The company has a current market share of 20.95% and is backed by top-tier investors including Polychain Capital, Pantera Capital, Lightspeed Ventures and Breyer Capital.

Yubo learned about crypto in early 2014, and by June of that year he launched his first company while still in high school. Five years later, Yubo sold the company for over $4M, and by that point had started two VC funds focusing on disruptive technologies, and blockchain and crypto.

https://parallel.fi/</itunes:summary>
      <itunes:subtitle>Yubo Ruan is the Founder of Parallel Finance, a new decentralized lending and staking protocol that just recently passed Binance to be the largest third-party program on Polkadot.

The company has a current market share of 20.95% and is backed by top-tier</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Automation with Eoin Hinchy, CEO of Tines</title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>Security Automation with Eoin Hinchy, CEO of Tines</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1205629570</guid>
      <link>https://share.transistor.fm/s/43cbae1c</link>
      <description>
        <![CDATA[Eoin Hinchy, CEO of Tines, explains how no-code security automation can free security analysts from many mundane day-to-day tasks and allow them to be more productive and to focus more on high-value strategic work.

https://www.tines.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Eoin Hinchy, CEO of Tines, explains how no-code security automation can free security analysts from many mundane day-to-day tasks and allow them to be more productive and to focus more on high-value strategic work.

https://www.tines.com/]]>
      </content:encoded>
      <pubDate>Fri, 28 Jan 2022 18:47:41 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/43cbae1c/1a7ba059.mp3" length="35508712" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2220</itunes:duration>
      <itunes:summary>Eoin Hinchy, CEO of Tines, explains how no-code security automation can free security analysts from many mundane day-to-day tasks and allow them to be more productive and to focus more on high-value strategic work.

https://www.tines.com/</itunes:summary>
      <itunes:subtitle>Eoin Hinchy, CEO of Tines, explains how no-code security automation can free security analysts from many mundane day-to-day tasks and allow them to be more productive and to focus more on high-value strategic work.

https://www.tines.com/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Frances Zelazny, Co-Founder &amp; CEO of Anonybit</title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Frances Zelazny, Co-Founder &amp; CEO of Anonybit</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1203006589</guid>
      <link>https://share.transistor.fm/s/74b21651</link>
      <description>
        <![CDATA[Frances Zelazny, Co-Founder &amp; CEO of Anonybit explains the importance of privacy by design and how personal data and privacy can be protected by using a decentralized biometrics infrastructure. 

https://anonybit.io/]]>
      </description>
      <content:encoded>
        <![CDATA[Frances Zelazny, Co-Founder &amp; CEO of Anonybit explains the importance of privacy by design and how personal data and privacy can be protected by using a decentralized biometrics infrastructure. 

https://anonybit.io/]]>
      </content:encoded>
      <pubDate>Tue, 25 Jan 2022 13:17:03 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/74b21651/7786e388.mp3" length="30280874" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1893</itunes:duration>
      <itunes:summary>Frances Zelazny, Co-Founder &amp;amp; CEO of Anonybit explains the importance of privacy by design and how personal data and privacy can be protected by using a decentralized biometrics infrastructure. 

https://anonybit.io/</itunes:summary>
      <itunes:subtitle>Frances Zelazny, Co-Founder &amp;amp; CEO of Anonybit explains the importance of privacy by design and how personal data and privacy can be protected by using a decentralized biometrics infrastructure. 

https://anonybit.io/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Storage, Backup, and Recovery, with W. Curtis Preston of Druva</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>Storage, Backup, and Recovery, with W. Curtis Preston of Druva</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1198873819</guid>
      <link>https://share.transistor.fm/s/727551ab</link>
      <description>
        <![CDATA[W. Curtis Preston has specialized in storage, backup, and recovery since 1993. He is an experienced expert witness and consultant who has written four books on the topic of storage back and recovery. Curtis is currently the Chief Technology Evangelist at Druva.  On this episode Curtis talks about the benefits of using a SaaS-based solution for storage, backup, and recovery. 

Curtis also hosts the Restore it All podcast and maintains the Backup Central website.

Restore it All 
https://podcasts.apple.com/us/podcast/backup-centrals-restore-it-all/id1469663053

Backup Central
https://www.backupcentral.com/

Druva
https://www.druva.com/]]>
      </description>
      <content:encoded>
        <![CDATA[W. Curtis Preston has specialized in storage, backup, and recovery since 1993. He is an experienced expert witness and consultant who has written four books on the topic of storage back and recovery. Curtis is currently the Chief Technology Evangelist at Druva.  On this episode Curtis talks about the benefits of using a SaaS-based solution for storage, backup, and recovery. 

Curtis also hosts the Restore it All podcast and maintains the Backup Central website.

Restore it All 
https://podcasts.apple.com/us/podcast/backup-centrals-restore-it-all/id1469663053

Backup Central
https://www.backupcentral.com/

Druva
https://www.druva.com/]]>
      </content:encoded>
      <pubDate>Fri, 21 Jan 2022 18:03:16 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/727551ab/66361ec6.mp3" length="45885815" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2868</itunes:duration>
      <itunes:summary>W. Curtis Preston has specialized in storage, backup, and recovery since 1993. He is an experienced expert witness and consultant who has written four books on the topic of storage back and recovery. Curtis is currently the Chief Technology Evangelist at Druva.  On this episode Curtis talks about the benefits of using a SaaS-based solution for storage, backup, and recovery. 

Curtis also hosts the Restore it All podcast and maintains the Backup Central website.

Restore it All 
https://podcasts.apple.com/us/podcast/backup-centrals-restore-it-all/id1469663053

Backup Central
https://www.backupcentral.com/

Druva
https://www.druva.com/</itunes:summary>
      <itunes:subtitle>W. Curtis Preston has specialized in storage, backup, and recovery since 1993. He is an experienced expert witness and consultant who has written four books on the topic of storage back and recovery. Curtis is currently the Chief Technology Evangelist at </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Secure Your Mobile Service with Haseeb Awan, CEO of Efani</title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>How to Secure Your Mobile Service with Haseeb Awan, CEO of Efani</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1190343172</guid>
      <link>https://share.transistor.fm/s/7799445f</link>
      <description>
        <![CDATA[Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs.  Haseeb also talks about Bitcoin ATMs and crypto wallets. 

https://www.efani.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs.  Haseeb also talks about Bitcoin ATMs and crypto wallets. 

https://www.efani.com/]]>
      </content:encoded>
      <pubDate>Tue, 04 Jan 2022 18:55:41 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7799445f/9277fd1d.mp3" length="42726045" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2671</itunes:duration>
      <itunes:summary>Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs.  Haseeb also talks about Bitcoin ATMs and crypto wallets. 

https://www.efani.com/</itunes:summary>
      <itunes:subtitle>Haseeb Awan, CEO of Efani explains how a secure cell phone service can prevent SIM swaps, eavesdropping, and location tracking, and explains how a home-based cell tower can be more secure and reduce cell phone costs.  Haseeb also talks about Bitcoin ATMs </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Chris Kline, COO &amp; Co-Founder of Bitcoin IRA</title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>Chris Kline, COO &amp; Co-Founder of Bitcoin IRA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1177775845</guid>
      <link>https://share.transistor.fm/s/545f3435</link>
      <description>
        <![CDATA[Chris Kline, COO &amp; Co-Founder of Bitcoin IRA explains the merits of being able to hold Bitcoin and other cryptocurrencies in an individual retirement account (IRA). He also explains how Bitcoin IRA secures customer data and complies with various banking regulations related to security and data protection.]]>
      </description>
      <content:encoded>
        <![CDATA[Chris Kline, COO &amp; Co-Founder of Bitcoin IRA explains the merits of being able to hold Bitcoin and other cryptocurrencies in an individual retirement account (IRA). He also explains how Bitcoin IRA secures customer data and complies with various banking regulations related to security and data protection.]]>
      </content:encoded>
      <pubDate>Wed, 15 Dec 2021 21:03:28 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/545f3435/35cadeae.mp3" length="39182567" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2449</itunes:duration>
      <itunes:summary>Chris Kline, COO &amp;amp; Co-Founder of Bitcoin IRA explains the merits of being able to hold Bitcoin and other cryptocurrencies in an individual retirement account (IRA). He also explains how Bitcoin IRA secures customer data and complies with various banking regulations related to security and data protection.</itunes:summary>
      <itunes:subtitle>Chris Kline, COO &amp;amp; Co-Founder of Bitcoin IRA explains the merits of being able to hold Bitcoin and other cryptocurrencies in an individual retirement account (IRA). He also explains how Bitcoin IRA secures customer data and complies with various banki</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Data Loss Prevention (DLP) with Rohan Sathe, CTO &amp; Co-Founder of Nightfall</title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>Data Loss Prevention (DLP) with Rohan Sathe, CTO &amp; Co-Founder of Nightfall</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1171364533</guid>
      <link>https://share.transistor.fm/s/2fdad4c5</link>
      <description>
        <![CDATA[Rohan Sathe, CTO &amp; Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall's unique approach to DLP.  Rohan also explains how his previous role as one of the founding engineers of Uber Eats put him on the path to looking for a better DLP solution. 

https://nightfall.ai/]]>
      </description>
      <content:encoded>
        <![CDATA[Rohan Sathe, CTO &amp; Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall's unique approach to DLP.  Rohan also explains how his previous role as one of the founding engineers of Uber Eats put him on the path to looking for a better DLP solution. 

https://nightfall.ai/]]>
      </content:encoded>
      <pubDate>Mon, 06 Dec 2021 16:03:52 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/2fdad4c5/9b7d3011.mp3" length="28004697" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1751</itunes:duration>
      <itunes:summary>Rohan Sathe, CTO &amp;amp; Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall's unique approach to DLP.  Rohan also explains how his previous role as one of the founding engineers of Uber Eats put him on the path to looking for a better DLP solution. 

https://nightfall.ai/</itunes:summary>
      <itunes:subtitle>Rohan Sathe, CTO &amp;amp; Co-Founder of Nightfall talks about the different types of data loss prevention (DLP) tools and platforms and explains Nightfall's unique approach to DLP.  Rohan also explains how his previous role as one of the founding engineers o</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>VPNs with Brad Hawkins, CEO of SaferNet</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>VPNs with Brad Hawkins, CEO of SaferNet</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1169981770</guid>
      <link>https://share.transistor.fm/s/c24382c2</link>
      <description>
        <![CDATA[Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the "foundation" for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the different types of VPNs. 

https://www.safernetvpn.com/
https://safernetbusinessvpn.com/

https://ninjio.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the "foundation" for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the different types of VPNs. 

https://www.safernetvpn.com/
https://safernetbusinessvpn.com/

https://ninjio.com/]]>
      </content:encoded>
      <pubDate>Wed, 01 Dec 2021 16:49:32 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c24382c2/ee9b3641.mp3" length="47044792" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2941</itunes:duration>
      <itunes:summary>Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the "foundation" for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the different types of VPNs. 

https://www.safernetvpn.com/
https://safernetbusinessvpn.com/

https://ninjio.com/</itunes:summary>
      <itunes:subtitle>Brad Hawkins, CEO of SaferNet, talks about the most common cyber threats and explains how VPNs can be used as the "foundation" for cyber security and to greatly reduce cyber risk. He also explains how not all VPNs are created equally, and talks about the </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Security Managed Services with James Fair, SVP of Technical Operations at Executech</title>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>Security Managed Services with James Fair, SVP of Technical Operations at Executech</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1162479067</guid>
      <link>https://share.transistor.fm/s/920bbed5</link>
      <description>
        <![CDATA[James Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and   mentoring and motivation.

https://www.executech.com/]]>
      </description>
      <content:encoded>
        <![CDATA[James Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and   mentoring and motivation.

https://www.executech.com/]]>
      </content:encoded>
      <pubDate>Tue, 23 Nov 2021 19:56:45 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/920bbed5/d82bb5ee.mp3" length="31820255" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1989</itunes:duration>
      <itunes:summary>James Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and   mentoring and motivation.

https://www.executech.com/</itunes:summary>
      <itunes:subtitle>James Fair, SVP of Technical Operations at Executech talks about managed services for cyber security, and shares his views on security best practices and   mentoring and motivation.

https://www.executech.com/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Application Security for Developers with Harshil Parikh, CEO of TROMZO</title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>Application Security for Developers with Harshil Parikh, CEO of TROMZO</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1161144676</guid>
      <link>https://share.transistor.fm/s/d7fbf9c7</link>
      <description>
        <![CDATA[Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously.

https://www.tromzo.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously.

https://www.tromzo.com/]]>
      </content:encoded>
      <pubDate>Tue, 16 Nov 2021 16:04:36 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d7fbf9c7/8a0d104a.mp3" length="26161493" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1635</itunes:duration>
      <itunes:summary>Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously.

https://www.tromzo.com/</itunes:summary>
      <itunes:subtitle>Harshil Parikh, CEO of TROMZO talks about developer security friction and how best to engage developers to take security seriously.

https://www.tromzo.com/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Steve Ginty, Director of Threat Intelligence at RiskIQ</title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>Steve Ginty, Director of Threat Intelligence at RiskIQ</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1154616223</guid>
      <link>https://share.transistor.fm/s/9213a576</link>
      <description>
        <![CDATA[Steve Ginty, Director of Threat Intelligence at RiskIQ talks about External Attack Surface Management (EASM)and gives advice on how companies can better prepare for and prevent cyber attacks. RiskIQ was recently acquired by Microsoft.

https://www.riskiq.com/
www.securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Steve Ginty, Director of Threat Intelligence at RiskIQ talks about External Attack Surface Management (EASM)and gives advice on how companies can better prepare for and prevent cyber attacks. RiskIQ was recently acquired by Microsoft.

https://www.riskiq.com/
www.securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Thu, 11 Nov 2021 17:12:14 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9213a576/bdd984ef.mp3" length="30743981" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1922</itunes:duration>
      <itunes:summary>Steve Ginty, Director of Threat Intelligence at RiskIQ talks about External Attack Surface Management (EASM)and gives advice on how companies can better prepare for and prevent cyber attacks. RiskIQ was recently acquired by Microsoft.

https://www.riskiq.com/
www.securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Steve Ginty, Director of Threat Intelligence at RiskIQ talks about External Attack Surface Management (EASM)and gives advice on how companies can better prepare for and prevent cyber attacks. RiskIQ was recently acquired by Microsoft.

https://www.riskiq.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Philippe Humeau, CEO of CrowdSec</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>Philippe Humeau, CEO of CrowdSec</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1154596291</guid>
      <link>https://share.transistor.fm/s/ab0fdc52</link>
      <description>
        <![CDATA[Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks.   CrowdSec is an open-source &amp; collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks.

https://crowdsec.net/
www.securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks.   CrowdSec is an open-source &amp; collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks.

https://crowdsec.net/
www.securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Mon, 08 Nov 2021 14:07:16 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ab0fdc52/f2567096.mp3" length="30419623" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1902</itunes:duration>
      <itunes:summary>Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks.   CrowdSec is an open-source &amp;amp; collaborative security solution that is able to analyze visitor behavior and provide an adapted response to a wide variety of attacks.

https://crowdsec.net/
www.securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Philippe Humeau, CEO of CrowdSec talks about the advantages of open source security solutions to protect against zero-day and IP attacks.   CrowdSec is an open-source &amp;amp; collaborative security solution that is able to analyze visitor behavior and provi</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Maxime Lamothe-Brassard, Founder LimaCharlie</title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Maxime Lamothe-Brassard, Founder LimaCharlie</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1133230384</guid>
      <link>https://share.transistor.fm/s/fb11c150</link>
      <description>
        <![CDATA[Maxime "Max" Lamothe-Brassard Founder of LimaCharlie talks about the ins and outs of cloud-based endpoint detection and response (EDR), and explains how LimaCharlie is changing traditional thinking related to corporate cybersecurity solutions.]]>
      </description>
      <content:encoded>
        <![CDATA[Maxime "Max" Lamothe-Brassard Founder of LimaCharlie talks about the ins and outs of cloud-based endpoint detection and response (EDR), and explains how LimaCharlie is changing traditional thinking related to corporate cybersecurity solutions.]]>
      </content:encoded>
      <pubDate>Wed, 29 Sep 2021 19:27:31 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/fb11c150/b29d4383.mp3" length="84321387" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2620</itunes:duration>
      <itunes:summary>Maxime "Max" Lamothe-Brassard Founder of LimaCharlie talks about the ins and outs of cloud-based endpoint detection and response (EDR), and explains how LimaCharlie is changing traditional thinking related to corporate cybersecurity solutions.</itunes:summary>
      <itunes:subtitle>Maxime "Max" Lamothe-Brassard Founder of LimaCharlie talks about the ins and outs of cloud-based endpoint detection and response (EDR), and explains how LimaCharlie is changing traditional thinking related to corporate cybersecurity solutions.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Rick Jordan, Founder &amp; CEO of ReachOut Technology</title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Rick Jordan, Founder &amp; CEO of ReachOut Technology</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1109847877</guid>
      <link>https://share.transistor.fm/s/8c4f7e2a</link>
      <description>
        <![CDATA[Trained by the CIA and NSA, noted cybersecurity expert Rick Jordan talks about cybersecurity, managed security services, growing his business, taking ReachOut Technology public, his new movie Liberty Lockdown, and more!

https://reachoutit.com/
https://www.rickjordan.tv/
https://www.rickjordan.tv/liberty-lockdown/]]>
      </description>
      <content:encoded>
        <![CDATA[Trained by the CIA and NSA, noted cybersecurity expert Rick Jordan talks about cybersecurity, managed security services, growing his business, taking ReachOut Technology public, his new movie Liberty Lockdown, and more!

https://reachoutit.com/
https://www.rickjordan.tv/
https://www.rickjordan.tv/liberty-lockdown/]]>
      </content:encoded>
      <pubDate>Mon, 23 Aug 2021 15:47:25 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/8c4f7e2a/66dbc44e.mp3" length="111665440" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3446</itunes:duration>
      <itunes:summary>Trained by the CIA and NSA, noted cybersecurity expert Rick Jordan talks about cybersecurity, managed security services, growing his business, taking ReachOut Technology public, his new movie Liberty Lockdown, and more!

https://reachoutit.com/
https://www.rickjordan.tv/
https://www.rickjordan.tv/liberty-lockdown/</itunes:summary>
      <itunes:subtitle>Trained by the CIA and NSA, noted cybersecurity expert Rick Jordan talks about cybersecurity, managed security services, growing his business, taking ReachOut Technology public, his new movie Liberty Lockdown, and more!

https://reachoutit.com/
https://ww</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Brian Vallelunga, CEO of Doppler talks about Universal Secrets Management</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>Brian Vallelunga, CEO of Doppler talks about Universal Secrets Management</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1104843190</guid>
      <link>https://share.transistor.fm/s/61f3c1a0</link>
      <description>
        <![CDATA[Brian Vallelunga is the CEO of Doppler, the universal secrets management software that keeps app configuration in sync across devices, environments, and developers. Doppler has attracted investments from Google Ventures, Sequoia, Greylock, Kleiner Perkins, and Peter Thiel.

For more info, please visit: doppler.com]]>
      </description>
      <content:encoded>
        <![CDATA[Brian Vallelunga is the CEO of Doppler, the universal secrets management software that keeps app configuration in sync across devices, environments, and developers. Doppler has attracted investments from Google Ventures, Sequoia, Greylock, Kleiner Perkins, and Peter Thiel.

For more info, please visit: doppler.com]]>
      </content:encoded>
      <pubDate>Thu, 12 Aug 2021 18:33:58 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/61f3c1a0/0cc91c28.mp3" length="61313600" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1911</itunes:duration>
      <itunes:summary>Brian Vallelunga is the CEO of Doppler, the universal secrets management software that keeps app configuration in sync across devices, environments, and developers. Doppler has attracted investments from Google Ventures, Sequoia, Greylock, Kleiner Perkins, and Peter Thiel.

For more info, please visit: doppler.com</itunes:summary>
      <itunes:subtitle>Brian Vallelunga is the CEO of Doppler, the universal secrets management software that keeps app configuration in sync across devices, environments, and developers. Doppler has attracted investments from Google Ventures, Sequoia, Greylock, Kleiner Perkins</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Emil Sayegh, CEO of Ntirety</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>Emil Sayegh, CEO of Ntirety</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1101410236</guid>
      <link>https://share.transistor.fm/s/581ff9a1</link>
      <description>
        <![CDATA[Emil Sayegh, CEO and President of Ntirety, talks about managed security and compliance services. Ntirety is one of the largest managed cloud service platforms in the world.  Emil is an early pioneer of Cybersecurity and Cloud Computing, recognized as one of the industry’s cloud visionaries and "fathers of OpenStack," having launched and led successful cloud computing and hosting businesses for HP and Rackspace.]]>
      </description>
      <content:encoded>
        <![CDATA[Emil Sayegh, CEO and President of Ntirety, talks about managed security and compliance services. Ntirety is one of the largest managed cloud service platforms in the world.  Emil is an early pioneer of Cybersecurity and Cloud Computing, recognized as one of the industry’s cloud visionaries and "fathers of OpenStack," having launched and led successful cloud computing and hosting businesses for HP and Rackspace.]]>
      </content:encoded>
      <pubDate>Mon, 09 Aug 2021 16:21:05 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/581ff9a1/aa85db92.mp3" length="79891908" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2476</itunes:duration>
      <itunes:summary>Emil Sayegh, CEO and President of Ntirety, talks about managed security and compliance services. Ntirety is one of the largest managed cloud service platforms in the world.  Emil is an early pioneer of Cybersecurity and Cloud Computing, recognized as one of the industry’s cloud visionaries and "fathers of OpenStack," having launched and led successful cloud computing and hosting businesses for HP and Rackspace.</itunes:summary>
      <itunes:subtitle>Emil Sayegh, CEO and President of Ntirety, talks about managed security and compliance services. Ntirety is one of the largest managed cloud service platforms in the world.  Emil is an early pioneer of Cybersecurity and Cloud Computing, recognized as one </itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Jonathan Moore, CTO of SpiderOak</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Jonathan Moore, CTO of SpiderOak</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1090941112</guid>
      <link>https://share.transistor.fm/s/76cae1f6</link>
      <description>
        <![CDATA[Jonathan Moore, CTO of SpiderOak talks about security problems in the software supply chain, the need for a more effective national cyber defense, and some best practices for individual and organizational security.

https://spideroak.com/home/]]>
      </description>
      <content:encoded>
        <![CDATA[Jonathan Moore, CTO of SpiderOak talks about security problems in the software supply chain, the need for a more effective national cyber defense, and some best practices for individual and organizational security.

https://spideroak.com/home/]]>
      </content:encoded>
      <pubDate>Tue, 20 Jul 2021 16:53:55 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/76cae1f6/eebf861b.mp3" length="70313418" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2187</itunes:duration>
      <itunes:summary>Jonathan Moore, CTO of SpiderOak talks about security problems in the software supply chain, the need for a more effective national cyber defense, and some best practices for individual and organizational security.

https://spideroak.com/home/</itunes:summary>
      <itunes:subtitle>Jonathan Moore, CTO of SpiderOak talks about security problems in the software supply chain, the need for a more effective national cyber defense, and some best practices for individual and organizational security.

https://spideroak.com/home/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Dr. Chris Spencer on the Secure Use of Passpoint, NGH, and Eavesdropping Teddy Bears!</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Dr. Chris Spencer on the Secure Use of Passpoint, NGH, and Eavesdropping Teddy Bears!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1082943058</guid>
      <link>https://share.transistor.fm/s/e3168dc4</link>
      <description>
        <![CDATA[Dr Spencer is the Chief Information Security Officer at Nomadix &amp; GlobalReach.

Chris has been a technology leader in the Wi-Fi industry for well over two decades. Previously the Chief Technology Officer for GlobalReach for over 20 years, his team helped to design and build some of the world's largest secure Wi-Fi network, including the first Wi-Fi network on the London Underground, public Wi-Fi for a national USA coffee shop chain, large-scale municipal networks with LinkNYC, San Francisco and San Jose, in-flight Wi-Fi for pan-continental airlines, and carrier SMB services, allowing seamless connectivity for users.

A recognized thought leader in best-practice secure, seamless sign-on experience, and the use of Passpoint (Hotspot 2.0), Chris has been involved in the specification, and delivery of Next Generation Hotspots (NGH), and leads and co-leads several industry working groups for the Wireless Broadband Alliance (WBA), Hospitality Technology Next Generation (HTNG) and the Seamless Air Alliance (SAA). He has presented at HTNG, Barcelona 2015, at Mobile World Congress, the Wireless Broadband Alliance Global Congress, at Wi-Fi Now and on TV and radio.]]>
      </description>
      <content:encoded>
        <![CDATA[Dr Spencer is the Chief Information Security Officer at Nomadix &amp; GlobalReach.

Chris has been a technology leader in the Wi-Fi industry for well over two decades. Previously the Chief Technology Officer for GlobalReach for over 20 years, his team helped to design and build some of the world's largest secure Wi-Fi network, including the first Wi-Fi network on the London Underground, public Wi-Fi for a national USA coffee shop chain, large-scale municipal networks with LinkNYC, San Francisco and San Jose, in-flight Wi-Fi for pan-continental airlines, and carrier SMB services, allowing seamless connectivity for users.

A recognized thought leader in best-practice secure, seamless sign-on experience, and the use of Passpoint (Hotspot 2.0), Chris has been involved in the specification, and delivery of Next Generation Hotspots (NGH), and leads and co-leads several industry working groups for the Wireless Broadband Alliance (WBA), Hospitality Technology Next Generation (HTNG) and the Seamless Air Alliance (SAA). He has presented at HTNG, Barcelona 2015, at Mobile World Congress, the Wireless Broadband Alliance Global Congress, at Wi-Fi Now and on TV and radio.]]>
      </content:encoded>
      <pubDate>Wed, 07 Jul 2021 10:44:28 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e3168dc4/9920c1c1.mp3" length="99201609" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3083</itunes:duration>
      <itunes:summary>Dr Spencer is the Chief Information Security Officer at Nomadix &amp;amp; GlobalReach.

Chris has been a technology leader in the Wi-Fi industry for well over two decades. Previously the Chief Technology Officer for GlobalReach for over 20 years, his team helped to design and build some of the world's largest secure Wi-Fi network, including the first Wi-Fi network on the London Underground, public Wi-Fi for a national USA coffee shop chain, large-scale municipal networks with LinkNYC, San Francisco and San Jose, in-flight Wi-Fi for pan-continental airlines, and carrier SMB services, allowing seamless connectivity for users.

A recognized thought leader in best-practice secure, seamless sign-on experience, and the use of Passpoint (Hotspot 2.0), Chris has been involved in the specification, and delivery of Next Generation Hotspots (NGH), and leads and co-leads several industry working groups for the Wireless Broadband Alliance (WBA), Hospitality Technology Next Generation (HTNG) and the Seamless Air Alliance (SAA). He has presented at HTNG, Barcelona 2015, at Mobile World Congress, the Wireless Broadband Alliance Global Congress, at Wi-Fi Now and on TV and radio.</itunes:summary>
      <itunes:subtitle>Dr Spencer is the Chief Information Security Officer at Nomadix &amp;amp; GlobalReach.

Chris has been a technology leader in the Wi-Fi industry for well over two decades. Previously the Chief Technology Officer for GlobalReach for over 20 years, his team hel</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Data Protection via File Level Encryption, Dimitri Nemirovsky, COO of Atakama</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Data Protection via File Level Encryption, Dimitri Nemirovsky, COO of Atakama</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1078253215</guid>
      <link>https://share.transistor.fm/s/d413d5df</link>
      <description>
        <![CDATA[Dimitri Nemirovsky, COO of Atakama talks about file level encryption for data protection, distributed key solutions, and give advice related to startups in the cybersecurity space.

www.atakama.com]]>
      </description>
      <content:encoded>
        <![CDATA[Dimitri Nemirovsky, COO of Atakama talks about file level encryption for data protection, distributed key solutions, and give advice related to startups in the cybersecurity space.

www.atakama.com]]>
      </content:encoded>
      <pubDate>Tue, 29 Jun 2021 18:31:33 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d413d5df/8fad5b36.mp3" length="73445706" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2286</itunes:duration>
      <itunes:summary>Dimitri Nemirovsky, COO of Atakama talks about file level encryption for data protection, distributed key solutions, and give advice related to startups in the cybersecurity space.

www.atakama.com</itunes:summary>
      <itunes:subtitle>Dimitri Nemirovsky, COO of Atakama talks about file level encryption for data protection, distributed key solutions, and give advice related to startups in the cybersecurity space.

www.atakama.com</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Kathleen Booth, VP of Marketing at clean.io</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Kathleen Booth, VP of Marketing at clean.io</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1075167460</guid>
      <link>https://share.transistor.fm/s/ed475314</link>
      <description>
        <![CDATA[Kathleen Booth, VP of Marketing at clean.io talks about the importance of digital engagement security, why businesses should pay careful attention to any third party code on their websites, how to prevent coupon codes from being abused, and much much more!

clean.io
https://www.clean.io/

Inbound Success Podcast
https://inboundsuccesspodcast.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Kathleen Booth, VP of Marketing at clean.io talks about the importance of digital engagement security, why businesses should pay careful attention to any third party code on their websites, how to prevent coupon codes from being abused, and much much more!

clean.io
https://www.clean.io/

Inbound Success Podcast
https://inboundsuccesspodcast.com/]]>
      </content:encoded>
      <pubDate>Thu, 24 Jun 2021 18:14:25 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ed475314/f425a5cc.mp3" length="62801987" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1946</itunes:duration>
      <itunes:summary>Kathleen Booth, VP of Marketing at clean.io talks about the importance of digital engagement security, why businesses should pay careful attention to any third party code on their websites, how to prevent coupon codes from being abused, and much much more!

clean.io
https://www.clean.io/

Inbound Success Podcast
https://inboundsuccesspodcast.com/</itunes:summary>
      <itunes:subtitle>Kathleen Booth, VP of Marketing at clean.io talks about the importance of digital engagement security, why businesses should pay careful attention to any third party code on their websites, how to prevent coupon codes from being abused, and much much more</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Scott Schober, CEO of Berkeley Varitronics Systems</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Scott Schober, CEO of Berkeley Varitronics Systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1070139988</guid>
      <link>https://share.transistor.fm/s/727d3994</link>
      <description>
        <![CDATA[Scott Schober, CEO of Berkeley Varitronics Systems talks about the need for everyone to be aware and responsible for cybersecurity, how seniors are being exploited by hackers, best practices related to ATM and credit card usage, digital wallets, and more.

For more information about Scott and BVS, please visit.
https://www.bvsystems.com/

For more information about the Secure Talk podcast, please visit:
www.securetalkpodcast.com]]>
      </description>
      <content:encoded>
        <![CDATA[Scott Schober, CEO of Berkeley Varitronics Systems talks about the need for everyone to be aware and responsible for cybersecurity, how seniors are being exploited by hackers, best practices related to ATM and credit card usage, digital wallets, and more.

For more information about Scott and BVS, please visit.
https://www.bvsystems.com/

For more information about the Secure Talk podcast, please visit:
www.securetalkpodcast.com]]>
      </content:encoded>
      <pubDate>Thu, 17 Jun 2021 14:22:04 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/727d3994/bebbbb56.mp3" length="97251692" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3000</itunes:duration>
      <itunes:summary>Scott Schober, CEO of Berkeley Varitronics Systems talks about the need for everyone to be aware and responsible for cybersecurity, how seniors are being exploited by hackers, best practices related to ATM and credit card usage, digital wallets, and more.

For more information about Scott and BVS, please visit.
https://www.bvsystems.com/

For more information about the Secure Talk podcast, please visit:
www.securetalkpodcast.com</itunes:summary>
      <itunes:subtitle>Scott Schober, CEO of Berkeley Varitronics Systems talks about the need for everyone to be aware and responsible for cybersecurity, how seniors are being exploited by hackers, best practices related to ATM and credit card usage, digital wallets, and more.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Mahmoud Abdelkader, CEO and co-founder of Very Good Security</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Mahmoud Abdelkader, CEO and co-founder of Very Good Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1063815775</guid>
      <link>https://share.transistor.fm/s/f00ba4af</link>
      <description>
        <![CDATA[Mahmoud Abdelkader is the CEO and co-founder of Very Good Security; the leading data security platform that changes the way sensitive data is held by eliminating the need for customers to hold their own data.]]>
      </description>
      <content:encoded>
        <![CDATA[Mahmoud Abdelkader is the CEO and co-founder of Very Good Security; the leading data security platform that changes the way sensitive data is held by eliminating the need for customers to hold their own data.]]>
      </content:encoded>
      <pubDate>Wed, 09 Jun 2021 04:45:30 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/f00ba4af/19171542.mp3" length="79762688" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2483</itunes:duration>
      <itunes:summary>Mahmoud Abdelkader is the CEO and co-founder of Very Good Security; the leading data security platform that changes the way sensitive data is held by eliminating the need for customers to hold their own data.</itunes:summary>
      <itunes:subtitle>Mahmoud Abdelkader is the CEO and co-founder of Very Good Security; the leading data security platform that changes the way sensitive data is held by eliminating the need for customers to hold their own data.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Santosh Devaraj, CEO of TrustGrid</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Santosh Devaraj, CEO of TrustGrid</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1062663661</guid>
      <link>https://share.transistor.fm/s/0bb1d7f9</link>
      <description>
        <![CDATA[Santosh Devaraj, CEO of TrustGrid™,  talks about developments in trusted identity networks and explains how his company's platform provides a confidential computing platform for identity-based transactions. He also walks us through some specific applications of TrustGrid by different government agencies in Australia. 

More at: http://trustgrid.com]]>
      </description>
      <content:encoded>
        <![CDATA[Santosh Devaraj, CEO of TrustGrid™,  talks about developments in trusted identity networks and explains how his company's platform provides a confidential computing platform for identity-based transactions. He also walks us through some specific applications of TrustGrid by different government agencies in Australia. 

More at: http://trustgrid.com]]>
      </content:encoded>
      <pubDate>Wed, 09 Jun 2021 00:04:21 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0bb1d7f9/7c5b8c17.mp3" length="87166977" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2717</itunes:duration>
      <itunes:summary>Santosh Devaraj, CEO of TrustGrid™,  talks about developments in trusted identity networks and explains how his company's platform provides a confidential computing platform for identity-based transactions. He also walks us through some specific applications of TrustGrid by different government agencies in Australia. 

More at: http://trustgrid.com</itunes:summary>
      <itunes:subtitle>Santosh Devaraj, CEO of TrustGrid™,  talks about developments in trusted identity networks and explains how his company's platform provides a confidential computing platform for identity-based transactions. He also walks us through some specific applicati</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Bruce Dahlgren, CEO of MetricStream</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Bruce Dahlgren, CEO of MetricStream</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1050993040</guid>
      <link>https://share.transistor.fm/s/80f7832f</link>
      <description>
        <![CDATA[Bruce Dahlgren, Chief Executive Officer of MetricStream explains how organizations can get a better understanding of what types of risk they are facing and make better more informed decisions about how to manage their risk exposure.

MetricStream
https://www.metricstream.com/

Metric Streams GRC Summit
https://www.grc-summit.com/2021]]>
      </description>
      <content:encoded>
        <![CDATA[Bruce Dahlgren, Chief Executive Officer of MetricStream explains how organizations can get a better understanding of what types of risk they are facing and make better more informed decisions about how to manage their risk exposure.

MetricStream
https://www.metricstream.com/

Metric Streams GRC Summit
https://www.grc-summit.com/2021]]>
      </content:encoded>
      <pubDate>Tue, 18 May 2021 16:42:19 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/80f7832f/d1a03bf0.mp3" length="70946663" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2210</itunes:duration>
      <itunes:summary>Bruce Dahlgren, Chief Executive Officer of MetricStream explains how organizations can get a better understanding of what types of risk they are facing and make better more informed decisions about how to manage their risk exposure.

MetricStream
https://www.metricstream.com/

Metric Streams GRC Summit
https://www.grc-summit.com/2021</itunes:summary>
      <itunes:subtitle>Bruce Dahlgren, Chief Executive Officer of MetricStream explains how organizations can get a better understanding of what types of risk they are facing and make better more informed decisions about how to manage their risk exposure.

MetricStream
https://</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Dexter Caffey, CEO of Smart Eye Technology</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Dexter Caffey, CEO of Smart Eye Technology</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1043284918</guid>
      <link>https://share.transistor.fm/s/9b5cbed8</link>
      <description>
        <![CDATA[Dexter Caffey, CEO of Smart Eye Technology explains how his company's technology uses biometric security tools to protect documents and files from unauthorized viewers.

https://smarteyetechnology.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Dexter Caffey, CEO of Smart Eye Technology explains how his company's technology uses biometric security tools to protect documents and files from unauthorized viewers.

https://smarteyetechnology.com/]]>
      </content:encoded>
      <pubDate>Wed, 05 May 2021 18:53:07 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9b5cbed8/80046cdb.mp3" length="44439701" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1378</itunes:duration>
      <itunes:summary>Dexter Caffey, CEO of Smart Eye Technology explains how his company's technology uses biometric security tools to protect documents and files from unauthorized viewers.

https://smarteyetechnology.com/</itunes:summary>
      <itunes:subtitle>Dexter Caffey, CEO of Smart Eye Technology explains how his company's technology uses biometric security tools to protect documents and files from unauthorized viewers.

https://smarteyetechnology.com/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Mark Testoni, CEO at SAP National Security Services (SAP NS2)</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Mark Testoni, CEO at SAP National Security Services (SAP NS2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1032686146</guid>
      <link>https://share.transistor.fm/s/a71ee906</link>
      <description>
        <![CDATA[Mark Testoni, CEO at SAP National Security Services (SAP NS2)
shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture.]]>
      </description>
      <content:encoded>
        <![CDATA[Mark Testoni, CEO at SAP National Security Services (SAP NS2)
shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture.]]>
      </content:encoded>
      <pubDate>Mon, 19 Apr 2021 19:50:16 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/a71ee906/76ff6ab0.mp3" length="33117579" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2070</itunes:duration>
      <itunes:summary>Mark Testoni, CEO at SAP National Security Services (SAP NS2)
shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture.</itunes:summary>
      <itunes:subtitle>Mark Testoni, CEO at SAP National Security Services (SAP NS2)
shares insights about the state of cyber security in the U.S. and provides ideas on how organizations and individuals can improve their security posture.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Michel Tricot, Co-Founder &amp; CEO of Airbyte</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Michel Tricot, Co-Founder &amp; CEO of Airbyte</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1028024614</guid>
      <link>https://share.transistor.fm/s/36b81e55</link>
      <description>
        <![CDATA[Michel is the CEO and Co-Founder of Airbyte. 

He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingestion and data distribution connectors, syncing 100s TB every day.

In 2020, he co-founded Airbyte, the new open-source ELT standard for replicating data from applications, APIs &amp; databases. 

After only five months, Airbyte raised $5.2M in seed funding from Accel, YCombinator, 8VC, and some high-profile business angels, including the co-founder of Segment, the former GM Cloudera, and the co-founder of Liveramp and Safegraph. 600+ companies have synced data using Airbyte in the first 6 months.

https://airbyte.io/]]>
      </description>
      <content:encoded>
        <![CDATA[Michel is the CEO and Co-Founder of Airbyte. 

He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingestion and data distribution connectors, syncing 100s TB every day.

In 2020, he co-founded Airbyte, the new open-source ELT standard for replicating data from applications, APIs &amp; databases. 

After only five months, Airbyte raised $5.2M in seed funding from Accel, YCombinator, 8VC, and some high-profile business angels, including the co-founder of Segment, the former GM Cloudera, and the co-founder of Liveramp and Safegraph. 600+ companies have synced data using Airbyte in the first 6 months.

https://airbyte.io/]]>
      </content:encoded>
      <pubDate>Tue, 13 Apr 2021 16:35:44 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/36b81e55/5b68a21e.mp3" length="70835878" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2205</itunes:duration>
      <itunes:summary>Michel is the CEO and Co-Founder of Airbyte. 

He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingestion and data distribution connectors, syncing 100s TB every day.

In 2020, he co-founded Airbyte, the new open-source ELT standard for replicating data from applications, APIs &amp;amp; databases. 

After only five months, Airbyte raised $5.2M in seed funding from Accel, YCombinator, 8VC, and some high-profile business angels, including the co-founder of Segment, the former GM Cloudera, and the co-founder of Liveramp and Safegraph. 600+ companies have synced data using Airbyte in the first 6 months.

https://airbyte.io/</itunes:summary>
      <itunes:subtitle>Michel is the CEO and Co-Founder of Airbyte. 

He has been working in data engineering for the past 15 years. As head of integrations and engineering director at Liveramp (NYSE: RAMP), he grew the team responsible for building and scaling the data ingesti</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Dr. Eric Cole</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Dr. Eric Cole</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1020598567</guid>
      <link>https://share.transistor.fm/s/630c48e1</link>
      <description>
        <![CDATA[Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is the founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and leads research and development initiatives to advance the state-of-the-art in information systems security. 

Social Links for Dr. Cole:
YOUTUBE: https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA
TWITTER: https://twitter.com/drericcole​
FACEBOOK: https://www.facebook.com/DrEricCole/​
INSTAGRAM: https://www.instagram.com/drericcole/​

E-Books by Dr. Eric Cole:
Threat Hunting: https://ar407.isrefer.com/go/mm2ythun
Insider Threat: https://ar407.isrefer.com/go/mm2ytit/...​
Online Danger: https://www.onlinedanger.com]]>
      </description>
      <content:encoded>
        <![CDATA[Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is the founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and leads research and development initiatives to advance the state-of-the-art in information systems security. 

Social Links for Dr. Cole:
YOUTUBE: https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA
TWITTER: https://twitter.com/drericcole​
FACEBOOK: https://www.facebook.com/DrEricCole/​
INSTAGRAM: https://www.instagram.com/drericcole/​

E-Books by Dr. Eric Cole:
Threat Hunting: https://ar407.isrefer.com/go/mm2ythun
Insider Threat: https://ar407.isrefer.com/go/mm2ytit/...​
Online Danger: https://www.onlinedanger.com]]>
      </content:encoded>
      <pubDate>Thu, 01 Apr 2021 20:35:34 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/630c48e1/5c8502fc.mp3" length="44795728" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2800</itunes:duration>
      <itunes:summary>Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, including Advanced Persistent Threat, Hackers Beware, Hiding in Plain Sight, Network Security Bible 2nd Edition, and Insider Threat. He is the inventor of over 20 patents and is a researcher, writer, and speaker. He is also a member of the Commission on Cyber Security for the 44th President and several executive advisory boards. Dr. Cole is the founder and an executive leader at Secure Anchor Consulting where he provides leading-edge cybersecurity consulting services, expert witness work, and leads research and development initiatives to advance the state-of-the-art in information systems security. 

Social Links for Dr. Cole:
YOUTUBE: https://www.youtube.com/channel/UCwg_j4TF1dnP9OZFXzYussA
TWITTER: https://twitter.com/drericcole​
FACEBOOK: https://www.facebook.com/DrEricCole/​
INSTAGRAM: https://www.instagram.com/drericcole/​

E-Books by Dr. Eric Cole:
Threat Hunting: https://ar407.isrefer.com/go/mm2ythun
Insider Threat: https://ar407.isrefer.com/go/mm2ytit/...​
Online Danger: https://www.onlinedanger.com</itunes:summary>
      <itunes:subtitle>Dr. Cole has a master's degree in computer science from NYIT and a doctorate from Pace University with a concentration in information security. He served as CTO of McAfee and Chief Scientist for Lockheed Martin. Dr. Cole is the author of several books, in</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hiram Machado on Identity Governance</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Hiram Machado on Identity Governance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1018721824</guid>
      <link>https://share.transistor.fm/s/4a14e30d</link>
      <description>
        <![CDATA[Hiram Machado, CEO of adaQuest, talks about various aspects of Identity Governance including Zero Trust and Privileged Identity Management (PIM).]]>
      </description>
      <content:encoded>
        <![CDATA[Hiram Machado, CEO of adaQuest, talks about various aspects of Identity Governance including Zero Trust and Privileged Identity Management (PIM).]]>
      </content:encoded>
      <pubDate>Tue, 30 Mar 2021 17:08:49 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/4a14e30d/4276c3c2.mp3" length="34252313" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2141</itunes:duration>
      <itunes:summary>Hiram Machado, CEO of adaQuest, talks about various aspects of Identity Governance including Zero Trust and Privileged Identity Management (PIM).</itunes:summary>
      <itunes:subtitle>Hiram Machado, CEO of adaQuest, talks about various aspects of Identity Governance including Zero Trust and Privileged Identity Management (PIM).</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Zaid Sabih Al Quraishi, CEO at zSecurity</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Zaid Sabih Al Quraishi, CEO at zSecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/1014041377</guid>
      <link>https://share.transistor.fm/s/80661e2e</link>
      <description>
        <![CDATA[Zaid Sabih Al Quraishi, CEO at zSecurity and online educator provides an update on his popular courses such as "Learn Ethical Hacking from Scratch," some new courses and content, as well as the recently launched bug bounty platform, www.bug-bounty.com.

Zaid's courses can be found in the following locations:
www.udemy.com/user/zaidsabih/
zsecurity.org/courses/]]>
      </description>
      <content:encoded>
        <![CDATA[Zaid Sabih Al Quraishi, CEO at zSecurity and online educator provides an update on his popular courses such as "Learn Ethical Hacking from Scratch," some new courses and content, as well as the recently launched bug bounty platform, www.bug-bounty.com.

Zaid's courses can be found in the following locations:
www.udemy.com/user/zaidsabih/
zsecurity.org/courses/]]>
      </content:encoded>
      <pubDate>Tue, 23 Mar 2021 00:17:07 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/80661e2e/3198a29f.mp3" length="34588774" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2162</itunes:duration>
      <itunes:summary>Zaid Sabih Al Quraishi, CEO at zSecurity and online educator provides an update on his popular courses such as "Learn Ethical Hacking from Scratch," some new courses and content, as well as the recently launched bug bounty platform, www.bug-bounty.com.

Zaid's courses can be found in the following locations:
www.udemy.com/user/zaidsabih/
zsecurity.org/courses/</itunes:summary>
      <itunes:subtitle>Zaid Sabih Al Quraishi, CEO at zSecurity and online educator provides an update on his popular courses such as "Learn Ethical Hacking from Scratch," some new courses and content, as well as the recently launched bug bounty platform, www.bug-bounty.com.

Z</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Jim Bowers, Security Architect for TBI</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Jim Bowers, Security Architect for TBI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/988157608</guid>
      <link>https://share.transistor.fm/s/1d51f4f3</link>
      <description>
        <![CDATA[Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. 

His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk management to phishing training and simulation, DDOS mitigation, endpoint protection and Managed SOC.]]>
      </description>
      <content:encoded>
        <![CDATA[Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. 

His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk management to phishing training and simulation, DDOS mitigation, endpoint protection and Managed SOC.]]>
      </content:encoded>
      <pubDate>Mon, 22 Feb 2021 17:38:44 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/1d51f4f3/d4dc3f62.mp3" length="43541456" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2722</itunes:duration>
      <itunes:summary>Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. 

His expertise ranges from architecting complete security infrastructure, to assessments for vulnerabilities, risk management to phishing training and simulation, DDOS mitigation, endpoint protection and Managed SOC.</itunes:summary>
      <itunes:subtitle>Jim Bowers is Security Architect for TBI, a Chicago-based master agent. An authority in cybersecurity, Bowers has more than 20 years of in-depth security engineering knowledge gained in finance, healthcare, manufacturing and technology. 

His expertise ra</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Self-Sovereign Identity Authors Alex Preukschat &amp; Shannon Appelcline</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Self-Sovereign Identity Authors Alex Preukschat &amp; Shannon Appelcline</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/980513338</guid>
      <link>https://share.transistor.fm/s/847051f8</link>
      <description>
        <![CDATA[Alex Preukschat &amp; Shannon Appelcline co-authors of Self-Sovereign Identity; 
Decentralized digital identity and verifiable credentials explain what Self-Sovereign Identity (SSI) is, why it's important, and provide examples of practical applications for individuals and organizations.

Secure Talk listeners are eligible to receive fee copies (5 max) of the e-book Self-Sovereign Identity; 
Decentralized digital identity and verifiable credentials by using the following
coupon codes:
 
ssstsrt-489B
ssstsrt-9707
ssstsrt-7BF1
ssstsrt-2ACE
ssstsrt-089E
 
You can refer to this link: http://mng.bz/q98N]]>
      </description>
      <content:encoded>
        <![CDATA[Alex Preukschat &amp; Shannon Appelcline co-authors of Self-Sovereign Identity; 
Decentralized digital identity and verifiable credentials explain what Self-Sovereign Identity (SSI) is, why it's important, and provide examples of practical applications for individuals and organizations.

Secure Talk listeners are eligible to receive fee copies (5 max) of the e-book Self-Sovereign Identity; 
Decentralized digital identity and verifiable credentials by using the following
coupon codes:
 
ssstsrt-489B
ssstsrt-9707
ssstsrt-7BF1
ssstsrt-2ACE
ssstsrt-089E
 
You can refer to this link: http://mng.bz/q98N]]>
      </content:encoded>
      <pubDate>Mon, 08 Feb 2021 16:34:41 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/847051f8/6dbc7a2b.mp3" length="59999464" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3750</itunes:duration>
      <itunes:summary>Alex Preukschat &amp;amp; Shannon Appelcline co-authors of Self-Sovereign Identity; 
Decentralized digital identity and verifiable credentials explain what Self-Sovereign Identity (SSI) is, why it's important, and provide examples of practical applications for individuals and organizations.

Secure Talk listeners are eligible to receive fee copies (5 max) of the e-book Self-Sovereign Identity; 
Decentralized digital identity and verifiable credentials by using the following
coupon codes:
 
ssstsrt-489B
ssstsrt-9707
ssstsrt-7BF1
ssstsrt-2ACE
ssstsrt-089E
 
You can refer to this link: http://mng.bz/q98N</itunes:summary>
      <itunes:subtitle>Alex Preukschat &amp;amp; Shannon Appelcline co-authors of Self-Sovereign Identity; 
Decentralized digital identity and verifiable credentials explain what Self-Sovereign Identity (SSI) is, why it's important, and provide examples of practical applications fo</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Bina Ramamurthy, Author of Blockchain in Action</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Bina Ramamurthy, Author of Blockchain in Action</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/970768546</guid>
      <link>https://share.transistor.fm/s/97a4e51a</link>
      <description>
        <![CDATA[Bina Ramamurthy Ph.D. is a Director at Blockchain Thinklab, a Professor at The University of Buffalo, and the author of Block Chain in Action.

Bina's book can be found here:
https://www.manning.com/books/blockchain-in-action?query=block

Bina's online blockchain courses can be found here:
https://www.coursera.org/specializations/blockchain]]>
      </description>
      <content:encoded>
        <![CDATA[Bina Ramamurthy Ph.D. is a Director at Blockchain Thinklab, a Professor at The University of Buffalo, and the author of Block Chain in Action.

Bina's book can be found here:
https://www.manning.com/books/blockchain-in-action?query=block

Bina's online blockchain courses can be found here:
https://www.coursera.org/specializations/blockchain]]>
      </content:encoded>
      <pubDate>Fri, 22 Jan 2021 19:17:03 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/97a4e51a/87d5cf5c.mp3" length="46780648" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2924</itunes:duration>
      <itunes:summary>Bina Ramamurthy Ph.D. is a Director at Blockchain Thinklab, a Professor at The University of Buffalo, and the author of Block Chain in Action.

Bina's book can be found here:
https://www.manning.com/books/blockchain-in-action?query=block

Bina's online blockchain courses can be found here:
https://www.coursera.org/specializations/blockchain</itunes:summary>
      <itunes:subtitle>Bina Ramamurthy Ph.D. is a Director at Blockchain Thinklab, a Professor at The University of Buffalo, and the author of Block Chain in Action.

Bina's book can be found here:
https://www.manning.com/books/blockchain-in-action?query=block

Bina's online bl</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Neil Madden, Author of API Security in Action</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Neil Madden, Author of API Security in Action</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/969994282</guid>
      <link>https://share.transistor.fm/s/cf765b5c</link>
      <description>
        <![CDATA[Neil Madden, Security Director at ForgeRock and author of API Security in Action provides an overview of API security, how to establish security goals, protect important assets, identify relevant threat models.

Neil's book can be found here:
https://www.manning.com/books/api-security-in-action

Please use these coupon codes to receive a 30 percent discount.
apisecrf-7175
apisecrf-CC64
apisecrf-2FFC
apisecrf-41AE
apisecrf-42FE

Neil's Twitter: @neilmaddog
Neil's Blog: https://neilmadden.blog/]]>
      </description>
      <content:encoded>
        <![CDATA[Neil Madden, Security Director at ForgeRock and author of API Security in Action provides an overview of API security, how to establish security goals, protect important assets, identify relevant threat models.

Neil's book can be found here:
https://www.manning.com/books/api-security-in-action

Please use these coupon codes to receive a 30 percent discount.
apisecrf-7175
apisecrf-CC64
apisecrf-2FFC
apisecrf-41AE
apisecrf-42FE

Neil's Twitter: @neilmaddog
Neil's Blog: https://neilmadden.blog/]]>
      </content:encoded>
      <pubDate>Thu, 21 Jan 2021 16:33:38 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/cf765b5c/0454dea7.mp3" length="36969890" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2311</itunes:duration>
      <itunes:summary>Neil Madden, Security Director at ForgeRock and author of API Security in Action provides an overview of API security, how to establish security goals, protect important assets, identify relevant threat models.

Neil's book can be found here:
https://www.manning.com/books/api-security-in-action

Please use these coupon codes to receive a 30 percent discount.
apisecrf-7175
apisecrf-CC64
apisecrf-2FFC
apisecrf-41AE
apisecrf-42FE

Neil's Twitter: @neilmaddog
Neil's Blog: https://neilmadden.blog/</itunes:summary>
      <itunes:subtitle>Neil Madden, Security Director at ForgeRock and author of API Security in Action provides an overview of API security, how to establish security goals, protect important assets, identify relevant threat models.

Neil's book can be found here:
https://www.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Julien Vehent, Author of Securing DevOps</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Julien Vehent, Author of Securing DevOps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/968114266</guid>
      <link>https://share.transistor.fm/s/c3cc35d3</link>
      <description>
        <![CDATA[Julien Vehent, Security Engineering Manager at Google and author of Securing DevOps talks about the importance and best practices related to securing DevOps.  

Julien's book Securing DevOps can be found here:
https://www.manning.com/books/securing-devops

Free eBook codes (each good for one copy of Securing DevOps), listeners of the SecureTalk Podcast:
scdvprf-A9D5
scdvprf-CB81
scdvprf-0C8B
scdvprf-57E0
scdvprf-9DCB

 These can be redeemed at: http://mng.bz/Qmre

For a 35% discount code (good for all Manning Publication products in all formats) use the code: podsectalk20  at this link: http://mng.bz/zryB  (good for two months)]]>
      </description>
      <content:encoded>
        <![CDATA[Julien Vehent, Security Engineering Manager at Google and author of Securing DevOps talks about the importance and best practices related to securing DevOps.  

Julien's book Securing DevOps can be found here:
https://www.manning.com/books/securing-devops

Free eBook codes (each good for one copy of Securing DevOps), listeners of the SecureTalk Podcast:
scdvprf-A9D5
scdvprf-CB81
scdvprf-0C8B
scdvprf-57E0
scdvprf-9DCB

 These can be redeemed at: http://mng.bz/Qmre

For a 35% discount code (good for all Manning Publication products in all formats) use the code: podsectalk20  at this link: http://mng.bz/zryB  (good for two months)]]>
      </content:encoded>
      <pubDate>Tue, 19 Jan 2021 17:25:53 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c3cc35d3/32906e6a.mp3" length="38971910" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2436</itunes:duration>
      <itunes:summary>Julien Vehent, Security Engineering Manager at Google and author of Securing DevOps talks about the importance and best practices related to securing DevOps.  

Julien's book Securing DevOps can be found here:
https://www.manning.com/books/securing-devops

Free eBook codes (each good for one copy of Securing DevOps), listeners of the SecureTalk Podcast:
scdvprf-A9D5
scdvprf-CB81
scdvprf-0C8B
scdvprf-57E0
scdvprf-9DCB

 These can be redeemed at: http://mng.bz/Qmre

For a 35% discount code (good for all Manning Publication products in all formats) use the code: podsectalk20  at this link: http://mng.bz/zryB  (good for two months)</itunes:summary>
      <itunes:subtitle>Julien Vehent, Security Engineering Manager at Google and author of Securing DevOps talks about the importance and best practices related to securing DevOps.  

Julien's book Securing DevOps can be found here:
https://www.manning.com/books/securing-devops</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Sedat Kapanoglu, Author of Street Coder; The Rules to Break and How to Break Them</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Sedat Kapanoglu, Author of Street Coder; The Rules to Break and How to Break Them</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/960019243</guid>
      <link>https://share.transistor.fm/s/43e445c1</link>
      <description>
        <![CDATA[Sedat Kapanoglu, Co-Founder of Eksi and author of Street Coder; The Rules to Break and How to Break Them, talks about his book and explains why, when, and how developers should challenge the status quo.  Sedat also shares his ideas on security and gives some excellent career advice for aspiring and mid-career coders.

Sedat's book can be found here:
https://www.manning.com/books/street-coder

The following coupon codes (1x use each) can be used for a free copy of Street Coder; The Rules to Break and How to Break Them

strsecr-0716
strsecr-029E
strsecr-34DB
strsecr-2304
strsecr-E12A

 Sedat's Twitter feed: @esesci]]>
      </description>
      <content:encoded>
        <![CDATA[Sedat Kapanoglu, Co-Founder of Eksi and author of Street Coder; The Rules to Break and How to Break Them, talks about his book and explains why, when, and how developers should challenge the status quo.  Sedat also shares his ideas on security and gives some excellent career advice for aspiring and mid-career coders.

Sedat's book can be found here:
https://www.manning.com/books/street-coder

The following coupon codes (1x use each) can be used for a free copy of Street Coder; The Rules to Break and How to Break Them

strsecr-0716
strsecr-029E
strsecr-34DB
strsecr-2304
strsecr-E12A

 Sedat's Twitter feed: @esesci]]>
      </content:encoded>
      <pubDate>Thu, 07 Jan 2021 15:38:58 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/43e445c1/11fc34e2.mp3" length="42013440" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2626</itunes:duration>
      <itunes:summary>Sedat Kapanoglu, Co-Founder of Eksi and author of Street Coder; The Rules to Break and How to Break Them, talks about his book and explains why, when, and how developers should challenge the status quo.  Sedat also shares his ideas on security and gives some excellent career advice for aspiring and mid-career coders.

Sedat's book can be found here:
https://www.manning.com/books/street-coder

The following coupon codes (1x use each) can be used for a free copy of Street Coder; The Rules to Break and How to Break Them

strsecr-0716
strsecr-029E
strsecr-34DB
strsecr-2304
strsecr-E12A

 Sedat's Twitter feed: @esesci</itunes:summary>
      <itunes:subtitle>Sedat Kapanoglu, Co-Founder of Eksi and author of Street Coder; The Rules to Break and How to Break Them, talks about his book and explains why, when, and how developers should challenge the status quo.  Sedat also shares his ideas on security and gives s</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Laurentiu Spilca Explain Spring Security for Java Applications</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Laurentiu Spilca Explain Spring Security for Java Applications</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/957338647</guid>
      <link>https://share.transistor.fm/s/383fd138</link>
      <description>
        <![CDATA[Java developer, trainer, speaker, and author, Laurentiu Spilca introduces Spring Security.  

Laurentiu's book Spring Security in Action can be found here:
https://www.manning.com/books/spring-security-in-action

Laurentiu's Youtube Channel:
https://www.youtube.com/channel/UC0z3MpVGrpSZzClXrYcZBfw]]>
      </description>
      <content:encoded>
        <![CDATA[Java developer, trainer, speaker, and author, Laurentiu Spilca introduces Spring Security.  

Laurentiu's book Spring Security in Action can be found here:
https://www.manning.com/books/spring-security-in-action

Laurentiu's Youtube Channel:
https://www.youtube.com/channel/UC0z3MpVGrpSZzClXrYcZBfw]]>
      </content:encoded>
      <pubDate>Mon, 04 Jan 2021 17:00:04 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/383fd138/43a2c761.mp3" length="48660226" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3042</itunes:duration>
      <itunes:summary>Java developer, trainer, speaker, and author, Laurentiu Spilca introduces Spring Security.  

Laurentiu's book Spring Security in Action can be found here:
https://www.manning.com/books/spring-security-in-action

Laurentiu's Youtube Channel:
https://www.youtube.com/channel/UC0z3MpVGrpSZzClXrYcZBfw</itunes:summary>
      <itunes:subtitle>Java developer, trainer, speaker, and author, Laurentiu Spilca introduces Spring Security.  

Laurentiu's book Spring Security in Action can be found here:
https://www.manning.com/books/spring-security-in-action

Laurentiu's Youtube Channel:
https://www.y</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Rois Ni Thuama, Head of Cyber Governance at Red Sift</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Rois Ni Thuama, Head of Cyber Governance at Red Sift</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/936853468</guid>
      <link>https://share.transistor.fm/s/5bbea429</link>
      <description>
        <![CDATA[Rois Ni Thuama, Heady of Cyber Governance at Red Sift, talks about two of the most important threats in the cyber landscape, disinformation and Business Email Compromise (BEC), and provides ideas on how to combat each.

As a special offer to Secure Talk listeners, Red Sift is offering a 15 percent discount on their OnDMARC solution that stops spoofing attacks and blocks email impersonation. 

For more info, please visit:  https://ondmarc.redsift.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Rois Ni Thuama, Heady of Cyber Governance at Red Sift, talks about two of the most important threats in the cyber landscape, disinformation and Business Email Compromise (BEC), and provides ideas on how to combat each.

As a special offer to Secure Talk listeners, Red Sift is offering a 15 percent discount on their OnDMARC solution that stops spoofing attacks and blocks email impersonation. 

For more info, please visit:  https://ondmarc.redsift.com/]]>
      </content:encoded>
      <pubDate>Mon, 30 Nov 2020 15:53:42 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/5bbea429/a1108433.mp3" length="47435595" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2965</itunes:duration>
      <itunes:summary>Rois Ni Thuama, Heady of Cyber Governance at Red Sift, talks about two of the most important threats in the cyber landscape, disinformation and Business Email Compromise (BEC), and provides ideas on how to combat each.

As a special offer to Secure Talk listeners, Red Sift is offering a 15 percent discount on their OnDMARC solution that stops spoofing attacks and blocks email impersonation. 

For more info, please visit:  https://ondmarc.redsift.com/</itunes:summary>
      <itunes:subtitle>Rois Ni Thuama, Heady of Cyber Governance at Red Sift, talks about two of the most important threats in the cyber landscape, disinformation and Business Email Compromise (BEC), and provides ideas on how to combat each.

As a special offer to Secure Talk l</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Paul Clayson, CEO of AgilePQ</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Paul Clayson, CEO of AgilePQ</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/931017754</guid>
      <link>https://share.transistor.fm/s/85350b6b</link>
      <description>
        <![CDATA[Paul Clayson, CEO of AgilePQ talks about the challenges and importance of securing IoT devices, and introduces some ideas on how best to make them safe.]]>
      </description>
      <content:encoded>
        <![CDATA[Paul Clayson, CEO of AgilePQ talks about the challenges and importance of securing IoT devices, and introduces some ideas on how best to make them safe.]]>
      </content:encoded>
      <pubDate>Tue, 17 Nov 2020 17:41:08 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/85350b6b/c9875c71.mp3" length="47217397" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2951</itunes:duration>
      <itunes:summary>Paul Clayson, CEO of AgilePQ talks about the challenges and importance of securing IoT devices, and introduces some ideas on how best to make them safe.</itunes:summary>
      <itunes:subtitle>Paul Clayson, CEO of AgilePQ talks about the challenges and importance of securing IoT devices, and introduces some ideas on how best to make them safe.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Privacy Law Update with Attorney Cecilia Jeong</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Privacy Law Update with Attorney Cecilia Jeong</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/928142005</guid>
      <link>https://share.transistor.fm/s/0115f007</link>
      <description>
        <![CDATA[Privacy attorney Cecilia Jeong provides an update on the regulatory landscape related to data privacy and provides some great suggestions on how companies can quickly minimize business and regulatory risk.

Cecilia can be contacted via: www.vedderprice.com/new-york]]>
      </description>
      <content:encoded>
        <![CDATA[Privacy attorney Cecilia Jeong provides an update on the regulatory landscape related to data privacy and provides some great suggestions on how companies can quickly minimize business and regulatory risk.

Cecilia can be contacted via: www.vedderprice.com/new-york]]>
      </content:encoded>
      <pubDate>Thu, 12 Nov 2020 18:21:38 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/0115f007/f161ee09.mp3" length="43129356" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2696</itunes:duration>
      <itunes:summary>Privacy attorney Cecilia Jeong provides an update on the regulatory landscape related to data privacy and provides some great suggestions on how companies can quickly minimize business and regulatory risk.

Cecilia can be contacted via: www.vedderprice.com/new-york</itunes:summary>
      <itunes:subtitle>Privacy attorney Cecilia Jeong provides an update on the regulatory landscape related to data privacy and provides some great suggestions on how companies can quickly minimize business and regulatory risk.

Cecilia can be contacted via: www.vedderprice.co</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Thomas Kranz, Author of Making Sense of Cyber Security</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Thomas Kranz, Author of Making Sense of Cyber Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/922825918</guid>
      <link>https://share.transistor.fm/s/63357739</link>
      <description>
        <![CDATA[Cyber Security consultant and author Thomas Kranz talks about his book, Making Sense of Cyber Security, and introduces his common sense approach on the topic.

https://tomkranz.com/
http://www.siliconbunny.com/

Manning Publications has provided Secure Talk with five free copies  of the e-book Making Sense of Cyber Security.
 
scrmcs-D9FB
scrmcs-707E
scrmcs-9E82
scrmcs-F6C2
scrmcs-4701

Please use this link to access: http://mng.bz/0ZPN

Manning Publications has also provided all Secure Talk listeners a permanent 35 percent discount coupon on all items on its site

Coupon: podsectalk20

You can refer to this link: http://mng.bz/zryB]]>
      </description>
      <content:encoded>
        <![CDATA[Cyber Security consultant and author Thomas Kranz talks about his book, Making Sense of Cyber Security, and introduces his common sense approach on the topic.

https://tomkranz.com/
http://www.siliconbunny.com/

Manning Publications has provided Secure Talk with five free copies  of the e-book Making Sense of Cyber Security.
 
scrmcs-D9FB
scrmcs-707E
scrmcs-9E82
scrmcs-F6C2
scrmcs-4701

Please use this link to access: http://mng.bz/0ZPN

Manning Publications has also provided all Secure Talk listeners a permanent 35 percent discount coupon on all items on its site

Coupon: podsectalk20

You can refer to this link: http://mng.bz/zryB]]>
      </content:encoded>
      <pubDate>Tue, 03 Nov 2020 18:23:53 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/63357739/a0f40d42.mp3" length="40470725" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2530</itunes:duration>
      <itunes:summary>Cyber Security consultant and author Thomas Kranz talks about his book, Making Sense of Cyber Security, and introduces his common sense approach on the topic.

https://tomkranz.com/
http://www.siliconbunny.com/

Manning Publications has provided Secure Talk with five free copies  of the e-book Making Sense of Cyber Security.
 
scrmcs-D9FB
scrmcs-707E
scrmcs-9E82
scrmcs-F6C2
scrmcs-4701

Please use this link to access: http://mng.bz/0ZPN

Manning Publications has also provided all Secure Talk listeners a permanent 35 percent discount coupon on all items on its site

Coupon: podsectalk20

You can refer to this link: http://mng.bz/zryB</itunes:summary>
      <itunes:subtitle>Cyber Security consultant and author Thomas Kranz talks about his book, Making Sense of Cyber Security, and introduces his common sense approach on the topic.

https://tomkranz.com/
http://www.siliconbunny.com/

Manning Publications has provided Secure Ta</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Ins and Outs of Azure Sentinel with Microsoft's Edward Walton</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>The Ins and Outs of Azure Sentinel with Microsoft's Edward Walton</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/911708206</guid>
      <link>https://share.transistor.fm/s/f8a4e1b2</link>
      <description>
        <![CDATA[Edward Walton, Technical Specialist and Global Black Belt for Advanced Security Analytics at Microsoft provides an overview of Microsoft's SIEM Azure Sentinel.]]>
      </description>
      <content:encoded>
        <![CDATA[Edward Walton, Technical Specialist and Global Black Belt for Advanced Security Analytics at Microsoft provides an overview of Microsoft's SIEM Azure Sentinel.]]>
      </content:encoded>
      <pubDate>Fri, 16 Oct 2020 16:08:10 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/f8a4e1b2/e3537a27.mp3" length="35605692" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2226</itunes:duration>
      <itunes:summary>Edward Walton, Technical Specialist and Global Black Belt for Advanced Security Analytics at Microsoft provides an overview of Microsoft's SIEM Azure Sentinel.</itunes:summary>
      <itunes:subtitle>Edward Walton, Technical Specialist and Global Black Belt for Advanced Security Analytics at Microsoft provides an overview of Microsoft's SIEM Azure Sentinel.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Kip Boyle shares advice on how best to find a cybersecurity job and "Your Cyber Path"</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Kip Boyle shares advice on how best to find a cybersecurity job and "Your Cyber Path"</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/903502723</guid>
      <link>https://share.transistor.fm/s/78feaaae</link>
      <description>
        <![CDATA[Kip Boyle, Virtual CISO, author of “Fire Doesn't Innovate”, and host of the Your Cyber Path podcast shares valuable insights on how people can move into the cybersecurity industry.

https://anchor.fm/yourcyberpath
https://www.yourcyberpath.com/pdf]]>
      </description>
      <content:encoded>
        <![CDATA[Kip Boyle, Virtual CISO, author of “Fire Doesn't Innovate”, and host of the Your Cyber Path podcast shares valuable insights on how people can move into the cybersecurity industry.

https://anchor.fm/yourcyberpath
https://www.yourcyberpath.com/pdf]]>
      </content:encoded>
      <pubDate>Mon, 05 Oct 2020 16:02:53 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/78feaaae/3c3977db.mp3" length="38048265" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2378</itunes:duration>
      <itunes:summary>Kip Boyle, Virtual CISO, author of “Fire Doesn't Innovate”, and host of the Your Cyber Path podcast shares valuable insights on how people can move into the cybersecurity industry.

https://anchor.fm/yourcyberpath
https://www.yourcyberpath.com/pdf</itunes:summary>
      <itunes:subtitle>Kip Boyle, Virtual CISO, author of “Fire Doesn't Innovate”, and host of the Your Cyber Path podcast shares valuable insights on how people can move into the cybersecurity industry.

https://anchor.fm/yourcyberpath
https://www.yourcyberpath.com/pdf</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Security Education w/Gabriel Friedlander, CEO of Wizer</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Cyber Security Education w/Gabriel Friedlander, CEO of Wizer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/898306660</guid>
      <link>https://share.transistor.fm/s/f6803660</link>
      <description>
        <![CDATA[Gabriel "Gabby" Friedlander talks about the importance of cyber security education for individuals and company employees.  Gabby also introduces the Wizer platform and shares his thoughts on effective training programs.

For more information on Wizer's training programs please visit: www.wizer-training.com]]>
      </description>
      <content:encoded>
        <![CDATA[Gabriel "Gabby" Friedlander talks about the importance of cyber security education for individuals and company employees.  Gabby also introduces the Wizer platform and shares his thoughts on effective training programs.

For more information on Wizer's training programs please visit: www.wizer-training.com]]>
      </content:encoded>
      <pubDate>Wed, 23 Sep 2020 17:23:25 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/f6803660/56ec31db.mp3" length="34264038" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2142</itunes:duration>
      <itunes:summary>Gabriel "Gabby" Friedlander talks about the importance of cyber security education for individuals and company employees.  Gabby also introduces the Wizer platform and shares his thoughts on effective training programs.

For more information on Wizer's training programs please visit: www.wizer-training.com</itunes:summary>
      <itunes:subtitle>Gabriel "Gabby" Friedlander talks about the importance of cyber security education for individuals and company employees.  Gabby also introduces the Wizer platform and shares his thoughts on effective training programs.

For more information on Wizer's tr</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Greg Edwards, CEO of CryptoStopper on Malware Attack Detection &amp; Prevention</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Greg Edwards, CEO of CryptoStopper on Malware Attack Detection &amp; Prevention</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/885123787</guid>
      <link>https://share.transistor.fm/s/64ef0376</link>
      <description>
        <![CDATA[CryptoStopper CEO Greg Edwards talks about detecting and preventing malware attacks.

www.getcryptostopper.com]]>
      </description>
      <content:encoded>
        <![CDATA[CryptoStopper CEO Greg Edwards talks about detecting and preventing malware attacks.

www.getcryptostopper.com]]>
      </content:encoded>
      <pubDate>Mon, 31 Aug 2020 16:33:41 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/64ef0376/8eee5701.mp3" length="36806916" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2301</itunes:duration>
      <itunes:summary>CryptoStopper CEO Greg Edwards talks about detecting and preventing malware attacks.

www.getcryptostopper.com</itunes:summary>
      <itunes:subtitle>CryptoStopper CEO Greg Edwards talks about detecting and preventing malware attacks.

www.getcryptostopper.com</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#35 Hiram Machado, CEO of adaQuest on the Value of Network Scans</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>#35 Hiram Machado, CEO of adaQuest on the Value of Network Scans</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/881238511</guid>
      <link>https://share.transistor.fm/s/ad77d3ea</link>
      <description>
        <![CDATA[adaQuest CEO, Hiram Machado explains how companies can get an accurate snap shot of their security and compliance posture and also discover opportunities for cost savings by using a network scan.]]>
      </description>
      <content:encoded>
        <![CDATA[adaQuest CEO, Hiram Machado explains how companies can get an accurate snap shot of their security and compliance posture and also discover opportunities for cost savings by using a network scan.]]>
      </content:encoded>
      <pubDate>Mon, 24 Aug 2020 17:05:05 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ad77d3ea/7a124d23.mp3" length="35030997" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2190</itunes:duration>
      <itunes:summary>adaQuest CEO, Hiram Machado explains how companies can get an accurate snap shot of their security and compliance posture and also discover opportunities for cost savings by using a network scan.</itunes:summary>
      <itunes:subtitle>adaQuest CEO, Hiram Machado explains how companies can get an accurate snap shot of their security and compliance posture and also discover opportunities for cost savings by using a network scan.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#34 Paul Katzoff, CEO of WhiteCanyon Software</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>#34 Paul Katzoff, CEO of WhiteCanyon Software</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/879159334</guid>
      <link>https://share.transistor.fm/s/ef7774a0</link>
      <description>
        <![CDATA[Paul Katzoff, CEO of WhiteCanyon Software talks about the importance of data disposal and explains how WhiteCanyon's solutions work.]]>
      </description>
      <content:encoded>
        <![CDATA[Paul Katzoff, CEO of WhiteCanyon Software talks about the importance of data disposal and explains how WhiteCanyon's solutions work.]]>
      </content:encoded>
      <pubDate>Thu, 20 Aug 2020 17:46:28 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ef7774a0/6074064a.mp3" length="31747908" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1985</itunes:duration>
      <itunes:summary>Paul Katzoff, CEO of WhiteCanyon Software talks about the importance of data disposal and explains how WhiteCanyon's solutions work.</itunes:summary>
      <itunes:subtitle>Paul Katzoff, CEO of WhiteCanyon Software talks about the importance of data disposal and explains how WhiteCanyon's solutions work.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Productivity &amp; Security with Microsoft Teams</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Productivity &amp; Security with Microsoft Teams</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/847103317</guid>
      <link>https://share.transistor.fm/s/2b76e04a</link>
      <description>
        <![CDATA[Cloud Solution Architect, Christophe Koehl introduces some of his favorites features of Microsoft Teams, as well as best practices for increasing productivity and improving security.]]>
      </description>
      <content:encoded>
        <![CDATA[Cloud Solution Architect, Christophe Koehl introduces some of his favorites features of Microsoft Teams, as well as best practices for increasing productivity and improving security.]]>
      </content:encoded>
      <pubDate>Fri, 26 Jun 2020 04:06:54 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/2b76e04a/b52e1d4b.mp3" length="39058849" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2442</itunes:duration>
      <itunes:summary>Cloud Solution Architect, Christophe Koehl introduces some of his favorites features of Microsoft Teams, as well as best practices for increasing productivity and improving security.</itunes:summary>
      <itunes:subtitle>Cloud Solution Architect, Christophe Koehl introduces some of his favorites features of Microsoft Teams, as well as best practices for increasing productivity and improving security.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Jonathan Hiroshi Rossi, CEO of Saya University</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Jonathan Hiroshi Rossi, CEO of Saya University</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/842988385</guid>
      <link>https://share.transistor.fm/s/3cab8b27</link>
      <description>
        <![CDATA[Jonathan Hiroshi Rossi, CEO &amp; Co-Founder of Saya University (SU) introduces SU and talks about the importance of awareness and education in mitigating cyber threats.

https://www.sayauniversity.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Jonathan Hiroshi Rossi, CEO &amp; Co-Founder of Saya University (SU) introduces SU and talks about the importance of awareness and education in mitigating cyber threats.

https://www.sayauniversity.com/]]>
      </content:encoded>
      <pubDate>Fri, 19 Jun 2020 08:51:43 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/3cab8b27/8bef0aab.mp3" length="33599051" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2100</itunes:duration>
      <itunes:summary>Jonathan Hiroshi Rossi, CEO &amp;amp; Co-Founder of Saya University (SU) introduces SU and talks about the importance of awareness and education in mitigating cyber threats.

https://www.sayauniversity.com/</itunes:summary>
      <itunes:subtitle>Jonathan Hiroshi Rossi, CEO &amp;amp; Co-Founder of Saya University (SU) introduces SU and talks about the importance of awareness and education in mitigating cyber threats.

https://www.sayauniversity.com/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Windows Autopilot with Christophe Koehl</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Windows Autopilot with Christophe Koehl</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/608488509</guid>
      <link>https://share.transistor.fm/s/9b59e217</link>
      <description>
        <![CDATA[Christophe Koehl, Cloud Solution Architect at adaQuest, explains the benefits of WIndows Autopilot, how it's used and deployed, and how it's helping IT managers to more efficiently and securely provision new devices.]]>
      </description>
      <content:encoded>
        <![CDATA[Christophe Koehl, Cloud Solution Architect at adaQuest, explains the benefits of WIndows Autopilot, how it's used and deployed, and how it's helping IT managers to more efficiently and securely provision new devices.]]>
      </content:encoded>
      <pubDate>Mon, 22 Apr 2019 12:42:25 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9b59e217/51e1b910.mp3" length="28848102" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1803</itunes:duration>
      <itunes:summary>Christophe Koehl, Cloud Solution Architect at adaQuest, explains the benefits of WIndows Autopilot, how it's used and deployed, and how it's helping IT managers to more efficiently and securely provision new devices.</itunes:summary>
      <itunes:subtitle>Christophe Koehl, Cloud Solution Architect at adaQuest, explains the benefits of WIndows Autopilot, how it's used and deployed, and how it's helping IT managers to more efficiently and securely provision new devices.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>João Couto, Director of Operations adaQuest Brazil</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>João Couto, Director of Operations adaQuest Brazil</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/606402252</guid>
      <link>https://share.transistor.fm/s/4ea46615</link>
      <description>
        <![CDATA[João Couto, Director of Operations for adaQuest Brazil talks about the current threat landscape and latest trends in data protection and cyber security in Brazil.]]>
      </description>
      <content:encoded>
        <![CDATA[João Couto, Director of Operations for adaQuest Brazil talks about the current threat landscape and latest trends in data protection and cyber security in Brazil.]]>
      </content:encoded>
      <pubDate>Mon, 15 Apr 2019 17:24:44 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/4ea46615/993c6268.mp3" length="36491332" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2281</itunes:duration>
      <itunes:summary>João Couto, Director of Operations for adaQuest Brazil talks about the current threat landscape and latest trends in data protection and cyber security in Brazil.</itunes:summary>
      <itunes:subtitle>João Couto, Director of Operations for adaQuest Brazil talks about the current threat landscape and latest trends in data protection and cyber security in Brazil.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Rise of the Virtual CISO, with Hiram Machado</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>The Rise of the Virtual CISO, with Hiram Machado</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/593658324</guid>
      <link>https://share.transistor.fm/s/4d2a9813</link>
      <description>
        <![CDATA[adaQuest CEO, Hiram Machado, talks about the increasing popularity and importance of virtual CISO, their benefits and advantages.]]>
      </description>
      <content:encoded>
        <![CDATA[adaQuest CEO, Hiram Machado, talks about the increasing popularity and importance of virtual CISO, their benefits and advantages.]]>
      </content:encoded>
      <pubDate>Thu, 21 Mar 2019 17:05:18 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/4d2a9813/ff3a62a9.mp3" length="31975699" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1999</itunes:duration>
      <itunes:summary>adaQuest CEO, Hiram Machado, talks about the increasing popularity and importance of virtual CISO, their benefits and advantages.</itunes:summary>
      <itunes:subtitle>adaQuest CEO, Hiram Machado, talks about the increasing popularity and importance of virtual CISO, their benefits and advantages.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Richard Lewis, Best Practices for Security Minded Organizations &amp; Application Security Development</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Richard Lewis, Best Practices for Security Minded Organizations &amp; Application Security Development</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/588470499</guid>
      <link>https://share.transistor.fm/s/ff823651</link>
      <description>
        <![CDATA[Richard Lewis shares his experience and insights related to creating a security minded culture inside organizations and leading people-focused application security development.]]>
      </description>
      <content:encoded>
        <![CDATA[Richard Lewis shares his experience and insights related to creating a security minded culture inside organizations and leading people-focused application security development.]]>
      </content:encoded>
      <pubDate>Mon, 11 Mar 2019 17:49:33 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/ff823651/f152a824.mp3" length="41221006" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2577</itunes:duration>
      <itunes:summary>Richard Lewis shares his experience and insights related to creating a security minded culture inside organizations and leading people-focused application security development.</itunes:summary>
      <itunes:subtitle>Richard Lewis shares his experience and insights related to creating a security minded culture inside organizations and leading people-focused application security development.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Edward Walton Discusses Shadow IT</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Edward Walton Discusses Shadow IT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/584986764</guid>
      <link>https://share.transistor.fm/s/8db20d8d</link>
      <description>
        <![CDATA[Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.]]>
      </description>
      <content:encoded>
        <![CDATA[Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.]]>
      </content:encoded>
      <pubDate>Mon, 04 Mar 2019 20:43:48 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/8db20d8d/0fc74d53.mp3" length="39216827" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2451</itunes:duration>
      <itunes:summary>Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.</itunes:summary>
      <itunes:subtitle>Edward Walton, CISSP and Cloud Solution Architect at Microsoft gives an overview of Shadow IT and explains some of the best methods for dealing with this rapidly growing phenomenon.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cecilia Jeong, Privacy Attorney</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Cecilia Jeong, Privacy Attorney</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/570284250</guid>
      <link>https://share.transistor.fm/s/4ef0a184</link>
      <description>
        <![CDATA[Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson &amp; Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.]]>
      </description>
      <content:encoded>
        <![CDATA[Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson &amp; Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.]]>
      </content:encoded>
      <pubDate>Tue, 05 Feb 2019 13:38:01 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/4ef0a184/499ba03a.mp3" length="42446814" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2653</itunes:duration>
      <itunes:summary>Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson &amp;amp; Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.</itunes:summary>
      <itunes:subtitle>Cecilia Jeong, corporate and privacy attorney at Schwabe, Williamson &amp;amp; Wyatt, talk about the compliance and regulatory landscape for data protection and privacy.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Kip Boyle, Founder and CEO of Cyber Risk Opportunities</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Kip Boyle, Founder and CEO of Cyber Risk Opportunities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/567197784</guid>
      <link>https://share.transistor.fm/s/7301d7b2</link>
      <description>
        <![CDATA[Kip Boyle, founder and CEO of Cyber Risk Opportunities.  Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force's F-22 Raptor program and a working as a senior consultant for Stanford Research Institute (SRI).

Kip is also the author of, Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks.

https://www.cyberriskopportunities.com/
https://www.firedoesntinnovate.com/]]>
      </description>
      <content:encoded>
        <![CDATA[Kip Boyle, founder and CEO of Cyber Risk Opportunities.  Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force's F-22 Raptor program and a working as a senior consultant for Stanford Research Institute (SRI).

Kip is also the author of, Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks.

https://www.cyberriskopportunities.com/
https://www.firedoesntinnovate.com/]]>
      </content:encoded>
      <pubDate>Wed, 30 Jan 2019 15:47:44 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/7301d7b2/ca6ae242.mp3" length="53051715" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>3316</itunes:duration>
      <itunes:summary>Kip Boyle, founder and CEO of Cyber Risk Opportunities.  Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force's F-22 Raptor program and a working as a senior consultant for Stanford Research Institute (SRI).

Kip is also the author of, Fire Doesn’t Innovate: The Executive’s Practical Guide to Thriving in the Face of Evolving Cyber Risks.

https://www.cyberriskopportunities.com/
https://www.firedoesntinnovate.com/</itunes:summary>
      <itunes:subtitle>Kip Boyle, founder and CEO of Cyber Risk Opportunities.  Kip has worked in a variety of cybersecurity roles since 1992 including serving as the director of wide area network security for the Air Force's F-22 Raptor program and a working as a senior consul</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Andrea Fisher, Global Cyber Defense Specialist at Microsoft</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Andrea Fisher, Global Cyber Defense Specialist at Microsoft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/561220047</guid>
      <link>https://share.transistor.fm/s/d5633155</link>
      <description>
        <![CDATA[Andrea Fisher, Global Cyber Defense Specialist at Microsoft explains why Windows 10 has displaced Windows 7 and talk about some of the amazing security and productivity features and tools that are built in to Windows 10.]]>
      </description>
      <content:encoded>
        <![CDATA[Andrea Fisher, Global Cyber Defense Specialist at Microsoft explains why Windows 10 has displaced Windows 7 and talk about some of the amazing security and productivity features and tools that are built in to Windows 10.]]>
      </content:encoded>
      <pubDate>Sat, 19 Jan 2019 00:07:16 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d5633155/4e9cb367.mp3" length="35343625" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2209</itunes:duration>
      <itunes:summary>Andrea Fisher, Global Cyber Defense Specialist at Microsoft explains why Windows 10 has displaced Windows 7 and talk about some of the amazing security and productivity features and tools that are built in to Windows 10.</itunes:summary>
      <itunes:subtitle>Andrea Fisher, Global Cyber Defense Specialist at Microsoft explains why Windows 10 has displaced Windows 7 and talk about some of the amazing security and productivity features and tools that are built in to Windows 10.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Hiram Machado, adaQuest CEO</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Hiram Machado, adaQuest CEO</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/550701444</guid>
      <link>https://share.transistor.fm/s/2f2553e1</link>
      <description>
        <![CDATA[adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.]]>
      </description>
      <content:encoded>
        <![CDATA[adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.]]>
      </content:encoded>
      <pubDate>Thu, 27 Dec 2018 17:26:16 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/2f2553e1/0d33c1c5.mp3" length="30144181" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1884</itunes:duration>
      <itunes:summary>adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.</itunes:summary>
      <itunes:subtitle>adaQuest CEO, Hiram Machado and Secure Talk Host, Mark Shriner discuss some recent newsworthy security breaches, and industry and governmental trends related to data protection and compliance.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Andrea Fisher Provides an Overview of Windows 10</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Andrea Fisher Provides an Overview of Windows 10</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/507970314</guid>
      <link>https://share.transistor.fm/s/15339656</link>
      <description>
        <![CDATA[Andrea Fisher, Technical Specialist at Microsoft provides an overview of Windows 10 and many of the security related features.]]>
      </description>
      <content:encoded>
        <![CDATA[Andrea Fisher, Technical Specialist at Microsoft provides an overview of Windows 10 and many of the security related features.]]>
      </content:encoded>
      <pubDate>Mon, 01 Oct 2018 18:38:15 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/15339656/a7749679.mp3" length="31931813" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1996</itunes:duration>
      <itunes:summary>Andrea Fisher, Technical Specialist at Microsoft provides an overview of Windows 10 and many of the security related features.</itunes:summary>
      <itunes:subtitle>Andrea Fisher, Technical Specialist at Microsoft provides an overview of Windows 10 and many of the security related features.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Plurilock CEO Ian Paterson Talks About Post Login Authentication</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Plurilock CEO Ian Paterson Talks About Post Login Authentication</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/493396473</guid>
      <link>https://share.transistor.fm/s/edbac652</link>
      <description>
        <![CDATA[Ian Paterson, CEO of Plurilock, explains how behavioral biometrics can be used to perform post login authentication.]]>
      </description>
      <content:encoded>
        <![CDATA[Ian Paterson, CEO of Plurilock, explains how behavioral biometrics can be used to perform post login authentication.]]>
      </content:encoded>
      <pubDate>Fri, 31 Aug 2018 18:08:35 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/edbac652/42d7284c.mp3" length="29191689" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1825</itunes:duration>
      <itunes:summary>Ian Paterson, CEO of Plurilock, explains how behavioral biometrics can be used to perform post login authentication.</itunes:summary>
      <itunes:subtitle>Ian Paterson, CEO of Plurilock, explains how behavioral biometrics can be used to perform post login authentication.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Matt Soseman Talks About Developments with MFA, Conditional Access, Windows Hello and More!</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Matt Soseman Talks About Developments with MFA, Conditional Access, Windows Hello and More!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/491792973</guid>
      <link>https://share.transistor.fm/s/3797b537</link>
      <description>
        <![CDATA[Security Architect Matt Soseman talks about recent developments in multi-factor authentication (MFA), conditional access, data protection, and other areas related to cybersecurity.]]>
      </description>
      <content:encoded>
        <![CDATA[Security Architect Matt Soseman talks about recent developments in multi-factor authentication (MFA), conditional access, data protection, and other areas related to cybersecurity.]]>
      </content:encoded>
      <pubDate>Tue, 28 Aug 2018 13:07:04 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/3797b537/dd766787.mp3" length="32151285" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2010</itunes:duration>
      <itunes:summary>Security Architect Matt Soseman talks about recent developments in multi-factor authentication (MFA), conditional access, data protection, and other areas related to cybersecurity.</itunes:summary>
      <itunes:subtitle>Security Architect Matt Soseman talks about recent developments in multi-factor authentication (MFA), conditional access, data protection, and other areas related to cybersecurity.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Interview with Rudolph Araujo from Awake Security</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Interview with Rudolph Araujo from Awake Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/490904217</guid>
      <link>https://share.transistor.fm/s/50e0b185</link>
      <description>
        <![CDATA[VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake's technology helps organizations to prevent, detect, and respond to non-malware "living off the land" attacks.]]>
      </description>
      <content:encoded>
        <![CDATA[VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake's technology helps organizations to prevent, detect, and respond to non-malware "living off the land" attacks.]]>
      </content:encoded>
      <pubDate>Sun, 26 Aug 2018 16:30:24 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/50e0b185/e4ce1b73.mp3" length="33274717" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2080</itunes:duration>
      <itunes:summary>VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake's technology helps organizations to prevent, detect, and respond to non-malware "living off the land" attacks.</itunes:summary>
      <itunes:subtitle>VP of Marketing from Awake Security, Rudolph Araujo, explains why he joined Awake Security and how Awake's technology helps organizations to prevent, detect, and respond to non-malware "living off the land" attacks.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Interview with Trusona Founder &amp; CEO, Ori Eisen</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Interview with Trusona Founder &amp; CEO, Ori Eisen</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/477235476</guid>
      <link>https://share.transistor.fm/s/a9ea8327</link>
      <description>
        <![CDATA[Trusona Founder &amp; CEO, Ori Eisen, talks about how passwords can and should be replaced, and provides an introduction to Trusona's passwordless solutions.]]>
      </description>
      <content:encoded>
        <![CDATA[Trusona Founder &amp; CEO, Ori Eisen, talks about how passwords can and should be replaced, and provides an introduction to Trusona's passwordless solutions.]]>
      </content:encoded>
      <pubDate>Fri, 27 Jul 2018 00:09:58 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/a9ea8327/45305424.mp3" length="21336547" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1334</itunes:duration>
      <itunes:summary>Trusona Founder &amp;amp; CEO, Ori Eisen, talks about how passwords can and should be replaced, and provides an introduction to Trusona's passwordless solutions.</itunes:summary>
      <itunes:subtitle>Trusona Founder &amp;amp; CEO, Ori Eisen, talks about how passwords can and should be replaced, and provides an introduction to Trusona's passwordless solutions.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Insurance - Part 2</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Cyber Insurance - Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/469533402</guid>
      <link>https://share.transistor.fm/s/d0e3fcdf</link>
      <description>
        <![CDATA[Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and gives examples of how it can help companies that have been cyber attacked.
(This is part 2 of a 2 part podcast)]]>
      </description>
      <content:encoded>
        <![CDATA[Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and gives examples of how it can help companies that have been cyber attacked.
(This is part 2 of a 2 part podcast)]]>
      </content:encoded>
      <pubDate>Mon, 09 Jul 2018 22:56:40 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d0e3fcdf/692c0db4.mp3" length="29352563" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1835</itunes:duration>
      <itunes:summary>Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and gives examples of how it can help companies that have been cyber attacked.
(This is part 2 of a 2 part podcast)</itunes:summary>
      <itunes:subtitle>Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and gives examples of how it can help companies that have been cyber attacked.
(This is part 2 of a 2 part podcast)</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber Insurance - Part 1</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Cyber Insurance - Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/461930136</guid>
      <link>https://share.transistor.fm/s/c6f5b187</link>
      <description>
        <![CDATA[Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and what buyers should be looking for when they purchase a cyber insurance policy.
(This is part 1 of a 2 part podcast)]]>
      </description>
      <content:encoded>
        <![CDATA[Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and what buyers should be looking for when they purchase a cyber insurance policy.
(This is part 1 of a 2 part podcast)]]>
      </content:encoded>
      <pubDate>Fri, 22 Jun 2018 15:34:26 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c6f5b187/d7d8311d.mp3" length="21608198" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1351</itunes:duration>
      <itunes:summary>Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and what buyers should be looking for when they purchase a cyber insurance policy.
(This is part 1 of a 2 part podcast)</itunes:summary>
      <itunes:subtitle>Brian King, VP at AHT Insurance provides an overview of cyber insurance, explaining why it's important, how it's used, and what buyers should be looking for when they purchase a cyber insurance policy.
(This is part 1 of a 2 part podcast)</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#15 Interview with Zaid Al-Quraishi, Ethical Hacker and Founder of zSecurity</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>#15 Interview with Zaid Al-Quraishi, Ethical Hacker and Founder of zSecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/455147661</guid>
      <link>https://share.transistor.fm/s/c7b72621</link>
      <description>
        <![CDATA[Zaid Al-Quraishi, Founder and CTO of zSecurity talks about ethical hacking, how he got started as an ethical hacker, working as an ethical hacker, and his on-line courses on ethical hacking.

https://www.udemy.com/user/zaidsabih/]]>
      </description>
      <content:encoded>
        <![CDATA[Zaid Al-Quraishi, Founder and CTO of zSecurity talks about ethical hacking, how he got started as an ethical hacker, working as an ethical hacker, and his on-line courses on ethical hacking.

https://www.udemy.com/user/zaidsabih/]]>
      </content:encoded>
      <pubDate>Thu, 07 Jun 2018 16:31:05 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c7b72621/09066e38.mp3" length="37310976" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2332</itunes:duration>
      <itunes:summary>Zaid Al-Quraishi, Founder and CTO of zSecurity talks about ethical hacking, how he got started as an ethical hacker, working as an ethical hacker, and his on-line courses on ethical hacking.

https://www.udemy.com/user/zaidsabih/</itunes:summary>
      <itunes:subtitle>Zaid Al-Quraishi, Founder and CTO of zSecurity talks about ethical hacking, how he got started as an ethical hacker, working as an ethical hacker, and his on-line courses on ethical hacking.

https://www.udemy.com/user/zaidsabih/</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#14 Office 365 Secure Score &amp; Security Tune-Up</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>#14 Office 365 Secure Score &amp; Security Tune-Up</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/451427640</guid>
      <link>https://share.transistor.fm/s/6d0a3627</link>
      <description>
        <![CDATA[Security Architect Christophe Koehl from adaQuest explains how organizations can quickly assess and improve their IT security posture using the O365 Secure Score and Security Tune-Up by simply activating security, data protection, and reporting features that are already included in Office 365.]]>
      </description>
      <content:encoded>
        <![CDATA[Security Architect Christophe Koehl from adaQuest explains how organizations can quickly assess and improve their IT security posture using the O365 Secure Score and Security Tune-Up by simply activating security, data protection, and reporting features that are already included in Office 365.]]>
      </content:encoded>
      <pubDate>Wed, 30 May 2018 21:23:04 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/6d0a3627/ad690022.mp3" length="29650172" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1854</itunes:duration>
      <itunes:summary>Security Architect Christophe Koehl from adaQuest explains how organizations can quickly assess and improve their IT security posture using the O365 Secure Score and Security Tune-Up by simply activating security, data protection, and reporting features that are already included in Office 365.</itunes:summary>
      <itunes:subtitle>Security Architect Christophe Koehl from adaQuest explains how organizations can quickly assess and improve their IT security posture using the O365 Secure Score and Security Tune-Up by simply activating security, data protection, and reporting features t</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#13 Multi-Factor Authentication (MFA), Conditional Access, &amp; Passwords</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>#13 Multi-Factor Authentication (MFA), Conditional Access, &amp; Passwords</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/449217807</guid>
      <link>https://share.transistor.fm/s/b77b01d7</link>
      <description>
        <![CDATA[Security Solutions Architect David Ducolon talks about best practices related to MFA, conditional access, passwords, and more!]]>
      </description>
      <content:encoded>
        <![CDATA[Security Solutions Architect David Ducolon talks about best practices related to MFA, conditional access, passwords, and more!]]>
      </content:encoded>
      <pubDate>Fri, 25 May 2018 22:34:01 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b77b01d7/7ac7454f.mp3" length="43128962" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2696</itunes:duration>
      <itunes:summary>Security Solutions Architect David Ducolon talks about best practices related to MFA, conditional access, passwords, and more!</itunes:summary>
      <itunes:subtitle>Security Solutions Architect David Ducolon talks about best practices related to MFA, conditional access, passwords, and more!</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>A Review of GDPR, Cryptojacking, and More....</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>A Review of GDPR, Cryptojacking, and More....</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/446070522</guid>
      <link>https://share.transistor.fm/s/e348ab6b</link>
      <description>
        <![CDATA[adaQuest CEO, HIram Machado joins Secure Talk Host, Mark Shriner, to talk about GDPR compliance plans, the rise of cryptojacking, and more shenanigans from Equifax.]]>
      </description>
      <content:encoded>
        <![CDATA[adaQuest CEO, HIram Machado joins Secure Talk Host, Mark Shriner, to talk about GDPR compliance plans, the rise of cryptojacking, and more shenanigans from Equifax.]]>
      </content:encoded>
      <pubDate>Sat, 19 May 2018 00:12:47 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/e348ab6b/86f621dd.mp3" length="25521152" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1595</itunes:duration>
      <itunes:summary>adaQuest CEO, HIram Machado joins Secure Talk Host, Mark Shriner, to talk about GDPR compliance plans, the rise of cryptojacking, and more shenanigans from Equifax.</itunes:summary>
      <itunes:subtitle>adaQuest CEO, HIram Machado joins Secure Talk Host, Mark Shriner, to talk about GDPR compliance plans, the rise of cryptojacking, and more shenanigans from Equifax.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Get a Cybersecurity Job!</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>How to Get a Cybersecurity Job!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/441918780</guid>
      <link>https://share.transistor.fm/s/db9b8eee</link>
      <description>
        <![CDATA[Technical Recruiter Dan Leiter of TEKsystems gives advice to those looking to enter the cybersecurity industry, explains what employers are looking for, what jobs are most in demand, what the current salary ranges are, and what companies are doing to recruit, develop and retain cybersecurity professionals. A very informative show!]]>
      </description>
      <content:encoded>
        <![CDATA[Technical Recruiter Dan Leiter of TEKsystems gives advice to those looking to enter the cybersecurity industry, explains what employers are looking for, what jobs are most in demand, what the current salary ranges are, and what companies are doing to recruit, develop and retain cybersecurity professionals. A very informative show!]]>
      </content:encoded>
      <pubDate>Thu, 10 May 2018 03:10:22 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/db9b8eee/7e66ef69.mp3" length="22352172" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1397</itunes:duration>
      <itunes:summary>Technical Recruiter Dan Leiter of TEKsystems gives advice to those looking to enter the cybersecurity industry, explains what employers are looking for, what jobs are most in demand, what the current salary ranges are, and what companies are doing to recruit, develop and retain cybersecurity professionals. A very informative show!</itunes:summary>
      <itunes:subtitle>Technical Recruiter Dan Leiter of TEKsystems gives advice to those looking to enter the cybersecurity industry, explains what employers are looking for, what jobs are most in demand, what the current salary ranges are, and what companies are doing to recr</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#10 Interview with  Cybersecurity Consultant &amp; Station X CEO Nathan House</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>#10 Interview with  Cybersecurity Consultant &amp; Station X CEO Nathan House</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/438422505</guid>
      <link>https://share.transistor.fm/s/57b78958</link>
      <description>
        <![CDATA[Nathan House CEO of Station X and leading on-line cybersecurity educator provides career advice for aspiring and existing cybersecurity professionals, talks about his courses, and shares his thoughts on the industry, credentials, advanced degrees, and the changing threat landscape.]]>
      </description>
      <content:encoded>
        <![CDATA[Nathan House CEO of Station X and leading on-line cybersecurity educator provides career advice for aspiring and existing cybersecurity professionals, talks about his courses, and shares his thoughts on the industry, credentials, advanced degrees, and the changing threat landscape.]]>
      </content:encoded>
      <pubDate>Wed, 02 May 2018 19:04:32 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/57b78958/83d561ba.mp3" length="41451631" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1728</itunes:duration>
      <itunes:summary>Nathan House CEO of Station X and leading on-line cybersecurity educator provides career advice for aspiring and existing cybersecurity professionals, talks about his courses, and shares his thoughts on the industry, credentials, advanced degrees, and the changing threat landscape.</itunes:summary>
      <itunes:subtitle>Nathan House CEO of Station X and leading on-line cybersecurity educator provides career advice for aspiring and existing cybersecurity professionals, talks about his courses, and shares his thoughts on the industry, credentials, advanced degrees, and the</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#9 Interview with ISSA Puget Sound Chapter President Justin White</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>#9 Interview with ISSA Puget Sound Chapter President Justin White</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/436149075</guid>
      <link>https://share.transistor.fm/s/9d1af663</link>
      <description>
        <![CDATA[Justin White talks explains how he got his start in cybersecurity and risk management, shares his thoughts on education and trends related to cybersecurity, the importance and evolution of the ISSA, and more!]]>
      </description>
      <content:encoded>
        <![CDATA[Justin White talks explains how he got his start in cybersecurity and risk management, shares his thoughts on education and trends related to cybersecurity, the importance and evolution of the ISSA, and more!]]>
      </content:encoded>
      <pubDate>Fri, 27 Apr 2018 20:40:31 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/9d1af663/b1496253.mp3" length="37695487" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2356</itunes:duration>
      <itunes:summary>Justin White talks explains how he got his start in cybersecurity and risk management, shares his thoughts on education and trends related to cybersecurity, the importance and evolution of the ISSA, and more!</itunes:summary>
      <itunes:subtitle>Justin White talks explains how he got his start in cybersecurity and risk management, shares his thoughts on education and trends related to cybersecurity, the importance and evolution of the ISSA, and more!</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to Successfully Integrate a Newly Acquired Company onto Your IT Platform</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>How to Successfully Integrate a Newly Acquired Company onto Your IT Platform</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/433068357</guid>
      <link>https://share.transistor.fm/s/dcdbf6c7</link>
      <description>
        <![CDATA[Hiram Machado discusses best practices for IT and cybersecurity related due diligence for M&amp;A pre-acquisition and for post acquisition integration.]]>
      </description>
      <content:encoded>
        <![CDATA[Hiram Machado discusses best practices for IT and cybersecurity related due diligence for M&amp;A pre-acquisition and for post acquisition integration.]]>
      </content:encoded>
      <pubDate>Sat, 21 Apr 2018 14:39:41 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/dcdbf6c7/f4530be6.mp3" length="24889228" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1556</itunes:duration>
      <itunes:summary>Hiram Machado discusses best practices for IT and cybersecurity related due diligence for M&amp;amp;A pre-acquisition and for post acquisition integration.</itunes:summary>
      <itunes:subtitle>Hiram Machado discusses best practices for IT and cybersecurity related due diligence for M&amp;amp;A pre-acquisition and for post acquisition integration.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#7 Security Architect Matt Soseman</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>#7 Security Architect Matt Soseman</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/427228470</guid>
      <link>https://share.transistor.fm/s/320ea8e9</link>
      <description>
        <![CDATA[Microsoft's Matt Soseman gives an overview of several security-related assessments that are provided by Microsoft and its partners to help customers discovery potential issues and improve their security posture. 

Matt's blog can be found at: https://blogs.technet.microsoft.com/skypehybridguy/]]>
      </description>
      <content:encoded>
        <![CDATA[Microsoft's Matt Soseman gives an overview of several security-related assessments that are provided by Microsoft and its partners to help customers discovery potential issues and improve their security posture. 

Matt's blog can be found at: https://blogs.technet.microsoft.com/skypehybridguy/]]>
      </content:encoded>
      <pubDate>Mon, 09 Apr 2018 18:07:46 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/320ea8e9/c75a49a8.mp3" length="38608278" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2413</itunes:duration>
      <itunes:summary>Microsoft's Matt Soseman gives an overview of several security-related assessments that are provided by Microsoft and its partners to help customers discovery potential issues and improve their security posture. 

Matt's blog can be found at: https://blogs.technet.microsoft.com/skypehybridguy/</itunes:summary>
      <itunes:subtitle>Microsoft's Matt Soseman gives an overview of several security-related assessments that are provided by Microsoft and its partners to help customers discovery potential issues and improve their security posture. 

Matt's blog can be found at: https://blog</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#6 Paul Shares His Thoughts About Taking the CISSP Exam</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>#6 Paul Shares His Thoughts About Taking the CISSP Exam</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/422594427</guid>
      <link>https://share.transistor.fm/s/2167143d</link>
      <description>
        <![CDATA[Paul from adaQuest tells us about his reasons for taking the CISSP, his preparation, topics covered, and what passing the CISSP means to him.]]>
      </description>
      <content:encoded>
        <![CDATA[Paul from adaQuest tells us about his reasons for taking the CISSP, his preparation, topics covered, and what passing the CISSP means to him.]]>
      </content:encoded>
      <pubDate>Sat, 31 Mar 2018 01:03:24 +0000</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/2167143d/98e20fa4.mp3" length="15597139" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>975</itunes:duration>
      <itunes:summary>Paul from adaQuest tells us about his reasons for taking the CISSP, his preparation, topics covered, and what passing the CISSP means to him.</itunes:summary>
      <itunes:subtitle>Paul from adaQuest tells us about his reasons for taking the CISSP, his preparation, topics covered, and what passing the CISSP means to him.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>GDPR - What is it?  How to prepare?</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>GDPR - What is it?  How to prepare?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/413769714</guid>
      <link>https://share.transistor.fm/s/d0f6c2b4</link>
      <description>
        <![CDATA[In this episode we talk about GDPR.  We explain what is GDPR, why it is important, and how to prepare.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode we talk about GDPR.  We explain what is GDPR, why it is important, and how to prepare.]]>
      </content:encoded>
      <pubDate>Wed, 14 Mar 2018 21:26:27 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/d0f6c2b4/86566c6c.mp3" length="29639711" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1853</itunes:duration>
      <itunes:summary>In this episode we talk about GDPR.  We explain what is GDPR, why it is important, and how to prepare.</itunes:summary>
      <itunes:subtitle>In this episode we talk about GDPR.  We explain what is GDPR, why it is important, and how to prepare.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>#4 - Where do I start?</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>#4 - Where do I start?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/410891463</guid>
      <link>https://share.transistor.fm/s/dfa28ff3</link>
      <description>
        <![CDATA[In this episode the cybersecurity team from adaQuest role plays an initial customer meeting and talks about data discovery, data protection, network scans, patch policies, cloud migration plans, and more!]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode the cybersecurity team from adaQuest role plays an initial customer meeting and talks about data discovery, data protection, network scans, patch policies, cloud migration plans, and more!]]>
      </content:encoded>
      <pubDate>Fri, 09 Mar 2018 02:46:40 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/dfa28ff3/6cdf06e3.mp3" length="33645837" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>2103</itunes:duration>
      <itunes:summary>In this episode the cybersecurity team from adaQuest role plays an initial customer meeting and talks about data discovery, data protection, network scans, patch policies, cloud migration plans, and more!</itunes:summary>
      <itunes:subtitle>In this episode the cybersecurity team from adaQuest role plays an initial customer meeting and talks about data discovery, data protection, network scans, patch policies, cloud migration plans, and more!</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode #3 - Threat Detection &amp; Protection</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode #3 - Threat Detection &amp; Protection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/406782027</guid>
      <link>https://share.transistor.fm/s/c622527f</link>
      <description>
        <![CDATA[In this episode we look at the current threat landscape and discuss different ways to detect and respond to threats and intrusions.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode we look at the current threat landscape and discuss different ways to detect and respond to threats and intrusions.]]>
      </content:encoded>
      <pubDate>Thu, 01 Mar 2018 00:05:04 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/c622527f/d42996bd.mp3" length="29002330" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1813</itunes:duration>
      <itunes:summary>In this episode we look at the current threat landscape and discuss different ways to detect and respond to threats and intrusions.</itunes:summary>
      <itunes:subtitle>In this episode we look at the current threat landscape and discuss different ways to detect and respond to threats and intrusions.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode #2 - Data Protection</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode #2 - Data Protection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/406244316</guid>
      <link>https://share.transistor.fm/s/888db941</link>
      <description>
        <![CDATA[Hiram and Mark discuss the importance of data protection and the tools, techniques, and processes used to protect an organisation's data.]]>
      </description>
      <content:encoded>
        <![CDATA[Hiram and Mark discuss the importance of data protection and the tools, techniques, and processes used to protect an organisation's data.]]>
      </content:encoded>
      <pubDate>Tue, 27 Feb 2018 23:39:18 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/888db941/8f969c0f.mp3" length="29987028" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1875</itunes:duration>
      <itunes:summary>Hiram and Mark discuss the importance of data protection and the tools, techniques, and processes used to protect an organisation's data.</itunes:summary>
      <itunes:subtitle>Hiram and Mark discuss the importance of data protection and the tools, techniques, and processes used to protect an organisation's data.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Emerging Paradigm for IT Security</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>The Emerging Paradigm for IT Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">tag:soundcloud,2010:tracks/400789164</guid>
      <link>https://share.transistor.fm/s/b0e31aea</link>
      <description>
        <![CDATA[In this episode we compare the traditional "perimeter" approach to cybersecurity with the emerging approach the is entered on identity.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode we compare the traditional "perimeter" approach to cybersecurity with the emerging approach the is entered on identity.]]>
      </content:encoded>
      <pubDate>Fri, 16 Feb 2018 22:52:00 -0100</pubDate>
      <author>Justin Beals</author>
      <enclosure url="https://media.transistor.fm/b0e31aea/2da638cf.mp3" length="29379743" type="audio/mpeg"/>
      <itunes:author>Justin Beals</itunes:author>
      <itunes:duration>1837</itunes:duration>
      <itunes:summary>In this episode we compare the traditional "perimeter" approach to cybersecurity with the emerging approach the is entered on identity.</itunes:summary>
      <itunes:subtitle>In this episode we compare the traditional "perimeter" approach to cybersecurity with the emerging approach the is entered on identity.</itunes:subtitle>
      <itunes:keywords>security, cybersecurity, databreach, compliance, privacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
