<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/the-38north-security-podcast" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>The 38North Security Podcast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/the-38north-security-podcast</itunes:new-feed-url>
    <description>Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at info@38northsecurity.com.</description>
    <copyright>© 2025 38North Security</copyright>
    <podcast:guid>35780ee0-5dcb-5e91-8c62-7cd1cc67742c</podcast:guid>
    <podcast:locked owner="38northsocial@gmail.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Mon, 28 Jul 2025 15:59:31 -0400</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 22:29:48 -0500</lastBuildDate>
    <image>
      <url>https://img.transistor.fm/xVz3Q6vRIO8afrcbMOPq8ijm00ss1DzPwR0ipGrJyvo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQ5MjM0LzE3MDY2/MzQ4NDEtYXJ0d29y/ay5qcGc.jpg</url>
      <title>The 38North Security Podcast</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:type>serial</itunes:type>
    <itunes:author>38North Security</itunes:author>
    <itunes:image href="https://img.transistor.fm/xVz3Q6vRIO8afrcbMOPq8ijm00ss1DzPwR0ipGrJyvo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzQ5MjM0LzE3MDY2/MzQ4NDEtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at info@38northsecurity.com.</itunes:summary>
    <itunes:subtitle>Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity.</itunes:subtitle>
    <itunes:keywords>cybersecurity, FedRAMP, IRAP, CMMC</itunes:keywords>
    <itunes:owner>
      <itunes:name>Ingrid Woodley</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Refresher: What's in The FedRAMP Modernization Memo?</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Refresher: What's in The FedRAMP Modernization Memo?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f064207f-6aa8-49aa-b7a2-3a0a7fe1432b</guid>
      <link>https://share.transistor.fm/s/e4c41730</link>
      <description>
        <![CDATA[<p>We're about to see significant changes in the way FedRAMP is managed: automation, more pathways to authorization, and no more JAB. It's all in the name of modernization, baby! Well, that and the undeniable fact that the process to get more offerings in the FedRAMP marketplace needs to be much, much faster. But what does it all mean? How will it affect CSPs' efforts to get ATO? Matt Strasburg answers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We're about to see significant changes in the way FedRAMP is managed: automation, more pathways to authorization, and no more JAB. It's all in the name of modernization, baby! Well, that and the undeniable fact that the process to get more offerings in the FedRAMP marketplace needs to be much, much faster. But what does it all mean? How will it affect CSPs' efforts to get ATO? Matt Strasburg answers.</p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Jan 2024 15:51:03 -0500</pubDate>
      <author>38North Security</author>
      <enclosure url="https://media.transistor.fm/e4c41730/37144ca3.mp3" length="23952448" type="audio/mpeg"/>
      <itunes:author>38North Security</itunes:author>
      <itunes:duration>1498</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We're about to see significant changes in the way FedRAMP is managed: automation, more pathways to authorization, and no more JAB. It's all in the name of modernization, baby! Well, that and the undeniable fact that the process to get more offerings in the FedRAMP marketplace needs to be much, much faster. But what does it all mean? How will it affect CSPs' efforts to get ATO? Matt Strasburg answers.</p>]]>
      </itunes:summary>
      <itunes:keywords>FedRAMP, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>FedRAMP: Goodbye FedRAMP JAB! Hello TAG, Board, and FSCAC!</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>FedRAMP: Goodbye FedRAMP JAB! Hello TAG, Board, and FSCAC!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a8ab64ee-170b-4ff7-aa26-18c73068b88a</guid>
      <link>https://share.transistor.fm/s/c6208312</link>
      <description>
        <![CDATA[<p>FedRAMP just came out with *three* new bodies governing the program going forward: the TAG, the Board, and the FSCAC. There's a lot of uncertainty right now, not to mention confusion and misinformation. Why are these changes happening? What does it mean for CSPs, 3PAOs, and agencies? Is the JAB gone?!! Matt Strasburg and Jeremiah Thompson shed light on these massive changes and discuss their wide-reaching impact.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>FedRAMP just came out with *three* new bodies governing the program going forward: the TAG, the Board, and the FSCAC. There's a lot of uncertainty right now, not to mention confusion and misinformation. Why are these changes happening? What does it mean for CSPs, 3PAOs, and agencies? Is the JAB gone?!! Matt Strasburg and Jeremiah Thompson shed light on these massive changes and discuss their wide-reaching impact.</p>]]>
      </content:encoded>
      <pubDate>Mon, 10 Jun 2024 06:00:00 -0400</pubDate>
      <author>38North Security</author>
      <enclosure url="https://media.transistor.fm/c6208312/3975ea03.mp3" length="30777581" type="audio/mpeg"/>
      <itunes:author>38North Security</itunes:author>
      <itunes:duration>1926</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>FedRAMP just came out with *three* new bodies governing the program going forward: the TAG, the Board, and the FSCAC. There's a lot of uncertainty right now, not to mention confusion and misinformation. Why are these changes happening? What does it mean for CSPs, 3PAOs, and agencies? Is the JAB gone?!! Matt Strasburg and Jeremiah Thompson shed light on these massive changes and discuss their wide-reaching impact.</p>]]>
      </itunes:summary>
      <itunes:keywords>FedRAMP, cybersecurity, compliance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>GovRAMP: What Is It, Anyway?</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>GovRAMP: What Is It, Anyway?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f2a568f1-4a8b-43f7-b3f6-0a2ebf9b8b6a</guid>
      <link>https://share.transistor.fm/s/5ee31eeb</link>
      <description>
        <![CDATA[<p>Welcome to Part 1 of our <em>GovRAMP Mini-Series</em>—a quick, focused look at what GovRAMP is, why it matters, and how cloud service providers can use it to unlock the public sector. </p><p><br>In this episode, we tackle the basics: What exactly is GovRAMP? Why the rebrand from StateRAMP? And is this more than just a name change? </p><p><br><strong>Elizabeth Lopez</strong> helps us break it down. Liz, one of our cloud security technical writers here at 38North Security, has been deep in the weeds of policy, frameworks, and language—so she’s the perfect person to walk us through what GovRAMP is really all about. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to Part 1 of our <em>GovRAMP Mini-Series</em>—a quick, focused look at what GovRAMP is, why it matters, and how cloud service providers can use it to unlock the public sector. </p><p><br>In this episode, we tackle the basics: What exactly is GovRAMP? Why the rebrand from StateRAMP? And is this more than just a name change? </p><p><br><strong>Elizabeth Lopez</strong> helps us break it down. Liz, one of our cloud security technical writers here at 38North Security, has been deep in the weeds of policy, frameworks, and language—so she’s the perfect person to walk us through what GovRAMP is really all about. </p>]]>
      </content:encoded>
      <pubDate>Wed, 14 May 2025 17:42:40 -0400</pubDate>
      <author>38North Security</author>
      <enclosure url="https://media.transistor.fm/5ee31eeb/835b0f9c.mp3" length="5934449" type="audio/mpeg"/>
      <itunes:author>38North Security</itunes:author>
      <itunes:image href="https://img.transistor.fm/JjqE8UCW06Of6sANpeN2RVIXxpQ1hPAJEhUKW-hLhPk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80MGRk/YWY5NWIwNmJiZmU4/NGJlMzYyMjgzNTAw/NGZkZi5wbmc.jpg"/>
      <itunes:duration>369</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to Part 1 of our <em>GovRAMP Mini-Series</em>—a quick, focused look at what GovRAMP is, why it matters, and how cloud service providers can use it to unlock the public sector. </p><p><br>In this episode, we tackle the basics: What exactly is GovRAMP? Why the rebrand from StateRAMP? And is this more than just a name change? </p><p><br><strong>Elizabeth Lopez</strong> helps us break it down. Liz, one of our cloud security technical writers here at 38North Security, has been deep in the weeds of policy, frameworks, and language—so she’s the perfect person to walk us through what GovRAMP is really all about. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, compliance, FedRAMP, GovRAMP, 38North Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>GovRAMP: Why It’s a Smart Growth Move for Cloud Providers</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>GovRAMP: Why It’s a Smart Growth Move for Cloud Providers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">447f6311-0450-4177-bd77-b30259ef42ed</guid>
      <link>https://share.transistor.fm/s/b3dad91b</link>
      <description>
        <![CDATA[<p>This is Part 2 of the <em>GovRAMP Mini-Series</em>. In this episode, we’re digging into the big question: <strong>Why would a cloud provider pursue GovRAMP in the first place?</strong> </p><p><br>We’re joined by <strong>Jeremiah Thompson</strong>, 38North Security's VP of IT and Cloud Solutions. We also have <strong>Matt Strasburg</strong>, Manager of our Cloud Security Advisory practice. Jeremiah’s been in the compliance world for years and brings a pragmatic, strategic lens to why GovRAMP is gaining traction—not just for security reasons, but for smart market growth. Matt, on the other hand, has been pivotal in standing up similar federal programs in past years.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This is Part 2 of the <em>GovRAMP Mini-Series</em>. In this episode, we’re digging into the big question: <strong>Why would a cloud provider pursue GovRAMP in the first place?</strong> </p><p><br>We’re joined by <strong>Jeremiah Thompson</strong>, 38North Security's VP of IT and Cloud Solutions. We also have <strong>Matt Strasburg</strong>, Manager of our Cloud Security Advisory practice. Jeremiah’s been in the compliance world for years and brings a pragmatic, strategic lens to why GovRAMP is gaining traction—not just for security reasons, but for smart market growth. Matt, on the other hand, has been pivotal in standing up similar federal programs in past years.</p>]]>
      </content:encoded>
      <pubDate>Fri, 16 May 2025 16:41:01 -0400</pubDate>
      <author>38North Security</author>
      <enclosure url="https://media.transistor.fm/b3dad91b/dff841d4.mp3" length="7347225" type="audio/mpeg"/>
      <itunes:author>38North Security</itunes:author>
      <itunes:image href="https://img.transistor.fm/Kg5xCqXgxqY3k8u21ZAofRxzz6OOuRov0gL72oGdIzg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kNmNl/Zjg2MjcwNjcyYWM0/YjQxODZlMzQyOWYx/NDkwYS5wbmc.jpg"/>
      <itunes:duration>457</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>This is Part 2 of the <em>GovRAMP Mini-Series</em>. In this episode, we’re digging into the big question: <strong>Why would a cloud provider pursue GovRAMP in the first place?</strong> </p><p><br>We’re joined by <strong>Jeremiah Thompson</strong>, 38North Security's VP of IT and Cloud Solutions. We also have <strong>Matt Strasburg</strong>, Manager of our Cloud Security Advisory practice. Jeremiah’s been in the compliance world for years and brings a pragmatic, strategic lens to why GovRAMP is gaining traction—not just for security reasons, but for smart market growth. Matt, on the other hand, has been pivotal in standing up similar federal programs in past years.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, compliance, FedRAMP, GovRAMP, 38North Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>GovRAMP: Navigating the Path to Authorization</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>GovRAMP: Navigating the Path to Authorization</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d6b991a6-cfce-4136-a364-93a035d19733</guid>
      <link>https://share.transistor.fm/s/1e776bb2</link>
      <description>
        <![CDATA[<p>Welcome to Part 3, the final episode of our <em>GovRAMP Mini-Series</em>. Over the last two episodes, we’ve covered what GovRAMP is and why companies are pursuing it.</p><p>Today, we’re closing things out by getting tactical—what does the GovRAMP process actually look like from start to finish?</p><p>To walk us through it, we’re joined by Matt Strasburg, manager of our Cloud Security Advisory practice. Matt has guided dozens of companies through complex public sector frameworks, and he’s here to break down the steps, timelines, and fast-track options that cloud providers should know about.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to Part 3, the final episode of our <em>GovRAMP Mini-Series</em>. Over the last two episodes, we’ve covered what GovRAMP is and why companies are pursuing it.</p><p>Today, we’re closing things out by getting tactical—what does the GovRAMP process actually look like from start to finish?</p><p>To walk us through it, we’re joined by Matt Strasburg, manager of our Cloud Security Advisory practice. Matt has guided dozens of companies through complex public sector frameworks, and he’s here to break down the steps, timelines, and fast-track options that cloud providers should know about.</p>]]>
      </content:encoded>
      <pubDate>Wed, 28 May 2025 16:29:19 -0400</pubDate>
      <author>38North Security</author>
      <enclosure url="https://media.transistor.fm/1e776bb2/41ddf8ab.mp3" length="10458874" type="audio/mpeg"/>
      <itunes:author>38North Security</itunes:author>
      <itunes:image href="https://img.transistor.fm/vafT8lqLPcXIs1snjlEHoudPv44ApEBM-H49R9mESOg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hM2Jh/OTZiMDAzODA2OTJl/M2NkNTQyOWY5YjI3/NmI2OS5wbmc.jpg"/>
      <itunes:duration>652</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to Part 3, the final episode of our <em>GovRAMP Mini-Series</em>. Over the last two episodes, we’ve covered what GovRAMP is and why companies are pursuing it.</p><p>Today, we’re closing things out by getting tactical—what does the GovRAMP process actually look like from start to finish?</p><p>To walk us through it, we’re joined by Matt Strasburg, manager of our Cloud Security Advisory practice. Matt has guided dozens of companies through complex public sector frameworks, and he’s here to break down the steps, timelines, and fast-track options that cloud providers should know about.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, FedRAMP, IRAP, CMMC</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why Engineers Hate Compliance—And Why They’re Not Wrong</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Why Engineers Hate Compliance—And Why They’re Not Wrong</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e4d3dc6-36b0-40ea-b943-07288b5a3ef5</guid>
      <link>https://share.transistor.fm/s/d41885ed</link>
      <description>
        <![CDATA[<p>Welcome to Part 1 of our <em>Compliance Engineering Mini-Serie</em>s, a focused look at what it means to build secure, auditable systems by design.</p><p><br>In this kickoff episode, 38North Director of Engineering Larry Spector joins Chris Davis to talk about a familiar tension: engineers want to move fast, and compliance gets in the way. But what if the engineers are right? Or at least, right to feel the way they do?</p><p>Together, they explore:</p><ul><li>Why compliance often fails when it’s treated as a bolt-on</li><li>How audit fatigue and rework are symptoms of deeper engineering gaps</li><li>The difference between “checking boxes” and proving operational excellence</li><li>What it actually means to build systems that generate their own evidence</li></ul><p>Larry and Chris reframe the problem and set the stage for a new way of thinking about compliance, engineering, and trust.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to Part 1 of our <em>Compliance Engineering Mini-Serie</em>s, a focused look at what it means to build secure, auditable systems by design.</p><p><br>In this kickoff episode, 38North Director of Engineering Larry Spector joins Chris Davis to talk about a familiar tension: engineers want to move fast, and compliance gets in the way. But what if the engineers are right? Or at least, right to feel the way they do?</p><p>Together, they explore:</p><ul><li>Why compliance often fails when it’s treated as a bolt-on</li><li>How audit fatigue and rework are symptoms of deeper engineering gaps</li><li>The difference between “checking boxes” and proving operational excellence</li><li>What it actually means to build systems that generate their own evidence</li></ul><p>Larry and Chris reframe the problem and set the stage for a new way of thinking about compliance, engineering, and trust.</p>]]>
      </content:encoded>
      <pubDate>Mon, 28 Jul 2025 15:59:01 -0400</pubDate>
      <author>38North Security</author>
      <enclosure url="https://media.transistor.fm/d41885ed/b1a41e02.mp3" length="15811760" type="audio/mpeg"/>
      <itunes:author>38North Security</itunes:author>
      <itunes:image href="https://img.transistor.fm/CsTzB4xB-1gkiWOs5gcEjPcaK6wgbnfjojRDzQiVzk0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83Y2Q0/OWQ5MWQ2YjRhMjcx/MjhmODk5MjM3YzNk/MTEwZi5wbmc.jpg"/>
      <itunes:duration>986</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to Part 1 of our <em>Compliance Engineering Mini-Serie</em>s, a focused look at what it means to build secure, auditable systems by design.</p><p><br>In this kickoff episode, 38North Director of Engineering Larry Spector joins Chris Davis to talk about a familiar tension: engineers want to move fast, and compliance gets in the way. But what if the engineers are right? Or at least, right to feel the way they do?</p><p>Together, they explore:</p><ul><li>Why compliance often fails when it’s treated as a bolt-on</li><li>How audit fatigue and rework are symptoms of deeper engineering gaps</li><li>The difference between “checking boxes” and proving operational excellence</li><li>What it actually means to build systems that generate their own evidence</li></ul><p>Larry and Chris reframe the problem and set the stage for a new way of thinking about compliance, engineering, and trust.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, compliance engineering, FedRAMP</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
