<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/the-new-realities-of-cyber-security" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>The Cyber Security Podcast from PwC UK</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/the-new-realities-of-cyber-security</itunes:new-feed-url>
    <description>The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.</description>
    <copyright>PwC UK 2021 Copyright</copyright>
    <podcast:guid>bc24abd8-2b19-58e2-b1c5-ac3c779a01f1</podcast:guid>
    <podcast:locked owner="online.presence.uk.pwc@gmail.com">no</podcast:locked>
    <language>en-us</language>
    <pubDate>Tue, 10 Dec 2024 11:30:24 +0000</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 21:01:09 +0000</lastBuildDate>
    <link>https://www.pwc.co.uk/cybersecurity</link>
    <image>
      <url>https://img.transistor.fm/25Mmiy1YHKf9zhX7SyZ99EirojH205qwgmAo3HOl8mU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/Lzg2MDQvMTYyNTEz/OTIwOC1hcnR3b3Jr/LmpwZw.jpg</url>
      <title>The Cyber Security Podcast from PwC UK</title>
      <link>https://www.pwc.co.uk/cybersecurity</link>
    </image>
    <itunes:category text="Business"/>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>PwC UK</itunes:author>
    <itunes:image href="https://img.transistor.fm/25Mmiy1YHKf9zhX7SyZ99EirojH205qwgmAo3HOl8mU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/Lzg2MDQvMTYyNTEz/OTIwOC1hcnR3b3Jr/LmpwZw.jpg"/>
    <itunes:summary>The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.</itunes:summary>
    <itunes:subtitle>The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence.</itunes:subtitle>
    <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
    <itunes:owner>
      <itunes:name>PwC UK</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Anatomy of a ransomware attack - Lessons from the Irish Health Service Executive (HSE) - S4E4</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Anatomy of a ransomware attack - Lessons from the Irish Health Service Executive (HSE) - S4E4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e3fb166-07eb-4f39-8ef0-7360bbca6191</guid>
      <link>https://share.transistor.fm/s/71163f37</link>
      <description>
        <![CDATA[<p>How prepared are you to respond to a ransomware attack? In this episode our host Chloe Seaton is joined by Fran Thompson from the Irish HSE and Pat Moran from PwC Ireland to discuss key lessons all organisations can learn from the ransomware attack on the Irish HSE in May 2021. The discussion covers crisis response in the heat of a ransomware attack, tackling the challenges of business recovery and bringing systems back online, why organisations need to understand the extent of the dependence of their critical services on technology, and how to boost cyber security preparedness and build ransomware resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How prepared are you to respond to a ransomware attack? In this episode our host Chloe Seaton is joined by Fran Thompson from the Irish HSE and Pat Moran from PwC Ireland to discuss key lessons all organisations can learn from the ransomware attack on the Irish HSE in May 2021. The discussion covers crisis response in the heat of a ransomware attack, tackling the challenges of business recovery and bringing systems back online, why organisations need to understand the extent of the dependence of their critical services on technology, and how to boost cyber security preparedness and build ransomware resilience.</p>]]>
      </content:encoded>
      <pubDate>Fri, 31 Mar 2023 08:59:28 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/71163f37/b1e5081c.mp3" length="64369996" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>2680</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How prepared are you to respond to a ransomware attack? In this episode our host Chloe Seaton is joined by Fran Thompson from the Irish HSE and Pat Moran from PwC Ireland to discuss key lessons all organisations can learn from the ransomware attack on the Irish HSE in May 2021. The discussion covers crisis response in the heat of a ransomware attack, tackling the challenges of business recovery and bringing systems back online, why organisations need to understand the extent of the dependence of their critical services on technology, and how to boost cyber security preparedness and build ransomware resilience.</p>]]>
      </itunes:summary>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>CISO Spotlight on John White, Virgin Atlantic - S4E3</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>CISO Spotlight on John White, Virgin Atlantic - S4E3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b79d9a5d-4006-461d-9901-5916bb201413</guid>
      <link>https://share.transistor.fm/s/31dfd847</link>
      <description>
        <![CDATA[In this episode, our host Chloe Seaton is joined by John White, Leader of Information and
Cyber Security at Virgin Atlantic. In this episode John talks about how cyber security can support digital transformation, the importance of simplifying IT and getting the basics right, ransomware resilience, tackling the cyber talent gap - and his interesting career journey from personal trainer to CISO.]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode, our host Chloe Seaton is joined by John White, Leader of Information and
Cyber Security at Virgin Atlantic. In this episode John talks about how cyber security can support digital transformation, the importance of simplifying IT and getting the basics right, ransomware resilience, tackling the cyber talent gap - and his interesting career journey from personal trainer to CISO.]]>
      </content:encoded>
      <pubDate>Wed, 30 Nov 2022 07:00:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/31dfd847/51f18c50.mp3" length="48869308" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>2034</itunes:duration>
      <itunes:summary>In this episode, our host Chloe Seaton is joined by John White, Leader of Information and
Cyber Security at Virgin Atlantic. In this episode John talks about how cyber security can support digital transformation, the importance of simplifying IT and getting the basics right, ransomware resilience, tackling the cyber talent gap - and his interesting career journey from personal trainer to CISO.</itunes:summary>
      <itunes:subtitle>In this episode, our host Chloe Seaton is joined by John White, Leader of Information and
Cyber Security at Virgin Atlantic. In this episode John talks about how cyber security can support digital transformation, the importance of simplifying IT and gett</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why regulators are shining a spotlight on cyber resilience - S4E2</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Why regulators are shining a spotlight on cyber resilience - S4E2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fa5357e2-e596-40fc-917e-e1c18d7bb85a</guid>
      <link>https://share.transistor.fm/s/76a40590</link>
      <description>
        <![CDATA[<p>In this episode, our new host Chloe Seaton is joined by Lucie Usher, EMEA Intelligence Officer for FS-ISAC and Luc Manfredi, a Director in our Cyber Security team in the UK to discuss what is driving cyber resilience up the regulatory agenda in sectors such as financial services, energy and utilities; the key cyber risks for organisations in regulated sectors, including supply chain attacks, the growing use of operational technology in industrial operations and geopolitical unrest; how the regulatory landscape is evolving around cyber resilience - nationally and globally; and what organisations in regulated sectors can do to increase cyber resilience and ensure compliance through greater information sharing, rigorous self-assessment and continuous exercising and testing.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, our new host Chloe Seaton is joined by Lucie Usher, EMEA Intelligence Officer for FS-ISAC and Luc Manfredi, a Director in our Cyber Security team in the UK to discuss what is driving cyber resilience up the regulatory agenda in sectors such as financial services, energy and utilities; the key cyber risks for organisations in regulated sectors, including supply chain attacks, the growing use of operational technology in industrial operations and geopolitical unrest; how the regulatory landscape is evolving around cyber resilience - nationally and globally; and what organisations in regulated sectors can do to increase cyber resilience and ensure compliance through greater information sharing, rigorous self-assessment and continuous exercising and testing.</p>]]>
      </content:encoded>
      <pubDate>Thu, 04 Aug 2022 13:33:18 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/76a40590/b831af16.mp3" length="53535169" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1670</itunes:duration>
      <itunes:summary>In this episode, our new host Chloe Seaton is joined by Lucie Usher, EMEA Intelligence Officer for FS-ISAC and Luc Manfredi, a Director in our Cyber Security team in the UK to discuss what is driving cyber resilience up the regulatory agenda in sectors such as financial services, energy and utilities; the key cyber risks for organisations in regulated sectors, including supply chain attacks, the growing use of operational technology in industrial operations and geopolitical unrest; how the regulatory landscape is evolving around cyber resilience - nationally and globally; and what organisations in regulated sectors can do to increase cyber resilience and ensure compliance through greater information sharing, rigorous self-assessment and continuous exercising and testing.
-What is driving cyber resilience up the regulatory agenda in sectors such as financial services, energy and utilities
-The key cyber risks for organisations in regulated sectors, including supply chain attacks, the growing use of operational technology in industrial operations and geopolitical unrest.
-How the regulatory landscape is evolving around cyber resilience - nationally and globally - and what does this mean for organisations
-What organisations in regulated sectors can do to increase cyber resilience and ensure compliance, including greater information sharing, rigorous self-assessment and continuous exercising and testing.</itunes:summary>
      <itunes:subtitle>In this episode, our new host Chloe Seaton is joined by Lucie Usher, EMEA Intelligence Officer for FS-ISAC and Luc Manfredi, a Director in our Cyber Security team in the UK to discuss what is driving cyber resilience up the regulatory agenda in sectors su</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>How to increase cyber resilience in a heightened state of alert - S4E1</title>
      <itunes:season>4</itunes:season>
      <podcast:season>4</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>How to increase cyber resilience in a heightened state of alert - S4E1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6900dd0f-801c-42e8-9965-a5c87e4d21cd</guid>
      <link>https://share.transistor.fm/s/c8f2ab78</link>
      <description>
        <![CDATA[<p>In this episode, we’re joined by our UK Cyber Security Chair, Richard Horne and UK Cyber Security Director, Laura Duncan to discuss:</p><ul><li>What is a heightened state of cyber alert?</li><li>How do you assess your vulnerability and respond to different levels of cyber alert?</li><li>What scenarios do you need to plan for and what actions should you prioritise?</li><li>How do you embed cyber resilience across your organisation and people - and how do you manage security fatigue in a prolonged heightened state of alert?</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we’re joined by our UK Cyber Security Chair, Richard Horne and UK Cyber Security Director, Laura Duncan to discuss:</p><ul><li>What is a heightened state of cyber alert?</li><li>How do you assess your vulnerability and respond to different levels of cyber alert?</li><li>What scenarios do you need to plan for and what actions should you prioritise?</li><li>How do you embed cyber resilience across your organisation and people - and how do you manage security fatigue in a prolonged heightened state of alert?</li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 23 May 2022 11:23:58 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/c8f2ab78/0015c49e.mp3" length="29758114" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1236</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, we’re joined by our UK Cyber Security Chair, Richard Horne and UK Cyber Security Director, Laura Duncan to discuss:</p><ul><li>What is a heightened state of cyber alert?</li><li>How do you assess your vulnerability and respond to different levels of cyber alert?</li><li>What scenarios do you need to plan for and what actions should you prioritise?</li><li>How do you embed cyber resilience across your organisation and people - and how do you manage security fatigue in a prolonged heightened state of alert?</li></ul>]]>
      </itunes:summary>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>What’s on the minds of CISOs? New responsibilities, future risks and hiring talent - S3E6</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>What’s on the minds of CISOs? New responsibilities, future risks and hiring talent - S3E6</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">875346ab-aeb1-4501-8954-12ab9d09adf1</guid>
      <link>https://share.transistor.fm/s/58d334bf</link>
      <description>
        <![CDATA[In this episode we’re joined by Kevin Storli and Phil Venables to look at the changing role of the chief information security officer (CISO). We discuss:

1. How they’ve seen the role of the CISO change over their careers.
2. How CISOs can mitigate security risks while enabling their organisation to achieve its goals.
3. Current areas of concern, including supply chain risk and securing the cloud.
4. What they look for when hiring and the skills CISOs need to recruit for over the next few years.

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK 
Guest: Kevin Storli, Global CTO and UK Chief Information Security Officer, PwC 
Guest: Phil Venables, Chief Information Security Officer, Google Cloud]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode we’re joined by Kevin Storli and Phil Venables to look at the changing role of the chief information security officer (CISO). We discuss:

1. How they’ve seen the role of the CISO change over their careers.
2. How CISOs can mitigate security risks while enabling their organisation to achieve its goals.
3. Current areas of concern, including supply chain risk and securing the cloud.
4. What they look for when hiring and the skills CISOs need to recruit for over the next few years.

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK 
Guest: Kevin Storli, Global CTO and UK Chief Information Security Officer, PwC 
Guest: Phil Venables, Chief Information Security Officer, Google Cloud]]>
      </content:encoded>
      <pubDate>Thu, 17 Jun 2021 10:04:55 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/58d334bf/a5033b79.mp3" length="25834302" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1610</itunes:duration>
      <itunes:summary>In this episode we’re joined by Kevin Storli and Phil Venables to look at the changing role of the chief information security officer (CISO). We discuss:

1. How they’ve seen the role of the CISO change over their careers.
2. How CISOs can mitigate security risks while enabling their organisation to achieve its goals.
3. Current areas of concern, including supply chain risk and securing the cloud.
4. What they look for when hiring and the skills CISOs need to recruit for over the next few years.

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK 
Guest: Kevin Storli, Global CTO and UK Chief Information Security Officer, PwC 
Guest: Phil Venables, Chief Information Security Officer, Google Cloud</itunes:summary>
      <itunes:subtitle>In this episode we’re joined by Kevin Storli and Phil Venables to look at the changing role of the chief information security officer (CISO). We discuss:

1. How they’ve seen the role of the CISO change over their careers.
2. How CISOs can mitigate sec</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Security, Cyber Security threats, threat intelligence, COVID-19, ransomware, VPN exploitation, supply chain attacks, social engineering, third party risk, phishing, geopolitical risk, state-sponsored cyber attacks, Cyber threat trends</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Keeping your operational technology secure - S3E5</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Keeping your operational technology secure - S3E5</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">74353548-5d9f-442e-998b-4fdd849e5f98</guid>
      <link>https://share.transistor.fm/s/9827c58e</link>
      <description>
        <![CDATA[In this episode we’re joined by Sean Sutton and Cara Haffey to discuss how organisations can secure their operational technology (OT). We discuss:

1. How OT security differs from IT security.
2. Threats we’ve seen targeting operational technology, with a focus on the manufacturing sector. 
3. Steps you can take to tackle threats and build resilient operations.

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK 
Guest: Sean Sutton, Cyber Security Partner, PwC UK
Guest: Cara Haffey, UK Industrial Manufacturing Leader, PwC UK]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode we’re joined by Sean Sutton and Cara Haffey to discuss how organisations can secure their operational technology (OT). We discuss:

1. How OT security differs from IT security.
2. Threats we’ve seen targeting operational technology, with a focus on the manufacturing sector. 
3. Steps you can take to tackle threats and build resilient operations.

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK 
Guest: Sean Sutton, Cyber Security Partner, PwC UK
Guest: Cara Haffey, UK Industrial Manufacturing Leader, PwC UK]]>
      </content:encoded>
      <pubDate>Thu, 20 May 2021 16:29:44 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/9827c58e/6a78d47d.mp3" length="15378998" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>957</itunes:duration>
      <itunes:summary>In this episode we’re joined by Sean Sutton and Cara Haffey to discuss how organisations can secure their operational technology (OT). We discuss:

1. How OT security differs from IT security.
2. Threats we’ve seen targeting operational technology, with a focus on the manufacturing sector. 
3. Steps you can take to tackle threats and build resilient operations.

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK 
Guest: Sean Sutton, Cyber Security Partner, PwC UK
Guest: Cara Haffey, UK Industrial Manufacturing Leader, PwC UK</itunes:summary>
      <itunes:subtitle>In this episode we’re joined by Sean Sutton and Cara Haffey to discuss how organisations can secure their operational technology (OT). We discuss:

1. How OT security differs from IT security.
2. Threats we’ve seen targeting operational technology, wit</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Security, Cyber Security threats, threat intelligence, COVID-19, ransomware, VPN exploitation, supply chain attacks, social engineering, third party risk, phishing, geopolitical risk, state-sponsored cyber attacks, Cyber threat trends</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title> How CEOs can build secure organisations - S3E4</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title> How CEOs can build secure organisations - S3E4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a0efb6bf-524d-462c-9216-f417c496060e</guid>
      <link>https://share.transistor.fm/s/248c2ef6</link>
      <description>
        <![CDATA[<p>In this episode we’re joined by Richard Horne to discuss how CEOs can reduce complexity and make their organisations more securable. </p><p><br>We discuss: whether CEOs are taking enough of a role in tackling cyber risk; how embracing simplicity can benefit their organisations; how CEOs can embed cyber security into transformation plans.</p><p>Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK<br>Guest: Richard Horne, UK Cyber Security Chair, PwC UK</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode we’re joined by Richard Horne to discuss how CEOs can reduce complexity and make their organisations more securable. </p><p><br>We discuss: whether CEOs are taking enough of a role in tackling cyber risk; how embracing simplicity can benefit their organisations; how CEOs can embed cyber security into transformation plans.</p><p>Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK<br>Guest: Richard Horne, UK Cyber Security Chair, PwC UK</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Apr 2021 09:22:55 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/248c2ef6/c7e36013.mp3" length="10318461" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>641</itunes:duration>
      <itunes:summary>In this episode we’re joined by Richard Horne to discuss how CEOs can reduce complexity and make their organisations more securable. 

We discuss: whether CEOs are taking enough of a role in tackling cyber risk; how embracing simplicity can benefit their organisations; how CEOs can embed cyber security into transformation plans.

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK
Guest: Richard Horne, UK Cyber Security Chair, PwC UK</itunes:summary>
      <itunes:subtitle>In this episode we’re joined by Richard Horne to discuss how CEOs can reduce complexity and make their organisations more securable. 

We discuss: whether CEOs are taking enough of a role in tackling cyber risk; how embracing simplicity can benefit thei</itunes:subtitle>
      <itunes:keywords>Technology, Business Management, Government, News, Business News, News commentary, Tech News, PwC</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cyber threat imperatives for 2021 - S3E3</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Cyber threat imperatives for 2021 - S3E3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6fecd76-2701-4214-8083-f46691066c58</guid>
      <link>https://share.transistor.fm/s/fa743b73</link>
      <description>
        <![CDATA[<p>In this episode we’re joined by Kris McConkey and Krystle Reid to discuss the latest cyber threats you need to defend against. We cover: <br>- the key threat trends from last year<br>- threats we expect to be prominent in 2021, including cyber risk considerations around the hybrid working mode<br>- how organisations can combat these threats.</p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode we’re joined by Kris McConkey and Krystle Reid to discuss the latest cyber threats you need to defend against. We cover: <br>- the key threat trends from last year<br>- threats we expect to be prominent in 2021, including cyber risk considerations around the hybrid working mode<br>- how organisations can combat these threats.</p><p><br></p>]]>
      </content:encoded>
      <pubDate>Mon, 15 Mar 2021 11:29:58 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/fa743b73/804dacb8.mp3" length="13579946" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>842</itunes:duration>
      <itunes:summary>In this episode we’re joined by Kris McConkey and Krystle Reid to discuss the latest cyber threats you need to defend against. We cover:
- the key threat trends from last year
- threats we expect to be prominent in 2021, including cyber risk considerations around the hybrid working mode
- how organisations can combat these threats.

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK

Guest: Kris McConkey, Cyber Threat Operations Lead Partner, PwC UK 
Guest: Krystle Reid, Threat Intelligence Manager, PwC UK</itunes:summary>
      <itunes:subtitle>In this episode we’re joined by Kris McConkey and Krystle Reid to discuss the latest cyber threats you need to defend against. We cover:
- the key threat trends from last year
- threats we expect to be prominent in 2021, including cyber risk considerati</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Security, Cyber Security threats, threat intelligence, COVID-19, ransomware, VPN exploitation, supply chain attacks, social engineering, third party risk, phishing, geopolitical risk, state-sponsored cyber attacks, Cyber threat trends</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>SUNBURST and supply chain risks - S3E2</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>SUNBURST and supply chain risks - S3E2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">55a668fb-e813-46ec-8826-93b7de7adffb</guid>
      <link>https://share.transistor.fm/s/1aeb3a72</link>
      <description>
        <![CDATA[In this episode we’re joined by Gabriel Currie and Will Oram to discuss the SUNBURST hack and the issues identified. We discuss:
- analysis of the attack
- the risk areas highlighted
- how you can defend against supply chain risks

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK
Guest: Gabriel Currie, Cyber Incident Management Lead, PwC UK
Guest: Will Oram, Cyber Remediation Lead, PwC UK]]>
      </description>
      <content:encoded>
        <![CDATA[In this episode we’re joined by Gabriel Currie and Will Oram to discuss the SUNBURST hack and the issues identified. We discuss:
- analysis of the attack
- the risk areas highlighted
- how you can defend against supply chain risks

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK
Guest: Gabriel Currie, Cyber Incident Management Lead, PwC UK
Guest: Will Oram, Cyber Remediation Lead, PwC UK]]>
      </content:encoded>
      <pubDate>Tue, 23 Feb 2021 12:09:29 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/1aeb3a72/ae776e15.mp3" length="20995002" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1308</itunes:duration>
      <itunes:summary>In this episode we’re joined by Gabriel Currie and Will Oram to discuss the SUNBURST hack and the issues identified. We discuss:
- analysis of the attack
- the risk areas highlighted
- how you can defend against supply chain risks

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK
Guest: Gabriel Currie, Cyber Incident Management Lead, PwC UK
Guest: Will Oram, Cyber Remediation Lead, PwC UK</itunes:summary>
      <itunes:subtitle>In this episode we’re joined by Gabriel Currie and Will Oram to discuss the SUNBURST hack and the issues identified. We discuss:
- analysis of the attack
- the risk areas highlighted
- how you can defend against supply chain risks

Host: Abigail Wils</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Security, SUNBURST, Hacking, Supply Chain, Supply Chain Risk, Risk, Cyber Threats, Third Party Risk, Threat Detection, Supply Chain Attack, Malware, Privileged Access, Cloud Security, Cloud Services</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Communicating cyber risk to the c-suite - S3E1</title>
      <itunes:season>3</itunes:season>
      <podcast:season>3</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Communicating cyber risk to the c-suite - S3E1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">99edd11a-6a87-4c63-a08a-ed9f3de58e9e</guid>
      <link>https://share.transistor.fm/s/5fe355c7</link>
      <description>
        <![CDATA[<p><strong>In this episode we cover:</strong></p><p><br></p><ul><li>why cyber risk reporting is important</li><li>common problems facing organisations</li><li>how to improve your own cyber security risk reporting.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>In this episode we cover:</strong></p><p><br></p><ul><li>why cyber risk reporting is important</li><li>common problems facing organisations</li><li>how to improve your own cyber security risk reporting.</li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 25 Jan 2021 10:25:05 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/5fe355c7/dde64689.mp3" length="24798171" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>773</itunes:duration>
      <itunes:summary>In this episode we’re joined by Philippe Korur to discuss how advanced quantification of cyber risk helps improve communication between the CISO and c-suite, ensuring that cyber security investments support their strategic goals. 

Host: Abigail Wilson, Cyber Threat Operations Manager, PwC UK
Guest: Philippe Korur, Cyber Risk Reporting Platform Lead, PwC UK</itunes:summary>
      <itunes:subtitle>In this episode we’re joined by Philippe Korur to discuss how advanced quantification of cyber risk helps improve communication between the CISO and c-suite, ensuring that cyber security investments support their strategic goals. 

Host: Abigail Wilson,</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Why are companies still suffering from breaches? - S2E6</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Why are companies still suffering from breaches? - S2E6</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/555285516-pwc-uk-podcast-the-new-realities-of-cyber-security-s2e4-why-are-companies-still-suffering-from-breaches.mp3</guid>
      <link>https://share.transistor.fm/s/2dfcf76e</link>
      <description>
        <![CDATA[Abigail Wilson is joined by Kris McConkey and Hamish Cameron to answer the question "why are companies still suffering form cyber breaches?".]]>
      </description>
      <content:encoded>
        <![CDATA[Abigail Wilson is joined by Kris McConkey and Hamish Cameron to answer the question "why are companies still suffering form cyber breaches?".]]>
      </content:encoded>
      <pubDate>Sat, 09 Feb 2019 16:00:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/2dfcf76e/02b881bf.mp3" length="25235183" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1048</itunes:duration>
      <itunes:summary>Abigail Wilson is joined by Kris McConkey and Hamish Cameron to answer the question "why are companies still suffering form cyber breaches?".</itunes:summary>
      <itunes:subtitle>Abigail Wilson is joined by Kris McConkey and Hamish Cameron to answer the question "why are companies still suffering form cyber breaches?".</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The threat landscape - S2E5</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>The threat landscape - S2E5</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/567706947-pwc-uk-podcast-the-new-realities-of-cyber-security-series-2-episode-6-the-threat-landscape.mp3</guid>
      <link>https://share.transistor.fm/s/82712fd5</link>
      <description>
        <![CDATA[<p>Abigail Wilson is joined by Louise Taggart and Rachel Mullan from our cyber threat intelligence team to discuss what they are anticipating in the future threat landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Abigail Wilson is joined by Louise Taggart and Rachel Mullan from our cyber threat intelligence team to discuss what they are anticipating in the future threat landscape.</p>]]>
      </content:encoded>
      <pubDate>Thu, 31 Jan 2019 12:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/82712fd5/90f5ecf6.mp3" length="16418642" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>681</itunes:duration>
      <itunes:summary>Abigail Wilson is joined by Louise Taggart and Rachel Mullan from our cyber threat intelligence team to discuss what they are anticipating in the future threat landscape.</itunes:summary>
      <itunes:subtitle>Abigail Wilson is joined by Louise Taggart and Rachel Mullan from our cyber threat intelligence team to discuss what they are anticipating in the future threat landscape.</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Getting the basics right - S2E4</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Getting the basics right - S2E4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/559971015-pwc-uk-podcast-the-new-realities-of-cyber-security-s2e5-getting-the-basics-right.mp3</guid>
      <link>https://share.transistor.fm/s/14c0a211</link>
      <description>
        <![CDATA[<p>We're joined by Dr Richard Horne and Laura Duncan to talk about the basics of cyber security and discuss the challenges organisations face in getting these right.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We're joined by Dr Richard Horne and Laura Duncan to talk about the basics of cyber security and discuss the challenges organisations face in getting these right.</p>]]>
      </content:encoded>
      <pubDate>Wed, 16 Jan 2019 17:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/14c0a211/16e2926a.mp3" length="34427324" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>859</itunes:duration>
      <itunes:summary>We're joined by Dr Richard Horne and Laura Duncan to talk about the basics of cyber security and discuss the challenges organisations face in getting these right.</itunes:summary>
      <itunes:subtitle>We're joined by Dr Richard Horne and Laura Duncan to talk about the basics of cyber security and discuss the challenges organisations face in getting these right.</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Untrusted applications - S2E3</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Untrusted applications - S2E3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/546199947-pwc-uk-podcast-the-new-realities-of-cyber-security-s2e3-untrusted-applications.mp3</guid>
      <link>https://share.transistor.fm/s/ce97e5c6</link>
      <description>
        <![CDATA[<p>Abigail Wilson is joined by Will Semple and Stephen Morrow to chat about untrusted applications and discuss the issue of how big a risk third party software is to your business.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Abigail Wilson is joined by Will Semple and Stephen Morrow to chat about untrusted applications and discuss the issue of how big a risk third party software is to your business.</p>]]>
      </content:encoded>
      <pubDate>Mon, 17 Dec 2018 16:00:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/ce97e5c6/9fe3d311.mp3" length="32584848" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>812</itunes:duration>
      <itunes:summary>Abigail Wilson is joined by Will Semple and Stephen Morrow to chat about untrusted applications and discuss the issue of how big a risk third party software is to your business.</itunes:summary>
      <itunes:subtitle>Abigail Wilson is joined by Will Semple and Stephen Morrow to chat about untrusted applications and discuss the issue of how big a risk third party software is to your business.</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Research and development - S2E2</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Research and development - S2E2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/543464592-pwc-uk-podcast-the-new-realities-of-cyber-security-s2e2-research-and-development.mp3</guid>
      <link>https://share.transistor.fm/s/6ca3cda1</link>
      <description>
        <![CDATA[<p>Abigail Wilson is joined by Matt Wixey and Holly Rostill to chat about the importance of research and development in cyber security and why it is key to building a secure digital society.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Abigail Wilson is joined by Matt Wixey and Holly Rostill to chat about the importance of research and development in cyber security and why it is key to building a secure digital society.</p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Dec 2018 17:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/6ca3cda1/29fad6ee.mp3" length="23042746" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>574</itunes:duration>
      <itunes:summary>Abigail Wilson is joined by Matt Wixey and Holly Rostill to chat about the importance of research and development in cyber security and why it is key to building a secure digital society.</itunes:summary>
      <itunes:subtitle>Abigail Wilson is joined by Matt Wixey and Holly Rostill to chat about the importance of research and development in cyber security and why it is key to building a secure digital society.</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Authenticating people - S2E1</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Authenticating people - S2E1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/539670567-pwc-uk-podcast-the-new-realities-of-cyber-security-authenticating-people.mp3</guid>
      <link>https://share.transistor.fm/s/8b1af533</link>
      <description>
        <![CDATA[<p>Our new host Abigail Wilson is joined by Derek Gordon and Daisy McCartney to chat about both the technological and cultural sides of authentication, and why it is passwords and not people that are the weakest link in the security chain.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Our new host Abigail Wilson is joined by Derek Gordon and Daisy McCartney to chat about both the technological and cultural sides of authentication, and why it is passwords and not people that are the weakest link in the security chain.</p>]]>
      </content:encoded>
      <pubDate>Tue, 04 Dec 2018 14:33:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/8b1af533/5a591253.mp3" length="18066162" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>750</itunes:duration>
      <itunes:summary>Our new host Abigail Wilson is joined by Derek Gordon and Daisy McCartney to chat about both the technological and cultural sides of authentication, and why it is passwords and not people that are the weakest link in the security chain.</itunes:summary>
      <itunes:subtitle>Our new host Abigail Wilson is joined by Derek Gordon and Daisy McCartney to chat about both the technological and cultural sides of authentication, and why it is passwords and not people that are the weakest link in the security chain.</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Are you ready for a new world of cyber threats? - S1E7</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Are you ready for a new world of cyber threats? - S1E7</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/336810621-pwc-uk-podcast-are-you-ready-for-a-new-world-of-cyber-threats.mp3</guid>
      <link>https://share.transistor.fm/s/f4641b37</link>
      <description>
        <![CDATA[<p>Louise Taggart chats to Matt Wixey, threat and vulnerability consultant at PwC UK, about his cutting-edge research into emerging cyber threats to organisations. Find out more about the latest techniques being used by hackers to bypass security mechanisms, involving light and sound.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Louise Taggart chats to Matt Wixey, threat and vulnerability consultant at PwC UK, about his cutting-edge research into emerging cyber threats to organisations. Find out more about the latest techniques being used by hackers to bypass security mechanisms, involving light and sound.</p>]]>
      </content:encoded>
      <pubDate>Mon, 07 Aug 2017 09:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/f4641b37/46c90c85.mp3" length="27570070" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>687</itunes:duration>
      <itunes:summary>Louise Taggart chats to Matt Wixey, threat and vulnerability consultant at PwC UK, about his cutting-edge research into emerging cyber threats to organisations. Find out more about the latest techniques being used by hackers to bypass security mechanisms, involving light and sound.</itunes:summary>
      <itunes:subtitle>Louise Taggart chats to Matt Wixey, threat and vulnerability consultant at PwC UK, about his cutting-edge research into emerging cyber threats to organisations. Find out more about the latest techniques being used by hackers to bypass security mechanisms,</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The changing world of cyber threats - S1E6</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>The changing world of cyber threats - S1E6</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/327262490-pwc-uk-podcast-cyber-threats.mp3</guid>
      <link>https://share.transistor.fm/s/60091c8f</link>
      <description>
        <![CDATA[<p>We're joined by Louise Taggart, PwC threat intelligence analyst, to look at the threats companies face from individuals, groups and even states who are sponsoring and funding cyber attacks. We discuss this rapidly growing area of concern and how it's being impacted by the global political landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We're joined by Louise Taggart, PwC threat intelligence analyst, to look at the threats companies face from individuals, groups and even states who are sponsoring and funding cyber attacks. We discuss this rapidly growing area of concern and how it's being impacted by the global political landscape.</p>]]>
      </content:encoded>
      <pubDate>Mon, 12 Jun 2017 09:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/60091c8f/6a6026e6.mp3" length="35529995" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1476</itunes:duration>
      <itunes:summary>We're joined by Louise Taggart, PwC threat intelligence analyst, to look at the threats companies face from individuals, groups and even states who are sponsoring and funding cyber attacks. We discuss this rapidly growing area of concern and how it's being impacted by the global political landscape.</itunes:summary>
      <itunes:subtitle>We're joined by Louise Taggart, PwC threat intelligence analyst, to look at the threats companies face from individuals, groups and even states who are sponsoring and funding cyber attacks. We discuss this rapidly growing area of concern and how it's bein</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>CISO's of the future - S1E5</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>CISO's of the future - S1E5</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/325675442-pwc-uk-podcast-the-new-realities-of-cyber-security-episode-5-cisos-of-the-future.mp3</guid>
      <link>https://share.transistor.fm/s/364d47ab</link>
      <description>
        <![CDATA[<p>In our fifth episode, we're joined by Christian Arndt, cyber security director at PwC, to look at the role of the chief information security officer. The CISO is often a senior level executive who is responsible for multiple areas of an organisation’s security strategy, resilience and vision. What will the future CISO look like? What characteristics should organisations expect of someone in this role?</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In our fifth episode, we're joined by Christian Arndt, cyber security director at PwC, to look at the role of the chief information security officer. The CISO is often a senior level executive who is responsible for multiple areas of an organisation’s security strategy, resilience and vision. What will the future CISO look like? What characteristics should organisations expect of someone in this role?</p>]]>
      </content:encoded>
      <pubDate>Mon, 05 Jun 2017 09:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/364d47ab/2e6c881d.mp3" length="28137805" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1169</itunes:duration>
      <itunes:summary>In our fifth episode, we're joined by Christian Arndt, cyber security director at PwC, to look at the role of the chief information security officer. The CISO is often a senior level executive who is responsible for multiple areas of an organisation’s security strategy, resilience and vision. What will the future CISO look like? What characteristics should organisations expect of someone in this role?</itunes:summary>
      <itunes:subtitle>In our fifth episode, we're joined by Christian Arndt, cyber security director at PwC, to look at the role of the chief information security officer. The CISO is often a senior level executive who is responsible for multiple areas of an organisation’s sec</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The importance of identity and access management - S1E4</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>The importance of identity and access management - S1E4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/324610745-pwc-uk-podcast-the-new-realities-of-cyber-security-episode-4-the-importance-of-identity-and-access-management.mp3</guid>
      <link>https://share.transistor.fm/s/4a523b05</link>
      <description>
        <![CDATA[<p>Ian is joined by Richard Mardling, director of access governance at PwC to discuss the importance of identity and access management. In this podcast Richard discusses the key risks to contemporary organisations through his personal journey of securing local intranets to the current challenge of BYOD and remote access. Richard highlights the story of a French trader who was jailed for three years after the 2008 Société Générale trading loss, which cost the bank nearly €5bn, due to unauthorised use of the bank's computers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ian is joined by Richard Mardling, director of access governance at PwC to discuss the importance of identity and access management. In this podcast Richard discusses the key risks to contemporary organisations through his personal journey of securing local intranets to the current challenge of BYOD and remote access. Richard highlights the story of a French trader who was jailed for three years after the 2008 Société Générale trading loss, which cost the bank nearly €5bn, due to unauthorised use of the bank's computers.</p>]]>
      </content:encoded>
      <pubDate>Mon, 29 May 2017 09:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/4a523b05/f7ece293.mp3" length="47089155" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1958</itunes:duration>
      <itunes:summary>Ian is joined by Richard Mardling, director of access governance at PwC to discuss the importance of identity and access management. In this podcast Richard discusses the key risks to contemporary organisations through his personal journey of securing local intranets to the current challenge of BYOD and remote access. Richard highlights the story of a French trader who was jailed for three years after the 2008 Société Générale trading loss, which cost the bank nearly €5bn, due to unauthorised use of the bank's computers.</itunes:summary>
      <itunes:subtitle>Ian is joined by Richard Mardling, director of access governance at PwC to discuss the importance of identity and access management. In this podcast Richard discusses the key risks to contemporary organisations through his personal journey of securing loc</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Digital crime scene forensics - S1E3</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Digital crime scene forensics - S1E3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/323226866-pwc-uk-podcast-episode-3-digital-crime-scene-forensics.mp3</guid>
      <link>https://share.transistor.fm/s/9a309294</link>
      <description>
        <![CDATA[<p>In episode three we're joined by Kris McConkey, cyber security partner at PwC, to talk about digital crime scene forensics. From tracking the bad guys and setting up online traps to undertaking digital crime scene investigations, we discuss ways that organisations can improve their cyber resilience.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In episode three we're joined by Kris McConkey, cyber security partner at PwC, to talk about digital crime scene forensics. From tracking the bad guys and setting up online traps to undertaking digital crime scene investigations, we discuss ways that organisations can improve their cyber resilience.</p>]]>
      </content:encoded>
      <pubDate>Mon, 22 May 2017 09:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/9a309294/acb6bb78.mp3" length="36429105" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1513</itunes:duration>
      <itunes:summary>In episode three we're joined by Kris McConkey, cyber security partner at PwC, to talk about digital crime scene forensics. From tracking the bad guys and setting up online traps to undertaking digital crime scene investigations, we discuss ways that organisations can improve their cyber resilience.</itunes:summary>
      <itunes:subtitle>In episode three we're joined by Kris McConkey, cyber security partner at PwC, to talk about digital crime scene forensics. From tracking the bad guys and setting up online traps to undertaking digital crime scene investigations, we discuss ways that orga</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The future of cyber security law - S1E2</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>The future of cyber security law - S1E2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/322097442-pwc-uk-podcast-the-future-of-cyber-security-law.mp3</guid>
      <link>https://share.transistor.fm/s/4135354d</link>
      <description>
        <![CDATA[<p>In the second episode of the new realities of cyber security, Ian is joined by former detective and cyber crime expert, Charlie McMurdie. Charlie discusses the challenges the police face in combating crime online and the work they are doing to help protect both companies and individuals.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the second episode of the new realities of cyber security, Ian is joined by former detective and cyber crime expert, Charlie McMurdie. Charlie discusses the challenges the police face in combating crime online and the work they are doing to help protect both companies and individuals.</p>]]>
      </content:encoded>
      <pubDate>Mon, 15 May 2017 09:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/4135354d/2563536e.mp3" length="43256094" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1799</itunes:duration>
      <itunes:summary>In the second episode of the new realities of cyber security, Ian is joined by former detective and cyber crime expert, Charlie McMurdie. Charlie discusses the challenges the police face in combating crime online and the work they are doing to help protect both companies and individuals.</itunes:summary>
      <itunes:subtitle>In the second episode of the new realities of cyber security, Ian is joined by former detective and cyber crime expert, Charlie McMurdie. Charlie discusses the challenges the police face in combating crime online and the work they are doing to help protec</itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Understanding Europe's privacy future - The GDPR - S1E1</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Understanding Europe's privacy future - The GDPR - S1E1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">http://feeds.soundcloud.com/stream/http://feeds.soundcloud.com/stream/320634992-pwc-uk-podcast-episode-1-understanding-europes-privacy-future-the-gdpr.mp3</guid>
      <link>https://share.transistor.fm/s/cb425909</link>
      <description>
        <![CDATA[<p>Ian Todd, cyber security consultant, is joined by Jane Wainwright, privacy and data protection director, to discuss the General Data Protection Regulation (GDPR). Coming into effect in May 2018, this is the largest data protection change in a generation. With one year left to go, organisations are trying to understand data flows, consent mechanisms, binding corporate rules and how to assess their current level of readiness.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Ian Todd, cyber security consultant, is joined by Jane Wainwright, privacy and data protection director, to discuss the General Data Protection Regulation (GDPR). Coming into effect in May 2018, this is the largest data protection change in a generation. With one year left to go, organisations are trying to understand data flows, consent mechanisms, binding corporate rules and how to assess their current level of readiness.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 May 2017 09:30:00 +0000</pubDate>
      <author>PwC UK</author>
      <enclosure url="https://media.transistor.fm/cb425909/1b57fae5.mp3" length="37704352" type="audio/mpeg"/>
      <itunes:author>PwC UK</itunes:author>
      <itunes:duration>1567</itunes:duration>
      <itunes:summary>Ian Todd, cyber security consultant, is joined by Jane Wainwright, privacy and data protection director, to discuss the General Data Protection Regulation (GDPR). Coming into effect in May 2018, this is the largest data protection change in a generation. With one year left to go, organisations are trying to understand data flows, consent mechanisms, binding corporate rules and how to assess their current level of readiness.</itunes:summary>
      <itunes:subtitle>Ian Todd, cyber security consultant, is joined by Jane Wainwright, privacy and data protection director, to discuss the General Data Protection Regulation (GDPR). Coming into effect in May 2018, this is the largest data protection change in a generation. </itunes:subtitle>
      <itunes:keywords>PwC, Cyber Risk, Investment, CISO, Security, Reporting, Cyber Security, Cyber Risk Reporting, Risk Appetite, Cyber Threats, Cyber Security Budgets, Cyber Security Budgeting, Continuous Risk Monitoring, Risk Quantification Modelling, Data Analytics, Risk Dashboarding</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
