<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/trust-issues" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Security Matters </title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/trust-issues</itunes:new-feed-url>
    <description>Security Matters is your go-to podcast for cutting-edge insights on navigating today’s rapidly evolving digital threat landscape. Featuring expert insights from frontline practitioners, each episode gives you a deep dive into today’s most critical issues, from securing identities to protecting hybrid, multi-cloud and emerging environments to staying ahead of new attack methods and beyond. Because in this increasingly complex world, how you approach security matters.</description>
    <copyright>Copyright © 2026 CyberArk Software Ltd. All rights reserved.</copyright>
    <podcast:guid>72476b39-f6a7-598f-9a09-e14a445f1474</podcast:guid>
    <podcast:locked owner="dap261@gmail.com">no</podcast:locked>
    <podcast:trailer pubdate="Fri, 07 Feb 2025 16:41:29 -0500" url="https://pdrl.fm/35001c/media.transistor.fm/c92c45bb/caa50e52.mp3" length="1444092" type="audio/mpeg">Welcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer)</podcast:trailer>
    <language>en</language>
    <pubDate>Wed, 11 Mar 2026 12:09:33 -0400</pubDate>
    <lastBuildDate>Thu, 12 Mar 2026 14:45:21 -0400</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/ThcWyh_S5MLP-roczyyEw8JcSdEmKxnK-cJvY-K2Hng/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZDIx/YjQyY2Q4ZGVmODU4/NTMyNWM1Y2I1OTBh/ZDk1OC5wbmc.jpg</url>
      <title>Security Matters </title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>CyberArk</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/ThcWyh_S5MLP-roczyyEw8JcSdEmKxnK-cJvY-K2Hng/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZDIx/YjQyY2Q4ZGVmODU4/NTMyNWM1Y2I1OTBh/ZDk1OC5wbmc.jpg"/>
    <itunes:summary>Security Matters is your go-to podcast for cutting-edge insights on navigating today’s rapidly evolving digital threat landscape. Featuring expert insights from frontline practitioners, each episode gives you a deep dive into today’s most critical issues, from securing identities to protecting hybrid, multi-cloud and emerging environments to staying ahead of new attack methods and beyond. Because in this increasingly complex world, how you approach security matters.</itunes:summary>
    <itunes:subtitle>Security Matters is your go-to podcast for cutting-edge insights on navigating today’s rapidly evolving digital threat landscape.</itunes:subtitle>
    <itunes:keywords>cybersecurity, identity security, Privileged Access Management, Zero Trust, Privileged Access Security</itunes:keywords>
    <itunes:owner>
      <itunes:name>CyberArk</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>EP 26 - The tyranny of the now: identity at machine speed</title>
      <itunes:title>EP 26 - The tyranny of the now: identity at machine speed</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">07a2606d-6b1b-4394-9c6d-a84f8edc6be7</guid>
      <link>https://share.transistor.fm/s/caf82e28</link>
      <description>
        <![CDATA[<p>Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.</p><p>From AI agents that overshare sensitive data to cloud misconfigurations that never seem to disappear to the persistent success of ransomware, MK explains how complexity, vendor sprawl, and overloaded teams create gaps that attackers continue to exploit. The conversation highlights how identity across human, machine, and emerging agent types has become the center of modern security and why fundamentals, prioritization, and platform thinking matter more than ever.</p><p>Listeners will hear insight on:</p><p> • Identity at machine speed and the rise of autonomous access<br> • Why attackers still win more than 51 percent of the time<br> • How ransomware continues to succeed despite industry progress<br> • Why SMBs face “mission impossible” expectations<br> • The true cost of vendor sprawl and operational overload<br> • What effective security leadership looks like in the current threat environment</p><p>If you work in identity, security operations, strategy, or leadership, this discussion cuts through hype and focuses on the realities defenders face and how to push back against the constant pressure of the tyranny of the now.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.</p><p>From AI agents that overshare sensitive data to cloud misconfigurations that never seem to disappear to the persistent success of ransomware, MK explains how complexity, vendor sprawl, and overloaded teams create gaps that attackers continue to exploit. The conversation highlights how identity across human, machine, and emerging agent types has become the center of modern security and why fundamentals, prioritization, and platform thinking matter more than ever.</p><p>Listeners will hear insight on:</p><p> • Identity at machine speed and the rise of autonomous access<br> • Why attackers still win more than 51 percent of the time<br> • How ransomware continues to succeed despite industry progress<br> • Why SMBs face “mission impossible” expectations<br> • The true cost of vendor sprawl and operational overload<br> • What effective security leadership looks like in the current threat environment</p><p>If you work in identity, security operations, strategy, or leadership, this discussion cuts through hype and focuses on the realities defenders face and how to push back against the constant pressure of the tyranny of the now.</p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Mar 2026 09:47:20 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/caf82e28/8d122588.mp3" length="43714488" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/WHDc_n9-0gim7yxHY2PmjxgnI4ejtcH6uHCJpQLuBsU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZjBm/MDUxNjY3ODdiOWUy/ZjM2MDRhZWQ3MzZk/NzkxMi5qcGc.jpg"/>
      <itunes:duration>2733</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Security teams are under more pressure than ever, reacting at human speed while systems, identities, and AI agents operate at machine speed. In this episode of Security Matters, host David Puner sits down with cybersecurity leader and former FBI executive MK Palmore to explore why defenders struggle to keep pace and what it takes to regain control.</p><p>From AI agents that overshare sensitive data to cloud misconfigurations that never seem to disappear to the persistent success of ransomware, MK explains how complexity, vendor sprawl, and overloaded teams create gaps that attackers continue to exploit. The conversation highlights how identity across human, machine, and emerging agent types has become the center of modern security and why fundamentals, prioritization, and platform thinking matter more than ever.</p><p>Listeners will hear insight on:</p><p> • Identity at machine speed and the rise of autonomous access<br> • Why attackers still win more than 51 percent of the time<br> • How ransomware continues to succeed despite industry progress<br> • Why SMBs face “mission impossible” expectations<br> • The true cost of vendor sprawl and operational overload<br> • What effective security leadership looks like in the current threat environment</p><p>If you work in identity, security operations, strategy, or leadership, this discussion cuts through hype and focuses on the realities defenders face and how to push back against the constant pressure of the tyranny of the now.</p>]]>
      </itunes:summary>
      <itunes:keywords>identity at machine speed, identity security, AI agents, agentic AI, access governance, least privilege, RBAC, machine identity, human vs machine speed, cybersecurity leadership, ransomware resilience, vendor sprawl, cloud misconfiguration, security fundamentals, cyber strategy, attacker advantage, cybersecurity complexity, security operations, security gaps, defender challenges, automation in security, modern threat landscape, identity governance, cyber risk, security maturity, Security Matters podcast, CyberArk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/caf82e28/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP25 - Identity is the attack vector w/ Udi Mokady</title>
      <itunes:title>EP25 - Identity is the attack vector w/ Udi Mokady</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d3059f8e-ae9c-4789-ba5f-5984eb8441c7</guid>
      <link>https://share.transistor.fm/s/1f5d5854</link>
      <description>
        <![CDATA[<p>CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition’s close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become <em>the</em> attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.</p><p>Udi discusses what the combined companies’ scale and capabilities mean for customers, why identity security must now operate as frontline defense rather than a management layer, and how AI agents are rapidly reshaping the threat landscape. He also reflects on CyberArk’s long‑distance entrepreneurial journey, the cultural foundations that have made the company durable over 26 years, and how productive paranoia, innovation and trust continue to guide the mission forward inside Palo Alto Networks.</p><p><strong>Note:</strong> This episode was recorded in January, prior to the acquisition’s close.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition’s close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become <em>the</em> attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.</p><p>Udi discusses what the combined companies’ scale and capabilities mean for customers, why identity security must now operate as frontline defense rather than a management layer, and how AI agents are rapidly reshaping the threat landscape. He also reflects on CyberArk’s long‑distance entrepreneurial journey, the cultural foundations that have made the company durable over 26 years, and how productive paranoia, innovation and trust continue to guide the mission forward inside Palo Alto Networks.</p><p><strong>Note:</strong> This episode was recorded in January, prior to the acquisition’s close.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Feb 2026 08:52:40 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/1f5d5854/646c596e.mp3" length="52904574" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/_PSqHQemcIcSsVPulG1Qb3Fletp2bJ241BMDdl7QY9o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wZDJm/MGE1YjVhYTNkMmU5/Njg2MWFiMDlmMGFk/M2I4My5qcGc.jpg"/>
      <itunes:duration>3307</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition’s close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become <em>the</em> attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.</p><p>Udi discusses what the combined companies’ scale and capabilities mean for customers, why identity security must now operate as frontline defense rather than a management layer, and how AI agents are rapidly reshaping the threat landscape. He also reflects on CyberArk’s long‑distance entrepreneurial journey, the cultural foundations that have made the company durable over 26 years, and how productive paranoia, innovation and trust continue to guide the mission forward inside Palo Alto Networks.</p><p><strong>Note:</strong> This episode was recorded in January, prior to the acquisition’s close.</p>]]>
      </itunes:summary>
      <itunes:keywords>identity security, identity as the attack vector, machine identities, AI agents, artificial intelligence, cybersecurity, CyberArk, Udi Mokady, privileged access management, PAM, secrets management, certificate lifecycle management, identity governance, IGA, Zero Trust, digital transformation, security consolidation, Palo Alto Networks, security platforms, CISO priorities, cyber risk, enterprise security, cloud security, automated attacks, defender advantage, long‑distance entrepreneurship, leadership, innovation, Security Matters podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1f5d5854/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 24 - FOMO, identity, and the realities of AI at scale</title>
      <itunes:title>EP 24 - FOMO, identity, and the realities of AI at scale</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1b572381-ccfd-4b23-87ca-c3558c6da8ab</guid>
      <link>https://share.transistor.fm/s/13b1353b</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact.</p><p><br></p><p>Ariel shares practical insights on what it really takes to secure AI at scale, from combating AI‑enabled phishing attacks to managing agent identities and reducing growing risks in the software supply chain. </p><p><br></p><p>The conversation explores how leaders can balance innovation with identity‑centric guardrails, understand the economics of AI adoption, and push for the democratization of IT without losing control. Whether you're a CIO, an IT leader, or simply curious about the future of cybersecurity, this episode offers clear, actionable guidance to help you stay ahead in 2026 and beyond.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact.</p><p><br></p><p>Ariel shares practical insights on what it really takes to secure AI at scale, from combating AI‑enabled phishing attacks to managing agent identities and reducing growing risks in the software supply chain. </p><p><br></p><p>The conversation explores how leaders can balance innovation with identity‑centric guardrails, understand the economics of AI adoption, and push for the democratization of IT without losing control. Whether you're a CIO, an IT leader, or simply curious about the future of cybersecurity, this episode offers clear, actionable guidance to help you stay ahead in 2026 and beyond.</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Jan 2026 08:41:04 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/13b1353b/34572fdc.mp3" length="45289365" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LE7cyO9pPLMSE8_XNSYsoeNFGRqx1WC6SmTX9kisX7k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85YTRh/YTE5Y2E3ZDE3Y2U1/ZTRmYzBhNjFkNGM5/Zjc4Zi5qcGc.jpg"/>
      <itunes:duration>2829</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact.</p><p><br></p><p>Ariel shares practical insights on what it really takes to secure AI at scale, from combating AI‑enabled phishing attacks to managing agent identities and reducing growing risks in the software supply chain. </p><p><br></p><p>The conversation explores how leaders can balance innovation with identity‑centric guardrails, understand the economics of AI adoption, and push for the democratization of IT without losing control. Whether you're a CIO, an IT leader, or simply curious about the future of cybersecurity, this episode offers clear, actionable guidance to help you stay ahead in 2026 and beyond.</p>]]>
      </itunes:summary>
      <itunes:keywords>Ariel Pisetzky, CyberArk CIO, David Puner, AI security, cybersecurity podcast, phishing attacks, IT innovation, identity management, software supply chain, AI adoption, FOMO in tech, IT guardrails, Security Matters podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/13b1353b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 23 - Red teaming AI governance: catching model risk early</title>
      <itunes:title>EP 23 - Red teaming AI governance: catching model risk early</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3ff2f38d-ec9f-4b91-b604-a028ad609cc2</guid>
      <link>https://share.transistor.fm/s/4e7eb30d</link>
      <description>
        <![CDATA[<p>AI systems are moving fast, sometimes faster than the guardrails meant to contain them. In this episode of Security Matters, host David Puner digs into the hidden risks inside modern AI models with Pamela K. Isom, exploring the governance gaps that allow agents to make decisions, recommendations, and even commitments far beyond their intended authority.</p><p>Isom, former director of AI and technology at the U.S. Department of Energy (DOE) and now founder and CEO of IsAdvice &amp; Consulting, explains why AI red teaming must extend beyond cybersecurity, how to stress test AI governance before something breaks, and why human oversight, escalation paths, and clear limits are essential for responsible AI.</p><p>The conversation examines real-world examples of AI drift, unintended or unethical model behavior, data lineage failures, procurement and vendor blind spots, and the rising need for scalable AI governance, AI security, responsible AI practices, and enterprise red teaming as organizations adopt generative AI.</p><p>Whether you work in cybersecurity, identity security, AI development, or technology leadership, this episode offers practical insights for managing AI risk and building systems that stay aligned, accountable, and trustworthy.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AI systems are moving fast, sometimes faster than the guardrails meant to contain them. In this episode of Security Matters, host David Puner digs into the hidden risks inside modern AI models with Pamela K. Isom, exploring the governance gaps that allow agents to make decisions, recommendations, and even commitments far beyond their intended authority.</p><p>Isom, former director of AI and technology at the U.S. Department of Energy (DOE) and now founder and CEO of IsAdvice &amp; Consulting, explains why AI red teaming must extend beyond cybersecurity, how to stress test AI governance before something breaks, and why human oversight, escalation paths, and clear limits are essential for responsible AI.</p><p>The conversation examines real-world examples of AI drift, unintended or unethical model behavior, data lineage failures, procurement and vendor blind spots, and the rising need for scalable AI governance, AI security, responsible AI practices, and enterprise red teaming as organizations adopt generative AI.</p><p>Whether you work in cybersecurity, identity security, AI development, or technology leadership, this episode offers practical insights for managing AI risk and building systems that stay aligned, accountable, and trustworthy.</p>]]>
      </content:encoded>
      <pubDate>Wed, 14 Jan 2026 09:42:17 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/4e7eb30d/85a6347f.mp3" length="33226176" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/gC-3eap87tdQdD0PkSwh6lgc4mVAGg_zID9KfW-BSv0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kOTQy/MDQwZjFjMGJjNGQ5/ZDI1Y2Q3NzU0MGY4/ZjQwZi5qcGc.jpg"/>
      <itunes:duration>2077</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>AI systems are moving fast, sometimes faster than the guardrails meant to contain them. In this episode of Security Matters, host David Puner digs into the hidden risks inside modern AI models with Pamela K. Isom, exploring the governance gaps that allow agents to make decisions, recommendations, and even commitments far beyond their intended authority.</p><p>Isom, former director of AI and technology at the U.S. Department of Energy (DOE) and now founder and CEO of IsAdvice &amp; Consulting, explains why AI red teaming must extend beyond cybersecurity, how to stress test AI governance before something breaks, and why human oversight, escalation paths, and clear limits are essential for responsible AI.</p><p>The conversation examines real-world examples of AI drift, unintended or unethical model behavior, data lineage failures, procurement and vendor blind spots, and the rising need for scalable AI governance, AI security, responsible AI practices, and enterprise red teaming as organizations adopt generative AI.</p><p>Whether you work in cybersecurity, identity security, AI development, or technology leadership, this episode offers practical insights for managing AI risk and building systems that stay aligned, accountable, and trustworthy.</p>]]>
      </itunes:summary>
      <itunes:keywords>AI governance, AI security, responsible AI, AI red teaming, enterprise AI, generative AI, AI risk management, AI ethics, AI oversight, data governance, model governance, AI threats, AI drift, identity security, cybersecurity, stress testing AI, AI decision-making, AI policy, AI assurance, model testing, data lineage, vendor risk, enterprise security, government AI, public‑private collaboration, emerging AI risks, AI strategy, AI systems, Security Matters podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4e7eb30d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 22 - Security at the speed of innovation: Breaking down legacy barriers</title>
      <itunes:title>EP 22 - Security at the speed of innovation: Breaking down legacy barriers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">40f8696b-2fd0-42e9-82a8-dfe4276981d1</guid>
      <link>https://share.transistor.fm/s/25ae87df</link>
      <description>
        <![CDATA[<p>How are defenders supposed to keep up when attackers move at the speed of AI? In this episode of Security Matters, host David Puner welcomes Rick McElroy, founder and CEO of Nexasure, for a candid conversation about cybersecurity’s breaking point. Together, they unpack the realities of defending organizations in an era of identity sprawl, machine risk, agentic AI, and relentless automation. Rick shares hard-won insights from decades on the front lines, challenging the myth of perfect defense and revealing why identity remains at the root of most breaches. Whether you’re a CISO, IT leader, or cybersecurity professional, you’ll get actionable advice on managing machine identities, rethinking risk, and building resilience for a future where change is the only constant.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How are defenders supposed to keep up when attackers move at the speed of AI? In this episode of Security Matters, host David Puner welcomes Rick McElroy, founder and CEO of Nexasure, for a candid conversation about cybersecurity’s breaking point. Together, they unpack the realities of defending organizations in an era of identity sprawl, machine risk, agentic AI, and relentless automation. Rick shares hard-won insights from decades on the front lines, challenging the myth of perfect defense and revealing why identity remains at the root of most breaches. Whether you’re a CISO, IT leader, or cybersecurity professional, you’ll get actionable advice on managing machine identities, rethinking risk, and building resilience for a future where change is the only constant.</p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Dec 2025 12:40:53 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/25ae87df/aed11491.mp3" length="41753423" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/czE7ziN9E1bQovT0Lfnp9NXOC0PaowgtP4tuj4AsLFI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNWQ2/OTgyOTk4YWQxMGE1/YmU3MWVkMzUxYTg4/YWVlMC5qcGc.jpg"/>
      <itunes:duration>2610</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How are defenders supposed to keep up when attackers move at the speed of AI? In this episode of Security Matters, host David Puner welcomes Rick McElroy, founder and CEO of Nexasure, for a candid conversation about cybersecurity’s breaking point. Together, they unpack the realities of defending organizations in an era of identity sprawl, machine risk, agentic AI, and relentless automation. Rick shares hard-won insights from decades on the front lines, challenging the myth of perfect defense and revealing why identity remains at the root of most breaches. Whether you’re a CISO, IT leader, or cybersecurity professional, you’ll get actionable advice on managing machine identities, rethinking risk, and building resilience for a future where change is the only constant.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Rick McElroy, identity security, machine identities, AI, deepfakes, CISO, risk management, security leadership, automation, innovation, Security Matters podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/25ae87df/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 21 - When attackers log in: Pausing for perspective in the age of instant answers</title>
      <itunes:title>EP 21 - When attackers log in: Pausing for perspective in the age of instant answers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">01c4bf75-13d9-41f7-8dd1-d3759e5f20f3</guid>
      <link>https://share.transistor.fm/s/06b54150</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk’s Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today’s attackers aren’t breaking in—they’re logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.</p><p>The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.</p><p>Whether you’re a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk’s Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today’s attackers aren’t breaking in—they’re logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.</p><p>The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.</p><p>Whether you’re a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.</p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Dec 2025 10:07:38 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/06b54150/f61ff0c5.mp3" length="42080267" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kMagwpeVtZDTBWzILhAwyiwGuYTNhynNfYkiyp61pvg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kMGMy/YzkxMDhmZGJiN2Q3/NjllY2Q4NzhhYjAz/YzA2NS5qcGc.jpg"/>
      <itunes:duration>2630</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk’s Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today’s attackers aren’t breaking in—they’re logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.</p><p>The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.</p><p>Whether you’re a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.</p>]]>
      </itunes:summary>
      <itunes:keywords>ai in cybersecurity, identity security, social engineering, phishing attacks, insider threats, credential compromise, zero standing privilege, critical thinking, misinformation, deepfakes, cyber resilience, shadow ai, user education, cyber hygiene, authentication, authorization, supply chain attacks, human oversight, security awareness, enterprise security, cyberattack trends, cybersecurity best practices, digital trust, security culture, automation in security, security training, cyber risk, data loss, compliance, security foundations</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/06b54150/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 20 - Why agentic AI is changing the security risk equation</title>
      <itunes:title>EP 20 - Why agentic AI is changing the security risk equation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a7765089-de59-4716-b48e-e0862a5e7f4c</guid>
      <link>https://share.transistor.fm/s/82828407</link>
      <description>
        <![CDATA[<p>As enterprises embrace agentic AI, a new security risk equation emerges. In this episode of <em>Security Matters</em>, host David Puner sits down with Lavi Lazarovitz, VP of Cyber Research at CyberArk Labs, to unpack how AI agents and identity security are reshaping the threat landscape. Learn why privileged access is now the fault line of enterprise security, how attackers exploit overprivileged AI agents, and what security teams must rethink before scaling AI. Packed with real-world examples and actionable insights, this is a must-listen for anyone meeting the challenges of AI and cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>As enterprises embrace agentic AI, a new security risk equation emerges. In this episode of <em>Security Matters</em>, host David Puner sits down with Lavi Lazarovitz, VP of Cyber Research at CyberArk Labs, to unpack how AI agents and identity security are reshaping the threat landscape. Learn why privileged access is now the fault line of enterprise security, how attackers exploit overprivileged AI agents, and what security teams must rethink before scaling AI. Packed with real-world examples and actionable insights, this is a must-listen for anyone meeting the challenges of AI and cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Nov 2025 08:51:28 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/82828407/5293cde4.mp3" length="43446576" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/lJS6N9jaFkIKtYoRWL8FxXmct2PO9wUaQe4xpC-Bu5E/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZTY1/OWZlZGZjNWRhMzVh/NWYxNjI5ZDUwYmMw/ODA2Mi5qcGc.jpg"/>
      <itunes:duration>2716</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>As enterprises embrace agentic AI, a new security risk equation emerges. In this episode of <em>Security Matters</em>, host David Puner sits down with Lavi Lazarovitz, VP of Cyber Research at CyberArk Labs, to unpack how AI agents and identity security are reshaping the threat landscape. Learn why privileged access is now the fault line of enterprise security, how attackers exploit overprivileged AI agents, and what security teams must rethink before scaling AI. Packed with real-world examples and actionable insights, this is a must-listen for anyone meeting the challenges of AI and cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>agentic AI, AI agents, cybersecurity, identity security, privileged access, attack surface, enterprise security, CyberArk, Lavi Lazarovitz, David Puner, automation, entitlements, risk management, AI threats, security controls, zero standing privilege, machine identity, podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/82828407/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 19 - Trust Under Attack: Spies, Lies, and the New Face of Cybercrime</title>
      <itunes:title>EP 19 - Trust Under Attack: Spies, Lies, and the New Face of Cybercrime</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3327f322-89b3-4b3f-9a71-9cda95f6d9cd</guid>
      <link>https://share.transistor.fm/s/be65c912</link>
      <description>
        <![CDATA[<p>Eric O’Neill, former FBI ghost and author of <a href="https://ericoneill.net/books/spies_and_lies/">“Spies, Lies &amp; Cybercrime,”</a> joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today’s sophisticated cyber threats. Drawing on O’Neill’s experience catching spies and investigating cybercriminals, the conversation explains how thinking like an attacker can help organizations and individuals stay ahead. The episode covers actionable frameworks, real-world stories, and practical advice for building cyber resilience in an age of AI-driven scams and industrialized ransomware.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Eric O’Neill, former FBI ghost and author of <a href="https://ericoneill.net/books/spies_and_lies/">“Spies, Lies &amp; Cybercrime,”</a> joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today’s sophisticated cyber threats. Drawing on O’Neill’s experience catching spies and investigating cybercriminals, the conversation explains how thinking like an attacker can help organizations and individuals stay ahead. The episode covers actionable frameworks, real-world stories, and practical advice for building cyber resilience in an age of AI-driven scams and industrialized ransomware.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Nov 2025 10:00:58 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/be65c912/4a1eabda.mp3" length="52156450" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DIfwA1ilpf71BHo7kmGUXf3DfFjeHGTYMdEOVpbsuAs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hY2Ix/MDYxMGI3ZTQ1YmMx/OTMyYzY1OTMwOTM3/N2E0NS5qcGc.jpg"/>
      <itunes:duration>3258</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Eric O’Neill, former FBI ghost and author of <a href="https://ericoneill.net/books/spies_and_lies/">“Spies, Lies &amp; Cybercrime,”</a> joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today’s sophisticated cyber threats. Drawing on O’Neill’s experience catching spies and investigating cybercriminals, the conversation explains how thinking like an attacker can help organizations and individuals stay ahead. The episode covers actionable frameworks, real-world stories, and practical advice for building cyber resilience in an age of AI-driven scams and industrialized ransomware.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, cybercrime, Eric O’Neill, trust, social engineering, ransomware, deepfakes, Security Matters podcast, FBI, identity security, cyber attacks, deception, insider threats</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/be65c912/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI</title>
      <itunes:title>EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0e709585-c47e-4b8d-a607-dbbbbf25cbe5</guid>
      <link>https://share.transistor.fm/s/2bad8a46</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace. Yuval shares insights from his 25-year cybersecurity journey, including why AI agents behave more like humans than machines—and why that’s both exciting and dangerous. Whether you're a security leader, technologist or curious listener, this episode offers practical guidance on managing AI agent identities, reducing risk, and preparing for the next wave of autonomous innovation.</p><p>Explore more of Yuval’s thinking on agentic AI and identity-first security in these recent articles:</p><ul><li><a href="https://www.cyberark.com/resources/blog/the-life-and-death-of-an-ai-agent-identity-security-lessons-from-the-human-experience">The life and death of an AI agent: Identity security lessons from the human experience</a></li><li><a href="https://techstrong.ai/aiops/when-ai-agents-mirror-humanitys-best-behaviorsand-worst-behaviors/">When AI Agents Mirror Humanity’s Best Behaviors…and Worst Behaviors</a> </li><li><a href="https://www.cyberark.com/resources/blog/the-agentic-ai-revolution-5-unexpected-security-challenges">The Agentic AI Revolution: 5 Unexpected Security Challenges</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace. Yuval shares insights from his 25-year cybersecurity journey, including why AI agents behave more like humans than machines—and why that’s both exciting and dangerous. Whether you're a security leader, technologist or curious listener, this episode offers practical guidance on managing AI agent identities, reducing risk, and preparing for the next wave of autonomous innovation.</p><p>Explore more of Yuval’s thinking on agentic AI and identity-first security in these recent articles:</p><ul><li><a href="https://www.cyberark.com/resources/blog/the-life-and-death-of-an-ai-agent-identity-security-lessons-from-the-human-experience">The life and death of an AI agent: Identity security lessons from the human experience</a></li><li><a href="https://techstrong.ai/aiops/when-ai-agents-mirror-humanitys-best-behaviorsand-worst-behaviors/">When AI Agents Mirror Humanity’s Best Behaviors…and Worst Behaviors</a> </li><li><a href="https://www.cyberark.com/resources/blog/the-agentic-ai-revolution-5-unexpected-security-challenges">The Agentic AI Revolution: 5 Unexpected Security Challenges</a></li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 28 Oct 2025 09:31:30 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/2bad8a46/3a6f9a84.mp3" length="41028612" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Wsg-tX1L2LoW1GlWJgyjor8f4IKwk4Ejcypdl11Dgu4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYmRm/ZDllMTBlYTAyYjY5/YTMyMTZmNGMzOGI3/MTJhZC5qcGc.jpg"/>
      <itunes:duration>2563</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace. Yuval shares insights from his 25-year cybersecurity journey, including why AI agents behave more like humans than machines—and why that’s both exciting and dangerous. Whether you're a security leader, technologist or curious listener, this episode offers practical guidance on managing AI agent identities, reducing risk, and preparing for the next wave of autonomous innovation.</p><p>Explore more of Yuval’s thinking on agentic AI and identity-first security in these recent articles:</p><ul><li><a href="https://www.cyberark.com/resources/blog/the-life-and-death-of-an-ai-agent-identity-security-lessons-from-the-human-experience">The life and death of an AI agent: Identity security lessons from the human experience</a></li><li><a href="https://techstrong.ai/aiops/when-ai-agents-mirror-humanitys-best-behaviorsand-worst-behaviors/">When AI Agents Mirror Humanity’s Best Behaviors…and Worst Behaviors</a> </li><li><a href="https://www.cyberark.com/resources/blog/the-agentic-ai-revolution-5-unexpected-security-challenges">The Agentic AI Revolution: 5 Unexpected Security Challenges</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>AI agents, agentic AI, cybersecurity, identity security, zero trust, insider risk, automation, enterprise security, rogue AI, CyberArk, David Puner, Yuval Moss, Security Matters podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2bad8a46/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 17 - Privilege creep and the machine identity surge: Securing the modern enterprise </title>
      <itunes:title>EP 17 - Privilege creep and the machine identity surge: Securing the modern enterprise </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a346b086-5b93-4068-81dc-5e32e7967ba2</guid>
      <link>https://share.transistor.fm/s/367fde4e</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, <a href="https://www.cyderes.com/company/about/chris-schueler">Chris Schueler, CEO of Cyderes</a>, joins host David Puner for a dive into the evolving challenges of enterprise security. The conversation explores the dangers of privilege creep, the explosion of machine identities, and why accountability at every point of interaction is essential for building resilient teams and systems. Chris shares insights on the risks of unmanaged access, the impact of AI and automation on both defense and attack strategies, and practical advice for CISOs and boards on managing identity risk while enabling business transformation. </p><p>Whether you’re a security leader, practitioner, or simply interested in the future of cybersecurity, this episode delivers actionable guidance and fresh perspectives on safeguarding your organization’s reputation, continuity, and trust.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, <a href="https://www.cyderes.com/company/about/chris-schueler">Chris Schueler, CEO of Cyderes</a>, joins host David Puner for a dive into the evolving challenges of enterprise security. The conversation explores the dangers of privilege creep, the explosion of machine identities, and why accountability at every point of interaction is essential for building resilient teams and systems. Chris shares insights on the risks of unmanaged access, the impact of AI and automation on both defense and attack strategies, and practical advice for CISOs and boards on managing identity risk while enabling business transformation. </p><p>Whether you’re a security leader, practitioner, or simply interested in the future of cybersecurity, this episode delivers actionable guidance and fresh perspectives on safeguarding your organization’s reputation, continuity, and trust.</p>]]>
      </content:encoded>
      <pubDate>Thu, 09 Oct 2025 09:50:53 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/367fde4e/900583c2.mp3" length="47983530" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4uaE47BerLmP6mUmO_TJ89P1fB6OYJPA3q4LM-MPTBI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80OTI5/Mzg1ODc5ZGUxOGU4/NWViYzc4MWJjNTUy/MmZkZi5qcGc.jpg"/>
      <itunes:duration>2997</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, <a href="https://www.cyderes.com/company/about/chris-schueler">Chris Schueler, CEO of Cyderes</a>, joins host David Puner for a dive into the evolving challenges of enterprise security. The conversation explores the dangers of privilege creep, the explosion of machine identities, and why accountability at every point of interaction is essential for building resilient teams and systems. Chris shares insights on the risks of unmanaged access, the impact of AI and automation on both defense and attack strategies, and practical advice for CISOs and boards on managing identity risk while enabling business transformation. </p><p>Whether you’re a security leader, practitioner, or simply interested in the future of cybersecurity, this episode delivers actionable guidance and fresh perspectives on safeguarding your organization’s reputation, continuity, and trust.</p>]]>
      </itunes:summary>
      <itunes:keywords>privilege creep, machine identities, identity sprawl, cybersecurity, enterprise security, accountability, AI in security, automation, identity risk, business resilience, CISOs, boards, access management, non-human credentials, identity analytics, threat detection, privilege management, cloud security, zero trust, security teams, business transformation, Chris Schueler, Cyderes, Security Matters podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/367fde4e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 16 - Sensing the signals: The hidden risks in digital supply chains</title>
      <itunes:title>EP 16 - Sensing the signals: The hidden risks in digital supply chains</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2300665f-07db-45a4-aa5f-0e3015d51d9f</guid>
      <link>https://share.transistor.fm/s/63a30d32</link>
      <description>
        <![CDATA[<p>Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by <a href="https://mitmgmtfaculty.mit.edu/retsef/">Retsef Levi</a>, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.</p><p>Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn’t enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.</p><p>Key topics include:</p><ul><li>How to sense early warning signs of supply chain attacks</li><li>The role of AI and automation in both risk and defense</li><li>Best practices for mapping and securing your digital ecosystem</li><li>Why resilience—not just prevention—must be at the core of your security strategy</li></ul><p>Whether you’re a CISO, IT leader or security practitioner, this episode will help you rethink your approach to digital supply chain risk and prepare your organization for what’s next.</p><p><a href="https://podcasts.apple.com/us/podcast/security-matters/id1620186412">Subscribe to Security Matters</a> for expert insights on identity security, cyber resilience and the evolving threat landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by <a href="https://mitmgmtfaculty.mit.edu/retsef/">Retsef Levi</a>, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.</p><p>Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn’t enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.</p><p>Key topics include:</p><ul><li>How to sense early warning signs of supply chain attacks</li><li>The role of AI and automation in both risk and defense</li><li>Best practices for mapping and securing your digital ecosystem</li><li>Why resilience—not just prevention—must be at the core of your security strategy</li></ul><p>Whether you’re a CISO, IT leader or security practitioner, this episode will help you rethink your approach to digital supply chain risk and prepare your organization for what’s next.</p><p><a href="https://podcasts.apple.com/us/podcast/security-matters/id1620186412">Subscribe to Security Matters</a> for expert insights on identity security, cyber resilience and the evolving threat landscape.</p>]]>
      </content:encoded>
      <pubDate>Thu, 25 Sep 2025 13:18:24 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/63a30d32/2d04ccf8.mp3" length="46678236" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/JZ28Ofb5BmwPQr7GgQzrm_tcyg9RTFGst_YvX-acy84/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yNWFh/YjdiZDk2MjY5YWIz/N2RlNmVlYWEyMzdm/NDQ5Ny5qcGc.jpg"/>
      <itunes:duration>2918</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Modern digital supply chains are increasingly complex and vulnerable. In this episode of Security Matters, host David Puner is joined by <a href="https://mitmgmtfaculty.mit.edu/retsef/">Retsef Levi</a>, professor of operations management at the MIT Sloan School of Management, to explore how organizations can “sense the signals” of hidden risks lurking within their software supply chains, from open source dependencies to third-party integrations and AI-driven automation.</p><p>Professor Levi, a leading expert in cyber resilience and complex systems, explains why traditional prevention isn’t enough and how attackers exploit unseen pathways to infiltrate even the most secure enterprises. The conversation covers the critical need for transparency, continuous monitoring, and rapid detection and recovery in an era where software is built from countless unknown components.</p><p>Key topics include:</p><ul><li>How to sense early warning signs of supply chain attacks</li><li>The role of AI and automation in both risk and defense</li><li>Best practices for mapping and securing your digital ecosystem</li><li>Why resilience—not just prevention—must be at the core of your security strategy</li></ul><p>Whether you’re a CISO, IT leader or security practitioner, this episode will help you rethink your approach to digital supply chain risk and prepare your organization for what’s next.</p><p><a href="https://podcasts.apple.com/us/podcast/security-matters/id1620186412">Subscribe to Security Matters</a> for expert insights on identity security, cyber resilience and the evolving threat landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, digital supply chain, supply chain risk, software security, open source, AI security, cyber resilience, identity security, cyber attacks, risk management, Retsef Levi, MIT Sloan, Security Matters podcast, continuous monitoring, situational awareness, detection and response, resilience, automation, third-party risk, software vulnerabilities, enterprise security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/63a30d32/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 15 - Why banks need to treat machine identities like VIPs</title>
      <itunes:title>EP 15 - Why banks need to treat machine identities like VIPs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c515758a-ad49-4ef5-9d58-aec4fdc866e3</guid>
      <link>https://share.transistor.fm/s/b5518b0b</link>
      <description>
        <![CDATA[<p>In this episode of <em>Security Matters</em>, host David Puner speaks with Andy Parsons, CyberArk’s Director of EMEA Financial Services and Insurance, whose career spans from the British Army to CISO and CTO roles in global financial institutions. Andy shares hard-earned lessons on leadership, risk management, and the evolving cybersecurity landscape in banking—from insider threats to machine identity governance and the rise of agentic AI.</p><p>Discover why “you can’t secure what you can’t see,” how manual processes fail at scale, and why treating machine identities as <em>“first-class citizens”</em> is no longer optional. Andy also explores the privileged access paradox, dynamic access management, and how AI is reshaping compliance, trading, and operational resilience.</p><p>Whether you're a security leader, technologist, or financial executive, this episode offers strategic insights and practical steps to future-proof your organization in an era of accelerating digital risk.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Security Matters</em>, host David Puner speaks with Andy Parsons, CyberArk’s Director of EMEA Financial Services and Insurance, whose career spans from the British Army to CISO and CTO roles in global financial institutions. Andy shares hard-earned lessons on leadership, risk management, and the evolving cybersecurity landscape in banking—from insider threats to machine identity governance and the rise of agentic AI.</p><p>Discover why “you can’t secure what you can’t see,” how manual processes fail at scale, and why treating machine identities as <em>“first-class citizens”</em> is no longer optional. Andy also explores the privileged access paradox, dynamic access management, and how AI is reshaping compliance, trading, and operational resilience.</p><p>Whether you're a security leader, technologist, or financial executive, this episode offers strategic insights and practical steps to future-proof your organization in an era of accelerating digital risk.</p>]]>
      </content:encoded>
      <pubDate>Wed, 10 Sep 2025 12:14:35 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/b5518b0b/2eb12df8.mp3" length="43300714" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/t2XhdtNXKvG5CTuJo0oA4emaVLyXNnDEpIdeWfZ0rGo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMTc4/YmJiM2U4ZGEyNzAw/YmZlYzM0ZTc1YzEx/NThjOC5qcGc.jpg"/>
      <itunes:duration>2705</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Security Matters</em>, host David Puner speaks with Andy Parsons, CyberArk’s Director of EMEA Financial Services and Insurance, whose career spans from the British Army to CISO and CTO roles in global financial institutions. Andy shares hard-earned lessons on leadership, risk management, and the evolving cybersecurity landscape in banking—from insider threats to machine identity governance and the rise of agentic AI.</p><p>Discover why “you can’t secure what you can’t see,” how manual processes fail at scale, and why treating machine identities as <em>“first-class citizens”</em> is no longer optional. Andy also explores the privileged access paradox, dynamic access management, and how AI is reshaping compliance, trading, and operational resilience.</p><p>Whether you're a security leader, technologist, or financial executive, this episode offers strategic insights and practical steps to future-proof your organization in an era of accelerating digital risk.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, financial services, machine identity, AI governance, privileged access, zero trust, operational resilience, insider threats, risk management, CyberArk, Andy Parsons, David Puner, Security Matters podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b5518b0b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 14 - Beyond secrets: Securing the future of machine identity</title>
      <itunes:title>EP 14 - Beyond secrets: Securing the future of machine identity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">67f76604-3779-4cee-ae73-d55ac2ecdd26</guid>
      <link>https://share.transistor.fm/s/167f4b77</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Matt Barker, CyberArk’s VP and Global Head of Workload Identity Architecture, for a deep dive into the exploding world of machine identities and the urgent need to rethink how to secure them. From his journey co-founding Jetstack and creating Cert Manager to leading CyberArk’s efforts in workload identity, Matt shares insights on why secrets-based security is no longer sustainable—and how open standards like SPIFFE are reshaping the future of cloud-native and AI-driven environments.</p><p>Discover how machine identities now outnumber humans 80 to 1, why leaked secrets are a "hacker’s buffet," and how workload identity is becoming a cornerstone of Zero Trust architecture. Whether you're a CISO, platform engineer, or just curious about the next frontier in cybersecurity, this episode offers actionable advice and a compelling vision for securing the age of AI agents.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Matt Barker, CyberArk’s VP and Global Head of Workload Identity Architecture, for a deep dive into the exploding world of machine identities and the urgent need to rethink how to secure them. From his journey co-founding Jetstack and creating Cert Manager to leading CyberArk’s efforts in workload identity, Matt shares insights on why secrets-based security is no longer sustainable—and how open standards like SPIFFE are reshaping the future of cloud-native and AI-driven environments.</p><p>Discover how machine identities now outnumber humans 80 to 1, why leaked secrets are a "hacker’s buffet," and how workload identity is becoming a cornerstone of Zero Trust architecture. Whether you're a CISO, platform engineer, or just curious about the next frontier in cybersecurity, this episode offers actionable advice and a compelling vision for securing the age of AI agents.</p>]]>
      </content:encoded>
      <pubDate>Wed, 27 Aug 2025 09:32:20 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/167f4b77/3bc9b370.mp3" length="43792646" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BjjQnh6KIfchO7a4uN_VymN-XbXWRKXu4Ze-SZx3dIc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNjYx/NjM0OTJkMjdkNzg3/YTkxMjBkNDNiMTgw/NWM2NC5qcGc.jpg"/>
      <itunes:duration>2738</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Matt Barker, CyberArk’s VP and Global Head of Workload Identity Architecture, for a deep dive into the exploding world of machine identities and the urgent need to rethink how to secure them. From his journey co-founding Jetstack and creating Cert Manager to leading CyberArk’s efforts in workload identity, Matt shares insights on why secrets-based security is no longer sustainable—and how open standards like SPIFFE are reshaping the future of cloud-native and AI-driven environments.</p><p>Discover how machine identities now outnumber humans 80 to 1, why leaked secrets are a "hacker’s buffet," and how workload identity is becoming a cornerstone of Zero Trust architecture. Whether you're a CISO, platform engineer, or just curious about the next frontier in cybersecurity, this episode offers actionable advice and a compelling vision for securing the age of AI agents.</p>]]>
      </itunes:summary>
      <itunes:keywords>workload identity, machine identity, SPIFFE, Cert Manager, secrets management, AI agents, zero trust, cloud-native security, Kubernetes, CyberArk, Matt Barker, David Puner, Security Matters podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/167f4b77/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 13 - Pizza parties and profit margins: The business of cybercrime</title>
      <itunes:title>EP 13 - Pizza parties and profit margins: The business of cybercrime</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6fa9e2f2-e7c7-4bae-ac7b-387862b7e626</guid>
      <link>https://share.transistor.fm/s/0d9f5d97</link>
      <description>
        <![CDATA[<p>Cybercriminals today operate more like startups than stereotypes—complete with org charts, sprint cycles, and pizza parties to celebrate successful breaches. In this episode of Security Matters, host David Puner talks with former CISO and U.S. Air Force veteran Ian Schneller about the evolving sophistication of threat actors and what it takes to stay ahead.</p><p>From zero-day vulnerabilities and machine identity risks to AI-powered attacks and insider threats, Ian shares practical strategies drawn from his experience in military intelligence, offensive cyber operations, and corporate security leadership. Learn how to build resilience, translate cyber risk into business outcomes, and lead with mission-driven clarity in a threat landscape that never slows down.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cybercriminals today operate more like startups than stereotypes—complete with org charts, sprint cycles, and pizza parties to celebrate successful breaches. In this episode of Security Matters, host David Puner talks with former CISO and U.S. Air Force veteran Ian Schneller about the evolving sophistication of threat actors and what it takes to stay ahead.</p><p>From zero-day vulnerabilities and machine identity risks to AI-powered attacks and insider threats, Ian shares practical strategies drawn from his experience in military intelligence, offensive cyber operations, and corporate security leadership. Learn how to build resilience, translate cyber risk into business outcomes, and lead with mission-driven clarity in a threat landscape that never slows down.</p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Aug 2025 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/0d9f5d97/6d5edb58.mp3" length="38859012" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/XcMGWPhCSAaaCmLETHWjgfOK5StpJ-KJUP4h8vRtB5U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMmFh/ODA4NWRjOGVlMGU2/YjFlNzAwZmQ2NmM3/NTdkNC5qcGc.jpg"/>
      <itunes:duration>2429</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Cybercriminals today operate more like startups than stereotypes—complete with org charts, sprint cycles, and pizza parties to celebrate successful breaches. In this episode of Security Matters, host David Puner talks with former CISO and U.S. Air Force veteran Ian Schneller about the evolving sophistication of threat actors and what it takes to stay ahead.</p><p>From zero-day vulnerabilities and machine identity risks to AI-powered attacks and insider threats, Ian shares practical strategies drawn from his experience in military intelligence, offensive cyber operations, and corporate security leadership. Learn how to build resilience, translate cyber risk into business outcomes, and lead with mission-driven clarity in a threat landscape that never slows down.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybercrime, threat actors, identity security, zero-day vulnerabilities, machine identity, AI-powered attacks, insider threats, cyber resilience, mission-driven leadership, cybersecurity strategy, digital risk, security operations, cybercriminal organizations, startup-style cybercrime, cybersecurity podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0d9f5d97/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 12 - From assumptions to accountability: A CISO’s take on cloud risk</title>
      <itunes:title>EP 12 - From assumptions to accountability: A CISO’s take on cloud risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">863aaea0-0b9e-4447-b0a2-fa62495a4d3e</guid>
      <link>https://share.transistor.fm/s/ab446023</link>
      <description>
        <![CDATA[<p><strong>What does "secure by default" really mean—and is it enough?</strong> In this episode of CyberArk’s <em>Security Matters</em>, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.</p><p>Drawing on over 25 years in cybersecurity, Scott shares how he balances product and corporate security, leads a global team, and chairs his company’s AI steering committee. He discusses the importance of machine identity management, certificate automation, and building security programs that support both innovation and accountability.</p><p>Plus, Scott reflects on how his passion for travel—including a group trip to Antarctica—informs his leadership style and security mindset.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>What does "secure by default" really mean—and is it enough?</strong> In this episode of CyberArk’s <em>Security Matters</em>, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.</p><p>Drawing on over 25 years in cybersecurity, Scott shares how he balances product and corporate security, leads a global team, and chairs his company’s AI steering committee. He discusses the importance of machine identity management, certificate automation, and building security programs that support both innovation and accountability.</p><p>Plus, Scott reflects on how his passion for travel—including a group trip to Antarctica—informs his leadership style and security mindset.</p>]]>
      </content:encoded>
      <pubDate>Tue, 29 Jul 2025 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/ab446023/78b79cd4.mp3" length="39677794" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ALfLHG8ZmajbqAVhdcjurQApmLb2Qksq1O9kRn4RgmM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80ZWE0/MDFlMTJkMWQxYTg3/MjBkZTZhMmExNjA2/Y2Q3ZS5qcGc.jpg"/>
      <itunes:duration>2480</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>What does "secure by default" really mean—and is it enough?</strong> In this episode of CyberArk’s <em>Security Matters</em>, host David Puner sits down with Scott Barronton, Chief Information Security Officer (CISO) at Diebold Nixdorf, to explore the often-overlooked risks of cloud default settings and how assumptions can lead to vulnerabilities.</p><p>Drawing on over 25 years in cybersecurity, Scott shares how he balances product and corporate security, leads a global team, and chairs his company’s AI steering committee. He discusses the importance of machine identity management, certificate automation, and building security programs that support both innovation and accountability.</p><p>Plus, Scott reflects on how his passion for travel—including a group trip to Antarctica—informs his leadership style and security mindset.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Cloud Security, CISO, Identity Security, Machine Identity, AI Governance, Retail Tech, Financial Services, Certificate Management, Insider Threat, Diebold Nixdorf, Scott Barrington, CyberArk, Security Podcast, Security Matters</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ab446023/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 11 - The calm CISO: Strength under pressure</title>
      <itunes:title>EP 11 - The calm CISO: Strength under pressure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">06bd7c0f-91f4-43cf-99c5-94fddbc8ad8a</guid>
      <link>https://share.transistor.fm/s/9a73f949</link>
      <description>
        <![CDATA[<p>What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant. They explore what it means to lead with clarity and composure in a high-stakes environment, the realities of launching a firm in a crowded market, and how pragmatic security strategies—especially around identity, AI, and Zero Trust—can help organizations navigate AI-driven threats, talent shortages, and operational complexity. It’s a candid conversation about what works and what doesn’t when it comes to modern security leadership.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant. They explore what it means to lead with clarity and composure in a high-stakes environment, the realities of launching a firm in a crowded market, and how pragmatic security strategies—especially around identity, AI, and Zero Trust—can help organizations navigate AI-driven threats, talent shortages, and operational complexity. It’s a candid conversation about what works and what doesn’t when it comes to modern security leadership.</p>]]>
      </content:encoded>
      <pubDate>Tue, 15 Jul 2025 13:43:30 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/9a73f949/92a62656.mp3" length="44384058" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fx0P69DoBMK5rO0J0ElD84SHe_udPZ0woz2bzomh6os/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81NWM4/OTAwZTAzNjhhYmI3/MjJmYjc4YTFkY2U1/MzQ0MC5qcGc.jpg"/>
      <itunes:duration>2774</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant. They explore what it means to lead with clarity and composure in a high-stakes environment, the realities of launching a firm in a crowded market, and how pragmatic security strategies—especially around identity, AI, and Zero Trust—can help organizations navigate AI-driven threats, talent shortages, and operational complexity. It’s a candid conversation about what works and what doesn’t when it comes to modern security leadership.</p>]]>
      </itunes:summary>
      <itunes:keywords>pragmatic security, cybersecurity leadership, fractional CISO, virtual CISO, vCISO, startup security, AI in cybersecurity, calm leadership, cyber talent shortage, Zero Trust, security strategy, SMB cybersecurity, cyber risk management, security consulting, cybersecurity careers, emotional resilience in security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9a73f949/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 10 - A new identity crisis: governance in the AI age</title>
      <itunes:title>EP 10 - A new identity crisis: governance in the AI age</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">67f5b772-3406-4e7b-81ae-a0c0e74a23ce</guid>
      <link>https://share.transistor.fm/s/907b8170</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.</p><p>Listeners will learn:</p><ul><li>Why legacy identity governance models are breaking under cloud scale</li><li>How AI agents are reshaping entitlement management and threat detection</li><li>What organizations must do to secure non-human identities and interlinked dependencies</li><li>Why time-to-value and outcome-driven metrics are essential for modern IGA success</li></ul><p>Whether you're a CISO, identity architect, or security strategist, this episode delivers actionable guidance for navigating the evolving identity security landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.</p><p>Listeners will learn:</p><ul><li>Why legacy identity governance models are breaking under cloud scale</li><li>How AI agents are reshaping entitlement management and threat detection</li><li>What organizations must do to secure non-human identities and interlinked dependencies</li><li>Why time-to-value and outcome-driven metrics are essential for modern IGA success</li></ul><p>Whether you're a CISO, identity architect, or security strategist, this episode delivers actionable guidance for navigating the evolving identity security landscape.</p>]]>
      </content:encoded>
      <pubDate>Thu, 26 Jun 2025 08:07:55 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/907b8170/9f16f4d2.mp3" length="34908019" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ssdxPBNT08uG26QClvtkpK490VNds96QtvD5RJkylTw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80OTUy/ZTI2OWRjN2JlOWEy/ZmQwZmZlMzhiNzUw/MGQ3YS5qcGc.jpg"/>
      <itunes:duration>2180</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Deepak Taneja, co-founder of Zilla Security and General Manager of Identity Governance at CyberArk, to explore why 2025 marks a pivotal moment for identity security. From the explosion of machine identities—now outnumbering human identities 80 to 1—to the convergence of IGA, PAM, and AI-driven automation, Deepak shares insights from his decades-long career at the forefront of identity innovation.</p><p>Listeners will learn:</p><ul><li>Why legacy identity governance models are breaking under cloud scale</li><li>How AI agents are reshaping entitlement management and threat detection</li><li>What organizations must do to secure non-human identities and interlinked dependencies</li><li>Why time-to-value and outcome-driven metrics are essential for modern IGA success</li></ul><p>Whether you're a CISO, identity architect, or security strategist, this episode delivers actionable guidance for navigating the evolving identity security landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>Identity Governance, IGA, Machine Identity, AI Security, identity security, CyberArk, Deepak Tenia, Security Matters Podcast, Cloud Security, Zero Trust, Privileged Access Management, Identity Threat Detection, Time to Value, Non-Human Identity, Enterprise Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/907b8170/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 9 - J&amp;J’s former CISO on trust, identity, and the future of cybersecurity</title>
      <itunes:title>EP 9 - J&amp;J’s former CISO on trust, identity, and the future of cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">316e4e56-e26f-485c-bd75-0659c305fb07</guid>
      <link>https://share.transistor.fm/s/790f30c1</link>
      <description>
        <![CDATA[<p>In this episode of <em>Security Matters</em>, host David Puner sits down with Marene Allison, former Chief Information Security Officer (CISO) of Johnson &amp; Johnson, for a candid and wide-ranging conversation on trust, identity, and leadership in cybersecurity. From securing global vaccine supply chains during the COVID-19 pandemic to navigating the rise of AI and machine identities, Marene shares hard-earned insights from her decades-long career in national security and the private sector.</p><p>They explore what it means to be a mission-driven CISO, how to build trust from the boardroom to the front lines, and why identity has always been the true perimeter. Marene also reflects on her post-CISO chapter and the evolving role of cybersecurity leaders in a rapidly evolving threat landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Security Matters</em>, host David Puner sits down with Marene Allison, former Chief Information Security Officer (CISO) of Johnson &amp; Johnson, for a candid and wide-ranging conversation on trust, identity, and leadership in cybersecurity. From securing global vaccine supply chains during the COVID-19 pandemic to navigating the rise of AI and machine identities, Marene shares hard-earned insights from her decades-long career in national security and the private sector.</p><p>They explore what it means to be a mission-driven CISO, how to build trust from the boardroom to the front lines, and why identity has always been the true perimeter. Marene also reflects on her post-CISO chapter and the evolving role of cybersecurity leaders in a rapidly evolving threat landscape.</p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Jun 2025 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/790f30c1/0419fa4a.mp3" length="39879641" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/j6mTsja8WLR8bjrpDFw6HwefCYKNhw-0hfyWr93LEU8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMWU3/YWNiNGI2MGQ5ZDIw/MGEzNThiYjQ4N2Nm/MzRlMS5qcGc.jpg"/>
      <itunes:duration>2491</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>Security Matters</em>, host David Puner sits down with Marene Allison, former Chief Information Security Officer (CISO) of Johnson &amp; Johnson, for a candid and wide-ranging conversation on trust, identity, and leadership in cybersecurity. From securing global vaccine supply chains during the COVID-19 pandemic to navigating the rise of AI and machine identities, Marene shares hard-earned insights from her decades-long career in national security and the private sector.</p><p>They explore what it means to be a mission-driven CISO, how to build trust from the boardroom to the front lines, and why identity has always been the true perimeter. Marene also reflects on her post-CISO chapter and the evolving role of cybersecurity leaders in a rapidly evolving threat landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, CISO, identity security, zero trust, AI in security, machine identities, healthcare cybersecurity, innovation, trust, leadership, ransomware, vaccine security, digital transformation, Security Matters podcast, Marene Allison, David Puner</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/790f30c1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 8 - Zero Trust, Zero Chill: Securing Machine Identity</title>
      <itunes:title>EP 8 - Zero Trust, Zero Chill: Securing Machine Identity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ddb3ed3b-db41-48ba-8195-0e9080a96c37</guid>
      <link>https://share.transistor.fm/s/2175b0b9</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.</p><p><br>According to the CyberArk <a href="https://www.cyberark.com/threat-landscape/">2025 Identity Security Landscape</a>, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages, breaches, and cascading system failures. In this episode of Security Matters, Kevin Bocek explains why this moment is pivotal for getting machine identity right—and how Zero Trust principles, automation, and visibility are essential to building cyber resilience.</p><p>We also explore the future of identity security—from AI kill switches and agentic AI to quantum threats—and how identity can serve as both a safeguard and a kill switch in the age of autonomous systems.</p><p>Whether you're a cybersecurity professional or simply interested in the latest security trends, this episode offers valuable insights into the importance of machine identity in safeguarding our digital world. Don’t forget to subscribe, leave a review, and follow Security Matters for more expert discussions on the latest in cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.</p><p><br>According to the CyberArk <a href="https://www.cyberark.com/threat-landscape/">2025 Identity Security Landscape</a>, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages, breaches, and cascading system failures. In this episode of Security Matters, Kevin Bocek explains why this moment is pivotal for getting machine identity right—and how Zero Trust principles, automation, and visibility are essential to building cyber resilience.</p><p>We also explore the future of identity security—from AI kill switches and agentic AI to quantum threats—and how identity can serve as both a safeguard and a kill switch in the age of autonomous systems.</p><p>Whether you're a cybersecurity professional or simply interested in the latest security trends, this episode offers valuable insights into the importance of machine identity in safeguarding our digital world. Don’t forget to subscribe, leave a review, and follow Security Matters for more expert discussions on the latest in cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Wed, 28 May 2025 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/2175b0b9/f1a979bc.mp3" length="43320352" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/XbJIRamzprNLSf_B8f91Z33AmSglTf79NKaj-QcyZas/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jYTVi/ODJjZjFiZGMzNzEw/YmUzMGI4Nzk3NTIx/MGMwZS5qcGc.jpg"/>
      <itunes:duration>2708</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.</p><p><br>According to the CyberArk <a href="https://www.cyberark.com/threat-landscape/">2025 Identity Security Landscape</a>, machine identities now outnumber human identities by more than 80 to 1. As organizations scale cloud workloads and automation, these identities are becoming a critical part of the cybersecurity frontline. From TLS certificate outages to API key exposures, failures in machine identity management can lead to outages, breaches, and cascading system failures. In this episode of Security Matters, Kevin Bocek explains why this moment is pivotal for getting machine identity right—and how Zero Trust principles, automation, and visibility are essential to building cyber resilience.</p><p>We also explore the future of identity security—from AI kill switches and agentic AI to quantum threats—and how identity can serve as both a safeguard and a kill switch in the age of autonomous systems.</p><p>Whether you're a cybersecurity professional or simply interested in the latest security trends, this episode offers valuable insights into the importance of machine identity in safeguarding our digital world. Don’t forget to subscribe, leave a review, and follow Security Matters for more expert discussions on the latest in cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>machine identity, identity security, cybersecurity, identity management, cyber defense, digital credentials, cyberthreats, cyber threats, security technologies, data protection</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2175b0b9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 7- Resilience in Identity Management: Avoiding Single Points of Failure</title>
      <itunes:title>EP 7- Resilience in Identity Management: Avoiding Single Points of Failure</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">35647f26-db82-43ae-9212-f70faf0fee4c</guid>
      <link>https://share.transistor.fm/s/2240b53c</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Eric Olden, co-founder and CEO of Strata Identity, and a pioneer in modern identity management. Eric shares his career journey, from founding Simplified to leading Oracle's global identity division, and discusses the critical importance of resilience in identity systems.</p><p>Discover how organizations can eliminate single points of failure, test their backup plans and ensure their digital operations remain robust even in the face of unexpected outages. Eric also delves into the concept of identity orchestration, explaining how it can unify multiple identity systems and enhance security.</p><p>Tune in to learn about the latest trends in identity management, including the intersection of AI and identity, and gain insights into how businesses can proactively assess and mitigate risks associated with identity outages.</p><p>Don't miss this engaging conversation filled with practical advice and forward-thinking strategies to help safeguard your organization's identity infrastructure.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Eric Olden, co-founder and CEO of Strata Identity, and a pioneer in modern identity management. Eric shares his career journey, from founding Simplified to leading Oracle's global identity division, and discusses the critical importance of resilience in identity systems.</p><p>Discover how organizations can eliminate single points of failure, test their backup plans and ensure their digital operations remain robust even in the face of unexpected outages. Eric also delves into the concept of identity orchestration, explaining how it can unify multiple identity systems and enhance security.</p><p>Tune in to learn about the latest trends in identity management, including the intersection of AI and identity, and gain insights into how businesses can proactively assess and mitigate risks associated with identity outages.</p><p>Don't miss this engaging conversation filled with practical advice and forward-thinking strategies to help safeguard your organization's identity infrastructure.</p>]]>
      </content:encoded>
      <pubDate>Thu, 15 May 2025 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/2240b53c/d64c65e8.mp3" length="43013152" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/L_HOCUCotHlnzGZDb5FReSqTv2tuRccCjL1xIMMW7Bc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82Njg2/NzYyMThkYzlmOTM3/ZGJjM2RmYmM1YzYw/NTNkOS5qcGc.jpg"/>
      <itunes:duration>2689</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, host David Puner sits down with Eric Olden, co-founder and CEO of Strata Identity, and a pioneer in modern identity management. Eric shares his career journey, from founding Simplified to leading Oracle's global identity division, and discusses the critical importance of resilience in identity systems.</p><p>Discover how organizations can eliminate single points of failure, test their backup plans and ensure their digital operations remain robust even in the face of unexpected outages. Eric also delves into the concept of identity orchestration, explaining how it can unify multiple identity systems and enhance security.</p><p>Tune in to learn about the latest trends in identity management, including the intersection of AI and identity, and gain insights into how businesses can proactively assess and mitigate risks associated with identity outages.</p><p>Don't miss this engaging conversation filled with practical advice and forward-thinking strategies to help safeguard your organization's identity infrastructure.</p>]]>
      </itunes:summary>
      <itunes:keywords>Identity Management, Resilience, Identity Orchestration, AI, Cybersecurity, Eric Olden, Strata Identity, Digital Operations, Backup Plans, Security Matters Podcast, identity security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2240b53c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 6 - Incident Response POV: 2025 Emerging Threats</title>
      <itunes:title>EP 6 - Incident Response POV: 2025 Emerging Threats</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b281f1dc-b7e1-4828-a116-83ab5d6ca6ef</guid>
      <link>https://share.transistor.fm/s/a6abc951</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.</p>]]>
      </content:encoded>
      <pubDate>Wed, 30 Apr 2025 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/a6abc951/24abc027.mp3" length="35239877" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/743hC9Esdttt2D8wtMVvfwbDf32w1kyKmsE7_97U2yA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZjY4/OTNmYTJiY2Y3MjUw/MmQyZjc3NDkzYzdl/NGQzNi5qcGc.jpg"/>
      <itunes:duration>2201</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, host David Puner, dives into the world of evolving cyberthreats with Bryan Murphy, Senior Director of CyberArk's Incident Response Team. Imagine a scenario where an attacker uses AI-generated deepfakes to impersonate your company's VP of finance, gaining unauthorized access to your environment. Bryan Murphy shares insights on how these sophisticated attacks are turning identity into the attack surface and why your first line of defense might be as simple as a video call. Learn about the latest trends in social engineering, credential tiering and the importance of visual verification in incident response. Don't miss this eye-opening discussion on how to protect your organization from the ever-evolving threat landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>cyber threats, cyberthreats, incident response, emerging threats, 2025 cybersecurity, hypervisor attacks, social engineering, credential dumps, cybersecurity trends, modern cyberattacks</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a6abc951/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 5 - Identity Debt: The Hidden Risk in SaaS Applications</title>
      <itunes:title>EP 5 - Identity Debt: The Hidden Risk in SaaS Applications</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b58d5ae0-7262-4a2b-a6a4-0d9a69d76779</guid>
      <link>https://share.transistor.fm/s/5ee065af</link>
      <description>
        <![CDATA[<p>In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel's elite Unit 8200 and explains why identity is now the new security perimeter. They delve into the challenges organizations face in managing SaaS applications, the impact of generative AI on cybersecurity and the importance of proactive identity governance. Tune in for tips on how to protect your organization from within and stay ahead of evolving threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel's elite Unit 8200 and explains why identity is now the new security perimeter. They delve into the challenges organizations face in managing SaaS applications, the impact of generative AI on cybersecurity and the importance of proactive identity governance. Tune in for tips on how to protect your organization from within and stay ahead of evolving threats.</p>]]>
      </content:encoded>
      <pubDate>Wed, 09 Apr 2025 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/5ee065af/60c6cfaf.mp3" length="31226632" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9A-NRN6XN5ta9pt9rujAYsydmwSJ7D8EabJSYS_P4Gc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wYzIz/ZjU4MWVmNWQ5YzBl/YWQ0ODIzMGYyOWM5/YzI2OS5qcGc.jpg"/>
      <itunes:duration>1950</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel's elite Unit 8200 and explains why identity is now the new security perimeter. They delve into the challenges organizations face in managing SaaS applications, the impact of generative AI on cybersecurity and the importance of proactive identity governance. Tune in for tips on how to protect your organization from within and stay ahead of evolving threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Identity Debt, SaaS Security, Grip Security, Lior Yaari, Identity Security, Identity Governance, Generative AI, Unit 8200, Security Matters Podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5ee065af/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape</title>
      <itunes:title>EP 4 - AI-Powered Fraud: Redefining the Identity Threat Landscape</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">412f18dc-6936-4454-a8c3-a62aba52c77e</guid>
      <link>https://share.transistor.fm/s/743f89b4</link>
      <description>
        <![CDATA[<p>Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.</p><p>In this episode of the Security Matters podcast, host David Puner is joined by Blair Cohen, Founder and President of AuthenticID, to discuss the evolving identity threat landscape. They explore the rise of synthetic fraud, the role of biometric authentication and how AI-driven security is reshaping the fight against cybercrime. Blair shares insights on the challenges of detecting deepfakes, the advancements in biometric authentication and the impact of generative AI on security measures.</p><p>Tune in to learn how security leaders can stay ahead in this rapidly changing environment and what organizations can do to prepare for the next generation of cyberthreats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.</p><p>In this episode of the Security Matters podcast, host David Puner is joined by Blair Cohen, Founder and President of AuthenticID, to discuss the evolving identity threat landscape. They explore the rise of synthetic fraud, the role of biometric authentication and how AI-driven security is reshaping the fight against cybercrime. Blair shares insights on the challenges of detecting deepfakes, the advancements in biometric authentication and the impact of generative AI on security measures.</p><p>Tune in to learn how security leaders can stay ahead in this rapidly changing environment and what organizations can do to prepare for the next generation of cyberthreats.</p>]]>
      </content:encoded>
      <pubDate>Fri, 28 Mar 2025 00:30:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/743f89b4/628475cb.mp3" length="29125135" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CQ8xRKNrdYyOG0m2EdlWC1q6t6Lw_2qhK3IlSlQuU-8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MWMz/MGM4ZmZmZmZhMmNl/ZmQ4NmVkNGE5MWY1/ZThmNi5qcGc.jpg"/>
      <itunes:duration>1819</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Imagine receiving an urgent email from your bank that looks perfectly legitimate. It warns you of a suspicious transaction and prompts you to verify your identity. You hesitate but click, and suddenly, your credentials are compromised. This scenario, crafted by AI-powered fraud-as-a-service, is happening now.</p><p>In this episode of the Security Matters podcast, host David Puner is joined by Blair Cohen, Founder and President of AuthenticID, to discuss the evolving identity threat landscape. They explore the rise of synthetic fraud, the role of biometric authentication and how AI-driven security is reshaping the fight against cybercrime. Blair shares insights on the challenges of detecting deepfakes, the advancements in biometric authentication and the impact of generative AI on security measures.</p><p>Tune in to learn how security leaders can stay ahead in this rapidly changing environment and what organizations can do to prepare for the next generation of cyberthreats.</p>]]>
      </itunes:summary>
      <itunes:keywords>AI-powered fraud, Synthetic identities, Biometric authentication, Cybercrime, Identity verification, Phishing campaigns, Deepfake voices, Security leaders, AuthenticID, Blair Cohen, Identity threat landscape, Fraud prevention, Government issued IDs, Presentation attack detection, Gen AI, Cybersecurity measures, Fraud-as-a-service, Zero trust, Data privacy, Regulatory compliance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/743f89b4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 3 - Building Trust in AI Agents</title>
      <itunes:title>EP 3 - Building Trust in AI Agents</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">48252ab6-7185-485a-ac27-db90eea232a3</guid>
      <link>https://share.transistor.fm/s/b8e9c8cb</link>
      <description>
        <![CDATA[<p>In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.</p><p>Lavi shares insights into the evolution of AI agents, from chatbots to agentic AI, and the challenges of building trust and resilience in AI-driven systems. The conversation delves into the latest research areas, including safety, privacy, and security, and examines how different industries are adopting AI agents to handle vast amounts of data.</p><p>Tune in to learn about the critical security challenges posed by AI agents, the importance of trust in automation, and the strategies organizations can implement to protect their systems and data. Whether you're a cybersecurity professional or simply curious about the future of AI, this episode offers valuable insights into the rapidly evolving world of AI agents.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.</p><p>Lavi shares insights into the evolution of AI agents, from chatbots to agentic AI, and the challenges of building trust and resilience in AI-driven systems. The conversation delves into the latest research areas, including safety, privacy, and security, and examines how different industries are adopting AI agents to handle vast amounts of data.</p><p>Tune in to learn about the critical security challenges posed by AI agents, the importance of trust in automation, and the strategies organizations can implement to protect their systems and data. Whether you're a cybersecurity professional or simply curious about the future of AI, this episode offers valuable insights into the rapidly evolving world of AI agents.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 13 Mar 2025 12:07:01 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/b8e9c8cb/47b04321.mp3" length="36500859" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DLCKe1ZW4xjImMqwBzfX-k-zEHBvVHD70_jAOMx8vqg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hZDAw/ZDJkMmZiYTM0ZDQy/YTcyYzYxOTI2Y2Qy/YTU1Yi5qcGc.jpg"/>
      <itunes:duration>2280</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.</p><p>Lavi shares insights into the evolution of AI agents, from chatbots to agentic AI, and the challenges of building trust and resilience in AI-driven systems. The conversation delves into the latest research areas, including safety, privacy, and security, and examines how different industries are adopting AI agents to handle vast amounts of data.</p><p>Tune in to learn about the critical security challenges posed by AI agents, the importance of trust in automation, and the strategies organizations can implement to protect their systems and data. Whether you're a cybersecurity professional or simply curious about the future of AI, this episode offers valuable insights into the rapidly evolving world of AI agents.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog</a></p>]]>
      </itunes:summary>
      <itunes:keywords>AI agents, cybersecurity, automation, AI-driven security, CyberArk Labs, trust in AI, agentic AI, security challenges, data privacy, AI research</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b8e9c8cb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 2 - Dispatch From Retail's Frontline: Building Cyber Resilience</title>
      <itunes:title>EP 2 - Dispatch From Retail's Frontline: Building Cyber Resilience</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cc2ebd37-7e1b-4d3d-b2d6-1fd0def0accf</guid>
      <link>https://share.transistor.fm/s/7669e1a8</link>
      <description>
        <![CDATA[<p>In this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest, Jason James, Chief Information Officer (CIO) at Aptos Retail, shares his insights with host David Puner on how to stay ahead of these threats. </p><p>Discover the strategies for building cyber resilience, the role of AI in retail, the importance of protecting consumer trust and the critical role of identity in safeguarding sensitive data. JJ's journey from tech enthusiast to CIO offers actionable insights and expert advice for cyber professionals, business leaders and anyone with a seat at or view of the cybersecurity table.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest, Jason James, Chief Information Officer (CIO) at Aptos Retail, shares his insights with host David Puner on how to stay ahead of these threats. </p><p>Discover the strategies for building cyber resilience, the role of AI in retail, the importance of protecting consumer trust and the critical role of identity in safeguarding sensitive data. JJ's journey from tech enthusiast to CIO offers actionable insights and expert advice for cyber professionals, business leaders and anyone with a seat at or view of the cybersecurity table.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog</a></p>]]>
      </content:encoded>
      <pubDate>Thu, 27 Feb 2025 11:17:06 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/7669e1a8/62bc7dc0.mp3" length="46523076" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jJFkpaqjZzBjUcd-bRyGqfLk8eAdN6PntmvCEVCuRcI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yMGJm/ZWNjNGE1OTMwYzVi/MGEwZjhlMzk4NmRk/MmNkNC5qcGc.jpg"/>
      <itunes:duration>2906</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Security Matters, we dive into the world of retail technology and cybersecurity. Imagine a bustling retail chain during its busiest shopping season, only to be disrupted by a cyberattack. Our guest, Jason James, Chief Information Officer (CIO) at Aptos Retail, shares his insights with host David Puner on how to stay ahead of these threats. </p><p>Discover the strategies for building cyber resilience, the role of AI in retail, the importance of protecting consumer trust and the critical role of identity in safeguarding sensitive data. JJ's journey from tech enthusiast to CIO offers actionable insights and expert advice for cyber professionals, business leaders and anyone with a seat at or view of the cybersecurity table.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog</a></p>]]>
      </itunes:summary>
      <itunes:keywords>retail technology, cyber resilience, cybersecurity, AI in retail, consumer trust, retail innovation, Jason JJ James, Aptos Retail, digital transformation, tech podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7669e1a8/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 1 - AI Gone Rogue: FuzzyAI and LLM Threats</title>
      <itunes:title>EP 1 - AI Gone Rogue: FuzzyAI and LLM Threats</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">585f2fbe-8596-4878-b358-17b56d33fa08</guid>
      <link>https://share.transistor.fm/s/254ac4ae</link>
      <description>
        <![CDATA[<p>In the inaugural episode of the Security Matters podcast, host David Puner dives into the world of AI security with CyberArk Labs' Principal Cyber Researcher, Eran Shimony. Discover how FuzzyAI is revolutionizing the protection of large language models (LLMs) by identifying vulnerabilities before attackers can exploit them. Learn about the challenges of securing generative AI and the innovative techniques used to stay ahead of threats. Tune in for an insightful discussion on the future of AI security and the importance of safeguarding LLMs.</p><p>What's Security Matters? Check out the <a href="https://www.cyberark.com/podcasts/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer/">show trailer</a> to learn more. Make us your top cybersecurity podcast.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog </a></p><p>Links referenced in this episode:</p><ul><li><a href="https://github.com/cyberark/FuzzyAI">FuzzyAI GitHub page</a></li><li><a href="https://discord.gg/JyyReZCU">FuzzyAI Discord Community</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the inaugural episode of the Security Matters podcast, host David Puner dives into the world of AI security with CyberArk Labs' Principal Cyber Researcher, Eran Shimony. Discover how FuzzyAI is revolutionizing the protection of large language models (LLMs) by identifying vulnerabilities before attackers can exploit them. Learn about the challenges of securing generative AI and the innovative techniques used to stay ahead of threats. Tune in for an insightful discussion on the future of AI security and the importance of safeguarding LLMs.</p><p>What's Security Matters? Check out the <a href="https://www.cyberark.com/podcasts/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer/">show trailer</a> to learn more. Make us your top cybersecurity podcast.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog </a></p><p>Links referenced in this episode:</p><ul><li><a href="https://github.com/cyberark/FuzzyAI">FuzzyAI GitHub page</a></li><li><a href="https://discord.gg/JyyReZCU">FuzzyAI Discord Community</a></li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 12 Feb 2025 14:02:36 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/254ac4ae/b8d418fa.mp3" length="34033781" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/QAQqN9P_U7mQFhIOKE555fhIq1NaF1YZGfuu9hx8Py8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNDE3/NTVkNjgzZTQ0ODkz/MDExMWQyYTdhN2M3/YWZmOS5qcGc.jpg"/>
      <itunes:duration>2126</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the inaugural episode of the Security Matters podcast, host David Puner dives into the world of AI security with CyberArk Labs' Principal Cyber Researcher, Eran Shimony. Discover how FuzzyAI is revolutionizing the protection of large language models (LLMs) by identifying vulnerabilities before attackers can exploit them. Learn about the challenges of securing generative AI and the innovative techniques used to stay ahead of threats. Tune in for an insightful discussion on the future of AI security and the importance of safeguarding LLMs.</p><p>What's Security Matters? Check out the <a href="https://www.cyberark.com/podcasts/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer/">show trailer</a> to learn more. Make us your top cybersecurity podcast.</p><p>More security resources via the <a href="https://www.cyberark.com/resources/all-blog-posts">CyberArk Blog </a></p><p>Links referenced in this episode:</p><ul><li><a href="https://github.com/cyberark/FuzzyAI">FuzzyAI GitHub page</a></li><li><a href="https://discord.gg/JyyReZCU">FuzzyAI Discord Community</a></li></ul>]]>
      </itunes:summary>
      <itunes:keywords>identity security, LLM jailbreak, FuzzyAI, CyberArk Labs, AI vulnerabilities, generative AI security, open source AI tools, AI model testing</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/254ac4ae/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/254ac4ae/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Welcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer)</title>
      <itunes:title>Welcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer)</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">ee218a00-0f1e-493d-bde5-2ce8aaad22c8</guid>
      <link>https://share.transistor.fm/s/c92c45bb</link>
      <description>
        <![CDATA[<p>Welcome to <strong>Security Matters</strong>, the next evolution of CyberArk’s podcast. Previously known as <strong>Trust Issues</strong>, this show has always brought expert insights into the world of identity security.</p><p>Hosted by David Puner, Senior Editorial Manager at CyberArk, <strong>Security Matters</strong> refines its focus to emphasize a proactive approach to cybersecurity. The podcast will delve into the principle of "Think like an attacker," highlighting the importance of staying ahead of threats rather than merely reacting to them.</p><p>Each episode will feature deep insights, expert perspectives, and actionable strategies to help empower listeners to defend and protect their organizations and the digital world. Topics will include securing the entire spectrum of identities—both human and machine—protecting hybrid and multi-cloud environments and analyzing the latest attack methods.</p><p>Join <strong>Security Matters</strong> to explore why how you approach security truly matters.</p><p>Coming mid-Feb. 2025 to this stream and most major podcast platforms. </p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to <strong>Security Matters</strong>, the next evolution of CyberArk’s podcast. Previously known as <strong>Trust Issues</strong>, this show has always brought expert insights into the world of identity security.</p><p>Hosted by David Puner, Senior Editorial Manager at CyberArk, <strong>Security Matters</strong> refines its focus to emphasize a proactive approach to cybersecurity. The podcast will delve into the principle of "Think like an attacker," highlighting the importance of staying ahead of threats rather than merely reacting to them.</p><p>Each episode will feature deep insights, expert perspectives, and actionable strategies to help empower listeners to defend and protect their organizations and the digital world. Topics will include securing the entire spectrum of identities—both human and machine—protecting hybrid and multi-cloud environments and analyzing the latest attack methods.</p><p>Join <strong>Security Matters</strong> to explore why how you approach security truly matters.</p><p>Coming mid-Feb. 2025 to this stream and most major podcast platforms. </p><p><br></p>]]>
      </content:encoded>
      <pubDate>Fri, 07 Feb 2025 16:41:29 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/c92c45bb/caa50e52.mp3" length="1444092" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/txisjoI8vVZP0rllKytISqpdHi6fYv32fz3DVheBikE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZWU0/MzlmNzVmNjA3YTE3/NmY2ZmFlYzk0Mjdi/MGZmNC5wbmc.jpg"/>
      <itunes:duration>91</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Welcome to <strong>Security Matters</strong>, the next evolution of CyberArk’s podcast. Previously known as <strong>Trust Issues</strong>, this show has always brought expert insights into the world of identity security.</p><p>Hosted by David Puner, Senior Editorial Manager at CyberArk, <strong>Security Matters</strong> refines its focus to emphasize a proactive approach to cybersecurity. The podcast will delve into the principle of "Think like an attacker," highlighting the importance of staying ahead of threats rather than merely reacting to them.</p><p>Each episode will feature deep insights, expert perspectives, and actionable strategies to help empower listeners to defend and protect their organizations and the digital world. Topics will include securing the entire spectrum of identities—both human and machine—protecting hybrid and multi-cloud environments and analyzing the latest attack methods.</p><p>Join <strong>Security Matters</strong> to explore why how you approach security truly matters.</p><p>Coming mid-Feb. 2025 to this stream and most major podcast platforms. </p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, Privileged Access Management, Zero Trust, Privileged Access Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c92c45bb/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 70 - Zero Days and High Stakes: The US Treasury Attack</title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>EP 70 - Zero Days and High Stakes: The US Treasury Attack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">56da9a32-37d4-4db9-91c8-0255183fd306</guid>
      <link>https://share.transistor.fm/s/dfd483d7</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner dives into the recent high-profile cyberattack on the U.S. Treasury Department. Joined by Andy Thompson, CyberArk Labs' Senior Offensive Research Evangelist, and Joe Garcia, CyberArk’s Principal DevOps Solutions Engineer, they explore the timeline, details and implications of the attack. Discover proactive security recommendations, insights into zero-day vulnerabilities and the broader impact on federal cybersecurity. Tune in to learn how to help bolster your defenses against future cyber threats.</p><p>To read CyberArk Labs' analysis of the U.S. Treasury attack, check out the teams' blog, <a href="https://www.cyberark.com/resources/blog/the-us-treasury-attack-key-events-and-security-implications">"The US Treasury Attack: Key Events and Security Implications."</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner dives into the recent high-profile cyberattack on the U.S. Treasury Department. Joined by Andy Thompson, CyberArk Labs' Senior Offensive Research Evangelist, and Joe Garcia, CyberArk’s Principal DevOps Solutions Engineer, they explore the timeline, details and implications of the attack. Discover proactive security recommendations, insights into zero-day vulnerabilities and the broader impact on federal cybersecurity. Tune in to learn how to help bolster your defenses against future cyber threats.</p><p>To read CyberArk Labs' analysis of the U.S. Treasury attack, check out the teams' blog, <a href="https://www.cyberark.com/resources/blog/the-us-treasury-attack-key-events-and-security-implications">"The US Treasury Attack: Key Events and Security Implications."</a> </p>]]>
      </content:encoded>
      <pubDate>Thu, 23 Jan 2025 12:29:06 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/dfd483d7/8dc09b02.mp3" length="25004390" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Czf3qzDWnZk51yVJMhBo4mNnvv5V37BI_22p9ppVw3o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NGYy/MGVkNjZlYTIyYzU2/MjExMmRmMTA5MzBh/NDc1Yy5qcGc.jpg"/>
      <itunes:duration>1560</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner dives into the recent high-profile cyberattack on the U.S. Treasury Department. Joined by Andy Thompson, CyberArk Labs' Senior Offensive Research Evangelist, and Joe Garcia, CyberArk’s Principal DevOps Solutions Engineer, they explore the timeline, details and implications of the attack. Discover proactive security recommendations, insights into zero-day vulnerabilities and the broader impact on federal cybersecurity. Tune in to learn how to help bolster your defenses against future cyber threats.</p><p>To read CyberArk Labs' analysis of the U.S. Treasury attack, check out the teams' blog, <a href="https://www.cyberark.com/resources/blog/the-us-treasury-attack-key-events-and-security-implications">"The US Treasury Attack: Key Events and Security Implications."</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>cyberattacks, U.S. Treasury attack, U.S. Treasury cyberattack, BeyondTrust customers, CyberArk Labs, zero-day vulnerabilities, remote code execution (RCE), API key security, federal government cybersecurity, nation state cyber threats, sensitive unclassified data, proactive security recommendations, future threat preparedness </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dfd483d7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 69 - Cloudy with a 100% Chance of Secrets: Decoding Secrets Management in the Cloud</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>EP 69 - Cloudy with a 100% Chance of Secrets: Decoding Secrets Management in the Cloud</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9c9bb4a8-3788-4988-a3ba-7117bf8c5c94</guid>
      <link>https://share.transistor.fm/s/39e09b2d</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner dives into the complexities of secrets management with Ritesh Desai, General Manager at AWS Secrets Manager. They discuss the evolving landscape of secrets management, emphasizing the importance of a multi-layered defense strategy as organizations increasingly adopt cloud services, digital transformation and agile development practices. Ritesh highlights the critical role of machine identities in managing secrets and the growing significance of AI and automation in enhancing security measures. He also underscores the necessity of a comprehensive approach that includes discovery, visibility and leak detection to safeguard sensitive information effectively. The conversation covers the challenges of managing secrets in multi-cloud environments and the importance of regular secret rotation and access control. This episode provides valuable insights into best practices and strategies for securing secrets. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner dives into the complexities of secrets management with Ritesh Desai, General Manager at AWS Secrets Manager. They discuss the evolving landscape of secrets management, emphasizing the importance of a multi-layered defense strategy as organizations increasingly adopt cloud services, digital transformation and agile development practices. Ritesh highlights the critical role of machine identities in managing secrets and the growing significance of AI and automation in enhancing security measures. He also underscores the necessity of a comprehensive approach that includes discovery, visibility and leak detection to safeguard sensitive information effectively. The conversation covers the challenges of managing secrets in multi-cloud environments and the importance of regular secret rotation and access control. This episode provides valuable insights into best practices and strategies for securing secrets. </p>]]>
      </content:encoded>
      <pubDate>Fri, 17 Jan 2025 00:01:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/39e09b2d/f8171e00.mp3" length="37514008" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/CJNS1zTFazItiJCyxO0TQsFOHT-pHd0r-tFmwP1jAAw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NTNj/YzdlZjYxMmU5MmM0/OWM4OWVmNzZiMGI0/NjNjNi5qcGc.jpg"/>
      <itunes:duration>2342</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner dives into the complexities of secrets management with Ritesh Desai, General Manager at AWS Secrets Manager. They discuss the evolving landscape of secrets management, emphasizing the importance of a multi-layered defense strategy as organizations increasingly adopt cloud services, digital transformation and agile development practices. Ritesh highlights the critical role of machine identities in managing secrets and the growing significance of AI and automation in enhancing security measures. He also underscores the necessity of a comprehensive approach that includes discovery, visibility and leak detection to safeguard sensitive information effectively. The conversation covers the challenges of managing secrets in multi-cloud environments and the importance of regular secret rotation and access control. This episode provides valuable insights into best practices and strategies for securing secrets. </p>]]>
      </itunes:summary>
      <itunes:keywords>secrets management, secrets lifecycle, cloud security, machine identities, AI in security, automation in secrets management, multi-cloud environments, secrets rotation, access controls, data protection, cybersecurity best practices, secrets management strategies, secrets management challenges, secrets management tools, AWS Secrets Manager </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/39e09b2d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 68 - Cloud Security, Collaboration and Futuring in the Now </title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>EP 68 - Cloud Security, Collaboration and Futuring in the Now </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8858bd40-1c35-43d3-b48c-d099a3366ca5</guid>
      <link>https://share.transistor.fm/s/3dbfa0e6</link>
      <description>
        <![CDATA[<p>In this episode, Trust Issues host David Puner wraps up 2024 with a conversation with Red Hat’s Field CTO Ambassador E.G. Nadhan about the future of cybersecurity. They discuss the importance of cloud security principles, the impact of emerging technologies like AI and quantum computing, and the challenges of managing machine identities. Nadhan emphasizes the need for organizations to prepare for future security challenges by understanding the attacker mindset and taking proactive steps today to protect for tomorrow. The conversation also touches on collaboration within the open source community and the role of Red Hat's Field CTO organization in driving innovation and addressing market opportunities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Trust Issues host David Puner wraps up 2024 with a conversation with Red Hat’s Field CTO Ambassador E.G. Nadhan about the future of cybersecurity. They discuss the importance of cloud security principles, the impact of emerging technologies like AI and quantum computing, and the challenges of managing machine identities. Nadhan emphasizes the need for organizations to prepare for future security challenges by understanding the attacker mindset and taking proactive steps today to protect for tomorrow. The conversation also touches on collaboration within the open source community and the role of Red Hat's Field CTO organization in driving innovation and addressing market opportunities.</p>]]>
      </content:encoded>
      <pubDate>Thu, 26 Dec 2024 00:01:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/3dbfa0e6/19042c10.mp3" length="39747978" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/fS9Y26kPUrEDydhdOqNamfrI73yG0_LMMYsHxxdO6Bo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80NWM4/ZDczYmM1MTQ4MmEw/Njc1ZjNhYmQ4OGE5/NGUxMi5qcGc.jpg"/>
      <itunes:duration>2482</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Trust Issues host David Puner wraps up 2024 with a conversation with Red Hat’s Field CTO Ambassador E.G. Nadhan about the future of cybersecurity. They discuss the importance of cloud security principles, the impact of emerging technologies like AI and quantum computing, and the challenges of managing machine identities. Nadhan emphasizes the need for organizations to prepare for future security challenges by understanding the attacker mindset and taking proactive steps today to protect for tomorrow. The conversation also touches on collaboration within the open source community and the role of Red Hat's Field CTO organization in driving innovation and addressing market opportunities.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, AI, quantum computing, cloud security, machine identities, open source, identity security, Red Hat</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3dbfa0e6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 67 - The Password Problem</title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>EP 67 - The Password Problem</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a88783e8-72f3-4111-bb14-9d976c10fe08</guid>
      <link>https://share.transistor.fm/s/cd3a20b6</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner sits down with <a href="https://www.linkedin.com/in/andrewshikiar/">Andrew Shikiar</a>, the Executive Director and CEO of the <a href="https://fidoalliance.org/">FIDO Alliance</a>, to discuss the critical issues surrounding password security and the innovative solutions being developed to address them. Andrew highlights the vulnerabilities of traditional passwords, their susceptibility to phishing and brute force attacks, and the significant advancements in <a href="https://www.cyberark.com/resources/blog/what-passwordless-really-means-for-privileged-access-management">passwordless</a> authentication methods, particularly passkeys. He explains how passkeys, based on FIDO standards, utilize asymmetric public key cryptography to enhance security and reduce the risk of data breaches. </p><p>The conversation also covers the broader implications of strong, user-friendly authentication methods for consumers and organizations, as well as the collaborative efforts of major industry players to make the internet a safer place. Additionally, Andrew highlights the importance of identity security in the context of these advancements, emphasizing how robust authentication methods can protect personal and organizational data. </p><p>Tune in to learn about the future of authentication and the steps being taken to eliminate the reliance on passwords.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner sits down with <a href="https://www.linkedin.com/in/andrewshikiar/">Andrew Shikiar</a>, the Executive Director and CEO of the <a href="https://fidoalliance.org/">FIDO Alliance</a>, to discuss the critical issues surrounding password security and the innovative solutions being developed to address them. Andrew highlights the vulnerabilities of traditional passwords, their susceptibility to phishing and brute force attacks, and the significant advancements in <a href="https://www.cyberark.com/resources/blog/what-passwordless-really-means-for-privileged-access-management">passwordless</a> authentication methods, particularly passkeys. He explains how passkeys, based on FIDO standards, utilize asymmetric public key cryptography to enhance security and reduce the risk of data breaches. </p><p>The conversation also covers the broader implications of strong, user-friendly authentication methods for consumers and organizations, as well as the collaborative efforts of major industry players to make the internet a safer place. Additionally, Andrew highlights the importance of identity security in the context of these advancements, emphasizing how robust authentication methods can protect personal and organizational data. </p><p>Tune in to learn about the future of authentication and the steps being taken to eliminate the reliance on passwords.</p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Dec 2024 00:01:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/cd3a20b6/8306cdae.mp3" length="33584314" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/rxi7c5aYTENw_VcsUo3XILrgCM53-9_qDmhSFfjqxZQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MmQ4/MTgzMzJkOTVjMDJk/NTBjYWUyZDVkMTQz/ODM3NS5qcGc.jpg"/>
      <itunes:duration>2096</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner sits down with <a href="https://www.linkedin.com/in/andrewshikiar/">Andrew Shikiar</a>, the Executive Director and CEO of the <a href="https://fidoalliance.org/">FIDO Alliance</a>, to discuss the critical issues surrounding password security and the innovative solutions being developed to address them. Andrew highlights the vulnerabilities of traditional passwords, their susceptibility to phishing and brute force attacks, and the significant advancements in <a href="https://www.cyberark.com/resources/blog/what-passwordless-really-means-for-privileged-access-management">passwordless</a> authentication methods, particularly passkeys. He explains how passkeys, based on FIDO standards, utilize asymmetric public key cryptography to enhance security and reduce the risk of data breaches. </p><p>The conversation also covers the broader implications of strong, user-friendly authentication methods for consumers and organizations, as well as the collaborative efforts of major industry players to make the internet a safer place. Additionally, Andrew highlights the importance of identity security in the context of these advancements, emphasizing how robust authentication methods can protect personal and organizational data. </p><p>Tune in to learn about the future of authentication and the steps being taken to eliminate the reliance on passwords.</p>]]>
      </itunes:summary>
      <itunes:keywords>passwords, passkeys, passwordless authentication, FIDO Alliance, cybersecurity, identity security, data breaches, MFA, phishing, biometric authentication, public key cryptography</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/cd3a20b6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 66 - Post-Election Insights: AI, Misinformation and Security</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>EP 66 - Post-Election Insights: AI, Misinformation and Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">783ef032-9df6-4cda-a685-ea64fbe9154e</guid>
      <link>https://share.transistor.fm/s/dd66d42f</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S. Department of Homeland Security, James brings a wealth of experience to the conversation, which explores AI's impact on election security—highlighting how AI has transformed the landscape by increasing the scale, speed and sophistication of misinformation and disinformation campaigns. James explains the differences between misinformation, disinformation and malinformation and their roles in the information environment surrounding elections.</p><p>He also highlights the importance of public-private partnerships in securing election infrastructure and the role of international collaboration in countering nation-state threats. The episode examines the challenges of maintaining trust in the digital age and the potential of identity verification technologies to enhance information trustworthiness.</p><p>Finally, the discussion touches on the parallels between election security and enterprise cybersecurity, emphasizing the need for critical thinking and proactive measures to uphold the integrity of both elections and organizational security.</p><p>For more insights from James Imanian on election security, check out his blog, <a href="https://www.cyberark.com/resources/blog/six-key-measures-for-upholding-election-security-and-integrity">"Six Key Measures for Upholding Election Security and Integrity." </a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S. Department of Homeland Security, James brings a wealth of experience to the conversation, which explores AI's impact on election security—highlighting how AI has transformed the landscape by increasing the scale, speed and sophistication of misinformation and disinformation campaigns. James explains the differences between misinformation, disinformation and malinformation and their roles in the information environment surrounding elections.</p><p>He also highlights the importance of public-private partnerships in securing election infrastructure and the role of international collaboration in countering nation-state threats. The episode examines the challenges of maintaining trust in the digital age and the potential of identity verification technologies to enhance information trustworthiness.</p><p>Finally, the discussion touches on the parallels between election security and enterprise cybersecurity, emphasizing the need for critical thinking and proactive measures to uphold the integrity of both elections and organizational security.</p><p>For more insights from James Imanian on election security, check out his blog, <a href="https://www.cyberark.com/resources/blog/six-key-measures-for-upholding-election-security-and-integrity">"Six Key Measures for Upholding Election Security and Integrity." </a></p>]]>
      </content:encoded>
      <pubDate>Thu, 21 Nov 2024 09:11:07 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/dd66d42f/e4b10442.mp3" length="36352622" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yiIdTG2WhXVY-8acGgciA91Pxg9MvjzOyZoHqqcRsgM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kM2Nl/OWNkZDRiNjcxZDZi/ZmM5OTdjZDhlNDhi/YmQ1Yi5qcGc.jpg"/>
      <itunes:duration>2269</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner interviews James Imanian, Senior Director of the U.S. Federal Technology Office at CyberArk. They discuss the critical topic of election security, focusing on the recent 2024 U.S. presidential election. Drawing from his extensive background in cybersecurity including a career in the Navy and a stint at the U.S. Department of Homeland Security, James brings a wealth of experience to the conversation, which explores AI's impact on election security—highlighting how AI has transformed the landscape by increasing the scale, speed and sophistication of misinformation and disinformation campaigns. James explains the differences between misinformation, disinformation and malinformation and their roles in the information environment surrounding elections.</p><p>He also highlights the importance of public-private partnerships in securing election infrastructure and the role of international collaboration in countering nation-state threats. The episode examines the challenges of maintaining trust in the digital age and the potential of identity verification technologies to enhance information trustworthiness.</p><p>Finally, the discussion touches on the parallels between election security and enterprise cybersecurity, emphasizing the need for critical thinking and proactive measures to uphold the integrity of both elections and organizational security.</p><p>For more insights from James Imanian on election security, check out his blog, <a href="https://www.cyberark.com/resources/blog/six-key-measures-for-upholding-election-security-and-integrity">"Six Key Measures for Upholding Election Security and Integrity." </a></p>]]>
      </itunes:summary>
      <itunes:keywords>election security, AI in election security, misinformation and disinformation, identity verification technologies, cybersecurity in elections, nation-state threats, enterprise cybersecurity, identity security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/dd66d42f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 65 - Machine Identities, AI and the Future of Security with the 'Identity Jedi'</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>EP 65 - Machine Identities, AI and the Future of Security with the 'Identity Jedi'</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b4f3ae2b-9ce5-4ab5-95ce-8a2ff139c292</guid>
      <link>https://share.transistor.fm/s/b589019d</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner and David Lee, aka <a href="https://www.theidentityjedi.com/">“The Identity Jedi,”</a> delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel's Jarvis. They explore the potential of autonomous AI in monitoring and managing security tasks, emphasizing the need for real time data analysis and context understanding. The conversation highlights the importance of providing context on both human and machine sides to enhance security measures. They also touch on the role of investors in the identity security space and the need for better storytelling in the industry.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner and David Lee, aka <a href="https://www.theidentityjedi.com/">“The Identity Jedi,”</a> delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel's Jarvis. They explore the potential of autonomous AI in monitoring and managing security tasks, emphasizing the need for real time data analysis and context understanding. The conversation highlights the importance of providing context on both human and machine sides to enhance security measures. They also touch on the role of investors in the identity security space and the need for better storytelling in the industry.</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 Nov 2024 00:01:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/b589019d/e448b2fb.mp3" length="40296273" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/OwaZNqglqGgEv6W4yU_S40biiTnYkDsJ9Qyo45bizDY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hOTlj/MDZjN2QwN2M3MmNh/NWI5ZjA4MDg5ZjFk/OWM5OS5qcGc.jpg"/>
      <itunes:duration>2515</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner and David Lee, aka <a href="https://www.theidentityjedi.com/">“The Identity Jedi,”</a> delve into the evolving landscape of identity security. They discuss the critical challenges and advancements in securing both human and machine identities. Lee shares insights on the fear and misconceptions surrounding AI, drawing parallels to pop culture references like Marvel's Jarvis. They explore the potential of autonomous AI in monitoring and managing security tasks, emphasizing the need for real time data analysis and context understanding. The conversation highlights the importance of providing context on both human and machine sides to enhance security measures. They also touch on the role of investors in the identity security space and the need for better storytelling in the industry.</p>]]>
      </itunes:summary>
      <itunes:keywords>identity security, machine identities, AI in security, identity governance, identity management, non-human identities, identity threat detection, privileged access management (PAM), identity consolidation, identity security trends, identity security best practices, David Lee Identity Jedi, Trust Issues podcast</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b589019d/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/b589019d/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>EP 64 - Identity Reinvention: Insights From the World's First Augmented Ethical Hacker</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>EP 64 - Identity Reinvention: Insights From the World's First Augmented Ethical Hacker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b1ce15f-0962-4302-b9c5-5e8d7aba542c</guid>
      <link>https://share.transistor.fm/s/a3031439</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk's resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len's singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security. Len shares insights from his new book, <a href="https://www.amazon.com/Human-Hacked-Lessons-Augmented-Ethical/dp/1394269161">"Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker,"</a> which releases on October 29. They also discuss the relevance of Len's transhuman identity to his work in identity security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk's resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len's singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security. Len shares insights from his new book, <a href="https://www.amazon.com/Human-Hacked-Lessons-Augmented-Ethical/dp/1394269161">"Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker,"</a> which releases on October 29. They also discuss the relevance of Len's transhuman identity to his work in identity security.</p>]]>
      </content:encoded>
      <pubDate>Wed, 23 Oct 2024 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/a3031439/87c953bf.mp3" length="48048064" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/nPmUbLLgsZuZIcv0hsWts1Wlkj2RIBhSm351tyKj86A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YWUx/MmQ5YTM5MDk1YTM1/YjU3ZGQ0YzliNjQx/N2E4OC5qcGc.jpg"/>
      <itunes:duration>3000</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk's resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len's singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security. Len shares insights from his new book, <a href="https://www.amazon.com/Human-Hacked-Lessons-Augmented-Ethical/dp/1394269161">"Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker,"</a> which releases on October 29. They also discuss the relevance of Len's transhuman identity to his work in identity security.</p>]]>
      </itunes:summary>
      <itunes:keywords>identity security, transhuman, transhumanism, white hat hacker, NFC implant, Human Hacked, Len Noe, offensive security, black hat to white hat transformation, CyberArk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a3031439/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>EP 63 - Jailbreaking AI: The Risks and Realities of Machine Identities</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">015fe293-9fe9-475a-850c-4a9da43b919a</guid>
      <link>https://share.transistor.fm/s/5f7e7c7a</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner welcomes back Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, for a discussion covering the latest developments in generative AI and the emerging cyberthreats associated with it. Lavi shares insights on how machine identities are becoming prime targets for threat actors and discusses the innovative research being conducted by CyberArk Labs to understand and mitigate these risks. The conversation also touches on the concept of responsible AI and the importance of building secure AI systems. Tune in to learn about the fascinating world of AI security and the cutting-edge techniques used to protect against AI-driven cyberattacks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner welcomes back Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, for a discussion covering the latest developments in generative AI and the emerging cyberthreats associated with it. Lavi shares insights on how machine identities are becoming prime targets for threat actors and discusses the innovative research being conducted by CyberArk Labs to understand and mitigate these risks. The conversation also touches on the concept of responsible AI and the importance of building secure AI systems. Tune in to learn about the fascinating world of AI security and the cutting-edge techniques used to protect against AI-driven cyberattacks.</p>]]>
      </content:encoded>
      <pubDate>Wed, 09 Oct 2024 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/5f7e7c7a/82289fcd.mp3" length="35446486" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/x4drjLkVvB2eZC8g-d9SoaBXE9jRwOrXcduFwwi8t6s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZmEx/OTEwNWQzMjcxMzMy/ZTQzNGU4NjA1NTcz/OWIyMi5qcGc.jpg"/>
      <itunes:duration>2213</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner welcomes back Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, for a discussion covering the latest developments in generative AI and the emerging cyberthreats associated with it. Lavi shares insights on how machine identities are becoming prime targets for threat actors and discusses the innovative research being conducted by CyberArk Labs to understand and mitigate these risks. The conversation also touches on the concept of responsible AI and the importance of building secure AI systems. Tune in to learn about the fascinating world of AI security and the cutting-edge techniques used to protect against AI-driven cyberattacks.</p>]]>
      </itunes:summary>
      <itunes:keywords>AI and cybersecurity, CyberArk Labs, machine identities, emerging AI threats, jailbreaking techniques, Operation Grandma, AI center of excellence, machine identity security, fuzzy AI tool, best practices for AI security, threat research</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5f7e7c7a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 62 - The Evolution of Identity</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>EP 62 - The Evolution of Identity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9ea30b00-aeae-47a2-be27-71503efa72ba</guid>
      <link>https://share.transistor.fm/s/11e6ba12</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines. In today's threat landscape, the number and types of identities, attack methods and environments have dramatically increased, making it more challenging to secure identities. Jeff discusses the challenges and efforts in creating sustainable, interoperable digital identity hubs for cross-border applications, the future of digital passports and the importance of encryption and multi-factor authentication (MFA) for securing sensitive data. The conversation also highlights the significance of thought leadership and maintaining a vendor-agnostic approach in identity security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines. In today's threat landscape, the number and types of identities, attack methods and environments have dramatically increased, making it more challenging to secure identities. Jeff discusses the challenges and efforts in creating sustainable, interoperable digital identity hubs for cross-border applications, the future of digital passports and the importance of encryption and multi-factor authentication (MFA) for securing sensitive data. The conversation also highlights the significance of thought leadership and maintaining a vendor-agnostic approach in identity security.</p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Sep 2024 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/11e6ba12/74baf379.mp3" length="44365016" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/TNNAGxKwQYd6qPhgJ34zYZCRz6Kc8RZYejNjMRBbQvw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85OTkx/OTMxODZiMTYxYmY4/ZWI0NjEyY2MzN2Fh/YjE5Mi5qcGc.jpg"/>
      <itunes:duration>2770</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner sits down with Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral guidance on identity-centric security strategies to help organizations reduce the risk of identity-related attacks. They explore the evolution of digital identity, discussing how it has transformed from simple identifiers to complex, multifaceted digital identities for both humans and machines. In today's threat landscape, the number and types of identities, attack methods and environments have dramatically increased, making it more challenging to secure identities. Jeff discusses the challenges and efforts in creating sustainable, interoperable digital identity hubs for cross-border applications, the future of digital passports and the importance of encryption and multi-factor authentication (MFA) for securing sensitive data. The conversation also highlights the significance of thought leadership and maintaining a vendor-agnostic approach in identity security.</p>]]>
      </itunes:summary>
      <itunes:keywords>identity security, IDSA, digital identities, identity-centric security, cross-border identity solutions, compliance requirements, identity and access management (IAM), digital passport, multi-factor authentication (MFA), digital wallet, Trust Issues podcast, CyberArk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/11e6ba12/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 61 - Put Your Name on It: Identity Verification and Fighting Fraud</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>EP 61 - Put Your Name on It: Identity Verification and Fighting Fraud</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f7f2bef2-f75b-431e-b3de-bae136f317b1</guid>
      <link>https://share.transistor.fm/s/adc122bf</link>
      <description>
        <![CDATA[<p>Aaron Painter, CEO of Nametag, joins host David Puner for a conversation that covers several key themes, including the inadequacies of current identity verification methods, the rise of deep fakes and AI-generated fraud – and the importance of preventing identity fraud rather than merely detecting it. Aaron discusses the role of advanced technologies like cryptography, biometrics and AI in improving identity verification. He also highlights the critical issue of social engineering attacks at help desks and the need for trust in digital interactions.</p><p><br>Aaron stresses the importance of preventing identity fraud by using a combination of cryptography, biometrics and AI, rather than solely relying on detection methods. He also touches on the challenges of verifying human identities and the need for platforms to verify their users to create safe online communities.</p><p>Put your name on it and give it a listen! </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Aaron Painter, CEO of Nametag, joins host David Puner for a conversation that covers several key themes, including the inadequacies of current identity verification methods, the rise of deep fakes and AI-generated fraud – and the importance of preventing identity fraud rather than merely detecting it. Aaron discusses the role of advanced technologies like cryptography, biometrics and AI in improving identity verification. He also highlights the critical issue of social engineering attacks at help desks and the need for trust in digital interactions.</p><p><br>Aaron stresses the importance of preventing identity fraud by using a combination of cryptography, biometrics and AI, rather than solely relying on detection methods. He also touches on the challenges of verifying human identities and the need for platforms to verify their users to create safe online communities.</p><p>Put your name on it and give it a listen! </p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Sep 2024 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/adc122bf/0bed5ea8.mp3" length="29549721" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6iKbsJj5JPxYVmWdH1fqGtYhkjLO5by1PSt-sX6jUZE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Mzg3/Yzk3NDc5OWFjNTk4/Y2QyYWIxNGU0Yjhk/YzcxNi5qcGc.jpg"/>
      <itunes:duration>1844</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Aaron Painter, CEO of Nametag, joins host David Puner for a conversation that covers several key themes, including the inadequacies of current identity verification methods, the rise of deep fakes and AI-generated fraud – and the importance of preventing identity fraud rather than merely detecting it. Aaron discusses the role of advanced technologies like cryptography, biometrics and AI in improving identity verification. He also highlights the critical issue of social engineering attacks at help desks and the need for trust in digital interactions.</p><p><br>Aaron stresses the importance of preventing identity fraud by using a combination of cryptography, biometrics and AI, rather than solely relying on detection methods. He also touches on the challenges of verifying human identities and the need for platforms to verify their users to create safe online communities.</p><p>Put your name on it and give it a listen! </p>]]>
      </itunes:summary>
      <itunes:keywords>identity verification, AI fraud, identity security, deepfakes, cyptography, biometrics, preventing identity fraud, cybersecurity, social engineering, digital identity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/adc122bf/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 60 - Going Viral: Security Insights from TikTok's Former Global CSO</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>EP 60 - Going Viral: Security Insights from TikTok's Former Global CSO</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce1aed88-88cd-4a15-bf4e-7c8cc9edd3f0</guid>
      <link>https://share.transistor.fm/s/0292b7ab</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Roland Cloutier, who served as TikTok's Global Chief Security Officer (CSO) from April 2020 to September 2022, joins host David Puner for a discussion that covers his extensive experience in the field of security. He previously held similar roles at ADP and EMC and is now a partner at the Business Protection Group.</p><p>Roland discusses his challenges in protecting sensitive data at TikTok, the social media platform with over 1 billion active users. He also talks about the complexities of ensuring data security and compliance. Roland emphasizes the importance of identity in modern security, explaining how privilege controls across the IT estate are crucial for protecting workforce users, third-party vendors, endpoints and machine identities.</p><p>Roland also highlights the need for a deep understanding of the business and its culture to implement security measures effectively. He shares insights into the role of identity in determining access to data and the importance of continuous controls assurance and validation. </p><p>The episode provides a fascinating look into the security imperatives of a major social media platform and the measures taken to protect user data. Listeners will gain valuable insights into the strategies and principles Roland employed during his tenure at TikTok, as well as his broader views on security and privacy in the digital age.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Roland Cloutier, who served as TikTok's Global Chief Security Officer (CSO) from April 2020 to September 2022, joins host David Puner for a discussion that covers his extensive experience in the field of security. He previously held similar roles at ADP and EMC and is now a partner at the Business Protection Group.</p><p>Roland discusses his challenges in protecting sensitive data at TikTok, the social media platform with over 1 billion active users. He also talks about the complexities of ensuring data security and compliance. Roland emphasizes the importance of identity in modern security, explaining how privilege controls across the IT estate are crucial for protecting workforce users, third-party vendors, endpoints and machine identities.</p><p>Roland also highlights the need for a deep understanding of the business and its culture to implement security measures effectively. He shares insights into the role of identity in determining access to data and the importance of continuous controls assurance and validation. </p><p>The episode provides a fascinating look into the security imperatives of a major social media platform and the measures taken to protect user data. Listeners will gain valuable insights into the strategies and principles Roland employed during his tenure at TikTok, as well as his broader views on security and privacy in the digital age.</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Aug 2024 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/0292b7ab/c261a80d.mp3" length="42967349" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/9xKDbwospCDfmRlRxqv7SC-FxI_UTk_0TTSDZkj-8Tw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MTBh/NjFkMTI0Njk1MDVj/MDIyNjhkMGQyNTIw/OTRkMi5qcGc.jpg"/>
      <itunes:duration>2683</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Roland Cloutier, who served as TikTok's Global Chief Security Officer (CSO) from April 2020 to September 2022, joins host David Puner for a discussion that covers his extensive experience in the field of security. He previously held similar roles at ADP and EMC and is now a partner at the Business Protection Group.</p><p>Roland discusses his challenges in protecting sensitive data at TikTok, the social media platform with over 1 billion active users. He also talks about the complexities of ensuring data security and compliance. Roland emphasizes the importance of identity in modern security, explaining how privilege controls across the IT estate are crucial for protecting workforce users, third-party vendors, endpoints and machine identities.</p><p>Roland also highlights the need for a deep understanding of the business and its culture to implement security measures effectively. He shares insights into the role of identity in determining access to data and the importance of continuous controls assurance and validation. </p><p>The episode provides a fascinating look into the security imperatives of a major social media platform and the measures taken to protect user data. Listeners will gain valuable insights into the strategies and principles Roland employed during his tenure at TikTok, as well as his broader views on security and privacy in the digital age.</p>]]>
      </itunes:summary>
      <itunes:keywords>Roland Cloutier, TikTok Global Chief Security Officer, TikTok Global CSO, TikTok CSO, security and privacy concerns, protecting sensitive data, identity security, cybersecurity, privilege controls, security strategies, user data protection</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0292b7ab/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 59 - The Persistent Pursuit of Digital Transformation</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>EP 59 - The Persistent Pursuit of Digital Transformation</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">afdd2e19-25f1-4195-99eb-91a42ff0209d</guid>
      <link>https://share.transistor.fm/s/29495f07</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Debashis Singh and host David Puner explore the intricate world of digital transformation and identity security. Debashis, the Global CIO at Persistent Systems, shares his frontline insights on the singular challenges and strategies organizations face on their digital transformation journeys. The conversation highlights the importance of integrating identity security into digital initiatives, ensuring compliance – and protecting against the evolving cyber threat landscape.</p><p>Debashis also discusses the delicate balance between innovation and security, the impact of AI on cybersecurity and the significance of organizational cyber awareness. Additionally, he talks about the role of generative AI in the industry and the potential risks it poses, such as sophisticated deepfake attacks and ransomware threats.</p><p>This episode offers valuable perspectives on how businesses can navigate the complexities of digital transformation while maintaining robust security measures to safeguard their operations and identities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Debashis Singh and host David Puner explore the intricate world of digital transformation and identity security. Debashis, the Global CIO at Persistent Systems, shares his frontline insights on the singular challenges and strategies organizations face on their digital transformation journeys. The conversation highlights the importance of integrating identity security into digital initiatives, ensuring compliance – and protecting against the evolving cyber threat landscape.</p><p>Debashis also discusses the delicate balance between innovation and security, the impact of AI on cybersecurity and the significance of organizational cyber awareness. Additionally, he talks about the role of generative AI in the industry and the potential risks it poses, such as sophisticated deepfake attacks and ransomware threats.</p><p>This episode offers valuable perspectives on how businesses can navigate the complexities of digital transformation while maintaining robust security measures to safeguard their operations and identities.</p>]]>
      </content:encoded>
      <pubDate>Tue, 13 Aug 2024 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/29495f07/f38c6ac3.mp3" length="36573318" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/yb14a4LEt3QSVbK4Vupo6lCOEaJuRumhXu10Hx4GpQ8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iZWU4/YmJiNmE1MTMzODE3/ZmU3ZGQ2ZTMxOWM0/YmQxYS5qcGc.jpg"/>
      <itunes:duration>2283</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Debashis Singh and host David Puner explore the intricate world of digital transformation and identity security. Debashis, the Global CIO at Persistent Systems, shares his frontline insights on the singular challenges and strategies organizations face on their digital transformation journeys. The conversation highlights the importance of integrating identity security into digital initiatives, ensuring compliance – and protecting against the evolving cyber threat landscape.</p><p>Debashis also discusses the delicate balance between innovation and security, the impact of AI on cybersecurity and the significance of organizational cyber awareness. Additionally, he talks about the role of generative AI in the industry and the potential risks it poses, such as sophisticated deepfake attacks and ransomware threats.</p><p>This episode offers valuable perspectives on how businesses can navigate the complexities of digital transformation while maintaining robust security measures to safeguard their operations and identities.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, digital transformation, compliance measures, cyber threat landscape, cyber awareness, generative AI, AI arms race, ransomware threats, access controls, identity controls, IAM</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/29495f07/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 58 - Trust and Resilience in the Wake of CrowdStrike's Black Swan</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>EP 58 - Trust and Resilience in the Wake of CrowdStrike's Black Swan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4efd4d65-ffb2-4456-8e29-96183fce60e8</guid>
      <link>https://share.transistor.fm/s/54096cd7</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, we dig into the recent the global IT outage caused by a CrowdStrike software update, which impacted millions of Microsoft Windows endpoints and disrupted many sectors. This "black swan" event highlights, among other things, the importance of preparedness, adaptability and robust crisis management. CyberArk Global Chief Information Officer (CIO) Omer Grossman discusses with host David Puner the outage's ramifications, the shaking of trust in technology – and the criticality of resilience against cyberthreats. This conversation underscores the need to be ready for the unexpected and the value of adaptability and resilience in unforeseen circumstances. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, we dig into the recent the global IT outage caused by a CrowdStrike software update, which impacted millions of Microsoft Windows endpoints and disrupted many sectors. This "black swan" event highlights, among other things, the importance of preparedness, adaptability and robust crisis management. CyberArk Global Chief Information Officer (CIO) Omer Grossman discusses with host David Puner the outage's ramifications, the shaking of trust in technology – and the criticality of resilience against cyberthreats. This conversation underscores the need to be ready for the unexpected and the value of adaptability and resilience in unforeseen circumstances. </p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Jul 2024 10:20:56 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/54096cd7/a18f8460.mp3" length="26791967" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/NWscmt5Ih9lGa9X0aVZSyhZ14zXsF8_aOCUn75p-aa4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mM2Y4/YjVhY2ZmYjc0ZjRm/YWNiZTA1NjEyZDUw/ZTA2Ny5qcGc.jpg"/>
      <itunes:duration>1672</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, we dig into the recent the global IT outage caused by a CrowdStrike software update, which impacted millions of Microsoft Windows endpoints and disrupted many sectors. This "black swan" event highlights, among other things, the importance of preparedness, adaptability and robust crisis management. CyberArk Global Chief Information Officer (CIO) Omer Grossman discusses with host David Puner the outage's ramifications, the shaking of trust in technology – and the criticality of resilience against cyberthreats. This conversation underscores the need to be ready for the unexpected and the value of adaptability and resilience in unforeseen circumstances. </p>]]>
      </itunes:summary>
      <itunes:keywords>CrowdStrike incident, CrowdStrike outage, cybersecurity, IT disruption, identity security, cyber resilience, cyber risk</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/54096cd7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 57 - Proactive Defense: Security's AI Infusion</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>EP 57 - Proactive Defense: Security's AI Infusion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">18045725-0383-47c8-8ef3-6a041ee798bc</guid>
      <link>https://share.transistor.fm/s/1f8643d0</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk’s Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyber protection, offering solutions that are as intelligent as they are intuitive. With the ability to predict threats and adapt with unprecedented agility, AI is ushering in a new era of proactive security. Regev shares insights into the company's strategic vision and the role of AI in enhancing customer security and productivity. He also discusses the launch of CyberArk's AI Center of Excellence and the introduction of CyberArk CORA AI, an umbrella of AI capabilities infused within CyberArk's products.</p><p>Join us as we examine the challenges and opportunities presented by AI in the cybersecurity landscape, the importance of fostering a culture of innovation and how CyberArk is leading the charge in securing identities in the AI era. This episode is a must-listen for anyone interested in the intersection of AI and identity security – and the future of cyber protection.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk’s Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyber protection, offering solutions that are as intelligent as they are intuitive. With the ability to predict threats and adapt with unprecedented agility, AI is ushering in a new era of proactive security. Regev shares insights into the company's strategic vision and the role of AI in enhancing customer security and productivity. He also discusses the launch of CyberArk's AI Center of Excellence and the introduction of CyberArk CORA AI, an umbrella of AI capabilities infused within CyberArk's products.</p><p>Join us as we examine the challenges and opportunities presented by AI in the cybersecurity landscape, the importance of fostering a culture of innovation and how CyberArk is leading the charge in securing identities in the AI era. This episode is a must-listen for anyone interested in the intersection of AI and identity security – and the future of cyber protection.</p>]]>
      </content:encoded>
      <pubDate>Tue, 23 Jul 2024 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/1f8643d0/cf51855e.mp3" length="30766606" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xSuKUjOWp73isWAQbubD3hRAhS-jXV3soaoqoF-POG4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85OTky/ZmQ0NWE0NzVjNTdj/NjcxOTNkNjM2YWI4/NGM5YS5qcGc.jpg"/>
      <itunes:duration>1920</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, we explore the transformative impact of artificial intelligence (AI) on identity security. Guest Peretz Regev, CyberArk’s Chief Product Officer, joins host David Puner, for a discussion about how AI is reshaping cyber protection, offering solutions that are as intelligent as they are intuitive. With the ability to predict threats and adapt with unprecedented agility, AI is ushering in a new era of proactive security. Regev shares insights into the company's strategic vision and the role of AI in enhancing customer security and productivity. He also discusses the launch of CyberArk's AI Center of Excellence and the introduction of CyberArk CORA AI, an umbrella of AI capabilities infused within CyberArk's products.</p><p>Join us as we examine the challenges and opportunities presented by AI in the cybersecurity landscape, the importance of fostering a culture of innovation and how CyberArk is leading the charge in securing identities in the AI era. This episode is a must-listen for anyone interested in the intersection of AI and identity security – and the future of cyber protection.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, artificial intelligence, AI, chief product officer, cyber innovation, security and productivity, cyber threats, proactive security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1f8643d0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 56 - Time as Attack Surface</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>EP 56 - Time as Attack Surface</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b988bbb7-3d51-4d6c-8d66-67820611d83f</guid>
      <link>https://share.transistor.fm/s/83a92318</link>
      <description>
        <![CDATA[<p>In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at Rate (formerly Guaranteed Rate), highlights the importance of swift decision-making and prompt threat response. They discuss the role of just-in-time (JIT) access and AI in accelerating response times, as well as the ever-evolving threat landscape that requires constant vigilance. The episode emphasizes the strategies and technologies shaping the future of cybersecurity, particularly at the intersection of time management and identity protection. </p><p>Join us for a timely discussion that underscores the intersection of time management and identity protection.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at Rate (formerly Guaranteed Rate), highlights the importance of swift decision-making and prompt threat response. They discuss the role of just-in-time (JIT) access and AI in accelerating response times, as well as the ever-evolving threat landscape that requires constant vigilance. The episode emphasizes the strategies and technologies shaping the future of cybersecurity, particularly at the intersection of time management and identity protection. </p><p>Join us for a timely discussion that underscores the intersection of time management and identity protection.</p>]]>
      </content:encoded>
      <pubDate>Wed, 10 Jul 2024 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/83a92318/589ed5f9.mp3" length="31826296" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/61rUNtcv5AhCSMi_lUH_u17mPCWmGPdnL6mlPyCwLg4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zYTdk/NDI4NDI5YjNmMWFh/NDY2YmEzM2E2NTMw/YWExMy5qcGc.jpg"/>
      <itunes:duration>1986</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the latest episode of the Trust Issues podcast, the focus is on the criticality of time in organizational security. The conversation with host David Puner and guest Katherine Mowen, SVP of Information Security at Rate (formerly Guaranteed Rate), highlights the importance of swift decision-making and prompt threat response. They discuss the role of just-in-time (JIT) access and AI in accelerating response times, as well as the ever-evolving threat landscape that requires constant vigilance. The episode emphasizes the strategies and technologies shaping the future of cybersecurity, particularly at the intersection of time management and identity protection. </p><p>Join us for a timely discussion that underscores the intersection of time management and identity protection.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, attack surface, just-in-time access, information security, emerging threats, AI, risk management, identity governance, privileged access, data retention</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/83a92318/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 55 - AI Insights: Shaping the Future of IAM</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>EP 55 - AI Insights: Shaping the Future of IAM</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">36f55773-154d-4422-83f6-33db0315e668</guid>
      <link>https://share.transistor.fm/s/c469a765</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, Daniel Schwartzer, CyberArk's Chief Product Technologist and leader of the company’s Artificial Intelligence (AI) Center of Excellence, joins host David Puner for a conversation that explores AI's transformative impact on identity and access management (IAM). Schwartzer discusses how CyberArk's AI Center of Excellence is equipping the R&amp;D team to innovate continuously and stay ahead of AI-enabled threats. Learn about the future of AI in IAM, the role of AI in shaping new business models and the importance of an experimentation culture in driving user experience (UX) improvements. Gain insights into the methodical, data-driven approaches to monetization strategies and the significance of learning from on-the-job experiences. This episode is a must-listen for anyone interested in the intersection of AI and IAM, and the opportunities it presents for leading the transition in the industry. Tune in to uncover what's coming down the AI pike and how it will influence the future of IAM.</p><p>For more from Daniel on this subject, check out his recent blog, <a href="https://www.cyberark.com/resources/blog/predicting-the-future-of-ai-in-identity-and-access-management">"Predicting the Future of AI in Identity and Access Management."</a> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, Daniel Schwartzer, CyberArk's Chief Product Technologist and leader of the company’s Artificial Intelligence (AI) Center of Excellence, joins host David Puner for a conversation that explores AI's transformative impact on identity and access management (IAM). Schwartzer discusses how CyberArk's AI Center of Excellence is equipping the R&amp;D team to innovate continuously and stay ahead of AI-enabled threats. Learn about the future of AI in IAM, the role of AI in shaping new business models and the importance of an experimentation culture in driving user experience (UX) improvements. Gain insights into the methodical, data-driven approaches to monetization strategies and the significance of learning from on-the-job experiences. This episode is a must-listen for anyone interested in the intersection of AI and IAM, and the opportunities it presents for leading the transition in the industry. Tune in to uncover what's coming down the AI pike and how it will influence the future of IAM.</p><p>For more from Daniel on this subject, check out his recent blog, <a href="https://www.cyberark.com/resources/blog/predicting-the-future-of-ai-in-identity-and-access-management">"Predicting the Future of AI in Identity and Access Management."</a> </p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Jun 2024 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/c469a765/2eb3bf8f.mp3" length="34447157" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZmnEjjHywh5vF5V08yTOEi_fK3uXfYhR9pJXo99i0pE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZjZl/NWQzM2QxNzAzZmNh/ZjAxZmM3ZTRmZmRl/MzdmZS5qcGc.jpg"/>
      <itunes:duration>2150</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, Daniel Schwartzer, CyberArk's Chief Product Technologist and leader of the company’s Artificial Intelligence (AI) Center of Excellence, joins host David Puner for a conversation that explores AI's transformative impact on identity and access management (IAM). Schwartzer discusses how CyberArk's AI Center of Excellence is equipping the R&amp;D team to innovate continuously and stay ahead of AI-enabled threats. Learn about the future of AI in IAM, the role of AI in shaping new business models and the importance of an experimentation culture in driving user experience (UX) improvements. Gain insights into the methodical, data-driven approaches to monetization strategies and the significance of learning from on-the-job experiences. This episode is a must-listen for anyone interested in the intersection of AI and IAM, and the opportunities it presents for leading the transition in the industry. Tune in to uncover what's coming down the AI pike and how it will influence the future of IAM.</p><p>For more from Daniel on this subject, check out his recent blog, <a href="https://www.cyberark.com/resources/blog/predicting-the-future-of-ai-in-identity-and-access-management">"Predicting the Future of AI in Identity and Access Management."</a> </p>]]>
      </itunes:summary>
      <itunes:keywords>identity security, cybersecurity, generative AI, AI-enabled threats, LLMs, ChatGPT, access policies, policy recommendations, IAM, NLP</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c469a765/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 54 - Zen and the Art of CISO Leadership </title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>EP 54 - Zen and the Art of CISO Leadership </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">912e3cfe-718a-462b-892d-e87cd72a7281</guid>
      <link>https://share.transistor.fm/s/447baf02</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, we explore the nexus of mindfulness, identity security and leadership with Jitender Arora, Partner and Chief Information Security Officer (CISO) for Deloitte North and South Europe, and Deloitte's Global Deputy CISO. Arora discusses with host David Puner how a Zen-like mindset can be influential in helping to bolster organizational cyber defenses, sharing his wisdom on the critical role of emotional intelligence, empathy and the human touch within the cyber realm. This episode offers a glimpse into innovative strategies for navigating the intricate cybersecurity landscape, emphasizing the significance of maintaining a Zen-like composure for effective decision-making and risk management. Listeners will gain insights into the evolving role of CISOs and the transformative impact of integrating Zen principles into leadership and cybersecurity practices. Tune in for a fresh perspective on leading with tranquility amid an ever-expanding threat landscape and about the pivotal role of identity security in protecting both human and non-human identities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, we explore the nexus of mindfulness, identity security and leadership with Jitender Arora, Partner and Chief Information Security Officer (CISO) for Deloitte North and South Europe, and Deloitte's Global Deputy CISO. Arora discusses with host David Puner how a Zen-like mindset can be influential in helping to bolster organizational cyber defenses, sharing his wisdom on the critical role of emotional intelligence, empathy and the human touch within the cyber realm. This episode offers a glimpse into innovative strategies for navigating the intricate cybersecurity landscape, emphasizing the significance of maintaining a Zen-like composure for effective decision-making and risk management. Listeners will gain insights into the evolving role of CISOs and the transformative impact of integrating Zen principles into leadership and cybersecurity practices. Tune in for a fresh perspective on leading with tranquility amid an ever-expanding threat landscape and about the pivotal role of identity security in protecting both human and non-human identities.</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Jun 2024 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/447baf02/8839a097.mp3" length="41118197" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8oSoBV4j5F4oeGFVSu5gu410OQAm5VgTtXQBCz0UWGc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82YTNk/N2M0YWU3YjQ5ZTk1/ZWFmN2ZiNDVjZjQ5/ODg2NC5qcGc.jpg"/>
      <itunes:duration>2567</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, we explore the nexus of mindfulness, identity security and leadership with Jitender Arora, Partner and Chief Information Security Officer (CISO) for Deloitte North and South Europe, and Deloitte's Global Deputy CISO. Arora discusses with host David Puner how a Zen-like mindset can be influential in helping to bolster organizational cyber defenses, sharing his wisdom on the critical role of emotional intelligence, empathy and the human touch within the cyber realm. This episode offers a glimpse into innovative strategies for navigating the intricate cybersecurity landscape, emphasizing the significance of maintaining a Zen-like composure for effective decision-making and risk management. Listeners will gain insights into the evolving role of CISOs and the transformative impact of integrating Zen principles into leadership and cybersecurity practices. Tune in for a fresh perspective on leading with tranquility amid an ever-expanding threat landscape and about the pivotal role of identity security in protecting both human and non-human identities.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, CISO, chief information security officer, cyber risk, cyberthreats, leadership, UX, Zen</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/447baf02/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 53 - Cyber Insurance: Managing Risk and Protection</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>EP 53 - Cyber Insurance: Managing Risk and Protection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">49bd1d37-07ac-4738-b57c-c2864b1a0d90</guid>
      <link>https://share.transistor.fm/s/8d8059cd</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, we dive into the complex and rapidly evolving world of cyber insurance. We discuss the challenges and opportunities facing companies seeking to protect themselves from the ever-present threat of cyberattacks. Joining host David Puner, today’s guest is Ruby Rai, Cyber Practice Leader, Canada at Marsh McLennan, who shares her insights into the current state of the cyber insurance market, its future trajectory and the key requirements companies need to meet to obtain coverage. We also explore the impact of third-party access and non-human identities on cyber insurance requirements and how companies can adopt an identity security approach to meet these requirements. Join us as we dig into the complexities of the cyber insurance market and discuss the importance of collaboration between insurers and clients in ensuring that companies have the coverage they need.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, we dive into the complex and rapidly evolving world of cyber insurance. We discuss the challenges and opportunities facing companies seeking to protect themselves from the ever-present threat of cyberattacks. Joining host David Puner, today’s guest is Ruby Rai, Cyber Practice Leader, Canada at Marsh McLennan, who shares her insights into the current state of the cyber insurance market, its future trajectory and the key requirements companies need to meet to obtain coverage. We also explore the impact of third-party access and non-human identities on cyber insurance requirements and how companies can adopt an identity security approach to meet these requirements. Join us as we dig into the complexities of the cyber insurance market and discuss the importance of collaboration between insurers and clients in ensuring that companies have the coverage they need.</p>]]>
      </content:encoded>
      <pubDate>Tue, 28 May 2024 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/8d8059cd/393dc3b7.mp3" length="39028436" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Ue5aNdz8OQbDrXny1FFjuQuTzKMQOac_tqtPzx-mvjM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNjIy/ZWZhMjI0MWFjNjcw/MTc0YWRhMjY4ODQw/MTU1NC5qcGc.jpg"/>
      <itunes:duration>2437</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, we dive into the complex and rapidly evolving world of cyber insurance. We discuss the challenges and opportunities facing companies seeking to protect themselves from the ever-present threat of cyberattacks. Joining host David Puner, today’s guest is Ruby Rai, Cyber Practice Leader, Canada at Marsh McLennan, who shares her insights into the current state of the cyber insurance market, its future trajectory and the key requirements companies need to meet to obtain coverage. We also explore the impact of third-party access and non-human identities on cyber insurance requirements and how companies can adopt an identity security approach to meet these requirements. Join us as we dig into the complexities of the cyber insurance market and discuss the importance of collaboration between insurers and clients in ensuring that companies have the coverage they need.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, cyber insurance, identity security, cyber risk, risk management, risk assessment, cyber risks, cyber threats</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8d8059cd/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 52 - Built to Last: CyberArk's 25-Year Innovation Evolution w/ Founder and Executive Chairman Udi Mokady </title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>EP 52 - Built to Last: CyberArk's 25-Year Innovation Evolution w/ Founder and Executive Chairman Udi Mokady </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cbbdbbeb-223b-4cbf-a257-13eaa8d11d4e</guid>
      <link>https://share.transistor.fm/s/7808fd06</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of <a href="https://www.cyberark.com/resources/blog/cyberark-at-25-udi-mokady-on-milestones-identity-security-and-humility">the company’s 25th anniversary</a>. They discuss that milestone and reflect on CyberArk’s growth to becoming the global leader in identity security and the ever-evolving threat landscape – <em>and</em> how the company has scaled to meet it. Udi shares his insights on the company's culture, values, philosophies and lessons he's learned. He also dives into the importance of innovation, the role of AI in cybersecurity and his future aspirations for the company. </p><p>And, because we say in the episode that we’ll share it here, Mark Knopfler’s new album is entitled ‘<a href="https://open.spotify.com/album/1VD0dpNJZjdQ0lelA5JTHv">One Deep River</a>’ … Udi describes it as great for driving and <em>optimistic</em>. </p><p>Enjoy the podcast! </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of <a href="https://www.cyberark.com/resources/blog/cyberark-at-25-udi-mokady-on-milestones-identity-security-and-humility">the company’s 25th anniversary</a>. They discuss that milestone and reflect on CyberArk’s growth to becoming the global leader in identity security and the ever-evolving threat landscape – <em>and</em> how the company has scaled to meet it. Udi shares his insights on the company's culture, values, philosophies and lessons he's learned. He also dives into the importance of innovation, the role of AI in cybersecurity and his future aspirations for the company. </p><p>And, because we say in the episode that we’ll share it here, Mark Knopfler’s new album is entitled ‘<a href="https://open.spotify.com/album/1VD0dpNJZjdQ0lelA5JTHv">One Deep River</a>’ … Udi describes it as great for driving and <em>optimistic</em>. </p><p>Enjoy the podcast! </p>]]>
      </content:encoded>
      <pubDate>Fri, 10 May 2024 09:31:50 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/7808fd06/b70d849a.mp3" length="50969561" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/eUftidKb8qZh6RAzdrWlDzGlM3zJ54Yuh1H5Waf-iEM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMjg5/ODYxYTljNGFlMzVm/OWViMzQ5MGZmMzg4/MGRmMS5wbmc.jpg"/>
      <itunes:duration>3183</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of <a href="https://www.cyberark.com/resources/blog/cyberark-at-25-udi-mokady-on-milestones-identity-security-and-humility">the company’s 25th anniversary</a>. They discuss that milestone and reflect on CyberArk’s growth to becoming the global leader in identity security and the ever-evolving threat landscape – <em>and</em> how the company has scaled to meet it. Udi shares his insights on the company's culture, values, philosophies and lessons he's learned. He also dives into the importance of innovation, the role of AI in cybersecurity and his future aspirations for the company. </p><p>And, because we say in the episode that we’ll share it here, Mark Knopfler’s new album is entitled ‘<a href="https://open.spotify.com/album/1VD0dpNJZjdQ0lelA5JTHv">One Deep River</a>’ … Udi describes it as great for driving and <em>optimistic</em>. </p><p>Enjoy the podcast! </p>]]>
      </itunes:summary>
      <itunes:keywords>CyberArk, Udi Mokady, identity security, Privileged Access Management, PAM, privileged access, cybersecurity, innovation, threat landscape, company culture, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7808fd06/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 51 - Balancing Innovation and Security in FinTech</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>EP 51 - Balancing Innovation and Security in FinTech</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1305104e-7f18-48d9-a0ad-ba321fbde604</guid>
      <link>https://share.transistor.fm/s/a05884d1</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner interviews Eric Hussey, SVP, Chief Information Security Officer (CISO) at <a href="https://www.finastra.com/">Finastra</a>, a leading provider of financial software solutions and services. Hussey shares his insights on the evolving role of the CISO, the challenges of keeping up with new and evolving cybersecurity regulations, and the importance of balancing innovation with security in the fintech space. He also discusses how identity factors into the equation, mentioning the importance of identity security in the future of fintech and banking, and the need for frictionless enhancements in identity security. Hussey also talks about his career path, AI’s emerging and evolving role in cybersecurity, and the importance of good governance and risk management in prioritizing security concerns. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner interviews Eric Hussey, SVP, Chief Information Security Officer (CISO) at <a href="https://www.finastra.com/">Finastra</a>, a leading provider of financial software solutions and services. Hussey shares his insights on the evolving role of the CISO, the challenges of keeping up with new and evolving cybersecurity regulations, and the importance of balancing innovation with security in the fintech space. He also discusses how identity factors into the equation, mentioning the importance of identity security in the future of fintech and banking, and the need for frictionless enhancements in identity security. Hussey also talks about his career path, AI’s emerging and evolving role in cybersecurity, and the importance of good governance and risk management in prioritizing security concerns. </p>]]>
      </content:encoded>
      <pubDate>Wed, 01 May 2024 08:33:56 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/a05884d1/3d8ecc40.mp3" length="40596222" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/SMIGJm2xkrSSD3jYCRpJL7QhdFLwsWyRibS_S3Pxm1w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZmNk/NGJiMWU2NzZjZjhl/Njg1YmJjM2Q3MTI3/NjFjMy5qcGc.jpg"/>
      <itunes:duration>2535</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner interviews Eric Hussey, SVP, Chief Information Security Officer (CISO) at <a href="https://www.finastra.com/">Finastra</a>, a leading provider of financial software solutions and services. Hussey shares his insights on the evolving role of the CISO, the challenges of keeping up with new and evolving cybersecurity regulations, and the importance of balancing innovation with security in the fintech space. He also discusses how identity factors into the equation, mentioning the importance of identity security in the future of fintech and banking, and the need for frictionless enhancements in identity security. Hussey also talks about his career path, AI’s emerging and evolving role in cybersecurity, and the importance of good governance and risk management in prioritizing security concerns. </p>]]>
      </itunes:summary>
      <itunes:keywords>CISO, fintech, cybersecurity, identity security, risk management, governance, innovation, UX</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a05884d1/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 50 - Adversarial AI's Advance</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>EP 50 - Adversarial AI's Advance</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4c525fa4-4919-4f25-8a96-c55aa074d788</guid>
      <link>https://share.transistor.fm/s/c2969819</link>
      <description>
        <![CDATA[<p>In the 50th episode of the Trust Issues podcast, host David Puner interviews Justin Hutchens, an innovation principal at Trace3 and co-host of the <a href="https://www.itspmagazine.com/cyber-cognition-podcast">Cyber Cognition podcast</a> (along with CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman <a href="https://www.cyberark.com/podcasts/ep-44-the-rise-of-prompt-engineering-how-ai-fuels-script-kiddies/">Len Noe</a>). They discuss the emergence and potential misuse of generative AI, especially natural language processing, for social engineering and adversarial hacking. Hutchens shares his insights on how AI can learn, reason – and even infer human emotions – and how it can be used to manipulate people into disclosing information or performing actions that compromise their security. They also talk about the role of identity in threat monitoring and detection, and the challenges and opportunities AI presents organizations in defending against evolving threats and how we can harness its power for the greater good. Tune in to learn more about the fascinating and ever-changing landscape of adversarial AI and identity security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the 50th episode of the Trust Issues podcast, host David Puner interviews Justin Hutchens, an innovation principal at Trace3 and co-host of the <a href="https://www.itspmagazine.com/cyber-cognition-podcast">Cyber Cognition podcast</a> (along with CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman <a href="https://www.cyberark.com/podcasts/ep-44-the-rise-of-prompt-engineering-how-ai-fuels-script-kiddies/">Len Noe</a>). They discuss the emergence and potential misuse of generative AI, especially natural language processing, for social engineering and adversarial hacking. Hutchens shares his insights on how AI can learn, reason – and even infer human emotions – and how it can be used to manipulate people into disclosing information or performing actions that compromise their security. They also talk about the role of identity in threat monitoring and detection, and the challenges and opportunities AI presents organizations in defending against evolving threats and how we can harness its power for the greater good. Tune in to learn more about the fascinating and ever-changing landscape of adversarial AI and identity security.</p>]]>
      </content:encoded>
      <pubDate>Wed, 17 Apr 2024 09:26:12 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/c2969819/c3af2335.mp3" length="38460425" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/--5DlwYc5VlC23RKCdpCncpixgEcVqrJXhiMHrLQb0s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83MDYz/OGYzOWE5YjAzYzk3/MjRhZDkzYzQzYzRk/MjM5My5wbmc.jpg"/>
      <itunes:duration>2401</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the 50th episode of the Trust Issues podcast, host David Puner interviews Justin Hutchens, an innovation principal at Trace3 and co-host of the <a href="https://www.itspmagazine.com/cyber-cognition-podcast">Cyber Cognition podcast</a> (along with CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman <a href="https://www.cyberark.com/podcasts/ep-44-the-rise-of-prompt-engineering-how-ai-fuels-script-kiddies/">Len Noe</a>). They discuss the emergence and potential misuse of generative AI, especially natural language processing, for social engineering and adversarial hacking. Hutchens shares his insights on how AI can learn, reason – and even infer human emotions – and how it can be used to manipulate people into disclosing information or performing actions that compromise their security. They also talk about the role of identity in threat monitoring and detection, and the challenges and opportunities AI presents organizations in defending against evolving threats and how we can harness its power for the greater good. Tune in to learn more about the fascinating and ever-changing landscape of adversarial AI and identity security.</p>]]>
      </itunes:summary>
      <itunes:keywords>adversarial AI, adversarial hacking, cybersecurity, identity security, generative AI, AI, artificial intelligence</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c2969819/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 49 - Inside the Attack Surface: Lessons from the Red Team on Browser Threats</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>EP 49 - Inside the Attack Surface: Lessons from the Red Team on Browser Threats</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dbcbbeaf-2594-4783-b612-8c193101e351</guid>
      <link>https://share.transistor.fm/s/40a66f28</link>
      <description>
        <![CDATA[<p>VP of CyberArk Red Team Services Shay Nahari joins host David Puner for an in-depth look at the evolving risks facing enterprise browsers. The conversation explores how attackers are shifting from stealing credentials to hijacking session tokens and cookies, and why browsers originally designed for consumers have become a prime target in today’s identity-driven threat landscape. Shay shares real-world examples of session-based attacks, insights from adversarial simulations, and practical strategies for reducing risk, including the importance of least privilege, ephemeral identities, and layered security. This episode offers actionable guidance for security leaders and practitioners looking to protect identities and sensitive data across today’s expanding digital environments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>VP of CyberArk Red Team Services Shay Nahari joins host David Puner for an in-depth look at the evolving risks facing enterprise browsers. The conversation explores how attackers are shifting from stealing credentials to hijacking session tokens and cookies, and why browsers originally designed for consumers have become a prime target in today’s identity-driven threat landscape. Shay shares real-world examples of session-based attacks, insights from adversarial simulations, and practical strategies for reducing risk, including the importance of least privilege, ephemeral identities, and layered security. This episode offers actionable guidance for security leaders and practitioners looking to protect identities and sensitive data across today’s expanding digital environments.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 Apr 2024 08:45:54 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/40a66f28/389f92ac.mp3" length="29064269" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/w0udNh39QlFb0WOwBwx8fF8_MLCurSaPk6XDWj5c2Ms/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3OTkzNjQv/MTcxMjA4NjcwOC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1813</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>VP of CyberArk Red Team Services Shay Nahari joins host David Puner for an in-depth look at the evolving risks facing enterprise browsers. The conversation explores how attackers are shifting from stealing credentials to hijacking session tokens and cookies, and why browsers originally designed for consumers have become a prime target in today’s identity-driven threat landscape. Shay shares real-world examples of session-based attacks, insights from adversarial simulations, and practical strategies for reducing risk, including the importance of least privilege, ephemeral identities, and layered security. This episode offers actionable guidance for security leaders and practitioners looking to protect identities and sensitive data across today’s expanding digital environments.</p>]]>
      </itunes:summary>
      <itunes:keywords>browser security, session-based threats, cookie theft, identity security, enterprise browsers, credentials, attack surface, Red Team, adversarial simulations, least privilege, ephemeral identities, layered security, attacker tactics, session hijacking, cybersecurity, sensitive data protection, authentication, authorization, machine identities, cloud security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/40a66f28/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 48 - What's Driving the Future of Automotive Security</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>EP 48 - What's Driving the Future of Automotive Security</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">75123fad-d35d-4e62-a10d-b97748f6de43</guid>
      <link>https://share.transistor.fm/s/e7a626ca</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Kaivan Karimi, Global Partner Strategy and OT Cybersecurity Lead <em>–</em> Automotive Mobility and Transportation at Microsoft, discusses with host David Puner the complexities of the automotive cybersecurity ecosystem, and they explore the challenges and considerations facing the industry. Karimi shares his insights on the role of identity security in automotive cybersecurity and how it helps ensure that only authenticated entities have the privilege to engage in the high-speed exchange of information. He also talks about the importance of data sovereignty, data privacy and compliance in the automotive industry. This episode provides a fascinating look into the present and future world of automotive cybersecurity and the measures being taken to protect against cyber threats. </p><p>Take the audio ride!  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Kaivan Karimi, Global Partner Strategy and OT Cybersecurity Lead <em>–</em> Automotive Mobility and Transportation at Microsoft, discusses with host David Puner the complexities of the automotive cybersecurity ecosystem, and they explore the challenges and considerations facing the industry. Karimi shares his insights on the role of identity security in automotive cybersecurity and how it helps ensure that only authenticated entities have the privilege to engage in the high-speed exchange of information. He also talks about the importance of data sovereignty, data privacy and compliance in the automotive industry. This episode provides a fascinating look into the present and future world of automotive cybersecurity and the measures being taken to protect against cyber threats. </p><p>Take the audio ride!  </p>]]>
      </content:encoded>
      <pubDate>Thu, 21 Mar 2024 11:19:25 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/e7a626ca/fdaf8fa7.mp3" length="32914260" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BGH3XbV-EoHMBGJL0-UMtamtNkRxqwSluTAGh492cqw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3Nzk5ODAv/MTcxMDk1MzU0NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2053</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, Kaivan Karimi, Global Partner Strategy and OT Cybersecurity Lead <em>–</em> Automotive Mobility and Transportation at Microsoft, discusses with host David Puner the complexities of the automotive cybersecurity ecosystem, and they explore the challenges and considerations facing the industry. Karimi shares his insights on the role of identity security in automotive cybersecurity and how it helps ensure that only authenticated entities have the privilege to engage in the high-speed exchange of information. He also talks about the importance of data sovereignty, data privacy and compliance in the automotive industry. This episode provides a fascinating look into the present and future world of automotive cybersecurity and the measures being taken to protect against cyber threats. </p><p>Take the audio ride!  </p>]]>
      </itunes:summary>
      <itunes:keywords>automotive cybersecurity, identity security, cybersecurity, connected cars, data protection, autonomous driving</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e7a626ca/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 47 - Digital Trust and the Identity Cornerstone </title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>EP 47 - Digital Trust and the Identity Cornerstone </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8ce1bfc3-435e-406a-bfcb-0ec4680ae10f</guid>
      <link>https://share.transistor.fm/s/120b48c2</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, Jan Vanhaecht, the Global Digital Identity Leader at Deloitte Belgium, delves into the intricate realms of digital trust and risk management with host David Puner. The discussion covers topics ranging from the impact of regulations on cybersecurity practices to the pivotal role of identity in building a robust security culture. Unpacking the nuances of digital trust maturity, the episode explores how organizations can navigate the delicate balance between risk and reward. From the emergence of passwordless authentication to the practical applications of Zero Trust principles, the conversation provides valuable perspectives on safeguarding digital landscapes. Join us as we unravel the complexities of cybersecurity and discover how it intertwines with innovation, compliance and the pursuit of trust in the digital age. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, Jan Vanhaecht, the Global Digital Identity Leader at Deloitte Belgium, delves into the intricate realms of digital trust and risk management with host David Puner. The discussion covers topics ranging from the impact of regulations on cybersecurity practices to the pivotal role of identity in building a robust security culture. Unpacking the nuances of digital trust maturity, the episode explores how organizations can navigate the delicate balance between risk and reward. From the emergence of passwordless authentication to the practical applications of Zero Trust principles, the conversation provides valuable perspectives on safeguarding digital landscapes. Join us as we unravel the complexities of cybersecurity and discover how it intertwines with innovation, compliance and the pursuit of trust in the digital age. </p>]]>
      </content:encoded>
      <pubDate>Tue, 05 Mar 2024 07:00:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/120b48c2/398ca25f.mp3" length="36637696" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/dkRefEMQ7pM3nlqiMyeVi_1iR8BsWYGlghbitpUVm3A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3NDQ2Mzgv/MTcwOTU2MDIzNS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2286</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, Jan Vanhaecht, the Global Digital Identity Leader at Deloitte Belgium, delves into the intricate realms of digital trust and risk management with host David Puner. The discussion covers topics ranging from the impact of regulations on cybersecurity practices to the pivotal role of identity in building a robust security culture. Unpacking the nuances of digital trust maturity, the episode explores how organizations can navigate the delicate balance between risk and reward. From the emergence of passwordless authentication to the practical applications of Zero Trust principles, the conversation provides valuable perspectives on safeguarding digital landscapes. Join us as we unravel the complexities of cybersecurity and discover how it intertwines with innovation, compliance and the pursuit of trust in the digital age. </p>]]>
      </itunes:summary>
      <itunes:keywords>digital trust, zero trust, identity security, cybersecurity, cyber risk, cyber resilience, generative AI, passwordless </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/120b48c2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 46 - Behind the Data Breach: Dissecting Cozy Bear's Microsoft Attack</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>EP 46 - Behind the Data Breach: Dissecting Cozy Bear's Microsoft Attack</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d8c505aa-7c50-409a-b478-37951f0db2fa</guid>
      <link>https://share.transistor.fm/s/1289d153</link>
      <description>
        <![CDATA[<p>Andy Thompson, CyberArk Labs Offensive Security Research Evangelist returns to Trust Issues for a deep dive into the recent APT29 breach of Microsoft. In conversation with host David Puner, Thompson explores the intricate details of the January 2024 attack, dissecting the tactics employed by the APT29 threat actor, also known as Cozy Bear, Cozy Car, The Dukes – or, as Microsoft refers to the group: Midnight Blizzard. From the initial password spray technique to the exploitation of OAuth applications, listeners are taken on a journey through the breach's timeline – and learn how, ultimately, it all boils down to identity. The discussion touches upon the nuances of threat actor nomenclature, the significance of various bear-themed aliases and the professional nature of state-sponsored cyber espionage groups. Throughout the episode, practical insights and cybersecurity best practices are shared, offering organizations valuable strategies to bolster their defenses against evolving cyber threats. For a comprehensive analysis of the APT29 Microsoft data breach and detailed recommendations for improving cybersecurity posture, check out the accompanying <a href="https://www.cyberark.com/resources/blog/apt29s-attack-on-microsoft-tracking-cozy-bears-footprints">blog post</a> written by Andy Thompson.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Andy Thompson, CyberArk Labs Offensive Security Research Evangelist returns to Trust Issues for a deep dive into the recent APT29 breach of Microsoft. In conversation with host David Puner, Thompson explores the intricate details of the January 2024 attack, dissecting the tactics employed by the APT29 threat actor, also known as Cozy Bear, Cozy Car, The Dukes – or, as Microsoft refers to the group: Midnight Blizzard. From the initial password spray technique to the exploitation of OAuth applications, listeners are taken on a journey through the breach's timeline – and learn how, ultimately, it all boils down to identity. The discussion touches upon the nuances of threat actor nomenclature, the significance of various bear-themed aliases and the professional nature of state-sponsored cyber espionage groups. Throughout the episode, practical insights and cybersecurity best practices are shared, offering organizations valuable strategies to bolster their defenses against evolving cyber threats. For a comprehensive analysis of the APT29 Microsoft data breach and detailed recommendations for improving cybersecurity posture, check out the accompanying <a href="https://www.cyberark.com/resources/blog/apt29s-attack-on-microsoft-tracking-cozy-bears-footprints">blog post</a> written by Andy Thompson.</p>]]>
      </content:encoded>
      <pubDate>Thu, 15 Feb 2024 10:16:30 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/1289d153/146a790c.mp3" length="30776175" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/aUomLvJn3L4UfaLf63pRVCUetJZLWF1_QHnmA8_32I4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3MzAzNTgv/MTcwNzk0MzMzMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1919</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Andy Thompson, CyberArk Labs Offensive Security Research Evangelist returns to Trust Issues for a deep dive into the recent APT29 breach of Microsoft. In conversation with host David Puner, Thompson explores the intricate details of the January 2024 attack, dissecting the tactics employed by the APT29 threat actor, also known as Cozy Bear, Cozy Car, The Dukes – or, as Microsoft refers to the group: Midnight Blizzard. From the initial password spray technique to the exploitation of OAuth applications, listeners are taken on a journey through the breach's timeline – and learn how, ultimately, it all boils down to identity. The discussion touches upon the nuances of threat actor nomenclature, the significance of various bear-themed aliases and the professional nature of state-sponsored cyber espionage groups. Throughout the episode, practical insights and cybersecurity best practices are shared, offering organizations valuable strategies to bolster their defenses against evolving cyber threats. For a comprehensive analysis of the APT29 Microsoft data breach and detailed recommendations for improving cybersecurity posture, check out the accompanying <a href="https://www.cyberark.com/resources/blog/apt29s-attack-on-microsoft-tracking-cozy-bears-footprints">blog post</a> written by Andy Thompson.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, APT29, Microsoft, Cozy Bear, ransomware, password spraying, cyberattack, cyber breach, data breach, cyberattack deconstruction</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1289d153/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 45 - OT Security's Digital Makeover</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>EP 45 - OT Security's Digital Makeover</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">163bc0fd-46cb-43a6-b914-2cf06cba2c6e</guid>
      <link>https://share.transistor.fm/s/a7816e2e</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, the conversation revolves around the challenges and transformations in operational technology (OT) security. Guest Mike Holcomb, the Fellow of Cybersecurity and the ICS/OT Cybersecurity Lead at <a href="https://www.fluor.com/">Fluor </a>shares insights with host David Puner on securing legacy systems, the impact of generative AI – <em>and </em>the evolving threat landscape. From addressing security challenges in manufacturing plants to the skills gap in OT cybersecurity, the episode provides an overview of the current state and future prospects of securing critical infrastructure. Holcomb also emphasizes the importance of identity in OT security and offers practical advice for organizations looking to enhance their cybersecurity posture. Check out the episode to explore the dynamic intersection of IT and OT – and how it spotlights the urgent need for robust cybersecurity measures in an evolving digital landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, the conversation revolves around the challenges and transformations in operational technology (OT) security. Guest Mike Holcomb, the Fellow of Cybersecurity and the ICS/OT Cybersecurity Lead at <a href="https://www.fluor.com/">Fluor </a>shares insights with host David Puner on securing legacy systems, the impact of generative AI – <em>and </em>the evolving threat landscape. From addressing security challenges in manufacturing plants to the skills gap in OT cybersecurity, the episode provides an overview of the current state and future prospects of securing critical infrastructure. Holcomb also emphasizes the importance of identity in OT security and offers practical advice for organizations looking to enhance their cybersecurity posture. Check out the episode to explore the dynamic intersection of IT and OT – and how it spotlights the urgent need for robust cybersecurity measures in an evolving digital landscape.</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Feb 2024 18:33:57 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/a7816e2e/f4f6832f.mp3" length="40033220" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/W6PwoJmaZqxqjcgMy0RQ7JlL1gSGradRapy4Km0YUrI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3MTQ5MTIv/MTcwNzI2MTI5My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2498</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, the conversation revolves around the challenges and transformations in operational technology (OT) security. Guest Mike Holcomb, the Fellow of Cybersecurity and the ICS/OT Cybersecurity Lead at <a href="https://www.fluor.com/">Fluor </a>shares insights with host David Puner on securing legacy systems, the impact of generative AI – <em>and </em>the evolving threat landscape. From addressing security challenges in manufacturing plants to the skills gap in OT cybersecurity, the episode provides an overview of the current state and future prospects of securing critical infrastructure. Holcomb also emphasizes the importance of identity in OT security and offers practical advice for organizations looking to enhance their cybersecurity posture. Check out the episode to explore the dynamic intersection of IT and OT – and how it spotlights the urgent need for robust cybersecurity measures in an evolving digital landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, OT, operational technology, OT security, OT cybersecurity, IT security, cyber resilience</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/a7816e2e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 44 - The Rise of Prompt Engineering: How AI Fuels Script Kiddies</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>EP 44 - The Rise of Prompt Engineering: How AI Fuels Script Kiddies</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">86b473e1-b760-442e-9951-d14919749d0c</guid>
      <link>https://share.transistor.fm/s/f6c3f17c</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe joins host David Puner for a discussion about the emerging threat of AI kiddies, a term that describes novice attackers using large language models (LLMs) and chatbots to launch cyberattacks without any coding skills. Noe explains how these AI kiddies use prompt engineering to circumvent the built-in protections of LLMs like ChatGPT and get them to generate malicious code, commands and information. He also shares his insights on how organizations can protect themselves from these AI-enabled attacks by applying the principles of Zero Trust, identity security and multi-layered defense. All this and a dollop of transhumanism … Don’t be a bot – check it out! </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe joins host David Puner for a discussion about the emerging threat of AI kiddies, a term that describes novice attackers using large language models (LLMs) and chatbots to launch cyberattacks without any coding skills. Noe explains how these AI kiddies use prompt engineering to circumvent the built-in protections of LLMs like ChatGPT and get them to generate malicious code, commands and information. He also shares his insights on how organizations can protect themselves from these AI-enabled attacks by applying the principles of Zero Trust, identity security and multi-layered defense. All this and a dollop of transhumanism … Don’t be a bot – check it out! </p>]]>
      </content:encoded>
      <pubDate>Thu, 25 Jan 2024 07:00:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/f6c3f17c/d87fa7b1.mp3" length="32116234" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hOeBJ5rUUmFvHnlfBhoOGzmqS2Pm8LwZNJD8Da8W0pQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE3MDA2MzAv/MTcwNjIyNTIwMi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2003</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, CyberArk’s resident Technical Evangelist, White Hat Hacker and Transhuman Len Noe joins host David Puner for a discussion about the emerging threat of AI kiddies, a term that describes novice attackers using large language models (LLMs) and chatbots to launch cyberattacks without any coding skills. Noe explains how these AI kiddies use prompt engineering to circumvent the built-in protections of LLMs like ChatGPT and get them to generate malicious code, commands and information. He also shares his insights on how organizations can protect themselves from these AI-enabled attacks by applying the principles of Zero Trust, identity security and multi-layered defense. All this and a dollop of transhumanism … Don’t be a bot – check it out! </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, prompt engineering, script kiddies, AI, artificial intelligence, Zero Trust</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f6c3f17c/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 43 - Breaking Things in the Name of Cyber Resilience </title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>EP 43 - Breaking Things in the Name of Cyber Resilience </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">28663c9d-89fb-42f9-99e6-00f82093c148</guid>
      <link>https://share.transistor.fm/s/9793d73e</link>
      <description>
        <![CDATA[<p>Guest Dr. Magda Chelly, Managing Director and CISO of <a href="https://responsible-cyber.com/">Responsible Cyber</a>, joins Trust Issues host David Puner for a conversation about third-party risk management and cyber resilience. Dr. Chelly underscores the imperative of prioritizing identity management, particularly as decentralized work environments are becoming the norm in today’s evolving digital landscape. She also explains how breaking things played a critical role in propelling her into a career in cybersecurity – and then in fostering and advancing it. The interview unfolds against the backdrop of Dr. Chelly’s extensive experience and recently authored book, "Building a Cyber Resilient Business," which serves as a handbook for executives and boards navigating the complexities of cybersecurity. If you’re seeking insights on how to gain stronger visibility and control over your organization’s digital identities, this episode is for you.</p><p>Join us to learn how build resiliency against today’s ever-growing array of cyber threats – and what’s to come in 2024 and beyond.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Guest Dr. Magda Chelly, Managing Director and CISO of <a href="https://responsible-cyber.com/">Responsible Cyber</a>, joins Trust Issues host David Puner for a conversation about third-party risk management and cyber resilience. Dr. Chelly underscores the imperative of prioritizing identity management, particularly as decentralized work environments are becoming the norm in today’s evolving digital landscape. She also explains how breaking things played a critical role in propelling her into a career in cybersecurity – and then in fostering and advancing it. The interview unfolds against the backdrop of Dr. Chelly’s extensive experience and recently authored book, "Building a Cyber Resilient Business," which serves as a handbook for executives and boards navigating the complexities of cybersecurity. If you’re seeking insights on how to gain stronger visibility and control over your organization’s digital identities, this episode is for you.</p><p>Join us to learn how build resiliency against today’s ever-growing array of cyber threats – and what’s to come in 2024 and beyond.</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Jan 2024 11:48:47 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/9793d73e/51cd27a8.mp3" length="43069356" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/p37_4NQDEP-s-VNeXb_G_kX9_q-zpZeD9hY46XI7hF8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2NzU3ODUv/MTcwNTQzMzUzMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2688</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Guest Dr. Magda Chelly, Managing Director and CISO of <a href="https://responsible-cyber.com/">Responsible Cyber</a>, joins Trust Issues host David Puner for a conversation about third-party risk management and cyber resilience. Dr. Chelly underscores the imperative of prioritizing identity management, particularly as decentralized work environments are becoming the norm in today’s evolving digital landscape. She also explains how breaking things played a critical role in propelling her into a career in cybersecurity – and then in fostering and advancing it. The interview unfolds against the backdrop of Dr. Chelly’s extensive experience and recently authored book, "Building a Cyber Resilient Business," which serves as a handbook for executives and boards navigating the complexities of cybersecurity. If you’re seeking insights on how to gain stronger visibility and control over your organization’s digital identities, this episode is for you.</p><p>Join us to learn how build resiliency against today’s ever-growing array of cyber threats – and what’s to come in 2024 and beyond.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, cyber resilience, third-party risk management, risk management, ecosystem risk management, AI, quantum computing</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9793d73e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 42 - Year in Review 2023: Unleashing AI, Securing Identities </title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>EP 42 - Year in Review 2023: Unleashing AI, Securing Identities </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6d2a07e8-70b2-4dd6-9de5-fd290620f687</guid>
      <link>https://share.transistor.fm/s/6a8f2b20</link>
      <description>
        <![CDATA[<p>In this year-end Trust Issues podcast episode, host David Puner takes listeners on a retrospective jaunt through some of the show’s 2023 highlights. The episode features insightful snippets from various cybersecurity experts and thought leaders, each discussing crucial aspects of the ever-evolving cyber landscape. From discussions on the dynamic nature of threat actors and the need for agile security approaches to insights on identity security challenges in the cloud and the intricacies of safeguarding data, the episode encapsulates a wealth of knowledge shared by industry professionals. With diverse perspectives on generative AI, risk management, cloud security, DevSecOps – and even a personal bear wrestling story – Trust Issues’ 2023 cannon delivers an engaging compilation for both cybersecurity enthusiasts and industry practitioners.</p><p> </p><p>As the podcast looks back on the year's diverse lineup of guests, it serves as a valuable resource for anyone seeking to stay informed about the latest cybersecurity trends, strategies and challenges. The episode emphasizes the importance of adapting to the rapidly changing threat landscape, adopting innovative security practices and fostering collaboration to address the multifaceted nature of cyber risks in the modern digital era.</p><p> </p><p>Clips featured in this episode from the following guests:</p><p>Eran Shimony, Principal Security Researcher, CyberArk Labs</p><p>Andy Thompson, Offensive Security Research Evangelist, CyberArk Labs</p><p>Eric O’Neill, Former FBI Counterintelligence Operative &amp; Current National Security Strategist </p><p>Shay Nahari, VP of Red Team Services, CyberArk</p><p>Diana Kelley, CISO, Protect AI </p><p>Len Noe, Technical Evangelist, White Hat Hacker &amp; Biohacker, CyberArk</p><p>Theresa Payton, Former White House CIO, Founder &amp; CEO of Fortalice Solutions</p><p>Larry Lidz, VP &amp; CISO, Cisco CX Cloud</p><p>Matt Cohen, CEO, CyberArk</p><p>Charles Chu, GM of Cloud Security, CyberArk</p><p>Brad Jones, CISO &amp; VP of Information Security, Seagate Technology</p><p>Dusty Anderson, Managing Director, Global Digital Identity, Protiviti</p><p>Philip Wylie, Offensive Security Professional, Evangelist &amp; Ethical Hacker</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this year-end Trust Issues podcast episode, host David Puner takes listeners on a retrospective jaunt through some of the show’s 2023 highlights. The episode features insightful snippets from various cybersecurity experts and thought leaders, each discussing crucial aspects of the ever-evolving cyber landscape. From discussions on the dynamic nature of threat actors and the need for agile security approaches to insights on identity security challenges in the cloud and the intricacies of safeguarding data, the episode encapsulates a wealth of knowledge shared by industry professionals. With diverse perspectives on generative AI, risk management, cloud security, DevSecOps – and even a personal bear wrestling story – Trust Issues’ 2023 cannon delivers an engaging compilation for both cybersecurity enthusiasts and industry practitioners.</p><p> </p><p>As the podcast looks back on the year's diverse lineup of guests, it serves as a valuable resource for anyone seeking to stay informed about the latest cybersecurity trends, strategies and challenges. The episode emphasizes the importance of adapting to the rapidly changing threat landscape, adopting innovative security practices and fostering collaboration to address the multifaceted nature of cyber risks in the modern digital era.</p><p> </p><p>Clips featured in this episode from the following guests:</p><p>Eran Shimony, Principal Security Researcher, CyberArk Labs</p><p>Andy Thompson, Offensive Security Research Evangelist, CyberArk Labs</p><p>Eric O’Neill, Former FBI Counterintelligence Operative &amp; Current National Security Strategist </p><p>Shay Nahari, VP of Red Team Services, CyberArk</p><p>Diana Kelley, CISO, Protect AI </p><p>Len Noe, Technical Evangelist, White Hat Hacker &amp; Biohacker, CyberArk</p><p>Theresa Payton, Former White House CIO, Founder &amp; CEO of Fortalice Solutions</p><p>Larry Lidz, VP &amp; CISO, Cisco CX Cloud</p><p>Matt Cohen, CEO, CyberArk</p><p>Charles Chu, GM of Cloud Security, CyberArk</p><p>Brad Jones, CISO &amp; VP of Information Security, Seagate Technology</p><p>Dusty Anderson, Managing Director, Global Digital Identity, Protiviti</p><p>Philip Wylie, Offensive Security Professional, Evangelist &amp; Ethical Hacker</p>]]>
      </content:encoded>
      <pubDate>Wed, 27 Dec 2023 12:42:55 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/6a8f2b20/ec616bc7.mp3" length="34015569" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0p0wxPCmlui15qLwKAmDDMS8Re3lXPEmM0nhTlQ2Xvg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2NjAyMDUv/MTcwMzcyMzQxMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2122</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this year-end Trust Issues podcast episode, host David Puner takes listeners on a retrospective jaunt through some of the show’s 2023 highlights. The episode features insightful snippets from various cybersecurity experts and thought leaders, each discussing crucial aspects of the ever-evolving cyber landscape. From discussions on the dynamic nature of threat actors and the need for agile security approaches to insights on identity security challenges in the cloud and the intricacies of safeguarding data, the episode encapsulates a wealth of knowledge shared by industry professionals. With diverse perspectives on generative AI, risk management, cloud security, DevSecOps – and even a personal bear wrestling story – Trust Issues’ 2023 cannon delivers an engaging compilation for both cybersecurity enthusiasts and industry practitioners.</p><p> </p><p>As the podcast looks back on the year's diverse lineup of guests, it serves as a valuable resource for anyone seeking to stay informed about the latest cybersecurity trends, strategies and challenges. The episode emphasizes the importance of adapting to the rapidly changing threat landscape, adopting innovative security practices and fostering collaboration to address the multifaceted nature of cyber risks in the modern digital era.</p><p> </p><p>Clips featured in this episode from the following guests:</p><p>Eran Shimony, Principal Security Researcher, CyberArk Labs</p><p>Andy Thompson, Offensive Security Research Evangelist, CyberArk Labs</p><p>Eric O’Neill, Former FBI Counterintelligence Operative &amp; Current National Security Strategist </p><p>Shay Nahari, VP of Red Team Services, CyberArk</p><p>Diana Kelley, CISO, Protect AI </p><p>Len Noe, Technical Evangelist, White Hat Hacker &amp; Biohacker, CyberArk</p><p>Theresa Payton, Former White House CIO, Founder &amp; CEO of Fortalice Solutions</p><p>Larry Lidz, VP &amp; CISO, Cisco CX Cloud</p><p>Matt Cohen, CEO, CyberArk</p><p>Charles Chu, GM of Cloud Security, CyberArk</p><p>Brad Jones, CISO &amp; VP of Information Security, Seagate Technology</p><p>Dusty Anderson, Managing Director, Global Digital Identity, Protiviti</p><p>Philip Wylie, Offensive Security Professional, Evangelist &amp; Ethical Hacker</p>]]>
      </itunes:summary>
      <itunes:keywords>identity security, cloud security, generative AI, DevSecOps, Threat Landscape, Risk Management, Cybersecurity Leadership, AI in cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6a8f2b20/transcript.txt" type="text/plain"/>
      <podcast:chapters url="https://share.transistor.fm/s/6a8f2b20/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>EP 41 - Cyber Hygiene and the Identity Imperative </title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>EP 41 - Cyber Hygiene and the Identity Imperative </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22e9c398-83ab-4f8a-b48c-89f564d4802b</guid>
      <link>https://share.transistor.fm/s/c9b1b0dd</link>
      <description>
        <![CDATA[<p>Our guest today is Rita Gurevich, the CEO and Founder of <a href="https://sphereco.com/">SPHERE</a>, an identity hygiene platform. Gurevich joins host David Puner to explore the challenges and dynamics surrounding identity and cyber hygiene in today's cybersecurity landscape. The conversation begins by addressing the accelerated pace at which cyber controls and identity hygiene requirements are evolving, emphasizing the critical role they play in cybersecurity strategies. The discussion extends to the impact of cloud and hybrid environments, the nuances of cyber insurance trends – and the challenges presented by mergers and acquisitions in relation to identity hygiene. Gurevich highlights the growing importance of considering both cloud and on-prem systems with equal rigor, emphasizing the need for comprehensive cybersecurity measures to combat threats and risks. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Our guest today is Rita Gurevich, the CEO and Founder of <a href="https://sphereco.com/">SPHERE</a>, an identity hygiene platform. Gurevich joins host David Puner to explore the challenges and dynamics surrounding identity and cyber hygiene in today's cybersecurity landscape. The conversation begins by addressing the accelerated pace at which cyber controls and identity hygiene requirements are evolving, emphasizing the critical role they play in cybersecurity strategies. The discussion extends to the impact of cloud and hybrid environments, the nuances of cyber insurance trends – and the challenges presented by mergers and acquisitions in relation to identity hygiene. Gurevich highlights the growing importance of considering both cloud and on-prem systems with equal rigor, emphasizing the need for comprehensive cybersecurity measures to combat threats and risks. </p>]]>
      </content:encoded>
      <pubDate>Thu, 14 Dec 2023 15:38:15 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/c9b1b0dd/4459463c.mp3" length="36609225" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UMoBfNeBZhyI7nzijnH9GbpYqRWyZLj6dpW8MhME_Ps/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2MjkwNDkv/MTcwMjU2OTA1OC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2284</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Our guest today is Rita Gurevich, the CEO and Founder of <a href="https://sphereco.com/">SPHERE</a>, an identity hygiene platform. Gurevich joins host David Puner to explore the challenges and dynamics surrounding identity and cyber hygiene in today's cybersecurity landscape. The conversation begins by addressing the accelerated pace at which cyber controls and identity hygiene requirements are evolving, emphasizing the critical role they play in cybersecurity strategies. The discussion extends to the impact of cloud and hybrid environments, the nuances of cyber insurance trends – and the challenges presented by mergers and acquisitions in relation to identity hygiene. Gurevich highlights the growing importance of considering both cloud and on-prem systems with equal rigor, emphasizing the need for comprehensive cybersecurity measures to combat threats and risks. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, identity hygiene, cyber hygiene, cyber threats, cyber risk, identity management, IAM</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c9b1b0dd/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 40 - The Identity of Things </title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>EP 40 - The Identity of Things </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">46ffa712-f3d6-493e-862d-fbb12f6f5b2c</guid>
      <link>https://share.transistor.fm/s/4ea686f6</link>
      <description>
        <![CDATA[<p>Today’s Trust Issues guest is Brian Contos, Chief Strategy Officer at Sevco Security. With host David Puner, Contos discusses the intricacies of securing the Internet of Things (IoT) and the challenges posed by the expanding IoT landscape – emphasizing the need for robust identity management. In a broader context, IoT encompasses identity management, cybersecurity and the evolving role of AI in safeguarding digital assets. Contos delves into the pressing issues surrounding IoT, Extended IoT (xIoT) and OT devices' security vulnerabilities – and explores how these vulnerabilities pose threats to consumer privacy, sensitive data and public safety. The conversation also touches on the intersections of identity security with asset intelligence and the importance of understanding the complete asset landscape in cybersecurity. We’re calling this one “The Identity of Things” … Check it out!</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today’s Trust Issues guest is Brian Contos, Chief Strategy Officer at Sevco Security. With host David Puner, Contos discusses the intricacies of securing the Internet of Things (IoT) and the challenges posed by the expanding IoT landscape – emphasizing the need for robust identity management. In a broader context, IoT encompasses identity management, cybersecurity and the evolving role of AI in safeguarding digital assets. Contos delves into the pressing issues surrounding IoT, Extended IoT (xIoT) and OT devices' security vulnerabilities – and explores how these vulnerabilities pose threats to consumer privacy, sensitive data and public safety. The conversation also touches on the intersections of identity security with asset intelligence and the importance of understanding the complete asset landscape in cybersecurity. We’re calling this one “The Identity of Things” … Check it out!</p>]]>
      </content:encoded>
      <pubDate>Tue, 28 Nov 2023 06:58:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/4ea686f6/8dba3816.mp3" length="97946344" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/k16-rLWYVqRAwIXOMyMit21pC3x95HsTaGTc86uACJI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE2MDgwNjgv/MTcwMTExNDk5MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2447</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today’s Trust Issues guest is Brian Contos, Chief Strategy Officer at Sevco Security. With host David Puner, Contos discusses the intricacies of securing the Internet of Things (IoT) and the challenges posed by the expanding IoT landscape – emphasizing the need for robust identity management. In a broader context, IoT encompasses identity management, cybersecurity and the evolving role of AI in safeguarding digital assets. Contos delves into the pressing issues surrounding IoT, Extended IoT (xIoT) and OT devices' security vulnerabilities – and explores how these vulnerabilities pose threats to consumer privacy, sensitive data and public safety. The conversation also touches on the intersections of identity security with asset intelligence and the importance of understanding the complete asset landscape in cybersecurity. We’re calling this one “The Identity of Things” … Check it out!</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, IoT, eIoT, AI, OT, identity management, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4ea686f6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 39 - Analyzing the MGM and Okta Breaches: the Identity Connection</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>EP 39 - Analyzing the MGM and Okta Breaches: the Identity Connection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">30b6591a-ec97-4bd0-b2a9-131fc1844d89</guid>
      <link>https://share.transistor.fm/s/8ba55b39</link>
      <description>
        <![CDATA[<p>In this Trust Issues episode, host David Puner welcomes back Andy Thompson, CyberArk Labs' Offensive Security Research Evangelist for a discussion focused on two recent high-profile breaches: one targeting MGM Resorts International and the other involving Okta's support unit. The conversation delves into the details of the attacks – who’s behind them, how identity plays a pivotal role in both – and the larger implications of this new breed of supply chain attack amid the evolving threat landscape. Thompson also shares insights into how organizations can better protect themselves and their customers.</p><p> </p><p>Check out the CyberArk blog for further insights into the <a href="https://www.cyberark.com/resources/blog/the-mgm-resorts-attack-initial-analysis">MGM</a> and <a href="https://www.cyberark.com/resources/blog/piecing-together-the-attack-on-oktas-support-unit">Okta</a> breaches. And, watch Andy Thompson in the CyberArk Labs' webinar, "<a href="https://www.cyberark.com/resources/webinars/anatomy-of-the-mgm-hack-a-cyberark-labs-perspective">Anatomy of the MGM Hack.</a>"</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this Trust Issues episode, host David Puner welcomes back Andy Thompson, CyberArk Labs' Offensive Security Research Evangelist for a discussion focused on two recent high-profile breaches: one targeting MGM Resorts International and the other involving Okta's support unit. The conversation delves into the details of the attacks – who’s behind them, how identity plays a pivotal role in both – and the larger implications of this new breed of supply chain attack amid the evolving threat landscape. Thompson also shares insights into how organizations can better protect themselves and their customers.</p><p> </p><p>Check out the CyberArk blog for further insights into the <a href="https://www.cyberark.com/resources/blog/the-mgm-resorts-attack-initial-analysis">MGM</a> and <a href="https://www.cyberark.com/resources/blog/piecing-together-the-attack-on-oktas-support-unit">Okta</a> breaches. And, watch Andy Thompson in the CyberArk Labs' webinar, "<a href="https://www.cyberark.com/resources/webinars/anatomy-of-the-mgm-hack-a-cyberark-labs-perspective">Anatomy of the MGM Hack.</a>"</p>]]>
      </content:encoded>
      <pubDate>Thu, 02 Nov 2023 10:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/8ba55b39/be216a08.mp3" length="78663094" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/m0-53X54qIZTIQOnVPBMQUVImbV3j6Q4qkbST5kFDhw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1Njk5OTgv/MTY5ODg2MDk5MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1965</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this Trust Issues episode, host David Puner welcomes back Andy Thompson, CyberArk Labs' Offensive Security Research Evangelist for a discussion focused on two recent high-profile breaches: one targeting MGM Resorts International and the other involving Okta's support unit. The conversation delves into the details of the attacks – who’s behind them, how identity plays a pivotal role in both – and the larger implications of this new breed of supply chain attack amid the evolving threat landscape. Thompson also shares insights into how organizations can better protect themselves and their customers.</p><p> </p><p>Check out the CyberArk blog for further insights into the <a href="https://www.cyberark.com/resources/blog/the-mgm-resorts-attack-initial-analysis">MGM</a> and <a href="https://www.cyberark.com/resources/blog/piecing-together-the-attack-on-oktas-support-unit">Okta</a> breaches. And, watch Andy Thompson in the CyberArk Labs' webinar, "<a href="https://www.cyberark.com/resources/webinars/anatomy-of-the-mgm-hack-a-cyberark-labs-perspective">Anatomy of the MGM Hack.</a>"</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, cyber threats, cyber attacks, cyber breaches, MGM Resorts, Okta, supply chain attack</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8ba55b39/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 38 - Why Cloud Security Doesn't Taste Like Chicken</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>EP 38 - Why Cloud Security Doesn't Taste Like Chicken</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76101cab-3272-4755-ba93-e59b244a0aa8</guid>
      <link>https://share.transistor.fm/s/f798b46d</link>
      <description>
        <![CDATA[<p>Today’s guest is Charles Chu, CyberArk's General Manager of Cloud Security, who’s spent more than a decade at the forefront of cloud security. Chu joins host David Puner for a conversation that delves into secure cloud access and the concept of zero standing privileges (ZSP), a dynamic approach to securing identities in multi-cloud environments. Chu sheds light on the complexities of cloud security, emphasizing the need for tailored solutions to protect against evolving cyber threats. Don't miss this insightful conversation that demystifies cloud security and redefines safeguarding digital assets – and answers the pivotal question: Why doesn’t cloud security taste like chicken?  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today’s guest is Charles Chu, CyberArk's General Manager of Cloud Security, who’s spent more than a decade at the forefront of cloud security. Chu joins host David Puner for a conversation that delves into secure cloud access and the concept of zero standing privileges (ZSP), a dynamic approach to securing identities in multi-cloud environments. Chu sheds light on the complexities of cloud security, emphasizing the need for tailored solutions to protect against evolving cyber threats. Don't miss this insightful conversation that demystifies cloud security and redefines safeguarding digital assets – and answers the pivotal question: Why doesn’t cloud security taste like chicken?  </p>]]>
      </content:encoded>
      <pubDate>Thu, 19 Oct 2023 06:58:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/f798b46d/911e6a4c.mp3" length="87209005" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/5vHsA7OGP9MriDTfudqNSdemj7epXAoKPGiUh_T24gE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MzIxMTUv/MTY5Nzc0NTU5Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2179</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today’s guest is Charles Chu, CyberArk's General Manager of Cloud Security, who’s spent more than a decade at the forefront of cloud security. Chu joins host David Puner for a conversation that delves into secure cloud access and the concept of zero standing privileges (ZSP), a dynamic approach to securing identities in multi-cloud environments. Chu sheds light on the complexities of cloud security, emphasizing the need for tailored solutions to protect against evolving cyber threats. Don't miss this insightful conversation that demystifies cloud security and redefines safeguarding digital assets – and answers the pivotal question: Why doesn’t cloud security taste like chicken?  </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, cloud security, cloud identity security, zero standing privileges, ZSP, cloud access, secure access</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f798b46d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 37 - Cloud Transformation and the Art of Simplicity</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>EP 37 - Cloud Transformation and the Art of Simplicity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bf3f8038-7b73-4714-b84c-555f636d275e</guid>
      <link>https://share.transistor.fm/s/ec8cc543</link>
      <description>
        <![CDATA[<p>Arati Chavan, Staff Vice President, Global Head of Identity and Access Management (IAM) at Elevance Health joins host David Puner for a conversation that sheds light on how federated identity solutions are pivotal in achieving efficient and secure access control across diverse entities. Chavan also explores the challenges and opportunities in cloud transformation, the evolving role of AI in healthcare and the delicate balance between customer simplicity and robust security measures. Listen in for a deep dive into the heart of identity security and its impact on the healthcare industry.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Arati Chavan, Staff Vice President, Global Head of Identity and Access Management (IAM) at Elevance Health joins host David Puner for a conversation that sheds light on how federated identity solutions are pivotal in achieving efficient and secure access control across diverse entities. Chavan also explores the challenges and opportunities in cloud transformation, the evolving role of AI in healthcare and the delicate balance between customer simplicity and robust security measures. Listen in for a deep dive into the heart of identity security and its impact on the healthcare industry.</p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Oct 2023 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/ec8cc543/b23ac154.mp3" length="91806441" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/VT3_jVjTykm98T0YeRfRBfnd5vZrYF3DnV-XQaJr7lA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE1MjA0ODQv/MTY5NjUxNTAwMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2294</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Arati Chavan, Staff Vice President, Global Head of Identity and Access Management (IAM) at Elevance Health joins host David Puner for a conversation that sheds light on how federated identity solutions are pivotal in achieving efficient and secure access control across diverse entities. Chavan also explores the challenges and opportunities in cloud transformation, the evolving role of AI in healthcare and the delicate balance between customer simplicity and robust security measures. Listen in for a deep dive into the heart of identity security and its impact on the healthcare industry.</p>]]>
      </itunes:summary>
      <itunes:keywords>identity security, cloud security, cloud transformation, IAM, healthcare</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ec8cc543/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 36 - The Evolution of an Ethical Hacker</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>EP 36 - The Evolution of an Ethical Hacker</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f5162da6-f084-4762-94ed-85626a7e8e6e</guid>
      <link>https://share.transistor.fm/s/175a48d7</link>
      <description>
        <![CDATA[<p>Our guest today is Phillip Wylie, an offensive security professional and evangelist, author and podcast host who recently added director of services and training at Scythe to his extensive CV. Wylie talks with host David Puner about the critical need for ethical hacking in cybersecurity, identity security revelations from years of penetration testing, and his fascinating career arc, which began in professional wrestling. </p><p> </p><p>Considering a cybersecurity career? You won’t want to miss this episode – Wylie’s passion for cybersecurity education and mentorship is contagious. Plus, you’ll discover many unexpected parallels between pro wrestling and red teaming – and how they can help strengthen your organization’s digital defenses.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Our guest today is Phillip Wylie, an offensive security professional and evangelist, author and podcast host who recently added director of services and training at Scythe to his extensive CV. Wylie talks with host David Puner about the critical need for ethical hacking in cybersecurity, identity security revelations from years of penetration testing, and his fascinating career arc, which began in professional wrestling. </p><p> </p><p>Considering a cybersecurity career? You won’t want to miss this episode – Wylie’s passion for cybersecurity education and mentorship is contagious. Plus, you’ll discover many unexpected parallels between pro wrestling and red teaming – and how they can help strengthen your organization’s digital defenses.</p>]]>
      </content:encoded>
      <pubDate>Thu, 21 Sep 2023 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/175a48d7/837705ee.mp3" length="86943112" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xJ1sXCLfd_6qLOIAV8umIOvBr1uWsDbZnLdgrLaweA4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0OTcwNjIv/MTY5NTMxNTIxNS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2172</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Our guest today is Phillip Wylie, an offensive security professional and evangelist, author and podcast host who recently added director of services and training at Scythe to his extensive CV. Wylie talks with host David Puner about the critical need for ethical hacking in cybersecurity, identity security revelations from years of penetration testing, and his fascinating career arc, which began in professional wrestling. </p><p> </p><p>Considering a cybersecurity career? You won’t want to miss this episode – Wylie’s passion for cybersecurity education and mentorship is contagious. Plus, you’ll discover many unexpected parallels between pro wrestling and red teaming – and how they can help strengthen your organization’s digital defenses.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, offensive security, ethical hacker, ethical hacking</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/175a48d7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 35 - Threat Innovations: Exploring Cascading Supply Chain Attacks</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>EP 35 - Threat Innovations: Exploring Cascading Supply Chain Attacks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">29531cde-2f03-400a-8d1c-365e09bb906e</guid>
      <link>https://share.transistor.fm/s/75dedae3</link>
      <description>
        <![CDATA[<p>In this episode, we welcome back Shay Nahari, VP of CyberArk Red Team Services. His discussion with host David Puner revolves around attacker innovation, focusing on key areas like cascading supply chain attacks and session cookie hijacking. Lean in as Nahari explains how the Red Team simulates real-world attacks to help organizations identify vulnerabilities and improve their security posture.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we welcome back Shay Nahari, VP of CyberArk Red Team Services. His discussion with host David Puner revolves around attacker innovation, focusing on key areas like cascading supply chain attacks and session cookie hijacking. Lean in as Nahari explains how the Red Team simulates real-world attacks to help organizations identify vulnerabilities and improve their security posture.  </p>]]>
      </content:encoded>
      <pubDate>Thu, 07 Sep 2023 14:04:36 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/75dedae3/358a4c2e.mp3" length="61262146" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/6tuNhbbnqFK1eXyq4DC_692MxIScrZU8FJsRarqT1DU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0ODAxOTkv/MTY5NDExMzM1MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1530</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, we welcome back Shay Nahari, VP of CyberArk Red Team Services. His discussion with host David Puner revolves around attacker innovation, focusing on key areas like cascading supply chain attacks and session cookie hijacking. Lean in as Nahari explains how the Red Team simulates real-world attacks to help organizations identify vulnerabilities and improve their security posture.  </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, supply chain attacks, cascading supply chain attacks, red team, red teaming, threat innovation, attacker innovation, cyber threats, cyber attacks</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/75dedae3/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 34 - How to Catch a Malicious Insider w/ Eric O'Neill</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>EP 34 - How to Catch a Malicious Insider w/ Eric O'Neill</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c91b0436-aeb6-45ea-85ae-7c2992bbd4e0</guid>
      <link>https://share.transistor.fm/s/8f2fb52a</link>
      <description>
        <![CDATA[<p>Today’s episode of Trust Issues focuses on spycatching! Eric O'Neill, a former FBI counterintelligence operative and current national security strategist, joins host David Puner to discuss his legendary undercover mission to capture Robert Hanssen, one of the most notorious and damaging spies in U.S. history. O'Neill details his “cover job” of working beside Hanssen in the FBI’s new information assurance (cybersecurity) division, while secretly uncovering his espionage activities. O'Neill’s made-for-the-big-screen experiences emphasize the challenges posed by malicious insiders – some of the most difficult and expensive cybersecurity threats of our time. His gripping account draws intriguing parallels between spies and cyber criminals, shedding light on identity security’s significant role in thwarting insider espionage and defenders’ continuous push to outpace attacker innovation. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today’s episode of Trust Issues focuses on spycatching! Eric O'Neill, a former FBI counterintelligence operative and current national security strategist, joins host David Puner to discuss his legendary undercover mission to capture Robert Hanssen, one of the most notorious and damaging spies in U.S. history. O'Neill details his “cover job” of working beside Hanssen in the FBI’s new information assurance (cybersecurity) division, while secretly uncovering his espionage activities. O'Neill’s made-for-the-big-screen experiences emphasize the challenges posed by malicious insiders – some of the most difficult and expensive cybersecurity threats of our time. His gripping account draws intriguing parallels between spies and cyber criminals, shedding light on identity security’s significant role in thwarting insider espionage and defenders’ continuous push to outpace attacker innovation. </p>]]>
      </content:encoded>
      <pubDate>Wed, 23 Aug 2023 06:59:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/8f2fb52a/5a0cc922.mp3" length="129852211" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1rmFY9-_ePDfg-veIQ1e7pexZhhoWExSl0gy-UjPyGk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0NjIyMTEv/MTY5MjgxNjcwMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3245</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today’s episode of Trust Issues focuses on spycatching! Eric O'Neill, a former FBI counterintelligence operative and current national security strategist, joins host David Puner to discuss his legendary undercover mission to capture Robert Hanssen, one of the most notorious and damaging spies in U.S. history. O'Neill details his “cover job” of working beside Hanssen in the FBI’s new information assurance (cybersecurity) division, while secretly uncovering his espionage activities. O'Neill’s made-for-the-big-screen experiences emphasize the challenges posed by malicious insiders – some of the most difficult and expensive cybersecurity threats of our time. His gripping account draws intriguing parallels between spies and cyber criminals, shedding light on identity security’s significant role in thwarting insider espionage and defenders’ continuous push to outpace attacker innovation. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, malicious insider, Robert Hanssen, spy, spies, espionage, cyber criminals</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/8f2fb52a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 33 - The Evolution of Privileged Access Management (PAM)</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>EP 33 - The Evolution of Privileged Access Management (PAM)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5b030e1f-8773-4b6e-8dfd-6911020fb94c</guid>
      <link>https://share.transistor.fm/s/ec228312</link>
      <description>
        <![CDATA[<p>Crystal Trawny, Optiv’s Practice Director, Privileged Account and Endpoint Privilege Management (PAM/EPM), joins host David Puner in exploring the ever-evolving identity landscape and how emerging threats impact organizations’ cybersecurity requirements. Through the eyes of an end user, Trawny shares best practices for overcoming change resistance, creating effective deployment timelines and avoiding scope creep. This episode maps the correlation between critical program elements – such as robust endpoint privilege management and dynamic access controls – and privileged access management (PAM) maturity. In the face of complexity and ransomware, insider threats and other sophisticated cyberattacks, organizations can use these insights to help assess their current strategy and chart a course for success.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Crystal Trawny, Optiv’s Practice Director, Privileged Account and Endpoint Privilege Management (PAM/EPM), joins host David Puner in exploring the ever-evolving identity landscape and how emerging threats impact organizations’ cybersecurity requirements. Through the eyes of an end user, Trawny shares best practices for overcoming change resistance, creating effective deployment timelines and avoiding scope creep. This episode maps the correlation between critical program elements – such as robust endpoint privilege management and dynamic access controls – and privileged access management (PAM) maturity. In the face of complexity and ransomware, insider threats and other sophisticated cyberattacks, organizations can use these insights to help assess their current strategy and chart a course for success.  </p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Aug 2023 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/ec228312/13226e5f.mp3" length="73905461" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZQTCqxZwb33oTBkR1NM3HgDwhzDRHUmL-O64WjS4q6o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0MjcwMDYv/MTY5MTU5ODQ5Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1847</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Crystal Trawny, Optiv’s Practice Director, Privileged Account and Endpoint Privilege Management (PAM/EPM), joins host David Puner in exploring the ever-evolving identity landscape and how emerging threats impact organizations’ cybersecurity requirements. Through the eyes of an end user, Trawny shares best practices for overcoming change resistance, creating effective deployment timelines and avoiding scope creep. This episode maps the correlation between critical program elements – such as robust endpoint privilege management and dynamic access controls – and privileged access management (PAM) maturity. In the face of complexity and ransomware, insider threats and other sophisticated cyberattacks, organizations can use these insights to help assess their current strategy and chart a course for success.  </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, Privileged Access Management, Zero Trust, Privileged Access Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ec228312/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 32 - Building Trust and Collaboration in Identity Security w/ CyberArk CEO Matt Cohen</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>EP 32 - Building Trust and Collaboration in Identity Security w/ CyberArk CEO Matt Cohen</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1acb5ef3-0f95-4777-9e3b-96030cb65e91</guid>
      <link>https://share.transistor.fm/s/c4a734ed</link>
      <description>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner talks with CyberArk CEO Matt Cohen, who shares his distinct take on leadership – emphasizing the importance of leading without fanfare. Cohen talks about his transition into the CEO role, insights on identity security and the current threat landscape. He also touches on the significance of company culture, professional development – and his admiration for a particular Boston Red Sox manager’s leadership style. The discussion delves into CyberArk's mission to secure the world against cyber threats by securing identities, and empower organizations to move forward, fearlessly to unlock growth, innovation and progress. <br> <br> Three key takeaways from this episode are: <br> 1) The significance of authenticity and humility in leadership.<br> 2) The criticality of identity security in today's evolving threat landscape.<br> 3) The value of customer-centricity and trust-building in successful business relationships.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner talks with CyberArk CEO Matt Cohen, who shares his distinct take on leadership – emphasizing the importance of leading without fanfare. Cohen talks about his transition into the CEO role, insights on identity security and the current threat landscape. He also touches on the significance of company culture, professional development – and his admiration for a particular Boston Red Sox manager’s leadership style. The discussion delves into CyberArk's mission to secure the world against cyber threats by securing identities, and empower organizations to move forward, fearlessly to unlock growth, innovation and progress. <br> <br> Three key takeaways from this episode are: <br> 1) The significance of authenticity and humility in leadership.<br> 2) The criticality of identity security in today's evolving threat landscape.<br> 3) The value of customer-centricity and trust-building in successful business relationships.</p>]]>
      </content:encoded>
      <pubDate>Thu, 20 Jul 2023 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/c4a734ed/e9bafcce.mp3" length="94894858" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/hbeia_eAgTrz4BEJ6XP5GWDRN4nGroYeSH-PAf8y4kw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0MTY5OTYv/MTY5MDU3MDQ5My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2371</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of Trust Issues, host David Puner talks with CyberArk CEO Matt Cohen, who shares his distinct take on leadership – emphasizing the importance of leading without fanfare. Cohen talks about his transition into the CEO role, insights on identity security and the current threat landscape. He also touches on the significance of company culture, professional development – and his admiration for a particular Boston Red Sox manager’s leadership style. The discussion delves into CyberArk's mission to secure the world against cyber threats by securing identities, and empower organizations to move forward, fearlessly to unlock growth, innovation and progress. <br> <br> Three key takeaways from this episode are: <br> 1) The significance of authenticity and humility in leadership.<br> 2) The criticality of identity security in today's evolving threat landscape.<br> 3) The value of customer-centricity and trust-building in successful business relationships.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, leadership, CEO</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c4a734ed/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 31 - How Generative AI is Reshaping Cyber Threats </title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>EP 31 - How Generative AI is Reshaping Cyber Threats </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">96c558ab-e2a8-4eb1-9383-ca8e968f16e8</guid>
      <link>https://share.transistor.fm/s/9e5bb12e</link>
      <description>
        <![CDATA[<p>While generative AI offers powerful tools for cyber defenders, it's also enabled cyber attackers to innovate and up the ante when it comes to threats such as malware, vulnerability exploitation and deep fake phishing. All this and we’re still just in the early days of the technology. In this episode, CyberArk Labs’ Vice President of Cyber Research Lavi Lazarovitz, discusses with host David Puner the seismic shift generative AI is starting to bring to the threat landscape – diving deep into offensive AI attack scenarios and the implications for cyber defenders. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>While generative AI offers powerful tools for cyber defenders, it's also enabled cyber attackers to innovate and up the ante when it comes to threats such as malware, vulnerability exploitation and deep fake phishing. All this and we’re still just in the early days of the technology. In this episode, CyberArk Labs’ Vice President of Cyber Research Lavi Lazarovitz, discusses with host David Puner the seismic shift generative AI is starting to bring to the threat landscape – diving deep into offensive AI attack scenarios and the implications for cyber defenders. </p>]]>
      </content:encoded>
      <pubDate>Thu, 06 Jul 2023 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/9e5bb12e/e22d31ba.mp3" length="38293324" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ZQw9bcvLwn6bkZ3t0qNQwJWoqa_w3bH7zGVbd6XyZJQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzE0MDQ3MDMv/MTY4ODY2NDMzOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2390</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>While generative AI offers powerful tools for cyber defenders, it's also enabled cyber attackers to innovate and up the ante when it comes to threats such as malware, vulnerability exploitation and deep fake phishing. All this and we’re still just in the early days of the technology. In this episode, CyberArk Labs’ Vice President of Cyber Research Lavi Lazarovitz, discusses with host David Puner the seismic shift generative AI is starting to bring to the threat landscape – diving deep into offensive AI attack scenarios and the implications for cyber defenders. </p>]]>
      </itunes:summary>
      <itunes:keywords>generative AI, cybersecurity, threat landscape, threat research, offensive AI, cyberattacks, identity security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9e5bb12e/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 30 - Securing Data Amid the AI Gold Rush</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>EP 30 - Securing Data Amid the AI Gold Rush</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5aa9520b-e88e-4009-8aaf-1902edc4446d</guid>
      <link>https://share.transistor.fm/s/2ba7d0a2</link>
      <description>
        <![CDATA[<p>Diana Kelley, Chief Information Security Officer (CISO) at Protect AI joins host David Puner for a dive into the world of artificial intelligence (AI) and machine learning (ML), exploring the importance of privacy and security controls amid the AI Gold Rush. As the world seeks to capitalize on generative AI’s potential, risks are escalating. From protecting data from nefarious actors to addressing privacy implications and cyber threats, Kelley highlights the need for responsible AI development and usage. The conversation explores the <a href="https://www.cyberark.com/what-is/least-privilege/">principle of least privilege (PoLP)</a> in AI, the privacy implications of using AI and ML platforms and the need for proper protection and controls in the development and deployment of AI and ML systems.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Diana Kelley, Chief Information Security Officer (CISO) at Protect AI joins host David Puner for a dive into the world of artificial intelligence (AI) and machine learning (ML), exploring the importance of privacy and security controls amid the AI Gold Rush. As the world seeks to capitalize on generative AI’s potential, risks are escalating. From protecting data from nefarious actors to addressing privacy implications and cyber threats, Kelley highlights the need for responsible AI development and usage. The conversation explores the <a href="https://www.cyberark.com/what-is/least-privilege/">principle of least privilege (PoLP)</a> in AI, the privacy implications of using AI and ML platforms and the need for proper protection and controls in the development and deployment of AI and ML systems.</p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Jun 2023 09:01:38 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/2ba7d0a2/4e1a29fc.mp3" length="66970392" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/N0S79yJ1ovVbJrQJTUg5GCv7DXJ7PfIQktp8R84aE2g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzODEyODIv/MTY4NzM1NDYwOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1673</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Diana Kelley, Chief Information Security Officer (CISO) at Protect AI joins host David Puner for a dive into the world of artificial intelligence (AI) and machine learning (ML), exploring the importance of privacy and security controls amid the AI Gold Rush. As the world seeks to capitalize on generative AI’s potential, risks are escalating. From protecting data from nefarious actors to addressing privacy implications and cyber threats, Kelley highlights the need for responsible AI development and usage. The conversation explores the <a href="https://www.cyberark.com/what-is/least-privilege/">principle of least privilege (PoLP)</a> in AI, the privacy implications of using AI and ML platforms and the need for proper protection and controls in the development and deployment of AI and ML systems.</p>]]>
      </itunes:summary>
      <itunes:keywords>AI, ML, artificial intelligence, machine learning, AI Gold Rush, principle of least privilege, least privilege, PAM, identity security, CISO</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2ba7d0a2/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 29 - Synthetic Identity: Unmasking a New AI-Fueled Cyber Threat</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>EP 29 - Synthetic Identity: Unmasking a New AI-Fueled Cyber Threat</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8337cf9a-2273-4181-94af-880264877d0e</guid>
      <link>https://share.transistor.fm/s/f34ef3ab</link>
      <description>
        <![CDATA[<p>Scattered across the internet are jigsaw puzzle pieces containing your personal information. If reassembled by an attacker, these puzzle pieces could easily compromise your identity. Our returning guest today is Len Noe, CyberArk’s resident transhuman (a.k.a. cyborg), whose official titles these days are Technical Evangelist, White Hat Hacker and Biohacker. Noe joins host David Puner to shed light on the concept of synthetic identity, which involves gathering publicly available, unprotected data and then using AI chatbots and platforms like ChatGPT along with predictive analytics to correlate the data and generate deep digital portraits of individuals. Then, thinking like an attacker, Noe dives into how this new digital clairvoyance has the potential to up threat actors’ games and what organizations and individuals should be doing to combat it. Noe also shares his POV on the implications for cybersecurity and his concerns about sharing personal and proprietary information with AI chatbots and platforms. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Scattered across the internet are jigsaw puzzle pieces containing your personal information. If reassembled by an attacker, these puzzle pieces could easily compromise your identity. Our returning guest today is Len Noe, CyberArk’s resident transhuman (a.k.a. cyborg), whose official titles these days are Technical Evangelist, White Hat Hacker and Biohacker. Noe joins host David Puner to shed light on the concept of synthetic identity, which involves gathering publicly available, unprotected data and then using AI chatbots and platforms like ChatGPT along with predictive analytics to correlate the data and generate deep digital portraits of individuals. Then, thinking like an attacker, Noe dives into how this new digital clairvoyance has the potential to up threat actors’ games and what organizations and individuals should be doing to combat it. Noe also shares his POV on the implications for cybersecurity and his concerns about sharing personal and proprietary information with AI chatbots and platforms. </p>]]>
      </content:encoded>
      <pubDate>Wed, 07 Jun 2023 09:01:25 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/f34ef3ab/c6fb1b13.mp3" length="59804962" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/eDE37Nt5TGaK1Ch3BTwfId5EvNSIGT3PBVMgfjMSwUQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzNjMwMDUv/MTY4NjA3Nzk4NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1494</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Scattered across the internet are jigsaw puzzle pieces containing your personal information. If reassembled by an attacker, these puzzle pieces could easily compromise your identity. Our returning guest today is Len Noe, CyberArk’s resident transhuman (a.k.a. cyborg), whose official titles these days are Technical Evangelist, White Hat Hacker and Biohacker. Noe joins host David Puner to shed light on the concept of synthetic identity, which involves gathering publicly available, unprotected data and then using AI chatbots and platforms like ChatGPT along with predictive analytics to correlate the data and generate deep digital portraits of individuals. Then, thinking like an attacker, Noe dives into how this new digital clairvoyance has the potential to up threat actors’ games and what organizations and individuals should be doing to combat it. Noe also shares his POV on the implications for cybersecurity and his concerns about sharing personal and proprietary information with AI chatbots and platforms. </p>]]>
      </itunes:summary>
      <itunes:keywords>synthetic identity, identity security, cybersecurity, multi-factor authentication, MFA, SSO, digital identity, AI, predictive analytics, data harvesting</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/f34ef3ab/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 28 - Safeguarding Data in the Cloud </title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>EP 28 - Safeguarding Data in the Cloud </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4fbb85c7-431d-4a37-a3ab-12d14da4fc68</guid>
      <link>https://share.transistor.fm/s/96c22120</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews Brad Jones, CISO and VP of Information Security at Seagate Technology. They delve into cloud security challenges, including protecting data in a constantly shifting technological landscape. Jones discusses the importance of establishing trust as a data company and implementing rigorous controls to safeguard sensitive information. Then, they take a deep dive into the evolving external threat landscape, the role of AI in security and Seagate's cloud migration journey. Tune in to learn how to bridge security gaps, set your organization up for cloud security success and stay ahead of threat actors in the digital age.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews Brad Jones, CISO and VP of Information Security at Seagate Technology. They delve into cloud security challenges, including protecting data in a constantly shifting technological landscape. Jones discusses the importance of establishing trust as a data company and implementing rigorous controls to safeguard sensitive information. Then, they take a deep dive into the evolving external threat landscape, the role of AI in security and Seagate's cloud migration journey. Tune in to learn how to bridge security gaps, set your organization up for cloud security success and stay ahead of threat actors in the digital age.</p>]]>
      </content:encoded>
      <pubDate>Wed, 24 May 2023 06:59:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/96c22120/08de7e64.mp3" length="79661607" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/p8dyuPta9HMEUpsfzgLNOJeTNuvXqaQdR3sS6VW7_0g/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMjg5NTMv/MTY4NDk1OTMwMi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1991</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews Brad Jones, CISO and VP of Information Security at Seagate Technology. They delve into cloud security challenges, including protecting data in a constantly shifting technological landscape. Jones discusses the importance of establishing trust as a data company and implementing rigorous controls to safeguard sensitive information. Then, they take a deep dive into the evolving external threat landscape, the role of AI in security and Seagate's cloud migration journey. Tune in to learn how to bridge security gaps, set your organization up for cloud security success and stay ahead of threat actors in the digital age.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, cloud security, identity security, cloud identity security, data, cloud data, CISO</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/96c22120/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 27 - How Identity Factors into DevSecOps </title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>EP 27 - How Identity Factors into DevSecOps </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4d042a3e-133a-4921-8bee-618c5ac71df1</guid>
      <link>https://share.transistor.fm/s/23050d2a</link>
      <description>
        <![CDATA[<p>In today’s Trust Issues episode, Dusty Anderson, a managing director of Global Digital Identity at the consulting firm Protiviti, digs into all things DevSecOps and cautions against a one-size-fits-all approach. In conversation with host David Puner, Anderson emphasizes the significance of strategic planning and well-defined goals – demonstrating how bite-sized steps can add up to major security wins and bottom-line benefits over time. And she sheds light on how the intricate web of identities – both human and non-human – shape the modern development pipeline to underscore the importance of visibility, governance and Zero Trust-based thinking. Tune in for insights to help fortify your cybersecurity practices and unlock the full potential of effective DevSecOps strategies.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today’s Trust Issues episode, Dusty Anderson, a managing director of Global Digital Identity at the consulting firm Protiviti, digs into all things DevSecOps and cautions against a one-size-fits-all approach. In conversation with host David Puner, Anderson emphasizes the significance of strategic planning and well-defined goals – demonstrating how bite-sized steps can add up to major security wins and bottom-line benefits over time. And she sheds light on how the intricate web of identities – both human and non-human – shape the modern development pipeline to underscore the importance of visibility, governance and Zero Trust-based thinking. Tune in for insights to help fortify your cybersecurity practices and unlock the full potential of effective DevSecOps strategies.</p>]]>
      </content:encoded>
      <pubDate>Thu, 11 May 2023 09:52:42 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/23050d2a/b39f8a4d.mp3" length="84501006" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BmL7r8fMaqktLhLBCDcHCaG7ofQ715GG4LNrfJ6ESUc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMjIxMTEv/MTY4Mzc0MDMxNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2111</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In today’s Trust Issues episode, Dusty Anderson, a managing director of Global Digital Identity at the consulting firm Protiviti, digs into all things DevSecOps and cautions against a one-size-fits-all approach. In conversation with host David Puner, Anderson emphasizes the significance of strategic planning and well-defined goals – demonstrating how bite-sized steps can add up to major security wins and bottom-line benefits over time. And she sheds light on how the intricate web of identities – both human and non-human – shape the modern development pipeline to underscore the importance of visibility, governance and Zero Trust-based thinking. Tune in for insights to help fortify your cybersecurity practices and unlock the full potential of effective DevSecOps strategies.</p>]]>
      </itunes:summary>
      <itunes:keywords>DevSecOps, DevOps, identity security, cybersecurity, IAM, identity and access management, digital identity, digital identities</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/23050d2a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 26 - Ransomware Revisited: Combating the Identity Explosion</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>EP 26 - Ransomware Revisited: Combating the Identity Explosion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e1f48684-bf70-4015-9d18-8ecd25f9bf52</guid>
      <link>https://share.transistor.fm/s/4655508b</link>
      <description>
        <![CDATA[<p>Andy Thompson, Offensive Security Research Evangelist at CyberArk Labs, returns to Trust Issues for a dive with host David Puner into the latest developments in the world of ransomware. With ransomware events on the rise, Thompson sheds light on the alarming trend of data exfiltration and double extortion. But what's causing this surge? Thompson connects the dots between the rise of digital identities and the increasing frequency of ransomware attacks. As more organizations adopt cloud and DevOps technologies, the number of digital identities has skyrocketed, providing attackers with more accounts to exploit. However, Thompson emphasizes that staying vigilant about properly configured identities and analyzing their behavior can go a long way in mitigating the risk of ransomware attacks. Tune in to stay ahead of the curve in the ever-evolving landscape of cybersecurity threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Andy Thompson, Offensive Security Research Evangelist at CyberArk Labs, returns to Trust Issues for a dive with host David Puner into the latest developments in the world of ransomware. With ransomware events on the rise, Thompson sheds light on the alarming trend of data exfiltration and double extortion. But what's causing this surge? Thompson connects the dots between the rise of digital identities and the increasing frequency of ransomware attacks. As more organizations adopt cloud and DevOps technologies, the number of digital identities has skyrocketed, providing attackers with more accounts to exploit. However, Thompson emphasizes that staying vigilant about properly configured identities and analyzing their behavior can go a long way in mitigating the risk of ransomware attacks. Tune in to stay ahead of the curve in the ever-evolving landscape of cybersecurity threats.</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Apr 2023 06:58:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/4655508b/8a607abd.mp3" length="60021898" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/7lQx1I57_fE-jvnUKr4UeBxH_Dn1m2Z3JbZUc6kHjTc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEzMDIyNDEv/MTY4MjQ1NzA4My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1500</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Andy Thompson, Offensive Security Research Evangelist at CyberArk Labs, returns to Trust Issues for a dive with host David Puner into the latest developments in the world of ransomware. With ransomware events on the rise, Thompson sheds light on the alarming trend of data exfiltration and double extortion. But what's causing this surge? Thompson connects the dots between the rise of digital identities and the increasing frequency of ransomware attacks. As more organizations adopt cloud and DevOps technologies, the number of digital identities has skyrocketed, providing attackers with more accounts to exploit. However, Thompson emphasizes that staying vigilant about properly configured identities and analyzing their behavior can go a long way in mitigating the risk of ransomware attacks. Tune in to stay ahead of the curve in the ever-evolving landscape of cybersecurity threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>ransomware, cybersecurity, identity security, digital identities, ransomware as a service, RaaS, deepfake</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4655508b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 25 - Cisco CX Cloud CISO on the Language of Risk</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>EP 25 - Cisco CX Cloud CISO on the Language of Risk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c6be2d0a-930b-414a-9899-abb5d14bdff0</guid>
      <link>https://share.transistor.fm/s/6aa71721</link>
      <description>
        <![CDATA[<p>We all accept a certain degree of risk in our lives. So, to varying degrees, we’re all operating – to use cybersecurity parlance – with an <em>assume breach mindset</em>. Meaning, we accept that attacks are inevitable and, as such, we focus time and effort on protecting the assets that matter most. </p><p> </p><p>In short, we buckle up for safety. </p><p> </p><p>And risk is something that today’s guest Larry Lidz, who’s Vice President and Chief Information Security Officer (CISO) for Cisco CX Cloud, thinks about a lot. On today’s episode, host David Puner talks with Lidz about cyber risk, the shifting tolerance levels for it and how it influences security decision-making. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We all accept a certain degree of risk in our lives. So, to varying degrees, we’re all operating – to use cybersecurity parlance – with an <em>assume breach mindset</em>. Meaning, we accept that attacks are inevitable and, as such, we focus time and effort on protecting the assets that matter most. </p><p> </p><p>In short, we buckle up for safety. </p><p> </p><p>And risk is something that today’s guest Larry Lidz, who’s Vice President and Chief Information Security Officer (CISO) for Cisco CX Cloud, thinks about a lot. On today’s episode, host David Puner talks with Lidz about cyber risk, the shifting tolerance levels for it and how it influences security decision-making. </p>]]>
      </content:encoded>
      <pubDate>Thu, 13 Apr 2023 06:58:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/6aa71721/2fb0219d.mp3" length="57047848" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/5YAdGx_Pxb4D9XsthpdzeMbtE5Ul7uJvpaIVHM_Qw98/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyODM5NzUv/MTY4MTMyNjE2OC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1425</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We all accept a certain degree of risk in our lives. So, to varying degrees, we’re all operating – to use cybersecurity parlance – with an <em>assume breach mindset</em>. Meaning, we accept that attacks are inevitable and, as such, we focus time and effort on protecting the assets that matter most. </p><p> </p><p>In short, we buckle up for safety. </p><p> </p><p>And risk is something that today’s guest Larry Lidz, who’s Vice President and Chief Information Security Officer (CISO) for Cisco CX Cloud, thinks about a lot. On today’s episode, host David Puner talks with Lidz about cyber risk, the shifting tolerance levels for it and how it influences security decision-making. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, cyber risk, risk, CISO, language of risk, cyberattack mitigation, cyber attack mitigation, attack surface, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/6aa71721/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 24 - Making the Leap to Post-Quantum Computing Encryption </title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>EP 24 - Making the Leap to Post-Quantum Computing Encryption </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4caa365b-baaf-4791-9861-b23654ab1e70</guid>
      <link>https://share.transistor.fm/s/3ac108e4</link>
      <description>
        <![CDATA[<p>Quantum computing is coming and it has the potential to be both exciting and terrifying... On today's episode of Trust Issues, host David Puner speaks with cryptographer Dr. Erez Waisbard, CyberArk’s Technology and Research Lead, about quantum computing innovation and its cybersecurity implications – from data encryption to surveillance and privacy. </p><p>Dr. Waisbard breaks down how encryption works, why it’s so important for safeguarding our data, and how quantum computers will break the methods used today. This may sound ominous, but designs for quantum-resistant encryption algorithms are already well underway. Check out the episode to learn more about them and how your organization can start preparing now. </p><p>And, if you like this episode, be sure to check out Erez Waisbard’s blog post, "<a href="https://www.cyberark.com/resources/blog/quantum-computing-is-coming-here-are-4-ways-to-get-ready-2">Quantum Computing Is Coming… Here are 4 Ways to Get Ready</a>," on the <a href="https://www.cyberark.com/resources/blog">CyberArk Blog</a>. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Quantum computing is coming and it has the potential to be both exciting and terrifying... On today's episode of Trust Issues, host David Puner speaks with cryptographer Dr. Erez Waisbard, CyberArk’s Technology and Research Lead, about quantum computing innovation and its cybersecurity implications – from data encryption to surveillance and privacy. </p><p>Dr. Waisbard breaks down how encryption works, why it’s so important for safeguarding our data, and how quantum computers will break the methods used today. This may sound ominous, but designs for quantum-resistant encryption algorithms are already well underway. Check out the episode to learn more about them and how your organization can start preparing now. </p><p>And, if you like this episode, be sure to check out Erez Waisbard’s blog post, "<a href="https://www.cyberark.com/resources/blog/quantum-computing-is-coming-here-are-4-ways-to-get-ready-2">Quantum Computing Is Coming… Here are 4 Ways to Get Ready</a>," on the <a href="https://www.cyberark.com/resources/blog">CyberArk Blog</a>. </p>]]>
      </content:encoded>
      <pubDate>Thu, 30 Mar 2023 06:59:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/3ac108e4/437363e6.mp3" length="47179826" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Fi--rYOXM-7-hHCkXvHU3GA71LH5zN6IgBhJucQfGBk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyNTEwMzIv/MTY4MDE5OTU5My1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1178</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Quantum computing is coming and it has the potential to be both exciting and terrifying... On today's episode of Trust Issues, host David Puner speaks with cryptographer Dr. Erez Waisbard, CyberArk’s Technology and Research Lead, about quantum computing innovation and its cybersecurity implications – from data encryption to surveillance and privacy. </p><p>Dr. Waisbard breaks down how encryption works, why it’s so important for safeguarding our data, and how quantum computers will break the methods used today. This may sound ominous, but designs for quantum-resistant encryption algorithms are already well underway. Check out the episode to learn more about them and how your organization can start preparing now. </p><p>And, if you like this episode, be sure to check out Erez Waisbard’s blog post, "<a href="https://www.cyberark.com/resources/blog/quantum-computing-is-coming-here-are-4-ways-to-get-ready-2">Quantum Computing Is Coming… Here are 4 Ways to Get Ready</a>," on the <a href="https://www.cyberark.com/resources/blog">CyberArk Blog</a>. </p>]]>
      </itunes:summary>
      <itunes:keywords>quantum computing, post-quantum computing encryption, encryption, cryptography, cryptographer, cybersecurity, Identity Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3ac108e4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 23 - From Delivering Mail to Delivering Zero Trust: A CSO's Cyber Journey</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>EP 23 - From Delivering Mail to Delivering Zero Trust: A CSO's Cyber Journey</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8c6c2d8a-cc57-4b7b-9e19-a3a02e5a3c59</guid>
      <link>https://share.transistor.fm/s/96139973</link>
      <description>
        <![CDATA[<p>Today's guest is Den Jones, who's Chief Security Officer (CSO) at Banyan Security, a startup Zero Trust network access solution (and a CyberArk technology partner). Jones spent almost 19 years at Adobe, followed by a stop at Cisco, before landing at Banyan in 2021. As his Twitter bio tells it, he's a “Large Scale Zero Trust Deliverer,” which is part of his multifaceted CSO charge.<br> <br>In this episode, host David Puner talks with Jones about his singular cybersecurity career path – beginning with a formative stint as a Royal Mail postman in Scotland – and how he worked his way up the ladder to become a Zero Trust-delivering CSO. Jones explains how his role at Banyan encompasses all aspects of security, including product (putting the security around the security, as it were), enterprise and physical security. He also discusses the challenges he faces in his current role, including evangelizing the company's security strategy. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today's guest is Den Jones, who's Chief Security Officer (CSO) at Banyan Security, a startup Zero Trust network access solution (and a CyberArk technology partner). Jones spent almost 19 years at Adobe, followed by a stop at Cisco, before landing at Banyan in 2021. As his Twitter bio tells it, he's a “Large Scale Zero Trust Deliverer,” which is part of his multifaceted CSO charge.<br> <br>In this episode, host David Puner talks with Jones about his singular cybersecurity career path – beginning with a formative stint as a Royal Mail postman in Scotland – and how he worked his way up the ladder to become a Zero Trust-delivering CSO. Jones explains how his role at Banyan encompasses all aspects of security, including product (putting the security around the security, as it were), enterprise and physical security. He also discusses the challenges he faces in his current role, including evangelizing the company's security strategy. </p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Mar 2023 08:03:20 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/96139973/270162e5.mp3" length="64967021" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/t07uKldzx4BwzurI25gsyEGmCRgYaRYMsxBY4c8AfRQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEyMzgzOTkv/MTY3ODkwMzE3MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1623</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today's guest is Den Jones, who's Chief Security Officer (CSO) at Banyan Security, a startup Zero Trust network access solution (and a CyberArk technology partner). Jones spent almost 19 years at Adobe, followed by a stop at Cisco, before landing at Banyan in 2021. As his Twitter bio tells it, he's a “Large Scale Zero Trust Deliverer,” which is part of his multifaceted CSO charge.<br> <br>In this episode, host David Puner talks with Jones about his singular cybersecurity career path – beginning with a formative stint as a Royal Mail postman in Scotland – and how he worked his way up the ladder to become a Zero Trust-delivering CSO. Jones explains how his role at Banyan encompasses all aspects of security, including product (putting the security around the security, as it were), enterprise and physical security. He also discusses the challenges he faces in his current role, including evangelizing the company's security strategy. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Identity Security, Zero Trust, CSO, CISO, cybersecurity strategy, security strategy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/96139973/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 22 - Deep Fakes, ChatGPT and Disinformation: Theresa Payton on Evolving Digital Threats (Part 2)</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>EP 22 - Deep Fakes, ChatGPT and Disinformation: Theresa Payton on Evolving Digital Threats (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">be4efd6a-a325-4acc-808e-81af1ac04ff7</guid>
      <link>https://share.transistor.fm/s/18359527</link>
      <description>
        <![CDATA[<p>Today's episode is part two of our conversation with former White House CIO, bestselling author and founder and CEO of Fortalice Solutions, Theresa Payton. If you missed part one, you can start here and go back to that episode. Or, you can start there and come back to this one – but you're already here, so maybe just stick around? <br> <br>In this episode, host David Puner and Payton continue their discussion, diving into the implications of AI and tools like ChatGPT for the cyber threat landscape – <em>and</em> the potential threats posed by deep fakes backed by synthetic identities. Also, could AI tech make it easier for bad actors to spread disinformation on a large scale? </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today's episode is part two of our conversation with former White House CIO, bestselling author and founder and CEO of Fortalice Solutions, Theresa Payton. If you missed part one, you can start here and go back to that episode. Or, you can start there and come back to this one – but you're already here, so maybe just stick around? <br> <br>In this episode, host David Puner and Payton continue their discussion, diving into the implications of AI and tools like ChatGPT for the cyber threat landscape – <em>and</em> the potential threats posed by deep fakes backed by synthetic identities. Also, could AI tech make it easier for bad actors to spread disinformation on a large scale? </p>]]>
      </content:encoded>
      <pubDate>Wed, 01 Mar 2023 06:58:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/18359527/b63b5bdf.mp3" length="76111130" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/TmDCuTc4Lj1Fa9DrE7TvCAIPjuwPEQ1H58VqsHnu75k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExOTg5ODAv/MTY3ODIyNTU0Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1902</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today's episode is part two of our conversation with former White House CIO, bestselling author and founder and CEO of Fortalice Solutions, Theresa Payton. If you missed part one, you can start here and go back to that episode. Or, you can start there and come back to this one – but you're already here, so maybe just stick around? <br> <br>In this episode, host David Puner and Payton continue their discussion, diving into the implications of AI and tools like ChatGPT for the cyber threat landscape – <em>and</em> the potential threats posed by deep fakes backed by synthetic identities. Also, could AI tech make it easier for bad actors to spread disinformation on a large scale? </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Identity Security, deep fakes, ChatGPT, disinformation, Theresa Payton, CIO, chief information officer, White House CIO, cyber threats</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/18359527/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 21 - Back to the Cyber Future: Theresa Payton on Evolving Digital Threats (Part 1)</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>EP 21 - Back to the Cyber Future: Theresa Payton on Evolving Digital Threats (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e621c1a-9c1a-4a46-b586-91cb378c771d</guid>
      <link>https://share.transistor.fm/s/ccbdd9ce</link>
      <description>
        <![CDATA[<p>Since the earliest digital days, cyberattackers have targeted identities in their quests for riches, chaos and even revenge. So, what if we could hop into a flux capacitor-equipped DeLorean, hammer-down to 88 mph, and go back in time to better understand how yesterday’s threats influence today’s landscape – and what history can teach us about outpacing adversaries? Today, we do that – and a whole lot more – with a fantastic guest: Theresa Payton. </p><p> </p><p>Payton is the first woman to have served as White House Chief Information Officer, a best-selling author and the founder and CEO of Fortalice Solutions. In part one of our talk, host David Puner and Payton cover a lot of ground: Payton highlights some of the major cybersecurity trends and threats during her time in the George W. Bush White House – from SQL injection attacks to emerging ransomware. She also reflects on technology’s role in expanding – and complicating – the attack surface, and offers innovative insights for defenders, drawing from her experience as a veteran cybercrime fighter. </p><p> </p><p>As you’ll hear, it’s a great talk – so good that we’re releasing it in two installments. Be sure to check out part two of our conversation with Theresa Payton, which will release on March 1. You can make sure not to miss it by following Trust Issues – available on all major podcast platforms. </p><p> </p><p><em>Great Scott! </em></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Since the earliest digital days, cyberattackers have targeted identities in their quests for riches, chaos and even revenge. So, what if we could hop into a flux capacitor-equipped DeLorean, hammer-down to 88 mph, and go back in time to better understand how yesterday’s threats influence today’s landscape – and what history can teach us about outpacing adversaries? Today, we do that – and a whole lot more – with a fantastic guest: Theresa Payton. </p><p> </p><p>Payton is the first woman to have served as White House Chief Information Officer, a best-selling author and the founder and CEO of Fortalice Solutions. In part one of our talk, host David Puner and Payton cover a lot of ground: Payton highlights some of the major cybersecurity trends and threats during her time in the George W. Bush White House – from SQL injection attacks to emerging ransomware. She also reflects on technology’s role in expanding – and complicating – the attack surface, and offers innovative insights for defenders, drawing from her experience as a veteran cybercrime fighter. </p><p> </p><p>As you’ll hear, it’s a great talk – so good that we’re releasing it in two installments. Be sure to check out part two of our conversation with Theresa Payton, which will release on March 1. You can make sure not to miss it by following Trust Issues – available on all major podcast platforms. </p><p> </p><p><em>Great Scott! </em></p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Feb 2023 06:58:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/ccbdd9ce/35696b9e.mp3" length="60834436" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/22mLjoqvjNojtP3ftJBrXPQTEpoMOpvxqnmxYa70Zhw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExOTUxOTgv/MTY3NjQ3MjExMi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1520</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Since the earliest digital days, cyberattackers have targeted identities in their quests for riches, chaos and even revenge. So, what if we could hop into a flux capacitor-equipped DeLorean, hammer-down to 88 mph, and go back in time to better understand how yesterday’s threats influence today’s landscape – and what history can teach us about outpacing adversaries? Today, we do that – and a whole lot more – with a fantastic guest: Theresa Payton. </p><p> </p><p>Payton is the first woman to have served as White House Chief Information Officer, a best-selling author and the founder and CEO of Fortalice Solutions. In part one of our talk, host David Puner and Payton cover a lot of ground: Payton highlights some of the major cybersecurity trends and threats during her time in the George W. Bush White House – from SQL injection attacks to emerging ransomware. She also reflects on technology’s role in expanding – and complicating – the attack surface, and offers innovative insights for defenders, drawing from her experience as a veteran cybercrime fighter. </p><p> </p><p>As you’ll hear, it’s a great talk – so good that we’re releasing it in two installments. Be sure to check out part two of our conversation with Theresa Payton, which will release on March 1. You can make sure not to miss it by following Trust Issues – available on all major podcast platforms. </p><p> </p><p><em>Great Scott! </em></p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Identity Security, Theresa Payton, CIO, chief information officer, White House CIO, cyber threats</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/ccbdd9ce/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 20 - Hacking ChatGPT</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>EP 20 - Hacking ChatGPT</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c1a1b4bf-5c11-4b1c-a0d8-51e2fb3b4970</guid>
      <link>https://share.transistor.fm/s/7cab31ac</link>
      <description>
        <![CDATA[<p>Even if you've been living under a super-sized rock for the last few months, you've probably heard of ChatGPT. It's an AI-powered chatbot and it's impressive. It's performing better on exams than MBA students. It can debug code and write software. It can write social media posts and emails. Users around the globe are clearly finding it compelling. And the repercussions – good and bad – have the potential to be monumental. </p><p>That's where today's guest Eran Shimony, Principal Security Researcher for CyberArk Labs, comes into the picture. In fact, in an effort to stay ahead of the bad guys, Eran recently had ChatGPT create polymorphic malware. In conversation with host David Puner, he helps us understand if we are collectively prepared to deal with ChatGPT and the implications it may have for cyber threats.  </p><p>How'd did he get ChatGPT to do this and what are the implications? Listen in to find out. </p><p>If you find this episode interesting, be sure to check out Eran's recent blog post on the CyberArk Threat Research blog: <a href="https://www.cyberark.com/chatgpt-blog">https://www.cyberark.com/chatgpt-blog  </a><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Even if you've been living under a super-sized rock for the last few months, you've probably heard of ChatGPT. It's an AI-powered chatbot and it's impressive. It's performing better on exams than MBA students. It can debug code and write software. It can write social media posts and emails. Users around the globe are clearly finding it compelling. And the repercussions – good and bad – have the potential to be monumental. </p><p>That's where today's guest Eran Shimony, Principal Security Researcher for CyberArk Labs, comes into the picture. In fact, in an effort to stay ahead of the bad guys, Eran recently had ChatGPT create polymorphic malware. In conversation with host David Puner, he helps us understand if we are collectively prepared to deal with ChatGPT and the implications it may have for cyber threats.  </p><p>How'd did he get ChatGPT to do this and what are the implications? Listen in to find out. </p><p>If you find this episode interesting, be sure to check out Eran's recent blog post on the CyberArk Threat Research blog: <a href="https://www.cyberark.com/chatgpt-blog">https://www.cyberark.com/chatgpt-blog  </a><br></p>]]>
      </content:encoded>
      <pubDate>Wed, 01 Feb 2023 06:58:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/7cab31ac/1e615dbb.mp3" length="63767132" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/MgYtCK1bVSsjtJxIOM8ugICJ0hhZQYLkVBhAnvAcnVU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExODQ5MDYv/MTY3NzA4NjAzOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1593</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Even if you've been living under a super-sized rock for the last few months, you've probably heard of ChatGPT. It's an AI-powered chatbot and it's impressive. It's performing better on exams than MBA students. It can debug code and write software. It can write social media posts and emails. Users around the globe are clearly finding it compelling. And the repercussions – good and bad – have the potential to be monumental. </p><p>That's where today's guest Eran Shimony, Principal Security Researcher for CyberArk Labs, comes into the picture. In fact, in an effort to stay ahead of the bad guys, Eran recently had ChatGPT create polymorphic malware. In conversation with host David Puner, he helps us understand if we are collectively prepared to deal with ChatGPT and the implications it may have for cyber threats.  </p><p>How'd did he get ChatGPT to do this and what are the implications? Listen in to find out. </p><p>If you find this episode interesting, be sure to check out Eran's recent blog post on the CyberArk Threat Research blog: <a href="https://www.cyberark.com/chatgpt-blog">https://www.cyberark.com/chatgpt-blog  </a><br></p>]]>
      </itunes:summary>
      <itunes:keywords>ChatGPT, artificial intelligence, AI, polymorphic malware, malware, threat research, cybersecurity, Identity Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/7cab31ac/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 19 - The Cybersecurity Gridiron </title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>EP 19 - The Cybersecurity Gridiron </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b42596ad-d0da-428d-ad9d-26de27414a8a</guid>
      <link>https://share.transistor.fm/s/9e3e225a</link>
      <description>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews Nigel Miller, Director of Security Operations and Engineering at Maximus, a company that provides process management and tech solutions to help governments improve their health and human service programs. Nigel discusses his role in keeping the company's nearly 40,000 employees cyber-trained and secure. And, as you'll hear, Nigel highlights the similarities between football and cybersecurity and that understanding one's opponent and environment is crucial to success in both. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews Nigel Miller, Director of Security Operations and Engineering at Maximus, a company that provides process management and tech solutions to help governments improve their health and human service programs. Nigel discusses his role in keeping the company's nearly 40,000 employees cyber-trained and secure. And, as you'll hear, Nigel highlights the similarities between football and cybersecurity and that understanding one's opponent and environment is crucial to success in both. </p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Jan 2023 07:01:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/9e3e225a/be5d3ad1.mp3" length="67822933" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/k9mtR5j_9plCI9_bELcIcE6BrVvbiUmj9No5BCGdyPA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNTg4MzEv/MTY3NzA4NTk4MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1695</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Trust Issues podcast, host David Puner interviews Nigel Miller, Director of Security Operations and Engineering at Maximus, a company that provides process management and tech solutions to help governments improve their health and human service programs. Nigel discusses his role in keeping the company's nearly 40,000 employees cyber-trained and secure. And, as you'll hear, Nigel highlights the similarities between football and cybersecurity and that understanding one's opponent and environment is crucial to success in both. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, Privileged Access Management, Zero Trust, Privileged Access Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9e3e225a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 18 - Why Protecting Critical Infrastructure is Critical in 2023   </title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>EP 18 - Why Protecting Critical Infrastructure is Critical in 2023   </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f851506d-9cbc-4990-a5c4-7a27718a6bfe</guid>
      <link>https://share.transistor.fm/s/4370d2a6</link>
      <description>
        <![CDATA[<p>We're starting the new year with a conversation focused on securing critical infrastructure. The issue, of course, is that we're seeing increased threats and cyberattacks on critical infrastructure. Not to mention the war in Ukraine. This collective threat is a rallying point, bringing together cyber professionals from around the world, as well as their respective countries. On today’s episode, host David Puner talks with David Higgins, who’s a Senior Director in CyberArk‘s Field Technology Office, about how the critical infrastructure landscape has changed, its global implications and how cyber protectors have had to adapt.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We're starting the new year with a conversation focused on securing critical infrastructure. The issue, of course, is that we're seeing increased threats and cyberattacks on critical infrastructure. Not to mention the war in Ukraine. This collective threat is a rallying point, bringing together cyber professionals from around the world, as well as their respective countries. On today’s episode, host David Puner talks with David Higgins, who’s a Senior Director in CyberArk‘s Field Technology Office, about how the critical infrastructure landscape has changed, its global implications and how cyber protectors have had to adapt.</p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Jan 2023 06:59:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/4370d2a6/94aa3698.mp3" length="90437254" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/-nYVt_F9OvOh60SFF7u35DFOCslHmSKYsVtZqeF9oP4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNTEzNzEv/MTY3NzA4NTk1NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2260</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We're starting the new year with a conversation focused on securing critical infrastructure. The issue, of course, is that we're seeing increased threats and cyberattacks on critical infrastructure. Not to mention the war in Ukraine. This collective threat is a rallying point, bringing together cyber professionals from around the world, as well as their respective countries. On today’s episode, host David Puner talks with David Higgins, who’s a Senior Director in CyberArk‘s Field Technology Office, about how the critical infrastructure landscape has changed, its global implications and how cyber protectors have had to adapt.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, critical infrastructure, cyberattacks, cyberterrorism</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4370d2a6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title> EP 17 - Highmark Health CISO on the Power of Storytelling</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title> EP 17 - Highmark Health CISO on the Power of Storytelling</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">aff0b942-3089-46fe-9d9c-6fe413d306f0</guid>
      <link>https://share.transistor.fm/s/9c735009</link>
      <description>
        <![CDATA[<p>Too often when we think of the human element in cybersecurity it's the insider threats. But more often it's the hardworking protectors inside the organization who, while passionate about their jobs, would rather work to live rather than live to work. Although that reality can easily flip due to the nature of the cyber world. That's where today's guest Omar Khawaja, who’s been the CISO at Highmark Health for nine years, comes into the picture. As you'll hear, Khawaja’s been on the cutting edge of cultivating talent and creating a cyber culture that empowers the human element of an organization with more than 37,000 employees. What you'll learn: How the power of language, relationships and story can be used to effectively communicate cybersecurity strategies and best practices with partners outside of the space. And how the benefits of this can lead to better culture, retention of talent and business growth.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Too often when we think of the human element in cybersecurity it's the insider threats. But more often it's the hardworking protectors inside the organization who, while passionate about their jobs, would rather work to live rather than live to work. Although that reality can easily flip due to the nature of the cyber world. That's where today's guest Omar Khawaja, who’s been the CISO at Highmark Health for nine years, comes into the picture. As you'll hear, Khawaja’s been on the cutting edge of cultivating talent and creating a cyber culture that empowers the human element of an organization with more than 37,000 employees. What you'll learn: How the power of language, relationships and story can be used to effectively communicate cybersecurity strategies and best practices with partners outside of the space. And how the benefits of this can lead to better culture, retention of talent and business growth.  </p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Dec 2022 06:58:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/9c735009/54f74b4a.mp3" length="99517336" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3rGmeTMMgRPtSod_anHhb4NBOJ4wl1oX0CwNKiqEWVY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExMzcwMTAv/MTY3NzA4NTg2NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2487</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Too often when we think of the human element in cybersecurity it's the insider threats. But more often it's the hardworking protectors inside the organization who, while passionate about their jobs, would rather work to live rather than live to work. Although that reality can easily flip due to the nature of the cyber world. That's where today's guest Omar Khawaja, who’s been the CISO at Highmark Health for nine years, comes into the picture. As you'll hear, Khawaja’s been on the cutting edge of cultivating talent and creating a cyber culture that empowers the human element of an organization with more than 37,000 employees. What you'll learn: How the power of language, relationships and story can be used to effectively communicate cybersecurity strategies and best practices with partners outside of the space. And how the benefits of this can lead to better culture, retention of talent and business growth.  </p>]]>
      </itunes:summary>
      <itunes:keywords>CISO, cybersecurity, cybersecurity strategy, cyber culture, Identity Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9c735009/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 16 - Beware of Stolen Cookies for MFA Bypass  </title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>EP 16 - Beware of Stolen Cookies for MFA Bypass  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92fde089-62d4-49ee-8ad8-fc5745fe266d</guid>
      <link>https://share.transistor.fm/s/daebcf9a</link>
      <description>
        <![CDATA[<p>Today's episode is a bit of a year-end cybersecurity fortune cookie. Its focus is an attack trend that's surged in 2022: Cookie hijacking (aka stolen cookies). Session cookies, that is. And it’s an attack trend CyberArk Labs researchers predict will continue to flourish in 2023. To dig into the stolen cookies trend and what's coming next, host David Puner talks with VP of CyberArk Red Team Shay Nahari, and Research Evangelist of CyberArk Labs, Andy Thompson, both of whom have spent a considerable amount of time popping the hood on the trend. And it's something you should be thinking about too in preparing for 2023 cybersecurity challenges.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today's episode is a bit of a year-end cybersecurity fortune cookie. Its focus is an attack trend that's surged in 2022: Cookie hijacking (aka stolen cookies). Session cookies, that is. And it’s an attack trend CyberArk Labs researchers predict will continue to flourish in 2023. To dig into the stolen cookies trend and what's coming next, host David Puner talks with VP of CyberArk Red Team Shay Nahari, and Research Evangelist of CyberArk Labs, Andy Thompson, both of whom have spent a considerable amount of time popping the hood on the trend. And it's something you should be thinking about too in preparing for 2023 cybersecurity challenges.</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Dec 2022 06:58:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/daebcf9a/22d39caf.mp3" length="83871660" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/UQwMGSDoACxHcdZpk3E1gE9VCzQswikTG59rLkQl0D8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExMTUwNjMv/MTY3NzA4NTgzMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2096</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today's episode is a bit of a year-end cybersecurity fortune cookie. Its focus is an attack trend that's surged in 2022: Cookie hijacking (aka stolen cookies). Session cookies, that is. And it’s an attack trend CyberArk Labs researchers predict will continue to flourish in 2023. To dig into the stolen cookies trend and what's coming next, host David Puner talks with VP of CyberArk Red Team Shay Nahari, and Research Evangelist of CyberArk Labs, Andy Thompson, both of whom have spent a considerable amount of time popping the hood on the trend. And it's something you should be thinking about too in preparing for 2023 cybersecurity challenges.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Identity Security, stolen cookies, cookie hijacking, MFA bypass</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/daebcf9a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 15 - Navigating a Ransomware Crisis in Latin America </title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>EP 15 - Navigating a Ransomware Crisis in Latin America </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5742f4a1-e1e4-41ba-b7b1-e924e4bda8f6</guid>
      <link>https://share.transistor.fm/s/d6b15102</link>
      <description>
        <![CDATA[<p>In the spring of 2022, Costa Rica was hit with a series of large-scale, long-lasting ransomware attacks, which wreaked havoc on the government and healthcare system – and paralyzed imports and exports. The ripple effects were far-reaching and the economy was crippled. President Rodrigo Chaves declared a national state of emergency. Trust was shaken. On today’s episode, Vinicio Chaves Alvarado, acting CISO at BAC Credomatic, the Costa Rica-based international bank, talks with host David Puner about being on the frontlines of stabilizing and building back trust. As he puts it, "We are not only cybersecurity professionals – we not only create cybersecurity controls or detect or react to threats. We create trust."</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the spring of 2022, Costa Rica was hit with a series of large-scale, long-lasting ransomware attacks, which wreaked havoc on the government and healthcare system – and paralyzed imports and exports. The ripple effects were far-reaching and the economy was crippled. President Rodrigo Chaves declared a national state of emergency. Trust was shaken. On today’s episode, Vinicio Chaves Alvarado, acting CISO at BAC Credomatic, the Costa Rica-based international bank, talks with host David Puner about being on the frontlines of stabilizing and building back trust. As he puts it, "We are not only cybersecurity professionals – we not only create cybersecurity controls or detect or react to threats. We create trust."</p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Nov 2022 06:57:00 -0500</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/d6b15102/8b1c477f.mp3" length="48014271" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BRjc3GveMkCBva5zl-iwg8jRhUUOWBW8H4RyeFxHdhU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwODM4OTMv/MTY3NzA4NTczMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1199</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the spring of 2022, Costa Rica was hit with a series of large-scale, long-lasting ransomware attacks, which wreaked havoc on the government and healthcare system – and paralyzed imports and exports. The ripple effects were far-reaching and the economy was crippled. President Rodrigo Chaves declared a national state of emergency. Trust was shaken. On today’s episode, Vinicio Chaves Alvarado, acting CISO at BAC Credomatic, the Costa Rica-based international bank, talks with host David Puner about being on the frontlines of stabilizing and building back trust. As he puts it, "We are not only cybersecurity professionals – we not only create cybersecurity controls or detect or react to threats. We create trust."</p>]]>
      </itunes:summary>
      <itunes:keywords>Costa Rica, Latin America, ransomware, cybersecurity, Identity Security, cyber attack, cyberattacks, CISO</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d6b15102/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 14 - Humanizing Cybersecurity</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>EP 14 - Humanizing Cybersecurity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3f623fe9-5754-4f06-8df5-bed916efc9e2</guid>
      <link>https://share.transistor.fm/s/b8949391</link>
      <description>
        <![CDATA[<p>Being a Chief Information Security Officer is a tough job. CISOs are on the front lines, protecting against the unknown day after day, week after week. It's no wonder mental health issues such as depression and anxiety are surging in our industry. There are a lot of things that need to change, but on a positive note, this once-taboo subject is starting to get the attention it so desperately deserves. This is in part thanks to security leaders like Kirsten Davies, CISO at Unilever, stepping forward. On today’s episode, host David Puner talks with Davies about some of her passions, including the humanization of the teams in our cybersecurity community. She's equally passionate about being an innovative cyber protector and finding solutions to the multitude of challenges high-level CISOs face on a daily basis. The timing of the episode is apropos because October is both Cybersecurity Awareness Month and Depression and Mental Health Awareness and Screening Month. Time to elevate this critical conversation, advocate against stigma, and bring awareness to the various resources available to those who need them.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Being a Chief Information Security Officer is a tough job. CISOs are on the front lines, protecting against the unknown day after day, week after week. It's no wonder mental health issues such as depression and anxiety are surging in our industry. There are a lot of things that need to change, but on a positive note, this once-taboo subject is starting to get the attention it so desperately deserves. This is in part thanks to security leaders like Kirsten Davies, CISO at Unilever, stepping forward. On today’s episode, host David Puner talks with Davies about some of her passions, including the humanization of the teams in our cybersecurity community. She's equally passionate about being an innovative cyber protector and finding solutions to the multitude of challenges high-level CISOs face on a daily basis. The timing of the episode is apropos because October is both Cybersecurity Awareness Month and Depression and Mental Health Awareness and Screening Month. Time to elevate this critical conversation, advocate against stigma, and bring awareness to the various resources available to those who need them.</p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Oct 2022 06:58:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/b8949391/a4f78582.mp3" length="83082153" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/3B1_-b7DQE7T114y3Oy-onqu4Q0z0nG5GD0Qaa-EL0Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwNjc5OTkv/MTY3NzA4NTcwNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2076</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Being a Chief Information Security Officer is a tough job. CISOs are on the front lines, protecting against the unknown day after day, week after week. It's no wonder mental health issues such as depression and anxiety are surging in our industry. There are a lot of things that need to change, but on a positive note, this once-taboo subject is starting to get the attention it so desperately deserves. This is in part thanks to security leaders like Kirsten Davies, CISO at Unilever, stepping forward. On today’s episode, host David Puner talks with Davies about some of her passions, including the humanization of the teams in our cybersecurity community. She's equally passionate about being an innovative cyber protector and finding solutions to the multitude of challenges high-level CISOs face on a daily basis. The timing of the episode is apropos because October is both Cybersecurity Awareness Month and Depression and Mental Health Awareness and Screening Month. Time to elevate this critical conversation, advocate against stigma, and bring awareness to the various resources available to those who need them.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, CISO, mental health, Identity Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/b8949391/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 13 - Cyber Fundamentals: Where Things Fall Apart</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>EP 13 - Cyber Fundamentals: Where Things Fall Apart</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f0c1486c-48ec-4c69-92c1-2fcf5a3e0c8a</guid>
      <link>https://share.transistor.fm/s/40681cb4</link>
      <description>
        <![CDATA[<p>Even when looking at layered enterprise solutions designed to thwart attacks and contain them, we must always go back to cybersecurity basics at the individual level. And that’s what, on today's episode, guest Bryan Murphy, CyberArk’s Senior Director of Architecture Services and Incident Response stops by to talk with host David Puner about. Murphy also dives into the importance of cyber hygiene as an essential preventive measure for protecting identities, as part of a defense-in-depth strategy. It’s a perfect fit for October, which happens to be Cybersecurity Awareness Month (CSAM). Raise your awareness and give it a listen!   </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Even when looking at layered enterprise solutions designed to thwart attacks and contain them, we must always go back to cybersecurity basics at the individual level. And that’s what, on today's episode, guest Bryan Murphy, CyberArk’s Senior Director of Architecture Services and Incident Response stops by to talk with host David Puner about. Murphy also dives into the importance of cyber hygiene as an essential preventive measure for protecting identities, as part of a defense-in-depth strategy. It’s a perfect fit for October, which happens to be Cybersecurity Awareness Month (CSAM). Raise your awareness and give it a listen!   </p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Oct 2022 06:59:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/40681cb4/5585740b.mp3" length="76266253" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Ie_EGLyttmqXihdo9ytxaXe0VqJ-ED5KRze3W-0h_dM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwNTA2MDUv/MTY3NzA4NTY2NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1906</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Even when looking at layered enterprise solutions designed to thwart attacks and contain them, we must always go back to cybersecurity basics at the individual level. And that’s what, on today's episode, guest Bryan Murphy, CyberArk’s Senior Director of Architecture Services and Incident Response stops by to talk with host David Puner about. Murphy also dives into the importance of cyber hygiene as an essential preventive measure for protecting identities, as part of a defense-in-depth strategy. It’s a perfect fit for October, which happens to be Cybersecurity Awareness Month (CSAM). Raise your awareness and give it a listen!   </p>]]>
      </itunes:summary>
      <itunes:keywords>cyber hygiene, defense-in-depth, cybersecurity, Identity Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/40681cb4/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 12 - K-12 Schools in Ransomware Crosshairs w/ Matt Kenslea, Director of State, Local and Education at CyberArk  </title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>EP 12 - K-12 Schools in Ransomware Crosshairs w/ Matt Kenslea, Director of State, Local and Education at CyberArk  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7b981e52-5451-4d6a-bfdb-90763c63ab34</guid>
      <link>https://share.transistor.fm/s/14b2e05a</link>
      <description>
        <![CDATA[<p>U.S. government agencies are warning that ransomware actors are "disproportionately targeting the education sector," especially K-12. That’s because sensitive student data, overworked staff and competing priorities make investing in cybersecurity talent and tools a major challenge. On today's episode, host David Puner checks in with Matt Kenslea, CyberArk's Director of State, Local and Education (SLED), for a discussion about these targeted cyberattacks, the challenges they pose – and what schools can do.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>U.S. government agencies are warning that ransomware actors are "disproportionately targeting the education sector," especially K-12. That’s because sensitive student data, overworked staff and competing priorities make investing in cybersecurity talent and tools a major challenge. On today's episode, host David Puner checks in with Matt Kenslea, CyberArk's Director of State, Local and Education (SLED), for a discussion about these targeted cyberattacks, the challenges they pose – and what schools can do.</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Sep 2022 06:59:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/14b2e05a/625c4dc4.mp3" length="57980210" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/4ysZ0eNqZx9_p7vE6EW85zjZzyH0k09wNbf7UeMG2WI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMzE3ODUv/MTY3NzA4NTU1NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1448</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>U.S. government agencies are warning that ransomware actors are "disproportionately targeting the education sector," especially K-12. That’s because sensitive student data, overworked staff and competing priorities make investing in cybersecurity talent and tools a major challenge. On today's episode, host David Puner checks in with Matt Kenslea, CyberArk's Director of State, Local and Education (SLED), for a discussion about these targeted cyberattacks, the challenges they pose – and what schools can do.</p>]]>
      </itunes:summary>
      <itunes:keywords>K-12, schools, ransomware, cybersecurity, identity security, SLED</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/14b2e05a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 11 - Step Away From the QR Code and Listen to This w/ Len Noe, Technical Evangelist &amp; White Hat Hacker at CyberArk </title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>EP 11 - Step Away From the QR Code and Listen to This w/ Len Noe, Technical Evangelist &amp; White Hat Hacker at CyberArk </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a65f5d56-1fb7-41dd-8b05-41c5de7ed35e</guid>
      <link>https://share.transistor.fm/s/1e561ca0</link>
      <description>
        <![CDATA[<p>Len Noe – our favorite cyborg and CyberArk resident technical evangelist and white hat hacker – is back! On today’s episode, he’s talking with host David Puner about risky QR codes. On first blush it may seem like a simple subject, but attackers are having a field day with them and there seems to be a general lack of awareness about it. Help stop the havoc-wreaking and find out what you can do to protect yourself.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Len Noe – our favorite cyborg and CyberArk resident technical evangelist and white hat hacker – is back! On today’s episode, he’s talking with host David Puner about risky QR codes. On first blush it may seem like a simple subject, but attackers are having a field day with them and there seems to be a general lack of awareness about it. Help stop the havoc-wreaking and find out what you can do to protect yourself.</p>]]>
      </content:encoded>
      <pubDate>Tue, 13 Sep 2022 06:59:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/1e561ca0/a09116f3.mp3" length="78798666" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/sS5yqFzYMGBvYHp73Kt-uuBUFudScNEXq7p7rruid3I/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMTcyNTIv/MTY3NzA4NTQ3MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1969</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Len Noe – our favorite cyborg and CyberArk resident technical evangelist and white hat hacker – is back! On today’s episode, he’s talking with host David Puner about risky QR codes. On first blush it may seem like a simple subject, but attackers are having a field day with them and there seems to be a general lack of awareness about it. Help stop the havoc-wreaking and find out what you can do to protect yourself.</p>]]>
      </itunes:summary>
      <itunes:keywords>qr codes, cybersecurity, cyberattacks, cyber attacks, identity security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/1e561ca0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 10 - Skating to Where the Cyber Puck’s Going, Not Where it’s Been w/ Clarence Hinton, CyberArk Chief Strategy Officer, Head of Corporate Development</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>EP 10 - Skating to Where the Cyber Puck’s Going, Not Where it’s Been w/ Clarence Hinton, CyberArk Chief Strategy Officer, Head of Corporate Development</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cb925d0c-5631-4466-99fa-588daddac0e8</guid>
      <link>https://share.transistor.fm/s/c08b6cde</link>
      <description>
        <![CDATA[<p>Sports, at their highest levels, are shaped by lifetimes dedicated to practicing, strategizing and anticipating. The same goes for cybersecurity. Although, in our world, it's not a game and there are no set parameters. On today’s episode, host David Puner speaks with Clarence Hinton, CyberArk Chief Strategy Officer, Head of Corporate Development about looking into the future and preparing for the unknown. Like hockey, it’s about skating to where the puck’s going – not where it’s been. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Sports, at their highest levels, are shaped by lifetimes dedicated to practicing, strategizing and anticipating. The same goes for cybersecurity. Although, in our world, it's not a game and there are no set parameters. On today’s episode, host David Puner speaks with Clarence Hinton, CyberArk Chief Strategy Officer, Head of Corporate Development about looking into the future and preparing for the unknown. Like hockey, it’s about skating to where the puck’s going – not where it’s been. </p>]]>
      </content:encoded>
      <pubDate>Tue, 30 Aug 2022 06:58:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/c08b6cde/2214f354.mp3" length="74191472" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jLo3-ua2nxVYFY3Wv0CSEGAKdwVDb4p4778QgABItr8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzEwMDM1ODQv/MTY3NzA4NTQzMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1853</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Sports, at their highest levels, are shaped by lifetimes dedicated to practicing, strategizing and anticipating. The same goes for cybersecurity. Although, in our world, it's not a game and there are no set parameters. On today’s episode, host David Puner speaks with Clarence Hinton, CyberArk Chief Strategy Officer, Head of Corporate Development about looking into the future and preparing for the unknown. Like hockey, it’s about skating to where the puck’s going – not where it’s been. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, Privileged Access Management, Zero Trust, Privileged Access Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/c08b6cde/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 9 - Living and Breathing Telecom Trust w/ Thomas Tschersich, CSO of Deutsche Telekom and CTO of Telekom Security </title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>EP 9 - Living and Breathing Telecom Trust w/ Thomas Tschersich, CSO of Deutsche Telekom and CTO of Telekom Security </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">779db557-7d5c-443b-a89d-a17add20d95f</guid>
      <link>https://share.transistor.fm/s/425b733a</link>
      <description>
        <![CDATA[<p>If you're in the business of collecting consumer data these days, you better be in the business of protecting that data. Or you could find yourself with no business. On today's episode, host David Puner talks with Thomas Tschersich, Chief Security Officer of Deutsche Telekom (parent company of T-Mobile) and Chief Technical Officer of Telekom Security, about the new rules of data privacy and protection and how telecommunication providers must live and breathe trust as they operate critical infrastructure. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>If you're in the business of collecting consumer data these days, you better be in the business of protecting that data. Or you could find yourself with no business. On today's episode, host David Puner talks with Thomas Tschersich, Chief Security Officer of Deutsche Telekom (parent company of T-Mobile) and Chief Technical Officer of Telekom Security, about the new rules of data privacy and protection and how telecommunication providers must live and breathe trust as they operate critical infrastructure. </p>]]>
      </content:encoded>
      <pubDate>Tue, 16 Aug 2022 06:51:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/425b733a/abb3c0d3.mp3" length="81582750" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KP4bKN4WHZ7b43sy7p7LjJ7mdk3y7W25BlC4Eqjn76k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk3NjU5NS8x/Njc3MDg1NDA1LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>2038</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>If you're in the business of collecting consumer data these days, you better be in the business of protecting that data. Or you could find yourself with no business. On today's episode, host David Puner talks with Thomas Tschersich, Chief Security Officer of Deutsche Telekom (parent company of T-Mobile) and Chief Technical Officer of Telekom Security, about the new rules of data privacy and protection and how telecommunication providers must live and breathe trust as they operate critical infrastructure. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, Privileged Access Management, Zero Trust, Privileged Access Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/425b733a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Ep 8 - Seeing the Big Picture with Identity Security w/ Udi Mokady, Founder, Chairman and CEO of CyberArk</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Ep 8 - Seeing the Big Picture with Identity Security w/ Udi Mokady, Founder, Chairman and CEO of CyberArk</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e315d9df-789d-4942-9dc3-187807f94cf1</guid>
      <link>https://share.transistor.fm/s/e3bd29ac</link>
      <description>
        <![CDATA[<p>For every me or you, there are now 45 machine identities. That's 45 machine identities for every single human identity, according to the CyberArk 2022 Identity Security Threat Landscape Report. And 68% of those machine identities have some level of sensitive access. Attackers know this, and are doing their best to take advantage of those odds. Host David Puner sits down with Udi Mokady, Founder, Chairman and CEO of CyberArk, shortly after the wrap of the company’s Impact 2022 conference, for a talk about Identity Security – where CyberArk has been, where it's going – and a little about guitar playing too.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>For every me or you, there are now 45 machine identities. That's 45 machine identities for every single human identity, according to the CyberArk 2022 Identity Security Threat Landscape Report. And 68% of those machine identities have some level of sensitive access. Attackers know this, and are doing their best to take advantage of those odds. Host David Puner sits down with Udi Mokady, Founder, Chairman and CEO of CyberArk, shortly after the wrap of the company’s Impact 2022 conference, for a talk about Identity Security – where CyberArk has been, where it's going – and a little about guitar playing too.  </p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Aug 2022 07:05:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/e3bd29ac/cac53ecc.mp3" length="78067125" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/PISl48tlA3HsI6SRTHM8csKx2SyvlDApYXUJ8RVevQE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk1ODY1My8x/Njc3MDg1Mzc3LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1950</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>For every me or you, there are now 45 machine identities. That's 45 machine identities for every single human identity, according to the CyberArk 2022 Identity Security Threat Landscape Report. And 68% of those machine identities have some level of sensitive access. Attackers know this, and are doing their best to take advantage of those odds. Host David Puner sits down with Udi Mokady, Founder, Chairman and CEO of CyberArk, shortly after the wrap of the company’s Impact 2022 conference, for a talk about Identity Security – where CyberArk has been, where it's going – and a little about guitar playing too.  </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, Privileged Access Management, Zero Trust, Privileged Access Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e3bd29ac/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Ep 7 - Cyber Attack Cycle Deconstruction w/ Lavi Lazarovitz, Head of Security Research at CyberArk Labs</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Ep 7 - Cyber Attack Cycle Deconstruction w/ Lavi Lazarovitz, Head of Security Research at CyberArk Labs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">50a1a62b-bb69-4979-8d74-efe6e1028e06</guid>
      <link>https://share.transistor.fm/s/9eb60d8b</link>
      <description>
        <![CDATA[<p>How do we stand a chance against emerging cyber threats? It's because, in large part, there are researchers at the cutting edge – dedicated to the pursuit and understanding of novel threats and vulnerabilities – by thinking just like attackers. That's the world in which Lavi Lazarovitz, CyberArk Labs’ Head of Security Research, lives and thrives. Lazarovitz leads an elite group of white hat hackers, intelligence experts and cybersecurity practitioners. Host David Puner talks with Lazarovitz about deconstructing the attack cycle and various ways to better understand how threat actors operate – in the ongoing effort to stay ahead of them.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do we stand a chance against emerging cyber threats? It's because, in large part, there are researchers at the cutting edge – dedicated to the pursuit and understanding of novel threats and vulnerabilities – by thinking just like attackers. That's the world in which Lavi Lazarovitz, CyberArk Labs’ Head of Security Research, lives and thrives. Lazarovitz leads an elite group of white hat hackers, intelligence experts and cybersecurity practitioners. Host David Puner talks with Lazarovitz about deconstructing the attack cycle and various ways to better understand how threat actors operate – in the ongoing effort to stay ahead of them.</p>]]>
      </content:encoded>
      <pubDate>Tue, 19 Jul 2022 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/9eb60d8b/19d692a9.mp3" length="46357056" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/8-a4gmjXah_VJl65tyUDovORmLrhDUfWntUm0bkq8Ek/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzk0NDc0Ni8x/Njc3MDg1MzQ5LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1157</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do we stand a chance against emerging cyber threats? It's because, in large part, there are researchers at the cutting edge – dedicated to the pursuit and understanding of novel threats and vulnerabilities – by thinking just like attackers. That's the world in which Lavi Lazarovitz, CyberArk Labs’ Head of Security Research, lives and thrives. Lazarovitz leads an elite group of white hat hackers, intelligence experts and cybersecurity practitioners. Host David Puner talks with Lazarovitz about deconstructing the attack cycle and various ways to better understand how threat actors operate – in the ongoing effort to stay ahead of them.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, cyber attack, cyber threat, cyber research, Identity Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/9eb60d8b/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 6 - Protecting Critical Infrastructure w/ Carla Donev, VP &amp; CISO at NiSource </title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>EP 6 - Protecting Critical Infrastructure w/ Carla Donev, VP &amp; CISO at NiSource </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c1d0545c-a8ce-44ed-8ad9-80182ce1d162</guid>
      <link>https://share.transistor.fm/s/3f2d73d6</link>
      <description>
        <![CDATA[<p>Securing critical infrastructure that powers our way of life can be a sleepless job. But sometimes that's the cost of being a protector... Today's guest, Carla Donev, is no stranger to working round-the-clock. As Vice President and Chief Information Security Officer at NiSource, she leads security operations for one of the largest utilities in the country, which delivers gas and electricity to millions of citizens across six states. Host David Puner talks with Donev about the evolving threat landscape and how building safer, more resilient operations is key to preserving trust. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Securing critical infrastructure that powers our way of life can be a sleepless job. But sometimes that's the cost of being a protector... Today's guest, Carla Donev, is no stranger to working round-the-clock. As Vice President and Chief Information Security Officer at NiSource, she leads security operations for one of the largest utilities in the country, which delivers gas and electricity to millions of citizens across six states. Host David Puner talks with Donev about the evolving threat landscape and how building safer, more resilient operations is key to preserving trust. </p>]]>
      </content:encoded>
      <pubDate>Tue, 05 Jul 2022 07:00:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/3f2d73d6/ad6c6da1.mp3" length="82753935" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KFEEllMJQgw2h2NrLb9KHuSZL7drBhVVwqt59FbWyE4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkzMTMyOC8x/Njc3MDg1MzE3LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>2067</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Securing critical infrastructure that powers our way of life can be a sleepless job. But sometimes that's the cost of being a protector... Today's guest, Carla Donev, is no stranger to working round-the-clock. As Vice President and Chief Information Security Officer at NiSource, she leads security operations for one of the largest utilities in the country, which delivers gas and electricity to millions of citizens across six states. Host David Puner talks with Donev about the evolving threat landscape and how building safer, more resilient operations is key to preserving trust. </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, critical infrastructure, CISO, identity security, threat landscape</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/3f2d73d6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 5 - Preparing for the Cyber Unknown w/ Shay Nahari, CyberArk VP of Red Team Services</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>EP 5 - Preparing for the Cyber Unknown w/ Shay Nahari, CyberArk VP of Red Team Services</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eec93b22-b85f-464f-a855-a178c40041d3</guid>
      <link>https://share.transistor.fm/s/5491fa8f</link>
      <description>
        <![CDATA[<p>You may have heard the famous Mike Tyson quote, “Everybody has a plan until they get punched in the face.” Applied to the context of cybersecurity, the message is – when things get real, what will you do? How will you react? You can attempt to prepare for seemingly every scenario under the sun, but you still can’t know when or how or where you'll actually get punched.  <br> <br>So how do you prepare for the unknown – for that metaphorical Iron Mike punch to the face? And what do you do when it happens? That's what host David Puner gets into with today's guest Shay Nahari, CyberArk’s VP of Red Team Services.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>You may have heard the famous Mike Tyson quote, “Everybody has a plan until they get punched in the face.” Applied to the context of cybersecurity, the message is – when things get real, what will you do? How will you react? You can attempt to prepare for seemingly every scenario under the sun, but you still can’t know when or how or where you'll actually get punched.  <br> <br>So how do you prepare for the unknown – for that metaphorical Iron Mike punch to the face? And what do you do when it happens? That's what host David Puner gets into with today's guest Shay Nahari, CyberArk’s VP of Red Team Services.</p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Jun 2022 06:48:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/5491fa8f/d0d8e064.mp3" length="65062024" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/vUdrT8iOLLYpsF7z0dknYLd--d9vpgRdVzYavPQIosU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkxNDE5MC8x/Njc3MDg1MjgxLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1625</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>You may have heard the famous Mike Tyson quote, “Everybody has a plan until they get punched in the face.” Applied to the context of cybersecurity, the message is – when things get real, what will you do? How will you react? You can attempt to prepare for seemingly every scenario under the sun, but you still can’t know when or how or where you'll actually get punched.  <br> <br>So how do you prepare for the unknown – for that metaphorical Iron Mike punch to the face? And what do you do when it happens? That's what host David Puner gets into with today's guest Shay Nahari, CyberArk’s VP of Red Team Services.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, identity security, red team, cyber attack preparedness, adversary simulation, white hacking, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/5491fa8f/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 4 - How Diversity Can Help Combat Cyber Attacker Innovation w/ Royal Bank of Canada’s Melissa Carvalho</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>EP 4 - How Diversity Can Help Combat Cyber Attacker Innovation w/ Royal Bank of Canada’s Melissa Carvalho</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4d7fcd90-e83c-4a0e-bffd-a006aaf9684a</guid>
      <link>https://share.transistor.fm/s/2be1f88a</link>
      <description>
        <![CDATA[<p>Fighting attacker innovation requires a level of innovation that can only be achieved through a collaborative approach. One that brings diverse backgrounds, perspectives and solutions together to strengthen cyber resilience from every angle. Melissa Carvalho, Vice President of Identity and Access Management at Royal Bank of Canada, speaks with host David Puner on the importance of diversity and inclusion in cybersecurity and how it has factored into the evolution of her role.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Fighting attacker innovation requires a level of innovation that can only be achieved through a collaborative approach. One that brings diverse backgrounds, perspectives and solutions together to strengthen cyber resilience from every angle. Melissa Carvalho, Vice President of Identity and Access Management at Royal Bank of Canada, speaks with host David Puner on the importance of diversity and inclusion in cybersecurity and how it has factored into the evolution of her role.  </p>]]>
      </content:encoded>
      <pubDate>Tue, 07 Jun 2022 06:47:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/2be1f88a/ce5e9c3b.mp3" length="64058282" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/LRhklesmVR19ijKvwmKDMBN0JsT5O5T-d_Xtqaal76w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzkwMTQ1NS8x/Njc3MDg1MjQ3LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1599</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Fighting attacker innovation requires a level of innovation that can only be achieved through a collaborative approach. One that brings diverse backgrounds, perspectives and solutions together to strengthen cyber resilience from every angle. Melissa Carvalho, Vice President of Identity and Access Management at Royal Bank of Canada, speaks with host David Puner on the importance of diversity and inclusion in cybersecurity and how it has factored into the evolution of her role.  </p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, Identity and Access Management, diversity and inclusion, </itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/2be1f88a/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 3 - Why Technology is Key to Restoring Trust in Healthcare w/ Takeda Pharmaceuticals' Mike Towers</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>EP 3 - Why Technology is Key to Restoring Trust in Healthcare w/ Takeda Pharmaceuticals' Mike Towers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">09549263-ebbd-4e1c-b6a3-644a33b9e97d</guid>
      <link>https://share.transistor.fm/s/0de25332</link>
      <description>
        <![CDATA[<p>While COVID-19 strained the healthcare system in every possible way, it also sparked a revolution. By emphasizing trust’s central role in every interaction – between patients and clinicians and across interconnected IT ecosystems – the pandemic brought clarity and opportunity to rebuild. Mike Towers, Chief Digital Trust Officer at Takeda Pharmaceuticals, speaks with host David Puner on technology’s growing role in building transparent, equitable healthcare systems and driving better outcomes for all.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>While COVID-19 strained the healthcare system in every possible way, it also sparked a revolution. By emphasizing trust’s central role in every interaction – between patients and clinicians and across interconnected IT ecosystems – the pandemic brought clarity and opportunity to rebuild. Mike Towers, Chief Digital Trust Officer at Takeda Pharmaceuticals, speaks with host David Puner on technology’s growing role in building transparent, equitable healthcare systems and driving better outcomes for all.</p>]]>
      </content:encoded>
      <pubDate>Tue, 24 May 2022 06:49:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/0de25332/37ea51ad.mp3" length="71709179" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/xt4PxnBrdCg0ZVLPubW0EuGnuoKHGeB9ee_ThL1OWLc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg4NzMzOC8x/Njc3MDg1MjEyLWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1792</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>While COVID-19 strained the healthcare system in every possible way, it also sparked a revolution. By emphasizing trust’s central role in every interaction – between patients and clinicians and across interconnected IT ecosystems – the pandemic brought clarity and opportunity to rebuild. Mike Towers, Chief Digital Trust Officer at Takeda Pharmaceuticals, speaks with host David Puner on technology’s growing role in building transparent, equitable healthcare systems and driving better outcomes for all.</p>]]>
      </itunes:summary>
      <itunes:keywords>digital trust officer, cybersecurity, healthcare, technology</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/0de25332/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 2 - Transhumanism: Charting the Cybersecurity Frontier w/ Len Noe</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>EP 2 - Transhumanism: Charting the Cybersecurity Frontier w/ Len Noe</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f94389fe-ab8f-4e3f-9f17-8fa9ee227758</guid>
      <link>https://share.transistor.fm/s/e9437ec7</link>
      <description>
        <![CDATA[<p>In our cyber world identities are typically split into two distinct categories: human and machine. But there's one notable intersection: cyborg. On today's episode, host David Puner talks with Len Noe, technical evangelist, white hat hacker – and CyberArk's resident transhuman.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In our cyber world identities are typically split into two distinct categories: human and machine. But there's one notable intersection: cyborg. On today's episode, host David Puner talks with Len Noe, technical evangelist, white hat hacker – and CyberArk's resident transhuman.</p>]]>
      </content:encoded>
      <pubDate>Tue, 10 May 2022 03:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/e9437ec7/2ecc50f1.mp3" length="69107163" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/jGvi0KSUZOGF1KodD-ajTQFVvSbn4ULs67sFOWrOVSE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg3NDI2NC8x/Njc3MDg1MTc4LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1726</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In our cyber world identities are typically split into two distinct categories: human and machine. But there's one notable intersection: cyborg. On today's episode, host David Puner talks with Len Noe, technical evangelist, white hat hacker – and CyberArk's resident transhuman.</p>]]>
      </itunes:summary>
      <itunes:keywords>cybersecurity, transhuman, cyborg, biohacker, white hat hacker, identity security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e9437ec7/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>EP 1 - Talking Ransomware w/ Andy Thompson </title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>EP 1 - Talking Ransomware w/ Andy Thompson </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1def1077-5510-4152-98c1-145d19de9f0a</guid>
      <link>https://share.transistor.fm/s/4bb41c58</link>
      <description>
        <![CDATA[<p>Today, thanks to cheap plug-and-play ransomware kits, anyone with a credit card can get into the cyber extortion action. No special training or skills required. So, what can we do? In the premiere episode of the Trust Issues™ podcast, David Puner talks about this and more with Andy Thompson, advisor &amp; evangelist at CyberArk Labs.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today, thanks to cheap plug-and-play ransomware kits, anyone with a credit card can get into the cyber extortion action. No special training or skills required. So, what can we do? In the premiere episode of the Trust Issues™ podcast, David Puner talks about this and more with Andy Thompson, advisor &amp; evangelist at CyberArk Labs.</p>]]>
      </content:encoded>
      <pubDate>Tue, 26 Apr 2022 00:01:00 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/4bb41c58/46f87bff.mp3" length="62304585" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DpmTp89q5yhJlc6AOY11ADkC9KXy4TbpWw4VTZbTAlQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg2ODc0NC8x/Njc3MDg1MTI4LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>1556</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Today, thanks to cheap plug-and-play ransomware kits, anyone with a credit card can get into the cyber extortion action. No special training or skills required. So, what can we do? In the premiere episode of the Trust Issues™ podcast, David Puner talks about this and more with Andy Thompson, advisor &amp; evangelist at CyberArk Labs.</p>]]>
      </itunes:summary>
      <itunes:keywords>ransomware, cybersecurity, assume breach, least privilege</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4bb41c58/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Trust Issues Trailer </title>
      <itunes:title>Trust Issues Trailer </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <guid isPermaLink="false">7835bbb4-4b7f-4b2c-a182-fc96f355316e</guid>
      <link>https://www.cyberark.com/podcasts/trust-issues-trailer/</link>
      <description>
        <![CDATA[Trailer for CyberArk's Trust Issues™ podcast. Debuting spring 2022. ]]>
      </description>
      <content:encoded>
        <![CDATA[Trailer for CyberArk's Trust Issues™ podcast. Debuting spring 2022. ]]>
      </content:encoded>
      <pubDate>Wed, 13 Apr 2022 16:52:57 -0400</pubDate>
      <author>CyberArk</author>
      <enclosure url="https://pdrl.fm/35001c/media.transistor.fm/22e0fc4e/9a74dfa8.mp3" length="3229361" type="audio/mpeg"/>
      <itunes:author>CyberArk</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/B6f_gA71XrCicRpnzuUZPoWcv9Jnr5fB51o9npJ1QC4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzg2MzE2NS8x/NjQ5ODgzMTc3LWFy/dHdvcmsuanBn.jpg"/>
      <itunes:duration>80</itunes:duration>
      <itunes:summary>Trailer for CyberArk's Trust Issues™ podcast. Debuting spring 2022. </itunes:summary>
      <itunes:subtitle>Trailer for CyberArk's Trust Issues™ podcast. Debuting spring 2022. </itunes:subtitle>
      <itunes:keywords>cybersecurity, identity security, Privileged Access Management, Zero Trust, Privileged Access Security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
