<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Lock it Down Podcast</title>
    <link>https://www.securitymagazine.com/media/podcasts/2594-lock-it-down-podcast.rss</link>
    <atom:link href="https://www.securitymagazine.com/media/podcasts/2594-lock-it-down-podcast.rss" rel="self" type="application/rss+xml"/>
    <language>en-us</language>
    <copyright>© 2026 Security Magazine</copyright>
    <itunes:owner>
      <itunes:email>webadmin@bnpmedia.com</itunes:email>
    </itunes:owner>
    <itunes:author>www.securitymagazine.com</itunes:author>
    <itunes:summary>
    </itunes:summary>
    <itunes:image href=""/>
    <itunes:new-feed-url>https://www.securitymagazine.com/media/podcasts/2594-lock-it-down-podcast.rss</itunes:new-feed-url>
    <description>
      <![CDATA[]]>
    </description>
    <item>
      <guid>www.securitymagazine.com:196</guid>
      <title>Strategies for Security Leaders in the Midst of Skill Shortages</title>
      <itunes:summary>
In this episode of Lock It Down with Security Magazine, Chief Security &amp; Trust Officer Kory Daniels shares how security leaders struggling with skill shortages can make strategic tradeoffs to lessen their team's burden.      </itunes:summary>
      <description>
        <![CDATA[In this episode of Lock It Down with Security Magazine, Chief Security &amp; Trust Officer Kory Daniels shares how security leaders struggling with skill shortages can make strategic tradeoffs to lessen their team's burden.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2026/DanielsPodcastHeader.webp?t=1771857567"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2026/SEC-0226-Kory-Daniels-Podcast-FINAL.mp3" type="audio/x-mp3" length="18979232"/>
      <pubDate>Mon, 23 Feb 2026 09:34:29 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2026/SEC-0226-Kory-Daniels-Podcast-FINAL.mp3</link>
      <itunes:duration>13:10</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:195</guid>
      <title>Why Your Security Team Needs to Hire Non-Traditional Professionals</title>
      <itunes:summary>
Aaron Walton talks about the value non-traditional professionals bring to the cybersecurity space, and why security leaders should consider workers with unconventional backgrounds when hiring.      </itunes:summary>
      <description>
        <![CDATA[Aaron Walton talks about the value non-traditional professionals bring to the cybersecurity space, and why security leaders should consider workers with unconventional backgrounds when hiring.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2026/WaltonPodcast.webp?t=1769091353"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2026/SEC-0126-Aaron-Walton-FINAL.mp3" type="audio/x-mp3" length="18829472"/>
      <pubDate>Thu, 22 Jan 2026 09:14:06 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2026/SEC-0126-Aaron-Walton-FINAL.mp3</link>
      <itunes:duration>13:04</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:194</guid>
      <title>Key Signs of Mental Health Struggles in Security</title>
      <itunes:summary>
In this episode of Lock It Down with Security Magazine, I sit down with John Rodriguez to discuss the relationship between security work and mental health. Rodriguez is the Founder of Empathic Security Cultures LLC, an organization guiding security leaders to combine existing security and business practices with positive human connection.      </itunes:summary>
      <description>
        <![CDATA[In this episode of Lock It Down with Security Magazine, I sit down with John Rodriguez to discuss the relationship between security work and mental health. Rodriguez is the Founder of Empathic Security Cultures LLC, an organization guiding security leaders to combine existing security and business practices with positive human connection.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2025/Rodriguez-podcast.webp?t=1765979480"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-John-Rodriguez-Podcast-V1.mp3" type="audio/x-mp3" length="29385248"/>
      <pubDate>Mon, 15 Dec 2025 12:52:57 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-John-Rodriguez-Podcast-V1.mp3</link>
      <itunes:duration>20:24</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:193</guid>
      <title>The CSO’s Evolution, From the Perspective of a CSO</title>
      <itunes:summary>
In this episode of Lock It Down with Security Magazine, Managing Editor Jordyn Alger speaks with Bill O’Connell, Chief Security Officer (CSO) of Commvault, about his experiences with the evolution of the CSO role.      </itunes:summary>
      <description>
        <![CDATA[In this episode of Lock It Down with Security Magazine, Managing Editor Jordyn Alger speaks with Bill O’Connell, Chief Security Officer (CSO) of Commvault, about his experiences with the evolution of the CSO role.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2025/OConnell-podcast.webp?t=1763139591"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/2025/11/14/SEC-1125-Bill-OConnell-Podcast-FINAL.mp3" type="audio/x-mp3" length="19231520"/>
      <pubDate>Fri, 14 Nov 2025 11:50:57 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/2025/11/14/SEC-1125-Bill-OConnell-Podcast-FINAL.mp3</link>
      <itunes:duration>13:21</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:192</guid>
      <title>Inside SECURITY 500: Reinventing Security Leadership</title>
      <itunes:summary>
In this episode of Lock It Down with Security Magazine, Will Bernhjelm, Mall of America Vice President of Security, and the 2025 SECURITY 500 Conference Morning Keynote Speaker, talks about his career, the security industry and the upcoming conference.      </itunes:summary>
      <description>
        <![CDATA[In this episode of Lock It Down with Security Magazine, Will Bernhjelm, Mall of America Vice President of Security, and the 2025 SECURITY 500 Conference Morning Keynote Speaker, talks about his career, the security industry and the upcoming conference.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-Podcast-Header-Will-Bernhjelm.webp?t=1762363562"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-Podcast-Will-Bernhjelm.mp3" type="audio/x-mp3" length="26249504"/>
      <pubDate>Thu, 30 Oct 2025 13:21:12 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-Podcast-Will-Bernhjelm.mp3</link>
      <itunes:duration>18:13</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:191</guid>
      <title>How AI Will Transform Physical Security</title>
      <itunes:summary>
Steve Lindsey, CTO and Co-Founder of LVT, shares his insights regarding the future of AI in physical security.      </itunes:summary>
      <description>
        <![CDATA[Steve Lindsey, CTO and Co-Founder of LVT, shares his insights regarding the future of AI in physical security.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2025/Lindsey-Podcast.webp?t=1761588645"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/1025-SEC-Steve-Lindsey-Podcast-FINAL.mp3" type="audio/x-mp3" length="26251808"/>
      <pubDate>Mon, 27 Oct 2025 13:47:28 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/1025-SEC-Steve-Lindsey-Podcast-FINAL.mp3</link>
      <itunes:duration>18:13</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:190</guid>
      <title>Protecting Critical Infrastructure With Limited Funding</title>
      <itunes:summary>
Mosley-Romero shares common threats towards critical infrastructure and advice for security leaders navigating different challenges.      </itunes:summary>
      <description>
        <![CDATA[Mosley-Romero shares common threats towards critical infrastructure and advice for security leaders navigating different challenges.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2025/10-8-podcst.webp?t=1759870666"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/10.8.mp3" type="audio/x-mp3" length="14665640"/>
      <pubDate>Tue, 07 Oct 2025 16:52:27 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/10.8.mp3</link>
      <itunes:duration>15:27</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:189</guid>
      <title>Preparing for a Quantum Future</title>
      <itunes:summary>
In this episode of Lock It Down with Security Magazine, Director of Digital Security Solutions Marketing at Entrust Samantha Mabey discusses how organizations can prepare for a quantum future.      </itunes:summary>
      <description>
        <![CDATA[In this episode of Lock It Down with Security Magazine, Director of Digital Security Solutions Marketing at Entrust Samantha Mabey discusses how organizations can prepare for a quantum future.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2025/Mabey_Podcast.webp?t=1758561280"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0925-Samantha-Mabey-Podcast-FINAL.mp3" type="audio/x-mp3" length="27797792"/>
      <pubDate>Mon, 22 Sep 2025 13:13:20 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0925-Samantha-Mabey-Podcast-FINAL.mp3</link>
      <itunes:duration>19:18</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:188</guid>
      <title>How AI and Virtual Operators Are Transforming Security Operations</title>
      <itunes:summary>
In this episode of Lock It Down with Security Magazine, Simon Morgan, Chief Product Officer at SureView Systems, discusses the evolution of security operations and the rise of artificial intelligence in modern SOCs.      </itunes:summary>
      <description>
        <![CDATA[In this episode of Lock It Down with Security Magazine, Simon Morgan, Chief Product Officer at SureView Systems, discusses the evolution of security operations and the rise of artificial intelligence in modern SOCs.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2025/Siman-Morgan-podcast.webp?t=1758131479"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/091725-Security-Podcast---Simon-Morgan-Sureview-Systems.mp3" type="audio/x-mp3" length="29968736"/>
      <pubDate>Tue, 09 Sep 2025 14:01:40 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/091725-Security-Podcast---Simon-Morgan-Sureview-Systems.mp3</link>
      <itunes:duration>20:48</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:187</guid>
      <title>The Red Flags of Potential Workplace Violence</title>
      <itunes:summary>
In this episode of The Security Podcasts featuring Alan Saquella, Assistant Professor at the College of Business, Security and Intelligence at Embry-Riddle Aeronautical University, we discuss the red flags that a workplace violence incident may be about to occur.      </itunes:summary>
      <description>
        <![CDATA[In this episode of The Security Podcasts featuring Alan Saquella, Assistant Professor at the College of Business, Security and Intelligence at Embry-Riddle Aeronautical University, we discuss the red flags that a workplace violence incident may be about to occur.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/08/18/Alan-Saquella-podcast-news-header.webp?t=1755546903"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0825-Alan-Saquella-Podcast-V1.mp3" type="audio/x-mp3" length="25720736"/>
      <pubDate>Tue, 26 Aug 2025 09:23:34 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0825-Alan-Saquella-Podcast-V1.mp3</link>
      <itunes:duration>17:51</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:186</guid>
      <title>How Should CISOs Prepare for AI Threats, Cyberattacks or Emergencies?</title>
      <itunes:summary>
Aimee Cardwell, CISO in Residence for Transcend, shares how CISOs should prepare for AI threats, cyberattacks and emergencies.      </itunes:summary>
      <description>
        <![CDATA[Aimee Cardwell, CISO in Residence for Transcend, shares how CISOs should prepare for AI threats, cyberattacks and emergencies.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/07/24/Aimee-Cardwell-podcast-news-header.webp?t=1753382403"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0725-Aimee-Cardwell-FINAL.mp3" type="audio/x-mp3" length="16588832"/>
      <pubDate>Mon, 28 Jul 2025 09:03:22 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0725-Aimee-Cardwell-FINAL.mp3</link>
      <itunes:duration>11:31</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:185</guid>
      <title>Celebrating 40 Years with OSAC</title>
      <itunes:summary>
Jerry Tavares, Executive Director of OSAC talks about OSAC’s mission and trends in the industry.      </itunes:summary>
      <description>
        <![CDATA[Jerry Tavares, Executive Director of OSAC talks about OSAC’s mission and trends in the industry.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/07/24/Jerry-J.-Tavares-OSAC-Podcast-Header-NEW.webp?t=1754533269"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/OSAC-40th-July-Security-Podcast-MUSIC-ADS.mp3" type="audio/x-mp3" length="23157536"/>
      <pubDate>Wed, 16 Jul 2025 13:33:02 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/OSAC-40th-July-Security-Podcast-MUSIC-ADS.mp3</link>
      <itunes:duration>16:04</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:184</guid>
      <title>Cybersecurity in Retail Amidst Escalating Attacks</title>
      <itunes:summary>
Myke Lyons, CISO at Cribl, discusses cybersecurity in retail, especially in relation to the recent string of attacks against the sector.      </itunes:summary>
      <description>
        <![CDATA[Myke Lyons, CISO at Cribl, discusses cybersecurity in retail, especially in relation to the recent string of attacks against the sector.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/06/18/Myke-Lyons-podcast-news-header.webp?t=1750272890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/0625-Myke-Lyons-Podcast-FINAL.mp3" type="audio/x-mp3" length="15409184"/>
      <pubDate>Tue, 24 Jun 2025 12:01:30 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/0625-Myke-Lyons-Podcast-FINAL.mp3</link>
      <itunes:duration>10:42</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:183</guid>
      <title>Promoting Wellness Among Security Teams in the Midst of Crisis</title>
      <itunes:summary>
Danielle Weddepohl, Director of Public Safety and Emergency Management at George Brown College, discusses how to promote wellness among security teams.      </itunes:summary>
      <description>
        <![CDATA[Danielle Weddepohl, Director of Public Safety and Emergency Management at George Brown College, discusses how to promote wellness among security teams.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/05/23/Danielle-Weddepohl-podcast-news-header.webp?t=1749783377"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0525-Danielle-Weddepohl-Podcast-FINAL.mp3" type="audio/x-mp3" length="30784352"/>
      <pubDate>Fri, 30 May 2025 08:20:26 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0525-Danielle-Weddepohl-Podcast-FINAL.mp3</link>
      <itunes:duration>21:22</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:182</guid>
      <title>Making Security Decisions in an Unstable or Chaotic Environment</title>
      <itunes:summary>
Dave Coxe, CEO and Co-Founder of ID Dataweb, discusses how leaders can make security decisions in unstable or chaotic environments.      </itunes:summary>
      <description>
        <![CDATA[Dave Coxe, CEO and Co-Founder of ID Dataweb, discusses how leaders can make security decisions in unstable or chaotic environments.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/05/19/Dave-Coxe-podcast-news-header.webp?t=1748510906"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0525-Dave-Coxe-Podcast-FINAL.mp3" type="audio/x-mp3" length="22902944"/>
      <pubDate>Tue, 20 May 2025 09:04:54 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0525-Dave-Coxe-Podcast-FINAL.mp3</link>
      <itunes:duration>15:54</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:181</guid>
      <title>Prioritizing security while adopting AI agents</title>
      <itunes:summary>
Michael Bargury, Co-Founder &amp; CTO at Zenity, shares best practices for securely implementing AI agents.      </itunes:summary>
      <description>
        <![CDATA[Michael Bargury, Co-Founder &amp; CTO at Zenity, shares best practices for securely implementing AI agents.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/03/24/Michael-Bargury-podcast-news-header.webp?t=1742840911"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-March-2025-Podcast-Final.mp3" type="audio/x-mp3" length="30215840"/>
      <pubDate>Tue, 25 Mar 2025 09:23:04 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-March-2025-Podcast-Final.mp3</link>
      <itunes:duration>20:58</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:180</guid>
      <title>CISO strategies: Modern challenges and how to overcome them</title>
      <itunes:summary>
Jordan Avnaim, Chief Information Security Officer at Entrust, shares strategies CISOs can implement to overcome modern challenges.       </itunes:summary>
      <description>
        <![CDATA[Jordan Avnaim, Chief Information Security Officer at Entrust, shares strategies CISOs can implement to overcome modern challenges. ]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/02/24/Jordan-Avnaim-podcast-news-header.webp?t=1740415153"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0225-Jordan-Avnaim-Podcast-FINAL.mp3" type="audio/x-mp3" length="23839913"/>
      <pubDate>Tue, 25 Feb 2025 10:50:42 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0225-Jordan-Avnaim-Podcast-FINAL.mp3</link>
      <itunes:duration>16:31</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:179</guid>
      <title>Simplify your security toolkit</title>
      <itunes:summary>
What threats do security leaders need to worry about? Answer this question and more with Corey Nachreiner, CISO at WatchGuard.      </itunes:summary>
      <description>
        <![CDATA[What threats do security leaders need to worry about? Answer this question and more with Corey Nachreiner, CISO at WatchGuard.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/01/28/Corey-Nachreiner-podcast-news-header.webp?t=1738085781"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-Podcast-1.29-Final.mp3" type="audio/x-mp3" length="17702816"/>
      <pubDate>Tue, 28 Jan 2025 15:33:07 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-Podcast-1.29-Final.mp3</link>
      <itunes:duration>12:17</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:178</guid>
      <title>Reducing the lifespan of digital certificates</title>
      <itunes:summary>
Tim Callan, Co-Chair at CA/Browser Forum and Chief Compliance Officer at Sectigo, discusses the current state of digital certificate lifespans and explains the support for reducing them.      </itunes:summary>
      <description>
        <![CDATA[Tim Callan, Co-Chair at CA/Browser Forum and Chief Compliance Officer at Sectigo, discusses the current state of digital certificate lifespans and explains the support for reducing them.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2025/01/20/Tim-Callan-podcast-news-header.webp?t=1737399597"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0225-Tim-Callan-Podcast-Final.mp3" type="audio/x-mp3" length="20960096"/>
      <pubDate>Wed, 22 Jan 2025 09:10:03 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2025/SEC-0225-Tim-Callan-Podcast-Final.mp3</link>
      <itunes:duration>14:33</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:177</guid>
      <title>How control rooms help organizations and security management</title>
      <itunes:summary>
Dan Gundry, Strategic Director at Barco Control Rooms, discusses how control rooms benefit organizations and security management.      </itunes:summary>
      <description>
        <![CDATA[Dan Gundry, Strategic Director at Barco Control Rooms, discusses how control rooms benefit organizations and security management.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/12/19/Dan-Gundry-podcast-news-header.webp?t=1734638519"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/1224-Dan-Gundry-Podcast-Final.mp3" type="audio/x-mp3" length="15534413"/>
      <pubDate>Fri, 20 Dec 2024 08:34:30 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/1224-Dan-Gundry-Podcast-Final.mp3</link>
      <itunes:duration>10:45</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:176</guid>
      <title>Understanding and applying the zero trust mentality</title>
      <itunes:summary>
Listen to Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, explain how to effectively apply a zero trust mindset in the workplace.      </itunes:summary>
      <description>
        <![CDATA[Listen to Will Knehr, Senior Manager of Information Assurance and Data Privacy i-PRO Americas, explain how to effectively apply a zero trust mindset in the workplace.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/11/13/Will-Knehr-podcast-news-header.webp?t=1731517912"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/1124-Will-Knehr-Podcast-FINAL.mp3" type="audio/x-mp3" length="27718304"/>
      <pubDate>Thu, 14 Nov 2024 08:49:40 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/1124-Will-Knehr-Podcast-FINAL.mp3</link>
      <itunes:duration>19:14</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:175</guid>
      <title>Multi-Site Mastery: Strategies for Effective Risk Assessments</title>
      <itunes:summary>

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively.
Sponsored by 
AMAROK      </itunes:summary>
      <description>
        <![CDATA[
In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively.
Sponsored by 
AMAROK]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/10/23/AMAROK-podcast-OCT-Mark-Landry.webp?t=1730494641"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/SEC-AMAROK-Oct-podcast-Final.mp3" type="audio/x-mp3" length="72826912"/>
      <pubDate>Wed, 23 Oct 2024 09:58:50 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/SEC-AMAROK-Oct-podcast-Final.mp3</link>
      <itunes:duration>50:32</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:174</guid>
      <title>Middle East Escalation, Humanitarian Law and Disinformation – Episode 25</title>
      <itunes:summary>
In episode 25 of the Cybersecurity &amp; Geopolitical Discussion, our trio of hosts pull apart the rapidly deteriorating situation in the Middle East.      </itunes:summary>
      <description>
        <![CDATA[In episode 25 of the Cybersecurity &amp; Geopolitical Discussion, our trio of hosts pull apart the rapidly deteriorating situation in the Middle East.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-09-24-Audio-only-version.mp3" type="audio/x-mp3" length="63031867"/>
      <pubDate>Mon, 21 Oct 2024 12:12:44 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-09-24-Audio-only-version.mp3</link>
      <itunes:duration>32:23</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:173</guid>
      <title>Proving physical security value across an organization</title>
      <itunes:summary>
In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization.      </itunes:summary>
      <description>
        <![CDATA[In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/09/13/Thomasina-Martin-podcast-news-header.webp?t=1726231322"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Thomasina-Martin-Podcast-Final.mp3" type="audio/x-mp3" length="18590274"/>
      <pubDate>Tue, 15 Oct 2024 13:57:52 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Thomasina-Martin-Podcast-Final.mp3</link>
      <itunes:duration>12:52</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:172</guid>
      <title>Preventing workplace violence</title>
      <itunes:summary>
Kelly Johnstone, Senior Security Advisor at International SOS, discusses the importance of taking a proactive stance against workplace violence.      </itunes:summary>
      <description>
        <![CDATA[Kelly Johnstone, Senior Security Advisor at International SOS, discusses the importance of taking a proactive stance against workplace violence.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/10/14/Kelly-Johnstone-podcast-news-header.webp?t=1731098765"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/1024-Kelly-Johnstone-Podcast-Final.mp3" type="audio/x-mp3" length="33976469"/>
      <pubDate>Tue, 15 Oct 2024 13:47:42 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/1024-Kelly-Johnstone-Podcast-Final.mp3</link>
      <itunes:duration>23:33</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:171</guid>
      <title>Balancing Risk and Innovation - A CISO Perspective</title>
      <itunes:summary>
In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk &amp; innovation from a CISO’s perspective.      </itunes:summary>
      <description>
        <![CDATA[In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk &amp; innovation from a CISO’s perspective.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/08/23/Jill-Knese-Podcast-Header.webp?t=1724427110"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Jill-Knesek-podcast-0924-Final-MUSIC-and-ADS.mp3" type="audio/x-mp3" length="15445488"/>
      <pubDate>Tue, 24 Sep 2024 09:43:39 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Jill-Knesek-podcast-0924-Final-MUSIC-and-ADS.mp3</link>
      <itunes:duration>14:53</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:170</guid>
      <title>Certifying secure access service edge solutions</title>
      <itunes:summary>
Pascal Menezes, CTO at MEF, discusses the importance of certifying secure access service edge (SASE) solutions.      </itunes:summary>
      <description>
        <![CDATA[Pascal Menezes, CTO at MEF, discusses the importance of certifying secure access service edge (SASE) solutions.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/09/11/Pascal-Menezes-podcast-news-header.webp?t=1726077827"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0924-Pascal-Menezes-Podcast-FINAL.mp3" type="audio/x-mp3" length="22967868"/>
      <pubDate>Wed, 18 Sep 2024 09:21:49 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0924-Pascal-Menezes-Podcast-FINAL.mp3</link>
      <itunes:duration>15:55</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:169</guid>
      <title>Why security professionals experience burnout</title>
      <itunes:summary>
Thomas Kinsella, Co-Founder &amp; Chief Customer Officer at Tines, discusses the challenges contributing to burnout among security professionals.      </itunes:summary>
      <description>
        <![CDATA[Thomas Kinsella, Co-Founder &amp; Chief Customer Officer at Tines, discusses the challenges contributing to burnout among security professionals.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/08/26/Thomas-Kinsella-podcast-news-header.webp?t=1724689475"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0824-Thomas-Kinsella-Podcast-FINAL.mp3" type="audio/x-mp3" length="15965521"/>
      <pubDate>Tue, 27 Aug 2024 09:17:38 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0824-Thomas-Kinsella-Podcast-FINAL.mp3</link>
      <itunes:duration>11:03</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:168</guid>
      <title>Cybersecurity at the Paris Summer Olympics</title>
      <itunes:summary>
Mark Manglicmot, SVP of Security Services at Arctic Wolf, discusses how individuals and businesses can defend against cyber threats during the Olympics.      </itunes:summary>
      <description>
        <![CDATA[Mark Manglicmot, SVP of Security Services at Arctic Wolf, discusses how individuals and businesses can defend against cyber threats during the Olympics.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/07/08/Mark-Manglicmot-podcast-news-header.webp?t=1720450672"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0727-Mark-Manglicmot-FINAL.mp3" type="audio/x-mp3" length="16535383"/>
      <pubDate>Wed, 17 Jul 2024 08:28:04 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0727-Mark-Manglicmot-FINAL.mp3</link>
      <itunes:duration>15:21</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:167</guid>
      <title>The Money Laundering Machine: Inside the global crime epidemic - Episode 24</title>
      <itunes:summary>
In episode 24 of the Cybersecurity &amp; Geopolitical Discussion, our trio of hosts discuss paradoxes surrounding money laundering and the reasons it’s so popular, particularly among well-establish organized criminal gangs.      </itunes:summary>
      <description>
        <![CDATA[In episode 24 of the Cybersecurity &amp; Geopolitical Discussion, our trio of hosts discuss paradoxes surrounding money laundering and the reasons it’s so popular, particularly among well-establish organized criminal gangs.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-06-24-ep24-Audio-only-with-Ads.mp3" type="audio/x-mp3" length="36708836"/>
      <pubDate>Wed, 10 Jul 2024 09:28:46 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-06-24-ep24-Audio-only-with-Ads.mp3</link>
      <itunes:duration>41:06</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:166</guid>
      <title>Geopolitical, cyber and security implications of upcoming British election - Episode 23</title>
      <itunes:summary>
In episode 23 of the Cybersecurity &amp; Geopolitical Discussion, our trio of hosts debate pull apart the scenario of the upcoming UK election to uncover what the impact could be on national and global security.Watch the video version here.
      </itunes:summary>
      <description>
        <![CDATA[In episode 23 of the Cybersecurity &amp; Geopolitical Discussion, our trio of hosts debate pull apart the scenario of the upcoming UK election to uncover what the impact could be on national and global security.Watch the video version here.
]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-05-24-Audio-only-with-AD.mp3" type="audio/x-mp3" length="35684794"/>
      <pubDate>Wed, 19 Jun 2024 11:04:35 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-05-24-Audio-only-with-AD.mp3</link>
      <itunes:duration>40:02</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:165</guid>
      <title>Risk management and mobile devices</title>
      <itunes:summary>
Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, discusses what organizations can do to manage mobile device risks.      </itunes:summary>
      <description>
        <![CDATA[Jim Coyle, U.S. Public Sector Chief Technology Officer at Lookout, discusses what organizations can do to manage mobile device risks.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/05/22/Jim-Coyle-podcast-news-header.webp?t=1716394622"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0624-Jim-Coyle-FINAL.mp3" type="audio/x-mp3" length="17413663"/>
      <pubDate>Mon, 17 Jun 2024 10:44:08 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0624-Jim-Coyle-FINAL.mp3</link>
      <itunes:duration>18:28</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:164</guid>
      <title>Navigating political polarization in the workplace</title>
      <itunes:summary>
Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, discusses the challenges security leaders face when navigating political polarization in the workplace.      </itunes:summary>
      <description>
        <![CDATA[Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, discusses the challenges security leaders face when navigating political polarization in the workplace.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2024/05/22/Scott-McHugh-Security-podcast-news-header.webp?t=1716390324"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/SEC-Scott-McHugh-Final-with-ADS.mp3" type="audio/x-mp3" length="22540064"/>
      <pubDate>Wed, 12 Jun 2024 10:03:52 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/SEC-Scott-McHugh-Final-with-ADS.mp3</link>
      <itunes:duration>23:08</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:163</guid>
      <title>The future of the modern CISO</title>
      <itunes:summary>
In this episode of The Security Podcasts featuring Chaim Mazal, Chief Security Officer at Gigamon, we discuss the challenges modern day CISOs face with evolving regulatory requirements and compliance standards.      </itunes:summary>
      <description>
        <![CDATA[In this episode of The Security Podcasts featuring Chaim Mazal, Chief Security Officer at Gigamon, we discuss the challenges modern day CISOs face with evolving regulatory requirements and compliance standards.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2024/mazal.webp?t=1716988900"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Chaim-Mazal-Podcast-Final-w-ADS.mp3" type="audio/x-mp3" length="27458119"/>
      <pubDate>Wed, 29 May 2024 08:53:56 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Chaim-Mazal-Podcast-Final-w-ADS.mp3</link>
      <itunes:duration>25:28</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:162</guid>
      <title>Taking action to safeguard IoT devices</title>
      <itunes:summary>
Taylor Matthews, Director of IT/Network/Security at OptConnect, discusses the IoT threat landscape as well as best practices for protecting IoT devices.      </itunes:summary>
      <description>
        <![CDATA[Taylor Matthews, Director of IT/Network/Security at OptConnect, discusses the IoT threat landscape as well as best practices for protecting IoT devices.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2024/Taylor-Matthews.webp?t=1715778775"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/2024/05/15/0524-Taylor-Matthews-Podcast-FINAL.mp3" type="audio/x-mp3" length="20869878"/>
      <pubDate>Wed, 15 May 2024 09:11:40 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/2024/05/15/0524-Taylor-Matthews-Podcast-FINAL.mp3</link>
      <itunes:duration>11:19</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:161</guid>
      <title>Emerging national security threats</title>
      <itunes:summary>
Felipe Fernandez, Chief Technology Officer at Fortinet Federal discusses the challenges and opportunities for enterprise security professionals in the scope of national security.      </itunes:summary>
      <description>
        <![CDATA[Felipe Fernandez, Chief Technology Officer at Fortinet Federal discusses the challenges and opportunities for enterprise security professionals in the scope of national security.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/Felipe-Fernandez-thumbnail.webp?t=1714057822"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0424-Felipe-Fernandez-Podcast-ADS-Final.mp3" type="audio/x-mp3" length="34549155"/>
      <pubDate>Thu, 25 Apr 2024 11:09:34 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/0424-Felipe-Fernandez-Podcast-ADS-Final.mp3</link>
      <itunes:duration>23:02</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:159</guid>
      <title>The Cybersecurity and Geopolitical Discussion — The real space race: Inside geopolitics and security of a $1.8T industry— Episode 22</title>
      <itunes:summary>
In Episode 22 of the Cybersecurity &amp; Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE, CEO of Grey Hare Media debate the geopolitical and security dimensions of the current global space industry.Watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[In Episode 22 of the Cybersecurity &amp; Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE, CEO of Grey Hare Media debate the geopolitical and security dimensions of the current global space industry.Watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-04-24-Real-Space-Race-AUDIO-ONLY-with-Ad.mp3" type="audio/x-mp3" length="33806316"/>
      <pubDate>Thu, 18 Apr 2024 13:57:12 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-04-24-Real-Space-Race-AUDIO-ONLY-with-Ad.mp3</link>
      <itunes:duration>37:56</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:158</guid>
      <title>How do security leaders protect PII and other important data?</title>
      <itunes:summary>
Shiva Nathan, Founder and CEO of Onymos, provides insight to recent government requirements for PII protection and how security leaders can implement them.      </itunes:summary>
      <description>
        <![CDATA[Shiva Nathan, Founder and CEO of Onymos, provides insight to recent government requirements for PII protection and how security leaders can implement them.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2024/Shiva-Nathan-CEO-Onymos.webp?t=1712148807"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/4.3.mp3" type="audio/x-mp3" length="10375951"/>
      <pubDate>Wed, 03 Apr 2024 08:51:21 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/4.3.mp3</link>
      <itunes:duration>10:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:157</guid>
      <title>Navigating the identity security landscape</title>
      <itunes:summary>
Jeff Reich, Executive Director of the Identity Defined Security Alliance, discusses the challenges security professionals face in the evolving landscape of identity security threats.      </itunes:summary>
      <description>
        <![CDATA[Jeff Reich, Executive Director of the Identity Defined Security Alliance, discusses the challenges security professionals face in the evolving landscape of identity security threats.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2024/JeffReich.webp?t=1711479065"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/SEC-0324-Jeff-Reich-Podcast-Final-with-ADS-Music.mp3" type="audio/x-mp3" length="32673584"/>
      <pubDate>Tue, 26 Mar 2024 14:40:48 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/SEC-0324-Jeff-Reich-Podcast-Final-with-ADS-Music.mp3</link>
      <itunes:duration>35:58</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:156</guid>
      <title>The Cybersecurity and Geopolitical Discussion — Changing global influence in a year of elections — Episode 21</title>
      <itunes:summary>
In Episode 21 of the Cybersecurity &amp; Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE, CEO of Grey Hare Media discuss how modern forces manifest, how much power is truly being wielded, and what effect it is likely to have on a year when some of world’s biggest and most influential powers are holding elections.      </itunes:summary>
      <description>
        <![CDATA[In Episode 21 of the Cybersecurity &amp; Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte, Partner at Red Goat Security and Philip Ingram MBE, CEO of Grey Hare Media discuss how modern forces manifest, how much power is truly being wielded, and what effect it is likely to have on a year when some of world’s biggest and most influential powers are holding elections.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-03-20-Audio-Only-version.mp3" type="audio/x-mp3" length="51115100"/>
      <pubDate>Tue, 19 Mar 2024 17:26:18 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/GCP-03-20-Audio-Only-version.mp3</link>
      <itunes:duration>43:45</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:155</guid>
      <title>The rising threat of zero-day attacks</title>
      <itunes:summary>
Advancing technology such as artificial intelligence has created more intricate cyber threats, including zero-day attacks. How can security leaders prepare for the unexpected? Answer this question and more with Cody Aston, Solutions Consultant, Networks &amp; Cybersecurity at Rockwell Automation.      </itunes:summary>
      <description>
        <![CDATA[Advancing technology such as artificial intelligence has created more intricate cyber threats, including zero-day attacks. How can security leaders prepare for the unexpected? Answer this question and more with Cody Aston, Solutions Consultant, Networks &amp; Cybersecurity at Rockwell Automation.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2024/Cody-Aston-Headshot.webp?t=1709152445"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Cody-Aston-Podcast-Final.mp3" type="audio/x-mp3" length="12759900"/>
      <pubDate>Wed, 28 Feb 2024 15:31:10 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Cody-Aston-Podcast-Final.mp3</link>
      <itunes:duration>8:50</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:154</guid>
      <title>The Cybersecurity and Geopolitical Discussion — Broken China? — Episode 20</title>
      <itunes:summary>
In Episode 20 of the Cybersecurity &amp; Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte of Red Goat Security and Philip Ingram MBE of Grey Hare Media, discuss how, from the outside, China appears very different. However, is this really the case?Watch the video version here.       </itunes:summary>
      <description>
        <![CDATA[In Episode 20 of the Cybersecurity &amp; Geopolitical Discussion, hosts Ian Thornton-Trump CD, CISO for Cyjax, Lisa Forte of Red Goat Security and Philip Ingram MBE of Grey Hare Media, discuss how, from the outside, China appears very different. However, is this really the case?Watch the video version here. ]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Cyber--Geo-episode-20-podcast.mp3" type="audio/x-mp3" length="78361121"/>
      <pubDate>Mon, 26 Feb 2024 17:18:11 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Cyber--Geo-episode-20-podcast.mp3</link>
      <itunes:duration>44:54</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:153</guid>
      <title>Diversifying the security workforce</title>
      <itunes:summary>
Larry Whiteside, Jr., CISO at RegScale and Co-Founder and President at Cyversity, discusses the importance of diversity within the security workforce and how critical mentorship is when it comes developing talent.      </itunes:summary>
      <description>
        <![CDATA[Larry Whiteside, Jr., CISO at RegScale and Co-Founder and President at Cyversity, discusses the importance of diversity within the security workforce and how critical mentorship is when it comes developing talent.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2024/LarryWhitesideJr.webp?t=1708094824"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Larry-Whiteside-Podcast-ADS-Final.mp3" type="audio/x-mp3" length="24952812"/>
      <pubDate>Fri, 16 Feb 2024 09:41:12 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Larry-Whiteside-Podcast-ADS-Final.mp3</link>
      <itunes:duration>29:35</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:152</guid>
      <title>Avoiding offboarding red flags</title>
      <itunes:summary>
Yoav Kalati, VP Product at Wing Security, discusses the security challenges and red flags organizations face when it comes to off boarding employees.      </itunes:summary>
      <description>
        <![CDATA[Yoav Kalati, VP Product at Wing Security, discusses the security challenges and red flags organizations face when it comes to off boarding employees.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2024/Yoav-Kalati.webp?t=1706650549"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/SEC-Podcast-Kalati-ADS-Final.mp3" type="audio/x-mp3" length="7547924"/>
      <pubDate>Wed, 31 Jan 2024 08:42:20 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/SEC-Podcast-Kalati-ADS-Final.mp3</link>
      <itunes:duration>7:51</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:150</guid>
      <title>The Cybersecurity and Geopolitical Discussion — The Security Year Ahead — Episode 19</title>
      <itunes:summary>
In Episode 19 of The Cybersecurity &amp; Geopolitical Discussion, Lisa Forte, Partner at Red Goat Security, Phil Ingram, MBE, of Grey Hare Media and Ian Thornton-Trump CD, CISO for Cyjax examine how some of the more compelling world events set to take place this year could impact global stability and security, including election security and geopolitical conflict.Watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[In Episode 19 of The Cybersecurity &amp; Geopolitical Discussion, Lisa Forte, Partner at Red Goat Security, Phil Ingram, MBE, of Grey Hare Media and Ian Thornton-Trump CD, CISO for Cyjax examine how some of the more compelling world events set to take place this year could impact global stability and security, including election security and geopolitical conflict.Watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Cyber--Geo-episode-19-podcast.mp3" type="audio/x-mp3" length="87293696"/>
      <pubDate>Wed, 10 Jan 2024 09:00:03 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/Cyber--Geo-episode-19-podcast.mp3</link>
      <itunes:duration>44:54</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:149</guid>
      <title>5 New Year's resolutions for CISOs</title>
      <itunes:summary>
In an ever-evolving digital age, how can chief information security officers (CISOs) prepare themselves? What should they take into consideration for the new year? Answer these questions with James Hadley, founder and CEO of Immersive Labs.      </itunes:summary>
      <description>
        <![CDATA[In an ever-evolving digital age, how can chief information security officers (CISOs) prepare themselves? What should they take into consideration for the new year? Answer these questions with James Hadley, founder and CEO of Immersive Labs.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2024/James-Headshot.webp?t=1704227323"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/JamesHadley-podcast.mp3" type="audio/x-mp3" length="5201746"/>
      <pubDate>Tue, 02 Jan 2024 15:27:56 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2024/JamesHadley-podcast.mp3</link>
      <itunes:duration>5:11</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:148</guid>
      <title>Challenges of deep fakes in cybersecurity</title>
      <itunes:summary>
Brent Arnold, a partner practicing in Gowling WLG's Advocacy department, discusses the challenges the security industry faces with more and more convincing deepfakes making the rounds.      </itunes:summary>
      <description>
        <![CDATA[Brent Arnold, a partner practicing in Gowling WLG's Advocacy department, discusses the challenges the security industry faces with more and more convincing deepfakes making the rounds.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Brent-Arnold.webp?t=1702474158"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-Podcast-Arnold-Final-with-ads.mp3" type="audio/x-mp3" length="21712328"/>
      <pubDate>Wed, 13 Dec 2023 08:23:41 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-Podcast-Arnold-Final-with-ads.mp3</link>
      <itunes:duration>21:09</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:147</guid>
      <title>The Cybersecurity and Geopolitical Discussion — Inside Cryptocurrency — Episode 18</title>
      <itunes:summary>
Welcome to the enigmatic and frequently problematic world of cryptocurrency. In Episode 18 of The Cybersecurity &amp; Geopolitical Discussion, Lisa Forte, Partner at Red Goat Security, Phil Ingram, MBE, of Grey Hare Media and Ian Thornton-Trump CD, Chief Information Security Officer (CISO) at Cyjax discuss the wide-ranging impact crypto has on geopolitical and economic conflict.Watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[Welcome to the enigmatic and frequently problematic world of cryptocurrency. In Episode 18 of The Cybersecurity &amp; Geopolitical Discussion, Lisa Forte, Partner at Red Goat Security, Phil Ingram, MBE, of Grey Hare Media and Ian Thornton-Trump CD, Chief Information Security Officer (CISO) at Cyjax discuss the wide-ranging impact crypto has on geopolitical and economic conflict.Watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/GCP-11-23--Audio-only-version.mp3" type="audio/x-mp3" length="69500791"/>
      <pubDate>Wed, 06 Dec 2023 08:29:58 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/GCP-11-23--Audio-only-version.mp3</link>
      <itunes:duration>35:46</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:146</guid>
      <title>Strong security posture means building effective partnerships</title>
      <itunes:summary>
Michael Daniel, President &amp; CEO at Cyber Threat Alliance, discusses sharing threat intelligence with other organizations as well as the challenges faced when establishing effective partnerships in the security industry.      </itunes:summary>
      <description>
        <![CDATA[Michael Daniel, President &amp; CEO at Cyber Threat Alliance, discusses sharing threat intelligence with other organizations as well as the challenges faced when establishing effective partnerships in the security industry.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Michael-Daniel.webp?t=1700660943"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Michael-Daniel-Podcast-with-ADs.mp3" type="audio/x-mp3" length="16164570"/>
      <pubDate>Fri, 17 Nov 2023 15:35:25 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Michael-Daniel-Podcast-with-ADs.mp3</link>
      <itunes:duration>17:10</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:145</guid>
      <title>How to build future security leaders</title>
      <itunes:summary>
What challenges do aspiring cybersecurity leaders face while trying to join the field? What can current security leaders do to help them? Answer these questions and more with George Gerchow, Chief Security Officer at Sumo Logic.      </itunes:summary>
      <description>
        <![CDATA[What challenges do aspiring cybersecurity leaders face while trying to join the field? What can current security leaders do to help them? Answer these questions and more with George Gerchow, Chief Security Officer at Sumo Logic.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/George-Gerchow.webp?t=1699392082"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/11.8.2023-George-Gerchow.mp3" type="audio/x-mp3" length="10288831"/>
      <pubDate>Tue, 07 Nov 2023 16:19:30 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/11.8.2023-George-Gerchow.mp3</link>
      <itunes:duration>10:19</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:144</guid>
      <title>AMA: Executive Protection Officer Edition — Will Arnell</title>
      <itunes:summary>
When it comes to executive protection, there are a number of skills security professionals should develop to successfully secure VIPs who work for or visit their organizations. In this Ask Me Anything episode, Will Arnell, an executive protection professional, gives an inside look into the executive protection field and offers a perspective on how enterprise security leaders can improve their programs by foregrounding communication, transparency and mentorship.      </itunes:summary>
      <description>
        <![CDATA[When it comes to executive protection, there are a number of skills security professionals should develop to successfully secure VIPs who work for or visit their organizations. In this Ask Me Anything episode, Will Arnell, an executive protection professional, gives an inside look into the executive protection field and offers a perspective on how enterprise security leaders can improve their programs by foregrounding communication, transparency and mentorship.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Arnell-headshot.webp?t=1698846617"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/11-01-2023-AMA-Will-Arnell-podcast.mp3" type="audio/x-mp3" length="39490088"/>
      <pubDate>Wed, 01 Nov 2023 09:49:29 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/11-01-2023-AMA-Will-Arnell-podcast.mp3</link>
      <itunes:duration></itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:143</guid>
      <title>The Cybersecurity and Geopolitical Discussion — Connecting the Wars — Episode 17</title>
      <itunes:summary>
In Episode 17 of the Cybersecurity &amp; Geopolitical Discussion from Security magazine, hosts Cyjax CISO Ian Thornton-Trump and Sky News security expert Philip Ingram, MBE, of Grey Hare Media are joined by Red Goat Cyber Security's Lisa Forte to analyze current events in the Middle East as the conflict between Israel and Hamas unfolds. The trio start with an update on the ongoing Russia-Ukraine war before analyzing events in the Middle East, from the proliferation of misinformation and disinformation to how cyberattacks have played a role in the Israel-Hamas conflict.Watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[In Episode 17 of the Cybersecurity &amp; Geopolitical Discussion from Security magazine, hosts Cyjax CISO Ian Thornton-Trump and Sky News security expert Philip Ingram, MBE, of Grey Hare Media are joined by Red Goat Cyber Security's Lisa Forte to analyze current events in the Middle East as the conflict between Israel and Hamas unfolds. The trio start with an update on the ongoing Russia-Ukraine war before analyzing events in the Middle East, from the proliferation of misinformation and disinformation to how cyberattacks have played a role in the Israel-Hamas conflict.Watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/SEC-Podcast-Promo.webp?t=1709048890"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Cyber-and-Geo-Episode-17-podcast.mp3" type="audio/x-mp3" length="86007789"/>
      <pubDate>Wed, 25 Oct 2023 08:43:40 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Cyber-and-Geo-Episode-17-podcast.mp3</link>
      <itunes:duration>44:14</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:142</guid>
      <title>Roles of AI, automation and humans in security</title>
      <itunes:summary>
Jordan Lippel, Vice President of Sales at ECAMSECURE, discusses how security professionals can stay updated and prepared to make informed decisions regarding the integration of automation and AI into their security operations.      </itunes:summary>
      <description>
        <![CDATA[Jordan Lippel, Vice President of Sales at ECAMSECURE, discusses how security professionals can stay updated and prepared to make informed decisions regarding the integration of automation and AI into their security operations.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Jordan-Lippel.webp?t=1697555679"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-Podcast-Jordan-Lippel.mp3" type="audio/x-mp3" length="13180711"/>
      <pubDate>Tue, 17 Oct 2023 11:09:14 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-Podcast-Jordan-Lippel.mp3</link>
      <itunes:duration>13:38</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:141</guid>
      <title>Communicating cybersecurity risks with non-security personnel</title>
      <itunes:summary>
With cyber threats quickly evolving with the rise of technology, how can security leaders prepare themselves and their organizations? How should small and medium businesses (SMBs) prioritize cybersecurity within their budgets? Answer these questions and more with Grayson Milbourne, Security Intelligence Director at OpenText Cybersecurity.      </itunes:summary>
      <description>
        <![CDATA[With cyber threats quickly evolving with the rise of technology, how can security leaders prepare themselves and their organizations? How should small and medium businesses (SMBs) prioritize cybersecurity within their budgets? Answer these questions and more with Grayson Milbourne, Security Intelligence Director at OpenText Cybersecurity.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Grayson_Milbourne.webp?t=1697039744"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Grayson-Milbourne-podcast.mp3" type="audio/x-mp3" length="9066584"/>
      <pubDate>Wed, 11 Oct 2023 11:52:47 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Grayson-Milbourne-podcast.mp3</link>
      <itunes:duration>9:09</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:140</guid>
      <title>AMA: Healthcare Security Leader Edition — Holly Rasche </title>
      <itunes:summary>
What are the unique challenges of securing a healthcare environment? How do you keep security team morale up? What are the most rewarding parts of a career in hospital security? This AMA episode features Holly Rasche, Director of Security Management Services at Northwest Community Healthcare. Holly shares the lessons she’s learned from her 26-year career in hospital security, covering topics from how COVID-19 changed the security landscape to the benefits/challenges of contract vs. proprietary security guards in healthcare. She speaks to the importance of teamwork, collaboration and interdepartmental communication in the healthcare security space.      </itunes:summary>
      <description>
        <![CDATA[What are the unique challenges of securing a healthcare environment? How do you keep security team morale up? What are the most rewarding parts of a career in hospital security? This AMA episode features Holly Rasche, Director of Security Management Services at Northwest Community Healthcare. Holly shares the lessons she’s learned from her 26-year career in hospital security, covering topics from how COVID-19 changed the security landscape to the benefits/challenges of contract vs. proprietary security guards in healthcare. She speaks to the importance of teamwork, collaboration and interdepartmental communication in the healthcare security space.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Holly-Rasche.webp?t=1695220620"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/09-20-23-AMA-Holly-Rasche-podcast.mp3" type="audio/x-mp3" length="30557667"/>
      <pubDate>Wed, 20 Sep 2023 10:36:26 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/09-20-23-AMA-Holly-Rasche-podcast.mp3</link>
      <itunes:duration>15:38</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:139</guid>
      <title>Creating an impactful culture in remote work environment</title>
      <itunes:summary>
Jim Barkdoll, CEO at Axiomatics, discusses what initiatives or strategies organizations can utilize to build or maintain an impactful culture in a remote work environment, and more.      </itunes:summary>
      <description>
        <![CDATA[Jim Barkdoll, CEO at Axiomatics, discusses what initiatives or strategies organizations can utilize to build or maintain an impactful culture in a remote work environment, and more.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Jim-Barkdoll.webp?t=1695218953"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Jim-Barkdoll-podcast-w-ads.mp3" type="audio/x-mp3" length="10351458"/>
      <pubDate>Wed, 20 Sep 2023 10:03:39 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Jim-Barkdoll-podcast-w-ads.mp3</link>
      <itunes:duration>10:42</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:138</guid>
      <title>How do security leaders prepare for quantum computing?</title>
      <itunes:summary>
What do federal guidelines say about quantum computing preparation? How do security leaders prepare for future risks? Answer these questions and more on this episode of The Security Podcasts with Greg Wetmore, Vice President of Software Development at Entrust.      </itunes:summary>
      <description>
        <![CDATA[What do federal guidelines say about quantum computing preparation? How do security leaders prepare for future risks? Answer these questions and more on this episode of The Security Podcasts with Greg Wetmore, Vice President of Software Development at Entrust.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/gwetmore_headshot.webp?t=1694718067"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Greg-Wetmore-podcast.mp3" type="audio/x-mp3" length="10611228"/>
      <pubDate>Thu, 14 Sep 2023 14:59:27 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Greg-Wetmore-podcast.mp3</link>
      <itunes:duration>10:58</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:137</guid>
      <title>Anti-scraping policies and data privacy</title>
      <itunes:summary>
In a world of data scraping and cyberattacks, how do organizations build digital trust with their consumers? How has technology changed data privacy policies? Answer these questions and more with Oded Anderman, Program Manager in Meta Platform’s Privacy organization, focusing on protecting user data from unauthorized scraping.      </itunes:summary>
      <description>
        <![CDATA[In a world of data scraping and cyberattacks, how do organizations build digital trust with their consumers? How has technology changed data privacy policies? Answer these questions and more with Oded Anderman, Program Manager in Meta Platform’s Privacy organization, focusing on protecting user data from unauthorized scraping.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Oded-Anderman.webp?t=1694008866"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Oded-Anderman-9.6.23.mp3" type="audio/x-mp3" length="9130013"/>
      <pubDate>Wed, 06 Sep 2023 09:59:18 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Oded-Anderman-9.6.23.mp3</link>
      <itunes:duration>9:21</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:136</guid>
      <title>AMA: Cybersecurity Executive Edition — Andrew Wilder</title>
      <itunes:summary>
How can cybersecurity professionals help shape the next generation of cyber leaders? How will the industry continue to adapt to the evolving security threat landscape? In this Ask Me Anything (AMA) video podcast episode from Security magazine, Andrew Wilder, cybersecurity executive, Adjunct Professor of Cybersecurity and Member of the Board of Directors at Washington University, discusses how the field has evolved over the last decades; cyber best practices for mergers &amp; acquisitions; lessons he's learned about cybersecurity since becoming a professor; and much more.      </itunes:summary>
      <description>
        <![CDATA[How can cybersecurity professionals help shape the next generation of cyber leaders? How will the industry continue to adapt to the evolving security threat landscape? In this Ask Me Anything (AMA) video podcast episode from Security magazine, Andrew Wilder, cybersecurity executive, Adjunct Professor of Cybersecurity and Member of the Board of Directors at Washington University, discusses how the field has evolved over the last decades; cyber best practices for mergers &amp; acquisitions; lessons he's learned about cybersecurity since becoming a professor; and much more.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Andrew-Wilder.webp?t=1693318895"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/08-30-23-AMA-Andrew-Wilder-podcast-final.mp3" type="audio/x-mp3" length="24926275"/>
      <pubDate>Tue, 29 Aug 2023 10:19:56 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/08-30-23-AMA-Andrew-Wilder-podcast-final.mp3</link>
      <itunes:duration>12:51</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:135</guid>
      <title>The evolving generative AI risk landscape</title>
      <itunes:summary>
Jeremy Ventura, Director of Security Strategy &amp; Field CISO at ThreatX, discusses challenges associated with the use of generative AI in cybersecurity, and more in this episode of The Security Podcast.      </itunes:summary>
      <description>
        <![CDATA[Jeremy Ventura, Director of Security Strategy &amp; Field CISO at ThreatX, discusses challenges associated with the use of generative AI in cybersecurity, and more in this episode of The Security Podcast.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/JeremyVentura.webp?t=1692641900"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-Podcast-Jeremy-Ventura-w-Ads-2.mp3" type="audio/x-mp3" length="15084679"/>
      <pubDate>Mon, 21 Aug 2023 14:15:00 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-Podcast-Jeremy-Ventura-w-Ads-2.mp3</link>
      <itunes:duration>15:04</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:134</guid>
      <title>Social media for research and threat intelligence</title>
      <itunes:summary>
With new security threats emerging, security leaders are looking for ways to keep themselves informed. Some have begun utilizing social media for research and sharing what they've found amongst each other.Find out more on this episode of The Security Podcasts with Igal Lytzki, a threat analyst and Incident Response team leader at Perception Point.      </itunes:summary>
      <description>
        <![CDATA[With new security threats emerging, security leaders are looking for ways to keep themselves informed. Some have begun utilizing social media for research and sharing what they've found amongst each other.Find out more on this episode of The Security Podcasts with Igal Lytzki, a threat analyst and Incident Response team leader at Perception Point.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Igal-Headshot.webp?t=1691586581"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Igal-Lytzky-podcast.mp3" type="audio/x-mp3" length="9583376"/>
      <pubDate>Wed, 09 Aug 2023 09:08:11 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Igal-Lytzky-podcast.mp3</link>
      <itunes:duration>9:41</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:133</guid>
      <title>AMA: CISO Edition — Diego Souza</title>
      <itunes:summary>
What are the top cybersecurity threats to global organizations? How will artificial intelligence (AI) continue to affect enterprise cybersecurity? Get answers to these questions and more in the latest Ask Me Anything (AMA) video podcast episode from Security magazine. In this episode, Diego Souza, Global Chief Information Security Officer (CISO) at Cummins, Inc., talks cybersecurity tactics in an evolving threat landscape; career advice for cybersecurity professionals moving to the executive level; and the pros and cons of artificial intelligence for cybersecurity.      </itunes:summary>
      <description>
        <![CDATA[What are the top cybersecurity threats to global organizations? How will artificial intelligence (AI) continue to affect enterprise cybersecurity? Get answers to these questions and more in the latest Ask Me Anything (AMA) video podcast episode from Security magazine. In this episode, Diego Souza, Global Chief Information Security Officer (CISO) at Cummins, Inc., talks cybersecurity tactics in an evolving threat landscape; career advice for cybersecurity professionals moving to the executive level; and the pros and cons of artificial intelligence for cybersecurity.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Diego-Souza.webp?t=1689099904"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-AMA-Souza---podcast.mp3" type="audio/x-mp3" length="19176224"/>
      <pubDate>Tue, 11 Jul 2023 14:23:04 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-AMA-Souza---podcast.mp3</link>
      <itunes:duration>13:19</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:132</guid>
      <title>Financial fraud prevention strategies</title>
      <itunes:summary>
Michael Jabbara, Vice President, Head of Global Fraud Services at Visa, covers the evolution of the financial fraud landscape and more in this episode of The Security Podcast. Jabbara also discusses emerging trends such as how the advent of cryptocurrencies has affected the financial fraud landscape and how threats may evolve over the coming years.      </itunes:summary>
      <description>
        <![CDATA[Michael Jabbara, Vice President, Head of Global Fraud Services at Visa, covers the evolution of the financial fraud landscape and more in this episode of The Security Podcast. Jabbara also discusses emerging trends such as how the advent of cryptocurrencies has affected the financial fraud landscape and how threats may evolve over the coming years.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Michael-Jabbara-thumbnail.webp?t=1687955018"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-Podcast-Michael-Jabbara-w-Ads.mp3" type="audio/x-mp3" length="14831839"/>
      <pubDate>Wed, 28 Jun 2023 08:22:49 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-Podcast-Michael-Jabbara-w-Ads.mp3</link>
      <itunes:duration>20:28</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:131</guid>
      <title>Managing MDM threats to protect an organization</title>
      <itunes:summary>
Mis-, dis- and malinformation (MDM) are a significant threat to security leaders and their organizations. Find out more in this episode of The Security Podcast featuring AJ Nash, Vice President and Distinguished Fellow of Intelligence at ZeroFox.      </itunes:summary>
      <description>
        <![CDATA[Mis-, dis- and malinformation (MDM) are a significant threat to security leaders and their organizations. Find out more in this episode of The Security Podcast featuring AJ Nash, Vice President and Distinguished Fellow of Intelligence at ZeroFox.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/AJ-Nash.webp?t=1686759870"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Podcast-AJ-Nash-with-ads.mp3" type="audio/x-mp3" length="10203777"/>
      <pubDate>Wed, 14 Jun 2023 12:24:00 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Podcast-AJ-Nash-with-ads.mp3</link>
      <itunes:duration>12:35</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:130</guid>
      <title>AMA: Campus Safety Leader Edition — Todd Jones</title>
      <itunes:summary>
In the latest Ask Me Anything (AMA) episode from Security magazine, Todd Jones, Director of Campus Safety at the Minneapolis College of Art and Design, discusses how to best utilize the summer to improve campus security programs; partnering with external and internal stakeholders on safety; and more.      </itunes:summary>
      <description>
        <![CDATA[In the latest Ask Me Anything (AMA) episode from Security magazine, Todd Jones, Director of Campus Safety at the Minneapolis College of Art and Design, discusses how to best utilize the summer to improve campus security programs; partnering with external and internal stakeholders on safety; and more.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Todd-Jones.webp?t=1685474333"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SECPodcast---V1-(1).mp3" type="audio/x-mp3" length="26812239"/>
      <pubDate>Tue, 30 May 2023 15:15:17 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SECPodcast---V1-(1).mp3</link>
      <itunes:duration>18:35</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:129</guid>
      <title>The Cybersecurity and Geopolitical Discussion — The Africa Factor — Episode 16</title>
      <itunes:summary>
In Episode 16 of the Cybersecurity &amp; Geopolitical Discussion from Security magazine, co-hosts Phillip Ingram, MBE, and Ian Thornton-Trump, CD, discuss the background and recent events in Africa with guest Lisa Forte from Red Goat Cybersecurity. The trio examines findings from a strategic intelligence report from Cyjax that detail China and Russia's colonial and developmental activities on the continent. Watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[In Episode 16 of the Cybersecurity &amp; Geopolitical Discussion from Security magazine, co-hosts Phillip Ingram, MBE, and Ian Thornton-Trump, CD, discuss the background and recent events in Africa with guest Lisa Forte from Red Goat Cybersecurity. The trio examines findings from a strategic intelligence report from Cyjax that detail China and Russia's colonial and developmental activities on the continent. Watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-0223_Podcast-Promo-Banner_150x150.webp?t=1725977256"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Cyber--Geo-episode-16---podcast.mp3" type="audio/x-mp3" length="58652428"/>
      <pubDate>Wed, 17 May 2023 12:40:02 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Cyber--Geo-episode-16---podcast.mp3</link>
      <itunes:duration>30:13</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:128</guid>
      <title>How AI and other technologies have changed password management</title>
      <itunes:summary>
New technologies such as AI have shifted conversations around best practices for password management. As much as AI can be a great help to protecting credentials, there have also been instances of it making it easier for cybercriminals to hack into accounts. Find out more in this episode of the Security podcast with Parteek Saran, founder and CEO of Uno. In this episode, Saran discusses the impact of human error and the need for complex passwords. Saran also encourages security leaders to properly train their employees on how to best protect their credentials.       </itunes:summary>
      <description>
        <![CDATA[New technologies such as AI have shifted conversations around best practices for password management. As much as AI can be a great help to protecting credentials, there have also been instances of it making it easier for cybercriminals to hack into accounts. Find out more in this episode of the Security podcast with Parteek Saran, founder and CEO of Uno. In this episode, Saran discusses the impact of human error and the need for complex passwords. Saran also encourages security leaders to properly train their employees on how to best protect their credentials. ]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Parteek-Saran-Headshot-(002).webp?t=1683123212"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Parteek-Saran-5.3.23.mp3" type="audio/x-mp3" length="11511958"/>
      <pubDate>Wed, 03 May 2023 10:07:27 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Parteek-Saran-5.3.23.mp3</link>
      <itunes:duration>7:58</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:127</guid>
      <title>AMA: Museum Security Leader Edition — Chris Singh</title>
      <itunes:summary>
How can cultural and arts institutions better protect their and communities assets from threats? What role does technology play in museum security? How do museum security teams handle insider threats to their facilities? In this Ask Me Anything (AMA) video podcast episode from Security magazine, Chris Singh, Senior Security Manager at the Metropolitan Museum of Art in New York City, talks rising through the ranks in security leadership, external and internal security threats to cultural institutions, and more.      </itunes:summary>
      <description>
        <![CDATA[How can cultural and arts institutions better protect their and communities assets from threats? What role does technology play in museum security? How do museum security teams handle insider threats to their facilities? In this Ask Me Anything (AMA) video podcast episode from Security magazine, Chris Singh, Senior Security Manager at the Metropolitan Museum of Art in New York City, talks rising through the ranks in security leadership, external and internal security threats to cultural institutions, and more.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/CSingh-Headshot.webp?t=1681911670"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/04-19-23-AMA-Chris-Singh-podcast.mp3" type="audio/x-mp3" length="26899374"/>
      <pubDate>Wed, 19 Apr 2023 09:37:41 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/04-19-23-AMA-Chris-Singh-podcast.mp3</link>
      <itunes:duration>13:53</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:125</guid>
      <title>As data privacy gets stricter, is zero-trust the answer? </title>
      <itunes:summary>
Data privacy remains an ever-growing concern for both security leaders and governments. What regulations are being put in place? How should security leaders implement zero trust? Find out more in this Security podcast episode featuring Mark Ruchie, Chief Information Security Officer at Entrust. Mark started his security career in the Air Force and shares his thoughts on recent federal data privacy legislation.      </itunes:summary>
      <description>
        <![CDATA[Data privacy remains an ever-growing concern for both security leaders and governments. What regulations are being put in place? How should security leaders implement zero trust? Find out more in this Security podcast episode featuring Mark Ruchie, Chief Information Security Officer at Entrust. Mark started his security career in the Air Force and shares his thoughts on recent federal data privacy legislation.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Issues/2023/March/Mark-Ruchie-Headshot.webp?t=1679419151"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Mark-Ruchie-Podcast-3.22.23.mp3" type="audio/x-mp3" length="13875599"/>
      <pubDate>Tue, 21 Mar 2023 13:17:33 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/Mark-Ruchie-Podcast-3.22.23.mp3</link>
      <itunes:duration>9:36</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:124</guid>
      <title>3 ways to support women in the cybersecurity field</title>
      <itunes:summary>
In this episode from The Security Podcasts, Shikha Kothari, Principal Security Advisor at Eden Data, shares strategies for cybersecurity leaders to create supportive work environments for women, from encouraging continuing education and networking to promoting female cybersecurity professionals into leadership roles.      </itunes:summary>
      <description>
        <![CDATA[In this episode from The Security Podcasts, Shikha Kothari, Principal Security Advisor at Eden Data, shares strategies for cybersecurity leaders to create supportive work environments for women, from encouraging continuing education and networking to promoting female cybersecurity professionals into leadership roles.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Shikha-Kothari-headshot.webp?t=1678283857"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/03-07-23-Shikha-Kothari.mp3" type="audio/x-mp3" length="22335924"/>
      <pubDate>Wed, 08 Mar 2023 08:56:32 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/03-07-23-Shikha-Kothari.mp3</link>
      <itunes:duration>11:29</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:122</guid>
      <title>AMA: Supply Chain Security Leader Edition — Scott Martino</title>
      <itunes:summary>
What modern threats most often target enterprise supply chains? How has the COVID-19 pandemic affected supply chains in the long term? Scott Martino, Head of Global Supply Chain Security &amp; Intelligence at Overhaul, answers reader questions on supply chain risk management and security, from common threats to supply chains to how to communicate risk across an organization, in this AMA episode.      </itunes:summary>
      <description>
        <![CDATA[What modern threats most often target enterprise supply chains? How has the COVID-19 pandemic affected supply chains in the long term? Scott Martino, Head of Global Supply Chain Security &amp; Intelligence at Overhaul, answers reader questions on supply chain risk management and security, from common threats to supply chains to how to communicate risk across an organization, in this AMA episode.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Martino-headshot.webp?t=1677009070"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-AMA-Podcast--V1.mp3" type="audio/x-mp3" length="24418333"/>
      <pubDate>Tue, 21 Feb 2023 14:44:55 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/SEC-AMA-Podcast--V1.mp3</link>
      <itunes:duration>16:56</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:121</guid>
      <title>Prevent workplace violence with a mental health-based approach</title>
      <itunes:summary>
John Rodriguez, Director of Global Security at Cardinal Health and Founder of Empathic Security Cultures, LLC, has spent over 40 years working in the enterprise physical security space and takes a mental-health based approach to workplace violence prevention, which he describes in the latest The Security Podcasts episode.      </itunes:summary>
      <description>
        <![CDATA[John Rodriguez, Director of Global Security at Cardinal Health and Founder of Empathic Security Cultures, LLC, has spent over 40 years working in the enterprise physical security space and takes a mental-health based approach to workplace violence prevention, which he describes in the latest The Security Podcasts episode.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/podcast.webp?t=1675870490"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/02-08-23-John-Rodriguez-podcast.mp3" type="audio/x-mp3" length="32412159"/>
      <pubDate>Wed, 08 Feb 2023 10:06:09 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/02-08-23-John-Rodriguez-podcast.mp3</link>
      <itunes:duration>16:42</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:120</guid>
      <title>AMA: VP, Information Security Edition — Claudia Natanson </title>
      <itunes:summary>
In this AMA episode from Security magazine, Claudia Natanson, Vice President of Information Security at AccuWeather and Chair of the Board of Trustees of the U.K. Cyber Security Council, shares leadership and risk management advice from her cybersecurity executive career, covering the five pillars of security; how to get leadership buy-in on cyber initiatives; and the importance of mentorship in executive roles.      </itunes:summary>
      <description>
        <![CDATA[In this AMA episode from Security magazine, Claudia Natanson, Vice President of Information Security at AccuWeather and Chair of the Board of Trustees of the U.K. Cyber Security Council, shares leadership and risk management advice from her cybersecurity executive career, covering the five pillars of security; how to get leadership buy-in on cyber initiatives; and the importance of mentorship in executive roles.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Claudia-Natanson.webp?t=1674609342"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/AMA---Claudia-Natanson-1-25-23-audio-fnl.mp3" type="audio/x-mp3" length="49718149"/>
      <pubDate>Tue, 24 Jan 2023 20:11:54 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/AMA---Claudia-Natanson-1-25-23-audio-fnl.mp3</link>
      <itunes:duration>25:33</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:119</guid>
      <title>Preventing workplace violence as employees return to the office</title>
      <itunes:summary>
In recent months, more workplaces have required their employees return to a hybrid or in-person work environment, increasing the risk of physical workplace violence. Shikhar Shrestha, CEO of Ambient.ai, joins The Security Podcasts to discuss how security leaders can prevent &amp; mitigate workplace violence during this shift using a proactive approach.      </itunes:summary>
      <description>
        <![CDATA[In recent months, more workplaces have required their employees return to a hybrid or in-person work environment, increasing the risk of physical workplace violence. Shikhar Shrestha, CEO of Ambient.ai, joins The Security Podcasts to discuss how security leaders can prevent &amp; mitigate workplace violence during this shift using a proactive approach.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2023/Shikhar_Shrestha.webp?t=1674679274"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/01-11-23-shikhar-shrestha-pod-final.mp3" type="audio/x-mp3" length="25300556"/>
      <pubDate>Thu, 12 Jan 2023 10:58:56 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2023/01-11-23-shikhar-shrestha-pod-final.mp3</link>
      <itunes:duration>12:58</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:118</guid>
      <title>Analyzing the Top Data Breaches of 2022</title>
      <itunes:summary>
Associate Editor Maria Henriquez shares analysis from Security magazine’s top data breaches of 2022 report, examining the effects of largescale data breaches of Uber, Medibank and more. From the first criminal prosecution of a CSO related to a data breach to evolving government response to ransomware, Henriquez discusses cybersecurity trends and where the industry is headed.      </itunes:summary>
      <description>
        <![CDATA[Associate Editor Maria Henriquez shares analysis from Security magazine’s top data breaches of 2022 report, examining the effects of largescale data breaches of Uber, Medibank and more. From the first criminal prosecution of a CSO related to a data breach to evolving government response to ransomware, Henriquez discusses cybersecurity trends and where the industry is headed.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/the-sec-podcast.webp?t=1670425465"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Top-Data-Breaches-of-2022-(1).mp3" type="audio/x-mp3" length="16374284"/>
      <pubDate>Wed, 28 Dec 2022 09:13:47 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Top-Data-Breaches-of-2022-(1).mp3</link>
      <itunes:duration>8:21</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:117</guid>
      <title>The Cybersecurity and Geopolitical Podcast — Global Threats in 2022: Looking Back to Move Forward — Episode 13</title>
      <itunes:summary>
China, Russia, Iran and North Korea — have these global protagonists achieved success in their missions to destabilize the G19, or are the situations on their home fronts sabotaging their cyber efforts and geopolitical goals? In this Cybersecurity &amp; Geopolitical podcast episode from Security magazine, co-hosts Philip Ingram, MBE, and Ian Thornton-Trump, CD, look back at the most significant hits and misses of these threat actors in 2022. Watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[China, Russia, Iran and North Korea — have these global protagonists achieved success in their missions to destabilize the G19, or are the situations on their home fronts sabotaging their cyber efforts and geopolitical goals? In this Cybersecurity &amp; Geopolitical podcast episode from Security magazine, co-hosts Philip Ingram, MBE, and Ian Thornton-Trump, CD, look back at the most significant hits and misses of these threat actors in 2022. Watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Cyber--Geo-episode-13-podcast.mp3" type="audio/x-mp3" length="54586532"/>
      <pubDate>Tue, 20 Dec 2022 10:49:21 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Cyber--Geo-episode-13-podcast.mp3</link>
      <itunes:duration>28:08</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:116</guid>
      <title>Security’s Editorial Fireside Chat 2022</title>
      <itunes:summary>
Security magazine’s Editor in Chief Maggie Shein, Associate Editor Maria Henriquez, and Assistant Editor Madeline Lauver share industry stories and behind-the-scenes insights from 2022, covering topics such as hiring &amp; retention; leadership &amp; risk management; an in-depth look at casino security; what’s on the horizon of cybersecurity; and much more. Find a list of all articles mentioned in this episode here.      </itunes:summary>
      <description>
        <![CDATA[Security magazine’s Editor in Chief Maggie Shein, Associate Editor Maria Henriquez, and Assistant Editor Madeline Lauver share industry stories and behind-the-scenes insights from 2022, covering topics such as hiring &amp; retention; leadership &amp; risk management; an in-depth look at casino security; what’s on the horizon of cybersecurity; and much more. Find a list of all articles mentioned in this episode here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/the-sec-podcast.webp?t=1670425465"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/SEC-Podcast---12-7-22.mp3" type="audio/x-mp3" length="34542457"/>
      <pubDate>Wed, 07 Dec 2022 09:59:08 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/SEC-Podcast---12-7-22.mp3</link>
      <itunes:duration>23:58</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:115</guid>
      <title>Organizational culture is a cybersecurity problem</title>
      <itunes:summary>
In this The Security Podcasts episode, Kevin A. McGrail, Cloud Fellow at Dito, talks three factors that contribute to the cybersecurity workforce gap, including burnout, hiring and retention challenges. McGrail shares cybersecurity training advice from his nearly 30-year career in IT security, from the importance of organizational security awareness to how entry- and mid-level cyber professionals can further their careers with education.      </itunes:summary>
      <description>
        <![CDATA[In this The Security Podcasts episode, Kevin A. McGrail, Cloud Fellow at Dito, talks three factors that contribute to the cybersecurity workforce gap, including burnout, hiring and retention challenges. McGrail shares cybersecurity training advice from his nearly 30-year career in IT security, from the importance of organizational security awareness to how entry- and mid-level cyber professionals can further their careers with education.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/kam_headshot.webp?t=1669820406"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Issues/2022/NOV/SEC-Sponsored-Podcast-Dito-Mixdown-1.mp3" type="audio/x-mp3" length="19875532"/>
      <pubDate>Wed, 30 Nov 2022 09:35:16 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Issues/2022/NOV/SEC-Sponsored-Podcast-Dito-Mixdown-1.mp3</link>
      <itunes:duration>13:49</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:114</guid>
      <title>AMA: Retail Security Leader Edition — Hector Erazo </title>
      <itunes:summary>
Retail security veteran Hector Erazo answers risk management questions from Security magazine readers in this AMA episode. Erazo talks how retail security tech has evolved over the decades; explores the importance of diversity in retail security; and shares his thoughts on 2023 organized retail crime threats.      </itunes:summary>
      <description>
        <![CDATA[Retail security veteran Hector Erazo answers risk management questions from Security magazine readers in this AMA episode. Erazo talks how retail security tech has evolved over the decades; explores the importance of diversity in retail security; and shares his thoughts on 2023 organized retail crime threats.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/hector-erazo.webp?t=1668608381"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/AMA-Hector-Erazo-podcast-fnl.mp3" type="audio/x-mp3" length="44598151"/>
      <pubDate>Wed, 16 Nov 2022 09:14:43 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/AMA-Hector-Erazo-podcast-fnl.mp3</link>
      <itunes:duration>22:53</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:113</guid>
      <title>Closing the Cybersecurity Talent Gap</title>
      <itunes:summary>
In this episode of The Security Podcasts, Lisa Tetrault, Senior Director of Global Security Operations at Arctic Wolf, talks specific examples of how cybersecurity talent can leverage industry connections to break into the cyber field; the power of mentorship in cybersecurity; and advice for professionals looking to pivot to IT security.      </itunes:summary>
      <description>
        <![CDATA[In this episode of The Security Podcasts, Lisa Tetrault, Senior Director of Global Security Operations at Arctic Wolf, talks specific examples of how cybersecurity talent can leverage industry connections to break into the cyber field; the power of mentorship in cybersecurity; and advice for professionals looking to pivot to IT security.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/LisaTetraultbyKWHeadshots-7.webp?t=1667394784"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Issues/2022/NOV/Lisa-Tetrault-podcast-final-11-02-22.mp3" type="audio/x-mp3" length="25101214"/>
      <pubDate>Wed, 02 Nov 2022 09:04:17 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Issues/2022/NOV/Lisa-Tetrault-podcast-final-11-02-22.mp3</link>
      <itunes:duration></itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:112</guid>
      <title>AMA: Security Architect Edition — Joel Dunning</title>
      <itunes:summary>
Joel Dunning, architect and security design expert, answers reader questions about mitigating risk through secure facility design. Dunning, who is a Partner and Government Planning Group Leader at Wold Architects and Engineers, talks gaining community security buy-in; toeing the line between overt and covert security; and candid stories from facilities he’s helped secure.      </itunes:summary>
      <description>
        <![CDATA[Joel Dunning, architect and security design expert, answers reader questions about mitigating risk through secure facility design. Dunning, who is a Partner and Government Planning Group Leader at Wold Architects and Engineers, talks gaining community security buy-in; toeing the line between overt and covert security; and candid stories from facilities he’s helped secure.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Issues/2022/oct/Podcast-thumbnail---Joel-Dunning.webp?t=1666143660"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast---Final-AMA-Joel-Dunning.mp3" type="audio/x-mp3" length="33535544"/>
      <pubDate>Tue, 18 Oct 2022 21:36:40 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast---Final-AMA-Joel-Dunning.mp3</link>
      <itunes:duration>23:16</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:111</guid>
      <title>The Top Security Threats Leaders Must Prepare for in 2023</title>
      <itunes:summary>
Mark Herrington, CEO of OnSolve, joins The Security Podcasts to discuss the top security threats leaders must prepare for in 2023, including extreme weather events, crime, supply chain disruptions, geopolitical threats and more.      </itunes:summary>
      <description>
        <![CDATA[Mark Herrington, CEO of OnSolve, joins The Security Podcasts to discuss the top security threats leaders must prepare for in 2023, including extreme weather events, crime, supply chain disruptions, geopolitical threats and more.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/Mark-Herrington-re.webp?t=1664999810"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast---V1.mp3" type="audio/x-mp3" length="12596627"/>
      <pubDate>Wed, 05 Oct 2022 15:54:29 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast---V1.mp3</link>
      <itunes:duration>8:43</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:110</guid>
      <title>CISOs should prioritize securing business innovation</title>
      <itunes:summary>
In the latest episode from The Security Podcasts, Rich Foltak, Chief Information Security Officer (CISO) at Dito, discusses the critical role security plays in business innovation and how cybersecurity teams need to shift from a "No" to a "Yes" function. As the pace of software development quickens, cybersecurity teams need to meet DevOps teams where they are in terms of technology and business innovation.      </itunes:summary>
      <description>
        <![CDATA[In the latest episode from The Security Podcasts, Rich Foltak, Chief Information Security Officer (CISO) at Dito, discusses the critical role security plays in business innovation and how cybersecurity teams need to shift from a "No" to a "Yes" function. As the pace of software development quickens, cybersecurity teams need to meet DevOps teams where they are in terms of technology and business innovation.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/Foltak-headshot.webp?t=1663765777"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-sponsored-podcast_Rich-Foltak.mp3" type="audio/x-mp3" length="21553773"/>
      <pubDate>Wed, 21 Sep 2022 09:05:07 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-sponsored-podcast_Rich-Foltak.mp3</link>
      <itunes:duration>14:57</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:109</guid>
      <title>AMA: Security Executive Edition — Mary Gates</title>
      <itunes:summary>
In this Ask Me Anything episode, Mary Gates, President at safety consultancy GMR 410 and former global security executive at JP Morgan Chase, shares career advice from her experience in top security leadership positions, including when to conduct risk assessments, how to get the budget you need, and why integrity, decisiveness and relationship building are integral to successful security management.      </itunes:summary>
      <description>
        <![CDATA[In this Ask Me Anything episode, Mary Gates, President at safety consultancy GMR 410 and former global security executive at JP Morgan Chase, shares career advice from her experience in top security leadership positions, including when to conduct risk assessments, how to get the budget you need, and why integrity, decisiveness and relationship building are integral to successful security management.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/Podcast-thumbnail---Mary-Gates.webp?t=1662558871"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/09-07-22-AMA-Mary-Gates-podcast.mp3" type="audio/x-mp3" length="50089069"/>
      <pubDate>Wed, 07 Sep 2022 09:52:59 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/09-07-22-AMA-Mary-Gates-podcast.mp3</link>
      <itunes:duration>25:46</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:108</guid>
      <title>The Cybersecurity and Geopolitical Podcast — What Do the Trickbot Leaks Reveal About Russian Cybercrime? — Episode 12</title>
      <itunes:summary>
In this Cybersecurity &amp; Geopolitical Podcast episode presented by Security magazine, Cyjax CISO Ian Thornton-Trump and Grey Hare Media CEO Philip Ingram, MBE, are joined by Cyjax Cyber Threat Intelligence Analyst Joe Wrieden, author of a report analyzing leaked information to determine how the Trickbot malware group operates. The trio discusses what they dub "cybercrime 2.0" and contextualizes the Trickbot leaks within the ongoing Russian invasion of Ukraine.You can watch the video version  here.       </itunes:summary>
      <description>
        <![CDATA[In this Cybersecurity &amp; Geopolitical Podcast episode presented by Security magazine, Cyjax CISO Ian Thornton-Trump and Grey Hare Media CEO Philip Ingram, MBE, are joined by Cyjax Cyber Threat Intelligence Analyst Joe Wrieden, author of a report analyzing leaked information to determine how the Trickbot malware group operates. The trio discusses what they dub "cybercrime 2.0" and contextualizes the Trickbot leaks within the ongoing Russian invasion of Ukraine.You can watch the video version  here. ]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Cyber-&amp;-Geo---August-31-2022.mp3" type="audio/x-mp3" length="65613100"/>
      <pubDate>Wed, 31 Aug 2022 10:01:52 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Cyber-&amp;-Geo---August-31-2022.mp3</link>
      <itunes:duration>33:53</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:107</guid>
      <title>Best practices for cryptocurrency fraud investigations</title>
      <itunes:summary>
Matt Price, Head of Intelligence and Investigations, Americas at Binance and former Special Agent with the IRS discusses his experience using digital forensics to investigate cryptocurrency fraud and financial crimes. In this Security magazine podcast episode, Price shares tips for enterprise security leaders securing crypto transactions in their organizations.      </itunes:summary>
      <description>
        <![CDATA[Matt Price, Head of Intelligence and Investigations, Americas at Binance and former Special Agent with the IRS discusses his experience using digital forensics to investigate cryptocurrency fraud and financial crimes. In this Security magazine podcast episode, Price shares tips for enterprise security leaders securing crypto transactions in their organizations.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/podcast-8-24.webp?t=1661346695"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-Price-Final.mp3" type="audio/x-mp3" length="18816021"/>
      <pubDate>Mon, 22 Aug 2022 15:44:32 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-Price-Final.mp3</link>
      <itunes:duration>13:03</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:106</guid>
      <title>AMA: Cybersecurity Leader Edition — Meg West</title>
      <itunes:summary>
Security magazine sits down with Meg West, cybersecurity influencer and X-Force Cybersecurity Incident Response Consultant, to answer reader questions about cybersecurity strategy, career moves and emerging threats. Listen to this AMA (Ask Me Anything) series premiere for cyberattack insights, a candid conversation about burnout and more!      </itunes:summary>
      <description>
        <![CDATA[Security magazine sits down with Meg West, cybersecurity influencer and X-Force Cybersecurity Incident Response Consultant, to answer reader questions about cybersecurity strategy, career moves and emerging threats. Listen to this AMA (Ask Me Anything) series premiere for cyberattack insights, a candid conversation about burnout and more!]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/Podcast-thumbnail---Meg-West.webp?t=1660137218"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/08-10-22-AMA-Meg-West-podcast-Final.mp3" type="audio/x-mp3" length="34915888"/>
      <pubDate>Wed, 10 Aug 2022 09:12:26 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/08-10-22-AMA-Meg-West-podcast-Final.mp3</link>
      <itunes:duration>24:43</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:105</guid>
      <title>The Drawbacks of Facial Recognition Technology</title>
      <itunes:summary>
Tom Thimot, CEO of authID.ai, joins The Security Podcasts to discuss the concerns raised around ID.me’s technology, where they went wrong with the IRS, and the drawbacks of facial recognition technology.       </itunes:summary>
      <description>
        <![CDATA[Tom Thimot, CEO of authID.ai, joins The Security Podcasts to discuss the concerns raised around ID.me’s technology, where they went wrong with the IRS, and the drawbacks of facial recognition technology. ]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/Thimot.webp?t=1658953837"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-July-25-Final.mp3" type="audio/x-mp3" length="17093660"/>
      <pubDate>Wed, 27 Jul 2022 16:28:35 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-July-25-Final.mp3</link>
      <itunes:duration>11:51</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:104</guid>
      <title>How to Avoid Common Cybersecurity Vulnerabilities</title>
      <itunes:summary>
Erez Yalon, Vice President of Security Research at Checkmarx, talks how security leaders can avoid common cybersecurity vulnerabilities found across the enterprise cyber landscape. What makes security research important? How can security researchers ensure successful cybersecurity innovations? Discover answers to these questions and more in the latest The Security Podcasts episode.      </itunes:summary>
      <description>
        <![CDATA[Erez Yalon, Vice President of Security Research at Checkmarx, talks how security leaders can avoid common cybersecurity vulnerabilities found across the enterprise cyber landscape. What makes security research important? How can security researchers ensure successful cybersecurity innovations? Discover answers to these questions and more in the latest The Security Podcasts episode.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/erez-yalon.webp?t=1657740280"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Erez-Yalon-SEC-Podcast.mp3" type="audio/x-mp3" length="18828297"/>
      <pubDate>Wed, 13 Jul 2022 15:21:06 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Erez-Yalon-SEC-Podcast.mp3</link>
      <itunes:duration>13:04</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:103</guid>
      <title>Why Current Security Approaches Do Not Protect Supply Chains</title>
      <itunes:summary>
Why are supply chains increasingly vulnerable? Why are current security approaches not working? We sit down with Ev Kontsevoy, CEO and co-founder of Teleport, to discuss this complex problem, as well as how securing machine-to-machine communication can help keep supply chains safe.       </itunes:summary>
      <description>
        <![CDATA[Why are supply chains increasingly vulnerable? Why are current security approaches not working? We sit down with Ev Kontsevoy, CEO and co-founder of Teleport, to discuss this complex problem, as well as how securing machine-to-machine communication can help keep supply chains safe. ]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/Ev-Kontsevoy.webp?t=1656616468"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-Final.mp3" type="audio/x-mp3" length="25012205"/>
      <pubDate>Thu, 30 Jun 2022 15:13:27 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-Final.mp3</link>
      <itunes:duration>17:21</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:102</guid>
      <title>Understanding the Patchwork of US Data Privacy Laws</title>
      <itunes:summary>
Which states are passing data privacy legislation? What privacy rights do the bills include? Is a federal data privacy law on the way? Find out the answers to these questions and more in this Security podcast episode featuring Bill Tolson, Vice President of Global Compliance and eDiscovery at Archive360.      </itunes:summary>
      <description>
        <![CDATA[Which states are passing data privacy legislation? What privacy rights do the bills include? Is a federal data privacy law on the way? Find out the answers to these questions and more in this Security podcast episode featuring Bill Tolson, Vice President of Global Compliance and eDiscovery at Archive360.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/tolson.webp?t=1655150868"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Issues/2022/June/Security-Podcast-Tolson-Final.mp3" type="audio/x-mp3" length="31245797"/>
      <pubDate>Mon, 13 Jun 2022 16:03:38 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Issues/2022/June/Security-Podcast-Tolson-Final.mp3</link>
      <itunes:duration>21:41</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:101</guid>
      <title>AI, Analytics and Data Privacy: Security Trends for 2022</title>
      <itunes:summary>
Larry Newman of Axis Communications sits down with Security magazine to discuss a much-talked about trend in physical security this year: artificial intelligence and analytics. Is technology finally in a place to add value to security functions while enabling and ensuring continuity and efficiency? Where does privacy fit in to all of this?      </itunes:summary>
      <description>
        <![CDATA[Larry Newman of Axis Communications sits down with Security magazine to discuss a much-talked about trend in physical security this year: artificial intelligence and analytics. Is technology finally in a place to add value to security functions while enabling and ensuring continuity and efficiency? Where does privacy fit in to all of this?]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/security-podcasts-image.webp?t=1654696440"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-V1.mp3" type="audio/x-mp3" length="12513706"/>
      <pubDate>Wed, 08 Jun 2022 09:52:48 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-V1.mp3</link>
      <itunes:duration>8:40</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:97</guid>
      <title>The Psychological Impacts of Cyberattacks and How to Mitigate Long-Term Repercussions</title>
      <itunes:summary>
Bec McKeown, Immersive Labs’ Director of Human Science has been researching impacts of security and crisis response, and electronic warfare for more than 15 years. Security magazine sits down with McKeown to explore the mental health/psychological impacts (and beyond) of cybersecurity incidents. McKeown also shares valuable research-backed insights into mitigating long-term negative repercussions of security events, as well as how security leaders can prepare for the future.      </itunes:summary>
      <description>
        <![CDATA[Bec McKeown, Immersive Labs’ Director of Human Science has been researching impacts of security and crisis response, and electronic warfare for more than 15 years. Security magazine sits down with McKeown to explore the mental health/psychological impacts (and beyond) of cybersecurity incidents. McKeown also shares valuable research-backed insights into mitigating long-term negative repercussions of security events, as well as how security leaders can prepare for the future.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/Untitled.webp?t=1653509825"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-Beck-Final.mp3" type="audio/x-mp3" length="22975674"/>
      <pubDate>Wed, 25 May 2022 15:42:39 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-Beck-Final.mp3</link>
      <itunes:duration>15:56</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:96</guid>
      <title>Communicating Risk to the C-Suite</title>
      <itunes:summary>
Chaim Mazal, Chief Information Security Officer (CISO) and Senior Vice President of Technology at Kandji, talks the increase in fraud during the COVID-19 pandemic and how security leaders can communicate risk in the boardroom. Uncover best practices for C-suite security conversations and fraud prevention in this Security podcast episode.      </itunes:summary>
      <description>
        <![CDATA[Chaim Mazal, Chief Information Security Officer (CISO) and Senior Vice President of Technology at Kandji, talks the increase in fraud during the COVID-19 pandemic and how security leaders can communicate risk in the boardroom. Uncover best practices for C-suite security conversations and fraud prevention in this Security podcast episode.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/mazal.webp?t=1652800929"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Chaim-Mazal-podcast-05-18-22.mp3" type="audio/x-mp3" length="25144640"/>
      <pubDate>Tue, 17 May 2022 11:21:36 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Chaim-Mazal-podcast-05-18-22.mp3</link>
      <itunes:duration>12:58</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:95</guid>
      <title>The Cybersecurity and Geopolitical Podcast — State of the Ukraine Conflict: Russia Amps up Propaganda — Episode 11</title>
      <itunes:summary>
In this episode, Cyjax Chief Information Security Officer (CISO) Ian Thornton-Trump, CD, is joined by Grey Hare Media’s Philip Ingram, MBE, to discuss the current state of the Ukraine conflict. The security leaders cover the latest developments in Russia’s land forces, the failures of the country’s Navy, the ineffectiveness of the Russian Airforce and the seeming lack of fruition when it comes to security industry speculations of wide-scale cyber warfare.You can watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[In this episode, Cyjax Chief Information Security Officer (CISO) Ian Thornton-Trump, CD, is joined by Grey Hare Media’s Philip Ingram, MBE, to discuss the current state of the Ukraine conflict. The security leaders cover the latest developments in Russia’s land forces, the failures of the country’s Navy, the ineffectiveness of the Russian Airforce and the seeming lack of fruition when it comes to security industry speculations of wide-scale cyber warfare.You can watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Cyjax-Security-Podcast-05-22-audio-version.mp3" type="audio/x-mp3" length="66988547"/>
      <pubDate>Mon, 09 May 2022 08:22:21 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Cyjax-Security-Podcast-05-22-audio-version.mp3</link>
      <itunes:duration>34:37</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:94</guid>
      <title>How to Lead a Completely Remote Security Team</title>
      <itunes:summary>
Whether an organization's security team went remote during the COVID-19 pandemic or it was designed to be remote from the start, there are many steps security leaders can take to ensure their remote security teams operate to their full potential. Attila Török, Head of Security at Zapier, talks the transparency, access control and communication skills necessary for security to succeed in a remote working environment.      </itunes:summary>
      <description>
        <![CDATA[Whether an organization's security team went remote during the COVID-19 pandemic or it was designed to be remote from the start, there are many steps security leaders can take to ensure their remote security teams operate to their full potential. Attila Török, Head of Security at Zapier, talks the transparency, access control and communication skills necessary for security to succeed in a remote working environment.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/Attila-Török.webp?t=1651680770"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Attila-T%C3%B6r%C3%B6k-podcast-5-4-22-Final.mp3" type="audio/x-mp3" length="17841208"/>
      <pubDate>Wed, 04 May 2022 12:04:56 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Attila-T%C3%B6r%C3%B6k-podcast-5-4-22-Final.mp3</link>
      <itunes:duration>12:22</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:93</guid>
      <title>The Ins and Outs of Cyber Insurance</title>
      <itunes:summary>
What does cyber insurance cover? Should an organization facing ransomware pay the ransom? Get answers to these cybersecurity questions in this Security podcast episode featuring Rich Gatz, cyber insurance Claims Counsel at Coalition. Gatz dives into the common causes of data breaches and cyber insurance claims.      </itunes:summary>
      <description>
        <![CDATA[What does cyber insurance cover? Should an organization facing ransomware pay the ransom? Get answers to these cybersecurity questions in this Security podcast episode featuring Rich Gatz, cyber insurance Claims Counsel at Coalition. Gatz dives into the common causes of data breaches and cyber insurance claims.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/Rich-Gatz.webp?t=1650391609"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-Gatz-Final.mp3" type="audio/x-mp3" length="19038975"/>
      <pubDate>Tue, 19 Apr 2022 14:05:54 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2022/Security-Podcast-Gatz-Final.mp3</link>
      <itunes:duration>13:12</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:92</guid>
      <title>School Shootings and Violence Prevention</title>
      <itunes:summary>
Dr. Marisa Randazzo, Executive Director of the Ontic Center of Excellence, talks about the rise in school shootings over the past several years and discusses security lessons learned and strategies for violence prevention.      </itunes:summary>
      <description>
        <![CDATA[Dr. Marisa Randazzo, Executive Director of the Ontic Center of Excellence, talks about the rise in school shootings over the past several years and discusses security lessons learned and strategies for violence prevention.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2022/secpodcastrandazzo.webp?t=1649258151"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Security-podcast.mp3" type="audio/x-mp3" length="10499970"/>
      <pubDate>Wed, 06 Apr 2022 11:15:03 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Security-podcast.mp3</link>
      <itunes:duration>10:56</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:91</guid>
      <title>Striving for Diverse Leadership in Risk Management</title>
      <itunes:summary>
Arti Lalwani, Risk Management and Privacy Knowledge Leader at A-LIGN, talks her untraditional path into the technology security field. Lalwani looks for ambition and attention to detail when hiring security professionals, and she reflects on her journey as a woman of color in cybersecurity and climbing the leadership ladder of risk management, auditing and data privacy.      </itunes:summary>
      <description>
        <![CDATA[Arti Lalwani, Risk Management and Privacy Knowledge Leader at A-LIGN, talks her untraditional path into the technology security field. Lalwani looks for ambition and attention to detail when hiring security professionals, and she reflects on her journey as a woman of color in cybersecurity and climbing the leadership ladder of risk management, auditing and data privacy.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/artiprofile.webp?t=1648038239"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Arti-Lalwani-pod-v2-3-23-22.mp3" type="audio/x-mp3" length="18669554"/>
      <pubDate>Wed, 23 Mar 2022 08:19:12 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Arti-Lalwani-pod-v2-3-23-22.mp3</link>
      <itunes:duration>9:36</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:90</guid>
      <title>The Cybersecurity and Geopolitical Podcast — Learning From the Past: Russia, Ukraine &amp; the Middle East — Episode 10</title>
      <itunes:summary>
Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax, and Philip Ingram, CEO of Grey Hare Media, take a close look at the Russian invasion of Ukraine through the lens of conflict in the Middle East in the tenth episode of The Cybersecurity and Geopolitical Podcast presented by Security magazine. From determining Russia’s current trajectory in Ukraine via the nation’s playbook in Syria to comparing the root of Russia’s border aggression, the security leaders draw parallels between the invasion and previous events in the Middle Eastern region.You can watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax, and Philip Ingram, CEO of Grey Hare Media, take a close look at the Russian invasion of Ukraine through the lens of conflict in the Middle East in the tenth episode of The Cybersecurity and Geopolitical Podcast presented by Security magazine. From determining Russia’s current trajectory in Ukraine via the nation’s playbook in Syria to comparing the root of Russia’s border aggression, the security leaders draw parallels between the invasion and previous events in the Middle Eastern region.You can watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyber-&amp;-Geo-March-audio-podcast.mp3" type="audio/x-mp3" length="51098418"/>
      <pubDate>Mon, 21 Mar 2022 13:33:22 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyber-&amp;-Geo-March-audio-podcast.mp3</link>
      <itunes:duration>26:27</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:89</guid>
      <title>CISO Burnout: Setting Boundaries and Accountability</title>
      <itunes:summary>
Josh Yavor, Chief Information Security Officer (CISO) at Tessian, talks about the “leap-of-faith” decision he made four years ago that helped address his own feelings of burnout, and how CISOs can lead by example.       </itunes:summary>
      <description>
        <![CDATA[Josh Yavor, Chief Information Security Officer (CISO) at Tessian, talks about the “leap-of-faith” decision he made four years ago that helped address his own feelings of burnout, and how CISOs can lead by example. ]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/podcast.webp?t=1646839350"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast-3.mp3" type="audio/x-mp3" length="21204519"/>
      <pubDate>Wed, 09 Mar 2022 10:18:53 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast-3.mp3</link>
      <itunes:duration>14:43</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:88</guid>
      <title>Building a Seamless Cybersecurity Strategy</title>
      <itunes:summary>
After decades of building security operations centers (SOCs) and developing enterprise cybersecurity programs, Sumo Logic Chief Security Officer (CSO) George Gerchow reflects on how best to instill a security-minded culture in an organization. Transparency, security technology and working within a business's risk appetite are all building blocks of a seamless enterprise cybersecurity strategy.      </itunes:summary>
      <description>
        <![CDATA[After decades of building security operations centers (SOCs) and developing enterprise cybersecurity programs, Sumo Logic Chief Security Officer (CSO) George Gerchow reflects on how best to instill a security-minded culture in an organization. Transparency, security technology and working within a business's risk appetite are all building blocks of a seamless enterprise cybersecurity strategy.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/george.webp?t=1645632823"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast-Gerchow-Final.mp3" type="audio/x-mp3" length="15687905"/>
      <pubDate>Wed, 23 Feb 2022 11:10:57 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast-Gerchow-Final.mp3</link>
      <itunes:duration>10:53</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:87</guid>
      <title>Eliminating Security Vulnerabilities and Preventing Cyber Burnout</title>
      <itunes:summary>
Karen Worstell, Senior Cybersecurity Strategist at VMware, talks how best to mitigate and respond to burnout in security careers. Drawing from her own experience as Chief Information Security Officer (CISO) at Microsoft and AT&amp;T, Worstell discusses her career accomplishments as a security executive and how cyber leaders can manage burnout in their organizations.      </itunes:summary>
      <description>
        <![CDATA[Karen Worstell, Senior Cybersecurity Strategist at VMware, talks how best to mitigate and respond to burnout in security careers. Drawing from her own experience as Chief Information Security Officer (CISO) at Microsoft and AT&amp;T, Worstell discusses her career accomplishments as a security executive and how cyber leaders can manage burnout in their organizations.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/karen1.webp?t=1644421355"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast-Feb-2022-Final.mp3" type="audio/x-mp3" length="18639417"/>
      <pubDate>Wed, 09 Feb 2022 10:37:02 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast-Feb-2022-Final.mp3</link>
      <itunes:duration>12:55</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:86</guid>
      <title>The Cybersecurity and Geopolitical Podcast — Russia: The Global Protagonist — Episode 9</title>
      <itunes:summary>
Security magazine presents the latest episode of The Cybersecurity and Geopolitical Podcast — Russia: The Global Protagonist. Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax and Gareth Corfield, Security and Legal Correspondent at The Register, review the current conflict between Russia and Ukraine and discuss the ongoing “cyber war” in the region. This entertaining and illuminating episode spotlights the latest challenges and intriguing flashpoints within the cybersecurity and geopolitical landscape for enterprise security and risk professionals. You can watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[Security magazine presents the latest episode of The Cybersecurity and Geopolitical Podcast — Russia: The Global Protagonist. Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax and Gareth Corfield, Security and Legal Correspondent at The Register, review the current conflict between Russia and Ukraine and discuss the ongoing “cyber war” in the region. This entertaining and illuminating episode spotlights the latest challenges and intriguing flashpoints within the cybersecurity and geopolitical landscape for enterprise security and risk professionals. You can watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Security-Podcast-01-22-Audio-Version.mp3" type="audio/x-mp3" length="45210471"/>
      <pubDate>Wed, 02 Feb 2022 07:32:06 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Security-Podcast-01-22-Audio-Version.mp3</link>
      <itunes:duration>23:10</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:85</guid>
      <title>Advancing the Mission of OSAC &amp; Diplomatic Security</title>
      <itunes:summary>
Ellen Tannor, new Executive Director at the Overseas Security Advisory Council (OSAC), tells Security about her journey into security and diplomacy, the ambitions she has for OSAC and its growth, advice for advancing security careers and more!      </itunes:summary>
      <description>
        <![CDATA[Ellen Tannor, new Executive Director at the Overseas Security Advisory Council (OSAC), tells Security about her journey into security and diplomacy, the ambitions she has for OSAC and its growth, advice for advancing security careers and more!]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/EllenTannorPodcast.webp?t=1643203005"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast---V3.mp3" type="audio/x-mp3" length="26486418"/>
      <pubDate>Wed, 26 Jan 2022 08:13:15 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast---V3.mp3</link>
      <itunes:duration>18:23</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:84</guid>
      <title> Implementing Vaccine and Testing Mandates at the Enterprise</title>
      <itunes:summary>
As organizations continue to follow through with and look to implement vaccine and testing mandates for COVID-19, considerations include processes, procedures, communication with employees and verification. Here, we sit down with Andrew Morton, CEO of Bloom Health partners to discuss the challenges and considerations.      </itunes:summary>
      <description>
        <![CDATA[As organizations continue to follow through with and look to implement vaccine and testing mandates for COVID-19, considerations include processes, procedures, communication with employees and verification. Here, we sit down with Andrew Morton, CEO of Bloom Health partners to discuss the challenges and considerations.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/podcastauthor.webp?t=1642598198"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/thumb/Security-Podcast-January-Final.mp3" type="audio/x-mp3" length="15058509"/>
      <pubDate>Wed, 19 Jan 2022 08:08:32 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/thumb/Security-Podcast-January-Final.mp3</link>
      <itunes:duration>10:27</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:83</guid>
      <title>Maureen Rush and Mitigating Burnout in Higher Ed Security</title>
      <itunes:summary>
Maureen Rush, who recently "semi-retired" from her role as Vice President for Public Safety and Superintendent of Police at the University of Pennsylvania, discusses what it takes to be a successful security leader in higher education; the many facets of her more than four decades working in the security field; and opening doors for women in law enforcement.      </itunes:summary>
      <description>
        <![CDATA[Maureen Rush, who recently "semi-retired" from her role as Vice President for Public Safety and Superintendent of Police at the University of Pennsylvania, discusses what it takes to be a successful security leader in higher education; the many facets of her more than four decades working in the security field; and opening doors for women in law enforcement.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/maureenRush.webp?t=1641998598"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast-Rush-V1.mp3" type="audio/x-mp3" length="14707161"/>
      <pubDate>Wed, 12 Jan 2022 09:36:09 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/Security-Podcast-Rush-V1.mp3</link>
      <itunes:duration>10:12</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:82</guid>
      <title>The Cybersecurity and Geopolitical Podcast — China’s Role in Cybersecurity: Opportunity, Manufacturer or Threat? — Episode 8</title>
      <itunes:summary>

  In the eighth installment of The Cybersecurity and Geopolitical Podcast, Ian Thornton-Trump (Chief Information Security Officer at Cyjax), Gavin Greenwood (Senior Analyst at A2 Global Risk) and Joe Frederick (Managing Editor at A2 Global Risk) discuss the state of cyber development in China, from an overview of the nation’s political climate to cyber manufacturing today. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape.




  You can watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[
  In the eighth installment of The Cybersecurity and Geopolitical Podcast, Ian Thornton-Trump (Chief Information Security Officer at Cyjax), Gavin Greenwood (Senior Analyst at A2 Global Risk) and Joe Frederick (Managing Editor at A2 Global Risk) discuss the state of cyber development in China, from an overview of the nation’s political climate to cyber manufacturing today. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape.




  You can watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/video/Cyjax-Security-Audio-Podcast-12-21-.m4a" type="audio/x-mp3" length="25945958"/>
      <pubDate>Thu, 30 Dec 2021 10:24:12 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/video/Cyjax-Security-Audio-Podcast-12-21-.m4a</link>
      <itunes:duration>30:20</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:81</guid>
      <title>Michael Welch and the Perils of Fourth-Party Cyber Risk</title>
      <itunes:summary>
Welch, Managing Director of Strategy and Risk at MorganFranklin Consulting, talks to Security about his approach to mitigating the perils of fourth-party cybersecurity risk and how to address supply chain security.      </itunes:summary>
      <description>
        <![CDATA[Welch, Managing Director of Strategy and Risk at MorganFranklin Consulting, talks to Security about his approach to mitigating the perils of fourth-party cybersecurity risk and how to address supply chain security.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/images/mike.webp?t=1640716501"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Security-Podcast-Dec-29-V2.mp3" type="audio/x-mp3" length="12789914"/>
      <pubDate>Tue, 28 Dec 2021 13:03:40 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Security-Podcast-Dec-29-V2.mp3</link>
      <itunes:duration>8:52</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:80</guid>
      <title>Pamela Perini and the Process of Risk Assessment: Women in Security Edition</title>
      <itunes:summary>
 Pamela Perini, certified PSP and president of her own consulting firm, talks to Security about the process of risk assessment and the important of certification in security program design.      </itunes:summary>
      <description>
        <![CDATA[ Pamela Perini, certified PSP and president of her own consulting firm, talks to Security about the process of risk assessment and the important of certification in security program design.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/images/thumb/secauthorpodcast.webp?t=1639573449"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/WISPamelaPeriniFinalCut.mp3" type="audio/x-mp3" length="25301004"/>
      <pubDate>Wed, 15 Dec 2021 07:56:49 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/WISPamelaPeriniFinalCut.mp3</link>
      <itunes:duration>18:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:78</guid>
      <title>Teresa Shea, Vice President of Cyber at Raytheon Intelligence &amp; Space: Women in Security Edition</title>
      <itunes:summary>
Teresa Shea, Vice President of Cyber Offense and Defense at Raytheon Intelligence and Space, talks to Security about her journey in the industry and staying on top of security threats. She discusses the overlap between national and enterprise threats and offers ways to avoid cyberattacks.      </itunes:summary>
      <description>
        <![CDATA[Teresa Shea, Vice President of Cyber Offense and Defense at Raytheon Intelligence and Space, talks to Security about her journey in the industry and staying on top of security threats. She discusses the overlap between national and enterprise threats and offers ways to avoid cyberattacks.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/TeresaHeadshot1.webp?t=1638380193"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/WISTeresaSheaFinalCut.mp3" type="audio/x-mp3" length="19994892"/>
      <pubDate>Wed, 01 Dec 2021 08:50:28 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/WISTeresaSheaFinalCut.mp3</link>
      <itunes:duration>13:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:77</guid>
      <title>Women in Security Edition: Stephanie Jaros, Director of Research, DoD’s Counter-Insider Threat Program</title>
      <itunes:summary>
Stephanie Jaros, Director of Research for the U.S. Department of Defense’s (DoD) counter-insider threat program, talks to Security about the integration of human and behavioral sciences into DoD’s program, as well as the importance of timeline when it comes to identifying and mitigating insider risk.      </itunes:summary>
      <description>
        <![CDATA[Stephanie Jaros, Director of Research for the U.S. Department of Defense’s (DoD) counter-insider threat program, talks to Security about the integration of human and behavioral sciences into DoD’s program, as well as the importance of timeline when it comes to identifying and mitigating insider risk.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/2021/11/main.webp?t=1637161803"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Issues/2021/november/WISStephanieJarosFinalCut.mp3" type="audio/x-mp3" length="22031545"/>
      <pubDate>Wed, 17 Nov 2021 09:16:22 -0500</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Issues/2021/november/WISStephanieJarosFinalCut.mp3</link>
      <itunes:duration>15:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:76</guid>
      <title>Women in Security Edition: Elizabeth Rice, Senior VP, Blackstone Consulting</title>
      <itunes:summary>
Elizabeth Rice, senior vice president of business operations and strategy at Blackstone Consulting, sits down with Security’s Layan Dahhan to talk about her career journey and the importance of culture in the workplace. She says inclusion and diversity are the marks of great leadership, and encourages leaders to take every opportunity to build an empathy-based culture.      </itunes:summary>
      <description>
        <![CDATA[Elizabeth Rice, senior vice president of business operations and strategy at Blackstone Consulting, sits down with Security’s Layan Dahhan to talk about her career journey and the importance of culture in the workplace. She says inclusion and diversity are the marks of great leadership, and encourages leaders to take every opportunity to build an empathy-based culture.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/ER2.webp?t=1635954219"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/WISElizabethRice11012021.mp3" type="audio/x-mp3" length="22187797"/>
      <pubDate>Wed, 03 Nov 2021 10:51:59 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/WISElizabethRice11012021.mp3</link>
      <itunes:duration>16:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:75</guid>
      <title>Women in Security Edition: Meredith Wilson, founder and CEO of Emergent Risk International</title>
      <itunes:summary>
 Security’s Multimedia Specialist Layan Dahhan sits down with Meredith Wilson, founder and CEO of Emergent Risk International, to talk about her journey into security and how to address geopolitical risks, should they arise. She also discusses the recent withdrawal of U.S. troops from Afghanistan and the aftermath of that decision.       </itunes:summary>
      <description>
        <![CDATA[ Security’s Multimedia Specialist Layan Dahhan sits down with Meredith Wilson, founder and CEO of Emergent Risk International, to talk about her journey into security and how to address geopolitical risks, should they arise. She also discusses the recent withdrawal of U.S. troops from Afghanistan and the aftermath of that decision. ]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/8.webp?t=1634734833"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/MeredithWilsonWIS.10182021-(1).mp3" type="audio/x-mp3" length="11968920"/>
      <pubDate>Wed, 20 Oct 2021 08:58:51 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/MeredithWilsonWIS.10182021-(1).mp3</link>
      <itunes:duration>8:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:74</guid>
      <title>The Cybersecurity and Geopolitical Podcast— Morality and Cyber Risk, Role of a CISO, and Governmental Anti-Cybercrime — Episode 7</title>
      <itunes:summary>
In this installment of The Cybersecurity and Geopolitical Podcast, Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza retrospectively look at the inaugural International Cyber Expo in London, discussing data breaches, the role of a CISO and more. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape. Check out the video version here!      </itunes:summary>
      <description>
        <![CDATA[In this installment of The Cybersecurity and Geopolitical Podcast, Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza retrospectively look at the inaugural International Cyber Expo in London, discussing data breaches, the role of a CISO and more. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape. Check out the video version here!]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Video-Podcast-09-21-FINAL-Audio-Version.mp3" type="audio/x-mp3" length="66818736"/>
      <pubDate>Thu, 14 Oct 2021 10:41:01 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Video-Podcast-09-21-FINAL-Audio-Version.mp3</link>
      <itunes:duration>36:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:73</guid>
      <title>Women in Security Edition: Jennifer Urban, Aviation Attorney and Consultant</title>
      <itunes:summary>
Security’s Multimedia Specialist Layan Dahhan sits down with Aviation Attorney Jennifer Urban to talk about her career journey and how the pandemic has affected aviation security.      </itunes:summary>
      <description>
        <![CDATA[Security’s Multimedia Specialist Layan Dahhan sits down with Aviation Attorney Jennifer Urban to talk about her career journey and how the pandemic has affected aviation security.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/jenny-urban-headshot--1-.webp?t=1633614819"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/2021/10/06/WIS-Final-Cut-Jenny-Urban-(1).mp3" type="audio/x-mp3" length="21886880"/>
      <pubDate>Wed, 06 Oct 2021 11:06:30 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/2021/10/06/WIS-Final-Cut-Jenny-Urban-(1).mp3</link>
      <itunes:duration>17:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:72</guid>
      <title>Women in Security Edition: Kathleen Kotwica, EVP and Chief Knowledge Strategist at Security Executive Council</title>
      <itunes:summary>
Multimedia Specialist Layan Dahhan sits down with Kathleen Kotwica, Executive Vice President and Chief Knowledge Strategist at the Security Executive Council, to talk about her career journey and the challenges faced in security research.      </itunes:summary>
      <description>
        <![CDATA[Multimedia Specialist Layan Dahhan sits down with Kathleen Kotwica, Executive Vice President and Chief Knowledge Strategist at the Security Executive Council, to talk about her career journey and the challenges faced in security research.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/Kathleen-Kotwica-headshot.webp?t=1632330422"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/WIS-Final-Cut-Kathleen.mp3" type="audio/x-mp3" length="14275"/>
      <pubDate>Wed, 22 Sep 2021 13:06:10 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/WIS-Final-Cut-Kathleen.mp3</link>
      <itunes:duration>10:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:71</guid>
      <title>Twenty Years Later: How 9/11 Has Shaped Enterprise Security</title>
      <itunes:summary>
Security's multimedia specialist Layan Dahhan sits down with Fred Burton, executive director at Ontic Center for Protective Intelligence. They look back on how the September 11 terror attacks have gone on to shape modern-day enterprise security on both the national and individual level. Burton also draws parallels between the events of 9/11 and the COVID-19 pandemic, which have both taught us the importance of being prepared for future threats.
      </itunes:summary>
      <description>
        <![CDATA[Security's multimedia specialist Layan Dahhan sits down with Fred Burton, executive director at Ontic Center for Protective Intelligence. They look back on how the September 11 terror attacks have gone on to shape modern-day enterprise security on both the national and individual level. Burton also draws parallels between the events of 9/11 and the COVID-19 pandemic, which have both taught us the importance of being prepared for future threats.
]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/Fred-Burton-headshot.webp?t=1631217428"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/911Podcast_09072021.mp3" type="audio/x-mp3" length="13021"/>
      <pubDate>Thu, 09 Sep 2021 15:54:38 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/911Podcast_09072021.mp3</link>
      <itunes:duration>9:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:70</guid>
      <title>Jason Clark, Chief Strategy Officer at Netskope, on How to Evaluate an Organization’s Security Posture</title>
      <itunes:summary>
Jason Clark, Chief Strategy Officer, talks evaluating an organization’s security posture, particularly when new to a company. He also shares the synergy he sees between strategy, marketing and cybersecurity and the role a security leader can play in all three areas.      </itunes:summary>
      <description>
        <![CDATA[Jason Clark, Chief Strategy Officer, talks evaluating an organization’s security posture, particularly when new to a company. He also shares the synergy he sees between strategy, marketing and cybersecurity and the role a security leader can play in all three areas.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/Jason-Clark-headshot.webp?t=1631107127"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Security-Podcast-2-Jason-Clark2.mp3" type="audio/x-mp3" length="24065"/>
      <pubDate>Wed, 08 Sep 2021 09:13:50 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Security-Podcast-2-Jason-Clark2.mp3</link>
      <itunes:duration>17:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:67</guid>
      <title>Jadee Hanson, CISO at Code42 Talks Insider Threats</title>
      <itunes:summary>
Editor Maggie Shein sits down with Jadee Hanson, Chief Information Security Officer and Chief Information Officer at Code42 about her career start in pentesting, as well as how to address data loss when it comes from the inside your organization.      </itunes:summary>
      <description>
        <![CDATA[Editor Maggie Shein sits down with Jadee Hanson, Chief Information Security Officer and Chief Information Officer at Code42 about her career start in pentesting, as well as how to address data loss when it comes from the inside your organization.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/JadeeHanson_Headshot_Closeup_B.webp?t=1629901157"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Security-Podcast-1-V1.mp3" type="audio/x-mp3" length="24022"/>
      <pubDate>Wed, 25 Aug 2021 10:18:31 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Security-Podcast-1-V1.mp3</link>
      <itunes:duration>17:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:66</guid>
      <title>The Cybersecurity and Geopolitical Podcast — Cyber Warfare, Cyber Mischief and the Cost to Nation-States, Episode 6</title>
      <itunes:summary>
After a (somewhat enforced) summer recess, The Cybersecurity and Geopolitical podcast returns with Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza taking a sweeping look at some of the main protagonists on the global stage right now: Russia, China, Iran and North Korea. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape.

You can watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[After a (somewhat enforced) summer recess, The Cybersecurity and Geopolitical podcast returns with Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza taking a sweeping look at some of the main protagonists on the global stage right now: Russia, China, Iran and North Korea. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape.

You can watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Geopolitical-Cyber-podcast-08-21-Audio-Version.mp3" type="audio/x-mp3" length="49120"/>
      <pubDate>Fri, 20 Aug 2021 11:48:59 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Geopolitical-Cyber-podcast-08-21-Audio-Version.mp3</link>
      <itunes:duration>25:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:65</guid>
      <title>Dana Keys, Intelligence &amp; Support Lead at Sony Electronics: Women in Security Edition</title>
      <itunes:summary>
Editor Maggie Shein sits down with Dana Keys, Intelligence &amp; Support Lead at Sony Electronics for our special Women in Security 2021 edition of The Security Podcasts. Keys tells us about her “non-traditional” path to security, as well as her perspective and insight on the fundamentals of intelligence within an organization.      </itunes:summary>
      <description>
        <![CDATA[Editor Maggie Shein sits down with Dana Keys, Intelligence &amp; Support Lead at Sony Electronics for our special Women in Security 2021 edition of The Security Podcasts. Keys tells us about her “non-traditional” path to security, as well as her perspective and insight on the fundamentals of intelligence within an organization.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/Dana-Keys-headshot.webp?t=1628688319"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Women-in-Security-4-V1.mp3" type="audio/x-mp3" length="15857"/>
      <pubDate>Wed, 11 Aug 2021 09:24:44 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Women-in-Security-4-V1.mp3</link>
      <itunes:duration>11:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:64</guid>
      <title>Women in Security Edition: Donna Kobzaruk, Executive Director Global Security at JPMorgan Chase</title>
      <itunes:summary>
Editor Maggie Shein sits down with Donna Kobzaruk, Executive Director Global Security at JPMorgan Chase for our special Women in Security 2021 edition of The Security Podcast. Listen to how Kobzaruk “fell” into security within the financial sector, the role of physical security within the financial sector, and her view on taking a customer-service-centric role as a security leader and entire department.
      </itunes:summary>
      <description>
        <![CDATA[Editor Maggie Shein sits down with Donna Kobzaruk, Executive Director Global Security at JPMorgan Chase for our special Women in Security 2021 edition of The Security Podcast. Listen to how Kobzaruk “fell” into security within the financial sector, the role of physical security within the financial sector, and her view on taking a customer-service-centric role as a security leader and entire department.
]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/me.webp?t=1627487425"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Women-in-Security-2-Final.mp3" type="audio/x-mp3" length="18588"/>
      <pubDate>Wed, 28 Jul 2021 11:49:20 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Women-in-Security-2-Final.mp3</link>
      <itunes:duration>13:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:63</guid>
      <title>Women in Security Edition: Lauren Zink, Security Training and Awareness Program Manager at Oportun</title>
      <itunes:summary>
Editor Maggie Shein sits down with Lauren Zink, Security Training and Awareness Program Manager at Oportun for our special Women in Security 2021 edition of The Security Podcast. Listen to Zink’s journey within security, her passion for security awareness and what that looks like at the enterprise level, as well as the evolving threat and risk landscape and how security awareness leaders need to adapt from a program perspective. She’ll also dive into diversity and inclusion and getting more women leaders into security.      </itunes:summary>
      <description>
        <![CDATA[Editor Maggie Shein sits down with Lauren Zink, Security Training and Awareness Program Manager at Oportun for our special Women in Security 2021 edition of The Security Podcast. Listen to Zink’s journey within security, her passion for security awareness and what that looks like at the enterprise level, as well as the evolving threat and risk landscape and how security awareness leaders need to adapt from a program perspective. She’ll also dive into diversity and inclusion and getting more women leaders into security.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/Lauren_Zink_03.webp?t=1626351252"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Women-in-Security-1-Final.mp3" type="audio/x-mp3" length="20808"/>
      <pubDate>Thu, 15 Jul 2021 08:13:31 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Women-in-Security-1-Final.mp3</link>
      <itunes:duration>14:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:62</guid>
      <title>Women in Security Edition: C.C. Meadows, Law Enforcement Director at the Fort Worth Independent School District</title>
      <itunes:summary>
Editor Maggie Shein sits down with C.C. Meadows, Law Enforcement Director at the Fort Worth Independent School District for our special Women in Security 2021 edition of The Security Podcast. Listen to Meadows’ journey within the public and private sector, as well as her thoughts and building public/private partnerships within security, security training for non-security employees and important tips and tricks she has learned over the years.
      </itunes:summary>
      <description>
        <![CDATA[Editor Maggie Shein sits down with C.C. Meadows, Law Enforcement Director at the Fort Worth Independent School District for our special Women in Security 2021 edition of The Security Podcast. Listen to Meadows’ journey within the public and private sector, as well as her thoughts and building public/private partnerships within security, security training for non-security employees and important tips and tricks she has learned over the years.
]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/Meadows-FWISD-2.webp?t=1625150708"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Women-in-Security-3-V1.mp3" type="audio/x-mp3" length="19151"/>
      <pubDate>Thu, 01 Jul 2021 10:44:04 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Women-in-Security-3-V1.mp3</link>
      <itunes:duration>13:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:61</guid>
      <title>The Cybersecurity and Geopolitical Podcast — America’s Russia-phobia, Cryptocurrency and Ransomware, Episode 5</title>
      <itunes:summary>
Security Magazine brings you a monthly Cybersecurity and Geopolitical vodcast from Cyjax CISO Ian Thornton-Trump that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. This month’s entertaining podcast takes place back in-person from a pub in the U.K, with a wide-ranging conversation covering America’s potentially myopic focus on Russia; the Colonial Pipeline hack and ransomware; as well as cryptocurrency and traceability.

You can watch the video version here.      </itunes:summary>
      <description>
        <![CDATA[Security Magazine brings you a monthly Cybersecurity and Geopolitical vodcast from Cyjax CISO Ian Thornton-Trump that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. This month’s entertaining podcast takes place back in-person from a pub in the U.K, with a wide-ranging conversation covering America’s potentially myopic focus on Russia; the Colonial Pipeline hack and ransomware; as well as cryptocurrency and traceability.

You can watch the video version here.]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Geopolitical-Cyber-podcast-06-21-V1-Audio-Only.mp3" type="audio/x-mp3" length="28696"/>
      <pubDate>Fri, 25 Jun 2021 11:26:07 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Geopolitical-Cyber-podcast-06-21-V1-Audio-Only.mp3</link>
      <itunes:duration>30:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:60</guid>
      <title>The Cybersecurity and Geopolitical Podcast — Misinformation &amp; Outright Conspiracies, Episode 4</title>
      <itunes:summary>
Security Magazine brings you a monthly Cybersecurity and Geopolitical vodcast from Cyjax CISO Ian Thornton-Trump that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. This month devotes the entire podcast to misinformation, disinformation, and conspiracy theories.

You can watch the video version here. 
      </itunes:summary>
      <description>
        <![CDATA[Security Magazine brings you a monthly Cybersecurity and Geopolitical vodcast from Cyjax CISO Ian Thornton-Trump that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. This month devotes the entire podcast to misinformation, disinformation, and conspiracy theories.

You can watch the video version here. 
]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/thumb/SEC-0221_Podcast-Promo_150x150px-(1).webp?t=1641785721"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Geopolitical-Podcast-05-21-Audio-Only.mp3" type="audio/x-mp3" length="63777"/>
      <pubDate>Thu, 13 May 2021 09:57:32 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Geopolitical-Podcast-05-21-Audio-Only.mp3</link>
      <itunes:duration>33:00</itunes:duration>
    </item>
    <item>
      <guid>www.securitymagazine.com:59</guid>
      <title>The Cybersecurity and Geopolitical Podcast — April 2021, Episode 3</title>
      <itunes:summary>
Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. Listen to Episode Three now! This month discusses the Suez Canal and the issues of global supply chain management; nation-state attacks against cyber infrastructure; and international threat groups.

You can watch the companion vodcast here. https://www.securitymagazine.com/cyber-and-geopolitical-vodcast​. 
      </itunes:summary>
      <description>
        <![CDATA[Cyjax has partnered with Security Magazine to bring you a monthly Cybersecurity and Geopolitical vodcast that ruminates on the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. Listen to Episode Three now! This month discusses the Suez Canal and the issues of global supply chain management; nation-state attacks against cyber infrastructure; and international threat groups.

You can watch the companion vodcast here. https://www.securitymagazine.com/cyber-and-geopolitical-vodcast​. 
]]>
      </description>
      <itunes:image href="https://www.securitymagazine.com/ext/resources/Podcasts/2021/thumb/NEWS-image-VIDEO-PODCAST2.webp?t=1618321669"/>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Geopolitical-Cyber-Podcast-April-2021.mp3" type="audio/x-mp3" length="40020"/>
      <pubDate>Tue, 13 Apr 2021 09:46:17 -0400</pubDate>
      <link>https://dts.podtrac.com/redirect.mp3/www.securitymagazine.com/ext/resources/Podcasts/2021/Cyjax-Geopolitical-Cyber-Podcast-April-2021.mp3</link>
      <itunes:duration>33:00</itunes:duration>
    </item>
  </channel>
</rss>
